On two LZ78-style grammars: Compression bounds and compressed-space computation

Golnaz Badkobeh, Travis Gagie, Shunsuke Inenaga, Tomasz Kociumaka, Dmitry Kosolobov, Simon J. Puglisi

Research output: Chapter in Book/Report/Conference proceedingConference contribution

3 Citations (Scopus)

Abstract

We investigate two closely related LZ78-based compression schemes: LZMW (an old scheme by Miller and Wegman) and LZD (a recent variant by Goto et al.). Both LZD and LZMW naturally produce a grammar for a string of length n; we show that the size of this grammar can be larger than the size of the smallest grammar by a factor Ω(n1/3) but is always within a factor (Formula presented). In addition, we show that the standard algorithms using Θ(z) working space to construct the LZD and LZMW parsings, where z is the size of the parsing, work in Ω(n5/4) time in the worst case. We then describe a new Las Vegas LZD/LZMW parsing algorithm that uses O(z log n) space and O(n + zlog2n) time w.h.p.

Original languageEnglish
Title of host publicationString Processing and Information Retrieval - 24th International Symposium, SPIRE 2017, Proceedings
EditorsRossano Venturini, Gabriele Fici, Marinella Sciortino
PublisherSpringer Verlag
Pages51-67
Number of pages17
ISBN (Print)9783319674278
DOIs
Publication statusPublished - 2017
Event24th International Symposium on String Processing and Information Retrieval, SPIRE 2017 - Palermo, Italy
Duration: Sept 26 2017Sept 29 2017

Publication series

NameLecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
Volume10508 LNCS
ISSN (Print)0302-9743
ISSN (Electronic)1611-3349

Other

Other24th International Symposium on String Processing and Information Retrieval, SPIRE 2017
Country/TerritoryItaly
CityPalermo
Period9/26/179/29/17

All Science Journal Classification (ASJC) codes

  • Theoretical Computer Science
  • Computer Science(all)

Fingerprint

Dive into the research topics of 'On two LZ78-style grammars: Compression bounds and compressed-space computation'. Together they form a unique fingerprint.

Cite this