Inicio  /  Algorithms  /  Vol: 15 Par: 1 (2022)  /  Artículo
ARTÍCULO
TITULO

Searching Monotone Arrays: A Survey

Márcia R. Cappelle    
Les R. Foulds and Humberto J. Longo    

Resumen

Given a monotone ordered multi-dimensional real array A and a real value k, an important question in computation is to establish if k is a member of A by sequentially searching A by comparing k with some of its entries. This search problem and its known results are surveyed, including the case when A has sizes not necessarily equal. Worst case search algorithms for various types of arrays of finite dimension and sizes are reported. Each algorithm has order strictly less than the product of the sizes of the array. Present challenges and open problems in the area are also presented.

 Artículos similares

       
 
Charlee Kaewrat, Poonpong Boonbrahm and Bukhoree Sahoh    
Unsuitable shoe shapes and sizes are a critical reason for unhealthy feet, may severely contribute to chronic injuries such as foot ulcers in susceptible people (e.g., diabetes patients), and thus need accurate measurements in the manner of expert-based ... ver más
Revista: Informatics

 
Mahmoud Elmezain, Majed M. Alwateer, Rasha El-Agamy, Elsayed Atlam and Hani M. Ibrahim    
Automatic key gesture detection and recognition are difficult tasks in Human?Computer Interaction due to the need to spot the start and the end points of the gesture of interest. By integrating Hidden Markov Models (HMMs) and Deep Neural Networks (DNNs),... ver más
Revista: Informatics

 
Panagiotis Farmakis, Athanasios Chassiakos and Stylianos Karatzas    
Hub-and-Spoke (H&S) network modeling is a form of transport topology optimization in which network joins are connected through intermediate hub nodes. The Short Sea Shipping (SSS) problem aims to efficiently disperse passenger flows involving multipl... ver más
Revista: Algorithms

 
Cheng Liu, Zhujun Si, Jun Hua and Na Jia    
The problem of two-dimensional irregular packing involves the arrangement of objects with diverse shapes and sizes within a given area. This challenge arises across various industrial sectors, where effective packing optimization can yield cost savings, ... ver más
Revista: Applied Sciences

 
Betty Saridou, Isidoros Moulas, Stavros Shiaeles and Basil Papadopoulos    
Image conversion of malicious binaries, or binary visualisation, is a relevant approach in the security community. Recently, it has exceeded the role of a single-file malware analysis tool and has become a part of Intrusion Detection Systems (IDSs) thank... ver más
Revista: Applied Sciences