Search Results - "Bæk, Mathias"
-
1
Maximal unbordered factors of random strings
Published in Theoretical computer science (08-01-2021)“…A border of a string is a non-empty prefix of the string that is also a suffix of the string, and a string is unbordered if it has no border other than itself…”
Get full text
Journal Article -
2
Identification of the First Highly Subtype-Selective Inhibitor of Human GABA Transporter GAT3
Published in ACS chemical neuroscience (16-09-2015)“…Screening a library of small-molecule compounds using a cell line expressing human GABA transporter 3 (hGAT3) in a [3H]GABA uptake assay identified isatin…”
Get full text
Journal Article -
3
5‑HT2A/5-HT2C Receptor Pharmacology and Intrinsic Clearance of N‑Benzylphenethylamines Modified at the Primary Site of Metabolism
Published in ACS chemical neuroscience (16-11-2016)“…The toxic hallucinogen 25B-NBOMe is very rapidly degraded by human liver microsomes and has low oral bioavailability. Herein we report on the synthesis,…”
Get full text
Journal Article -
4
Psychopharmacological treatment in patients planned for hip or knee replacement
Published in Basic & clinical pharmacology & toxicology (01-07-2024)“…Psychopharmacological treatment may be an independent risk factor for increased length of stay and readmission after hip and knee replacement. Thus, temporary…”
Get full text
Journal Article -
5
Maximal Unbordered Factors of Random Strings
Published 17-12-2018“…A border of a string is a non-empty prefix of the string that is also a suffix of the string, and a string is unbordered if it has no border other than itself…”
Get full text
Journal Article -
6
Pronator teres syndrome is a rare but important cause of pain in the forearm
Published in Ugeskrift for læger (14-11-2016)“…Pronator teres syndrome is a rare but clinically important condition which can cause pain in the forearm. It is a com-pression neuropathy due to compression of…”
Get more information
Journal Article -
7
5-HT 2A /5-HT 2C Receptor Pharmacology and Intrinsic Clearance of N-Benzylphenethylamines Modified at the Primary Site of Metabolism
Published in ACS chemical neuroscience (16-11-2016)“…The toxic hallucinogen 25B-NBOMe is very rapidly degraded by human liver microsomes and has low oral bioavailability. Herein we report on the synthesis,…”
Get full text
Journal Article -
8
Linear Hashing is Awesome
Published 08-06-2017“…We consider the hash function $h(x) = ((ax+b) \bmod p) \bmod n$ where $a,b$ are chosen uniformly at random from $\{0,1,\ldots,p-1\}$. We prove that when we use…”
Get full text
Journal Article -
9
Additive Spanners and Distance Oracles in Quadratic Time
Published 14-04-2017“…Let $G$ be an unweighted, undirected graph. An additive $k$-spanner of $G$ is a subgraph $H$ that approximates all distances between pairs of nodes up to an…”
Get full text
Journal Article -
10
Additive Spanners: A Simple Construction
Published 02-03-2014“…We consider additive spanners of unweighted undirected graphs. Let $G$ be a graph and $H$ a subgraph of $G$. The most na\"ive way to construct an additive…”
Get full text
Journal Article -
11
The Entropy of Backwards Analysis
Published 14-04-2017“…Backwards analysis, first popularized by Seidel, is often the simplest most elegant way of analyzing a randomized algorithm. It applies to incremental…”
Get full text
Journal Article -
12
Power of $d$ Choices with Simple Tabulation
Published 25-04-2018“…Suppose that we are to place $m$ balls into $n$ bins sequentially using the $d$-choice paradigm: For each ball we are given a choice of $d$ bins, according to…”
Get full text
Journal Article -
13
Practical Hash Functions for Similarity Estimation and Dimensionality Reduction
Published 23-11-2017“…Hashing is a basic tool for dimensionality reduction employed in several aspects of machine learning. However, the perfomance analysis is often carried out…”
Get full text
Journal Article -
14
New Subquadratic Approximation Algorithms for the Girth
Published 07-04-2017“…We consider the problem of approximating the girth, $g$, of an unweighted and undirected graph $G=(V,E)$ with $n$ nodes and $m$ edges. A seminal result of Itai…”
Get full text
Journal Article -
15
Finding Even Cycles Faster via Capped k-Walks
Published 30-03-2017“…In this paper, we consider the problem of finding a cycle of length $2k$ (a $C_{2k}$) in an undirected graph $G$ with $n$ nodes and $m$ edges for constant…”
Get full text
Journal Article -
16
Quicksort, Largest Bucket, and Min-Wise Hashing with Limited Independence
Published 19-02-2015“…Randomized algorithms and data structures are often analyzed under the assumption of access to a perfect source of randomness. The most fundamental metric used…”
Get full text
Journal Article -
17
Sublinear Distance Labeling
Published 09-07-2015“…A distance labeling scheme labels the $n$ nodes of a graph with binary strings such that, given the labels of any two nodes, one can determine the distance in…”
Get full text
Journal Article -
18
Fast Similarity Sketching
Published 14-04-2017“…We consider the $\textit{Similarity Sketching}$ problem: Given a universe $[u] = \{0,\ldots, u-1\}$ we want a random function $S$ mapping subsets $A\subseteq…”
Get full text
Journal Article -
19
Optimal induced universal graphs and adjacency labeling for trees
Published 09-04-2015“…We show that there exists a graph $G$ with $O(n)$ nodes, where any forest of $n$ nodes is a node-induced subgraph of $G$. Furthermore, for constant arboricity…”
Get full text
Journal Article -
20
Hashing for statistics over k-partitions
Published 26-11-2014“…In this paper we analyze a hash function for $k$-partitioning a set into bins, obtaining strong concentration bounds for standard algorithms combining…”
Get full text
Journal Article