“Simon and me worked in IIS company sufficient period of time to form an impression of Simon as a professional developer. His ability to find quick and quality solution to any problem he faces is rather astonishing. His high learning ability also provides him with an option to enter new environments and to reach desired results relatively easily.”
Activity
-
Oh honey, it’s launch day: mcptotal.io! 🚀 But first, some context. We just walked away from a four-year product and real customers. After…
Oh honey, it’s launch day: mcptotal.io! 🚀 But first, some context. We just walked away from a four-year product and real customers. After…
Liked by Simon Yoffe
Experience
Education
-
National Technical University of Athens
-
-
Activities and Societies: Participant
A Simple and Efficient Union-Find-Delete Algorithm
Abstract: The Union-Find data structure for maintaining disjoint sets is one of the best known and widespread data structures, in particular the version with constant-time Union and efficient Find. Recently, the question of how to handle deletions from the structure in an efficient manner has been taken up, First by Kaplan, Shafrir and Tarjan (2002) and subsequently by Alstrup et al. (2005). The latter work shows that it is possible to…A Simple and Efficient Union-Find-Delete Algorithm
Abstract: The Union-Find data structure for maintaining disjoint sets is one of the best known and widespread data structures, in particular the version with constant-time Union and efficient Find. Recently, the question of how to handle deletions from the structure in an efficient manner has been taken up, First by Kaplan, Shafrir and Tarjan (2002) and subsequently by Alstrup et al. (2005). The latter work shows that it is possible to implement deletions in constant time, without affecting adversely the asymptotic complexity of other operations, even when this complexity is calculated as a function of the current size of the set. In this talk we present a conceptual and technical simplification of the algorithm, which has the same asymptotic complexity (and constant factors may be smaller). -
-
-
-
-
-
-
-
-
Licenses & Certifications
Publications
-
A Simple and Efficient Union-Find-Delete Algorithm
Theoretical Computer Science
See publicationThe Union–Find data structure for maintaining disjoint sets is one of the best known and widespread data structures, in particular the version with constant-time Union and efficient Find. Recently, the question of how to handle deletions from the structure in an efficient manner has been taken up, first by Kaplan et al. (2002) [2] and subsequently by Alstrup et al. (2005) [1]. The latter work shows that it is possible to implement deletions in constant time, without affecting adversely the…
The Union–Find data structure for maintaining disjoint sets is one of the best known and widespread data structures, in particular the version with constant-time Union and efficient Find. Recently, the question of how to handle deletions from the structure in an efficient manner has been taken up, first by Kaplan et al. (2002) [2] and subsequently by Alstrup et al. (2005) [1]. The latter work shows that it is possible to implement deletions in constant time, without affecting adversely the asymptotic complexity of other operations, even when this complexity is calculated as a function of the current size of the set.
In this note we present a conceptual and technical simplification of the algorithm, which has the same theoretical efficiency, and is probably more attractive in practice.
Patents
-
Security switch
Issued US 8,924,708
See patentSystem and method for securing a personal device that includes a device core and a peripheral device from unauthorized access or operation. The system comprises an isolated switch, included fully or partially within an envelope of the personal device. The isolated switch cannot be affected in its operation by either the device core or the peripheral device. The switch may be operated by an authorized user of the personal device either preemptively or in response to a detected threat. In some…
System and method for securing a personal device that includes a device core and a peripheral device from unauthorized access or operation. The system comprises an isolated switch, included fully or partially within an envelope of the personal device. The isolated switch cannot be affected in its operation by either the device core or the peripheral device. The switch may be operated by an authorized user of the personal device either preemptively or in response to a detected threat. In some embodiments, the isolated switch includes an isolated controller which can send one or more signals to the peripheral device and/or part of peripheral device. In some embodiments, the isolated switch includes an isolated internal component and an isolated external component, both required to work together to trigger the isolated switch operation. In some embodiments, the isolated switch includes an isolated disconnector for connecting and disconnecting the device core from part of the peripheral device.
-
Security switch
Issued US 8,522,309
See patentSystem and method for securing a personal device that includes a device core and a peripheral device from unauthorized access or operation. The system comprises an isolated switch, included fully or partially within an envelope of the personal device. The isolated switch cannot be affected in its operation by either the device core or the peripheral device. The switch may be operated by an authorized user of the personal device either preemptively or in response to a detected threat. In some…
System and method for securing a personal device that includes a device core and a peripheral device from unauthorized access or operation. The system comprises an isolated switch, included fully or partially within an envelope of the personal device. The isolated switch cannot be affected in its operation by either the device core or the peripheral device. The switch may be operated by an authorized user of the personal device either preemptively or in response to a detected threat. In some embodiments, the isolated switch includes an isolated controller which can send one or more signals to the peripheral device and/or part of peripheral device. In some embodiments, the isolated switch includes an isolated internal component and an isolated external component, both required to work together to trigger the isolated switch operation. In some embodiments, the isolated switch includes an isolated disconnector for connecting and disconnecting the device core from part of the peripheral device.
-
System for securing a personal device from unauthorized access
Issued RU 013885
See patentA system and method for securing a personal device that includes a device core and a peripheral device from unauthorized access or operation. The system and method use a switch, included fully or partially within an envelope of the device and which cannot be affected in its operation by either the device core or the peripheral device. The switch may be activated by an authorized user of the personal device either preemptively or in response to a detected threat.
The switch can disconnect…A system and method for securing a personal device that includes a device core and a peripheral device from unauthorized access or operation. The system and method use a switch, included fully or partially within an envelope of the device and which cannot be affected in its operation by either the device core or the peripheral device. The switch may be activated by an authorized user of the personal device either preemptively or in response to a detected threat.
The switch can disconnect peripheral device or its part and modify functioning of peripheral device.
-
Security Switch
Issued US 8,090,961
See patentA system and method for securing a personal device that includes a device core and a peripheral device from unauthorized access or operation. The system and method use a switch, included fully or partially within an envelope of the device and which cannot be affected in its operation by either the device core or the peripheral device. The switch may be activated by an authorized user of the personal device either preemptively or in response to a detected threat.
Projects
-
Win Local Arch
See projectConsole utility for performing 7zip with unbuffered I/O
Currently all archive, compression software and libraries are using buffered I/O which brings your machine to zero memory for large files.
This console application uses the SevenZipSharp library with unbuffered I/O which gives all the options of 7zip without the memory problem.
The supported compression algorithms are:
Deflate, Deflate64, BZip2, Lzma, Lzma2, and Ppmd
The supported archive formats are:
SevenZip…Console utility for performing 7zip with unbuffered I/O
Currently all archive, compression software and libraries are using buffered I/O which brings your machine to zero memory for large files.
This console application uses the SevenZipSharp library with unbuffered I/O which gives all the options of 7zip without the memory problem.
The supported compression algorithms are:
Deflate, Deflate64, BZip2, Lzma, Lzma2, and Ppmd
The supported archive formats are:
SevenZip, Zip, GZip, BZip2, Tar, and XZ -
Win Local Copy
See projectConsole application that performs unbuffered I/O file copy (for large files)
Currently most of the windows copy utilities are using buffered I/O (e.g. RoboCopy, TeraCopy) which brings your machine to zero memory when copying a big file (e.g. database backup)
This console application performs a file copy using unbuffered I/O like XCopy /J, but has some more advanced options for making fast copy of large files with the memory problem.
Languages
-
English
Full professional proficiency
-
Hebrew
Native or bilingual proficiency
-
Russian
Native or bilingual proficiency
-
French
-
Recommendations received
-
LinkedIn User
2 people have recommended Simon
Join now to viewMore activity by Simon
-
The wait is over! I'm sure you've been wondering what I've been working on for the past three years… I’m thrilled to announce the official launch of…
The wait is over! I'm sure you've been wondering what I've been working on for the past three years… I’m thrilled to announce the official launch of…
Liked by Simon Yoffe
Other similar profiles
Explore top content on LinkedIn
Find curated posts and insights for relevant topics all in one place.
View top content