Simon Yoffe

Simon Yoffe

United States
646 followers 500+ connections

Activity

Join now to see all activity

Experience

  • Viventium Graphic
  • -

    5-47 47th Road, Long Island City, NY 11101

  • -

    Bedford 768 Brooklyn NY

  • -

    THE FAIRMONT, SAN JOSE, CA

  • -

  • -

    Bedford 768 Brooklyn NY

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

  • -

Education

  • National Technical University of Athens Graphic

    National Technical University of Athens

    -

    -

    Activities and Societies: Participant

    A Simple and Efficient Union-Find-Delete Algorithm
    Abstract: The Union-Find data structure for maintaining disjoint sets is one of the best known and widespread data structures, in particular the version with constant-time Union and efficient Find. Recently, the question of how to handle deletions from the structure in an efficient manner has been taken up, First by Kaplan, Shafrir and Tarjan (2002) and subsequently by Alstrup et al. (2005). The latter work shows that it is possible to…

    A Simple and Efficient Union-Find-Delete Algorithm
    Abstract: The Union-Find data structure for maintaining disjoint sets is one of the best known and widespread data structures, in particular the version with constant-time Union and efficient Find. Recently, the question of how to handle deletions from the structure in an efficient manner has been taken up, First by Kaplan, Shafrir and Tarjan (2002) and subsequently by Alstrup et al. (2005). The latter work shows that it is possible to implement deletions in constant time, without affecting adversely the asymptotic complexity of other operations, even when this complexity is calculated as a function of the current size of the set. In this talk we present a conceptual and technical simplification of the algorithm, which has the same asymptotic complexity (and constant factors may be smaller).

  • -

    -

  • -

    -

  • -

    -

Licenses & Certifications

Publications

  • A Simple and Efficient Union-Find-Delete Algorithm

    Theoretical Computer Science

    The Union–Find data structure for maintaining disjoint sets is one of the best known and widespread data structures, in particular the version with constant-time Union and efficient Find. Recently, the question of how to handle deletions from the structure in an efficient manner has been taken up, first by Kaplan et al. (2002) [2] and subsequently by Alstrup et al. (2005) [1]. The latter work shows that it is possible to implement deletions in constant time, without affecting adversely the…

    The Union–Find data structure for maintaining disjoint sets is one of the best known and widespread data structures, in particular the version with constant-time Union and efficient Find. Recently, the question of how to handle deletions from the structure in an efficient manner has been taken up, first by Kaplan et al. (2002) [2] and subsequently by Alstrup et al. (2005) [1]. The latter work shows that it is possible to implement deletions in constant time, without affecting adversely the asymptotic complexity of other operations, even when this complexity is calculated as a function of the current size of the set.

    In this note we present a conceptual and technical simplification of the algorithm, which has the same theoretical efficiency, and is probably more attractive in practice.

    See publication

Patents

  • Security switch

    Issued US 8,924,708

    System and method for securing a personal device that includes a device core and a peripheral device from unauthorized access or operation. The system comprises an isolated switch, included fully or partially within an envelope of the personal device. The isolated switch cannot be affected in its operation by either the device core or the peripheral device. The switch may be operated by an authorized user of the personal device either preemptively or in response to a detected threat. In some…

    System and method for securing a personal device that includes a device core and a peripheral device from unauthorized access or operation. The system comprises an isolated switch, included fully or partially within an envelope of the personal device. The isolated switch cannot be affected in its operation by either the device core or the peripheral device. The switch may be operated by an authorized user of the personal device either preemptively or in response to a detected threat. In some embodiments, the isolated switch includes an isolated controller which can send one or more signals to the peripheral device and/or part of peripheral device. In some embodiments, the isolated switch includes an isolated internal component and an isolated external component, both required to work together to trigger the isolated switch operation. In some embodiments, the isolated switch includes an isolated disconnector for connecting and disconnecting the device core from part of the peripheral device.

    See patent
  • Security switch

    Issued US 8,522,309

    System and method for securing a personal device that includes a device core and a peripheral device from unauthorized access or operation. The system comprises an isolated switch, included fully or partially within an envelope of the personal device. The isolated switch cannot be affected in its operation by either the device core or the peripheral device. The switch may be operated by an authorized user of the personal device either preemptively or in response to a detected threat. In some…

    System and method for securing a personal device that includes a device core and a peripheral device from unauthorized access or operation. The system comprises an isolated switch, included fully or partially within an envelope of the personal device. The isolated switch cannot be affected in its operation by either the device core or the peripheral device. The switch may be operated by an authorized user of the personal device either preemptively or in response to a detected threat. In some embodiments, the isolated switch includes an isolated controller which can send one or more signals to the peripheral device and/or part of peripheral device. In some embodiments, the isolated switch includes an isolated internal component and an isolated external component, both required to work together to trigger the isolated switch operation. In some embodiments, the isolated switch includes an isolated disconnector for connecting and disconnecting the device core from part of the peripheral device.

    See patent
  • System for securing a personal device from unauthorized access

    Issued RU 013885

    A system and method for securing a personal device that includes a device core and a peripheral device from unauthorized access or operation. The system and method use a switch, included fully or partially within an envelope of the device and which cannot be affected in its operation by either the device core or the peripheral device. The switch may be activated by an authorized user of the personal device either preemptively or in response to a detected threat.
    The switch can disconnect…

    A system and method for securing a personal device that includes a device core and a peripheral device from unauthorized access or operation. The system and method use a switch, included fully or partially within an envelope of the device and which cannot be affected in its operation by either the device core or the peripheral device. The switch may be activated by an authorized user of the personal device either preemptively or in response to a detected threat.
    The switch can disconnect peripheral device or its part and modify functioning of peripheral device.

    See patent
  • Security Switch

    Issued US 8,090,961

    A system and method for securing a personal device that includes a device core and a peripheral device from unauthorized access or operation. The system and method use a switch, included fully or partially within an envelope of the device and which cannot be affected in its operation by either the device core or the peripheral device. The switch may be activated by an authorized user of the personal device either preemptively or in response to a detected threat.

    See patent

Projects

  • Win Local Arch

    Console utility for performing 7zip with unbuffered I/O
    Currently all archive, compression software and libraries are using buffered I/O which brings your machine to zero memory for large files.
    This console application uses the SevenZipSharp library with unbuffered I/O which gives all the options of 7zip without the memory problem.

    The supported compression algorithms are:
    Deflate, Deflate64, BZip2, Lzma, Lzma2, and Ppmd

    The supported archive formats are:
    SevenZip…

    Console utility for performing 7zip with unbuffered I/O
    Currently all archive, compression software and libraries are using buffered I/O which brings your machine to zero memory for large files.
    This console application uses the SevenZipSharp library with unbuffered I/O which gives all the options of 7zip without the memory problem.

    The supported compression algorithms are:
    Deflate, Deflate64, BZip2, Lzma, Lzma2, and Ppmd

    The supported archive formats are:
    SevenZip, Zip, GZip, BZip2, Tar, and XZ

    See project
  • Win Local Copy

    Console application that performs unbuffered I/O file copy (for large files)
    Currently most of the windows copy utilities are using buffered I/O (e.g. RoboCopy, TeraCopy) which brings your machine to zero memory when copying a big file (e.g. database backup)
    This console application performs a file copy using unbuffered I/O like XCopy /J, but has some more advanced options for making fast copy of large files with the memory problem.

    See project

Languages

  • English

    Full professional proficiency

  • Hebrew

    Native or bilingual proficiency

  • Russian

    Native or bilingual proficiency

  • French

    -

Recommendations received

2 people have recommended Simon

Join now to view

More activity by Simon

View Simon’s full profile

  • See who you know in common
  • Get introduced
  • Contact Simon directly
Join to view full profile

Other similar profiles

Explore top content on LinkedIn

Find curated posts and insights for relevant topics all in one place.

View top content

Add new skills with these courses