Skip to main content

Fast algorithms for computing sequence distances by exhaustive substring composition

Abstract

The increasing throughput of sequencing raises growing needs for methods of sequence analysis and comparison on a genomic scale, notably, in connection with phylogenetic tree reconstruction. Such needs are hardly fulfilled by the more traditional measures of sequence similarity and distance, like string edit and gene rearrangement, due to a mixture of epistemological and computational problems. Alternative measures, based on the subword composition of sequences, have emerged in recent years and proved to be both fast and effective in a variety of tested cases. The common denominator of such measures is an underlying information theoretic notion of relative compressibility. Their viability depends critically on computational cost. The present paper describes as a paradigm the extension and efficient implementation of one of the methods in this class. The method is based on the comparison of the frequencies of all subwords in the two input sequences, where frequencies are suitably adjusted to take into account the statistical background.

Background

Measuring the information content of finite sequences has been an intensely sought after and yet elusive goal, perhaps dating back to von Mises' pursuit of the notion of randomness [1]. Among prominent attempts at such a measure, one would find Brillouin's usage of Shannon's redundancy [2], and Kolmogorov's approach to information [3] which Lempel and Ziv specialized [4] to design practical and elegant data compression methods. Since every notion of information invokes naturally a germane one of conditional or mutual information, it becomes natural to base measures of similarity on the latter and hence ultimately on some kind of relative compressibility [5]. This angle of approach is eliciting a growing interest in computational molecular biology (see, e.g., [617]), thus contributing to a long tradition of mutual fascination [2, 18]. The surge may be attributable primarily to the increasing availability of whole genomes and proteomes, that makes standard comparison and distance measures, such as those based on edit distances and gene rearrangement, either computationally unbearable, or scarcely significant, or both. In this paper we rely on the existing literature for significance and concentrate instead on aspects of computational efficiency. The specific distances we consider constitute an extension of the method of [13]. In that approach, each organism is represented by a composition vector the components of which correspond to the numbers of various (overlapping) k-peptides, for a fixed k, in all the translated amino acid sequences from an organism's genome. The numbers are modified by subtracting a statistical background to highlight the role of selective evolution. The subtraction procedure is based on a (k-2)-th order Markov prediction and therefore the minimum k is 3. For any fixed value of k, known string algorithms support the computation of the distance at the outset in time linear in the input size. In what follows, we expand on the approach based on the distribution of k-mers by including all the values of k in the count. In other words, we consider the vector composition distances involving the collection of all words of any length k up to any arbitrarily preset maximum length K. As it turns out, this can be done at no extra cost, hence still in linear time. This is optimal, since a lower bound for processing a sequence of size L is trivially Ω(L). Some interest, however, also comes from the fact that the number of k-mers grows exponentially with k, and the number of all distinct k-mers of length up to K that actually occur in the input may be quadratic in the length L of the host sequence when KL. Therefore, we cannot afford to tally the contribution of each k-mer individually.

The distances we compute here below may be considered an extension also of the one in [14], in which phylogeny reconstruction on a genomic scale was based on the average length of common substrings. However, the linear time implementation of our measure is fairly more involved. The main difficulty is imposed by having to take predictions into account. In fact, albeit this may be surprising to the neophyte, the bare computation of shared string counts (e.g., multiply the frequencies with which each of the possibly Θ(L2) shared subword appears in either sequence and add up all these products), is trivially done in linear time, based on string data structures and basic properties that have been well understood for over thirty years (see, e.g., [19]).

Methods

Let S be a sequence of length L and consider, for each word w [1..k] of a given length k in S, the expression [13]:

a ( w ) = { p ( w [ 1.. k ] ) p o ( w [ 1.. k ] ) p o ( w [ 1.. k ] ) for p o ( w [ 1.. k ] ) 0 0 otherwise MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@79F6@
(1)

where p(w [1..k]) is the observed ratio f(w)/(L - |w| + 1) between the count (possibly, zero) and the number of possible occurrences of the word w in S, and po(w [1..k]) is the Markovian estimate of the probability p defined as

p ( w [ 1.. k 1 ] ) p ( w [ 2.. k ] ) p ( w [ 2.. k 1 ] ) . MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaqcfa4aaSaaaeaacqWGWbaCcqGGOaakcqWG3bWDcqGGBbWwcqaIXaqmcqGGUaGlcqGGUaGlcqWGRbWAcqGHsislcqaIXaqmcqGGDbqxcqGGPaqkcqGHsislcqWGWbaCcqGGOaakcqWG3bWDcqGGBbWwcqaIYaGmcqGGUaGlcqGGUaGlcqWGRbWAcqGGDbqxcqGGPaqkaeaacqWGWbaCcqGGOaakcqWG3bWDcqGGBbWwcqaIYaGmcqGGUaGlcqGGUaGlcqWGRbWAcqGHsislcqaIXaqmcqGGDbqxcqGGPaqkaaGaeiOla4caaa@53CB@

With easy passages the above can be rewritten as

a ( w ) = { Λ k × f ( w [ 1.. k ] ) f ( w [ 2.. k 1 ] ) f ( w [ 1.. k 1 ] ) f ( w [ 2.. k ] ) 1 for f ( w [ 1.. k 1 ] ) 1 and f ( w [ 2.. k ] ) 1 0 otherwise MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@9D82@
(2)

Where

Λ k = ( L k + 2 ) 2 ( L k + 1 ) ( L k + 3 ) , MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaeu4MdW0aaSbaaSqaaiabdUgaRbqabaGccqGH9aqpjuaGdaWcaaqaaiabcIcaOiabdYeamjabgkHiTiabdUgaRjabgUcaRiabikdaYiabcMcaPmaaCaaabeqaaiabikdaYaaaaeaacqGGOaakcqWGmbatcqGHsislcqWGRbWAcqGHRaWkcqaIXaqmcqGGPaqkcqGGOaakcqWGmbatcqGHsislcqWGRbWAcqGHRaWkcqaIZaWmcqGGPaqkaaGccqGGSaalaaa@47A8@

so that the difference between the empirical probability of w and its Markov-based prediction, divided by the latter is represented by Expression 2 as well. For a given collection of words (e.g., the set of all k-mers for a fixed k), all a-values are stored, in some suitable order in a vector, called the composition vector. For two composition vectors A and B, the following distance function is considered:

D ( A , B ) = 1 / 2 ( 1 a i b i ( a i 2 × b i 2 ) 1 / 2 ) MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaemiraqKaeiikaGIaemyqaeKaeiilaWIaemOqaiKaeiykaKIaeyypa0JaeGymaeJaei4la8IaeGOmaiZaaeWaaeaacqaIXaqmcqGHsisljuaGdaWcaaqaamaaqaeabaGaemyyae2aaSbaaeaacqWGPbqAaeqaaiabdkgaInaaBaaabaGaemyAaKgabeaaaeqabeGaeyyeIuoaaeaacqGGOaakdaaeabqaaiabdggaHnaaDaaabaGaemyAaKgabaGaeGOmaidaaaqabeqacqGHris5aiabgEna0oaaqaeabaGaemOyai2aa0baaeaacqWGPbqAaeaacqaIYaGmaaaabeqabiabggHiLdGaeiykaKYaaWbaaeqabaGaeGymaeJaei4la8IaeGOmaidaaaaaaOGaayjkaiaawMcaaaaa@5367@
(3)

where the a i 's and b i 's are computed by applying Expression 2 respectively to A and B.

There are |Σ|kcomponents in the composition vector of k-mers, hence the size of these vectors grows exponentially with k, and so does the direct computation of D. It is clear that for any value of k the number of k-mers in a sequence of L characters is O(L). Less obvious but also well known (cf., e.g., [19]), is the fact that the O(L) bound applies as well to a notable class of words, defined as follows. A word is maximal in its host sequence if it is impossible to extend it by appending one or more characters without losing some of its occurrences. On the other hand, the total number of distinct words of any length found in a sequence of L characters can be Θ(L2).

In what follows, we show that it is possible to compute the measure D for composition vectors consisting of all (possibly Θ(L2)) words in the input sequences in overall time linear in the total length of the input. Our construction is supported by the basic structure of a suffix tree, which we proceed to recapture. In short, a suffix tree is a trie (i.e., a digital search index) collecting all suffixes of a string. For a compact representation, all chains of unary nodes are collapsed into a single arc, so that the resulting structure is linear in the length of the string. Whereas a string of L characters may contain Θ(L2) distinct substrings, the O(L) substrings terminating at branching nodes of the suffix tree are enough to represent the entire vocabulary of the string: for any string w not ending on a branching node, its shortest extension w' reaching such a branching node has exactly the same frequency (hence the same list of occurrences) as w. Hence these words are maximal in the sense described earlier. Unlike any straightforward implementation of this well known property, our construction must be based on normalized frequencies rather than bare counts, thereby implicating the Λ terms that do vary along every arc. One more level of complication stems from the fact that our computation needs access, for any word w, to the normalized frequencies of extensions of w in the form aw, with a a character of Σ, whereas such words might lack a branching node in the tree.

Suffix trees and their variants are ubiquitous data structures of string processing, and multiple algorithms are available for their construction in linear time and space. Our implementation is based on the K-truncated suffix tree [20], a special variant of the suffix tree that collects all subwords of length up to K instead of all suffixes of the sequence. This further reduces space and time costs in all cases where interest is limited to words of bounded length.

Results and discussion

We now discuss adaptations of our trie for computing the compositional distance between two sequences according to Expression 3. It is convenient to subdivide the discussion into two parts, handling first the easier case of branching nodes, i.e., nodes that correspond to maximal words.

Maximal Words

As part of the trie construction for either one of the sequences, each node ν is assigned the occurrence count of word ν in that sequence, where ν denotes the word spelled out by the labels found on the path from the root to the node ν. As is well known (cf., e.g., [19]), it is easy to update this information during each word insertion in the trie, if the latter is built by direct methods, or to compute it off-line (by attributing to each node the number of leaves in the subtree rooted at that node) when the suffix tree is built by one of the existing linear time constructions.

From inspection of a(w), it is seen that in order to compute probability estimates we actually need access, for any maximal word w [1..k] = ν, to the occurrence counts of w [1..k - 1], w [2..k] and w [2..k - 1]. This is possible provided that for every node ν there is (1) a link from ν to parent(ν), where parent(ν) denotes the branching node on the root-ward path from ν, and (2) a suffix link from ν to s(ν) = ν ^ MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafqyVd4MbaKaaaaa@2D9D@ such that if ν = aw with a Σ then ν ^ MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafqyVd4MbaKaaaaa@2D9D@ = w. At branching nodes, both features are easily accommodated by the data structure, in fact, the second one is an essential part of any of its linear-time constructions. As we shall see, the computation of D is not entirely trivial when we take all subwords of S into account.

Imagine now that for two input sequences their respective tries are drawn each with a different color, and then superimposed. Only the words occurring in both sequences will contribute to the numerator in Expression 3. Such words are found on paths and nodes bearing both colors. On the other hand, words found on a path with only one color contribute to only one of the sums appearing in the denominator of 3. Finally, there are some words not appearing in one or both sequences that nevertheless contribute to Expression 3. Such words will be called chimeral words. With reference to one of the sequences, these are k-mers w such that f(w [1..k]) = 0, but f(w [1..k - 1]) ≥ 1 and f(w [2..k]) ≥ 1 in that sequence. The a value of these words is -1, and the words themselves would represent some of the possible unit-symbol extensions of paths that exist in the trie of the host sequence. Thus, for any word w [1..k], its contribution to the distance is to be accounted for only when w [1..k - 1] and w [2..k] both exist in the trie, but in no other case. The collection of these observations lead to reduce the number of words for which the components of Expression 2 need to be computed.

The computation of the second ratio of Expression 2 is easy to handle at branching nodes. To see this, consider one of the sequences and define the following function on each node ν in the trie associated with it.

Γ ( ν ) = { 1 if | e ( ν ) | > 1 f ( p a r e n t ( ν ) ) f ( ν ) if | e ( ν ) | = 1 MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaeu4KdCKaeiikaGIaeqyVd4MaeiykaKIaeyypa0ZaaiqaaeaafaqabeGadaaabaGaeGymaedabaGaeeyAaKMaeeOzaygabaGaeiiFaWNaemyzauMaeiikaGIaeqyVd4MaeiykaKIaeiiFaWNaeyOpa4JaeGymaedajuaGbaWaaSaaaeaacqWGMbGzcqGGOaakcqGHPms4cqWGWbaCcqWGHbqycqWGYbGCcqWGLbqzcqWGUbGBcqWG0baDcqGGOaakcqaH9oGBcqGGPaqkcqGHQms8cqGGPaqkaeaacqWGMbGzcqGGOaakcqGHPms4cqaH9oGBcqGHQms8cqGGPaqkaaaakeaacqqGPbqAcqqGMbGzaeaacqGG8baFcqWGLbqzcqGGOaakcqaH9oGBcqGGPaqkcqGG8baFcqGH9aqpcqaIXaqmaaaacaGL7baaaaa@6800@
(4)

where |e(ν)| is the length of the label of the edge entering node ν. This function gives the occurrence count ratio between a node ν and its parent, and is straightforward to implement. Thus, substituting Expression 4 and Λ in the score 2 for each node ν we have

S c o r e ( ν ) = { Λ × Γ ( s ( ν ) ) Γ ( ν ) for f ( w [ 1.. k ] ) 1 0 otherwise MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@6FB3@
(5)

where s(ν) is the proper longest suffix of w = ν, that is, the word from the root to the node referenced by the suffix link that goes out from ν. The computation of the distance D simply requires to account separately for the frequency counts of either "color" in the generalized trie for the two input sequences. In summary, a procedure is readily set up for computing in linear time the contribution of all maximal words to the distance between sequences S1 and S2. The procedure builds a generalized suffix tree possibly truncated at some arbitrarily fixed length K. Each node of the trie contains information such as frequency, colors, edge length, and an id. The Score value (respectively, a(w) and b(w)) relative to S1 and S2 is computed at each node while D(S1, S2) is globally accumulated as the computation proceeds. This is further expanded at no extra cost to compute distances based on all shared maximal words, i.e., the words ending at branching nodes in the trie.

Non-maximal Words

Recall that for any word w terminating in the middle of an arc, its shortest extension w' reaching a branching node has exactly the same frequency as w. We will show now that it is entirely feasible to include in the count also all such non-maximal words without stretching the time complexity to quadratic. Finally, we will show that the words that do not occur in the sequences, but whose prefixes and suffixes do, can also be handled without penalty. Combined with the preceding discussion, this will lead to the following

Main Theorem The distance D resulting from the composition vectors relative to all words in two sequences can be computed in time and space linear in the input size.

Proof. The claim will be established by exhibiting the completion of our construction.

We consider the combined trie for both sequences and discuss first how the contribution of all words that do appear in the trie (refer to Expression 2) is computed. As seen earlier in the discussion, this is easy for words ending precisely at a node. Let then ν be a node reached by an edge with a label of length l > 1, and let ν1 ...νl-1be the unary nodes, numbered from ν toward the root, implicitly found on that edge. Let further μ be the branching node that is the parent of ν in the trie, ν ^ MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafqyVd4MbaKaaaaa@2D9D@ and μ ^ MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafqiVd0MbaKaaaaa@2D9B@ be nodes respectively reached by the suffix link from ν and μ, and make the simplifying assumption, to be later removed with no penalty, that there are no branching nodes between ν ^ MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafqyVd4MbaKaaaaa@2D9D@ and μ ^ MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafqiVd0MbaKaaaaa@2D9B@ . The contribution of ν, ν1, ..., νl-1is the sum of:

  • the contribution of ν, ν1, ..., νl-2; zero if l = 2

  • the contribution of νl-1

The second component is to be handled in the standard way. As for the first component, under our assumption, each Γ in the ratio of Expression 5 gets the value 1, as does the ratio itself. Hence the first component increases the terms a i b i MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWaaabqaeaacqWGHbqydaWgaaWcbaGaemyAaKgabeaakiabdkgaInaaBaaaleaacqWGPbqAaeqaaaqabeqaniabggHiLdaaaa@338E@ , a i 2 MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWaaabqaeaacqWGHbqydaqhaaWcbaGaemyAaKgabaGaeGOmaidaaaqabeqaniabggHiLdaaaa@31A3@ and b i 2 MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWaaabqaeaacqWGIbGydaqhaaWcbaGaemyAaKgabaGaeGOmaidaaaqabeqaniabggHiLdaaaa@31A5@ respectively by:

k = 2 l ..0 ( Λ k + d e p t h ( ν ) 1 ) × ( Λ k + d e p t h ( ν ) 1 ) MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWaaabuaeaacqGGOaakcqqHBoatdaWgaaWcbaGaem4AaSMaey4kaSIaemizaqMaemyzauMaemiCaaNaemiDaqNaemiAaGMaeiikaGIaeqyVd4MaeiykaKcabeaakiabgkHiTiabigdaXiabcMcaPaWcbaGaem4AaSMaeyypa0JaeGOmaiJaeyOeI0IaemiBaWMaeiOla4IaeiOla4IaeGimaadabeqdcqGHris5aOGaey41aqRaeiikaGIafu4MdWKbauaadaWgaaWcbaGaem4AaSMaey4kaSIaemizaqMaemyzauMaemiCaaNaemiDaqNaemiAaGMaeiikaGIaeqyVd4MaeiykaKcabeaakiabgkHiTiabigdaXiabcMcaPaaa@5C46@
(6)
k = 2 l ..0 ( Λ k + d e p t h ( ν ) 1 ) 2 MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWaaabuaeaacqGGOaakcqqHBoatdaWgaaWcbaGaem4AaSMaey4kaSIaemizaqMaemyzauMaemiCaaNaemiDaqNaemiAaGMaeiikaGIaeqyVd4MaeiykaKcabeaakiabgkHiTiabigdaXiabcMcaPmaaCaaaleqabaGaeGOmaidaaaqaaiabdUgaRjabg2da9iabikdaYiabgkHiTiabdYgaSjabc6caUiabc6caUiabicdaWaqab0GaeyyeIuoaaaa@4971@
(7)
k = 2 l ..0 ( Λ k + d e p t h ( ν ) 1 ) 2 MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaWaaabuaeaacqGGOaakcuqHBoatgaqbamaaBaaaleaacqWGRbWAcqGHRaWkcqWGKbazcqWGLbqzcqWGWbaCcqWG0baDcqWGObaAcqGGOaakcqaH9oGBcqGGPaqkaeqaaOGaeyOeI0IaeGymaeJaeiykaKYaaWbaaSqabeaacqaIYaGmaaaabaGaem4AaSMaeyypa0JaeGOmaiJaeyOeI0IaemiBaWMaeiOla4IaeiOla4IaeGimaadabeqdcqGHris5aaaa@497D@
(8)

where Λ k and Λ k MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafu4MdWKbauaadaWgaaWcbaGaem4AaSgabeaaaaa@2EE1@ denote the Λ function as applied to the first and second sequence, respectively, with varying k. We now introduce three vectors X, F and S, each of size equal to the maximum word length K, and with l th components (1 <lK) respectively defined as:

X ( l ) = i = 1 l ( Λ i 1 ) × ( Λ i 1 ) MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaemiwaGLaeiikaGIaemiBaWMaeiykaKIaeyypa0ZaaabCaeaacqGGOaakcqqHBoatdaWgaaWcbaGaemyAaKgabeaakiabgkHiTiabigdaXiabcMcaPiabgEna0kabcIcaOiqbfU5amzaafaWaaSbaaSqaaiabdMgaPbqabaGccqGHsislcqaIXaqmcqGGPaqkaSqaaiabdMgaPjabg2da9iabigdaXaqaaiabdYgaSbqdcqGHris5aaaa@47B6@
F ( l ) = i = 1 l ( Λ i 1 ) 2 MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaemOrayKaeiikaGIaemiBaWMaeiykaKIaeyypa0ZaaabCaeaacqGGOaakcqqHBoatdaWgaaWcbaGaemyAaKgabeaakiabgkHiTiabigdaXiabcMcaPmaaCaaaleqabaGaeGOmaidaaaqaaiabdMgaPjabg2da9iabigdaXaqaaiabdYgaSbqdcqGHris5aaaa@3FEE@
S ( l ) = l i = 1 ( Λ i 1 ) 2 MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGaem4uamLaeiikaGIaemiBaWMaeiykaKIaeyypa0ZaaabCaeaacqGGOaakcuqHBoatgaqbamaaBaaaleaacqWGPbqAaeqaaOGaeyOeI0IaeGymaeJaeiykaKYaaWbaaSqabeaacqaIYaGmaaaabaGaemiBaWgabaGaemyAaKMaeyypa0JaeGymaedaniabggHiLdaaaa@4014@

We have then

k = 2 l ..0 ( Λ k + d e p t h ( ν ) 1 ) × ( Λ k + d e p t h ( ν ) 1 ) = X [ d e p t h ( ν ) ] X [ d e p t h ( ν ) l ] MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@7C71@
(9)
k = 2 l ..0 ( Λ k + d e p t h ( ν ) 1 ) 2 = F [ d e p t h ( ν ) ] F [ d e p t h ( ν ) l ] MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@6973@
(10)
k = 2 l ..0 ( Λ k + d e p t h ( ν ) 1 ) 2 = S [ d e p t h ( ν ) ] S [ d e p t h ( ν ) l ] MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xI8qiVKYPFjYdHaVhbbf9v8qqaqFr0xc9vqFj0dXdbba91qpepeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=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@69B3@
(11)

where depth(ν) is the sum of the lengths of the labels on the path from the root to ν. The vectors X, F S can be computed once for all in time O(K) at the beginning of the execution since they depend only on K, L1 = |S1| and L2 = |S2|.

We claim now that removing the simplifying assumption that was made above is doable without penalty. As mentioned, the difficulty lies in the circumstance, that while every node ν with ν = aw has a suffix link defined to a node μ with μ = w, the converse is not necessarily true, i.e., there are nodes not reached by a suffix link for some or all of the characters of the alphabet. To handle this potential bottleneck, we introduce dummy unary nodes on each arc, in such a way that for any node μ, with μ = w, and a Σ, if aw is a word of the input without a proper locus in the trie, then a dummy node ν such that ν = aw will be injected into the trie to mark that locus, and a suffix link will be issued from ν to μ. With dummy nodes in place, the restriction in the above construction is levied, in the sense that if μ is the (possibly dummy) node that is the parent of ν in the trie, and ν ^ MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafqyVd4MbaKaaaaa@2D9D@ and μ ^ MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafqiVd0MbaKaaaaa@2D9B@ are the nodes respectively reached through the suffix link from ν and μ, then there are no nodes between ν ^ MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafqyVd4MbaKaaaaa@2D9D@ and μ ^ MathType@MTEF@5@5@+=feaagaart1ev2aaatCvAUfKttLearuWrP9MDH5MBPbIqV92AaeXatLxBI9gBaebbnrfifHhDYfgasaacPC6xNi=xH8viVGI8Gi=hEeeu0xXdbba9frFj0xb9qqpG0dXdb9aspeI8k8fiI+fsY=rqGqVepae9pg0db9vqaiVgFr0xfr=xfr=xc9adbaqaaeGaciGaaiaabeqaaeqabiWaaaGcbaGafqiVd0MbaKaaaaa@2D9B@ . The introduction of dummy nodes can be carried out in a post-processing of the trie that takes an overhead proportional to the overall number of nodes introduced. Consider each of the original arcs in the trie in some order. For each arc, following the suffix links from the terminal nodes identifies a path containing zero or more nodes, that can be scanned in time proportional to their number. Each such node invokes splitting of the arc under consideration by a dummy node, and the consequent setting of a suffix link to it. Knowing the length of the original arc label enables the identification of the split site and the subsequent relabeling of arcs. Thus all tasks are trivially accomplished in constant time. The number of dummy nodes inserted on account of any original node is bounded by the size of the alphabet, whence for finite alphabet this expansion of the trie takes linear time.

Chimeral Words

So far in our discussion, we neglected all cases where a(w) = -1 (f(w [1..k]) = 0 in Case 1 of Expression 2). Such chimeral words take the form w = avb, a, b Σ where av and vb occur in the input even though w does not. We can handle these words as part of the management of their infix v, thanks to the following easy property.

Property 1 For any a Σ, if v does not end at a branching node then neither av does.

This means that if v ends in the middle of an arc no work is needed: there cannot be any vb such that av and vb occur in the input while w does not! Hence v must end at a branching node, call it ν, and we are left with two cases, depending on whether av ends at a dummy or at an original branching node. In the first case, let c be the character following av on this path. We just need to add to the score the (-1) contribution of the branch of ν whose label begins by b. As is easily seen, every branch of ν except the one whose label begins by c similarly contribute at a rate of -1 each, whence subtracting one from the fan out of ν is all is needed to take into account all chimeral words induced by av and vb for some b Σ. Finally, let av terminate at a branching node μ. Clearly, every branch of μ is replicated in a branch of ν whose label begins by the same character. The only chimeral words can originate from branches of ν that are not replicas of corresponding ones for μ. The bare count of such excess branches yields the contribution of all chimeral words implicated by av and some vb.

This concludes the computation of the distance based on all words common to two sequences of total length L in optimal O(L) time and space.

Discussion

The various versions of the procedure have been implemented in combination with the PHYLIP's Neighbor-Joining package [21] and a web server has been predisposed for it at http://bcb.dei.unipd.it. An environment has been set up to carry out coordinated runs of experiments within each of the three main modes of operation described earlier. The first mode corresponds thus to distances involving only those common words of fixed length k that are found exactly at this depth on the frontier of the truncated trie. For any fixed K ≥ 3, the second set builds trees based on distances that include all words of length 3 ≤ kK ending at branching nodes in the truncated trie or at leaves of this trie that coincide with branching nodes of the full one. These latter words are interesting in that each one of them represents the longest extension of one of its own prefixes having the same occurrence count as that prefix (on a long edge, this makes the ratio f( parent(ν))/f(ν) = 1). Finally, the third mode builds trees derived from all subword distances for various maximum lengths. This set exposes the relationship of fixed-length versus all-subwords distances, as well as the influence of adding all subwords to the branching-node words. It thus enables one to study the influence on the inferred evolutionary trees of the distance computations based on different selections of word length and vocabulary composition. The analytical results obtained by any of these three methods are automatically given in input to Neighbor-Joining for tree construction and drawing.

By way of illustration, we report here classifications obtained for small sets consisting of 10 organisms under the three main settings, that correspond respectively to distances taking into account the composition of (1) only k-mers for a fixed value of k, (2) maximal k-mers for all values of k up to a fixed maximum value K, and (3) all k-mers of length k up to a fixed maximum value K.

Figure 1 shows results obtained with a set of "distant" species, which would be presumed to be strongly separable and in fact they were. The dataset consists of:

Figure 1
figure 1

Phylogenetic trees derived for small samples under various compositional distances.

2 Eukaryotes Schizosaccharomyces pombe (fSchpo) and Saccharomyces cerevisiae (gYeast)

4 Archea of which

• 2 Euryarchaeota: Pyrococcus furiosus (dPyrfu) and Pyrococcus hori-koshii (ePyrho)

• 2 Crenarchaeota: Sulfolobus solfataricus (hSulso) and Sulfolobus tokodaii (iSulto)

4 Bacteria of which

  • 3 Proteobacteria: Escherichia coli O157:H7 EDL933 (aEcoliE), Escherichia coli K12 (bEcoliK) and Shigella exneri 2a str. 301 (cShifl)

  • 1 Thermotogae: Thermotoga maritima (jThema)

The distance computations based on all k-mers is found to produce unreliable trees as soon as K > 7. At low level taxa, trees based on fixed-length k-mers and maximal k-mers are consistent, as they both correctly group together Eukaryotes, Proteobacteria, Euryarcheota and Crenarchaeota. However, at higher level taxa the distance based on maximal k-mers seems to be more stable. In fact, it groups Euryarcheota and Crenarchaeota in all cases, whereas with fixed-length k-mers this holds only for K ≤ 9. All methods fail grouping Thermotogae with Proteobacteria, a deficiency that might be attributable to the absence of other organisms from the dataset.

Continuing with our illustration, we consider a sample of "similar" organisms, composed of:

7 Firmicutes of which

• Clostridium acetobutylicum ATCC824 (Cloab) and Clostridium perfringens (Clope)

• Streptococcus agalactiae NEM316 (StragN) and Streptococcus agalactiae 2603 V/R (StragV)

• Bacillus subtilis (Bacsu) and Bacillus anthracis str. Ames (Bacan)

• Thermoanaerobacter tengcongensis (Thete)

1 Fuso Fusobacterium nucleatum ATCC 25586 (Fusnu)

1 Thermatogae Thermotoga maritima (Thema)

1 Aquificae Aquifex aeolicus (Aquae)

Some of the corresponding trees are displayed in Figure 2. The distance based on fixed length k-mers behaves poorly even in the low taxa for K > 7 as it fails to group Cloab and Clope, Thema and Aquae, and so on. The trees based on maximal words remain stable both in high and low taxa as K increases, even though for K > 6 it fails to group Cloab and Clope. The trees based on all words diverge for K > 7. To summarize this and few other limited experiences, the distance based on fixed length k-mers seems to perform well for moderate values of k. For larger values of k, however, it seems to loose stability with "distant" organisms, and resolution with "close" ones. Somewhat surprisingly, the trees based on all k-mers also appear to be unstable with increasing K. On the other hand, the distance based on maximal words seems to produce consistent and stable trees. We stress that the purpose of our examples is only to illustrate the potential use and versatility of the tool. A thorough analysis of large data sets such as those that are becoming increasingly available falls well beyond the scope of the present paper.

Figure 2
figure 2

Phylogenetic trees derived for small samples under various compositional distances. With a sample of "closer" species, some differences appear in the tree already for small values of k (top row): all fixed k-mers with k = 5, same as for k = 6 or 7 (left); maximal k-mers up to a maximum K = 5 (center); and all k-mers up to a maximum K = 5, same as for k = 6 or 7 (right). This is repeated with K = 15 in the second row, with K = 45 in the third row except for the middle entry set at K = 6 and K = 7, respectively, since trees then stabilize for higher K.

Conclusion

We presented fast and efficient tools for distance computations based on subword compositions as defined in [13]. This can be regarded as filling in part the gap between the rigid word length used in [13] and the shared-word length averaging of [14]. Our tools are also easily adapted to incorporate and subsume both of those approaches, thereby enabling the researcher to conduct a wide range of hypothesis testing on phylogeny and species relationships. The speedup achieved by such tools brings computations previously taking hours down to a couple of seconds. Our algorithms expand the roster of words that may partake in a distance measure, so as to include words of virtually unbounded length, thereby opening the way for the massive analysis of the future. By dithering with the three main modes of operation of our algorithm and the parameters k and K, it is possible to fine tune the selectivity and sensitivity of the method. The identification of the settings that are best suited to separate and classify each particular collection might be, per se, highly informative. Our tools can be deployed in the framework of phylogenetic tree reconstruction, but also in a much broader and growing spectrum of applications calling for subword analysis on a genomic scale.

Note

A preliminary version of this paper formed the subject of a Keynote delivered at the IEEE Information Theory Workshop held in Porto, Portugal, on May 5–8, 2008.

References

  1. von Mises R: Probability, Statistics and Truth. MacMillan. 1939

    Google Scholar 

  2. Brillouin L: Science and Information Theory. 1971, Academic Press

    Google Scholar 

  3. Kolmogorov A: Three approaches to the quantitative definition of information. Problemi Pederachi Inf. 1965, 1:

    Google Scholar 

  4. Lempel A, Ziv J: On the complexity of finite sequences. IEEE Transactions on Information Theory. 1976, 22: 75-81. 10.1109/TIT.1976.1055501.

    Article  Google Scholar 

  5. Cover TM, Thomas JA: Elements of Information Theory. 1991, Wiley-Interscience

    Book  Google Scholar 

  6. Blaidsell B: A measure of the similarity of sets of sequences not requiring sequence alignment. Proceedings of the National Academy of Sciences. 1986, 5155-5159.

    Google Scholar 

  7. Edgar R: Local homology recognition and distance measures in linear time using compressed amino-acid alphabets. Nucleic Acids Res. 2004, 32 (1): 380-385.

    Article  PubMed  CAS  PubMed Central  Google Scholar 

  8. Ferragina P, Giancarlo R, Greco V, Manzini G, Valiente G: Compression-based classification of biological sequences and structures via the Universal Similarity Metric: experimental assessment. BMC Bioinformatics. 2007, 8: 252-272.

    Article  PubMed  PubMed Central  Google Scholar 

  9. Hao B, Qi J: Procaryote phylogeny without sequence alignment: from avoidance singature to composition distance. Journal of Bioinformatics and Computational Biology. 2004, 2: 1-19. 10.1142/S0219720004000442.

    Article  PubMed  CAS  Google Scholar 

  10. Höhl M, Rigutsos I, Ragan MA: Pattern-based phylogenetic distance estimation and tree recosntruction. Evolutionary Bioinformatics Online. 2006, 2: 357-373.

    Google Scholar 

  11. Li M, Chen X, Li X, Ma B, Vitányi P: The similarity metric. IEEE Transactions on Information Theory. 2004, 50:12: 3250-3264. 10.1109/TIT.2004.838101.

    Article  Google Scholar 

  12. Otu H, Sayood K: A new sequence distance measure for phylogenetic tree reconstruction. Bioinformatics. 2003, 19: 2122-2130.

    Article  PubMed  CAS  Google Scholar 

  13. Qi J, Wang B, Hao B: Whole proteome prokaryote phylogeny without sequence alignment: A k-string composition approach. Molecular Evolution. 2004, 58 (1): 1-11. 10.1007/s00239-003-2493-7.

    Article  CAS  Google Scholar 

  14. Ulitsky I, Burstein D, Tuller T, Chor B: The average common substring approach to phylogenetic reconstruction. Journal of Computational Biology. 2006, 13 (2): 336-350. 10.1089/cmb.2006.13.336

    Article  PubMed  CAS  Google Scholar 

  15. Vinga S, Almeida J: Alignment-free sequence comparison – a review. Bioinformatics. 2004, 20: 206-215.

    Article  PubMed  CAS  Google Scholar 

  16. Helden JV: Metrics for comparing regulatory sequences on the basis of pattern counts. Bioinformatics. 2004, 20: 399-406. 10.1093/bioinformatics/btg425

    Article  PubMed  Google Scholar 

  17. Wu TJ, Bruke J, Davison D: A measure of dna dissimilarity based on the mahalanobis distance between frequencies of words. Biometrics. 1997, 53: 1431-1439. 10.2307/2533509

    Article  PubMed  CAS  Google Scholar 

  18. Gatlin LL: Information Theory and the Living System. 1972, Columbia University Press

    Google Scholar 

  19. Apostolico A: The myriad virtues of suffix trees. Combinatorial Algorithms on words. Edited by: Apostolico A, Galil Z. 1985, 85-96. Berlin: Springer-Verlang

    Chapter  Google Scholar 

  20. Na J, Apostolico A, Iliopoulos CS, Park K: Truncated suffix trees and their application to data compression. Theoretical Computer Science. 2003, 304: 87-101. 10.1016/S0304-3975(03)00053-7.

    Article  Google Scholar 

  21. PHYLIP, a free package of programs for inferring phylogenies. http://evolution.genetics.washington.edu/phylip.html

Download references

Acknowledgements

Work Supported in part by the Italian Ministry of University and Research under the Bi-National Project FIRB RBIN04BYZ7, and by the Research Program of Georgia Tech. The authors are indebted to A. Dress and B. Hao for inspiration and discussions that led to many insights.

Author information

Authors and Affiliations

Authors

Corresponding authors

Correspondence to Alberto Apostolico or Olgert Denas.

Authors’ original submitted files for images

Below are the links to the authors’ original submitted files for images.

Authors’ original file for figure 1

Authors’ original file for figure 2

Rights and permissions

This article is published under license to BioMed Central Ltd. This is an Open Access article distributed under the terms of the Creative Commons Attribution License (http://creativecommons.org/licenses/by/2.0), which permits unrestricted use, distribution, and reproduction in any medium, provided the original work is properly cited.

Reprints and permissions

About this article

Cite this article

Apostolico, A., Denas, O. Fast algorithms for computing sequence distances by exhaustive substring composition. Algorithms Mol Biol 3, 13 (2008). https://doi.org/10.1186/1748-7188-3-13

Download citation

  • Received:

  • Accepted:

  • Published:

  • DOI: https://doi.org/10.1186/1748-7188-3-13

Keywords