XFA: Faster signature matching with extended automata
R Smith, C Estan, S Jha - … on Security and Privacy (sp 2008), 2008 - ieeexplore.ieee.org
Automata-based representations and related algorithms have been applied to address
several problems in information security, and often the automata had to be augmented with …
several problems in information security, and often the automata had to be augmented with …
Time-space trade-off lower bounds for randomized computation of decision problems
We prove the first time-space lower bound trade-offs for randomized computation of decision
problems. The bounds hold even in the case that the computation is allowed to have …
problems. The bounds hold even in the case that the computation is allowed to have …
Time–space tradeoffs for branching programs
We obtain the first non-trivial time–space tradeoff lower bound for functions f:{0, 1} n→{0, 1}
on general branching programs by exhibiting a Boolean function f that requires exponential …
on general branching programs by exhibiting a Boolean function f that requires exponential …
Algorithms and resource requirements for fundamental problems
RR Williams - 2007 - search.proquest.com
We establish more efficient methods for solving interesting classes of NP-hard problems
exactly, as well as methods for proving limitations on how quickly those and other problems …
exactly, as well as methods for proving limitations on how quickly those and other problems …
Time-space tradeoffs for counting NP solutions modulo integers
RR Williams - Computational Complexity, 2008 - Springer
We prove the first time-space tradeoffs for counting the number of solutions to an NP
problem modulo small integers, and also improve upon known time-space tradeoffs for S at …
problem modulo small integers, and also improve upon known time-space tradeoffs for S at …
Time-space tradeoffs for branching programs
We obtain the first non-trivial time-space tradeoff lower bound for functions f:{0, 1}/sup n//spl
rarr/{0, 1} on general branching programs by exhibiting a Boolean function f that requires …
rarr/{0, 1} on general branching programs by exhibiting a Boolean function f that requires …
[PDF][PDF] On separating the read-k-times branching program hierarchy
JS Thathachar - Proceedings of the thirtieth annual ACM symposium on …, 1998 - dl.acm.org
WC obtain an exponential separation between consecutive levels in the hierarchy of classes
of functions computable by syntactic read-k-times branching programs of polynomial size, for …
of functions computable by syntactic read-k-times branching programs of polynomial size, for …
Fast signature matching using extended finite automaton (XFA)
Abstract Automata-based representations and related algorithms have been applied to
address several problems in information security, and often the automata had to be …
address several problems in information security, and often the automata had to be …
Identification of gait parameters from silhouette images
Gait analysis has applications not only in medical, rehabilitation and sports, but it can also
play a decisive role in security and surveillance as a behavioral biometric factor. This paper …
play a decisive role in security and surveillance as a behavioral biometric factor. This paper …
Super-linear time-space tradeoff lower bounds for randomized computation
We prove the first time-space lower bound tradeoffs for randomized computation of decision
problems. The bounds hold even in the case that the computation is allowed to have …
problems. The bounds hold even in the case that the computation is allowed to have …