XFA: Faster signature matching with extended automata

R Smith, C Estan, S Jha - … on Security and Privacy (sp 2008), 2008 - ieeexplore.ieee.org
Automata-based representations and related algorithms have been applied to address
several problems in information security, and often the automata had to be augmented with …

Time-space trade-off lower bounds for randomized computation of decision problems

P Beame, M Saks, X Sun, E Vee - Journal of the ACM (JACM), 2003 - dl.acm.org
We prove the first time-space lower bound trade-offs for randomized computation of decision
problems. The bounds hold even in the case that the computation is allowed to have …

Time–space tradeoffs for branching programs

P Beame, TS Jayram, M Saks - Journal of Computer and System Sciences, 2001 - Elsevier
We obtain the first non-trivial time–space tradeoff lower bound for functions f:{0, 1} n→{0, 1}
on general branching programs by exhibiting a Boolean function f that requires exponential …

Algorithms and resource requirements for fundamental problems

RR Williams - 2007 - search.proquest.com
We establish more efficient methods for solving interesting classes of NP-hard problems
exactly, as well as methods for proving limitations on how quickly those and other problems …

Time-space tradeoffs for counting NP solutions modulo integers

RR Williams - Computational Complexity, 2008 - Springer
We prove the first time-space tradeoffs for counting the number of solutions to an NP
problem modulo small integers, and also improve upon known time-space tradeoffs for S at …

Time-space tradeoffs for branching programs

P Beame, M Saks, JS Thathachar - Proceedings 39th Annual …, 1998 - ieeexplore.ieee.org
We obtain the first non-trivial time-space tradeoff lower bound for functions f:{0, 1}/sup n//spl
rarr/{0, 1} on general branching programs by exhibiting a Boolean function f that requires …

[PDF][PDF] On separating the read-k-times branching program hierarchy

JS Thathachar - Proceedings of the thirtieth annual ACM symposium on …, 1998 - dl.acm.org
WC obtain an exponential separation between consecutive levels in the hierarchy of classes
of functions computable by syntactic read-k-times branching programs of polynomial size, for …

Fast signature matching using extended finite automaton (XFA)

R Smith, C Estan, S Jha, I Siahaan - Information Systems Security: 4th …, 2008 - Springer
Abstract Automata-based representations and related algorithms have been applied to
address several problems in information security, and often the automata had to be …

Identification of gait parameters from silhouette images

C Prakash, A Mittal, R Kumar… - 2015 Eighth international …, 2015 - ieeexplore.ieee.org
Gait analysis has applications not only in medical, rehabilitation and sports, but it can also
play a decisive role in security and surveillance as a behavioral biometric factor. This paper …

Super-linear time-space tradeoff lower bounds for randomized computation

P Beame, M Saks, X Sun, E Vee - Proceedings 41st Annual …, 2000 - ieeexplore.ieee.org
We prove the first time-space lower bound tradeoffs for randomized computation of decision
problems. The bounds hold even in the case that the computation is allowed to have …