Minimization of symbolic automata
L D'Antoni, M Veanes - Proceedings of the 41st ACM SIGPLAN-SIGACT …, 2014 - dl.acm.org
Symbolic Automata extend classical automata by using symbolic alphabets instead of finite
ones. Most of the classical automata algorithms rely on the alphabet being finite, and …
ones. Most of the classical automata algorithms rely on the alphabet being finite, and …
[图书][B] Finite-state machine construction methods and algorithms for phonology and morphology
M Hulden - 2009 - search.proquest.com
This dissertation is concerned with finite state machine-based technology for modeling
natural language. Finite-state machines have proven to be efficient computational devices in …
natural language. Finite-state machines have proven to be efficient computational devices in …
ZIDS: a privacy-preserving intrusion detection system using secure two-party computation protocols
We introduce ZIDS, a client-server solution for private detection of intrusions that is suitable
for private detection of zero-day attacks in input data. The system includes an intrusion …
for private detection of zero-day attacks in input data. The system includes an intrusion …
FPGA-CPU Architecture Accelerated Regular Expression Matching With Fast Preprocessing
J Zhong, S Chen, B Han - The Computer Journal, 2023 - academic.oup.com
Abstract Regular Expression Matching (REM) is the core of Deep Packet Inspection (DPI),
which is important for various network security applications. The burgeoning Software …
which is important for various network security applications. The burgeoning Software …
[PDF][PDF] On the performance of automata minimization algorithms
Apart from the theoretical worst-case running time analysis not much is known about the
average-case analysis or practical performance of finite automata minimization algorithms …
average-case analysis or practical performance of finite automata minimization algorithms …
Incremental Dead State Detection in Logarithmic Time
C Stanford, M Veanes - International Conference on Computer Aided …, 2023 - Springer
Identifying live and dead states in an abstract transition system is a recurring problem in
formal verification; for example, it arises in our recent work on efficiently deciding regex …
formal verification; for example, it arises in our recent work on efficiently deciding regex …
NFA reduction algorithms by means of regular inequalities
JM Champarnaud, F Coulon - Theoretical Computer Science, 2004 - Elsevier
We present different techniques for reducing the number of states and transitions in
nondeterministic automata. These techniques are based on the two preorders over the set of …
nondeterministic automata. These techniques are based on the two preorders over the set of …
[图书][B] Constructing minimal acyclic deterministic finite automata
BW Watson - 2010 - search.proquest.com
This thesis is submitted in partial fulfillment of the requirements for the degree of Doctor of
Philosophy (Ph. D) in the FASTAR group of the Department of Computer Science, University …
Philosophy (Ph. D) in the FASTAR group of the Department of Computer Science, University …
[PDF][PDF] Minimization of Acyclic DFAs.
J Bubenzer - Stringology, 2011 - stringology.org
There exists a linear time algorithm for the minimization of acyclic deterministic finite-state
automata (ADFA) due to Dominique Revuz [17]. The algorithm has different phases …
automata (ADFA) due to Dominique Revuz [17]. The algorithm has different phases …
Quick Subset Construction
M Dusi, G Lamperti - Software: Practice and Experience, 2023 - Wiley Online Library
A finite automaton can be either deterministic (DFA) or nondeterministic (NFA). An
automaton‐based task is in general more efficient when performed with a DFA rather than …
automaton‐based task is in general more efficient when performed with a DFA rather than …