Results 231 to 240 of about 51,114 (288)

Representation of a Regular Language By Means of a Finite Deterministic Automaton

open access: yesRepresentation of a Regular Language By Means of a Finite Deterministic Automaton
openaire  

A Compact and Secure Access Control Solution Based on a Deterministic Finite Automaton

open access: closed2023 International Conference Automatics and Informatics (ICAI), 2023
Access control systems are critical in ensuring the security of various facilities, ranging from residential buildings to corporate offices and government institutions.
Akbota Kulzhanova   +4 more
semanticscholar   +3 more sources

A regular expression matching using non-deterministic finite automaton

open access: closedEighth ACM/IEEE International Conference on Formal Methods and Models for Codesign (MEMOCODE 2010), 2010
This paper shows an implementation of CANSCID (Combined Architecture for Stream Categorization and Intrusion Detection). To satisfy the required system throughput, the packet assembler and the regular expression matching are implemented by the dedicated hardware. On the other hand, the counting of matching results and the system control are implemented
Hiroki Nakahara   +2 more
semanticscholar   +3 more sources

A Parallel Aho-Corasick Algorithm with Non-deterministic Finite Automaton Based on OpenMP

open access: closed2015 Seventh International Conference on Advanced Communication and Networking (ACN), 2015
Existing typical algorithms of string matching are too difficult for taking advantage of multicore platforms. OpenMP (Open Multi-Processing) supports multiprocessing application programming interface with shared memory. We introduce a parallel Aho-Corasick algorithm based on OpenMP for shared memory, which exploits the non-deterministic finite ...
Jiaxing Qu   +5 more
semanticscholar   +3 more sources

A Deterministic Finite Automaton for Faster Protein Hit Detection in BLAST

Journal of Computational Biology, 2006
BLAST is the most popular bioinformatics tool and is used to run millions of queries each day. However, evaluating such queries is slow, taking typically minutes on modern workstations. Therefore, continuing evolution of BLAST--by improving its algorithms and optimizations--is essential to improve search times in the face of exponentially increasing ...
Michael, Cameron   +2 more
openaire   +3 more sources

Deterministic Finite Automaton for scalable traffic identification: The power of compressing by range

2012 IEEE Network Operations and Management Symposium, 2012
Deep Packet Inspection (DPI) systems have been becoming an important element in traffic measurement ever since port-based classification was deemed no longer appropriate, due to protocol tunneling and misuses of well-defined ports. Current DPI systems express application signatures using regular expressions and it is usual to perform pattern matching ...
R. Antonello   +4 more
openaire   +2 more sources

Model reformulation for conflict-free routing problems using Petri Net and Deterministic Finite Automaton

Artificial Life and Robotics, 2015
It is well known that routing problems are recast as a binary integer linear programming in overhead hoist transport (OHT) vehicle systems. Two kinds of discrete-time state space models of the routing problem are proposed in this paper that simplifies the constraints and binary variables.
Ryosuke Nakamura   +4 more
openaire   +2 more sources

The Minimal Deterministic Finite-State Automaton for a Finite Language

Finite-State Techniques, 2019
A fundamental task in natural language processing is the efficient representation of lexica. From a computational viewpoint, lexica need to be represented in a way directly supporting fast access to entries, and minimizing space requirements. A standard method is to represent lexica as minimal deterministic (classical) finite-state automata.
openaire   +2 more sources

Methodology for Fast Pattern Matching by Deterministic Finite Automaton with Perfect Hashing

2009 12th Euromicro Conference on Digital System Design, Architectures, Methods and Tools, 2009
As the speed of current computer networks increases, it is necessary to protect networks by security systems such as firewalls and Intrusion Detection Systems operating at multigigabit speeds. Pattern matching is the time-critical operation of current IDS on multigigabit networks.
Jan Kastil, Jan Korenek, Ondrej Lengal
openaire   +2 more sources

Home - About - Disclaimer - Privacy