Results 31 to 40 of about 1,192,191 (268)
A multi-pattern hash-binary hybrid algorithm for URL matching in the HTTP protocol. [PDF]
In this paper, based on our previous multi-pattern uniform resource locator (URL) binary-matching algorithm called HEM, we propose an improved multi-pattern matching algorithm called MH that is based on hash tables and binary tables. The MH algorithm can
Ping Zeng +7 more
doaj +1 more source
Efficient Online Timed Pattern Matching by Automata-Based Skipping
The timed pattern matching problem is an actively studied topic because of its relevance in monitoring of real-time systems. There one is given a log $w$ and a specification $\mathcal{A}$ (given by a timed word and a timed automaton in this paper), and ...
A Kane +22 more
core +1 more source
NETASPNO: Approximate Strict Pattern Matching Under Nonoverlapping Condition
In pattern matching, a gap constraint is a more flexible wildcard than traditional wildcards “?”and “*”. Pattern matching with gap constraints is more difficult to handle and fulfills user's enquiries more easily.
Youxi Wu +4 more
doaj +1 more source
MatchPy: A Pattern Matching Library
Pattern matching is a powerful tool for symbolic computations, based on the well-defined theory of term rewriting systems. Application domains include algebraic expressions, abstract syntax trees, and XML and JSON data.
Barthels, Henrik +2 more
core +1 more source
Study on Pattern Matching in Network Security
Pattern matching is the core module in network security system,it's the highest occupancy rate of system resources is more than 70%.According to problem and challenges of pattern matching in the network security system,taking 2000 as the boundary,the ...
Dongliang Xu +3 more
doaj +2 more sources
A Boyer-Moore Type Algorithm for Timed Pattern Matching
The timed pattern matching problem is formulated by Ulus et al. and has been actively studied since, with its evident application in monitoring real-time systems.
Akazaki, Takumi +2 more
core +1 more source
Bear management changes management actions according to the horizontal axis of the population size and the vertical axis of the number of nuisance bears. Aiming for the target population size of Ntar, Actions I and II protect the bears, and Action IV reduces the population.
Hiroyuki Matsuda +5 more
wiley +1 more source
Contactless Material Tensile Testing Using a High-Resolution Camera
This article deals with the use of contactless measurement with a high-resolution imaging device during tensile testing of materials in a universal tearing machine (UTM).
Jaroslav Bulava +2 more
doaj +1 more source
From omics to AI—mapping the pathogenic pathways in type 2 diabetes
Integrating multi‐omics data with AI‐based modelling (unsupervised and supervised machine learning) identify optimal patient clusters, informing AI‐driven accurate risk stratification. Digital twins simulate individual trajectories in real time, guiding precision medicine by matching patients to targeted therapies.
Siobhán O'Sullivan +2 more
wiley +1 more source
Point Pattern Matching Algorithm for Planar Point Sets under Euclidean Transform
Point pattern matching is an important topic of computer vision and pattern recognition. In this paper, we propose a point pattern matching algorithm for two planar point sets under Euclidean transform.
Xiaoyun Wang, Xianquan Zhang
doaj +1 more source

