I would like to thank my parents and sister for their support while writing this dissertation. I would also like to thank my supervisors for their valuable input, and Loek Cleophas, who read my dissertation and article. In this study, the regular expressions forming abstract states in Brzozowski’s algorithm are not remapped to sequential state transition table addresses as would be the case in the classical approach, but are hashed to integers. Two regular expressions that are hashed to the same hash code are assigned the same integer address in the state transition table, reducing the number of states in the automaton. This reduction does not necessarily lead to the construction of a minimal automa-ton: no restrictions are placed on the ha...
Abstract-As the speed of current computer networks increases, it is necessary to protect networks by...
AbstractWe consider the use of state elimination to construct shorter regular expressions from finit...
deterministic Finite Automatons (NFAs) are two typical automa-tons used in the Network Intrusion Det...
Abstract. In [7], a new version of Brzozowski’s algorithm was put forward which re-lies on regular e...
AbstractThe main theorem allows an elegant algorithm to be refined into an efficient one. The elegan...
Derivatives of regular expressions were first introduced by Brzozowski in [1]. By recursively comput...
Derivatives of regular expressions were first introduced by Brzozowski in [1]. By recursively comput...
The thesis explains several algorithms for pattern matching. Algorithms work in both software and ha...
The equivalence of finite automata and regular expressions dates back to the seminal paper of Kleene...
The aim of the paper is to concoct a novel algorithm for the metamorphosis of parallel regular expre...
We consider conversions of regular expressions into k-realtime finite state automata, i.e., automata...
Regular languages are one of the oldest, well-known topics in formal language theory. Indeed, it has...
We introduce a new technique for constructing a finite state deter-ministic automaton from a regular...
Recently, the problem of obtaining a short regular expression equivalent to a given finite automaton...
This paper presents a new method to translate a regular expression into a nondeterministic finite au...
Abstract-As the speed of current computer networks increases, it is necessary to protect networks by...
AbstractWe consider the use of state elimination to construct shorter regular expressions from finit...
deterministic Finite Automatons (NFAs) are two typical automa-tons used in the Network Intrusion Det...
Abstract. In [7], a new version of Brzozowski’s algorithm was put forward which re-lies on regular e...
AbstractThe main theorem allows an elegant algorithm to be refined into an efficient one. The elegan...
Derivatives of regular expressions were first introduced by Brzozowski in [1]. By recursively comput...
Derivatives of regular expressions were first introduced by Brzozowski in [1]. By recursively comput...
The thesis explains several algorithms for pattern matching. Algorithms work in both software and ha...
The equivalence of finite automata and regular expressions dates back to the seminal paper of Kleene...
The aim of the paper is to concoct a novel algorithm for the metamorphosis of parallel regular expre...
We consider conversions of regular expressions into k-realtime finite state automata, i.e., automata...
Regular languages are one of the oldest, well-known topics in formal language theory. Indeed, it has...
We introduce a new technique for constructing a finite state deter-ministic automaton from a regular...
Recently, the problem of obtaining a short regular expression equivalent to a given finite automaton...
This paper presents a new method to translate a regular expression into a nondeterministic finite au...
Abstract-As the speed of current computer networks increases, it is necessary to protect networks by...
AbstractWe consider the use of state elimination to construct shorter regular expressions from finit...
deterministic Finite Automatons (NFAs) are two typical automa-tons used in the Network Intrusion Det...