Nothing Special   »   [go: up one dir, main page]

skip to main content
Skip header Section
An Introduction to Formal Language and AutomataFebruary 2006
Publisher:
  • Jones and Bartlett Publishers, Inc.
  • Sudbury, MA
  • United States
ISBN:978-0-7637-3798-6
Published:01 February 2006
Skip Bibliometrics Section
Reflects downloads up to 25 Nov 2024Bibliometrics
Abstract

No abstract available.

Cited By

  1. Azmi A, Al-Qabbany A and Hussain A (2019). Computational and natural language processing based studies of hadith literature, Artificial Intelligence Review, 52:2, (1369-1414), Online publication date: 1-Aug-2019.
  2. Kjos-Hanssen B and Liu L The Number of Languages with Maximum State Complexity Theory and Applications of Models of Computation, (394-409)
  3. Tarantsova P and Kalenkova A Constructing Regular Expressions from Real-Life Event Logs Analysis of Images, Social Networks and Texts, (274-280)
  4. ACM
    Lee M, So S and Oh H (2016). Synthesizing regular expressions from examples for introductory automata assignments, ACM SIGPLAN Notices, 52:3, (70-80), Online publication date: 12-May-2017.
  5. ACM
    Lee M, So S and Oh H Synthesizing regular expressions from examples for introductory automata assignments Proceedings of the 2016 ACM SIGPLAN International Conference on Generative Programming: Concepts and Experiences, (70-80)
  6. Mohamad Zulkufli N, Turaev S, Mohd Tamrin M and Messikh A (2016). Generative Power and Closure Properties of Watson-Crick Grammars, Applied Computational Intelligence and Soft Computing, 2016, (1), Online publication date: 1-Aug-2016.
  7. Molina-Lozano H A fast fuzzy Cocke-Younger-Kasami algorithm for DNA and RNA strings analysis Proceedings of the 9th Mexican international conference on Artificial intelligence conference on Advances in soft computing: Part II, (80-91)
  8. Tokhtabayev A, Skormin V and Dolgikh A Expressive, efficient and obfuscation resilient behavior based IDS Proceedings of the 15th European conference on Research in computer security, (698-715)
  9. ACM
    Rodger S, Wiebe E, Lee K, Morgan C, Omar K and Su J (2009). Increasing engagement in automata theory with JFLAP, ACM SIGCSE Bulletin, 41:1, (403-407), Online publication date: 4-Mar-2009.
  10. ACM
    Rodger S, Wiebe E, Lee K, Morgan C, Omar K and Su J Increasing engagement in automata theory with JFLAP Proceedings of the 40th ACM technical symposium on Computer science education, (403-407)
  11. Liu G, Martin-Vide C, Salomaa A and Yu S (2008). State complexity of basic language operations combined with reversal, Information and Computation, 206:9-10, (1178-1186), Online publication date: 1-Sep-2008.
  12. Jarvis J and Lucas J (2008). Understanding the Universal Turing Machine, Journal of Computing Sciences in Colleges, 23:5, (180-188), Online publication date: 1-May-2008.
  13. ACM
    Lucas J and Jarvis J Incorporating transformations into jflap for enhanced understanding of automata Proceedings of the 39th SIGCSE technical symposium on Computer science education, (14-18)
  14. ACM
    Lucas J and Jarvis J (2008). Incorporating transformations into jflap for enhanced understanding of automata, ACM SIGCSE Bulletin, 40:1, (14-18), Online publication date: 29-Feb-2008.
  15. ACM
    Blanco Arbe J, Ortega A and Mártinez-Conde J (2007). Formal languages through web forms and regular expressions, ACM SIGCSE Bulletin, 39:4, (100-104), Online publication date: 1-Dec-2007.
  16. ACM
    Naidoo A and Pillay N Evolving pushdown automata Proceedings of the 2007 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries, (83-90)
  17. ACM
    Rodger S, Lim J and Reading S (2007). Increasing interaction and support in the formal languages and automata theory course, ACM SIGCSE Bulletin, 39:3, (58-62), Online publication date: 25-Jun-2007.
  18. ACM
    Rodger S, Lim J and Reading S Increasing interaction and support in the formal languages and automata theory course Proceedings of the 12th annual SIGCSE conference on Innovation and technology in computer science education, (58-62)
  19. Mahoney W and Sousan W Instrumentation of open-source software for intrusion detection Proceedings of the 7th international conference on Runtime verification, (151-163)
Contributors
  • University of California, Davis

Reviews

Robert Stewart Roos

The latest edition of Linz’s theory textbook follows the same outline as the previous one: it begins with a chapter on mathematical preliminaries; moves through the Chomsky hierarchy (regular, context-free, and recursively enumerable languages, with a brief mention of context-sensitive languages); and concludes with one chapter each on the topics of undecidability, alternate models of computation, and complexity classes. The presentation is fairly conventional: introduce the new concept, give formal definitions, provide examples, give mathematical justifications (usually complete proofs, although some proofs are omitted or given in outline only), and end with a set of exercises. Solutions to some of the exercises appear in the appendix. While such an approach tends to be a bit dry, it is fine for instructors who are accustomed to this format, and who can infuse the material with sufficient excitement and enthusiasm. The presentation is fairly straightforward and readable, especially for what is essentially a mathematics text. The author identifies the book’s intended audience as sophomore or junior computer science/computer engineering students, with some background in programming, data structures, and discrete mathematics. For students likely to pursue more advanced study in theoretical topics, the presentation is appropriate; for students who are more inclined to pursue software development or other applications, the motivation for some topics is lacking. To take just one example, Linz mentions the vi editor as a program that uses regular operators. Perhaps students would be more pleased to learn about the existence of regular expression packages in scripting languages such as Perl and Python, or would appreciate seeing examples of the Unix grep command for file searching. More than anything else, the book needs to provide readers with a broader framework that naturally motivates the many topics covered. Instructors looking for a general reference on automata and formal languages, or a textbook for a mathematically sophisticated audience, should take note that Linz’s book lacks a comprehensive bibliography (the one-page list of references consists primarily of other theory textbooks). Purists might complain about the absence of the Myhill-Nerode theorem in the optional section on state minimization of finite automata. There is nothing about Ogden’s lemma, Moore versus Mealy machines, and a number of other topics that used to be standard in texts on the theory of computation. Cook’s theorem is stated, but not proved. These observations should not be taken as criticisms of the book’s suitability as an introductory text, but are aimed at readers looking for a more comprehensive treatment of the theory of computation. Overall, the work is appropriate for the author’s stated purpose: a textbook for an introductory undergraduate course on the theory of computation—provided that the students have sufficient mathematical preparation. Online Computing Reviews Service

Access critical reviews of Computing literature here

Become a reviewer for Computing Reviews.

Please enable JavaScript to view thecomments powered by Disqus.

Recommendations