Nothing Special   »   [go: up one dir, main page]

skip to main content
Skip header Section
Introduction to Automata Theory, Languages and ComputabilityNovember 2000
Publisher:
  • Addison-Wesley Longman Publishing Co., Inc.
  • 75 Arlington Street, Suite 300 Boston, MA
  • United States
ISBN:978-0-201-44124-6
Published:01 November 2000
Pages:
521
Skip Bibliometrics Section
Reflects downloads up to 21 Nov 2024Bibliometrics
Abstract

No abstract available.

Cited By

  1. Wang Q and Ying M (2024). Quantum Algorithm for Lexicographically Minimal String Rotation, Theory of Computing Systems, 68:1, (29-74), Online publication date: 1-Feb-2024.
  2. Malik R, Mohajerani S and Fabian M (2023). A survey on compositional algorithms for verification and synthesis in supervisory control, Discrete Event Dynamic Systems, 33:3, (279-340), Online publication date: 1-Sep-2023.
  3. Fujioka K (2022). On the computational power of swarm automata using agents with position information, Natural Computing: an international journal, 21:4, (605-614), Online publication date: 1-Dec-2022.
  4. Moisl H (2022). Dynamical Systems Implementation of Intrinsic Sentence Meaning, Minds and Machines, 32:4, (627-653), Online publication date: 1-Dec-2022.
  5. Liu J, Xiao Y, Wang H and Wang W Extending Visibly Pushdown Automata over Multi-matching Nested Relations Structured Object-Oriented Formal Language and Method, (59-69)
  6. Geffert V, Pališínová D and Szabari A State Complexity of Binary Coded Regular Languages Descriptional Complexity of Formal Systems, (72-84)
  7. Dassow J and Jecker I (2022). Operational complexity and pumping lemmas, Acta Informatica, 59:4, (337-355), Online publication date: 1-Aug-2022.
  8. Kölbl M, Leue S and Wies T (2021). Automated repair for timed systems, Formal Methods in System Design, 59:1-3, (136-169), Online publication date: 1-Dec-2021.
  9. Geffert V, Kapoutsis C and Zakzok M (2021). Complement for two-way alternating automata, Acta Informatica, 58:5, (463-495), Online publication date: 1-Oct-2021.
  10. Farooqui A, Hagebring F and Fabian M MIDES: A Tool for Supervisor Synthesis via Active Learning 2021 IEEE 17th International Conference on Automation Science and Engineering (CASE), (792-797)
  11. Jakobi S, Meckel K, Mereghetti C and Palano B (2021). The descriptional power of queue automata of constant length, Acta Informatica, 58:4, (335-356), Online publication date: 1-Aug-2021.
  12. Chatterjee S, Kesarwani M, Modi J, Mukherjee S, Parshuram Puria S and Shah A (2021). Secure and efficient wildcard search over encrypted data, International Journal of Information Security, 20:2, (199-244), Online publication date: 1-Apr-2021.
  13. Finkel O and Lecomte D (2021). Some complete -powers of a one-counter language, for any Borel class of finite rank, Archive for Mathematical Logic, 60:1-2, (161-187), Online publication date: 1-Feb-2021.
  14. Laurini M, Consolini L and Locatelli M Fast numerical solution of optimal control problems for switched systems: An application to path planning 2020 59th IEEE Conference on Decision and Control (CDC), (4105-4110)
  15. Liu J, Duan Z and Tian C Transforming Multi-matching Nested Traceable Automata to Multi-matching Nested Expressions Combinatorial Optimization and Applications, (320-333)
  16. Costa V and Bedregal B (2020). On typical hesitant fuzzy automata, Soft Computing - A Fusion of Foundations, Methodologies and Applications, 24:12, (8725-8736), Online publication date: 1-Jun-2020.
  17. Li Y, Mou X and Chen H Learning k-Occurrence Regular Expressions from Positive and Negative Samples Conceptual Modeling, (264-272)
  18. Fellah A and Bandi A (2020). Learning language equations and regular languages using alternating finite automata, Journal of Computing Sciences in Colleges, 35:2, (19-28), Online publication date: 1-Oct-2019.
  19. Martinez E, Laguna G, Murrieta-Cid R, Becerra H, Lopez-Padilla R and LaValle S (2019). A motion strategy for exploration driven by an automaton activating feedback-based controllers, Autonomous Robots, 43:7, (1801-1825), Online publication date: 1-Oct-2019.
  20. Martin D (2019). Computation of exact probabilities associated with overlapping pattern occurrences, WIREs Computational Statistics, 11:5, Online publication date: 8-Aug-2019.
  21. Geffert V (2019). Unary Coded PSPACE-Complete Languages in ASPACE(loglog n), Theory of Computing Systems, 63:4, (688-714), Online publication date: 1-May-2019.
  22. Li Y, Zhang X, Cao J, Chen H and Gao C Learning k-Occurrence Regular Expressions with Interleaving Database Systems for Advanced Applications, (70-85)
  23. ACM
    Bqa R, Shakeel T and khan Y A Pedagogical Approach towards Theory of Computation Proceedings of the 2019 8th International Conference on Educational and Information Technology, (192-197)
  24. Quirós G, Varró A, Eisen P, Roelofs F and Kob P Automatic Skill Matching for Production Machines 2018 IEEE 14th International Conference on Automation Science and Engineering (CASE), (534-539)
  25. Farooqui A, Falkman P and Fabian M Towards Automatic Learning of Discrete-Event Models from Simulations 2018 IEEE 14th International Conference on Automation Science and Engineering (CASE), (857-862)
  26. ACM
    Fried D, Legay A, Ouaknine J and Vardi M Sequential Relational Decomposition Proceedings of the 33rd Annual ACM/IEEE Symposium on Logic in Computer Science, (432-441)
  27. Geffert V Complement for Two-Way Alternating Automata Computer Science – Theory and Applications, (132-144)
  28. Doczkal C and Smolka G (2018). Regular Language Representations in the Constructive Type Theory of Coq, Journal of Automated Reasoning, 61:1-4, (521-553), Online publication date: 1-Jun-2018.
  29. Gan Y, Chechik M, Nejati S, Bennett J, O'Farrell B and Waterhouse J Runtime monitoring of web service conversations Proceedings of the 27th Annual International Conference on Computer Science and Software Engineering, (2-17)
  30. Oulad-Naoui S, Cherroun H and Ziadi D (2017). A formal series-based unification of the frequent itemset mining approaches, Knowledge and Information Systems, 53:2, (439-477), Online publication date: 1-Nov-2017.
  31. ACM
    Novikov F, Fedorchenko L, Vorobiev V, Fatkieva R and Levonevskiy D Attribute-based approach of defining the secure behavior of automata objects Proceedings of the 10th International Conference on Security of Information and Networks, (67-72)
  32. Jain S, Farnoud Hassanzadeh F and Bruck J (2017). Capacity and Expressiveness of Genomic Tandem Duplication, IEEE Transactions on Information Theory, 63:10, (6129-6138), Online publication date: 1-Oct-2017.
  33. ACM
    Ribeiro R and Bois A Certified Bit-Coded Regular Expression Parsing Proceedings of the 21st Brazilian Symposium on Programming Languages, (1-8)
  34. Valdés F and Güting R (2017). Index-supported pattern matching on tuples of time-dependent values, Geoinformatica, 21:3, (429-458), Online publication date: 1-Jul-2017.
  35. ACM
    Isayama D, Ishiyama M, Relator R and Yamazaki K (2016). Computer Science Education for Primary and Lower Secondary School Students, ACM Transactions on Computing Education, 17:1, (1-28), Online publication date: 31-Mar-2017.
  36. Polách R, Trávníček J, Janoušek J and Melichar B (2016). Efficient determinization of visibly and height-deterministic pushdown automata, Computer Languages, Systems and Structures, 46:C, (91-105), Online publication date: 1-Nov-2016.
  37. ACM
    Marin M, Lotriet H and van Der Poll J Implementing Deterministic Finite State Machines using Guard-Stage-Milestone Proceedings of the Annual Conference of the South African Institute of Computer Scientists and Information Technologists, (1-10)
  38. Ramos M, Queiroz R, Moreira N and Almeida J On the Formalization of Some Results of Context-Free Language Theory Proceedings of the 23rd International Workshop on Logic, Language, Information, and Computation - Volume 9803, (338-357)
  39. Liu A, Torng E, Liu A and Torng E (2016). Overlay Automata and Algorithms for Fast and Scalable Regular Expression Matching, IEEE/ACM Transactions on Networking, 24:4, (2400-2415), Online publication date: 1-Aug-2016.
  40. Geffert V Alternating Demon Space Is Closed Under Complement and Other Simulations for Sublogarithmic Space Proceedings of the 20th International Conference on Developments in Language Theory - Volume 9840, (190-202)
  41. De Giacomo G and Vardi M LTLf and LDLf synthesis under partial observability Proceedings of the Twenty-Fifth International Joint Conference on Artificial Intelligence, (1044-1050)
  42. ACM
    Vardi M A Theory of Regular Queries Proceedings of the 35th ACM SIGMOD-SIGACT-SIGAI Symposium on Principles of Database Systems, (1-9)
  43. Gupta K and Nandivada V (2016). Lexical state analyzer for JavaCC grammars, Software—Practice & Experience, 46:6, (751-765), Online publication date: 1-Jun-2016.
  44. Newton J, Demaille A and Verna D Type-Checking of Heterogeneous Sequences in Common Lisp Proceedings of the 9th European Lisp Symposium on European Lisp Symposium, (13-20)
  45. Pezoa F, Reutter J, Suarez F, Ugarte M and Vrgoč D Foundations of JSON Schema Proceedings of the 25th International Conference on World Wide Web, (263-273)
  46. ACM
    Yang X, Qiu T, Wang B, Zheng B, Wang Y and Li C (2016). Negative Factor, ACM Transactions on Database Systems, 40:4, (1-46), Online publication date: 3-Feb-2016.
  47. Kalra N and Kumar A (2016). Fuzzy state grammar and fuzzy deep pushdown automaton, Journal of Intelligent & Fuzzy Systems: Applications in Engineering and Technology, 31:1, (249-258), Online publication date: 1-Jan-2016.
  48. ACM
    Szabo C and Teo Y (2015). Formalization of Weak Emergence in Multiagent Systems, ACM Transactions on Modeling and Computer Simulation, 26:1, (1-25), Online publication date: 28-Dec-2016.
  49. Jongmans S, Kappé T and Arbab F Composing Constraint Automata, State-by-State Revised Selected Papers of the 12th International Conference on Formal Aspects of Component Software - Volume 9539, (217-236)
  50. Castagnetti G, Piccolo M, Villa T, Yevtushenko N, Brayton R and Mishchenko A Automated Synthesis of Protocol Converters with BALM-II Revised Selected Papers of the SEFM 2015 Collocated Workshops on Software Engineering and Formal Methods - Volume 9509, (281-296)
  51. Endrullis J, Grabmayer C and Hendriks D Regularity Preserving but Not Reflecting Encodings Proceedings of the 2015 30th Annual ACM/IEEE Symposium on Logic in Computer Science (LICS), (535-546)
  52. Finkel O Incompleteness Theorems, Large Cardinals, and Automata over Infinite Words Proceedings, Part II, of the 42nd International Colloquium on Automata, Languages, and Programming - Volume 9135, (222-233)
  53. Finkel O (2015). The exact complexity of the infinite Post Correspondence Problem, Information Processing Letters, 115:6, (609-611), Online publication date: 1-Jun-2015.
  54. Farhana E and Rahman M (2015). Constrained sequence analysis algorithms in computational biology, Information Sciences: an International Journal, 295:C, (247-257), Online publication date: 20-Feb-2015.
  55. Tekli J, Chbeir R, Traina A, Traina C and Fileto R (2015). Approximate XML structure validation based on document-grammar tree similarity, Information Sciences: an International Journal, 295:C, (258-302), Online publication date: 20-Feb-2015.
  56. ACM
    Fionda V, Pirrò G and Gutierrez C (2015). NautiLOD, ACM Transactions on the Web, 9:1, (1-43), Online publication date: 23-Jan-2015.
  57. ACM
    Zhang Q, Xiao X, Zhang C, Yuan H and Su Z (2014). Efficient subcubic alias analysis for C, ACM SIGPLAN Notices, 49:10, (829-845), Online publication date: 31-Dec-2015.
  58. Dimovski A (2014). Program verification using symbolic game semantics, Theoretical Computer Science, 560:P3, (364-379), Online publication date: 4-Dec-2014.
  59. ACM
    Valdés F and Güting R Index-supported pattern matching on symbolic trajectories Proceedings of the 22nd ACM SIGSPATIAL International Conference on Advances in Geographic Information Systems, (53-62)
  60. ACM
    Zhang Q, Xiao X, Zhang C, Yuan H and Su Z Efficient subcubic alias analysis for C Proceedings of the 2014 ACM International Conference on Object Oriented Programming Systems Languages & Applications, (829-845)
  61. Howar F, Isberner M and Steffen B Tutorial Part I of the Proceedings of the 6th International Symposium on Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change - Volume 8802, (499-513)
  62. Bianchi M, Mereghetti C and Palano B (2014). Size lower bounds for quantum automata, Theoretical Computer Science, 551:C, (102-115), Online publication date: 25-Sep-2014.
  63. ACM
    Genevès P and Layaïda N (2014). Equipping IDEs with XML-Path Reasoning Capabilities, ACM Transactions on Internet Technology, 13:4, (1-20), Online publication date: 1-Jul-2014.
  64. Zhang M ACP-lrFEM Proceedings of the 10th International Conference on Information Security Practice and Experience - Volume 8434, (481-495)
  65. Hwang M Taxonomy of DEVS variants Proceedings of the Symposium on Theory of Modeling & Simulation - DEVS Integrative, (1-6)
  66. ACM
    Yamaguchi F, Wressnegger C, Gascon H and Rieck K Chucky Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, (499-510)
  67. Moreo A, Eisman E, Castro J and Zurita J (2013). Learning regular expressions to template-based FAQ retrieval systems, Knowledge-Based Systems, 53, (108-128), Online publication date: 1-Nov-2013.
  68. ACM
    Montenegro M, Peña R and Segura C Shape analysis in a functional language by using regular languages Proceedings of the 15th Symposium on Principles and Practice of Declarative Programming, (251-262)
  69. Balkanski E, Blanchet-Sadri F, Kilgore M and Wyatt B Partial word DFAs Proceedings of the 18th international conference on Implementation and Application of Automata, (36-47)
  70. Han Y, Ko S and Salomaa K Approximate matching between a context-free grammar and a finite-state automaton Proceedings of the 18th international conference on Implementation and Application of Automata, (146-157)
  71. Côté M, Gendron B and Rousseau L (2013). Grammar-Based Column Generation for Personalized Multi-Activity Shift Scheduling, INFORMS Journal on Computing, 25:3, (461-474), Online publication date: 1-Jul-2013.
  72. Erbatur S, Escobar S, Kapur D, Liu Z, Lynch C, Meadows C, Meseguer J, Narendran P, Santiago S and Sasse R Asymmetric unification Proceedings of the 24th international conference on Automated Deduction, (231-248)
  73. Hwang M Revisit of system variable trajectories (WIP) Proceedings of the Symposium on Theory of Modeling & Simulation - DEVS Integrative M&S Symposium, (1-6)
  74. Tsakonas A and Gabrys B (2013). A fuzzy evolutionary framework for combining ensembles, Applied Soft Computing, 13:4, (1800-1812), Online publication date: 1-Apr-2013.
  75. Rybnik M, Homenda W and Sitarek T Advanced searching in spaces of music information Proceedings of the 20th international conference on Foundations of Intelligent Systems, (218-227)
  76. ACM
    Yamaguchi F, Lottmann M and Rieck K Generalized vulnerability extrapolation using abstract syntax trees Proceedings of the 28th Annual Computer Security Applications Conference, (359-368)
  77. Sitarek T and Homenda W Generic operations in the structured space of the music Proceedings of the 4th international conference on Computational Collective Intelligence: technologies and applications - Volume Part II, (1-10)
  78. Homenda W and Pedrycz W Finite automata with imperfect information as classification tools Proceedings of the 4th international conference on Computational Collective Intelligence: technologies and applications - Volume Part I, (465-474)
  79. ACM
    Yang L, Manadhata P, Horne W, Rao P and Ganapathy V Fast submatch extraction using OBDDs Proceedings of the eighth ACM/IEEE symposium on Architectures for networking and communications systems, (163-174)
  80. ACM
    Kumar P and Singh V Efficient regular expression pattern matching for network intrusion detection systems using modified word-based automata Proceedings of the Fifth International Conference on Security of Information and Networks, (103-110)
  81. Cianciulli M, Zaccagnino R and Zizza R An easy automata based algorithm for testing coding properties of infinite sets of (DNA) words Proceedings of the First international conference on Theory and Practice of Natural Computing, (121-132)
  82. Sitarek T and Homenda W Efficient processing the braille music notation Proceedings of the 11th IFIP TC 8 international conference on Computer Information Systems and Industrial Management, (338-350)
  83. Heike C, Zimmermann W and Both A Protocol conformance checking of services with exceptions Proceedings of the First European conference on Service-Oriented and Cloud Computing, (122-137)
  84. Moreira N, Pereira D and Melo de Sousa S Deciding regular expressions (in-)equivalence in coq Proceedings of the 13th international conference on Relational and Algebraic Methods in Computer Science, (98-113)
  85. ACM
    Miliaraki I and Koubarakis M (2012). FoXtrot, ACM Transactions on the Web, 6:3, (1-34), Online publication date: 1-Sep-2012.
  86. Maletti A and Engelfriet J Strong lexicalization of tree adjoining grammars Proceedings of the 50th Annual Meeting of the Association for Computational Linguistics: Long Papers - Volume 1, (506-515)
  87. Lal A, Qadeer S and Lahiri S A solver for reachability modulo theories Proceedings of the 24th international conference on Computer Aided Verification, (427-443)
  88. ACM
    Purandare M, Atasu K and Hagleitner C Proving correctness of regular expression accelerators Proceedings of the 49th Annual Design Automation Conference, (350-355)
  89. ACM
    Groz B, Maneth S and Staworko S Deterministic regular expressions in linear time Proceedings of the 31st ACM SIGMOD-SIGACT-SIGAI symposium on Principles of Database Systems, (49-60)
  90. ACM
    Majumdar D and Bhattacharya S (2012). Interoperability of constrained finite state automata, ACM SIGSOFT Software Engineering Notes, 37:2, (1-8), Online publication date: 3-Apr-2012.
  91. Hwang M Qualitative verification of finite and real-time DEVS networks Proceedings of the 2012 Symposium on Theory of Modeling and Simulation - DEVS Integrative M&S Symposium, (1-8)
  92. ACM
    Malakuti S and Aksit M Evolution of composition filters to event composition Proceedings of the 27th Annual ACM Symposium on Applied Computing, (1850-1857)
  93. Kurz A, Suzuki T and Tuosto E On nominal regular languages with binders Proceedings of the 15th international conference on Foundations of Software Science and Computational Structures, (255-269)
  94. Homenda W and Rybnik M Querying in spaces of music information Proceedings of the 2011 international conference on Integrated uncertainty in knowledge modelling and decision making, (243-255)
  95. ACM
    Tsang D and Chawla S A robust index for regular expression queries Proceedings of the 20th ACM international conference on Information and knowledge management, (2365-2368)
  96. Dinculescu M, Hundt C, Panangaden P, Pineau J and Precup D The duality of state and observation in probabilistic transition systems Proceedings of the 9th international conference on Logic, Language, and Computation, (206-230)
  97. Wombacher A A-posteriori detection of sensor infrastructure errors in correlated sensor data and business workflows Proceedings of the 9th international conference on Business process management, (329-344)
  98. Kouril L, Jasek R and Motyl I A description of the protein structures by evolutionary-programmed Turing machine Proceedings of the 11th WSEAS international conference on Signal processing, computational geometry and artificial vision, and Proceedings of the 11th WSEAS international conference on Systems theory and scientific computation, (278-283)
  99. Walls R, Learned-Miller E and Levine B Forensic triage for mobile phones with DEC0DE Proceedings of the 20th USENIX conference on Security, (7-7)
  100. Özkural E Towards heuristic algorithmic memory Proceedings of the 4th international conference on Artificial general intelligence, (382-387)
  101. Cohen S, Gómez-Rodríguez C and Satta G Exact inference for generative probabilistic non-projective dependency parsing Proceedings of the Conference on Empirical Methods in Natural Language Processing, (1234-1245)
  102. Gao Y and Yu S State complexity of four combined operations composed of union, intersection, star and reversal Proceedings of the 13th international conference on Descriptional complexity of formal systems, (158-171)
  103. Bednárová Z, Geffert V, Mereghetti C and Palano B The size-cost of Boolean operations on constant height deterministic pushdown automata Proceedings of the 13th international conference on Descriptional complexity of formal systems, (80-92)
  104. Chaturvedi N, Olschewski J and Thomas W Languages vs. ω-languages in regular infinite games Proceedings of the 15th international conference on Developments in language theory, (180-191)
  105. Bonizzoni P and Jonoska N Regular splicing languages must have a constant Proceedings of the 15th international conference on Developments in language theory, (82-92)
  106. Restivo A and Vaglica R Some remarks on automata minimality Proceedings of the 15th international conference on Developments in language theory, (15-27)
  107. Buchnik E Bouma2 Proceedings of the 16th international conference on Implementation and application of automata, (53-64)
  108. Amavi J, Chabin J, Ferrari M and Réty P Weak inclusion for XML types Proceedings of the 16th international conference on Implementation and application of automata, (30-41)
  109. Anselmo M and Madonia M Comparing necessary conditions for recognizability of two-dimensional languages Proceedings of the 4th international conference on Algebraic informatics, (84-96)
  110. Laurence G, Lemay A, Niehren J, Staworko S and Tommasi M Normalization of sequential top-down tree-to-word transducers Proceedings of the 5th international conference on Language and automata theory and applications, (354-365)
  111. Anselmo M, Giammarresi D and Madonia M Classification of string languages via tiling recognizable picture languages Proceedings of the 5th international conference on Language and automata theory and applications, (105-116)
  112. ACM
    Ahmadi A, Jungers R, Parrilo P and Roozbehani M Analysis of the joint spectral radius via lyapunov functions on path-complete graphs Proceedings of the 14th international conference on Hybrid systems: computation and control, (13-22)
  113. Kanovich M, Rowe P and Scedrov A (2011). Collaborative Planning with Confidentiality, Journal of Automated Reasoning, 46:3-4, (389-421), Online publication date: 1-Apr-2011.
  114. ACM
    Mametjanov A, Winter V and Lämmel R More precise typing of rewrite strategies Proceedings of the Eleventh Workshop on Language Descriptions, Tools and Applications, (1-8)
  115. Rolando P, Sisto R and Risso F (2011). SPAF, IEEE/ACM Transactions on Networking, 19:1, (14-27), Online publication date: 1-Feb-2011.
  116. Tran N (2011). Characterizations and Existence of Easy Sets without Hard Subsets, Fundamenta Informaticae, 110:1-4, (321-328), Online publication date: 1-Jan-2011.
  117. Côté M, Gendron B and Rousseau L (2011). Grammar-Based Integer Programming Models for Multiactivity Shift Scheduling, Management Science, 57:1, (151-163), Online publication date: 1-Jan-2011.
  118. Walkinshaw N, Bogdanov K, Derrick J and Paris J Increasing functional coverage by inductive testing Proceedings of the 22nd IFIP WG 6.1 international conference on Testing software and systems, (126-141)
  119. Azizah F, Bakema G, Sitohang B and Santoso O Information grammar for patterns (IGP) for pattern language of data model patterns based on fully communication oriented information modeling (FCO-IM) Proceedings of the 2010 international conference on On the move to meaningful internet systems, (522-531)
  120. Farhana E, Ferdous J, Moosa T and Rahman M Finite automata based algorithms for the generalized constrained longest common subsequence problems Proceedings of the 17th international conference on String processing and information retrieval, (243-249)
  121. ACM
    Tuttle J, Walls R, Learned-Miller E and Levine B Reverse engineering for mobile systems forensics with Ares Proceedings of the 2010 ACM workshop on Insider threats, (21-28)
  122. Piecha J and Staniek M The context-sensitive grammar for vehicle movement description Proceedings of the 2010 international conference on Computer vision and graphics: Part II, (193-202)
  123. Woods L, Teubner J and Alonso G (2010). Complex event detection at wire speed with FPGAs, Proceedings of the VLDB Endowment, 3:1-2, (660-669), Online publication date: 1-Sep-2010.
  124. Antoš J and Melichar B Finite automata for generalized approach to backward pattern matching Proceedings of the 15th international conference on Implementation and application of automata, (49-58)
  125. Almeida M, Moreira N and Reis R Incremental DFA minimisation Proceedings of the 15th international conference on Implementation and application of automata, (39-48)
  126. Bensaid H, Caferra R and Peltier N Perfect discrimination graphs Proceedings of the 5th international conference on Automated Reasoning, (369-383)
  127. Heinz J and Koirala C Maximum likelihood estimation of feature-based distributions Proceedings of the 11th Meeting of the ACL Special Interest Group on Computational Morphology and Phonology, (28-37)
  128. ACM
    Lemos G and Martins E Robustness testing oracle using a sequence alignment algorithm Proceedings of the First International Workshop on Software Test Output Validation, (13-20)
  129. ACM
    Muthusamy V, Liu H and Jacobsen H Predictive publish/subscribe matching Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems, (14-25)
  130. ACM
    Miliaraki I and Koubarakis M Distributed structural and value XML filtering Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems, (2-13)
  131. ACM
    Sgarbas K (2010). Automata theory with modern applications by James A. Anderson, Cambridge University Press, 2006, viii+256 pages, ACM SIGACT News, 41:2, (43-46), Online publication date: 9-Jun-2010.
  132. ACM
    Arvind V and Srinivasan S On the hardness of the noncommutative determinant Proceedings of the forty-second ACM symposium on Theory of computing, (677-686)
  133. Quimper C and Rousseau L (2010). A large neighbourhood search approach to the multi-activity shift scheduling problem, Journal of Heuristics, 16:3, (373-392), Online publication date: 1-Jun-2010.
  134. Zantema H Complexity of guided insertion-deletion in RNA-Editing Proceedings of the 4th international conference on Language and Automata Theory and Applications, (608-619)
  135. Klunder B and Rytter W Post correspondence problem with partially commutative alphabets Proceedings of the 4th international conference on Language and Automata Theory and Applications, (356-367)
  136. ACM
    Stakhanova N and Ghorbani A Managing intrusion detection rule sets Proceedings of the Third European Workshop on System Security, (29-35)
  137. ACM
    Ponge J, Benatallah B, Casati F and Toumani F (2010). Analysis and applications of timed service protocols, ACM Transactions on Software Engineering and Methodology, 19:4, (1-38), Online publication date: 1-Apr-2010.
  138. Wang S, Ji Y, Dong W and Yang S A new formal test method for networked software integration testing Proceedings of the 2010 international conference on Computational Science and Its Applications - Volume Part II, (463-474)
  139. ACM
    Onizuka M Processing XPath queries with forward and downward axes over XML streams Proceedings of the 13th International Conference on Extending Database Technology, (27-38)
  140. Mu S, Zhang X, Zhang N, Lu J, Deng Y and Zhang S IP routing processing with graphic processors Proceedings of the Conference on Design, Automation and Test in Europe, (93-98)
  141. Rieck K, Krueger T, Brefeld U and Müller K (2010). Approximate Tree Kernels, The Journal of Machine Learning Research, 11, (555-580), Online publication date: 1-Mar-2010.
  142. ACM
    Wang H, Pu S, Knezek G and Liu J A modular NFA architecture for regular expression matching Proceedings of the 18th annual ACM/SIGDA international symposium on Field programmable gate arrays, (209-218)
  143. ACM
    Furia C, Mandrioli D, Morzenti A and Rossi M (2010). Modeling time in computing, ACM Computing Surveys, 42:2, (1-59), Online publication date: 1-Feb-2010.
  144. ACM
    Anderson H and Khoo S Regular approximation and bounded domains for size-change termination Proceedings of the 2010 ACM SIGPLAN workshop on Partial evaluation and program manipulation, (53-62)
  145. Bianchi M and Palano B (2010). Behaviours of Unary Quantum Automata, Fundamenta Informaticae, 104:1-2, (1-15), Online publication date: 1-Jan-2010.
  146. Kari L and Mahalingam K DNA computing Algorithms and theory of computation handbook, (31-31)
  147. Kuzmin E, Sokolov V and Chalyy D (2010). Boundedness problems for Minsky counter machines, Programming and Computing Software, 36:1, (3-10), Online publication date: 1-Jan-2010.
  148. Eberle H, Unger T and Leymann F Process Fragments Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I, (398-405)
  149. Bene N, Ketínský J, Larsen K and Srba J (2009). On determinism in modal transition systems, Theoretical Computer Science, 410:41, (4026-4043), Online publication date: 1-Sep-2009.
  150. ACM
    Schultz-Møller N, Migliavacca M and Pietzuch P Distributed complex event processing with query rewriting Proceedings of the Third ACM International Conference on Distributed Event-Based Systems, (1-12)
  151. ACM
    Brenna L, Gehrke J, Hong M and Johansen D Distributed event stream processing with non-deterministic finite automata Proceedings of the Third ACM International Conference on Distributed Event-Based Systems, (1-12)
  152. ACM
    Woodward J and Bai R Canonical representation genetic programming Proceedings of the first ACM/SIGEVO Summit on Genetic and Evolutionary Computation, (585-592)
  153. Aştefănoaei L, de Boer F and Dastani M The refinement of choreographed multi-agent systems Proceedings of the 7th international conference on Declarative Agent Languages and Technologies, (20-34)
  154. Kupferman O and Piterman N Lower Bounds on Witnesses for Nonemptiness of Universal Co-Büchi Automata Proceedings of the 12th International Conference on Foundations of Software Science and Computational Structures - Volume 5504, (182-196)
  155. ACM
    Sneyers J, Schrijvers T and Demoen B (2009). The computational power and complexity of constraint handling rules, ACM Transactions on Programming Languages and Systems, 31:2, (1-42), Online publication date: 1-Feb-2009.
  156. ACM
    Ganty P, Majumdar R and Rybalchenko A (2009). Verifying liveness for asynchronous programs, ACM SIGPLAN Notices, 44:1, (102-113), Online publication date: 21-Jan-2009.
  157. ACM
    Ganty P, Majumdar R and Rybalchenko A Verifying liveness for asynchronous programs Proceedings of the 36th annual ACM SIGPLAN-SIGACT symposium on Principles of programming languages, (102-113)
  158. Shaban-Nejad A, Ormandjieva O, Kassab M and Haarslev V (2009). Managing requirement volatility in an ontology-driven clinical LIMS using category theory, International Journal of Telemedicine and Applications, 2009, (1-14), Online publication date: 1-Jan-2009.
  159. Trinidad M and Valle M (2009). Reliable event detectors for constrained resources wireless sensor node hardware, EURASIP Journal on Embedded Systems, 2009, (1-1), Online publication date: 1-Jan-2009.
  160. ACM
    Etessami K and Yannakakis M (2009). Recursive Markov chains, stochastic grammars, and monotone systems of nonlinear equations, Journal of the ACM, 56:1, (1-66), Online publication date: 1-Jan-2009.
  161. Kuzmin E, Sokolov V and Chalyy D (2009). Application of the trace assertion method to the specification, design, and verification of automaton programs, Programming and Computing Software, 35:1, (43-55), Online publication date: 1-Jan-2009.
  162. Hirst T (2009). A Rice-style theorem for parallel automata, Information and Computation, 207:1, (1-13), Online publication date: 1-Jan-2009.
  163. Zafar N, Sabir N and Ali A Semantics transformation of NFA to Z notation by constructing union of regular languages Proceedings of the 8th conference on Applied computer scince, (70-75)
  164. Geffert V, Mereghetti C and Palano B More Concise Representation of Regular Languages by Automata and Regular Expressions Proceedings of the 12th international conference on Developments in Language Theory, (359-370)
  165. Uchida Y, Ito T, Okabe H, Sakamoto M, Furutani H and Kono M (2008). Four-dimensional multi-inkdot finite automata, WSEAS Transactions on Computers, 7:9, (1437-1446), Online publication date: 1-Sep-2008.
  166. Sakamoto M, Tomozoe N, Furutani H, Kono M, Ito T, Uchida Y and Okabe H A survey of three-dimensional automata Proceedings of the 12th WSEAS international conference on Computers, (399-407)
  167. ACM
    Wassermann G, Yu D, Chander A, Dhurjati D, Inamura H and Su Z Dynamic test input generation for web applications Proceedings of the 2008 international symposium on Software testing and analysis, (249-260)
  168. Hundt C and Ochsenfahrt U Damaged BZip Files Are Difficult to Repair Proceedings of the 14th annual international conference on Computing and Combinatorics, (12-21)
  169. Gallasch G and Billington J Parametric Language Analysis of the Class of Stop-and-Wait Protocols Proceedings of the 29th international conference on Applications and Theory of Petri Nets, (191-210)
  170. ACM
    Wassermann G and Su Z Static detection of cross-site scripting vulnerabilities Proceedings of the 30th international conference on Software engineering, (171-180)
  171. ACM
    Miliaraki I, Kaoudi Z and Koubarakis M Xml data dissemination using automata on top of structured overlay networks Proceedings of the 17th international conference on World Wide Web, (865-874)
  172. Nederhof M and Satta G (2008). Computation of distances for regular and context-free probabilistic languages, Theoretical Computer Science, 395:2-3, (235-254), Online publication date: 20-Apr-2008.
  173. Gruber H and Johannsen J Optimal lower bounds on regular expression size using communication complexity Proceedings of the Theory and practice of software, 11th international conference on Foundations of software science and computational structures, (273-286)
  174. Lo D, Khoo S and Liu C Efficient mining of recurrent rules from a sequence database Proceedings of the 13th international conference on Database systems for advanced applications, (67-83)
  175. ACM
    Weimer W and Necula G (2008). Exceptional situations and program reliability, ACM Transactions on Programming Languages and Systems, 30:2, (1-51), Online publication date: 1-Mar-2008.
  176. Berkeley I (2008). What the <0.70, 1.17, 0.99, 1.07> is a Symbol?, Minds and Machines, 18:1, (93-105), Online publication date: 1-Mar-2008.
  177. Sánchez C, Slanina M, Sipma H and Manna Z The reaction algebra Pillars of computer science, (596-619)
  178. ACM
    Boulé M and Zilic Z (2008). Automata-based assertion-checker synthesis of PSL properties, ACM Transactions on Design Automation of Electronic Systems, 13:1, (1-21), Online publication date: 1-Jan-2008.
  179. Jurdziski T (2007). On complexity of grammars related to the safety problem, Theoretical Computer Science, 389:1-2, (56-72), Online publication date: 10-Dec-2007.
  180. Vu T and Jesshope C Formalizing SANE virtual processor in thread algebra Proceedings of the formal engineering methods 9th international conference on Formal methods and software engineering, (345-365)
  181. Tian C and Duan Z Model checking propositional projection temporal logic based on SPIN Proceedings of the formal engineering methods 9th international conference on Formal methods and software engineering, (246-265)
  182. ACM
    Zaraket F, Aziz A and Khurshid S Sequential circuits for program analysis Proceedings of the twenty-second IEEE/ACM international conference on Automated software engineering, (114-123)
  183. Rusakov D (2007). Scheme inclusion verification algorithm in algebraic model of programs with constants, Programming and Computing Software, 33:6, (299-306), Online publication date: 1-Nov-2007.
  184. Gan Y, Chechik M, Nejati S, Bennett J, O'Farrell B and Waterhouse J Runtime monitoring of web service conversations Proceedings of the 2007 conference of the center for advanced studies on Collaborative research, (42-57)
  185. Burgin M Universality, reducibility, and completeness Proceedings of the 5th international conference on Machines, computations, and universality, (24-38)
  186. ACM
    Das D, Chakrabarti P and Kumar R (2007). Functional verification of task partitioning for multiprocessor embedded systems, ACM Transactions on Design Automation of Electronic Systems, 12:4, (44-es), Online publication date: 1-Sep-2007.
  187. De Felice C, Fici G and Zizza R Marked systems and circular splicing Proceedings of the 16th international conference on Fundamentals of Computation Theory, (238-249)
  188. Wiesner K and Crutchfield J Computation in sofic quantum dynamical systems Proceedings of the 6th international conference on Unconventional Computation, (214-225)
  189. Rogers J, Heinz J, Bailey G, Edlefsen M, Visscher M, Wellcome D and Wibel S On languages piecewise testable in the strict sense Proceedings of the 10th and 11th Biennial conference on The mathematics of language, (255-265)
  190. Baran J and Barringer H A grammatical representation of visibly pushdown languages Proceedings of the 14th international conference on Logic, language, information and computation, (1-11)
  191. Poizat P and Salaün G Adaptation of open component-based systems Proceedings of the 9th IFIP WG 6.1 international conference on Formal methods for open object-based distributed systems, (141-156)
  192. Mousavi A, Far B, Eberlein A and Heidari B Strong safe realizability of message sequence chart specifications Proceedings of the 2007 international conference on Fundamentals of software engineering, (334-349)
  193. Jeon J, Shin K and Han H Layout transformations for heap objects using static access patterns Proceedings of the 16th international conference on Compiler construction, (187-201)
  194. Gelade W, Martens W and Neven F Optimizing schema languages for XML Proceedings of the 11th international conference on Database Theory, (269-283)
  195. Hundt C, Liśkiewicz M and Wölfel U Provably secure steganography and the complexity of sampling Proceedings of the 17th international conference on Algorithms and Computation, (754-763)
  196. ACM
    Yu F, Chen Z, Diao Y, Lakshman T and Katz R Fast and memory-efficient regular expression matching for deep packet inspection Proceedings of the 2006 ACM/IEEE symposium on Architecture for networking and communications systems, (93-102)
  197. Chen J and Duan L Conditions for avoiding controllability problems in distributed testing Proceedings of the 8th international conference on Formal Methods and Software Engineering, (460-477)
  198. Rinderle S, Wombacher A and Reichert M Evolution of process choreographies in DYCHOR Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part I, (273-290)
  199. Wombacher A Evaluation of technical measures for workflow similarity based on a pilot study Proceedings of the 2006 Confederated international conference on On the Move to Meaningful Internet Systems: CoopIS, DOA, GADA, and ODBASE - Volume Part I, (255-272)
  200. Câmpeanu C, Paun A and Smith J (2006). Incremental construction of minimal deterministic finite cover automata, Theoretical Computer Science, 363:2, (135-148), Online publication date: 28-Oct-2006.
  201. La Torre S, Napoli M and Parente M On the membership problem for visibly pushdown languages Proceedings of the 4th international conference on Automated Technology for Verification and Analysis, (96-109)
  202. Lu W, Chiu K and Pan Y A Parallel Approach to XML Parsing Proceedings of the 7th IEEE/ACM International Conference on Grid Computing, (223-230)
  203. Becerra-Bonache L, Dediu A and Tîrnăucă C Learning DFA from correction and equivalence queries Proceedings of the 8th international conference on Grammatical Inference: algorithms and applications, (281-292)
  204. Bazijanec B and Turowski K B2B protocol construction as a basis for integration architecture configuration Proceedings of the 2006 international conference on Business Process Management Workshops, (285-296)
  205. Geffert V Magic numbers in the state hierarchy of finite automata Proceedings of the 31st international conference on Mathematical Foundations of Computer Science, (412-423)
  206. Tolstrup T, Nielson F and Hansen R Locality-based security policies Proceedings of the 4th international conference on Formal aspects in security and trust, (185-201)
  207. Onder R and Bayram Z XSLT version 2.0 is turing-complete Proceedings of the 11th international conference on Implementation and Application of Automata, (275-276)
  208. De Wulf M, Doyen L, Henzinger T and Raskin J Antichains Proceedings of the 18th international conference on Computer Aided Verification, (17-30)
  209. Chung Y, Lu C and Tang C Efficient algorithms for regular expression constrained sequence alignment Proceedings of the 17th Annual conference on Combinatorial Pattern Matching, (389-400)
  210. Zhu Q Dynamic configuring service on semantic grid Proceedings of the 7th international conference on Advances in Web-Age Information Management, (170-181)
  211. Csuhaj-Varjú E and Verlan S Length-separating test tube systems Proceedings of the 12th international conference on DNA Computing, (58-70)
  212. ACM
    Bechter M, Blum M, Dettmering H and Stützel B Compatibility models Proceedings of the 2006 international workshop on Software engineering for automotive systems, (5-12)
  213. Lei L, Duan Z and Yu B Semantic matching of web services for collaborative business processes Proceedings of the 10th international conference on Computer supported cooperative work in design III, (479-488)
  214. Hamada M Visual tools and examples to support active e-learning and motivation with performance evaluation Proceedings of the First international conference on Technologies for E-Learning and Digital Entertainment, (147-155)
  215. Gary K, Ibanez L, Aylward S, Gobbi D, Blake M and Cleary K (2006). IGSTK, Computer, 39:4, (46-53), Online publication date: 1-Apr-2006.
  216. ACM
    Ginat D and Armoni M (2006). Reversing, ACM SIGCSE Bulletin, 38:1, (469-473), Online publication date: 31-Mar-2006.
  217. Staworko S and Chomicki J Validity-sensitive querying of XML databases Proceedings of the 2006 international conference on Current Trends in Database Technology, (164-177)
  218. Demers A, Gehrke J, Hong M, Riedewald M and White W Towards expressive publish/subscribe systems Proceedings of the 10th international conference on Advances in Database Technology, (627-644)
  219. ACM
    Ginat D and Armoni M Reversing Proceedings of the 37th SIGCSE technical symposium on Computer science education, (469-473)
  220. ACM
    Benedikt M, Kuijpers B, Löding C, Bussche J and Wilke T (2006). A characterization of first-order topological properties of planar spatial data, Journal of the ACM, 53:2, (273-305), Online publication date: 1-Mar-2006.
  221. Schnitger G Regular expressions and NFAs without Ε-transitions Proceedings of the 23rd Annual conference on Theoretical Aspects of Computer Science, (432-443)
  222. Kupke J On separating constant from polynomial ambiguity of finite automata Proceedings of the 32nd conference on Current Trends in Theory and Practice of Computer Science, (379-388)
  223. Rosenberg A State Theoretical Computer Science, (375-398)
  224. Nessel J and Lange S (2005). Learning erasing pattern languages with queries, Theoretical Computer Science, 348:1, (41-57), Online publication date: 2-Dec-2005.
  225. Wombacher A, Wieringa R, Jonker W, Knežević P and Pokraev S Requirements for secure logging of decentralized cross-organizational workflow executions Proceedings of the 2005 OTM Confederated international conference on On the Move to Meaningful Internet Systems, (526-536)
  226. Yagi I, Takata Y and Seki H A static analysis using tree automata for XML access control Proceedings of the Third international conference on Automated Technology for Verification and Analysis, (234-247)
  227. ACM
    Cheney J Toward a general theory of names Proceedings of the 3rd ACM SIGPLAN workshop on Mechanized reasoning about languages with variable binding, (33-40)
  228. Cai K, Zhao L, Hu H and Jiang C On the Test Case Definition for GUI Testing Proceedings of the Fifth International Conference on Quality Software, (19-28)
  229. ACM
    Moreira N and Reis R (2005). Interactive manipulation of regular objects with FAdo, ACM SIGCSE Bulletin, 37:3, (335-339), Online publication date: 1-Sep-2005.
  230. Jurdziński T and Loryś K Leftist grammars and the chomsky hierarchy Proceedings of the 15th international conference on Fundamentals of Computation Theory, (293-304)
  231. Drabent W Towards types for web rule languages Proceedings of the First international conference on Reasoning Web, (305-317)
  232. Hromkovič J and Schnitger G NFAs with and without ε-transitions Proceedings of the 32nd international conference on Automata, Languages and Programming, (385-396)
  233. Paul S and Preneel B Solving systems of differential equations of addition Proceedings of the 10th Australasian conference on Information Security and Privacy, (75-88)
  234. ACM
    Moreira N and Reis R Interactive manipulation of regular objects with FAdo Proceedings of the 10th annual SIGCSE conference on Innovation and technology in computer science education, (335-339)
  235. Bonizzoni P and Mauri G (2005). Regular splicing languages and subclasses, Theoretical Computer Science, 340:2, (349-363), Online publication date: 27-Jun-2005.
  236. Clément J, Duval J, Guaiana G, Perrin D and Rindone G (2005). Parsing with a finite dictionary, Theoretical Computer Science, 340:2, (432-442), Online publication date: 27-Jun-2005.
  237. Lundqvist K, Srinivasan J and Gorelov S Non-intrusive system level fault-tolerance Proceedings of the 10th Ada-Europe international conference on Reliable Software Technologies, (156-166)
  238. Ilie L, Solis-Oba R and Yu S Reducing the size of NFAs by using equivalences and preorders Proceedings of the 16th annual conference on Combinatorial Pattern Matching, (310-321)
  239. ACM
    Abiteboul S, Milo T and Benjelloun O Regular rewriting of active XML and unambiguity Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (295-303)
  240. ACM
    Benedikt M, Fan W and Geerts F XPath satisfiability in the presence of DTDs Proceedings of the twenty-fourth ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems, (25-36)
  241. Bonizzoni P, De Felice C and Mauri G Recombinant DNA ,gene splicing as generative devices of formal languages Proceedings of the First international conference on Computability in Europe: new Computational Paradigms, (65-67)
  242. Kari L, Konstantinidis S, Losseva E, Sosík P and Thierrin G Hairpin structures in DNA words Proceedings of the 11th international conference on DNA Computing, (158-170)
  243. Benedikt M, Fan W and Kuper G (2005). Structural properties of XPath fragments, Theoretical Computer Science, 336:1, (3-31), Online publication date: 25-May-2005.
  244. Arbab F, Baier C, de Boer F, Rutten J and Sirjani M Synthesis of reo circuits for implementation of component-connector automata specifications Proceedings of the 7th international conference on Coordination Models and Languages, (236-251)
  245. Bonizzoni P, De Felice C and Zizza R (2005). The structure of reflexive regular splicing languages via Schützenberger constants, Theoretical Computer Science, 334:1-3, (71-98), Online publication date: 11-Apr-2005.
  246. Kari L, Konstantinidis S and Sosík P (2005). On properties of bond-free DNA languages, Theoretical Computer Science, 334:1-3, (131-159), Online publication date: 11-Apr-2005.
  247. Ibarra O (2005). On membrane hierarchy in P systems, Theoretical Computer Science, 334:1-3, (115-129), Online publication date: 11-Apr-2005.
  248. Starkie B, Coste F and van Zaanen M (2005). Progressing the state-of-the-art in grammatical inference by competition, AI Communications, 18:2, (93-115), Online publication date: 1-Apr-2005.
  249. ACM
    Črepinšek M, Mernik M and Žumer V (2005). Extracting grammar from programs, ACM SIGPLAN Notices, 40:4, (29-38), Online publication date: 1-Apr-2005.
  250. ACM
    Wu X, Roychoudhury S, Bryant B, Gray J and Mernik M A two-dimensional separation of concerns for compiler construction Proceedings of the 2005 ACM symposium on Applied computing, (1365-1369)
  251. Del Vecchio D and Murray R Existence of cascade discrete-continuous state estimators for systems on a partial order Proceedings of the 8th international conference on Hybrid Systems: computation and control, (226-241)
  252. ACM
    Milo T, Abiteboul S, Amann B, Benjelloun O and Ngoc F (2005). Exchanging intensional XML data, ACM Transactions on Database Systems, 30:1, (1-40), Online publication date: 1-Mar-2005.
  253. Mera F and Pighizzini G (2005). Complementing unary nondeterministic automata, Theoretical Computer Science, 330:2, (349-360), Online publication date: 2-Feb-2005.
  254. Wombacher A Overview on decentralized establishment of multi-lateral collaborations From Integrated Publication and Information Systems to Virtual Information and Knowledge Environments, (11-20)
  255. Hawkins W and Healy C (2004). Introducing practical applications into a computational theory class, Journal of Computing Sciences in Colleges, 20:2, (219-225), Online publication date: 1-Dec-2004.
  256. Guingne F, Nicart F and Kempe A (2004). Acyclic networks maximizing the printing complexity, Theoretical Computer Science, 328:1-2, (39-51), Online publication date: 29-Nov-2004.
  257. Hwang M and Lin F State minimization of SP-DEVS Proceedings of the 13th international conference on AI, Simulation, and Planning in High Autonomy Systems, (243-252)
  258. Daws C Symbolic and parametric model checking of discrete-time markov chains Proceedings of the First international conference on Theoretical Aspects of Computing, (280-294)
  259. Mielikäinen T An automata approach to pattern collections Proceedings of the Third international conference on Knowledge Discovery in Inductive Databases, (130-149)
  260. ACM
    Chesñevar C, González M and Maguitman A (2004). Didactic strategies for promoting significant learning in formal languages and automata theory, ACM SIGCSE Bulletin, 36:3, (7-11), Online publication date: 1-Sep-2004.
  261. Gyöngyi Z, Garcia-Molina H and Pedersen J Combating web spam with trustrank Proceedings of the Thirtieth international conference on Very large data bases - Volume 30, (576-587)
  262. ACM
    Nishimura S Fusion with stacks and accumulating parameters Proceedings of the 2004 ACM SIGPLAN symposium on Partial evaluation and semantics-based program manipulation, (101-112)
  263. ACM
    Stone M, DeCarlo D, Oh I, Rodriguez C, Stere A, Lees A and Bregler C Speaking with hands ACM SIGGRAPH 2004 Papers, (506-513)
  264. ACM
    Stone M, DeCarlo D, Oh I, Rodriguez C, Stere A, Lees A and Bregler C (2004). Speaking with hands, ACM Transactions on Graphics, 23:3, (506-513), Online publication date: 1-Aug-2004.
  265. Vasconcelos W Norm verification and analysis of electronic institutions Proceedings of the Second international conference on Declarative Agent Languages and Technologies, (166-182)
  266. Cardoso J and Sheth A Introduction to semantic web services and web process composition Proceedings of the First international conference on Semantic Web Services and Web Process Composition, (1-13)
  267. ACM
    Chesñevar C, González M and Maguitman A Didactic strategies for promoting significant learning in formal languages and automata theory Proceedings of the 9th annual SIGCSE conference on Innovation and technology in computer science education, (7-11)
  268. ACM
    Tosic P A perspective on the future of massively parallel computing Proceedings of the 1st conference on Computing frontiers, (488-502)
  269. ACM
    Francel M and John D An algorithm for constructing an even grammar from a language sample Proceedings of the 42nd annual ACM Southeast Conference, (240-245)
  270. Barbosa D, Mendelzon A, Libkin L, Mignet L and Arenas M Efficient Incremental Validation of XML Documents Proceedings of the 20th International Conference on Data Engineering
  271. Bohan Broderick P (2004). On Communication and Computation, Minds and Machines, 14:1, (1-19), Online publication date: 1-Feb-2004.
  272. Bailey J, Dong G and Ramamohanarao K (2004). On the decidability of the termination problem of active database systems, Theoretical Computer Science, 311:1-3, (389-437), Online publication date: 23-Jan-2004.
  273. Ganesan P and Manku G Optimal routing in Chord Proceedings of the fifteenth annual ACM-SIAM symposium on Discrete algorithms, (176-185)
  274. Billington J and Han B Closed form expressions for the state space of TCP's Data Transfer Service operating over unbounded channels Proceedings of the 27th Australasian conference on Computer science - Volume 26, (31-39)
  275. Xu Y, Wang L and Deng X Exact pattern matching for RNA secondary structures Proceedings of the second conference on Asia-Pacific bioinformatics - Volume 29, (257-263)
  276. Arenas M, Fan W and Libkin L Consistency of XML specifications Inconsistency Tolerance, (15-41)
  277. Collins M (2003). Head-Driven Statistical Models for Natural Language Parsing, Computational Linguistics, 29:4, (589-637), Online publication date: 1-Dec-2003.
  278. Cortés L, Eles P and Peng Z (2003). Modeling and formal verification of embedded systems based on a Petri net representation, Journal of Systems Architecture: the EUROMICRO Journal, 49:12-15, (571-598), Online publication date: 1-Dec-2003.
  279. ACM
    Onizuka M Light-weight xPath processing of XML stream with deterministic automata Proceedings of the twelfth international conference on Information and knowledge management, (342-349)
  280. ACM
    Christensen A, Møller A and Schwartzbach M (2003). Extending Java for high-level Web service construction, ACM Transactions on Programming Languages and Systems, 25:6, (814-875), Online publication date: 1-Nov-2003.
  281. De Beijer N, Watson B and Kourie D Stretching and jamming of automata Proceedings of the 2003 annual research conference of the South African institute of computer scientists and information technologists on Enablement through technology, (198-207)
  282. Bonizzoni P, De Felice C, Mauri G and Zizza R Regular languages generated by reflexive finite splicing systems Proceedings of the 7th international conference on Developments in language theory, (134-145)
  283. ACM
    Milo T, Abiteboul S, Amann B, Benjelloun O and Ngoc F Exchanging intensional XML data Proceedings of the 2003 ACM SIGMOD international conference on Management of data, (289-300)
  284. López M, Fernández M, Fernández-Caballero A and Delgado A Neurally inspired mechanisms for the dynamic visual attention map generation task Proceedings of the Artificial and natural neural networks 7th international conference on Computational methods in neural modeling - Volume 1, (694-701)
  285. ACM
    Wombacher A, Mahleko B and Risse T Classification of ad-hoc multi-lateral collaborations based on local workflow models Proceedings of the 2003 ACM symposium on Applied computing, (1185-1190)
  286. Spears W and Gordon-Spears D Evolution of strategies for resource protection problems Advances in evolutionary computing, (367-392)
  287. Drewes F, Klempien-Hinrichs R and Kreowski H (2003). Table-driven and context-sensitive collage languages, Journal of Automata, Languages and Combinatorics, 8:1, (5-24), Online publication date: 1-Jan-2003.
  288. Gabrijel I and Dobnikar A (2003). On-line identification and reconstruction of finite automata with generalized recurrent neural networks, Neural Networks, 16:1, (101-120), Online publication date: 1-Jan-2003.
  289. Bonizzoni P, De Felice C, Mauri G and Zizza R Decision problems for linear and circular splicing systems Proceedings of the 6th international conference on Developments in language theory, (78-92)
  290. Lai Y, Fung K and Wu C FAQ mining via list detection proceedings of the 2002 conference on multilingual summarization and question answering - Volume 19, (1-7)
  291. Yoo T and Lafortune S (2002). A General Architecture for Decentralized Supervisory Control of Discrete-Event Systems, Discrete Event Dynamic Systems, 12:3, (335-377), Online publication date: 1-Jul-2002.
  292. Wiedermann J and van Leeuwen J (2002). The emergent computational potential of evolving artificial living systems, AI Communications, 15:4, (205-215), Online publication date: 1-Mar-2002.
  293. Esparza J Grammars as processes Formal and natural computing, (277-297)
  294. Brill E Pattern-based disambiguation for natural language processing Proceedings of the 2000 Joint SIGDAT conference on Empirical methods in natural language processing and very large corpora: held in conjunction with the 38th Annual Meeting of the Association for Computational Linguistics - Volume 13, (1-8)
  295. Nederhof M and Satta G Left-to-right parsing and bilexical context-free grammars Proceedings of the 1st North American chapter of the Association for Computational Linguistics conference, (272-279)
  296. Moore R Removing left recursion from context-free grammars Proceedings of the 1st North American chapter of the Association for Computational Linguistics conference, (249-255)
  297. van Noord G (2000). Treatment of epsilon moves in subset construction, Computational Linguistics, 26:1, (61-76), Online publication date: 1-Mar-2000.
  298. Daciuk J, Watson B, Mihov S and Watson R (2000). Incremental construction of minimal acyclic finite-state automata, Computational Linguistics, 26:1, (3-16), Online publication date: 1-Mar-2000.
  299. Lawrence S, Giles C and Fong S (2000). Natural Language Grammatical Inference with Recurrent Neural Networks, IEEE Transactions on Knowledge and Data Engineering, 12:1, (126-140), Online publication date: 1-Jan-2000.
  300. Wermter S (2000). Knowledge Extraction from Transducer Neural Networks, Applied Intelligence, 12:1-2, (27-42), Online publication date: 1-Jan-2000.
  301. Lafferty J and Vardy A (1999). Ordered Binary Decision Diagrams and Minimal Trellises, IEEE Transactions on Computers, 48:9, (971-986), Online publication date: 1-Sep-1999.
  302. Ţiplea F and Mäkinen E (1997). Jumping Petri Nets. Specific Properties, Fundamenta Informaticae, 32:3,4, (373-392), Online publication date: 1-Dec-1997.
  303. Focardi R and Gorrieri R (1997). The Compositional Security Checker, IEEE Transactions on Software Engineering, 23:9, (550-571), Online publication date: 1-Sep-1997.
  304. Goldman R and Widom J DataGuides Proceedings of the 23rd International Conference on Very Large Data Bases, (436-445)
  305. Kiraz G Compiling regular formalisms with rule features into finite-state automata Proceedings of the 35th Annual Meeting of the Association for Computational Linguistics and Eighth Conference of the European Chapter of the Association for Computational Linguistics, (329-336)
  306. Hsu W, Chung M and Das A (1997). Linear Recursive Networks and Their Applications in Distributed Systems, IEEE Transactions on Parallel and Distributed Systems, 8:7, (673-680), Online publication date: 1-Jul-1997.
  307. MacKenzie D, Arkin R and Cameron J (1997). Multiagent Mission Specification and Execution, Autonomous Robots, 4:1, (29-52), Online publication date: 1-Mar-1997.
  308. Oflazer K (1996). Error-tolerant finite-state recognition with applications to morphological analysis and spelling correction, Computational Linguistics, 22:1, (73-89), Online publication date: 1-Mar-1996.
  309. Agrawal R, Psaila G, Wimmers E and Zaït M Querying Shapes of Histories Proceedings of the 21th International Conference on Very Large Data Bases, (502-514)
  310. Ramer A (1995). Review of "The language complexity game" by Eric Sven Ristad. The MIT Press 1993., Computational Linguistics, 21:1, (124-131), Online publication date: 1-Mar-1995.
  311. ACM
    Cheung B Ambiguity in context-free grammars Proceedings of the 1995 ACM symposium on Applied computing, (272-276)
  312. Kaplan R and Kay M (1994). Regular models of phonological rule systems, Computational Linguistics, 20:3, (331-378), Online publication date: 1-Sep-1994.
  313. Dowding J, Moore R, Andry F and Moran D Interleaving syntax and semantics in an efficient bottom-up parser Proceedings of the 32nd annual meeting on Association for Computational Linguistics, (110-116)
  314. ACM
    Jing H, Das A and Chung M (1993). Linear recursive networks and their applications in topological design and data routing, ACM SIGCOMM Computer Communication Review, 23:4, (249-257), Online publication date: 1-Oct-1993.
  315. ACM
    Jing H, Das A and Chung M Linear recursive networks and their applications in topological design and data routing Conference proceedings on Communications architectures, protocols and applications, (249-257)
  316. Abiteboul S, Cluet S and Milo T Querying and Updating the File Proceedings of the 19th International Conference on Very Large Data Bases, (73-84)
  317. Ahonen H, Mannila H and Nikunen E Forming grammars for structured documents Proceedings of the 2nd International Conference on Knowledge Discovery in Databases, (314-325)
  318. Narayanan A and Hashem L On abstract finite-state morphology Proceedings of the sixth conference on European chapter of the Association for Computational Linguistics, (297-304)
  319. Black E, Lafferty J and Roukos S Development and evaluation of a broad-coverage probabilistic grammar of English-language computer manuals Proceedings of the 30th annual meeting on Association for Computational Linguistics, (185-192)
  320. Rous J Computational aspects of M-grammars Proceedings of the fifth conference on European chapter of the Association for Computational Linguistics, (210-215)
  321. Wood P Factoring Augmented Regular Chain Programs Proceedings of the 16th International Conference on Very Large Data Bases, (255-263)
  322. Sharman R, Jelinek F and Mercer R Generating a grammar for statistical training Proceedings of the workshop on Speech and Natural Language, (267-274)
  323. Harbusch K An efficient parsing algorithm for Tree Adjoining Grammars Proceedings of the 28th annual meeting on Association for Computational Linguistics, (284-291)
  324. Maruyama H Structural disambiguation with constraint propagation Proceedings of the 28th annual meeting on Association for Computational Linguistics, (31-38)
  325. ACM
    Fass L (1989). Learnability of CFLs: inferring syntactic models from constituent structure, ACM SIGART Bulletin:108, (175-176), Online publication date: 1-Apr-1989.
  326. Reape M and Thompson H Parallel intersection and serial composition of finite state transducers Proceedings of the 12th conference on Computational linguistics - Volume 2, (535-539)
  327. Beale A Lexicon and grammar in probabilistic tagging of written English Proceedings of the 26th annual meeting on Association for Computational Linguistics, (211-216)
  328. Moshier M and Rounds W On the succinctness properties of unordered context-free grammars Proceedings of the 25th annual meeting on Association for Computational Linguistics, (112-116)
  329. Ristad E Defining natural language grammars in GPSG Proceedings of the 24th annual meeting on Association for Computational Linguistics, (40-44)
  330. Ristad E Computational complexity of current GPSG theory Proceedings of the 24th annual meeting on Association for Computational Linguistics, (30-39)
  331. Megiddo N and Wigderson A On play by means of computing machines Proceedings of the 1986 conference on Theoretical aspects of reasoning about knowledge, (259-274)
  332. ACM
    Smith A (1984). Plants, fractals, and formal languages, ACM SIGGRAPH Computer Graphics, 18:3, (1-10), Online publication date: 1-Jul-1984.
  333. ACM
    Smith A Plants, fractals, and formal languages Proceedings of the 11th annual conference on Computer graphics and interactive techniques, (1-10)
  334. ACM
    Monien B and Sudborough I Bandwidth constrained NP-Complete problems Proceedings of the thirteenth annual ACM symposium on Theory of computing, (207-217)
Contributors
  • Cornell University
  • Stanford University
  • Stanford University

Index Terms

  1. Introduction to Automata Theory, Languages and Computability

    Reviews

    Thomas T Sheehan

    It can be reasonably argued that there are three major foundations of computer science: mathematical descriptions of computational devices, the limits of mechanical computation, and the specification of formal languages. It can further be reasonably argued that this book provides a very rigorous, undergraduate-level treatment of all three topics. I assume that the authors did write this text for junior-level courses in the computer science curriculum that are usually found under roughly the same name. If so, they have, for the most part, succeeded. I have one small reservation, and that is given in the final paragraph of this review. Alan Turing defined the limits of the computable in his 1936 paper, ?On computable numbers with an application to the Entscheidungsproblem? [1]. In that paper, Turing described a device that could read and write across an infinite tape, each square of which contained a symbol from some finite alphabet. The device, now referred to as a ?Turing machine,? could manipulate those symbols by some finite and explicit set of rules. Part of Turing?s claim was that anything a human could do by symbolic manipulation, using that set of rules, could also be done by the Turing machine. Underlying Turing machines, however, are simpler abstract computing devices, and the simplest of those, finite automata, are introduced in chapter 2 of this book. While they are relatively simple machines, finite automata form the foundation for many concrete and abstract applications. The state transition diagrams used to describe the dynamic behavior of a class in object-oriented analysis and design are based on finite automata. Finite automata, in turn, lie at the heart of more complex abstract computing devices, such as push-down automata, which are discussed in chapter 6. This discussion of abstract computational devices builds in complexity, leading to chapter 8, which contains a clear and detailed description of a Turing machine, and an introduction to the associated topic of describing the languages that can be defined by computational devices. The following chapter, chapter 9, is an equally lucid discussion of the problem of decidability, with a formal proof of the existence of a problem about Turing machines that no Turing machine can solve. But there are parallel tracks operating here. In chapter 3, the authors neatly tie the topic of abstract computing devices to the topic of regular expressions, which define exactly the same languages that the various forms of automata describe. This is followed, in chapter 4, by an exploration of the properties of those regular languages. And that discussion yields algorithms for answering important questions about automata. One of these, possibly the most important, is the question of minimization: finding an equivalent automaton with the fewest possible states. The following chapter treats context-free grammars, the larger class of languages that play a central role in compiler technology. The final chapters introduce the theory of ?intractability,? and the techniques for determining whether or not a problem can be solved in polynomial time. As promised, this last paragraph will offer my one criticism of an otherwise excellent text. The topics introduced require a great deal of mathematical maturity to appreciate, maturity beyond that found in a course in discrete mathematics. But all too often, computer science undergraduates are expected to deal with these concepts, armed only with that discrete mathematics course. The authors rightly devote several pages in the first chapter to the topic of inductive proofs. And, indeed, the succeeding chapters rely heavily on inductive proofs. But they also rely heavily on a non-trivial level of familiarity with set theory, and I think it would have been useful to offer a similar review of that topic. This shows most clearly in the treatment of homomorphisms, an important part of exploring the closure properties of regular languages, which could have benefited from a formal discussion of both isomorphism and Nerode¿s theorem. Finally, a less mathematically rigorous treatment of many of these topics can be found in ¿Introduction to Computer Theory,¿ by Daniel I. A. Cohen. This is not a criticism of Cohen, who, I think would agree with my assessment. Rather, it is offered as an option to those who would like a gentler introduction to these fundamental topics. Online Computing Reviews Service

    Access critical reviews of Computing literature here

    Become a reviewer for Computing Reviews.

    Please enable JavaScript to view thecomments powered by Disqus.

    Recommendations