Open AccessBook
Introduction to Automata Theory, Languages, and Computation
TLDR
This book is a rigorous exposition of formal languages and models of computation, with an introduction to computational complexity, appropriate for upper-level computer science undergraduates who are comfortable with mathematical arguments.Abstract:
This book is a rigorous exposition of formal languages and models of computation, with an introduction to computational complexity. The authors present the theory in a concise and straightforward manner, with an eye out for the practical applications. Exercises at the end of each chapter, including some that have been solved, help readers confirm and enhance their understanding of the material. This book is appropriate for upper-level computer science undergraduates who are comfortable with mathematical arguments.read more
Citations
More filters
Journal ArticleDOI
Equivalence in knowledge representation: automata, recurrent neural networks, and dynamical fuzzy systems
TL;DR: In this article, a synthesis method is proposed for mapping fuzzy finite state automata (FFA) into recurrent neural networks, which is suitable for direct implementation in very large scale integration (VLSI) systems.
Journal ArticleDOI
Designing Compact and Maximally Permissive Deadlock Avoidance Policies for Complex Resource Allocation Systems Through Classification Theory: The Nonlinear Case
TL;DR: This paper distinguishes between the off-line and the on-line computation that is required for the effective implementation of the maximally permissive DAP, and it seeks to develop representations of this policy that will require minimal on- line computation.
Book ChapterDOI
Model Checking and Modular Verification
Orna Grumberg,David E. Long +1 more
TL;DR: A framework for compositional verification of finite state processes is described, based on a subset of the logic CTL for which satisfaction is preserved under composition and a preorder on structures which captures the relation between a component and a system containing the component.
Proceedings ArticleDOI
Creating Vulnerability Signatures Using Weakest Preconditions
TL;DR: This work investigates new techniques for automatically generating sound vulnerability signatures with fewer false negatives than previous research using program binary analysis and creates algorithms for generating vulnerability signatures that are based on computing weakest preconditions (WP).
Book ChapterDOI
Evolution of process choreographies in DYCHOR
TL;DR: The DYCHOR (DYnamic CHOReographies) framework is presented, which allows process engineers to detect how changes of private processes may affect related public views and – if so – how they can be propagated to the public and private processes of partners.
References
More filters
Book ChapterDOI
Representation of Events in Nerve Nets and Finite Automata
TL;DR: This memorandum is devoted to an elementary exposition of the problems and of results obtained on the McCulloch-Pitts nerve net during investigations in August 1951.