scispace - formally typeset
Open AccessBook

Introduction to Automata Theory, Languages, and Computation

TLDR
This book is a rigorous exposition of formal languages and models of computation, with an introduction to computational complexity, appropriate for upper-level computer science undergraduates who are comfortable with mathematical arguments.
Abstract
This book is a rigorous exposition of formal languages and models of computation, with an introduction to computational complexity. The authors present the theory in a concise and straightforward manner, with an eye out for the practical applications. Exercises at the end of each chapter, including some that have been solved, help readers confirm and enhance their understanding of the material. This book is appropriate for upper-level computer science undergraduates who are comfortable with mathematical arguments.

read more

Citations
More filters
Journal ArticleDOI

Equivalence in knowledge representation: automata, recurrent neural networks, and dynamical fuzzy systems

TL;DR: In this article, a synthesis method is proposed for mapping fuzzy finite state automata (FFA) into recurrent neural networks, which is suitable for direct implementation in very large scale integration (VLSI) systems.
Journal ArticleDOI

Designing Compact and Maximally Permissive Deadlock Avoidance Policies for Complex Resource Allocation Systems Through Classification Theory: The Nonlinear Case

TL;DR: This paper distinguishes between the off-line and the on-line computation that is required for the effective implementation of the maximally permissive DAP, and it seeks to develop representations of this policy that will require minimal on- line computation.
Book ChapterDOI

Model Checking and Modular Verification

TL;DR: A framework for compositional verification of finite state processes is described, based on a subset of the logic CTL for which satisfaction is preserved under composition and a preorder on structures which captures the relation between a component and a system containing the component.
Proceedings ArticleDOI

Creating Vulnerability Signatures Using Weakest Preconditions

TL;DR: This work investigates new techniques for automatically generating sound vulnerability signatures with fewer false negatives than previous research using program binary analysis and creates algorithms for generating vulnerability signatures that are based on computing weakest preconditions (WP).
Book ChapterDOI

Evolution of process choreographies in DYCHOR

TL;DR: The DYCHOR (DYnamic CHOReographies) framework is presented, which allows process engineers to detect how changes of private processes may affect related public views and – if so – how they can be propagated to the public and private processes of partners.
References
More filters
Book ChapterDOI

Representation of Events in Nerve Nets and Finite Automata

S. C. Kleene
TL;DR: This memorandum is devoted to an elementary exposition of the problems and of results obtained on the McCulloch-Pitts nerve net during investigations in August 1951.