scispace - formally typeset
Open AccessBook

Introduction to Automata Theory, Languages, and Computation

TLDR
This book is a rigorous exposition of formal languages and models of computation, with an introduction to computational complexity, appropriate for upper-level computer science undergraduates who are comfortable with mathematical arguments.
Abstract
This book is a rigorous exposition of formal languages and models of computation, with an introduction to computational complexity. The authors present the theory in a concise and straightforward manner, with an eye out for the practical applications. Exercises at the end of each chapter, including some that have been solved, help readers confirm and enhance their understanding of the material. This book is appropriate for upper-level computer science undergraduates who are comfortable with mathematical arguments.

read more

Citations
More filters
Book

Disappearing Cryptography: Information Hiding: Steganography and Watermarking

TL;DR: This new edition of this best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques capable of withstanding the evolved forms of attack.
Book

Games, Puzzles, and Computation

TL;DR: This thesis develops the idea of game as computation to a greater degree than has been done previously, and presents a general family of games, called Constraint Logic, which is both mathematically simple and ideally suited for reductions to many actual board games.
Journal ArticleDOI

Fuzzy finite automata and fuzzy regular expressions with membership values in lattice-ordered monoids

TL;DR: The notions of L-fuzzy regular expressions are introduced and the Kleene theorem for NL-FFAs is given and it is shown that nondeterministic L- FFA (NL-FFA, for short) are more powerful than deterministic L -FFA (DL-FFS).
Journal ArticleDOI

The Compositional Security Checker: a tool for the verification of information flow security properties

TL;DR: An application in the area of network security is presented: it is shown that the theory (and the tool) can be reasonably applied also for singling out security flaws in a simple, yet paradigmatic, communication protocol.
Proceedings Article

Learning by Abstraction: The Neural State Machine

TL;DR: The Neural State Machine (NSM) as mentioned in this paper uses a probabilistic graph to represent the underlying semantics of an image and performs sequential reasoning over the graph, iteratively traversing its nodes to answer a given question or draw a new inference.
References
More filters
Book ChapterDOI

Representation of Events in Nerve Nets and Finite Automata

S. C. Kleene
TL;DR: This memorandum is devoted to an elementary exposition of the problems and of results obtained on the McCulloch-Pitts nerve net during investigations in August 1951.