Open AccessBook
Introduction to Automata Theory, Languages, and Computation
TLDR
This book is a rigorous exposition of formal languages and models of computation, with an introduction to computational complexity, appropriate for upper-level computer science undergraduates who are comfortable with mathematical arguments.Abstract:
This book is a rigorous exposition of formal languages and models of computation, with an introduction to computational complexity. The authors present the theory in a concise and straightforward manner, with an eye out for the practical applications. Exercises at the end of each chapter, including some that have been solved, help readers confirm and enhance their understanding of the material. This book is appropriate for upper-level computer science undergraduates who are comfortable with mathematical arguments.read more
Citations
More filters
Book
Disappearing Cryptography: Information Hiding: Steganography and Watermarking
TL;DR: This new edition of this best-selling book on cryptography and information hiding delineates a number of different methods to hide information in all types of digital media files, and includes 5 completely new chapters that introduce newer more sophisticated and refined cryptographic algorithms and techniques capable of withstanding the evolved forms of attack.
Book
Games, Puzzles, and Computation
TL;DR: This thesis develops the idea of game as computation to a greater degree than has been done previously, and presents a general family of games, called Constraint Logic, which is both mathematically simple and ideally suited for reductions to many actual board games.
Journal ArticleDOI
Fuzzy finite automata and fuzzy regular expressions with membership values in lattice-ordered monoids
Yongming Li,Witold Pedrycz +1 more
TL;DR: The notions of L-fuzzy regular expressions are introduced and the Kleene theorem for NL-FFAs is given and it is shown that nondeterministic L- FFA (NL-FFA, for short) are more powerful than deterministic L -FFA (DL-FFS).
Journal ArticleDOI
The Compositional Security Checker: a tool for the verification of information flow security properties
TL;DR: An application in the area of network security is presented: it is shown that the theory (and the tool) can be reasonably applied also for singling out security flaws in a simple, yet paradigmatic, communication protocol.
Proceedings Article
Learning by Abstraction: The Neural State Machine
TL;DR: The Neural State Machine (NSM) as mentioned in this paper uses a probabilistic graph to represent the underlying semantics of an image and performs sequential reasoning over the graph, iteratively traversing its nodes to answer a given question or draw a new inference.
References
More filters
Book ChapterDOI
Representation of Events in Nerve Nets and Finite Automata
TL;DR: This memorandum is devoted to an elementary exposition of the problems and of results obtained on the McCulloch-Pitts nerve net during investigations in August 1951.