Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Aho–Corasick algorithm

Known as: Aho-Corasick algorithm, Margaret J. Corasick, Aho–Corasick string matching algorithm 
In computer science, the Aho–Corasick algorithm is a string searching algorithm invented by Alfred V. Aho and Margaret J. Corasick. It is a kind of… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
2014
2014
Pattern discovery is one of the fundamental tasks in bioinformatics and pattern recognition is a powerful technique for searching… Expand
Is this relevant?
2011
2011
With its 9 cores per chip, the IBM Cell/Broadband Engine (Cell) can deliver an impressive amount of compute power and benefit the… Expand
  • figure 1
  • figure 2
  • figure 4
  • figure 3
  • figure 5
Is this relevant?
2010
2010
With rapid advancement in Internet technology and usages, some emerging applications in data communications and network security… Expand
  • figure 1
  • figure 2
  • table I
  • table II
  • figure 3
Is this relevant?
Highly Cited
2008
Highly Cited
2008
Pattern matching is one of the most important components for the content inspection based applications of network security, and… Expand
  • figure 1
  • figure 5
  • figure 3
  • figure 4
  • figure 6
Is this relevant?
2007
2007
The Aho-Corasick (AC) algorithm is a very flexible and efficient but memory-hungry pattern matching algorithm that can scan the… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2006
Highly Cited
2006
Deep Packet Inspection (DPI) refers to examining both packet header and payload to look for predefined patterns, which is… Expand
  • figure 1
  • figure 2
  • figure 3
  • table 1
  • figure 4
Is this relevant?
2002
2002
Techniques in processing text files "as is" are presented, in which given text files are processed without modification. The… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Is this relevant?
Highly Cited
2001
Highly Cited
2001
The performance of signature-based network intrusion detection tools is dominated by the string matching of packets against many… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 6
Is this relevant?
1998
1998
Abstract Aho and Corasick presented a string pattern matching machine to locate multiple keywords. However, the AC machine could… Expand
Is this relevant?
1993
1993
Imperative programs can be derived using methods like stepwise refinement, but they do not lend themselves very well to… Expand
Is this relevant?