Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 227,741,319 papers from all fields of science
Search
Sign In
Create Free Account
Knuth–Morris–Pratt algorithm
Known as:
Knuth-Morris-Pratt string matching algorithm
, Knuth-Pratt-Morris
, Knuth–Morris–Pratt
Expand
In computer science, the Knuth–Morris–Pratt string searching algorithm (or KMP algorithm) searches for occurrences of a "word" W within a main "text…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
12 relations
Algorithm
Boyer–Moore–Horspool algorithm
Computational complexity theory
Computer science
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
Negative Selection and Knuth Morris Pratt Algorithm for Anomaly Detection
C. Maldonado
,
M. Peñas
,
María Victoria López López
2016
Corpus ID: 64498148
In this paper an algorithm for detecting anomalous behavior on computer systems is proposed. The work is based on information…
Expand
2016
2016
Python based parallel application of Knuth-Morris-Pratt algorithm
Sercan Aygün
,
Ece Olcay Günes
,
Lida Kouhalvandi
IEEE 4th Workshop on Advances in Information…
2016
Corpus ID: 9083090
Parallel computations in multicore architectures are in big interest these days. Nearly all newly manufactured computers have…
Expand
2016
2016
Negative Selection and Knuth Morris Pratt Algorithm for Anomaly Detection
Cesar Byron Guevara Maldonado
,
Matilde Santos Peñas
,
Maria Victoria Lopez Lopez
IEEE Latin America Transactions
2016
Corpus ID: 136674248
In this paper an algorithm for detecting anomalous behavior on computer systems is proposed. The work is based on information…
Expand
2013
2013
Reconstructing the Knuth-Morris-Pratt algorithm
F. Pottier
2013
Corpus ID: 5931370
In my view, the Knuth-Morris-Pratt string searching algorithm is one of those “magic” algorithms that do something wonderful but…
Expand
2011
2011
Fingerprint Detection Using Knuth-Morris-Pratt Algorithm
Amelia Cahya Kartika
2011
Corpus ID: 57253357
Fingerprint detection technology is used very often and the general public in the identification of a person’s identity, even…
Expand
2009
2009
A modified Knuth-Morris-Pratt Algorithm for Zero-day Polymorphic Worms Detection
Mohssen M. Z. E. Mohammed
,
H. Chan
,
N. Ventura
,
M. Hashim
,
Izzeldin Amin
Security and Management
2009
Corpus ID: 36377062
Internet worms pose a major threat to institutions, companies, organizations, universities, and the like, and their destruction…
Expand
Highly Cited
2007
Highly Cited
2007
DESIGN AND VALIDATION OF A HIGH-LIFT LOW-PRESSURE TURBINE BLADE
M. McQuilling
2007
Corpus ID: 109620736
McQuilling, Mark Wayne. Ph.D. Engineering Ph.D. Program, Department of Mechanical and Materials Engineering, Wright State…
Expand
Highly Cited
2004
Highly Cited
2004
Pinocchio: Incentives for Honest Participation in Distributed Trust Management
Alberto Fernandes
,
Evangelos Kotsovinos
,
Sven A. M. Östring
,
Boris Dragovic
Trust Management
2004
Corpus ID: 18724490
In this paper, we introduce a framework for providing incentives for honest participation in global-scale distributed trust…
Expand
Highly Cited
2001
Highly Cited
2001
Polymer-matrix composites subjected to low-velocity impact: effect of laminate configuration
N. Naik
,
S. Meduri
2001
Corpus ID: 133593866
Highly Cited
1978
Highly Cited
1978
Precocene II causes atrophy of corpora allata in Locusta migratoria
M. Pener
,
L. Orshan
,
J. Wilde
Nature
1978
Corpus ID: 4199523
BOWERS et al.1 found that chromene derivatives extracted from the plant Ageratum houstonianum have ‘anti-juvenile hormone…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE