Skip to search formSkip to main content
You are currently offline. Some features of the site may not work correctly.

Nigel Horspool

Known as: Horspool 
R. Nigel Horspool is a professor of computer science at the University of Victoria. He invented the Boyer–Moore–Horspool algorithm, a fast string… Expand
Wikipedia

Papers overview

Semantic Scholar uses AI to extract papers important to this topic.
Review
2017
Review
2017
Carrying Out a Systematic Review as a Master's Thesis - Rumona Dickson, M. Gemma Cherry and Angela Boland Defining My Review… Expand
Highly Cited
2009
Highly Cited
2009
There is an emerging recognition that the diversity of life comprises both biological and cultural diversity. In the past… Expand
  • table 1
  • table 2
Highly Cited
2008
Highly Cited
2008
Trade-off models commonly invoke financial transaction costs in order to explain observed leverage fluctuations. This paper… Expand
  • table 2
  • table 3
  • table 4
  • figure 1
  • figure 2
2006
2006
110 CSEG RECORDER 2006 Special Edition Continued on Page 111 Seismic attributes have come a long way since their intro d u ction… Expand
  • figure 3
  • figure 9
Highly Cited
2005
Highly Cited
2005
A seismic attribute is a quantitative measure of a seismic characteristic of interest. Analysis of attributes has been integral… Expand
Highly Cited
2004
Highly Cited
2004
Abstract The geometry, kinematics and rates of active extension in Lazio–Abruzzo, Italian Apennines, have been measured in order… Expand
  • figure 1
  • figure 2
  • figure 5
  • figure 7
  • figure 8
Highly Cited
2003
Highly Cited
2003
This chapter introduces a project named eDiamond, which aims to develop a Grid-enabled federated database of annotated mammograms… Expand
  • figure 41.1
  • figure 41.2
  • figure 41.3
  • figure 41.4
  • figure 41.5
Highly Cited
2002
Highly Cited
2002
How does a literary text get to have literary form, and what is the relation between literary form and linguistic form? This… Expand
Review
2001
Review
2001
In the light of recent significant progress on both the observational and theoretical fronts, we review the status of white dwarf… Expand
  • figure 1
  • figure 2
  • figure 3
  • figure 4
  • figure 5
Highly Cited
2001
Highly Cited
2001
The performance of signature-based network intrusion detection tools is dominated by the string matching of packets against many… Expand
  • figure 2
  • figure 3
  • figure 4
  • figure 5
  • figure 6