Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 230,858,994 papers from all fields of science
Search
Sign In
Create Free Account
Nondeterministic finite automaton
Known as:
Nondeterministic Finite State Machine
, Epsilon closure
, Nondeterministic finite automata
Expand
In automata theory, a finite state machine is called a deterministic finite automaton (DFA), if * each of its transitions is uniquely determined by…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
49 relations
Actor model
Alternating finite automaton
Alternating tree automata
Arden's Rule
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2010
2010
QFilter: rewriting insecure XML queries to secure ones using non-deterministic finite automata
Bo Luo
,
Dongwon Lee
,
Wang-Chien Lee
,
Peng Liu
The VLDB journal
2010
Corpus ID: 7244752
In this paper, we ask whether XML access control can be supported when underlying (XML or relational) storage system does not…
Expand
2010
2010
Optimal path selection technique for flooding in link state routing protocol using forwarding mechanisms in MANET
Shakkeera
International Conference on Communication and…
2010
Corpus ID: 15565147
A mobile ad hoc network (MANET) is an autonomous network that consists of mobile nodes that communicate with each other over…
Expand
2009
2009
Some algorithms for equivalent transformation of nondeterministic finite automata
B. Mel'nikov
,
M. R. Saifullina
2009
Corpus ID: 121899729
In this paper we consider algorithms which allow one to combine several states of a nondeterministic finite automaton into one…
Expand
Highly Cited
2006
Highly Cited
2006
Forensic Analysis for Epidemic Attacks in Federated Networks
Yinglian Xie
,
Vyas Sekar
,
M. Reiter
,
Hui Zhang
Proceedings of the IEEE International Conference…
2006
Corpus ID: 12413799
We present the design of a Network Forensic Alliance (NFA), to allow multiple administrative domains (ADs) to jointly locate the…
Expand
Highly Cited
2006
Highly Cited
2006
In-broker access control: towards efficient end-to-end performance of information brokerage systems
Fengjun Li
,
Bo Luo
,
+4 authors
C. Chu
Sensor Networks, Ubiquitous, and Trustworthy…
2006
Corpus ID: 10162254
An XML brokerage system is a distributed XML database system that comprises data sources and brokers which, respectively, hold…
Expand
Highly Cited
2004
Highly Cited
2004
Assessment of the effects of ozone exposure and plant competition on the reproductive ability of three therophytic clover species from Iberian pastures
B. Gimeno
,
V. Bermejo
,
J. Sanz
,
D. D. L. Torre
,
J. M. Gil
2004
Corpus ID: 53393690
1997
1997
Simulating the Immune Response on a Distributed Parallel Computer
F. Castiglione
,
M. Bernaschi
,
S. Succi
1997
Corpus ID: 61814329
The application of ideas and methods of statistical mechanics to problems of biological relevance is one of the most promising…
Expand
1996
1996
Controller optimization for protocol intensive applications
Andrew Crews
,
F. Brewer
Proceedings EURO-DAC '96. European Design…
1996
Corpus ID: 229525
Applications implementing complex protocols tax the capabilities of conventional finite state machine synthesis techniques. In…
Expand
Highly Cited
1993
Highly Cited
1993
The maximum set of permissible behaviors for FSM networks
Yosinori Watanabe
,
R. Brayton
International Conference on Computer Aided Design
1993
Corpus ID: 7418924
This paper is concerned with the problem of optimizing systems of interacting sequential circuit components. Specifically, we…
Expand
1990
1990
Method of analysing extended finite-state machine specifications
B. Sarikaya
,
V. Koukoulidis
,
G. Bochmann
Computer Communications
1990
Corpus ID: 17870300
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE