You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
@article{OWENS_REPPY_TURON_2009, title={Regular-expression derivatives re-examined}, volume={19}, DOI={10.1017/S0956796808007090}, number={2}, journal={Journal of Functional Programming}, author={OWENS, SCOTT and REPPY, JOHN and TURON, AARON}, year={2009}, pages={173–190}} <div></div>
2009
+
@article{OWENS_REPPY_TURON_2009,
2010
+
title = {Regular-expression derivatives re-examined},
2011
+
volume = {19},
2012
+
doi = {10.1017/S0956796808007090},
2013
+
number = {2},
2014
+
journal = {Journal of Functional Programming},
2015
+
author = {OWENS, SCOTT and REPPY, JOHN and TURON, AARON},
2016
+
year = {2009},
2017
+
pages = {173–190}
2018
+
} <div></div>
2010
2019
2011
2020
@article{10.1145/363347.363387,
2012
-
author = {Thompson, Ken},
2013
-
title = {Programming Techniques: Regular expression search algorithm},
2014
-
year = {1968},
2015
-
issue_date = {June 1968},
2016
-
publisher = {Association for Computing Machinery},
2017
-
address = {New York, NY, USA},
2018
-
volume = {11},
2019
-
number = {6},
2020
-
issn = {0001-0782},
2021
-
url = {https://doi.org/10.1145/363347.363387},
2022
-
doi = {10.1145/363347.363387},
2023
-
abstract = {A method for locating specific character strings embedded in character text is described and an implementation of this method in the form of a compiler is discussed. The compiler accepts a regular expression as source language and produces an IBM 7094 program as object language. The object program then accepts the text to be searched as input and produces a signal every time an embedded string in the text matches the given regular expression. Examples, problems, and solutions are also presented.},
2024
-
journal = {Commun. ACM},
2025
-
month = {jun},
2026
-
pages = {419–422},
2027
-
numpages = {4},
2028
-
keywords = {match, regular expression, search}
2021
+
author = {Thompson, Ken},
2022
+
title = {Programming Techniques: Regular expression search algorithm},
2023
+
year = {1968},
2024
+
issue_date = {June 1968},
2025
+
publisher = {Association for Computing Machinery},
2026
+
address = {New York, NY, USA},
2027
+
volume = {11},
2028
+
number = {6},
2029
+
issn = {0001-0782},
2030
+
url = {https://doi.org/10.1145/363347.363387},
2031
+
doi = {10.1145/363347.363387},
2032
+
abstract = {A method for locating specific character strings embedded in character text is described and an implementation of this method in the form of a compiler is discussed. The compiler accepts a regular expression as source language and produces an IBM 7094 program as object language. The object program then accepts the text to be searched as input and produces a signal every time an embedded string in the text matches the given regular expression. Examples, problems, and solutions are also presented.},
title={A method for synthesizing sequential circuits},
2064
-
year={1955},
2065
-
volume={34},
2066
-
number={5},
2067
-
pages={1045-1079},
2068
-
keywords={},
2069
-
doi={10.1002/j.1538-7305.1955.tb03788.x}
2070
-
}
2071
-
2072
-
@Inbook{Alagar2011,
2073
-
author="Alagar, V. S.
2074
-
and Periyasamy, K.",
2075
-
title="Extended Finite State Machine",
2076
-
bookTitle="Specification of Software Systems",
2077
-
year="2011",
2078
-
publisher="Springer London",
2079
-
address="London",
2080
-
pages="105--128",
2081
-
abstract="The FSM models we have considered, in spite of many extensions to basic automaton, fall short in many aspects. They have to be extended further, as broadly outlined below, in order to model complex system behavior.",
2082
-
isbn="978-0-85729-277-3",
2083
-
doi="10.1007/978-0-85729-277-3_7",
2084
-
url="https://doi.org/10.1007/978-0-85729-277-3_7"
2085
-
}
2086
-
2087
-
@Article{ foster.ea:efsm:2020,
2088
-
abstract = {In this AFP entry, we provide a formalisation of extended finite state machines (EFSMs) where models are represented as finite sets of transitions between states. EFSMs execute traces to produce observable outputs. We also define various simulation and equality metrics for EFSMs in terms of traces and prove their strengths in relation to each other. Another key contribution is a framework of function definitions such that LTL properties can be phrased over EFSMs. Finally, we provide a simple example case study in the form of a drinks machine.},
2089
-
author = {Michael Foster and Achim D. Brucker and Ramsay G. Taylor and John Derrick},
title = {A method for synthesizing sequential circuits},
2073
+
year = {1955},
2074
+
volume = {34},
2075
+
number = {5},
2076
+
pages = {1045-1079},
2077
+
keywords = {},
2078
+
doi = {10.1002/j.1538-7305.1955.tb03788.x}
2079
+
}
2080
+
2081
+
@inbook{Alagar2011,
2082
+
author = {Alagar, V. S.
2083
+
and Periyasamy, K.},
2084
+
title = {Extended Finite State Machine},
2085
+
booktitle = {Specification of Software Systems},
2086
+
year = {2011},
2087
+
publisher = {Springer London},
2088
+
address = {London},
2089
+
pages = {105--128},
2090
+
abstract = {The FSM models we have considered, in spite of many extensions to basic automaton, fall short in many aspects. They have to be extended further, as broadly outlined below, in order to model complex system behavior.},
abstract = {In this AFP entry, we provide a formalisation of extended finite state machines (EFSMs) where models are represented as finite sets of transitions between states. EFSMs execute traces to produce observable outputs. We also define various simulation and equality metrics for EFSMs in terms of traces and prove their strengths in relation to each other. Another key contribution is a framework of function definitions such that LTL properties can be phrased over EFSMs. Finally, we provide a simple example case study in the form of a drinks machine.},
2098
+
author = {Michael Foster and Achim D. Brucker and Ramsay G. Taylor and John Derrick},
author = {Alur, Rajeev and Benedikt, Michael and Etessami, Kousha and Godefroid, Patrice and Reps, Thomas and Yannakakis, Mihalis},
2105
-
title = {Analysis of Recursive State Machines},
2106
-
year = {2005},
2107
-
issue_date = {July 2005},
2108
-
publisher = {Association for Computing Machinery},
2109
-
address = {New York, NY, USA},
2110
-
volume = {27},
2111
-
number = {4},
2112
-
issn = {0164-0925},
2113
-
url = {https://doi.org/10.1145/1075382.1075387},
2114
-
doi = {10.1145/1075382.1075387},
2115
-
abstract = {Recursive state machines (RSMs) enhance the power of ordinary state machines by allowing vertices to correspond either to ordinary states or to potentially recursive invocations of other state machines. RSMs can model the control flow in sequential imperative programs containing recursive procedure calls. They can be viewed as a visual notation extending Statecharts-like hierarchical state machines, where concurrency is disallowed but recursion is allowed. They are also related to various models of pushdown systems studied in the verification and program analysis communities.After introducing RSMs and comparing their expressiveness with other models, we focus on whether verification can be efficiently performed for RSMs. Our first goal is to examine the verification of linear time properties of RSMs. We begin this study by dealing with two key components for algorithmic analysis and model checking, namely, reachability (Is a target state reachable from initial states?) and cycle detection (Is there a reachable cycle containing an accepting state?). We show that both these problems can be solved in time O(nθ2) and space O(nθ), where n is the size of the recursive machine and θ is the maximum, over all component state machines, of the minimum of the number of entries and the number of exits of each component. From this, we easily derive algorithms for linear time temporal logic model checking with the same complexity in the model. We then turn to properties in the branching time logic CTL*, and again demonstrate a bound linear in the size of the state machine, but only for the case of RSMs with a single exit node.},
2116
-
journal = {ACM Trans. Program. Lang. Syst.},
2117
-
month = {jul},
2118
-
pages = {786–818},
2119
-
numpages = {33},
2120
-
keywords = {model checking, program analysis, Software verification, temporal logic, context-free languages, recursive state machines, pushdown automata}
2121
-
}
2113
+
author = {Alur, Rajeev and Benedikt, Michael and Etessami, Kousha and Godefroid, Patrice and Reps, Thomas and Yannakakis, Mihalis},
2114
+
title = {Analysis of Recursive State Machines},
2115
+
year = {2005},
2116
+
issue_date = {July 2005},
2117
+
publisher = {Association for Computing Machinery},
2118
+
address = {New York, NY, USA},
2119
+
volume = {27},
2120
+
number = {4},
2121
+
issn = {0164-0925},
2122
+
url = {https://doi.org/10.1145/1075382.1075387},
2123
+
doi = {10.1145/1075382.1075387},
2124
+
abstract = {Recursive state machines (RSMs) enhance the power of ordinary state machines by allowing vertices to correspond either to ordinary states or to potentially recursive invocations of other state machines. RSMs can model the control flow in sequential imperative programs containing recursive procedure calls. They can be viewed as a visual notation extending Statecharts-like hierarchical state machines, where concurrency is disallowed but recursion is allowed. They are also related to various models of pushdown systems studied in the verification and program analysis communities.After introducing RSMs and comparing their expressiveness with other models, we focus on whether verification can be efficiently performed for RSMs. Our first goal is to examine the verification of linear time properties of RSMs. We begin this study by dealing with two key components for algorithmic analysis and model checking, namely, reachability (Is a target state reachable from initial states?) and cycle detection (Is there a reachable cycle containing an accepting state?). We show that both these problems can be solved in time O(nθ2) and space O(nθ), where n is the size of the recursive machine and θ is the maximum, over all component state machines, of the minimum of the number of entries and the number of exits of each component. From this, we easily derive algorithms for linear time temporal logic model checking with the same complexity in the model. We then turn to properties in the branching time logic CTL*, and again demonstrate a bound linear in the size of the state machine, but only for the case of RSMs with a single exit node.},
2125
+
journal = {ACM Trans. Program. Lang. Syst.},
2126
+
month = {jul},
2127
+
pages = {786–818},
2128
+
numpages = {33},
2129
+
keywords = {model checking, program analysis, Software verification, temporal logic, context-free languages, recursive state machines, pushdown automata}
2130
+
}
2131
+
2132
+
@article{верещагин2000начала,
2133
+
title = {Начала теории множеств},
2134
+
author = {Верещагин, Николай Константинович and Шень, Александр},
0 commit comments