Sciweavers

15 search results - page 2 / 3
» Sequencing and Counting with the multicost-regular Constrain...
Sort
View
HOTI
2008
IEEE
14 years 20 days ago
Constraint Repetition Inspection for Regular Expression on FPGA
— Recent network intrusion detection systems (NIDS) use regular expressions to represent suspicious or malicious character sequences in packet payloads in a more efficient way. ...
Miad Faezipour, Mehrdad Nourani
JDCTA
2010
225views more  JDCTA 2010»
13 years 1 months ago
Multi-Level Weighted Sequential Pattern Mining Based on Prime Encoding
Encoding can express the hierarchical relationship in the area of mining the multi-level sequential pattern, up to now all the algorithms of which find frequent sequences just acc...
Yun Li, Lianglei Sun, Jiang Yin, Wenyan Bao, Mengy...
TCS
2008
13 years 6 months ago
Algorithms for subsequence combinatorics
A subsequence is obtained from a string by deleting any number of characters; thus in contrast to a substring, a subsequence is not necessarily a contiguous part of the string. Co...
Cees H. Elzinga, Sven Rahmann, Hui Wang
CPM
1993
Springer
154views Combinatorics» more  CPM 1993»
13 years 10 months ago
On Suboptimal Alignments of Biological Sequences
It is widely accepted that the optimal alignment between a pair of proteins or nucleic acid sequences that minimizes the edit distance may not necessarily re ect the correct biolog...
Dalit Naor, Douglas L. Brutlag
CORR
2008
Springer
114views Education» more  CORR 2008»
13 years 6 months ago
Temporal Support of Regular Expressions in Sequential Pattern Mining
Classic algorithms for sequential pattern discovery, return all frequent sequences present in a database. Since, in general, only a few ones are interesting from a user's poin...
Leticia I. Gómez, Bart Kuijpers, Alejandro ...