



    An Introduction to the Theory of Formal Languages and AutomataIn the latter half of the 1950’s, Noam Chomsky began to develop mathematical models for the description of natural languages. Two disciplines originated in his work and have grown to maturity. The first of these is the theory of formal grammars, a branch of mathematics which has proven to be of great interest to information and computer... 

Dynamics of Complex Systems (Studies in Nonlinearity)The study of complex systems in a unified framework has become recognized in recent years as a new scientific discipline, the ultimate in the interdisciplinary fields. Breaking down the barriers between physics, chemistry, and biology and the socalled soft sciences of psychology, sociology, economics and anthropology, this text explores the...   Theory of Finite Automata With an Introduction to Formal LanguagesIt often seems that mathematicians regularly provide answers well before the rest of the world finds reasons to ask the questions. The operation of the networks of relays used in the first computers is exactly described by Boolean functions. George Boole thereby made his contribution to computer science in the mid1800s, and Boolean algebra is used...   Neural Network Modeling: Statistical Mechanics and Cybernetic PerspectivesNeural Network Modeling offers a cohesive approach to the statistical mechanics and principles of cybernetics as a basis for neural network modeling. It brings together neurobiologists and the engineers who design intelligent automata to understand the physics of collective behavior pertinent to neural elements and the selfcontrol aspects of... 

  FiniteState Language Processing (Language, Speech, and Communication)
Finitestate devices, which include finitestate automata, graphs, and finitestate transducers, are in wide use in many areas of computer science. Recently, there has been a resurgence of the use of finitestate devices in all aspects of computational linguistics, including dictionary encoding, text processing, and speech processing. This...   Disruptive Security Technologies with Mobile Code and PeertoPeer NetworksThe traditional fortress mentality of system security has proven ineffective to attacks by disruptive technologies. This is due largely to their reactive nature. Disruptive security technologies, on the other hand, are proactive in their approach to attacks. They allow systems to adapt to incoming threats, removing many of the vulnerabilities... 



Result Page: 10 9 8 7 6 5 4 3 2 1 