scholarly journals A Cyclic Model of a Finite Automaton

1972 ◽  
Vol 5 (1) ◽  
pp. 325-330 ◽  
Author(s):  
E.A. Yakubaitis
2020 ◽  
Vol 2 (1) ◽  
Author(s):  
Carlo Mereghetti ◽  
Beatrice Palano ◽  
Simone Cialdi ◽  
Valeria Vento ◽  
Matteo G. A. Paris ◽  
...  
Keyword(s):  

1991 ◽  
Vol 88 (1) ◽  
pp. 99-116 ◽  
Author(s):  
Sang Cho ◽  
Dung T. Huynh
Keyword(s):  

2015 ◽  
Vol 20 (3) ◽  
pp. 262-269 ◽  
Author(s):  
Ryosuke Nakamura ◽  
Kenji Sawada ◽  
Seiichi Shin ◽  
Kenji Kumagai ◽  
Hisato Yoneda

2021 ◽  
Vol 12 (3) ◽  
pp. 150-156
Author(s):  
A. V. Galatenko ◽  
◽  
V. A. Kuzovikhina ◽  

We propose an automata model of computer system security. A system is represented by a finite automaton with states partitioned into two subsets: "secure" and "insecure". System functioning is secure if the number of consecutive insecure states is not greater than some nonnegative integer k. This definition allows one to formally reflect responsiveness to security breaches. The number of all input sequences that preserve security for the given value of k is referred to as a k-secure language. We prove that if a language is k-secure for some natural and automaton V, then it is also k-secure for any 0 < k < k and some automaton V = V (k). Reduction of the value of k is performed at the cost of amplification of the number of states. On the other hand, for any non-negative integer k there exists a k-secure language that is not k"-secure for any natural k" > k. The problem of reconstruction of a k-secure language using a conditional experiment is split into two subcases. If the cardinality of an input alphabet is bound by some constant, then the order of Shannon function of experiment complexity is the same for al k; otherwise there emerges a lower bound of the order nk.


2009 ◽  
Vol 20 (04) ◽  
pp. 647-667
Author(s):  
FRANÇOIS CANTIN ◽  
AXEL LEGAY ◽  
PIERRE WOLPER

This paper considers the problem of computing the real convex hull of a finite set of n-dimensional integer vectors. The starting point is a finite-automaton representation of the initial set of vectors. The proposed method consists in computing a sequence of automata representing approximations of the convex hull and using extrapolation techniques to compute the limit of this sequence. The convex hull can then be directly computed from this limit in the form of an automaton-based representation of the corresponding set of real vectors. The technique is quite general and has been implemented.


1994 ◽  
Vol 100 (12) ◽  
pp. 9007-9017 ◽  
Author(s):  
O. Brackhagen ◽  
O. Kühn ◽  
J. Manz ◽  
V. May ◽  
R. Meyer

2021 ◽  
Vol 28 (2) ◽  
pp. 89-100

It is inevitable for networks to be invaded during operation. The intrusion tolerance technology comes into being to enable invaded networks to provide the necessary network services. This paper introduces an automatic learning mechanism of the intrusion tolerance system to update network security strategy, and derives an intrusion tolerance finite automaton model from an existing intrusion tolerance model. The proposed model was quantified by the Markov theory to compute the stable probability of each state. The calculated stable probabilities provide the theoretical guidance and basis for administrators to better safeguard network security. Verification results show that it is feasible, effective, and convenient to integrate the Markov model to the intrusion tolerance finite automaton.


10.37236/6106 ◽  
2017 ◽  
Vol 24 (2) ◽  
Author(s):  
Nicola Durante ◽  
Alessandro Siciliano

In this paper we construct infinite families of non-linear maximum rank distance codes by using the setting of bilinear forms of a finite vector space. We also give a geometric description of such codes by using the cyclic model for the field reduction of finite geometries and we show that these families contain the non-linear maximum rank distance codes recently provided by Cossidente, Marino and Pavese.


Sign in / Sign up

Export Citation Format

Share Document