{"title":"回顾字符串匹配算法和最近在GPU上的实现","authors":"Rolando Ramos-Frías, Miguel Vargas-Lombardo","doi":"10.14257/IJSIA.2017.11.6.06","DOIUrl":null,"url":null,"abstract":"String matching algorithms are an important element used in several computer science\nbb fields. These algorithms process strings of characters to find coincidences. The amount\nof processing required for modern applications that use string matching algorithms has\nincreased over the years and new algorithms and solutions have been developed. In this\npaper we present a state of the art for the various types of string matching algorithms;\nand also review recent implementations done in GPU.","PeriodicalId":46187,"journal":{"name":"International Journal of Security and Its Applications","volume":null,"pages":null},"PeriodicalIF":0.0000,"publicationDate":"2017-06-30","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"0","resultStr":"{\"title\":\"A Review of String Matching Algorithms and Recent Implementations using GPU\",\"authors\":\"Rolando Ramos-Frías, Miguel Vargas-Lombardo\",\"doi\":\"10.14257/IJSIA.2017.11.6.06\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"String matching algorithms are an important element used in several computer science\\nbb fields. These algorithms process strings of characters to find coincidences. The amount\\nof processing required for modern applications that use string matching algorithms has\\nincreased over the years and new algorithms and solutions have been developed. In this\\npaper we present a state of the art for the various types of string matching algorithms;\\nand also review recent implementations done in GPU.\",\"PeriodicalId\":46187,\"journal\":{\"name\":\"International Journal of Security and Its Applications\",\"volume\":null,\"pages\":null},\"PeriodicalIF\":0.0000,\"publicationDate\":\"2017-06-30\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"0\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"International Journal of Security and Its Applications\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.14257/IJSIA.2017.11.6.06\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"International Journal of Security and Its Applications","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.14257/IJSIA.2017.11.6.06","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
A Review of String Matching Algorithms and Recent Implementations using GPU
String matching algorithms are an important element used in several computer science
bb fields. These algorithms process strings of characters to find coincidences. The amount
of processing required for modern applications that use string matching algorithms has
increased over the years and new algorithms and solutions have been developed. In this
paper we present a state of the art for the various types of string matching algorithms;
and also review recent implementations done in GPU.
期刊介绍:
IJSIA aims to facilitate and support research related to security technology and its applications. Our Journal provides a chance for academic and industry professionals to discuss recent progress in the area of security technology and its applications. Journal Topics: -Access Control -Ad Hoc & Sensor Network Security -Applied Cryptography -Authentication and Non-repudiation -Cryptographic Protocols -Denial of Service -E-Commerce Security -Identity and Trust Management -Information Hiding -Insider Threats and Countermeasures -Intrusion Detection & Prevention -Network & Wireless Security -Peer-to-Peer Security -Privacy and Anonymity -Secure installation, generation and operation -Security Analysis Methodologies -Security assurance -Security in Software Outsourcing -Security products or systems -Security technology -Systems and Data Security