Aho-Corasick algorithm as implemented in Java by Danny Yoo, with little improvements
☆26May 20, 2014Updated 11 years ago
Alternatives and similar repositories for aho-corasick
Users that are interested in aho-corasick are comparing it to the libraries listed below. We may earn a commission when you buy through links labeled 'Ad' on this page.
Sorting:
- Fast multi-string search☆17Jun 9, 2023Updated 2 years ago
- A simple chess engine☆11Dec 16, 2018Updated 7 years ago
- Risk Minimization Algorithms in Structured Prediction (JMLR 2016)☆13Jan 26, 2017Updated 9 years ago
- An R package containing utilities for institutional researchers. This package is also used to support the Introduction to R and LaTeX doc…☆15Mar 13, 2019Updated 7 years ago
- Java implementation of the Aho-Corasick algorithm for efficient string matching☆975May 21, 2025Updated 10 months ago
- Managed hosting for WordPress and PHP on Cloudways • AdManaged hosting with the flexibility to host WordPress, Magento, Laravel, or PHP apps, on multiple cloud providers. Cloudways by DigitalOcean.
- Tidy Simultaneous Confidence Intervals for Multinomial Proportions☆11Apr 9, 2020Updated 5 years ago
- Datasets, mainly related to Entity Linking and biological corpus.☆10May 24, 2020Updated 5 years ago
- Implementation of Oridinal Classification Paper using Logistic Regression and SVM☆12Jun 10, 2017Updated 8 years ago
- Tarjan's implementation of the Chu-Liu-Edmonds algorithm for finding min/max spanning trees of dense graphs.☆11Apr 19, 2015Updated 10 years ago
- A crawler which uses regular expression to catch data from website.☆48Feb 6, 2010Updated 16 years ago
- Natural language processing tools developed by the World Bank's DECAT unit. A suite of text preprocessing and cleaning algorithms for NLP…☆10Jun 11, 2022Updated 3 years ago
- Updates a Route53 Zone with your computer's public IP☆12May 21, 2024Updated last year
- A dk.brics FSM to regular-expression-string converter☆10Jul 12, 2025Updated 8 months ago
- ❇️ The best modules for Markov Logic Networks condensed in one framework.☆13Dec 20, 2017Updated 8 years ago
- NordVPN Threat Protection Pro™ • AdTake your cybersecurity to the next level. Block phishing, malware, trackers, and ads. Lightweight app that works with all browsers.
- Auto Differentiate from scratch based on Autograd☆11Jun 21, 2022Updated 3 years ago
- The implementation of gradient boosting machine for concordance index learning.☆15Oct 8, 2013Updated 12 years ago
- Application which use JavaFX, SQLite, JDBC, Log4j, Maven. To see how it works (in animation) open README.☆10May 11, 2017Updated 8 years ago
- Please visit this repo for enhanced and updated open source code☆14Dec 14, 2025Updated 3 months ago
- LeetCode题解,140道题完整版☆17Oct 9, 2013Updated 12 years ago
- Code for "Learning Unitary Operators with Help From u(n)", AAAI-17. (https://arxiv.org/abs/1607.04903)☆17Jan 10, 2017Updated 9 years ago
- An octree library for Java.☆11Aug 21, 2020Updated 5 years ago
- Node.js client to interact with Centrifugo v1 HTTP API☆11Sep 2, 2018Updated 7 years ago
- minimal examples of brat annotation visualizations☆17Jan 21, 2015Updated 11 years ago
- 1-Click AI Models by DigitalOcean Gradient • AdDeploy popular AI models on DigitalOcean Gradient GPU virtual machines with just a single click and start building anything your business needs.
- Topic modeling with first-order logic (FOL) domain knowledge☆33Mar 17, 2012Updated 14 years ago
- CRF(Conditional Random Field) Layer for TensorFlow 1.X with many powerful functions☆15Jan 3, 2020Updated 6 years ago
- Web scraper for Scala☆37Mar 11, 2013Updated 13 years ago
- This project provides a word hierarchy builder. It builds a tree out of a set of words which can then be navigated by a WordProcessor to …☆20Nov 10, 2024Updated last year
- gated cnn (Language Modeling with Gated Convolutional Networks)☆18Jan 3, 2017Updated 9 years ago
- This is a sample approach of data analysis in security scene.☆18Oct 21, 2018Updated 7 years ago
- A snapshot state wrapper for the Jetpack Datastore library.☆13Jun 7, 2023Updated 2 years ago
- Java implementation of Thompson Construction Algorithm for converting regular expressions into non-deterministic finite automata (NFAs)☆18Oct 10, 2016Updated 9 years ago
- Music player Slowly coming to life.☆13Nov 9, 2019Updated 6 years ago
- End-to-end encrypted cloud storage - Proton Drive • AdSpecial offer: 40% Off Yearly / 80% Off First Month. Protect your most important files, photos, and documents from prying eyes.
- a memcached proxy with energy and pep☆79Nov 2, 2017Updated 8 years ago
- Simple Java implementation for PDA, DFA and NFA.☆14May 17, 2012Updated 13 years ago
- A prefix tree☆36Aug 9, 2013Updated 12 years ago
- Apache Nifi Hello World Example☆22Jan 26, 2018Updated 8 years ago
- 15yan, A client that use data binding. http://www.15yan.com☆12Dec 14, 2015Updated 10 years ago
- i wrote an excellent, performant, redis-backed timeseries denormalization database (ala RRDTool) 5 years ago, but never documented it, bu…☆43Dec 15, 2023Updated 2 years ago
- The Skeletons Character Pack is a bundle of characters assets that contain 4 stylised low-poly skeleton character assets.☆21Feb 2, 2024Updated 2 years ago