Java implementation of the most commonly used algorithms for exact string matching, where the pattern is given first.

Features

  • Brute Force algorithm
  • Deterministic Finite Automaton algorithm
  • Karp-Rabin algorithm
  • Shift Or algorithm
  • Morris-Pratt algorithm
  • Knuth-Morris-Pratt algorithm
  • Simon algorithm
  • Colussi algorithm
  • Galil-Giancarlo algorithm
  • Apostolico-Crochemore algorithm
  • Not So Naive algorithm
  • Boyer-Moore algorithm
  • Turbo BM algorithm
  • Apostolico-Giancarlo algorithm
  • Reverse Colussi algorithm
  • Horspool algorithm
  • Quick Search algorithm
  • Tuned Boyer-Moore algorithm
  • Zhu-Takaoka algorithm
  • Berry-Ravindran algorithm
  • Smith algorithm
  • Raita algorithm
  • Reverse Factor algorithm
  • Turbo Reverse Factor algorithm
  • Forward Dawg Matching algorithm
  • Backward Nondeterministic Dawg Matching algorithm
  • Backward Oracle Matching algorithm
  • Galil-Seiferas algorithm
  • Two Way algorithm
  • String Matching on Ordered Alphabets algorithm
  • Optimal Mismatch algorithm
  • Maximal Shift algorithm
  • Skip Search algorithm
  • KMP Skip Search algorithm

Project Activity

See All Activity >

License

GNU General Public License version 2.0 (GPLv2)

Follow Java String Search

Java String Search Web Site

Other Useful Business Software
Cybersecurity Management Software for MSPs Icon
Cybersecurity Management Software for MSPs

Secure your clients from cyber threats.

Define and Deliver Comprehensive Cybersecurity Services. Security threats continue to grow, and your clients are most likely at risk. Small- to medium-sized businesses (SMBs) are targeted by 64% of all cyberattacks, and 62% of them admit lacking in-house expertise to deal with security issues. Now technology solution providers (TSPs) are a prime target. Enter ConnectWise Cybersecurity Management (formerly ConnectWise Fortify) — the advanced cybersecurity solution you need to deliver the managed detection and response protection your clients require. Whether you’re talking to prospects or clients, we provide you with the right insights and data to support your cybersecurity conversation. From client-facing reports to technical guidance, we reduce the noise by guiding you through what’s really needed to demonstrate the value of enhanced strategy.
Rate This Project
Login To Rate This Project

User Reviews

Be the first to post a review of Java String Search!

Additional Project Details

Intended Audience

Developers

Programming Language

Java

Related Categories

Java Algorithms, Java Brute Force Tool

Registered

2010-09-12