On 04/23/2013 07:21 PM, Tim Shen wrote:
I've made a proposal under the guide of application. Is it detailed
and realistic?

Out of curiosity, do you plan to use a Thompson automaton where possible, or just NFAs throughout?

--
Florian Weimer / Red Hat Product Security Team

Reply via email to