12 references, page 1 of 2 [1] Alfred V. Aho, Monica S. Lam, Ravi Sethi, and Jeffrey D. Ullman. Compilers: Principles, Techniques, and Tools. Addison Wesley, 2nd edition, 2006.

[2] Yariv Ephraim and Neri Merhav. Hidden markov processes. IEEE Transactions on Information Theory, 48:1518-1569, 2002.

[3] Shai Fine, Yoram Singer, and Naftali Tishby. The hierarchical hidden markov model: Analysis and applications. Machile Learning, 32:41-62, 1998.

[4] Jiawei Han, Micheline Kamber, and Jian Pei. Data Mining: Concepts and Techniques. The Morgan Kaufmann Series in Data Management Systems. Morgan Kaufmann, 2nd edition, 2005.

[5] Daniel Jurafsky and James H. Martin. Speech and Language Processing: An Introduction to Natural Language Processing, Computational Linguistics and Speech Recognition. Prentice Hall, 2nd edition, 2008.

[6] John R. Levine, Tony Mason, and Doug Brown. lex&yacc. O'Reilly, 2nd edition, 1992.

[7] Andrey Andreyevich Markov. Extension of the limit theorems of probability theory to a sum of variables connected in a chain. R. Howard, Dynamic Probabilistic Systems volume 1, Appendix B. John Wiley and Sons, 1971.

[8] Andrew McCallum, Dayne Freitag, and Fernando Pereira. Maximum entropy markov models for information extraction and segmentation. In Proc. of the 17th International Conference on Machine Learning, pages 591- 598, 2000.

[9] J. R. Nawrocki. Conflict detection and resolution in a lexical analyzer generator. Information Processing Letters, 38:323-328, 1991.

[10] Lawrence R. Rabiner. A tutorial on hidden markov models and selected applications in speech recognition. In Proceedings of the IEEE, volume 77, pages 257-286, 1989.