Build an ε-NFA from a regular expression using Thompson's construction, step through the construction, convert the final ε-NFA to a DFA, and simulate input strings on both machines.