-
2
-
-
0016518897
-
Efficient string matching: An aid to bibliographic search
-
A. V. Abo and M. J. Corasick. Efficient string matching: An aid to bibliographic search. Communications of the ACM, 18(6):333-340, 1975.
-
(1975)
Communications of the ACM
, vol.18
, Issue.6
, pp. 333-340
-
-
Abo, A.V.1
Corasick, M.J.2
-
4
-
-
18644368071
-
Implementation results of bloom filters for string matching
-
IEEE Computer Society
-
M. Attig, S. Dharmapurikar, and J. Lockwood. Implementation results of bloom filters for string matching. In Proceedings of the Field-Programmable Custom Computing Machines, 12th Annual IEEE Symposium on (FCCM'04), pages 322-323. IEEE Computer Society, 2004.
-
(2004)
Proceedings of the Field-programmable Custom Computing Machines, 12th Annual IEEE Symposium on (FCCM'04)
, pp. 322-323
-
-
Attig, M.1
Dharmapurikar, S.2
Lockwood, J.3
-
8
-
-
0017547820
-
A fast string searching algorithm
-
R. S. Boyer and J. S. Moore. A fast string searching algorithm. Communications of the ACM, 20(10):761-772, 1977.
-
(1977)
Communications of the ACM
, vol.20
, Issue.10
, pp. 761-772
-
-
Boyer, R.S.1
Moore, J.S.2
-
13
-
-
1842478680
-
Deep packet inspection using parallel bloom filters
-
January - February
-
S. Dharmapurikar, M. Attig, and J. Lockwood. Deep packet inspection using parallel bloom filters. Micro, IEEE, 24(1):52-61, January - February 2004.
-
(2004)
Micro, IEEE
, vol.24
, Issue.1
, pp. 52-61
-
-
Dharmapurikar, S.1
Attig, M.2
Lockwood, J.3
-
14
-
-
27544488209
-
Applying fast string matching to intrusion detection
-
In preparation, successor to UCSD TR CS2001-0670, University of California, San Diego
-
M. Fisk and G. Varghese. Applying fast string matching to intrusion detection. Technical Report In preparation, successor to UCSD TR CS2001-0670, University of California, San Diego.
-
Technical Report
-
-
Fisk, M.1
Varghese, G.2
-
15
-
-
79955152559
-
Granidt: Towards gigabit rate network intrusion detection technology
-
Springer-Verlag
-
M. Gokhale, D. Dubois, A. Dubois, M. Boorman, S. Poole, and V. Hogsett. Granidt: Towards gigabit rate network intrusion detection technology. In Proceedings of the Reconfigurable Computing Is Going Mainstream, 12th International Conference on Field-Programmable Logic and Applications, pages 404-413. Springer-Verlag, 2002.
-
(2002)
Proceedings of the Reconfigurable Computing is Going Mainstream, 12th International Conference on Field-programmable Logic and Applications
, pp. 404-413
-
-
Gokhale, M.1
Dubois, D.2
Dubois, A.3
Boorman, M.4
Poole, S.5
Hogsett, V.6
-
18
-
-
0033688597
-
Smart memories: A modular reconfigurable architecture
-
June
-
K. Mai, T. Paaske, N. Jayasena, R. Ho, W. Dally, and M. Horowitz. Smart memories: A modular reconfigurable architecture. In Annual International Symposium on Computer Architecture, June 2000.
-
(2000)
Annual International Symposium on Computer Architecture
-
-
Mai, K.1
Paaske, T.2
Jayasena, N.3
Ho, R.4
Dally, W.5
Horowitz, M.6
-
19
-
-
0024887733
-
Fast peephole optimization techniques
-
B. J. McKenzie. Fast peephole optimization techniques. Softw. Pract. Exper., 19(12): 1151-1162, 1989.
-
(1989)
Softw. Pract. Exper.
, vol.19
, Issue.12
, pp. 1151-1162
-
-
McKenzie, B.J.1
-
20
-
-
84888893697
-
Intrusion detection/prevention product revenue up 9% in 1Q04
-
June
-
I. M. Research. Intrusion detection/prevention product revenue up 9% in 1Q04. Technical report, June 2004.
-
(2004)
Technical Report
-
-
Research, I.M.1
-
22
-
-
0035278505
-
Survey and taxonomy of IP address lookup algorithms
-
M. Sanchez, E. Biersack, and W. Dabbous. Survey and taxonomy of IP address lookup algorithms. IEEE Network Magazine, 15(2):8-23, 2001.
-
(2001)
IEEE Network Magazine
, vol.15
, Issue.2
, pp. 8-23
-
-
Sanchez, M.1
Biersack, E.2
Dabbous, W.3
-
23
-
-
0003450887
-
CACTI 3.0: An integrated cache timing, power, and area model
-
HP Labs Technical Reports, Dec.
-
P. Shivakumar and N. Jouppi. CACTI 3.0: An integrated cache timing, power, and area model. Technical Report WRL-2001-2, HP Labs Technical Reports, Dec. 2001.
-
(2001)
Technical Report
, vol.WRL-2001-2
-
-
Shivakumar, P.1
Jouppi, N.2
-
25
-
-
0002260103
-
Fast address lookups using controlled prefix expansion
-
Feb.
-
V. Srinivasan and G. Varghese. Fast address lookups using controlled prefix expansion. ACM Transactions on Computer Systems, 7(1): 1-40, Feb. 1999.
-
(1999)
ACM Transactions on Computer Systems
, vol.7
, Issue.1
, pp. 1-40
-
-
Srinivasan, V.1
Varghese, G.2
-
28
-
-
84976650258
-
Using peephole optimization on intermediate code
-
A. S. Tanenbaum, H. van Staveren, and J. W. Stevenson Using peephole optimization on intermediate code. ACM Trans. Program. Lang. Syst., 4(1):21-36, 1982.
-
(1982)
ACM Trans. Program. Lang. Syst.
, vol.4
, Issue.1
, pp. 21-36
-
-
Tanenbaum, A.S.1
Van Staveren, H.2
Stevenson, J.W.3
-
29
-
-
4644353790
-
Evaluation of the Raw microprocessor: An exposed-wire-delay architecture for ILP and streams
-
June
-
M. B. Taylora, W. Lee. S. Miller, D. Wentzlaff, I. Bratt, B. Greenwald, Henry, Hoffmann, P. Johnson, J. Kim, J. Psota, A. Saraf, N. Shnidman, V. Strumpen, M. Frank, S. Amarasinghc, and A. Agarwal. Evaluation of the Raw microprocessor: An exposed-wire-delay architecture for ILP and streams. In Annual International Symposium on Computer Architecture, June 2004.
-
(2004)
Annual International Symposium on Computer Architecture
-
-
Taylora, M.B.1
Lee, W.2
Miller, S.3
Wentzlaff, D.4
Bratt, I.5
Greenwald, B.6
Hoffmann, H.7
Johnson, P.8
Kim, J.9
Psota, J.10
Saraf, A.11
Shnidman, N.12
Strumpen, V.13
Frank, M.14
Amarasinghc, S.15
Agarwal, A.16
|