-
2
-
-
0016518897
-
Efficient String Matching: An Aid to Bibliographic Search
-
A. V. Aho and M. J. Corasick. Efficient String Matching: An Aid to Bibliographic Search. Commun. ACM, 18(6):333340, 1975.
-
(1975)
Commun. ACM
, vol.18
, Issue.6
, pp. 333340
-
-
Aho, A.V.1
Corasick, M.J.2
-
3
-
-
33644921425
-
Configurable string matching hardware for speeding up intrusion detection
-
M. Aldwairi, T. Conte, and P. Franzon. Configurable string matching hardware for speeding up intrusion detection. SIGARCH Comput. Archit. News, 33(1):99-107, 2005.
-
(2005)
SIGARCH Comput. Archit. News
, vol.33
, Issue.1
, pp. 99-107
-
-
Aldwairi, M.1
Conte, T.2
Franzon, P.3
-
4
-
-
34548793939
-
-
Alteon Networks. Tigon/PCI Ethernet Controller, Aug. 1997. Revision 1.04.
-
Alteon Networks. Tigon/PCI Ethernet Controller, Aug. 1997. Revision 1.04.
-
-
-
-
8
-
-
0017547820
-
A Fast String Search Algorithm
-
Oct
-
R. S. Boyer and J. S. Moore. A Fast String Search Algorithm. Commun. ACM, 20(10):762-772, Oct. 1977.
-
(1977)
Commun. ACM
, vol.20
, Issue.10
, pp. 762-772
-
-
Boyer, R.S.1
Moore, J.S.2
-
9
-
-
34548737586
-
A scalable architecture for high-throughput regular-expression pattern matching
-
Washington, DC, USA, IEEE Computer Society
-
B. C. Brodie, D. E. Taylor, and R. K. Cytron. A scalable architecture for high-throughput regular-expression pattern matching. In ISCA '06: Proceedings of the 33rd International Symposium on Computer Architecture, pages 191202, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
ISCA '06: Proceedings of the 33rd International Symposium on Computer Architecture
, pp. 191202
-
-
Brodie, B.C.1
Taylor, D.E.2
Cytron, R.K.3
-
10
-
-
8844253507
-
A Hardware Platform for Network Intrusion Detection and Prevention
-
February
-
C. Clark, W. Lee, D. Schimmel, D. Contis, M. Koné, and A. Thomas. A Hardware Platform for Network Intrusion Detection and Prevention. In Proc. of the Third Workshop on Network Processors and Applications, February 2004.
-
(2004)
Proc. of the Third Workshop on Network Processors and Applications
-
-
Clark, C.1
Lee, W.2
Schimmel, D.3
Contis, D.4
Koné, M.5
Thomas, A.6
-
11
-
-
20444487985
-
Finding and Containing Enemies Within the Walls with Selfsecuring Network Interfaces
-
Technical Report CMU-CS03-109, Carnegie Mellon School of Computer Science, Jan
-
G. R. Ganger, G. Economou, and S. M. Bielski. Finding and Containing Enemies Within the Walls with Selfsecuring Network Interfaces. Technical Report CMU-CS03-109, Carnegie Mellon School of Computer Science, Jan. 2003.
-
(2003)
-
-
Ganger, G.R.1
Economou, G.2
Bielski, S.M.3
-
12
-
-
33644961664
-
DARPA Intrusion Detection System Evaluation: Design and Procedures
-
Technical Report 1062, MIT Lincoln Laboratory
-
J. W. Haines, R. P. Lippmann, D. J. Fried, E. Tran, S. Boswell, and M. A. Zissman. 1999 DARPA Intrusion Detection System Evaluation: Design and Procedures. Technical Report 1062, MIT Lincoln Laboratory, 2001.
-
(1999)
-
-
Haines, J.W.1
Lippmann, R.P.2
Fried, D.J.3
Tran, E.4
Boswell, S.5
Zissman, M.A.6
-
13
-
-
84984028908
-
Practical Fast Searching in Strings
-
R. N. Horspool. Practical Fast Searching in Strings. Software: Practice and Experience, 10(6):501-506, 1980.
-
(1980)
Software: Practice and Experience
, vol.10
, Issue.6
, pp. 501-506
-
-
Horspool, R.N.1
-
14
-
-
10744230067
-
A TCP Offload Accelerator for 10 Gb/s Ethernet in 90-nm CMOS
-
Nov
-
Y. Hoskote et al. A TCP Offload Accelerator for 10 Gb/s Ethernet in 90-nm CMOS. IEEE Journal of Solid-State Circuits, 38(11):1866-1875, Nov. 2003.
-
(2003)
IEEE Journal of Solid-State Circuits
, vol.38
, Issue.11
, pp. 1866-1875
-
-
Hoskote, Y.1
-
15
-
-
33645792351
-
-
G. S. Johnson, J. Lee, C. A. Burns, and W. R. Mark. The irregular z-buffer: Hardware acceleration for irregular data structures. ACM Transactions on Graphics, 24(4):14621482, 2005.
-
G. S. Johnson, J. Lee, C. A. Burns, and W. R. Mark. The irregular z-buffer: Hardware acceleration for irregular data structures. ACM Transactions on Graphics, 24(4):14621482, 2005.
-
-
-
-
19
-
-
85015717468
-
Software Support for Outboard Buffering and Checksumming
-
Aug
-
K. Kleinpaste, P. Steenkiste, and B. Zill. Software Support for Outboard Buffering and Checksumming. In Proc. of the ACM SIGCOMM '95 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pages 87-98, Aug. 1995.
-
(1995)
Proc. of the ACM SIGCOMM '95 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 87-98
-
-
Kleinpaste, K.1
Steenkiste, P.2
Zill, B.3
-
23
-
-
33645793950
-
Implementation of a Content-Scanning Module for an Internet Firewall
-
Apr
-
J. Moscola, J. Lockwood, R. P. Loui, and M. Pachos. Implementation of a Content-Scanning Module for an Internet Firewall. In Proc. of the 11th Annual IEEE Symposium on Field-Programmable Custom Computing Machines, pages 31-38, Apr. 2003.
-
(2003)
Proc. of the 11th Annual IEEE Symposium on Field-Programmable Custom Computing Machines
, pp. 31-38
-
-
Moscola, J.1
Lockwood, J.2
Loui, R.P.3
Pachos, M.4
-
26
-
-
34548738932
-
Design alternatives for a highperformance self-securing ethernet network interface
-
Technical Report TR-ECE-07-02, Purdue University, Jan
-
D. Schuff and V. S. Pai. Design alternatives for a highperformance self-securing ethernet network interface. Technical Report TR-ECE-07-02, Purdue University, Jan. 2007.
-
(2007)
-
-
Schuff, D.1
Pai, V.S.2
-
30
-
-
34548749129
-
-
Top Layer Networks. Network intrusion detection systems: Important IDS network security vulnerabilities. White Paper, September 2002.
-
Top Layer Networks. Network intrusion detection systems: Important IDS network security vulnerabilities. White Paper, September 2002.
-
-
-
-
31
-
-
84983179859
-
Microarchitectural Exploration with Liberty
-
November
-
M. Vachharajani, N. Vachharajani, D. A. Penry, J. A. Blome, and D. I. August. Microarchitectural Exploration with Liberty. In Proc. of the 35th Annual International Symposium on Microarchitecture, pages 271-282, November 2002.
-
(2002)
Proc. of the 35th Annual International Symposium on Microarchitecture
, pp. 271-282
-
-
Vachharajani, M.1
Vachharajani, N.2
Penry, D.A.3
Blome, J.A.4
August, D.I.5
-
32
-
-
4544339575
-
Spinach: A LibertyBased Simulator for Programmable Network Interface Architectures
-
June
-
P. Willmann, M. Brogioli, and V. S. Pai. Spinach: A LibertyBased Simulator for Programmable Network Interface Architectures. In Proc. of the ACM SIGPLAN/SIGBED 2004 Conference on Languages, Compilers, and Tools for Embedded Systems, pages 20-29, June 2004.
-
(2004)
Proc. of the ACM SIGPLAN/SIGBED 2004 Conference on Languages, Compilers, and Tools for Embedded Systems
, pp. 20-29
-
-
Willmann, P.1
Brogioli, M.2
Pai, V.S.3
-
33
-
-
28444463623
-
An Efficient Programmable 10 Gigabit Ethernet Network Interface Card
-
February
-
P. Willmann, H. Kim, S. Rixner, and V. S. Pai. An Efficient Programmable 10 Gigabit Ethernet Network Interface Card. In Proc. of the 11th International Symposium on HighPerformance Computer Architecture, pages 96-107, February 2005.
-
(2005)
Proc. of the 11th International Symposium on HighPerformance Computer Architecture
, pp. 96-107
-
-
Willmann, P.1
Kim, H.2
Rixner, S.3
Pai, V.S.4
-
34
-
-
0012405865
-
A fast algorithm for multi-pattern searching
-
Technical Report TR-94-17, Department of Computer Science, University of Arizona
-
S. Wu and U. Manber. A fast algorithm for multi-pattern searching. Technical Report TR-94-17, Department of Computer Science, University of Arizona, 1994.
-
(1994)
-
-
Wu, S.1
Manber, U.2
|