-
1
-
-
34748903972
-
-
R. Anderson, E. Biham, and L. Knudsen. Serpent: A proposal for the advanced encryption standard. @ @ @ Nick, how published?
-
R. Anderson, E. Biham, and L. Knudsen. Serpent: A proposal for the advanced encryption standard. @ @ @ Nick, how published?
-
-
-
-
2
-
-
33751176253
-
Sift: Snort intrusion filter for tcp
-
Michael Attig and John Lockwood. Sift: Snort intrusion filter for tcp. In Hot Interconnects 13, 2005.
-
(2005)
Hot Interconnects
, vol.13
-
-
Attig, M.1
Lockwood, J.2
-
3
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
July
-
Burton Bloom. Space/time trade-offs in hash coding with allowable errors. CACM, July 1970.
-
(1970)
CACM
-
-
Bloom, B.1
-
4
-
-
44249126961
-
SANE: A protection architecture for enterprise networks
-
Martin Casado, Tal Garfinkel, Aditya Akella, Michale Freedman, Dan Boneh, and Nick McKeown. SANE: A protection architecture for enterprise networks. In USENIX Security, 2006.
-
(2006)
USENIX Security
-
-
Casado, M.1
Garfinkel, T.2
Akella, A.3
Freedman, M.4
Boneh, D.5
McKeown, N.6
-
7
-
-
0030149554
-
-
M. Crovella and A. Bestavros. Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes. In Proceedings of SIGMETRICS'96: The ACMInternational Conference on Measurement and Modeling of Computer Systems., Philadelphia, Pennsylvania, May 1996. Also, in Performance evaluation review, May 1996, 24(1):160-169.
-
M. Crovella and A. Bestavros. Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes. In Proceedings of SIGMETRICS'96: The ACMInternational Conference on Measurement and Modeling of Computer Systems., Philadelphia, Pennsylvania, May 1996. Also, in Performance evaluation review, May 1996, 24(1):160-169.
-
-
-
-
10
-
-
15944371835
-
-
National Laboratory for Applied Network Research, Distributed Applications Support Team
-
National Laboratory for Applied Network Research, Distributed Applications Support Team, Iperf, the TCP/UDP Bandwidth Measurement Tool. http://dast.nlanr.net/projects/iperf/.
-
Iperf, the TCP/UDP Bandwidth Measurement Tool
-
-
-
11
-
-
0041851132
-
The Click modular router
-
R. Morris, E. Kohler, J. Jannotti, and M. Frans Kaashoek. The Click modular router. In Symposium on Operating Systems Principles, pages 217-231, 1999.
-
(1999)
Symposium on Operating Systems Principles
, pp. 217-231
-
-
Morris, R.1
Kohler, E.2
Jannotti, J.3
Frans Kaashoek, M.4
-
13
-
-
0028491368
-
Empirically derived analytic models of wide-area TCP connections
-
V. Paxson. Empirically derived analytic models of wide-area TCP connections. IEEE/ACM Transactions on Networking, 2(4):316-336, 1994.
-
(1994)
IEEE/ACM Transactions on Networking
, vol.2
, Issue.4
, pp. 316-336
-
-
Paxson, V.1
-
14
-
-
0029323403
-
Wide area traffic: The failure of Poisson modeling
-
V. Paxson and S. Floyd. Wide area traffic: The failure of Poisson modeling. IEEE/ACM Transactions on Networking, 3(3):226-244, 1995.
-
(1995)
IEEE/ACM Transactions on Networking
, vol.3
, Issue.3
, pp. 226-244
-
-
Paxson, V.1
Floyd, S.2
-
15
-
-
0001826463
-
The RC5 encryption algorithm, from Dr
-
January
-
Ronald L. Rivest. The RC5 encryption algorithm, from Dr. Dobb's Journal, January, 1995, 1996.
-
(1995)
Dobb's Journal
-
-
Rivest, R.L.1
-
16
-
-
34748831507
-
-
Ronald L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin. The RC6 block cipher. @ @ @ Nick, how published?
-
Ronald L. Rivest, M. J. B. Robshaw, R. Sidney, and Y. L. Yin. The RC6 block cipher. @ @ @ Nick, how published?
-
-
-
-
18
-
-
34748883586
-
-
David Schuehler and John Lockwood. A modular system for fpga-based tcp flow processing in high-speed networks. In FPL, 2004.
-
David Schuehler and John Lockwood. A modular system for fpga-based tcp flow processing in high-speed networks. In FPL, 2004.
-
-
-
-
19
-
-
0027307814
-
A case for two-way skewed-associative caches
-
Andre Seznec. A case for two-way skewed-associative caches. In ISCA, pages 169-178, 1993.
-
(1993)
ISCA
, pp. 169-178
-
-
Seznec, A.1
-
20
-
-
33749851941
-
Fast hash table lookup using extended Bloom filter: An aid to network processing
-
Haoyu Song, Sarang Dharmapurikar, Jonathan Turner, and John Lockwood. Fast hash table lookup using extended Bloom filter: An aid to network processing. In SIGCOMM, 2005.
-
(2005)
SIGCOMM
-
-
Song, H.1
Dharmapurikar, S.2
Turner, J.3
Lockwood, J.4
-
22
-
-
34748868884
-
-
Haoyu Song, Todd Sproull, Mike Attig, and John Lockwood. Snort offloader: A reconfigurable hardware NIDS filter
-
Haoyu Song, Todd Sproull, Mike Attig, and John Lockwood. Snort offloader: A reconfigurable hardware NIDS filter.
-
-
-
-
26
-
-
34748875151
-
-
Nicholas Weaver, Vern Paxson, and Robin Sommer. Bro-LAN pervasive network inspection and control for LAN traffic. Work in progress, 2006.
-
Nicholas Weaver, Vern Paxson, and Robin Sommer. Bro-LAN pervasive network inspection and control for LAN traffic. Work in progress, 2006.
-
-
-
-
27
-
-
0001872307
-
Self-similarity and heavy tails: Structural modeling of network traffic
-
R. Adler, R. Feldman, and M. Taqqu, editors, Birkhauser
-
W. Wilinger, V. Paxson, and M. Taqqu. Self-similarity and heavy tails: Structural modeling of network traffic. In R. Adler, R. Feldman, and M. Taqqu, editors, A Practical Guide To Heavy Tails: Statistical Techniques and Techniques. Birkhauser, 1998.
-
(1998)
A Practical Guide To Heavy Tails: Statistical Techniques and Techniques
-
-
Wilinger, W.1
Paxson, V.2
Taqqu, M.3
-
28
-
-
0031078972
-
Self-similarity through high-variability: Statistical analysis of Ethernet LAN traffic at the source level
-
W. Willinger, M. Taqqu, R. Sherman, and D. Wilson. Self-similarity through high-variability: Statistical analysis of Ethernet LAN traffic at the source level. IEEE/ACM Transactions on Networking, 5:71-86, 1997.
-
(1997)
IEEE/ACM Transactions on Networking
, vol.5
, pp. 71-86
-
-
Willinger, W.1
Taqqu, M.2
Sherman, R.3
Wilson, D.4
|