-
2
-
-
34548718683
-
On theDesign andAnalysis of Irregular Algorithms on the Cell Processor: A Case Study of List Ranking
-
March
-
D. Bader, V. Agarwal, andK.Madduri. On theDesign andAnalysis of Irregular Algorithms on the Cell Processor: A Case Study of List Ranking. In Parallel and Distributed Processing Symposium, 2007. IPDPS 2007, pages 26-30, March 2007.
-
(2007)
Parallel and Distributed Processing Symposium, 2007. IPDPS
, pp. 26-30
-
-
Bader, D.1
Agarwal, V.2
-
4
-
-
77954026099
-
An improved algorithm to accelerate regular expression evaluation
-
December
-
M. Becchi and P. Crowley. An improved algorithm to accelerate regular expression evaluation. In ANCS, December 2007.
-
(2007)
ANCS
-
-
Becchi, M.1
Crowley, P.2
-
5
-
-
33845908990
-
A scalable architecture for high-throughput regular-expression pattern matching
-
B. C. Brodie, D. E. Taylor, and R. K. Cytron. A scalable architecture for high-throughput regular-expression pattern matching. In ISCA 2006, pages 191-202, 2006.
-
(2006)
ISCA 2006
, pp. 191-202
-
-
Brodie, B.C.1
Taylor, D.E.2
Cytron, R.K.3
-
6
-
-
33751056900
-
Towards automatic generation of vulnerability-based signatures
-
Oakland, California, May
-
D. Brumley, J. Newsome, D. Song, H. Wang, and S. Jha. Towards automatic generation of vulnerability-based signatures. In IEEE Symposium on Security and Privacy, Oakland, California, May 2006.
-
(2006)
IEEE Symposium on Security and Privacy
-
-
Brumley, D.1
Newsome, J.2
Song, D.3
Wang, H.4
Jha, S.5
-
10
-
-
84879379072
-
-
Available at
-
Clamav: Clam antivirus. Available at http://www.clamav.net/doc/latest/ signatures.pdf.
-
Clam antivirus
-
-
-
12
-
-
70349189052
-
-
Shader Model 4 (DirectX High Level Shading Language) Available at http://msdn.microsoft.com/en-us/library/bb509635(VS.85).aspx.
-
Shader Model 4 (DirectX High Level Shading Language) Available at http://msdn.microsoft.com/en-us/library/bb509635(VS.85).aspx.
-
-
-
-
13
-
-
34548052234
-
Executing irregular scientific applications on stream architectures
-
M. Erez, J. H. Ahn, J. Gummaraju, M. Rosenblum, and W. J. Dally. Executing irregular scientific applications on stream architectures. In ICS 2007, pages 93-104.
-
ICS 2007
, pp. 93-104
-
-
Erez, M.1
Ahn, J.H.2
Gummaraju, J.3
Rosenblum, M.4
Dally, W.J.5
-
14
-
-
47349104432
-
Dynamic warp formation and scheduling for efficient gpu control flow
-
W. W. L. Fung, I. Sham, G. Yuan, and T. M. Aamodt. Dynamic warp formation and scheduling for efficient gpu control flow. In Proceedings of the 40th Annual IEEE/ACM International Symposium on Microarchitecture, pages 407-420, 2007.
-
(2007)
Proceedings of the 40th Annual IEEE/ACM International Symposium on Microarchitecture
, pp. 407-420
-
-
Fung, W.W.L.1
Sham, I.2
Yuan, G.3
Aamodt, T.M.4
-
16
-
-
39049126577
-
Offloading IDS computation to the GPU
-
Dec
-
N. Jacob and C. Brodley. Offloading IDS computation to the GPU. In ACSAC, Dec. 2006.
-
(2006)
ACSAC
-
-
Jacob, N.1
Brodley, C.2
-
17
-
-
25844503119
-
Introduction to the cell multiprocessor
-
July
-
J. A. Kahle,M. N. Day, H. P. Hofstee, C. R. Johns, T. R.Maeurer, and D.Shippy. Introduction to the cell multiprocessor. IBM Journal of Research and Development, 49(4):589-604, July 2005.
-
(2005)
IBM Journal of Research and Development
, vol.49
, Issue.4
, pp. 589-604
-
-
Kahle, J.A.1
Day, M.N.2
Hofstee, H.P.3
Johns, C.R.4
Maeurer, T.R.5
Shippy, D.6
-
18
-
-
0035271572
-
Imagine: Media processing with streams
-
March/April
-
B. Khailany, W. J. Dally, S. Rixner, U. J. Kapasi, P. Mattson, J. Namkoong, J. D. Owens, B. Towles, and A. Chang. Imagine: Media processing with streams. IEEE Micro, 21(2):35-46, March/April 2001.
-
(2001)
IEEE Micro
, vol.21
, Issue.2
, pp. 35-46
-
-
Khailany, B.1
Dally, W.J.2
Rixner, S.3
Kapasi, U.J.4
Mattson, P.5
Namkoong, J.6
Owens, J.D.7
Towles, B.8
Chang, A.9
-
20
-
-
35948991669
-
-
Available at
-
NVIDIA corporation. NVIDIA CUDA Programming Guide, 2007. Available at http://developer.nvidia.com.
-
(2007)
NVIDIA CUDA Programming Guide
-
-
-
22
-
-
0003539116
-
Snort - lightweight intrusion detection for networks
-
USENIX
-
M. Roesch. Snort - lightweight intrusion detection for networks. In 13th Systems Administration Conference. USENIX, 1999.
-
(1999)
13th Systems Administration Conference
-
-
Roesch, M.1
-
23
-
-
38849131252
-
-
M. C. Schatz, C. Trapnell, A. L. Delcher, andA. Varshney. Highthroughput sequence alignment using graphics processing units. BMC Bioinformatics 8:474.
-
M. C. Schatz, C. Trapnell, A. L. Delcher, andA. Varshney. Highthroughput sequence alignment using graphics processing units. BMC Bioinformatics 8:474.
-
-
-
-
26
-
-
62849094139
-
Deflating the Big Bang: Fast and scalable deep packet inspection with extended finite automata
-
Aug
-
R. Smith, C. Estan, S. Jha, and S. Kong. Deflating the Big Bang: fast and scalable deep packet inspection with extended finite automata. In SIGCOMM, Aug. 2008.
-
(2008)
SIGCOMM
-
-
Smith, R.1
Estan, C.2
Jha, S.3
Kong, S.4
-
27
-
-
20344366573
-
Efficient packet classification for network intrusion detection using fpga
-
New York, NY, USA, ACMPress
-
H. Song and J. W. Lockwood. Efficient packet classification for network intrusion detection using fpga. In FPGA '05: Proceedings of the 2005 ACM/SIGDA 13th international symposium on Field-programmable gate arrays, pages 238-245, New York, NY, USA, 2005. ACMPress.
-
(2005)
FPGA '05: Proceedings of the 2005 ACM/SIGDA 13th international symposium on Field-programmable gate arrays
, pp. 238-245
-
-
Song, H.1
Lockwood, J.W.2
-
28
-
-
27544490145
-
A high throughput string matching architecture for intrusion detection and prevention
-
L. Tan and T. Sherwood. A high throughput string matching architecture for intrusion detection and prevention. In ISCA 2005, pages 112-122, 2005.
-
(2005)
ISCA 2005
, pp. 112-122
-
-
Tan, L.1
Sherwood, T.2
-
29
-
-
84869631224
-
-
Online
-
Tarari 8000. Online http://www.lsi.com/DistributionSystem/AssetDocument/ documentation/networking/tarari-content-processors/LSI-PB-2pg-GP8000up.pdf.
-
, vol.8000
-
-
Tarari1
-
30
-
-
84869619441
-
-
Online
-
Tarari T10 Technology. Online http://www.lsi.com/DistributionSystem/ AssetDocument/LSI-PB-2pg-T10-Silicon0923.pdf.
-
Tarari T10 Technology
-
-
-
31
-
-
8344251916
-
Deterministic Memory-Efficient String Matching Algorithms for Intrusion Detection
-
March
-
N. Tuck, T. Sherwood, B. Calder, and G. Varghese. Deterministic Memory-Efficient String Matching Algorithms for Intrusion Detection. In INFOCOM 2004, pages 2628-2639, March 2004.
-
(2004)
INFOCOM 2004
, pp. 2628-2639
-
-
Tuck, N.1
Sherwood, T.2
Calder, B.3
Varghese, G.4
-
32
-
-
34547662263
-
Fast and memory-efficient regular expression matching for deep packet inspection
-
F. Yu, Z. Chen, Y. Diao, T. V. Lakshman, and R. H. Katz. Fast and memory-efficient regular expression matching for deep packet inspection. In ANCS 2006, pages 93-102, 2006.
-
(2006)
ANCS 2006
, pp. 93-102
-
-
Yu, F.1
Chen, Z.2
Diao, Y.3
Lakshman, T.V.4
Katz, R.H.5
|