-
1
-
-
79960865581
-
Feacan: Front-end acceleration for content-aware network processing
-
IEEE
-
Y. Qi, K. Wang, J. Fong, Y. Xue, J. Li, w. Jiang, and V. Prasanna, "Feacan: Front-end acceleration for content-aware network processing,"in INFOCOM, 2011 Proceedings IEEE. IEEE, 2011, pp. 2114-2122.
-
(2011)
INFOCOM, 2011 Proceedings IEEE
, pp. 2114-2122
-
-
Qi, Y.1
Wang, K.2
Fong, J.3
Xue, Y.4
Li, J.5
Jiang, W.6
Prasanna, V.7
-
2
-
-
47349121919
-
Netfilters connection tracking system
-
P. Ayuso, "Netfilters connection tracking system," LOGIN: The USENIX magazine, vol. 31, pp. 34-39, 2006.
-
(2006)
LOGIN: The USENIX Magazine
, vol.31
, pp. 34-39
-
-
Ayuso, P.1
-
4
-
-
84889890684
-
-
http://libnids.sourceforge.net/.
-
-
-
-
5
-
-
1842583287
-
Architecture for a hardware-based, tcp/ip content-processing system
-
jan.-feb.
-
D. Schuehler, J. Moscola, and J. Lockwood, "Architecture for a hardware-based, tcp/ip content-processing system," Micro, IEEE, vol. 24, no. 1, pp. 62-69, jan.-feb. 2004.
-
(2004)
Micro, IEEE
, vol.24
, Issue.1
, pp. 62-69
-
-
Schuehler, D.1
Moscola, J.2
Lockwood, J.3
-
6
-
-
0346750534
-
Energy management for commercial servers
-
C. Lefurgy, K. Rajamani, F. Rawson, W. Felter, M. Kistler, and T. Keller, "Energy management for commercial servers," Computer, vol. 36, no. 12, pp. 39-48, 2003.
-
(2003)
Computer
, vol.36
, Issue.12
, pp. 39-48
-
-
Lefurgy, C.1
Rajamani, K.2
Rawson, F.3
Felter, W.4
Kistler, M.5
Keller, T.6
-
9
-
-
67650317025
-
Shunting: A hardware/ software architecture for flexible, high-performance network intrusion prevention
-
ser. CCS '07. New York, NY, USA: ACM
-
J. M. Gonzalez, V. Paxson, and N. Weaver, "Shunting: a hardware/ software architecture for flexible, high-performance network intrusion prevention," in Proceedings of the 14th ACM conference on Computer and communications security, ser. CCS '07. New York, NY, USA: ACM, 2007, pp. 139-149.
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 139-149
-
-
Gonzalez, J.M.1
Paxson, V.2
Weaver, N.3
-
10
-
-
58049137875
-
Towards high-performance flow-level packet processing on multi-core network processors
-
ACM
-
Y. Qi, B. Xu, F. He, B. Yang, J. Yu, and J. Li, "Towards high-performance flow-level packet processing on multi-core network processors,"in Proceedings of the 3rd ACM/IEEE Symposium on Architecture for networking and communications systems. ACM, 2007, pp. 17-26.
-
(2007)
Proceedings of the 3rd ACM/IEEE Symposium on Architecture for Networking and Communications Systems
, pp. 17-26
-
-
Qi, Y.1
Xu, B.2
He, F.3
Yang, B.4
Yu, J.5
Li, J.6
-
11
-
-
78650502486
-
Experience with high-speed automated application-identification for network-management
-
ser. ANCS '09. New York, NY, USA: ACM
-
M. Canini, W. Li, M. Zadnik, and A. W. Moore, "Experience with high-speed automated application-identification for network-management,"in Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems, ser. ANCS '09. New York, NY, USA: ACM, 2009, pp. 209-218.
-
(2009)
Proceedings of the 5th ACM/IEEE Symposium on Architectures for Networking and Communications Systems
, pp. 209-218
-
-
Canini, M.1
Li, W.2
Zadnik, M.3
Moore, A.W.4
-
12
-
-
0036709594
-
Cost-effective flow table designs for high-speed routers: Architecture and performance evaluation
-
J. Xu and M. Singhal, "Cost-effective flow table designs for high-speed routers: architecture and performance evaluation," Computers, IEEE Transactions on, vol. 51, no. 9, pp. 1089-1099, 2002.
-
(2002)
Computers, IEEE Transactions on
, vol.51
, Issue.9
, pp. 1089-1099
-
-
Xu, J.1
Singhal, M.2
-
13
-
-
84861647947
-
The power of one move: Hashing schemes for hardware
-
A. Kirsch and M. Mitzenmacher, "The power of one move: Hashing schemes for hardware," Networking, IEEE/ACM Transactions on, vol. 18, no. 6, pp. 1752-1765, 2010.
-
(2010)
Networking, IEEE/ACM Transactions on
, vol.18
, Issue.6
, pp. 1752-1765
-
-
Kirsch, A.1
Mitzenmacher, M.2
-
14
-
-
0031274649
-
Wide-area internet traffic patterns and characteristics
-
nov/dec
-
K. Thompson, G. Miller, and R. Wilder, "Wide-area internet traffic patterns and characteristics," Network, iEEE, vol. 11, no. 6, pp. 10 - 23, nov/dec 1997.
-
(1997)
Network, IEEE
, vol.11
, Issue.6
, pp. 10-23
-
-
Thompson, K.1
Miller, G.2
Wilder, R.3
-
15
-
-
0028384238
-
Caching strategies to improve disk system performance
-
mar
-
R. Karedla, J. Love, and B. Wherry, "Caching strategies to improve disk system performance," Computer, vol. 27, no. 3, pp. 38 -46, mar 1994.
-
(1994)
Computer
, vol.27
, Issue.3
, pp. 38-46
-
-
Karedla, R.1
Love, J.2
Wherry, B.3
-
16
-
-
14944376803
-
Identifying elephant flows through periodically sampled packets
-
ser. IMC '04. New York, NY, USA: ACM
-
T. Mori, M. Uchida, R. Kawahara, J. Pan, and S. Goto, "Identifying elephant flows through periodically sampled packets," in Proceedings of the 4th ACM SIGCOMM conference on internet measurement, ser. IMC '04. New York, NY, USA: ACM, 2004, pp. 115-120.
-
(2004)
Proceedings of the 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 115-120
-
-
Mori, T.1
Uchida, M.2
Kawahara, R.3
Pan, J.4
Goto, S.5
-
19
-
-
0018456171
-
Universal classes of hash functions
-
J. Carter and M. Wegman, "Universal classes of hash functions," Journal of computer and system sciences, vol. 18, no. 2, pp. 143-154, 1979.
-
(1979)
Journal of Computer and System Sciences
, vol.18
, Issue.2
, pp. 143-154
-
-
Carter, J.1
Wegman, M.2
-
20
-
-
84889903326
-
Alfe: A replacement policy to cache elephant flows in the presence of mice flooding
-
to appear
-
"Alfe: A replacement policy to cache elephant flows in the presence of mice flooding," to appear in ICC2012.
-
ICC2012
-
-
-
21
-
-
84889940738
-
-
http://libnet.sourceforge.net/.
-
-
-
-
22
-
-
84889918195
-
-
http://tcpreplay.synfin.net/.
-
-
-
|