{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,1,18]],"date-time":"2024-01-18T00:32:57Z","timestamp":1705537977980},"reference-count":11,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2002,3,1]],"date-time":"2002-03-01T00:00:00Z","timestamp":1014940800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. &amp; Technol."],"published-print":{"date-parts":[[2002,3]]},"DOI":"10.1007\/bf02962215","type":"journal-article","created":{"date-parts":[[2008,9,27]],"date-time":"2008-09-27T19:59:04Z","timestamp":1222545544000},"page":"219-226","source":"Crossref","is-referenced-by-count":10,"title":["A non-collision hash trie-tree based fast IP classification algorithm"],"prefix":"10.1007","volume":"17","author":[{"given":"Ke","family":"Xu","sequence":"first","affiliation":[]},{"given":"Jianping","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Zhongchao","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Mingwei","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"BF02962215_CR1","first-page":"48","volume":"3","author":"W Weiss","year":"1998","unstructured":"Weiss W. QoS with differentiated services.Technical Journal, 1998, 3(4): 48\u201362.","journal-title":"Technical Journal"},{"issue":"9","key":"BF02962215_CR2","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1109\/35.312843","volume":"32","author":"S Bellovin","year":"1994","unstructured":"Bellovin S, Cheswick W. Network firewalls.IEEE Communications Magazine, 1994, 32(9): 50\u201357.","journal-title":"IEEE Communications Magazine"},{"key":"BF02962215_CR3","doi-asserted-by":"crossref","unstructured":"Jyh-haw Y, Randy C, Richard N W. Interdomain access control with policy routing. InProceedings of the IEEE Computer Society Workshop on Future Trends of Distributed Computing Systems, Oct., 1997, pp. 46\u201352.","DOI":"10.1109\/FTDCS.1997.644702"},{"issue":"7","key":"BF02962215_CR4","doi-asserted-by":"crossref","first-page":"1162","DOI":"10.1109\/49.414636","volume":"13","author":"Richard Edell","year":"1995","unstructured":"Richard Edell, Nick McKeown, Pravin Varaiya. Billing users and pricing for TCP.IEEE Journal on Selected Areas in Communications, Sept., 1995, 13(7): 1162\u20131175.","journal-title":"IEEE Journal on Selected Areas in Communications"},{"issue":"2","key":"BF02962215_CR5","first-page":"179","volume":"11","author":"Ke Xu","year":"2000","unstructured":"Xu Ke, Xiong Yong-qiang, Wu Jian-ping. Analysis of broadband IP router architecture.Journal of Software, 2000, 11(2): 179\u2013186.","journal-title":"Journal of Software"},{"issue":"4","key":"BF02962215_CR6","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1145\/316194.316217","volume":"29","author":"P Gupta","year":"1999","unstructured":"Gupta P, McKeown N. Packet classification on multiple fields.ACM Computer Communication Review, 1999, 29(4): 146\u2013160.","journal-title":"ACM Computer Communication Review"},{"key":"BF02962215_CR7","unstructured":"Bailey M L, Gopal B, Pagels M A, Peterson L L. PATHFINDER: A pattern-based packet classifier. InProceedings of the 1st Symposium on Operating System Design and Implementation. Usenix Association, 1994, pp. 95\u2013104."},{"issue":"4","key":"BF02962215_CR8","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1145\/285243.285282","volume":"28","author":"V Srinivasn","year":"1998","unstructured":"Srinivasn V, Varghese G, Suri Set al. Fast scalable level four switching.ACM Computer Communication Review, 1998, 28(4): 191\u2013205.","journal-title":"ACM Computer Communication Review"},{"key":"BF02962215_CR9","unstructured":"Woo T Y C. A modular approach to packet classification: Algorithms and results, InProceedings of IEEE Infocom\u20192000 2000."},{"key":"BF02962215_CR10","unstructured":"Stevens W R. UNIX Networking Programming (2nd Edition). Prentice Hall, Inc. 1998, Vol.1."},{"key":"BF02962215_CR11","unstructured":"Merit Inc. IPMA Statistics. http:\/\/nic.merit.edu\/ipma."}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02962215.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/BF02962215\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/BF02962215","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,22]],"date-time":"2019-05-22T23:16:59Z","timestamp":1558567019000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/BF02962215"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2002,3]]},"references-count":11,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2002,3]]}},"alternative-id":["BF02962215"],"URL":"https:\/\/doi.org\/10.1007\/bf02962215","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2002,3]]}}}