{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T06:59:58Z","timestamp":1761807598184},"reference-count":18,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2011,2,4]],"date-time":"2011-02-04T00:00:00Z","timestamp":1296777600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Supercomput"],"published-print":{"date-parts":[[2011,7]]},"DOI":"10.1007\/s11227-011-0558-8","type":"journal-article","created":{"date-parts":[[2011,2,3]],"date-time":"2011-02-03T08:21:18Z","timestamp":1296721278000},"page":"99-108","source":"Crossref","is-referenced-by-count":2,"title":["Improving IPS by network processors"],"prefix":"10.1007","volume":"57","author":[{"given":"Pablo","family":"Casc\u00f3n","sequence":"first","affiliation":[]},{"given":"Julio","family":"Ortega","sequence":"additional","affiliation":[]},{"given":"Yan","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Murray","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"D\u00edaz","sequence":"additional","affiliation":[]},{"given":"Ignacio","family":"Rojas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,2,4]]},"reference":[{"key":"558_CR1","unstructured":"Intel i\/o acceleration technology. http:\/\/www.intel.com\/technology\/ioacceleration\/"},{"key":"558_CR2","unstructured":"Intel network processors. http:\/\/www.intel.com\/design\/network\/products\/npfamily\/"},{"key":"558_CR3","volume-title":"IXA Education Summit","author":"H Bos","year":"2005","unstructured":"Bos H, Xu L, van Reeuwijk K., Cristea M., Huang K. (2005) Network intrusion prevention on the network card. In: IXA Education Summit, Hudson, MA, USA, September 2005."},{"key":"558_CR4","volume-title":"A guide to network processors","author":"J Byrne","year":"2005","unstructured":"Byrne J, Gwennap L (2005) A guide to network processors. The Linley Group, Mountain View"},{"key":"558_CR5","volume-title":"Proc. of the 17th euromicro international conference on parallel, distributed, and network-based processing","author":"P Casc\u00f3n","year":"2009","unstructured":"Casc\u00f3n P, Ortega J, Haider WM, D\u00edaz AF, Rojas I (2009) A multi-threaded network interface using network processors. In: Proc. of the 17th euromicro international conference on parallel, distributed, and network-based processing, February 2009"},{"key":"558_CR6","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1109\/INFOCOM.2008.4544642","volume-title":"Computer communications workshops, 2008. INFOCOM. IEEE Conference on","author":"W Bruijn de","year":"2008","unstructured":"de Bruijn W, Bos H (2008) Model-T: rethinking the OS for terabit speeds. In: Computer communications workshops, 2008. INFOCOM. IEEE Conference on, pp 1\u20136"},{"key":"558_CR7","volume-title":"IEEE international conference on communications","author":"Y Luo","year":"2009","unstructured":"Luo Y, Xiang K, Fan J, Zhang C (2009) Distributed intrusion detection with intelligent network interfaces for future networks. In: IEEE international conference on communications, Dresden, Germany, June 2009"},{"key":"558_CR8","volume-title":"Proceedings of the workshop on novel uses of system area networks at HPCA (SAN-2 2003)","author":"K Mackenzie","year":"2003","unstructured":"Mackenzie K, Shi W, Mcdonald A, Ganev I (2003) An intel IXP1200-based network interface. In: Proceedings of the workshop on novel uses of system area networks at HPCA (SAN-2 2003)"},{"key":"558_CR9","volume-title":"Proceedings of the workshop on optimizations for DSP and embedded systems","author":"M Willmann","year":"2006","unstructured":"Willmann M, Brogioli P, Rixner S (2006) Parallelization strategies for network interface firmware. In: Proceedings of the workshop on optimizations for DSP and embedded systems"},{"key":"558_CR10","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1109\/HOTI.2007.14","volume-title":"Proceedings of the 15th annual IEEE symposium on high-performance interconnects","author":"G Narayanaswamy","year":"2007","unstructured":"Narayanaswamy G, Balaji P, Feng W (2007) An analysis of 10-Gigabit ethernet protocol stacks in multicore environments. In: Proceedings of the 15th annual IEEE symposium on high-performance interconnects. IEEE Comp Soc, Los Alamitos, pp 109\u2013116"},{"issue":"3","key":"558_CR11","doi-asserted-by":"crossref","first-page":"357","DOI":"10.1016\/j.comnet.2009.09.011","volume":"54","author":"A Ortiz","year":"2010","unstructured":"Ortiz A, Ortega J, D\u00edaz AF, Prieto A (2010) Network interfaces for programmable nics and multicore platforms. Comput Netw 54(3):357\u2013376","journal-title":"Comput Netw"},{"issue":"11","key":"558_CR12","doi-asserted-by":"crossref","first-page":"48","DOI":"10.1109\/MC.2004.223","volume":"37","author":"G Regnier","year":"2004","unstructured":"Regnier G, Makineni S, Illikkal I, Iyer R, Minturn D, Huggahalli R, Newell D, Cline L, Foong A (2004) TCP onloading for data center servers. Computer 37(11):48\u201358","journal-title":"Computer"},{"key":"558_CR13","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1109\/HOTI.2006.18","volume-title":"Proceedings of the 14th IEEE symposium on high-performance interconnects","author":"L Shalev","year":"2006","unstructured":"Shalev L, Makhervaks V, Machulsky Z, Biran G, Satran J, Ben-Yehuda M, Shimony I (2006) Loosely coupled TCP acceleration architecture. In: Proceedings of the 14th IEEE symposium on high-performance interconnects. IEEE Comput Soc, Los Alamitos, pp 3\u20138"},{"key":"558_CR14","unstructured":"Snell Q, Mikler A, Gustafson J, Helmer G (2007) A network protocol independent performance evaluator. http:\/\/www.scl.ameslab.gov\/netpipe\/"},{"key":"558_CR15","unstructured":"Snort (2009) Snort open source network intrusion prevention and detection system (ids\/ips). http:\/\/www.snort.org"},{"key":"558_CR16","first-page":"8","volume-title":"Proceedings of the annual conference on USENIX \u201906 annual technical conference","author":"P Willmann","year":"2006","unstructured":"Willmann P, Rixner S, Cox AL (2006) An evaluation of network stack parallelization strategies in modern operating systems. In: Proceedings of the annual conference on USENIX \u201906 annual technical conference, Boston, MA, pp 8\u20138. USENIX Association"},{"key":"558_CR17","doi-asserted-by":"crossref","first-page":"359","DOI":"10.1007\/0-387-25660-1_24","volume-title":"Security and privacy in the age of ubiquitous computing","author":"K Xinidis","year":"2005","unstructured":"Xinidis K, Anagnostakis K, Markatos E (2005) Design and implementation of a high-performance network intrusion prevention system. In: Security and privacy in the age of ubiquitous computing, pp\u00a0359\u2013374"},{"issue":"3","key":"558_CR18","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1109\/MM.2006.46","volume":"26","author":"L Zhao","year":"2006","unstructured":"Zhao L, Luo Y, Bhuyan LN, Iyer R (2006) A network processor-based, content-aware switch. IEEE MICRO 26(3):72\u201384","journal-title":"IEEE MICRO"}],"container-title":["The Journal of Supercomputing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-011-0558-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11227-011-0558-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11227-011-0558-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T10:24:03Z","timestamp":1559384643000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11227-011-0558-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,2,4]]},"references-count":18,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2011,7]]}},"alternative-id":["558"],"URL":"https:\/\/doi.org\/10.1007\/s11227-011-0558-8","relation":{},"ISSN":["0920-8542","1573-0484"],"issn-type":[{"value":"0920-8542","type":"print"},{"value":"1573-0484","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,2,4]]}}}