{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,8]],"date-time":"2026-01-08T07:44:31Z","timestamp":1767858271745,"version":"3.49.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,10]]},"DOI":"10.1109\/ancs.2013.6665172","type":"proceedings-article","created":{"date-parts":[[2013,11,27]],"date-time":"2013-11-27T22:42:15Z","timestamp":1385592135000},"page":"13-24","source":"Crossref","is-referenced-by-count":73,"title":["Design principles for packet parsers"],"prefix":"10.1109","author":[{"given":"Glen","family":"Gibb","sequence":"first","affiliation":[]},{"given":"George","family":"Varghese","sequence":"additional","affiliation":[]},{"given":"Mark","family":"Horowitz","sequence":"additional","affiliation":[]},{"given":"Nick","family":"McKeown","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","year":"0"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195546"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSYM.2010.5685467"},{"key":"15","author":"shen","year":"2005","journal-title":"Modern Processor Design Fundamentals of Superscalar Processors"},{"key":"16","first-page":"1","article-title":"High-performance pattern-matching for intrusion detection","author":"van lunteren","year":"2006","journal-title":"Proc INFOCOM '06"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.2007.352793"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2010.81"},{"key":"11","year":"0"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2006.18"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539796308217"},{"key":"20","year":"0"},{"key":"2","year":"0"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ANCS.2011.12"},{"key":"10","year":"0"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1970.tb01770.x"},{"key":"6","year":"0"},{"key":"5","author":"garey","year":"1979","journal-title":"Computers and Intractability A Guide to the Theory of NP-Completeness"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/DAC.1982.1585498"},{"key":"9","author":"kumar","year":"2008","journal-title":"Acceleration of Network Processing Algorithms"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2010.5462139"}],"event":{"name":"2013 ACM\/IEEE Symposium on Architectures for Networking and Communications Systems (ANCS)","location":"San Jose, CA, USA","start":{"date-parts":[[2013,10,21]]},"end":{"date-parts":[[2013,10,22]]}},"container-title":["Architectures for Networking and Communications Systems"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6648480\/6665163\/06665172.pdf?arnumber=6665172","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,23]],"date-time":"2017-03-23T00:16:37Z","timestamp":1490228197000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6665172\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,10]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/ancs.2013.6665172","relation":{},"subject":[],"published":{"date-parts":[[2013,10]]}}}