{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T15:29:09Z","timestamp":1742398149317},"reference-count":29,"publisher":"IEEE Comput. Soc","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1109\/isca.2003.1207008","type":"proceedings-article","created":{"date-parts":[[2004,2,3]],"date-time":"2004-02-03T19:24:01Z","timestamp":1075836241000},"source":"Crossref","is-referenced-by-count":4,"title":["A pipelined memory architecture for high throughput network processors"],"prefix":"10.1109","author":[{"given":"T.","family":"Sherwood","sequence":"first","affiliation":[]},{"given":"G.","family":"Varghese","sequence":"additional","affiliation":[]},{"given":"B.","family":"Calder","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/75246.75248"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1997.644547"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/65.912717"},{"key":"ref13","article-title":"Packet classification using hierarchical intelligent cuttings","author":"gupta","year":"1999","journal-title":"Proceedings of Hot Interconnects VII"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/2.612252"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/285243.285283"},{"key":"ref16","article-title":"Netbench: A benchmarking suite for network processors","author":"gokhan","year":"2001","journal-title":"IEEE INternational Conference Computer-Aided Design (ICCAD)"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/321479.321481"},{"key":"ref18","article-title":"Interconnections: Bridges, Routers, Switches, and Internetworking Protocols","author":"perlman","year":"1999"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.1998.742118"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/99517.99525"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832227"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2000.842295"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/90.649568"},{"key":"ref6","article-title":"CERT\/CC. Code Red worm exploiting buffer overflow in IIS indexing service DLL","year":"2002","journal-title":"CERT Advisory CA-2001&#x2013;19"},{"key":"ref29","doi-asserted-by":"crossref","first-page":"101","DOI":"10.1145\/103720.103721","article-title":"Virtual clock: A new traffic control algorithm for packet switching networks","author":"zhang","year":"1991","journal-title":"ACM Transactions on Computer Systems"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/359842.359859"},{"key":"ref8","article-title":"Workloads for programmable network interfaces","author":"patrick","year":"1999","journal-title":"IEEE Annual Workshop on Workload Characterization"},{"key":"ref7","article-title":"A modeling framework for network processor systems","author":"crowley","year":"2002","journal-title":"in Network Processor Workshop in conjunction with Eighth International Symposium on High Performance Computer Architecture (HPCA-8)"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"ref9","first-page":"3","article-title":"Small forwarding tables for fast routing lookups","author":"degermark","year":"1997","journal-title":"Proceedings of SIGCOMM"},{"key":"ref1","article-title":"Malicious code attacks had $13.2 billion economic impact in 2001","year":"2002","journal-title":"Computational Economics"},{"key":"ref20","first-page":"229","article-title":"Snort &#x2013; lightweight intrusion detection for networks","author":"roesch","year":"1999","journal-title":"Proceedings of LISA'99 13th Systems Administration Conference"},{"key":"ref22","article-title":"Understanding network processors","author":"shah","year":"2001"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/65.912716"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/296502.296503"},{"key":"ref23","first-page":"216","article-title":"Building a robust software-based router using network processors","author":"tammo","year":"2001","journal-title":"Symposium on Operating Systems Principles"},{"key":"ref26","article-title":"A network processor performance and design model with benchmark parameterization","author":"wolf","year":"2002","journal-title":"in Network Processor Workshop in conjunction with Eighth International Symposium on High Performance Computer Architecture (HPCA-8)"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/65.642356"}],"event":{"name":"ISCA 2003: 30th International Symposium on Computer Architecture","location":"San Diego, CA, USA","acronym":"ISCA-03"},"container-title":["30th Annual International Symposium on Computer Architecture, 2003. Proceedings."],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/8578\/27165\/01207008.pdf?arnumber=1207008","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,16]],"date-time":"2017-06-16T03:26:12Z","timestamp":1497583572000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/1207008\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/isca.2003.1207008","relation":{},"subject":[]}}