{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T12:42:24Z","timestamp":1730292144335,"version":"3.28.0"},"reference-count":22,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,7]]},"DOI":"10.1109\/recosoc.2017.8016159","type":"proceedings-article","created":{"date-parts":[[2017,8,24]],"date-time":"2017-08-24T16:54:51Z","timestamp":1503593691000},"page":"1-8","source":"Crossref","is-referenced-by-count":6,"title":["Programmable SoC platform for deep packet inspection using enhanced Boyer-Moore algorithm"],"prefix":"10.1109","author":[{"given":"Adrian","family":"Dominguez","sequence":"first","affiliation":[]},{"given":"Pedro P.","family":"Carballo","sequence":"additional","affiliation":[]},{"given":"Antonio","family":"Nunez","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/DIPDMWC.2016.7529380"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-015-0466-4"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3033288.3033346"},{"journal-title":"Content Inspection Performance with Hyperscan on Intel Processors","year":"0","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2013.52"},{"journal-title":"Zynq-7000 All Programmable SoC","year":"0","key":"ref15"},{"journal-title":"UG954","year":"0","key":"ref16"},{"journal-title":"ARM AMBA Specification","year":"0","key":"ref17"},{"year":"2012","key":"ref18","first-page":"1"},{"key":"ref19","article-title":"Vivado design suite","volume":"5","author":"feist","year":"2012","journal-title":"White Paper"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/359842.359859"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2566669"},{"key":"ref6","article-title":"Boyer Moore Algorithm - Bad Character Heuristic","volume":"2016","year":"0","journal-title":"computer science portal for geeks"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2431211.2431212"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.12785\/amis\/070245"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2010.5466687"},{"journal-title":"Comparison of Deep Packet Inspection (DPI) Tools for Traffic Classification","year":"2013","author":"bujlow","key":"ref2"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ECTICon.2012.6254301"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICEAS.2011.6147137"},{"journal-title":"Intellectual Property","year":"0","key":"ref20"},{"journal-title":"EthernetFMC - Quad Port Gigabit Ethernet FMC","year":"0","key":"ref22"},{"journal-title":"Network Time Protocol (Version 3) Specification Implementation and Analysis &#x201D; Internet Request for Comments","year":"1992","author":"mills","key":"ref21"}],"event":{"name":"2017 12th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)","start":{"date-parts":[[2017,7,12]]},"location":"Madrid, Spain","end":{"date-parts":[[2017,7,14]]}},"container-title":["2017 12th International Symposium on Reconfigurable Communication-centric Systems-on-Chip (ReCoSoC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8010994\/8016139\/08016159.pdf?arnumber=8016159","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,9,7]],"date-time":"2017-09-07T00:36:51Z","timestamp":1504744611000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8016159\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7]]},"references-count":22,"URL":"https:\/\/doi.org\/10.1109\/recosoc.2017.8016159","relation":{},"subject":[],"published":{"date-parts":[[2017,7]]}}}