{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:05:18Z","timestamp":1767261918497,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,3,21]],"date-time":"2006-03-21T00:00:00Z","timestamp":1142899200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,3,21]]},"DOI":"10.1145\/1128817.1128867","type":"proceedings-article","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T21:40:43Z","timestamp":1147124443000},"page":"332-342","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":71,"title":["Dynamic rule-ordering optimization for high-speed firewall filtering"],"prefix":"10.1145","author":[{"given":"Hazem","family":"Hamed","sequence":"first","affiliation":[{"name":"DePaul University, Chicago, Illinois"}]},{"given":"Ehab","family":"Al-Shaer","sequence":"additional","affiliation":[{"name":"DePaul University, Chicago, Illinois"}]}],"member":"320","published-online":{"date-parts":[[2006,3,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2004.4623689"},{"volume-title":"Athena Scientific","year":"1997","author":"Bertsimas D.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","unstructured":"D. Chapman and E. Zwicky. Building Internet Firewalls. Orielly & Associates Inc. second edition edition 2000.   D. Chapman and E. Zwicky. Building Internet Firewalls. Orielly & Associates Inc. second edition edition 2000."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1071690.1064222"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832493"},{"key":"e_1_3_2_1_6_1","first-page":"5","article-title":"Optimizing and applixation in deterministic seuquencing and scheduling: A surevey","author":"Graham R.","year":"1979","journal-title":"Annals of Discrete Mathematics"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.912717"},{"volume-title":"Interconnects VII","year":"1999","author":"Gupta P.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832490"},{"key":"e_1_3_2_1_11_1","unstructured":"D.\n       \n      Knuth\n    .\n      \n  \n   \n  Fundamental Algorithms volume \n  1\n   of \n  The Art of Computer Programming\n  . \n  Addison-Wesley Reading Massachusetts third\n   edition.  D. Knuth. Fundamental Algorithms volume 1 of The Art of Computer Programming. Addison-Wesley Reading Massachusetts third edition."},{"key":"e_1_3_2_1_13_1","first-page":"2","article-title":"Sequencing jobs to minimize total weighted completion time subject to precedence constraints","author":"Lawler E.","year":"1978","journal-title":"Annals of Discrete Mathematics"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"crossref","unstructured":"J. Lenstra and A. Kan. Complexity of scheduling under precendence constraints. Operations Research 26(1) 1978.  J. Lenstra and A. Kan. Complexity of scheduling under precendence constraints. Operations Research 26(1) 1978.","DOI":"10.1287\/opre.26.1.22"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.1993.253403"},{"key":"e_1_3_2_1_16_1","unstructured":"Passive Measurement and Analysis Project National Laboratory for Applied Network Research. Auckland-VIII Traces. http:\/\/pma.nlanr.net\/Special\/auck8.html December 2003.  Passive Measurement and Analysis Project National Laboratory for Applied Network Research. Auckland-VIII Traces. http:\/\/pma.nlanr.net\/Special\/auck8.html December 2003."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/647801.737001"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/359997.360000"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/645587.659466"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/316194.316216"},{"key":"e_1_3_2_1_21_1","first-page":"2002","article-title":"User Guide for ACL Manager 1.4","author":"Systems Cisco","year":"2000","journal-title":"Cisco Works"},{"key":"e_1_3_2_1_22_1","unstructured":"Cisco Systems. Netflow services solutions guide October 2004.  Cisco Systems. Netflow services solutions guide October 2004."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2005.1497898"},{"key":"e_1_3_2_1_24_1","unstructured":"SimJava v2.0. Process based discrete event simulation package for java. http:\/\/www.dcs.ed.ac.uk\/home\/hase\/simjava\/ 2002.  SimJava v2.0. Process based discrete event simulation package for java. http:\/\/www.dcs.ed.ac.uk\/home\/hase\/simjava\/ 2002."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064413.1064417"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832499"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2004.2"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/99508.99525"},{"volume-title":"Addison-Wesley","year":"1949","author":"Zipf G.","key":"e_1_3_2_1_29_1"}],"event":{"name":"Asia CCS06: ACM Symposium on Information, Computer and Communications Security 2006","sponsor":["SIGSAC ACM Special Interest Group on Security, Audit, and Control"],"location":"Taipei Taiwan","acronym":"Asia CCS06"},"container-title":["Proceedings of the 2006 ACM Symposium on Information, computer and communications security"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128867","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1128817.1128867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:17Z","timestamp":1750259177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1128817.1128867"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,3,21]]},"references-count":27,"alternative-id":["10.1145\/1128817.1128867","10.1145\/1128817"],"URL":"https:\/\/doi.org\/10.1145\/1128817.1128867","relation":{},"subject":[],"published":{"date-parts":[[2006,3,21]]},"assertion":[{"value":"2006-03-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}