{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,5]],"date-time":"2026-03-05T15:54:35Z","timestamp":1772726075019,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":26,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,12,3]],"date-time":"2007-12-03T00:00:00Z","timestamp":1196640000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,12,3]]},"DOI":"10.1145\/1323548.1323573","type":"proceedings-article","created":{"date-parts":[[2007,12,7]],"date-time":"2007-12-07T19:19:41Z","timestamp":1197055181000},"page":"145-154","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":170,"title":["An improved algorithm to accelerate regular expression evaluation"],"prefix":"10.1145","author":[{"given":"Michela","family":"Becchi","sequence":"first","affiliation":[{"name":"Washington University, St. Louis, MO"}]},{"given":"Patrick","family":"Crowley","sequence":"additional","affiliation":[{"name":"Washington University, St. Louis, MO"}]}],"member":"320","published-online":{"date-parts":[[2007,12,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/360825.360855"},{"key":"e_1_3_2_1_2_1","unstructured":"J. E. Hopcroft and J. D. Ullman \"Introduction to Automata Theory Languages and Computation \" Addison Wesley 1979.   J. E. Hopcroft and J. D. Ullman \"Introduction to Automata Theory Languages and Computation \" Addison Wesley 1979."},{"key":"e_1_3_2_1_3_1","first-page":"189","article-title":"An nlogn algorithm for minimizing states in a finite automaton,\" in Theory of Machines and Computation, J. Kohavi","author":"Hopcroft J.","year":"1971","journal-title":"Ed. New York: Academic"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1957.tb01515.x"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1090\/S0002-9939-1956-0078686-7"},{"key":"e_1_3_2_1_6_1","first-page":"1396","article-title":"On the shortest arborescence of a directed graph","volume":"14","author":"Chu Y. J.","year":"1965","journal-title":"Science Sinica"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.6028\/jres.071B.032"},{"key":"e_1_3_2_1_8_1","volume-title":"SIAM","author":"Tarjan R. E.","year":"1983"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159952"},{"key":"e_1_3_2_1_10_1","unstructured":"M. Roesch \"SNORT: Lightweight Intrusion Detection for Networks \" in 13th System Administration Conf. Nov 1999.   M. Roesch \"SNORT: Lightweight Intrusion Detection for Networks \" in 13th System Administration Conf. Nov 1999."},{"key":"e_1_3_2_1_11_1","unstructured":"SNORT\n\n  \n  : http:\/\/www.snort.org  SNORT: http:\/\/www.snort.org"},{"key":"e_1_3_2_1_12_1","unstructured":"Bro: A System for Detecting Network Intruders in Real-Time. http:\/\/www.icir.org\/vern\/bro-info.html  Bro: A System for Detecting Network Intruders in Real-Time. http:\/\/www.icir.org\/vern\/bro-info.html"},{"key":"e_1_3_2_1_13_1","unstructured":"Cisco Systems. Cisco Adaptive Security Appliance. http:\/\/www.cisco.com. 2007.  Cisco Systems. Cisco Adaptive Security Appliance. http:\/\/www.cisco.com. 2007."},{"key":"e_1_3_2_1_14_1","unstructured":"Citrix Systems. Citrix Application Firewall. http:\/\/www.citrix.com. 2007.  Citrix Systems. Citrix Application Firewall. http:\/\/www.citrix.com. 2007."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185360"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185359"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988742"},{"key":"e_1_3_2_1_18_1","first-page":"333","volume-title":"IEEE Infocom","author":"Tuck N.","year":"2004"},{"key":"e_1_3_2_1_19_1","unstructured":"G. Varghese \"Network Algorithms: An Interdisciplinary Approach to Designing Fast Networked Devices\" Morgan Kaufmann 1st ed. 2004.   G. Varghese \"Network Algorithms: An Interdisciplinary Approach to Designing Fast Networked Devices\" Morgan Kaufmann 1st ed. 2004."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948145"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1058426.1058885"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"C. R. Clark and D. E. Schimmel \"Efficient reconfigurable logic circuit for matching complex network intrusion detection patterns \" In FPL 2003.  C. R. Clark and D. E. Schimmel \"Efficient reconfigurable logic circuit for matching complex network intrusion detection patterns \" In FPL 2003.","DOI":"10.1007\/978-3-540-45234-8_94"},{"key":"e_1_3_2_1_23_1","volume-title":"USA","author":"Moscola J.","year":"2003"},{"key":"e_1_3_2_1_24_1","unstructured":"http:\/\/www.tensilica.com  http:\/\/www.tensilica.com"},{"key":"e_1_3_2_1_25_1","unstructured":"Cisco Systems. Silicon Packet Processor in the CRS-1 Router. http:\/\/www.cisco.com\/en\/US\/products\/ps5763\/index.html  Cisco Systems. Silicon Packet Processor in the CRS-1 Router. http:\/\/www.cisco.com\/en\/US\/products\/ps5763\/index.html"},{"key":"e_1_3_2_1_26_1","article-title":"The Next Generation of Intel IXP Network Processors","volume":"6","author":"Adiletta M.","year":"2002","journal-title":"Journal"}],"event":{"name":"ANCS07: Symposium on Architecture for Networking and Communications Systems","location":"Orlando Florida USA","acronym":"ANCS07","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","ACM Association for Computing Machinery","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 3rd ACM\/IEEE Symposium on Architecture for networking and communications systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1323548.1323573","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1323548.1323573","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:14Z","timestamp":1750254974000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1323548.1323573"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,12,3]]},"references-count":26,"alternative-id":["10.1145\/1323548.1323573","10.1145\/1323548"],"URL":"https:\/\/doi.org\/10.1145\/1323548.1323573","relation":{},"subject":[],"published":{"date-parts":[[2007,12,3]]},"assertion":[{"value":"2007-12-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}