{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,29]],"date-time":"2025-10-29T03:28:00Z","timestamp":1761708480961,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,2,21]],"date-time":"2010-02-21T00:00:00Z","timestamp":1266710400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,2,21]]},"DOI":"10.1145\/1723112.1723149","type":"proceedings-article","created":{"date-parts":[[2010,2,23]],"date-time":"2010-02-23T15:35:30Z","timestamp":1266939330000},"page":"209-218","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["A modular NFA architecture for regular expression matching"],"prefix":"10.1145","author":[{"given":"Hao","family":"Wang","sequence":"first","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Shi","family":"Pu","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Gabriel","family":"Knezek","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}],"role":[{"role":"author","vocab":"crossref"}]},{"given":"Jyh-Charn","family":"Liu","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University, College Station, TX, USA"}],"role":[{"role":"author","vocab":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2010,2,21]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"retrieved at Feb, 03","author":"Regular Expression Perl Compatible","year":"2009","unstructured":"Perl Compatible Regular Expression . retrieved at Feb, 03 , 2009 from http:\/\/www.pcre.org\/ Perl Compatible Regular Expression. retrieved at Feb, 03, 2009 from http:\/\/www.pcre.org\/"},{"key":"e_1_3_2_1_2_1","volume-title":"retrieved at Feb, 03","author":"POSIX","year":"2009","unstructured":"POSIX basic and extended regular expressions , retrieved at Feb, 03 , 2009 from http:\/\/www.regular-expressions.info\/posix.html POSIX basic and extended regular expressions, retrieved at Feb, 03, 2009 from http:\/\/www.regular-expressions.info\/posix.html"},{"volume-title":"retrieved at Jan, 28","year":"2009","key":"e_1_3_2_1_3_1","unstructured":"Snort. retrieved at Jan, 28 , 2009 from http:\/\/www.snort.org\/ Snort. retrieved at Jan, 28, 2009 from http:\/\/www.snort.org\/"},{"volume-title":"retrieved at Jan, 28","year":"2009","key":"e_1_3_2_1_4_1","unstructured":"Bro. retrieved at Jan, 28 , 2009 from http:\/\/www.bro-ids.org\/ Bro. retrieved at Jan, 28, 2009 from http:\/\/www.bro-ids.org\/"},{"key":"e_1_3_2_1_5_1","first-page":"l7","volume":"28","author":"Packet Application Layer","year":"2009","unstructured":"Application Layer Packet Classifier for Linux , retrieved at Jan , 28 , 2009 from http:\/\/ l7 -filter.sourceforge.net\/ Application Layer Packet Classifier for Linux, retrieved at Jan, 28, 2009 from http:\/\/l7-filter.sourceforge.net\/","journal-title":"Jan"},{"volume-title":"retrieved at Jan, 31","year":"2009","key":"e_1_3_2_1_6_1","unstructured":"SpamAssassin , retrieved at Jan, 31 , 2009 from http:\/\/www.spamassassin.org SpamAssassin, retrieved at Jan, 31, 2009 from http:\/\/www.spamassassin.org"},{"key":"e_1_3_2_1_7_1","volume-title":"retrieved at Feb, 16","author":"Flex","year":"2009","unstructured":"Flex -- a scanner generator , retrieved at Feb, 16 , 2009 from http:\/\/www.cs.princeton.edu\/~appel\/modern\/c\/software\/flex\/flex_toc.html Flex -- a scanner generator, retrieved at Feb, 16, 2009 from http:\/\/www.cs.princeton.edu\/~appel\/modern\/c\/software\/flex\/flex_toc.html"},{"key":"e_1_3_2_1_8_1","volume-title":"JLex: A lexical analyzer generator for Java\", retrieved at May, 18","author":"Berk E.","year":"2009","unstructured":"E. Berk and C. Ananian , \" JLex: A lexical analyzer generator for Java\", retrieved at May, 18 , 2009 from http:\/\/www.cs.princeton.edu\/~appel\/modern\/java\/JLex E. Berk and C. Ananian, \"JLex: A lexical analyzer generator for Java\", retrieved at May, 18, 2009 from http:\/\/www.cs.princeton.edu\/~appel\/modern\/java\/JLex"},{"key":"e_1_3_2_1_9_1","volume-title":"proceedings of Sixth Conferences on Email and Anti-Spam.","author":"Pu Shi","year":"2009","unstructured":"Shi Pu , Cheng-Chung Tan , Jyh-Charn Liu , \"SA2PX : A Tool to Translate SpamAssassin Regular Expression Rules to POSIX \". In proceedings of Sixth Conferences on Email and Anti-Spam. July 2009 . Shi Pu, Cheng-Chung Tan, Jyh-Charn Liu, \"SA2PX: A Tool to Translate SpamAssassin Regular Expression Rules to POSIX\". In proceedings of Sixth Conferences on Email and Anti-Spam. July 2009."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1058426.1058885"},{"volume-title":"Proc. of 12th IEEE Symposium on Field-Programmable Custom Comupting Machines 2004 (FCCM'04)","author":"Clark C. R.","key":"e_1_3_2_1_11_1","unstructured":"C. R. Clark , and D. E. Schimmel , \" Scalable Pattern Matching for High Speed Networks \", in Proc. of 12th IEEE Symposium on Field-Programmable Custom Comupting Machines 2004 (FCCM'04) C. R. Clark, and D. E. Schimmel, \"Scalable Pattern Matching for High Speed Networks\", in Proc. of 12th IEEE Symposium on Field-Programmable Custom Comupting Machines 2004 (FCCM'04)"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323571"},{"volume-title":"Proc. of Conference on Design, Automation and Test in Europe (DATE'06)","author":"Lin C.-H.","key":"e_1_3_2_1_13_1","unstructured":"C.-H. Lin , C.-T. Huang , C.-P. Jiang , and S.-C. Chang , \" Optimization of Regular Expression Pattern Matching Circuits on FPGA\" , in Proc. of Conference on Design, Automation and Test in Europe (DATE'06) C.-H. Lin, C.-T. Huang, C.-P. Jiang, and S.-C. Chang, \"Optimization of Regular Expression Pattern Matching Circuits on FPGA\", in Proc. of Conference on Design, Automation and Test in Europe (DATE'06)"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-007-0131-0"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/HOTI.2008.14"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ReConFig.2008.47"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2006.18"},{"volume-title":"Proc. of 11th IEEE Symposium on Field-Programming Custom Computing Machines2003 (FCCM'03)","author":"Moscola J.","key":"e_1_3_2_1_18_1","unstructured":"J. Moscola , J. Lockwood , R. P. Loui , and M. Pachos , \" Implementation of a Content-Scanning Module for an Internet Firewall \", in Proc. of 11th IEEE Symposium on Field-Programming Custom Computing Machines2003 (FCCM'03) J. Moscola, J. Lockwood, R. P. Loui, and M. Pachos, \"Implementation of a Content-Scanning Module for an Internet Firewall\", in Proc. of 11th IEEE Symposium on Field-Programming Custom Computing Machines2003 (FCCM'03)"},{"volume-title":"Proc. 16th Int'l Conference on Field Programmable Logic and Applications (FPL'06)","author":"Baker Z. K.","key":"e_1_3_2_1_19_1","unstructured":"Z. K. Baker , H.-J. Jung , and V. K. Prasanna , \" Regular Expression Software Deceleration For Intrusion Detection Systems \", in Proc. 16th Int'l Conference on Field Programmable Logic and Applications (FPL'06) Z. K. Baker, H.-J. Jung, and V. K. Prasanna, \"Regular Expression Software Deceleration For Intrusion Detection Systems\", in Proc. 16th Int'l Conference on Field Programmable Logic and Applications (FPL'06)"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323579"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2006.7"},{"volume-title":"Proc. of 13th Int'l Conference on Field Programmable Logic and Applications2003 (FPL'03)","author":"Sourdis I.","key":"e_1_3_2_1_22_1","unstructured":"I. Sourdis and D. Pnevmatikatos , \" Fast, Large-Scale String Match for a 10Gbps FPGA-based Network Intrusion Detection System \", in Proc. of 13th Int'l Conference on Field Programmable Logic and Applications2003 (FPL'03) I.Sourdis and D. Pnevmatikatos, \"Fast, Large-Scale String Match for a 10Gbps FPGA-based Network Intrusion Detection System\", in Proc. of 13th Int'l Conference on Field Programmable Logic and Applications2003 (FPL'03)"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323551"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.5"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/968280.968312"},{"volume-title":"FCCM 2004","author":"Attig M.","key":"e_1_3_2_1_26_1","unstructured":"M. Attig , S. Dharmapurikar , and J. Lockwood , \" Implementation Results of Bloom Filters for String Matching \", FCCM 2004 M. Attig, S. Dharmapurikar, and J. Lockwood, \"Implementation Results of Bloom Filters for String Matching\", FCCM 2004"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1403375.1403681"},{"volume-title":"ISCA 2007","author":"Yadav M.","key":"e_1_3_2_1_28_1","unstructured":"M. Yadav , A. Venkatachliah , and P. D. Franzon , Hardware Architecture of a Parallel Pattern Matching Engine , ISCA 2007 M. Yadav, A. Venkatachliah, and P. D. Franzon, Hardware Architecture of a Parallel Pattern Matching Engine, ISCA 2007"},{"key":"e_1_3_2_1_29_1","volume-title":"retrieved at Feb, 03","author":"Expression Perl Regular","year":"2009","unstructured":"Perl Regular Expression . retrieved at Feb, 03 , 2009 from http:\/\/www.perl.com\/doc\/manual\/--html\/pod\/perlre.html Perl Regular Expression. retrieved at Feb, 03, 2009 from http:\/\/www.perl.com\/doc\/manual\/--html\/pod\/perlre.html"},{"key":"e_1_3_2_1_31_1","volume-title":"April","author":"Franklin R.","year":"2002","unstructured":"R. Franklin , D. Carver , and B. Hutchings , \" Assisting Network Intrusion Detection with Reconfigurable Hardware,\" in IEEE Symposium on Field-Programmable Custom Computing Machines , April 2002 . R. Franklin, D. Carver, and B. Hutchings, \"Assisting Network Intrusion Detection with Reconfigurable Hardware,\" in IEEE Symposium on Field-Programmable Custom Computing Machines, April 2002."},{"volume-title":"http:\/\/www.wireshark.org\/, retrieved at Apr., 03","year":"2009","key":"e_1_3_2_1_32_1","unstructured":"Wireshark. http:\/\/www.wireshark.org\/, retrieved at Apr., 03 , 2009 Wireshark. http:\/\/www.wireshark.org\/, retrieved at Apr., 03, 2009"},{"key":"e_1_3_2_1_33_1","volume-title":"Introduction to Automata Theory, Languages, and Computation","author":"Hopcroft John E.","year":"2000","unstructured":"John E. Hopcroft , Rajeev Motwani , Jeffrey D. Ullman ( 2000 ). Introduction to Automata Theory, Languages, and Computation ( 2 nd Edition). Pearson Education. ISBN 0-201-44124-1 John E. Hopcroft, Rajeev Motwani, Jeffrey D. Ullman (2000). Introduction to Automata Theory, Languages, and Computation (2nd Edition). Pearson Education. ISBN 0-201-44124-1","edition":"2"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185360"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159952"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323574"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402983"},{"key":"e_1_3_2_1_38_1","first-page":"1064","volume-title":"Proc. of 26th Annual IEEE Conference on Computer Communications, 2007","author":"Becchi Michela","year":"2007","unstructured":"Michela Becchi , Srihari Cadambi . \" Memory-Efficient Regular Expression Search Using State Merging\". in Proc. of 26th Annual IEEE Conference on Computer Communications, 2007 . May 2007 . Page 1064 -- 1072 . Michela Becchi, Srihari Cadambi. \"Memory-Efficient Regular Expression Search Using State Merging\". in Proc. of 26th Annual IEEE Conference on Computer Communications, 2007. May 2007. Page 1064--1072."}],"event":{"name":"FPGA '10: ACM\/SIGDA International Symposium on Field Programmable Gate Arrays","sponsor":["SIGDA ACM Special Interest Group on Design Automation"],"location":"Monterey California USA","acronym":"FPGA '10"},"container-title":["Proceedings of the 18th annual ACM\/SIGDA international symposium on Field programmable gate arrays"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1723112.1723149","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1723112.1723149","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:15Z","timestamp":1750250475000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1723112.1723149"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,2,21]]},"references-count":37,"alternative-id":["10.1145\/1723112.1723149","10.1145\/1723112"],"URL":"https:\/\/doi.org\/10.1145\/1723112.1723149","relation":{},"subject":[],"published":{"date-parts":[[2010,2,21]]},"assertion":[{"value":"2010-02-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}