{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:31:30Z","timestamp":1750307490852,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":45,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,25]],"date-time":"2010-10-25T00:00:00Z","timestamp":1287964800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,25]]},"DOI":"10.1145\/1872007.1872032","type":"proceedings-article","created":{"date-parts":[[2010,10,28]],"date-time":"2010-10-28T14:43:19Z","timestamp":1288276999000},"page":"1-12","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Range hash for regular expression pre-filtering"],"prefix":"10.1145","author":[{"given":"Masanori","family":"Bando","sequence":"first","affiliation":[{"name":"Polytechnic Institute of New York University, Brooklyn, NY"}]},{"given":"N. Sertac","family":"Artan","sequence":"additional","affiliation":[{"name":"Polytechnic Institute of New York University, Brooklyn, NY"}]},{"given":"Rihua","family":"Wei","sequence":"additional","affiliation":[{"name":"Polytechnic Institute of New York University, Brooklyn, NY"}]},{"given":"Xiangyi","family":"Guo","sequence":"additional","affiliation":[{"name":"Polytechnic Institute of New York University, Brooklyn, NY"}]},{"given":"H. Jonathan","family":"Chao","sequence":"additional","affiliation":[{"name":"Polytechnic Institute of New York University, Brooklyn, NY"}]}],"member":"320","published-online":{"date-parts":[[2010,10,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Akamai \"Real-Time Web Moniter\".  Akamai \"Real-Time Web Moniter\"."},{"key":"e_1_3_2_1_2_1","unstructured":"Cisco Press Release \"Cisco Introduces Foundation for Next-Generation Internet: The Cisco CRS-3 Carrier Routing System\".  Cisco Press Release \"Cisco Introduces Foundation for Next-Generation Internet: The Cisco CRS-3 Carrier Routing System\"."},{"key":"e_1_3_2_1_3_1","unstructured":"IEEE Press Release \"IEEE Launches Next Generation of High-Rate Ethernet with New IEEE 802.3ba Standard\".  IEEE Press Release \"IEEE Launches Next Generation of High-Rate Ethernet with New IEEE 802.3ba Standard\"."},{"key":"e_1_3_2_1_4_1","unstructured":"Juniper Press Release \"Industry Leaders Demonstrate 100 Gigabit Ethernet Interoperability at OFC\".  Juniper Press Release \"Industry Leaders Demonstrate 100 Gigabit Ethernet Interoperability at OFC\"."},{"key":"e_1_3_2_1_5_1","unstructured":"Snort network intrusion detection system. http:\/\/www.snort.org.  Snort network intrusion detection system. http:\/\/www.snort.org."},{"key":"e_1_3_2_1_6_1","unstructured":"Verizon and Nokia Siemens Networks Set New Record for 100 Gbps Optical Transmission. http:\/\/newscenter.verizon.com\/press-releases\/verizon\/2008\/verizon-and-nokia-siemens.html.  Verizon and Nokia Siemens Networks Set New Record for 100 Gbps Optical Transmission. http:\/\/newscenter.verizon.com\/press-releases\/verizon\/2008\/verizon-and-nokia-siemens.html."},{"key":"e_1_3_2_1_7_1","volume-title":"IFIP","author":"Anagnostakis K.","year":"2003","unstructured":"K. Anagnostakis , S. Antonatos , E. Markatos , and M. Polychronakis . E2XB: A Domain-specific String Matching Algorithm for Intrusion Detection . In IFIP , 2003 . K. Anagnostakis, S. Antonatos, E. Markatos, and M. Polychronakis. E2XB: A Domain-specific String Matching Algorithm for Intrusion Detection. In IFIP, 2003."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.333"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.23"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2004.842232"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPL.2006.311246"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2008.ECP.391"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882486.1882496"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPSW.2010.5470750"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.128"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1364654.1364656"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323573"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1477942.1477950"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544037"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2006.270302"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.164"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/800105.803400"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1331331.1331345"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2004.1268997"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452335.1452339"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/40.820051"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323574"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159952"},{"key":"e_1_3_2_1_29_1","first-page":"246","volume-title":"Hexa: Compact data structures for faster packet processing","author":"Kumar S.","unstructured":"S. Kumar , J. Turner , P. Crowley , and M. Mitzenmacher . Hexa: Compact data structures for faster packet processing . pages 246 -- 255 . S. Kumar, J. Turner, P. Crowley, and M. Mitzenmacher. Hexa: Compact data structures for faster packet processing. pages 246--255."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185359"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/285237.285283"},{"key":"e_1_3_2_1_32_1","first-page":"1373","volume-title":"INFOCOM","author":"Li Q.","year":"2005","unstructured":"Q. Li , E.-C. Chang , and M. Chan . On the effectiveness of ddos attacks on statistical filtering . In INFOCOM , pages 1373 -- 1383 , 2005 . Q. Li, E.-C. Chang, and M. Chan. On the effectiveness of ddos attacks on statistical filtering. In INFOCOM, pages 1373--1383, 2005."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/997150.997156"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323571"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/VLSISOC.2007.4402466"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CONECT.2003.1231477"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863980"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402958.1402983"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2007.912036"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICC.2008.321"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132462.1132464"},{"key":"e_1_3_2_1_42_1","first-page":"2628","article-title":"Deterministic memory-efficient string matching algorithms for intrusion detection","volume":"4","author":"Tuck N.","year":"2004","unstructured":"N. Tuck , T. Sherwood , B. Calder , and G. Varghese . Deterministic memory-efficient string matching algorithms for intrusion detection . INFOCOM , 4 : 2628 -- 2639 vol. 4, 2004 . N. Tuck, T. Sherwood, B. Calder, and G. Varghese. Deterministic memory-efficient string matching algorithms for intrusion detection. INFOCOM, 4:2628--2639 vol. 4, 2004.","journal-title":"INFOCOM"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2006.204"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185360"},{"key":"e_1_3_2_1_45_1","first-page":"174","volume-title":"ICNP","author":"Yu F.","year":"2004","unstructured":"F. Yu , R. Katz , and T. Lakshman . Gigabit rate packet pattern-matching using TCAM . In ICNP , pages 174 -- 183 , 2004 . F. Yu, R. Katz, and T. Lakshman. Gigabit rate packet pattern-matching using TCAM. In ICNP, pages 174--183, 2004."}],"event":{"name":"ANCS '10: Symposium on Architecture for Networking and Communications Systems","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGARCH ACM Special Interest Group on Computer Architecture","IEEE-CS\\TCCA TC on Computer Arhitecture"],"location":"La Jolla California","acronym":"ANCS '10"},"container-title":["Proceedings of the 6th ACM\/IEEE Symposium on Architectures for Networking and Communications Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1872007.1872032","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1872007.1872032","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:17:33Z","timestamp":1750249053000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1872007.1872032"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,25]]},"references-count":45,"alternative-id":["10.1145\/1872007.1872032","10.1145\/1872007"],"URL":"https:\/\/doi.org\/10.1145\/1872007.1872032","relation":{},"subject":[],"published":{"date-parts":[[2010,10,25]]},"assertion":[{"value":"2010-10-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}