{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:04Z","timestamp":1750307284071,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,10,19]],"date-time":"2009-10-19T00:00:00Z","timestamp":1255910400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS 0832108"],"award-info":[{"award-number":["CNS 0832108"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["6.06E+15"],"award-info":[{"award-number":["6.06E+15"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,10,19]]},"DOI":"10.1145\/1882486.1882497","type":"proceedings-article","created":{"date-parts":[[2010,11,12]],"date-time":"2010-11-12T14:38:38Z","timestamp":1289572718000},"page":"50-59","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["An adaptive hash-based multilayer scheduler for L7-filter on a highly threaded hierarchical multi-core server"],"prefix":"10.1145","author":[{"given":"Danhua","family":"Guo","sequence":"first","affiliation":[{"name":"University of California, Riverside, CA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Guangdeng","family":"Liao","sequence":"additional","affiliation":[{"name":"University of California, Riverside, CA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Laxmi N.","family":"Bhuyan","sequence":"additional","affiliation":[{"name":"University of California, Riverside, CA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Bin","family":"Liu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, P.R. China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2009,10,19]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Application Layer Packet Classifier for Linux (L7-filter) http:\/\/17-filter.sourceforge.net\/.  Application Layer Packet Classifier for Linux (L7-filter) http:\/\/17-filter.sourceforge.net\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2006.7"},{"key":"e_1_3_2_1_3_1","unstructured":"Cisco IOS Netflow http:\/\/www.cisco.com\/en\/US\/products\/ps6601\/products_ios_protocol_group_home.html  Cisco IOS Netflow http:\/\/www.cisco.com\/en\/US\/products\/ps6601\/products_ios_protocol_group_home.html"},{"key":"e_1_3_2_1_4_1","unstructured":"Cisco Systems. Scaling the world wide web. Available from http:\/\/cio.cisco.com\/warp\/public\/751\/advtg\/swww_wp.htm.  Cisco Systems. Scaling the world wide web. Available from http:\/\/cio.cisco.com\/warp\/public\/751\/advtg\/swww_wp.htm."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/233013.233020"},{"volume-title":"OSDI '06","author":"Fedorova A.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1477942.1477952"},{"volume-title":"IEEE INFOCOM '09","author":"Hua N.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","unstructured":"Huawei MSCG Hierarchical DPI Solution http:\/\/www.huawei.com\/products\/datacomm\/catalog.do?id=1 219  Huawei MSCG Hierarchical DPI Solution http:\/\/www.huawei.com\/products\/datacomm\/catalog.do?id=1 219"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.1986.1146410"},{"key":"e_1_3_2_1_11_1","unstructured":"Juniper M Series Multiservice Edge Routers http:\/\/www.juniper.net\/us\/en\/local\/pdf\/datasheets\/1000042-en.pdf  Juniper M Series Multiservice Edge Routers http:\/\/www.juniper.net\/us\/en\/local\/pdf\/datasheets\/1000042-en.pdf"},{"volume-title":"IEEE INFOCOM","year":"2002","author":"Kencl Lukas","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185359"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1159913.1159952"},{"key":"e_1_3_2_1_15_1","unstructured":"libnids http:\/\/libnids.sourceforge.net\/  libnids http:\/\/libnids.sourceforge.net\/"},{"key":"e_1_3_2_1_16_1","first-page":"06","article-title":"Niagara 2 Opens the Floodgates - Niagara 2 Design is the Closest thing Yet to a True Server on a Chip","volume":"11","author":"McGhan Harlan","journal-title":"The Insider's Guide to Microprocessor Hardware"},{"key":"e_1_3_2_1_17_1","unstructured":"MIT DARPA Intrusion Detection Data Sets http:\/\/www.ll.mit.edu\/IST\/ideval\/data\/2000\/2000_data_index.html.  MIT DARPA Intrusion Detection Data Sets http:\/\/www.ll.mit.edu\/IST\/ideval\/data\/2000\/2000_data_index.html."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323571"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185358"},{"key":"e_1_3_2_1_20_1","unstructured":"SPECweb 2005 Published Results http:\/\/www.spec.org\/web2005\/results\/  SPECweb 2005 Published Results http:\/\/www.spec.org\/web2005\/results\/"},{"key":"e_1_3_2_1_21_1","unstructured":"Receive Side Scaling (RSS) http:\/\/www.microsoft.com\/whdc\/device\/network\/NDIS_RSS.mspx\/.  Receive Side Scaling (RSS) http:\/\/www.microsoft.com\/whdc\/device\/network\/NDIS_RSS.mspx\/."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.642358"},{"volume-title":"Oct 09, 2007, http:\/\/blogs.sun.com\/sistare\/entry\/the_ultrasparc_t2_processor_and","author":"Sistare Steve","key":"e_1_3_2_1_23_1"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1980.1675516"},{"key":"e_1_3_2_1_25_1","unstructured":"SNORT Network Intrusion Detection System http:\/\/www.snort.org\/  SNORT Network Intrusion Detection System http:\/\/www.snort.org\/"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273004"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.5"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.663936"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323548.1323562"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1477942.1477954"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185360"}],"event":{"name":"ANCS '09: Symposium on Architecture for Networking and Communications Systems","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication","SIGARCH ACM Special Interest Group on Computer Architecture","IEEE-CS\\TCCA TC on Computer Arhitecture"],"location":"Princeton New Jersey","acronym":"ANCS '09"},"container-title":["Proceedings of the 5th ACM\/IEEE Symposium on Architectures for Networking and Communications Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1882486.1882497","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1882486.1882497","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:59:34Z","timestamp":1750244374000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1882486.1882497"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,10,19]]},"references-count":31,"alternative-id":["10.1145\/1882486.1882497","10.1145\/1882486"],"URL":"https:\/\/doi.org\/10.1145\/1882486.1882497","relation":{},"subject":[],"published":{"date-parts":[[2009,10,19]]},"assertion":[{"value":"2009-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}