{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:16:51Z","timestamp":1750306611895,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,12,2]],"date-time":"2014-12-02T00:00:00Z","timestamp":1417478400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,12,2]]},"DOI":"10.1145\/2674005.2675005","type":"proceedings-article","created":{"date-parts":[[2014,12,8]],"date-time":"2014-12-08T16:30:28Z","timestamp":1418056228000},"page":"101-108","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Trees in the List"],"prefix":"10.1145","author":[{"given":"Sven","family":"Hager","sequence":"first","affiliation":[{"name":"Humboldt University of Berlin, Berlin, Germany"}]},{"given":"Stefan","family":"Selent","sequence":"additional","affiliation":[{"name":"Humboldt University of Berlin, Berlin, Germany"}]},{"given":"Bj\u00f6rn","family":"Scheuermann","sequence":"additional","affiliation":[{"name":"Humboldt University of Berlin, Berlin, Germany"}]}],"member":"320","published-online":{"date-parts":[[2014,12,2]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/www.freebsd.org\/doc\/en\/books\/handbook\/firewallsipfw. html. Last accessed on","author":"IPFW","year":"2014","unstructured":"IPFW packet filter. https:\/\/www.freebsd.org\/doc\/en\/books\/handbook\/firewallsipfw. html. Last accessed on September 28, 2014 . IPFW packet filter. https:\/\/www.freebsd.org\/doc\/en\/books\/handbook\/firewallsipfw. html. Last accessed on September 28, 2014."},{"volume-title":"www.netfilter.org. Last accessed on","year":"2014","key":"e_1_3_2_1_2_1","unstructured":"The netfilter.org project. www.netfilter.org. Last accessed on June 14, 2014 . The netfilter.org project. www.netfilter.org. Last accessed on June 14, 2014."},{"key":"e_1_3_2_1_3_1","volume-title":"http:\/\/www.openbsd.org\/faq\/pf\/. Last accessed on","author":"BSD","year":"2014","unstructured":"Open BSD packet filter. http:\/\/www.openbsd.org\/faq\/pf\/. Last accessed on June 14, 2014 . OpenBSD packet filter. http:\/\/www.openbsd.org\/faq\/pf\/. Last accessed on June 14, 2014."},{"key":"e_1_3_2_1_4_1","volume-title":"NDSS '07: The 14th Annual Network and Distributed System Security Symposium","author":"Acharya S.","year":"2007","unstructured":"S. Acharya , M. Abliz , B. Mills , T. Znati , J. Wang , Z. Ge , and A. Greenberg . OPTWALL: A hierarchical traffic-aware firewall . In NDSS '07: The 14th Annual Network and Distributed System Security Symposium , Feb. 2007 . S. Acharya, M. Abliz, B. Mills, T. Znati, J. Wang, Z. Ge, and A. Greenberg. OPTWALL: A hierarchical traffic-aware firewall. In NDSS '07: The 14th Annual Network and Distributed System Security Symposium, Feb. 2007."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2003.1208658"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/383059.383075"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comcom.2011.06.004"},{"key":"e_1_3_2_1_8_1","first-page":"34","volume-title":"HOTI '99: Proceedings of the 7th Symposium on High Performance Interconnects","author":"Gupta P.","year":"1999","unstructured":"P. Gupta and N. McKeown . Packet classification using hierarchical intelligent cuttings . In HOTI '99: Proceedings of the 7th Symposium on High Performance Interconnects , pages 34 -- 41 , Aug. 1999 . P. Gupta and N. McKeown. Packet classification using hierarchical intelligent cuttings. In HOTI '99: Proceedings of the 7th Symposium on High Performance Interconnects, pages 34--41, Aug. 1999."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.912717"},{"key":"e_1_3_2_1_10_1","unstructured":"S. Hager. Hitables source code. https:\/\/github.com\/shager\/hitables.  S. Hager. Hitables source code. https:\/\/github.com\/shager\/hitables."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/647056.713848"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626294"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/285237.285283"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOMW.2011.5928779"},{"key":"e_1_3_2_1_15_1","volume-title":"SIGCOMM '04: Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications","author":"Liu A.","year":"2004","unstructured":"A. Liu and M. Gouda . Removing redundancy from packet classifiers . In SIGCOMM '04: Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications , Sept. 2004 . A. Liu and M. Gouda. Removing redundancy from packet classifiers. In SIGCOMM '04: Proceedings of the 2004 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, Sept. 2004."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2008.44"},{"key":"e_1_3_2_1_17_1","volume-title":"Open Networking Foundation","author":"Nygren A.","year":"2013","unstructured":"A. Nygren OpenFlow switch specification. Technical report , Open Networking Foundation , Oct. 2013 . A. Nygren et al. OpenFlow switch specification. Technical report, Open Networking Foundation, Oct. 2013."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061972"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863980"},{"key":"e_1_3_2_1_20_1","unstructured":"H. Song. Evaluation of packet classification algorithms. http:\/\/www.arl.wustl.edu\/?hs1\/PClassEval.html. website includes publicly available rulesets last access: October 3 2014.  H. Song. Evaluation of packet classification algorithms. http:\/\/www.arl.wustl.edu\/?hs1\/PClassEval.html. website includes publicly available rulesets last access: October 3 2014."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/316188.316216"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/285237.285282"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.893156"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851208"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2000.832499"}],"event":{"name":"CoNEXT '14: Conference on emerging Networking Experiments and Technologies","sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"location":"Sydney Australia","acronym":"CoNEXT '14"},"container-title":["Proceedings of the 10th ACM International on Conference on emerging Networking Experiments and Technologies"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2674005.2675005","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2674005.2675005","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:17:04Z","timestamp":1750227424000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2674005.2675005"}},"subtitle":["Accelerating List-based Packet Classification Through Controlled Rule Set Expansion"],"short-title":[],"issued":{"date-parts":[[2014,12,2]]},"references-count":25,"alternative-id":["10.1145\/2674005.2675005","10.1145\/2674005"],"URL":"https:\/\/doi.org\/10.1145\/2674005.2675005","relation":{},"subject":[],"published":{"date-parts":[[2014,12,2]]},"assertion":[{"value":"2014-12-02","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}