{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:49:10Z","timestamp":1773193750259,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,27]],"date-time":"2024-04-27T00:00:00Z","timestamp":1714176000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2313062"],"award-info":[{"award-number":["2313062"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["2146476"],"award-info":[{"award-number":["2146476"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,27]]},"DOI":"10.1145\/3620665.3640412","type":"proceedings-article","created":{"date-parts":[[2024,4,22]],"date-time":"2024-04-22T14:18:06Z","timestamp":1713795486000},"page":"151-166","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["BVAP: Energy and Memory Efficient Automata Processing for Regular Expressions with Bounded Repetitions"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7081-0725","authenticated-orcid":false,"given":"Ziyuan","family":"Wen","sequence":"first","affiliation":[{"name":"Rice University, Houston, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0672-2998","authenticated-orcid":false,"given":"Lingkun","family":"Kong","sequence":"additional","affiliation":[{"name":"Rice University, Houston, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5444-5924","authenticated-orcid":false,"given":"Alexis","family":"Le Glaunec","sequence":"additional","affiliation":[{"name":"Rice University, Houston, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1209-7738","authenticated-orcid":false,"given":"Konstantinos","family":"Mamouras","sequence":"additional","affiliation":[{"name":"Rice University, Houston, United States of America"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7220-9389","authenticated-orcid":false,"given":"Kaiyuan","family":"Yang","sequence":"additional","affiliation":[{"name":"Rice University, Houston, United States of America"}]}],"member":"320","published-online":{"date-parts":[[2024,4,27]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"46","volume-title":"Efficient text searching of regular expressions","author":"Baeza-Yates Ricardo A.","year":"1989","unstructured":"Ricardo A. Baeza-Yates and Gaston H. Gonnet. Efficient text searching of regular expressions. In Giorgio Ausiello, Mariangiola Dezani-Ciancaglini, and Simonetta Ronchi Della Rocca, editors, Automata, Languages and Programming, pages 46--62, Heidelberg, 1989. Springer."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1544012.1544037"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/FPT.2006.270302"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2018.00068"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1880153.1880157"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2019.2950087"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM.2019.00025"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3470496.3533043"},{"key":"e_1_3_2_1_9_1","volume-title":"ClamAV - open source antivirus engine.","author":"AV.","year":"2023","unstructured":"ClamAV. ClamAV - open source antivirus engine. Available at https:\/\/www.clamav.net\/, 2023. [Online; Accessed 17 July, 2023]."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2014.8"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01694011"},{"key":"e_1_3_2_1_12_1","unstructured":"Apache Software Foundation. Apache Spamassassin. Available at https:\/\/spamassassin.apache.org\/ 2022. [Online; Accessed 17 July 2023]."},{"key":"e_1_3_2_1_13_1","first-page":"369","volume-title":"Mathematical Foundations of Computer Science","author":"Gelade Wouter","year":"2009","unstructured":"Wouter Gelade, Marc Gyssens, and Wim Martens. Regular expressions with counting: Weak versus strong determinism. In Mathematical Foundations of Computer Science 2009, pages 369--381, Heidelberg, 2009. Springer."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1070\/RM1961v016n05ABEH004112"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783747"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA53966.2022.00011"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3519939.3523456"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3586044"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-cdt.2011.0066"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00078"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378471"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3578338.3593524"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2012.49"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3632934"},{"key":"e_1_3_2_1_25_1","unstructured":"Pcre syntax. Available at https:\/\/www.pcre.org\/original\/doc\/html\/pcrepattern.html 2023. [Online; Accessed 18 July 2023]."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/FCCM48280.2020.00027"},{"key":"e_1_3_2_1_27_1","volume-title":"Regular expression Library.","year":"2023","unstructured":"RegexLib. Regular expression Library. Available at https:\/\/regexlib.com\/, 2023. [Online; Accessed 17 July, 2023]."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1039834.1039864"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TCBB.2015.2430313"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA47549.2020.00017"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3352460.3358324"},{"key":"e_1_3_2_1_32_1","volume-title":"a protein domain database for functional characterization and annotation. Nucleic Acids Research, 38(suppl_1):D161--D166","author":"Sigrist Christian J. A.","year":"2009","unstructured":"Christian J. A. Sigrist, Lorenzo Cerutti, Edouard de Castro, Petra S. Langendijk-Genevaux, Virginie Bulliard, Amos Bairoch, and Nicolas Hulo. PROSITE, a protein domain database for functional characterization and annotation. Nucleic Acids Research, 38(suppl_1):D161--D166, 2009."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2008.14"},{"key":"e_1_3_2_1_34_1","volume-title":"Snort - network intrusion detection & prevention system.","year":"2023","unstructured":"Snort. Snort - network intrusion detection & prevention system. Available at https:\/\/www.snort.org\/, 2023. [Online; Accessed 17 July, 2023]."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11265-007-0131-0"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2017.35"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3123986"},{"key":"e_1_3_2_1_38_1","volume-title":"Suricata - open source intrusion detection and prevention engine.","year":"2023","unstructured":"Suricata. Suricata - open source intrusion detection and prevention engine. Available at https:\/\/suricata.io\/, 2023. [Online; Accessed 17 July, 2023]."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2016.7498263"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/363347.363387"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354682"},{"key":"e_1_3_2_1_42_1","volume-title":"Proceedings of the ACM on Programming Languages, 4(OOP-SLA)","author":"Turo\u0148ov\u00e1 Lenka","year":"2020","unstructured":"Lenka Turo\u0148ov\u00e1, Luk\u00e1\u0161 Hol\u00edk, Ond\u0159ej Leng\u00e1l, Olli Saarikivi, Margus Veanes, and Tom\u00e1\u0161 Vojnar. Regex matching with counting-set automata. Proceedings of the ACM on Programming Languages, 4(OOP-SLA), 2020."},{"key":"e_1_3_2_1_43_1","volume-title":"YARA: The pattern matching swiss knife for malware researchers.","year":"2023","unstructured":"VirusTotal. YARA: The pattern matching swiss knife for malware researchers. Available at https:\/\/virustotal.github.io\/yara\/, 2023. [Online; Accessed 17 July, 2023]."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2016.7581271"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2018.8573482"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS53621.2022.00053"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.23919\/FPL.2017.8056759"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1477942.1477948"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1185347.1185360"},{"key":"e_1_3_2_1_50_1","first-page":"1083","volume-title":"14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20)","author":"Zhao Zhipeng","year":"2020","unstructured":"Zhipeng Zhao, Hugo Sadok, Nirav Atre, James C. Hoe, Vyas Sekar, and Justine Sherry. Achieving 100gbps intrusion prevention on a single server. In 14th USENIX Symposium on Operating Systems Design and Implementation (OSDI 20), pages 1083--1100. USENIX Association, November 2020."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2145816.2145833"}],"event":{"name":"ASPLOS '24: 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2","location":"La Jolla CA USA","acronym":"ASPLOS '24","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","SIGOPS ACM Special Interest Group on Operating Systems","SIGPLAN ACM Special Interest Group on Programming Languages","SIGBED ACM Special Interest Group on Embedded Systems"]},"container-title":["Proceedings of the 29th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620665.3640412","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3620665.3640412","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3620665.3640412","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3620665.3640412","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:03:42Z","timestamp":1750291422000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3620665.3640412"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,27]]},"references-count":51,"alternative-id":["10.1145\/3620665.3640412","10.1145\/3620665"],"URL":"https:\/\/doi.org\/10.1145\/3620665.3640412","relation":{},"subject":[],"published":{"date-parts":[[2024,4,27]]},"assertion":[{"value":"2024-04-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}