Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- ArticleOctober 2005
High-throughput linked-pattern matching for intrusion detection systems
ANCS '05: Proceedings of the 2005 ACM symposium on Architecture for networking and communications systemsPages 193–202https://doi.org/10.1145/1095890.1095918This paper presents a hardware architecture for highly efficient intrusion detection systems. In addition, a software tool for automatically generating the hardware is presented.Intrusion detection for network security is a compute-intensive application ...
- ArticleOctober 2005
Framework for supporting multi-service edge packet processing on network processors
ANCS '05: Proceedings of the 2005 ACM symposium on Architecture for networking and communications systemsPages 163–171https://doi.org/10.1145/1095890.1095913Network edge packet-processing systems, as are commonly implemented on network processor platforms, are increasingly required to support a rich set of services. These multi-service systems are also subjected to widely varying and unpredictable traffic. ...
- ArticleOctober 2005
Addressing data compatibility on programmable network platforms
ANCS '05: Proceedings of the 2005 ACM symposium on Architecture for networking and communications systemsPages 125–134https://doi.org/10.1145/1095890.1095908Large-scale applications require the efficient exchange of data across their distributed components, including data from heterogeneous sources and to widely varying clients. Inherent to such data exchanges are (1) discrepancies among the data ...
- ArticleOctober 2005
Architectural impact of stateful networking applications
ANCS '05: Proceedings of the 2005 ACM symposium on Architecture for networking and communications systemsPages 11–18https://doi.org/10.1145/1095890.1095893The explosive and robust growth of the Internet owes a lot to the "end-to-end principle", which pushes stateful operations to the end-points. The Internet grew both in traffic volume, and in the richness of the applications it supports. The growth also ...
- ArticleOctober 2005
Overcoming the memory wall in packet processing: hammers or ladders?
ANCS '05: Proceedings of the 2005 ACM symposium on Architecture for networking and communications systemsPages 1–10https://doi.org/10.1145/1095890.1095892Overhead of memory accesses limits the performance of packet processing applications. To overcome this bottleneck, today's network processors can utilize a wide-range of mechanisms-such as multi-level memory hierarchy, wide-word accesses, special-...