Perfect hashing for network applications (2006)

Cached

Download Links

by Yi Lu , Balaji Prabhakar
Venue:in IEEE Symposium on Information Theory
Citations:10 - 1 self

Documents Related by Co-Citation

1456 Space/Time Trade-offs in Hash Coding with Allowable Errors – Burton H. Bloom - 1970
10 Multi-pattern signature matching for hardware network intrusion detection systems – H Song, J Lockwood - 2005
12 Architectures for Bit-Split String Scanning in Intrusion Detection – Lin Tan, Timothy Sherwood - 2006
24 Scalable pattern matching for high-speed networks – C R Clark, D E Schimmel - 2004
21 A Reconfigurable Perfect-Hashing Scheme For Packet Inspection – Ioannis Sourdis, Dionisios Pnevmatikatos, Stephan Wong, Stamatis Vassiliadis - 2005
14 High-throughput linked-pattern matching for intrusion detection systems – Z K Baker, V K Prasanna - 2005
94 Implementation of a Content-Scanning Module for an Internet Firewall – James Moscola, John Lockwood, Ronald P. Loui, Michael Pachos - 2003
21 Fast Reconfiguring Deep Packet Filter for 1+ Gigabit Network – Young H. Cho, William H. Mangione-Smith - 2005
5 Gigabit rate pattern-matching using tcam – F Yu, T Lakshman, R Katz - 2004
14 Simple and space-efficient minimal perfect hash functions – Fabiano C. Botelho, Rasmus Pagh, Nivio Ziviani - 2007
42 An Optimal Algorithm for Generating Minimal Perfect Hash Functions – Zbigniew J. Czech, George Havas, Bohdan S. Majewski - 1992
154 Deep Packet Inspection Using Parallel Bloom Filters – Sarang Dharmapurikar, Praveen Krishnamurthy, Todd Sproull, John Lockwood, Line Speeds - 2004
6 TriBiCa: Trie bitmap content analyzer for high-speed network intrusion detection – N. Sertac Artan
8557 R.: Introduction to Algorithms – T Cormen, C Leiserson, Rivest - 1990
11 Fundamental Study: Perfect Hashing – Z J Czech, G Havas, B S Majewski - 1997
9 Hash and displace: Efficient evaluation of minimal perfect hash functions – Rasmus Pagh - 1999
145 Data Structures and Algorithms 1: Sorting and Searching – K Mehlhorn - 1984
41 Practical minimal perfect hash functions for large databases – E Fox, Q Chen, A Daoud - 1992
17 A Domain-Specific String Matching Algorithm for Intrusion Detection – Anagnostakis Antonatos Markatos, K. G. Anagnostakis Ý, S. Antonatos, E. P. Markatos, M. Polychronakis - 2003