Author of the publication

Speculative Parallel Pattern Matching.

, , , and . IEEE Trans. Information Forensics and Security, 6 (2): 438-451 (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Fast Signature Matching Using Extended Finite Automaton (XFA)., , , and . ICISS, volume 5352 of Lecture Notes in Computer Science, page 158-172. Springer, (2008)Multi-byte Regular Expression Matching with Speculation., , , and . RAID, volume 5758 of Lecture Notes in Computer Science, page 284-303. Springer, (2009)Applying similarity metrics to 3D acquisition in structured-light systems., and . ICPR, page 1-4. IEEE Computer Society, (2008)XFA: Faster Signature Matching with Extended Automata., , and . IEEE Symposium on Security and Privacy, page 187-201. IEEE Computer Society, (2008)Cooperative Computing for Autonomous Data Centers., , , , , and . IPDPS, page 38-47. IEEE Computer Society, (2015)To CMP or not to CMP: analyzing packet classification on modern and traditional parallel architectures., , and . ANCS, page 43-44. ACM, (2007)Distributed Naming System for Mobile Ad Hoc Network., , , and . ICWN, page 509-515. CSREA Press, (2005)Backtracking Algorithmic Complexity Attacks against a NIDS., , and . ACSAC, page 89-98. IEEE Computer Society, (2006)Speculative Parallel Pattern Matching., , , and . IEEE Trans. Information Forensics and Security, 6 (2): 438-451 (2011)Real-time simulation in the real world (panel session)., , , , , and . SIGGRAPH, page 327. ACM, (1985)