Difference between revisions of "Publications 2005-2009"

From ARL Wiki
Jump to navigationJump to search
Line 38: Line 38:
  
 
=== Conference Papers ===
 
=== Conference Papers ===
 +
 +
* [http://www.arl.wustl.edu/~mbecchi/files/becchi_iiswc2008.pdf  A Workload for Evaluating Deep Packet
 +
Inspection Architectures], by Michela Becchi and Patrick Crowley.  In ''Proceedings 2008 IEEE International Symposium on Workload Characterization'', 9/2008.
  
 
* [http://www.arl.wustl.edu/~gorinsky/pdf/RD_Services_SIGCOMM_2008.pdf RD Network Services: Differentiation through Performance Incentives], by M. Podlesny and S. Gorinsky, ''Proceedings of ACM SIGCOMM'', 8/2008.
 
* [http://www.arl.wustl.edu/~gorinsky/pdf/RD_Services_SIGCOMM_2008.pdf RD Network Services: Differentiation through Performance Incentives], by M. Podlesny and S. Gorinsky, ''Proceedings of ACM SIGCOMM'', 8/2008.
Line 46: Line 49:
  
 
* [http://www.arl.wustl.edu/Publications/2005-09/sigcse08.pdf Operational Experience with a Virtual Networking Laboratory], by Charlie Wiseman, Ken Wong, Tilman Wolf, Sergey Gorinsky. In ''Proceedings of ACM SIGCSE'', 3/2008.
 
* [http://www.arl.wustl.edu/Publications/2005-09/sigcse08.pdf Operational Experience with a Virtual Networking Laboratory], by Charlie Wiseman, Ken Wong, Tilman Wolf, Sergey Gorinsky. In ''Proceedings of ACM SIGCSE'', 3/2008.
 
  
 
* [http://www.arl.wustl.edu/~mbecchi/files/becchi_conext2007.pdf  A Hybrid Finite Automaton for Practical Deep Packet Inspection], by Michela Becchi and Patrick Crowley.  In ''Proceedings of CoNEXT'', 12/2007.
 
* [http://www.arl.wustl.edu/~mbecchi/files/becchi_conext2007.pdf  A Hybrid Finite Automaton for Practical Deep Packet Inspection], by Michela Becchi and Patrick Crowley.  In ''Proceedings of CoNEXT'', 12/2007.

Revision as of 20:46, 30 July 2008

Dissertations and Theses

Journal Articles

Conference Papers

Inspection Architectures], by Michela Becchi and Patrick Crowley. In Proceedings 2008 IEEE International Symposium on Workload Characterization, 9/2008.

  • The Open Network Laboratory, by John DeHart, Fred Kuhns, Jyoti Parwatikar, Jonathan Turner, Charlie Wiseman, and Ken Wong, Proceedings of SIGCSE, 3/2006.
  • Multi-pattern Signature Matching for Hardware Network Intrusion Detection Systems, by Haoyu Song, and John Lockwood, Proceedings of Globecom, 11/2005.
  • Protecting TFRC from a Selfish Receiver, by Manfred Georg and Sergey Gorinsky. Proceedings of the Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services (ICAS/ICNS 2005), 10/2005.
  • Transformation Algorithms for Data Streams, by John W. Lockwood, Stephen G. Eick, Doyle J. Weishar, Ron Loui, James Moscola, Chip Kastner, Andrew Levine, Mike Attig. IEEE Aerospace Conference, Big Sky, Montana, 3/2005.

Patents

Technical Reports