Difference between revisions of "Publications 2005-2009"

From ARL Wiki
Jump to navigationJump to search
Line 54: Line 54:
 
* [http://www.arl.wustl.edu/~cgw1/pubs/onl_netfpga2009.pdf Using the NetFPGA in the Open Network Laboratory], by Charlie Wiseman, Jonathan Turner, John DeHart, Jyoti Parwatikar, Ken Wong, and David Zar.  In ''Proceedings of the 1st NetFPGA Developer's Workshop'', 8/2009.
 
* [http://www.arl.wustl.edu/~cgw1/pubs/onl_netfpga2009.pdf Using the NetFPGA in the Open Network Laboratory], by Charlie Wiseman, Jonathan Turner, John DeHart, Jyoti Parwatikar, Ken Wong, and David Zar.  In ''Proceedings of the 1st NetFPGA Developer's Workshop'', 8/2009.
  
* [http://www.arl.wustl/edu/~cgw1/pubs/onl_sigcomm2009.pdf The Open Network Laboratory], by Charlie Wiseman, Jonathan Turner, and Patrick Crowley. Extended Abstract.  In ''Proceedings of ACM SIGCOMM'', 8/2009.
+
* [http://www.arl.wustl.edu/~cgw1/pubs/onl_sigcomm2009.pdf The Open Network Laboratory], by Charlie Wiseman, Jonathan Turner, and Patrick Crowley. Extended Abstract.  In ''Proceedings of ACM SIGCOMM'', 8/2009.
  
 
* [http://www.arl.wustl.edu/~mbecchi/files/becchi_conext2008.pdf Extending Finite Automata to Efficiently Match Perl-Compatible Regular Expressions], by Michela Becchi and Patrick Crowley.  In ''Proceedings of CoNEXT'', 12/2008.
 
* [http://www.arl.wustl.edu/~mbecchi/files/becchi_conext2008.pdf Extending Finite Automata to Efficiently Match Perl-Compatible Regular Expressions], by Michela Becchi and Patrick Crowley.  In ''Proceedings of CoNEXT'', 12/2008.

Revision as of 17:43, 12 December 2009

Dissertations and Theses

Journal Articles

Conference Papers

  • The Open Network Laboratory, by Charlie Wiseman, Jonathan Turner, and Patrick Crowley. Extended Abstract. In Proceedings of ACM SIGCOMM, 8/2009.
  • The Open Network Laboratory, by John DeHart, Fred Kuhns, Jyoti Parwatikar, Jonathan Turner, Charlie Wiseman, and Ken Wong, Proceedings of SIGCSE, 3/2006.
  • Multi-pattern Signature Matching for Hardware Network Intrusion Detection Systems, by Haoyu Song, and John Lockwood, Proceedings of Globecom, 11/2005.
  • Protecting TFRC from a Selfish Receiver, by Manfred Georg and Sergey Gorinsky. Proceedings of the Joint International Conference on Autonomic and Autonomous Systems and International Conference on Networking and Services (ICAS/ICNS 2005), 10/2005.
  • Transformation Algorithms for Data Streams, by John W. Lockwood, Stephen G. Eick, Doyle J. Weishar, Ron Loui, James Moscola, Chip Kastner, Andrew Levine, Mike Attig. IEEE Aerospace Conference, Big Sky, Montana, 3/2005.

Patents

Technical Reports