Filters








531 Hits in 5.8 sec

Towards Fast and Optimal Grouping of Regular Expressions via DFA Size Estimation

Tingwen Liu, Alex X. Liu, Jinqiao Shi, Yong Sun, Li Guo
2014 IEEE Journal on Selected Areas in Communications  
Second, we propose RegexGrouper, a RegEx grouping algorithm based on DFA size estimation.  ...  In terms of speed and memory consumption, our work is orders of magnitude more efficient than prior art because DFA size estimation is much faster and memory efficient than DFA construction.  ...  ACKNOWLEDGMENT We are extremely grateful for the valuable suggestions and comments from the reviewers. We would like to thank Zhilu Zhang for helping with the experiments when we conduct the revision.  ... 
doi:10.1109/jsac.2014.2358839 fatcat:uysdrjcrj5edrdqnvvitufdvfi

Guest Editorial Deep Packet Inspection: Algorithms, Hardware, and Applications

Ying-Dar Lin, Po-Ching Lin, Viktor K. Prasanna, H. Jonathan Chao, John W. Lockwood
2014 IEEE Journal on Selected Areas in Communications  
D EEP packet inspection (DPI) examines the content in packet payloads to search for signatures of network applications, signs of malicious activities, and leaks of sensitive information, rather than just  ...  DPI is inherently challenging due to the need to handle everincreasing number of signatures and the diversity of application protocol messages.  ...  The paper "Towards Fast and Optimal Grouping of Regular Expressions via DFA Size Estimation" by Tingwen Liu, Alex X.  ... 
doi:10.1109/jsac.2014.2371093 fatcat:ze5m5gzosvhbjgyrp63pen5rta

Unconstrained Fashion Landmark Detection via Hierarchical Recurrent Transformer Networks [article]

Sijie Yan, Ziwei Liu, Ping Luo, Shi Qiu, Xiaogang Wang, Xiaoou Tang
2017 arXiv   pre-print
To this end, we present a novel Deep LAndmark Network (DLAN), where bounding boxes and landmarks are jointly estimated and trained iteratively in an end-to-end manner.  ...  Fashion landmarks are functional key points defined on clothes, such as corners of neckline, hemline, and cuff.  ...  Since the geometric transformation Θj can 1 result in arbitrary-size output, we would like to regularize the output scale of the estimated transformation  ... 
arXiv:1708.02044v1 fatcat:l4kboru2bje4jnxf5nigk5ocii

Algorithms to accelerate multiple regular expressions matching for deep packet inspection

Sailesh Kumar, Sarang Dharmapurikar, Fang Yu, Patrick Crowley, Jonathan Turner
2006 Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications - SIGCOMM '06  
However, there is growing interest in the use of regular expression-based pattern matching, since regular expressions offer superior expressive power and flexibility.  ...  However, DFA representations of regular expression sets arising in network applications require large amounts of memory, limiting their practical application.  ...  The key properties of our representative regular expression groups are summarized in Table 1 . In order to estimate the reduction objectives of D 2 FA, we introduce a term duplicate transition.  ... 
doi:10.1145/1159913.1159952 dblp:conf/sigcomm/KumarDYCT06 fatcat:ahhkingbyjczvop3uskldtryqq

Algorithms to accelerate multiple regular expressions matching for deep packet inspection

Sailesh Kumar, Sarang Dharmapurikar, Fang Yu, Patrick Crowley, Jonathan Turner
2006 Computer communication review  
However, there is growing interest in the use of regular expression-based pattern matching, since regular expressions offer superior expressive power and flexibility.  ...  However, DFA representations of regular expression sets arising in network applications require large amounts of memory, limiting their practical application.  ...  The key properties of our representative regular expression groups are summarized in Table 1 . In order to estimate the reduction objectives of D 2 FA, we introduce a term duplicate transition.  ... 
doi:10.1145/1151659.1159952 fatcat:vkslf3jsurcqja2k6ga7gxr3qu

Bypassing Space Explosion in High-Speed Regular Expression Matching

Jignesh Patel, Alex X. Liu, Eric Torng
2014 IEEE/ACM Transactions on Networking  
To address this issue, a variety of alternative automata implementations that compress the size of the final automaton have been proposed such as extended finite automata (XFA) and delayed input DFA (D  ...  Network intrusion detection and prevention systems commonly use regular expression (RE) signatures to represent individual security threats.  ...  each individual regular expression rather than the composite regular expression.  ... 
doi:10.1109/tnet.2014.2309014 fatcat:vmbu6jwbkzcrvfl35aho7g6h4i

Compiling Path Queries

Srinivas Narayana, Mina Tahmasbi, Jennifer Rexford, David Walker
2016 Symposium on Networked Systems Design and Implementation  
to the Proceedings of the 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI '16) is sponsored by USENIX.  ...  Acknowledgments This work was supported by NSF grants CCF-1535948 and CNS-1111520, and gifts from Intel, Huawei, and Cisco.  ...  integrate the NetKAT compiler with the Pyretic run-time; and Changhoon Kim and Arpit Gupta for suggestions to improve performance.  ... 
dblp:conf/nsdi/NarayanaTRW16 fatcat:u444cwy5ezdrlixckvqbehxwjy

Mission and Motion Planning for Autonomous Underwater Vehicles Operating in Spatially and Temporally Complex Environments

James McMahon, Erion Plaku
2016 IEEE Journal of Oceanic Engineering  
The proposed approach takes as input a mission specified via a regular language and automatically plans a collision-free, dynamically-feasible, and lowcost trajectory which enables the vehicle to accomplish  ...  Regular languages provide a convenient mathematical model that frees users from the burden of unnatural low-level commands and instead allows them to describe missions at a high level in terms of desired  ...  Third, regular languages can be expressed via regular expressions, regular grammars, deterministic finite automata (DFAs), nondeterministic finite automata (NFAs), alternating finite automata, and several  ... 
doi:10.1109/joe.2015.2503498 fatcat:x5ybgz43hvarliu3xblpnz6wve

LibFTE: A Toolkit for Constructing Practical, Format-Abiding Encryption Schemes

Daniel Luchaup, Kevin P. Dyer, Somesh Jha, Thomas Ristenpart, Thomas Shrimpton
2014 USENIX Security Symposium  
It incorporates a new algorithmic approach for performing FPE/FTE using the nondeterministic finite-state automata (NFA) representation of a regular expression when specifying formats.  ...  We present a general-purpose library (called libfte) that aids engineers in the development and deployment of format-preserving encryption (FPE) and formattransforming encryption (FTE) schemes.  ...  First, the traditional DFA-based ranking requires the construction of a DFA corresponding to a regular expression. DFAs for some regular expressions can be very large.  ... 
dblp:conf/uss/LuchaupDJRS14 fatcat:gtwhmuggwvg65bhqk4yiagezdq

Functional Connectivity Dynamics of the Resting State across the Human Adult Lifespan [article]

Demian Battaglia, Boudou Thomas, Enrique CA Hansen, Sabrina Chettouf, Andreas Daffertshofer, Anthony R McIntosh, Joelle Zimmermann, Petra Ritter, Viktor Jirsa
2017 bioRxiv   pre-print
FC and transients of fast network reconfiguration.  ...  The aging brain undergoes alterations of both Structural Connectivity (SC) and time- averaged Functional Connectivity in the resting state (rs FC).  ...  Acknowledgments This research was supported by the Brain Network Recovery Group (through the James S.  ... 
doi:10.1101/107243 fatcat:zj3yernp4ncuxlljkfi473edei

A Survey on the Application of FPGAs for Network Infrastructure Security

Hao Chen, Yu Chen, Douglas H. Summerville
2011 IEEE Communications Surveys and Tutorials  
The performance gap between the execution speed of security software and the amount of data to be processed is ever widening.  ...  Given the rapid evolution of attack methods and toolkits, software-based solutions to secure the network infrastructure have become overburdened.  ...  Moscola and Lockwood at Washington University translated regular expressions into DFA in 2003 [75] .  ... 
doi:10.1109/surv.2011.072210.00075 fatcat:4yew6yqt25expelxenskh22b4m

Physical Deep Learning with Biologically Plausible Training Method [article]

Mitsumasa Nakajima, Katsuma Inoue, Kenji Tanaka, Yasuo Kuniyoshi, Toshikazu Hashimoto, Kohei Nakajima
2022 arXiv   pre-print
Our results provide practical solutions for the training and acceleration of neuromorphic computation.  ...  In addition, we can emulate and accelerate the computation for this training on a simple and scalable physical system.  ...  For the optimization, the number of generations and groups were set to 20 and 128. In addition, the shape of g(x) converged to near the shape of f'(x).  ... 
arXiv:2204.13991v1 fatcat:2nhmpjz4w5cbvg7yx57dh64edm

Synergy of physics-based reasoning and machine learning in biomedical applications: towards unlimited deep learning with limited data

Valeriy Gavrishchaka, Olga Senyukova, Mark Koepke
2019 Advances in Physics: X  
and/or absence of transferlearning-relevant problems drastically reduce advantages of DNN-based DL.  ...  Historical data incompleteness problem and curse of dimensionality diminish practical value of pure data-driven approaches, especially in biomedicine.  ...  Disclosure statement Authors claim no potential conflict of interest exists.  ... 
doi:10.1080/23746149.2019.1582361 fatcat:wkmef4jmgreurnseofsaqa5dva

Predictive-Flow-Queue-Based Energy Optimization for Gigabit Ethernet Controllers

Hwisung Jung, A. Hwang, M. Pedram
2009 IEEE Transactions on Very Large Scale Integration (vlsi) Systems  
energy optimization under performance constraints.  ...  demands of very high frame-rate data.  ...  The DFA is able to increase (or decrease) the operating frequency value at a slow or fast rate with the help of the performance monitor, depending on how slow or fast the workload is changing and what  ... 
doi:10.1109/tvlsi.2009.2019815 fatcat:tptvuknruzbxjn5z52mlth73ie

A language-based intrusion detection approach for automotive embedded networks

Youssef Laarouchi, Mohamed Kaâniche, Vincent Nicomette, Ivan Studnia, Eric Alata
2018 International Journal of Embedded Systems  
The increase in connectivity and complexity of modern automotive networks presents new opportunities for potential hackers trying to take over a vehicle.  ...  Leveraging the high predictability of embedded automotive systems, we use language theory to elaborate a set of attack signatures derived from behavioural models of the automotive calculators in order  ...  In order to estimate the efficiency of this solution in the case of large systems, we randomly generated DFAs of different sizes (although with an alphabet size arbitrarily fixed at 20 symbols).  ... 
doi:10.1504/ijes.2018.10010488 fatcat:bwe6mmmbnzgk7nxfzggk5hko24
« Previous Showing results 1 — 15 out of 531 results