Author of the publication

APFA: Asynchronous Parallel Finite Automaton for Deep Packet Inspection in Cloud Computing.

, , , and . CloudCom, volume 5931 of Lecture Notes in Computer Science, page 529-540. Springer, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Experimental quantum repeater without quantum memory, , , , , , , , , and 4 other author(s). (2019)cite arxiv:1908.05351Comment: Published online in Nature Photonics.A 90 nm 16 Mb embedded phase-change memory macro with write current smoothing and enhanced write bandwidth., , , , and . ASICON, page 315-318. IEEE, (2011)Electrical and fluidic microbumps and interconnects for 3D-IC and silicon interposer., and . SoCC, page 159-164. IEEE, (2012)PS-ABC: A hybrid algorithm based on particle swarm and artificial bee colony for high-dimensional optimization problems., , , and . Expert Syst. Appl., 42 (22): 8881-8895 (2015)Reducing uncertainty of dynamic heterogeneous information networks: a fusing reconstructing approach., , , and . Data Min. Knowl. Discov., 31 (3): 879-906 (2017)A Leaky-Wave Antenna Array With Beam-Formed Radiation Pattern for Application in a Confined Space., , , , , and . IEEE Access, (2019)Dual-Beam Leaky-Wave Antenna Array With Capability of Fixed-Frequency Beam Switching., , , , , and . IEEE Access, (2020)A Spatial Analysis Approach for Evaluating the Service Capability of Urban Greenways - A Case Study in Wuhan., , , and . ISPRS Int. J. Geo Inf., 6 (7): 208 (2017)A 39-GHz CMOS Bidirectional Doherty Phased- Array Beamformer Using Shared-LUT DPD With Inter-Element Mismatch Compensation Technique for 5G Base Station., , , , , , , , , and 8 other author(s). IEEE J. Solid State Circuits, 58 (4): 901-914 (2023)Optimal Voting Strategy against Random and Targeted Attacks., , , and . Int. J. Secur. Softw. Eng., 4 (4): 25-46 (2013)