Author of the publication

Hash Table with Expanded-Key for High-Speed Networking.

, , , , and . IEICE Trans. Inf. Syst., 99-D (3): 747-750 (2016)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Data Auditing for Intelligent Network Security Monitoring., , and . IEEE Commun. Mag., 61 (3): 74-79 (March 2023)Fit a Compact Spread Estimator in Small High-Speed Memory., , , and . IEEE/ACM Trans. Netw., 19 (5): 1253-1264 (2011)Detecting Stealthy Spreaders by Random Aging Streaming Filters., and . IEICE Trans. Commun., 94-B (8): 2274-2281 (2011)Minimizing the Maximum Firewall Rule Set in a Network with Multiple Firewalls., , and . IEEE Trans. Computers, 59 (2): 218-230 (2010)A modeling of security management system for electronic data interchange., , , , and . ISCC, page 518-522. IEEE Computer Society, (1997)Generative Intrusion Detection and Prevention on Data Stream., and . USENIX Security Symposium, page 4319-4335. USENIX Association, (2023)Whitelisting for Critical IT-Based Infrastructure., , , , and . IEICE Trans. Commun., 96-B (4): 1070-1074 (2013)When Bloom Filters Are No Longer Compact: Multi-Set Membership Lookup for Network Applications., , , and . IEEE/ACM Trans. Netw., 24 (6): 3326-3339 (2016)A grand spread estimator using a graphics processing unit., , and . J. Parallel Distributed Comput., 74 (2): 2039-2047 (2014)Compact feature hashing for machine learning based malware detection., , and . ICT Express, 8 (1): 124-129 (2022)