Year |
Citation |
Score |
2019 |
Hsieh C, Weng N, Wei W. Scalable Many-Field Packet Classification for Traffic Steering in SDN Switches Ieee Transactions On Network and Service Management. 16: 348-361. DOI: 10.1109/Tnsm.2018.2869403 |
0.403 |
|
2016 |
Mathew M, Weng N. Adaptive sensor node sleep scheduling for quality-of-experience enhancement International Journal of Distributed Sensor Networks. 2016. DOI: 10.1155/2016/6960876 |
0.355 |
|
2016 |
Hsieh CL, Vespa L, Weng N. A high-throughput DPI engine on GPU via algorithm/implementation co-optimization Journal of Parallel and Distributed Computing. 88: 46-56. DOI: 10.1016/J.Jpdc.2015.11.001 |
0.747 |
|
2014 |
Mathew M, Weng N. Quality of information and energy efficiency optimization for sensor networks via adaptive sensing and transmitting Ieee Sensors Journal. 14: 341-348. DOI: 10.1109/Jsen.2013.2282774 |
0.358 |
|
2013 |
Gao Y, Wang H, Weng N, Vespa L. Enhancing Sensor Network Data Quality via Collaborated Circuit and Network Operations Journal of Sensor and Actuator Networks. 2: 196-212. DOI: 10.3390/Jsan2020196 |
0.716 |
|
2012 |
Vespa LJ, Chakrovorty R, Weng N. Lightweight testbed for evaluating worm containment systems International Journal of Security and Networks. 7: 6. DOI: 10.1504/Ijsn.2012.048478 |
0.379 |
|
2011 |
Vespa L, Weng N. Deterministic finite automata characterization and optimization for scalable pattern matching Acm Transactions On Architecture and Code Optimization. 8: 1-31. DOI: 10.1145/1952998.1953002 |
0.77 |
|
2011 |
Vespa L, Weng N, Ramaswamy R. MS-DFA: Multiple-Stride pattern matching for scalable deep packet inspection Computer Journal. 54: 285-303. DOI: 10.1093/Comjnl/Bxq077 |
0.769 |
|
2011 |
Weng N, Li I, Vespa L. Information quality model and optimization for 802.15.4-based wireless sensor networks Journal of Network and Computer Applications. 34: 1773-1783. DOI: 10.1016/J.Jnca.2010.12.013 |
0.711 |
|
2011 |
Weng N, Vespa L, Soewito B. Deep packet pre-filtering and finite state encoding for adaptive intrusion detection system Computer Networks. 55: 1648-1661. DOI: 10.1016/J.Comnet.2010.12.007 |
0.719 |
|
2009 |
Soewito B, Mahajan A, Weng N, Wang H. High-speed string matching for network intrusion detection International Journal of Communication Networks and Distributed Systems. 3: 319. DOI: 10.1504/Ijcnds.2009.027597 |
0.705 |
|
2009 |
Weng N, Wolf T. Analytic modeling of network processors for parallel workload mapping Acm Transactions On Embedded Computing Systems. 8: 1-29. DOI: 10.1145/1509288.1509290 |
0.415 |
|
2009 |
Soewito B, Vespa L, Mahajan A, Weng N, Wang H. Self-addressable memory-based FSM: a scalable intrusion detection engine Ieee Network. 23: 14-21. DOI: 10.1109/Mnet.2009.4804319 |
0.735 |
|
2009 |
Ramaswamy R, Weng N, Wolf T. Analysis of network processing workloads Journal of Systems Architecture. 55: 421-433. DOI: 10.1016/J.Sysarc.2009.09.001 |
0.405 |
|
2009 |
Vespa L, Weng N, Soewito B. Optimized memory based accelerator for scalable pattern matching Microprocessors and Microsystems. 33: 469-482. DOI: 10.1016/J.Micpro.2009.09.003 |
0.754 |
|
2009 |
Soewito B, Vespa L, Weng N, Wang H. Hybrid pattern matching for trusted intrusion detection Security and Communication Networks. 4: 33-43. DOI: 10.1002/Sec.175 |
0.726 |
|
2009 |
Soewito B, Weng N. Concurrent workload mapping for multicore security systems Concurrency and Computation: Practice and Experience. 21: 1281-1306. DOI: 10.1002/cpe.1423 |
0.59 |
|
2008 |
Weng N, Soewito B. Evaluating DNA sequence searching algorithms on multicore. International Journal of Computational Biology and Drug Design. 1: 313-27. PMID 20054996 DOI: 10.1504/Ijcbdd.2008.021433 |
0.64 |
|
2007 |
Wolf T, Weng N, Tai C. Runtime Support for Multicore Packet Processing Systems Ieee Network. 21: 29-37. DOI: 10.1109/Mnet.2007.386467 |
0.441 |
|
Show low-probability matches. |