Year |
Citation |
Score |
2019 |
Zhao B, Zhao J, Wang X, Wolf T. RuleTailor: Optimizing Flow Table Updates in OpenFlow Switches With Rule Transformations Ieee Transactions On Network and Service Management. 16: 1581-1594. DOI: 10.1109/Tnsm.2019.2947217 |
0.474 |
|
2016 |
Marentes LA, Wolf T, Nagurney A, Donoso Y. Towards Pricing Mechanisms for Delay Tolerant Services International Journal of Computers Communications & Control. 11: 77-89. DOI: 10.15837/Ijccc.2016.1.1438 |
0.43 |
|
2016 |
Chen X, Jones B, Becchi M, Wolf T. Picking Pesky Parameters: Optimizing Regular Expression Matching in Practice Ieee Transactions On Parallel and Distributed Systems. 27: 1430-1442. DOI: 10.1109/Tpds.2015.2453986 |
0.408 |
|
2016 |
Hu K, Chandrikakutty HK, Goodman Z, Tessier R, Wolf T. Dynamic Hardware Monitors for Network Processor Protection Ieee Transactions On Computers. 65: 860-872. DOI: 10.1109/Tc.2015.2435750 |
0.575 |
|
2015 |
Wolf T, Chandrikakutty HK, Hu K, Unnikrishnan D, Tessier R. Securing Network Processors with High-Performance Hardware Monitors Ieee Transactions On Dependable and Secure Computing. 12: 652-664. DOI: 10.1109/Tdsc.2014.2373378 |
0.652 |
|
2015 |
Shanbhag S, Kandoor AR, Wang C, Mettu R, Wolf T. VHub: Single-stage virtual network mapping through hub location Computer Networks. 77: 169-180. DOI: 10.1016/J.Comnet.2014.12.006 |
0.702 |
|
2014 |
Saberi S, Nagurney A, Wolf T. A Network Economic Game Theory Model of a Service-Oriented Internet with Price and Quality Competition in Both Content and Network Provision Service Science. 6: 229-250. DOI: 10.1287/Serv.2014.0081 |
0.513 |
|
2014 |
Javed N, Lyons E, Zink M, Wolf T. Adaptive wireless mesh networks: Surviving weather without sensing it Computer Communications. 54: 120-130. DOI: 10.1016/J.Comcom.2014.08.007 |
0.706 |
|
2014 |
Marentes L, Wolf T, Nagurney A, Donoso Y, Castro H. Overcoming economic challenges of internet operators in low income regions through a delay tolerant architecture with mechanic backhauls Netnomics: Economic Research and Electronic Networking. 15: 183-213. DOI: 10.1007/S11066-015-9091-X |
0.379 |
|
2014 |
Nagurney A, Wolf T. A Cournot–Nash–Bertrand game theory model of a service-oriented Internet with price and quality competition among network transport providers Computational Management Science. 11: 475-502. DOI: 10.1007/S10287-013-0183-5 |
0.377 |
|
2013 |
Wolf T, Natarajan S, Vasudevan KT. High-performance capabilities for 1-hop containment of network attacks Ieee/Acm Transactions On Networking. 21: 1931-1946. DOI: 10.1109/Tnet.2013.2240463 |
0.732 |
|
2013 |
Hanay YS, Dwaraki A, Hu K, Wolf T. High-performance implementation of in-network traffic pacing for small-buffer networks Computer Communications. 36: 1450-1459. DOI: 10.1016/J.Comcom.2013.07.002 |
0.752 |
|
2013 |
Nagurney A, Li D, Wolf T, Saberi S. A network economic game theory model of a service-oriented internet with choices and quality competition Netnomics. 14: 1-25. DOI: 10.1007/S11066-013-9076-6 |
0.356 |
|
2012 |
Wu Q, Wolf T. Runtime Task Allocation in Multicore Packet Processing Systems Ieee Transactions On Parallel and Distributed Systems. 23: 1934-1943. DOI: 10.1109/Tpds.2012.56 |
0.42 |
|
2012 |
Chasaki D, Wolf T. Attacks and defenses in the data plane of networks Ieee Transactions On Dependable and Secure Computing. 9: 798-810. DOI: 10.1109/Tdsc.2012.50 |
0.769 |
|
2011 |
Shanbhag S, Wolf T. Automated composition of data-path functionality in the future internet Ieee Network. 25: 8-14. DOI: 10.1109/Mnet.2011.6085637 |
0.671 |
|
2011 |
Cai Y, Wolf T, Gong W. Delaying Transmissions in Data Communication Networks to Improve Transport-Layer Performance Ieee Journal On Selected Areas in Communications. 29: 916-927. DOI: 10.1109/Jsac.2011.110502 |
0.607 |
|
2011 |
Eggert L, Wolf T. Editorial: Special Issue on Architectures and Protocols for the Future Internet Computer Networks. 55: 891-892. DOI: 10.1016/J.Comnet.2011.02.001 |
0.39 |
|
2011 |
Wolf T, Tessier R, Prabhu G. Securing the data path of next-generation router systems Computer Communications. 34: 598-606. DOI: 10.1016/J.Comcom.2010.03.019 |
0.5 |
|
2010 |
Wolf T. Assessing student learning in a virtual laboratory environment Ieee Transactions On Education. 53: 216-222. DOI: 10.1109/Te.2008.2012114 |
0.324 |
|
2010 |
Mao S, Wolf T. Hardware Support for Secure Processing in Embedded Systems Ieee Transactions On Computers. 59: 847-854. DOI: 10.1109/Tc.2010.32 |
0.381 |
|
2010 |
Wolf T. In-network services for customization in next-generation networks Ieee Network. 24: 6-12. DOI: 10.1109/Mnet.2010.5510912 |
0.599 |
|
2009 |
Weng N, Wolf T. Analytic modeling of network processors for parallel workload mapping Acm Transactions On Embedded Computing Systems. 8: 1-29. DOI: 10.1145/1509288.1509290 |
0.558 |
|
2009 |
Shanbhag S, Wolf T. Accurate anomaly detection through parallelism Ieee Network. 23: 22-28. DOI: 10.1109/Mnet.2009.4804320 |
0.601 |
|
2009 |
Ramaswamy R, Weng N, Wolf T. Analysis of network processing workloads Journal of Systems Architecture. 55: 421-433. DOI: 10.1016/J.Sysarc.2009.09.001 |
0.716 |
|
2009 |
Ladiwala S, Ramaswamy R, Wolf T. Transparent TCP acceleration Computer Communications. 32: 691-702. DOI: 10.1016/J.Comcom.2008.11.036 |
0.684 |
|
2008 |
Wolf T. Data path credentials for high-performance capabilities-based networks Proceedings of the 4th Acm/Ieee Symposium On Architectures For Networking and Communications Systems, Ancs '08. 129-130. DOI: 10.1145/1477942.1477965 |
0.563 |
|
2008 |
Gogniat G, Wolf T, Burleson W, Diguet J, Bossuet L, Vaslin R. Reconfigurable Hardware for High-Security/ High-Performance Embedded Systems: The SAFES Perspective Ieee Transactions On Very Large Scale Integration (Vlsi) Systems. 16: 144-155. DOI: 10.1109/Tvlsi.2007.912030 |
0.386 |
|
2008 |
Huang X, Wolf T. Evaluating Dynamic Task Mapping in Network Processor Runtime Systems Ieee Transactions On Parallel and Distributed Systems. 19: 1086-1098. DOI: 10.1109/Tpds.2007.70806 |
0.609 |
|
2008 |
Wolf T, Parameswaran S. Guest editorial for special issue on embedded system security Design Automation For Embedded Systems. 12: 171-172. DOI: 10.1007/S10617-008-9029-8 |
0.329 |
|
2008 |
Parameswaran S, Wolf T. Embedded systems security-an overview Design Automation For Embedded Systems. 12: 173-183. DOI: 10.1007/S10617-008-9027-X |
0.31 |
|
2007 |
Wolf T. Design of a network architecture with inherent data path security Ancs'07 - Proceedings of the 2007 Acm Symposium On Architecture For Networking and Communications. 39-40. DOI: 10.1145/1323548.1323556 |
0.523 |
|
2007 |
Ramaswamy R, Wolf T. High-speed prefix-preserving IP address anonymization for passive measurement systems Ieee/Acm Transactions On Networking. 15: 26-39. DOI: 10.1109/Tnet.2006.890128 |
0.682 |
|
2007 |
Wolf T, Weng N, Tai C. Runtime Support for Multicore Packet Processing Systems Ieee Network. 21: 29-37. DOI: 10.1109/Mnet.2007.386467 |
0.625 |
|
2007 |
Wolf T. A credential-based data path architecture for assurable global networking Proceedings - Ieee Military Communications Conference Milcom. DOI: 10.1109/MILCOM.2007.4454937 |
0.556 |
|
2006 |
Wolf T, Franklin MA. Performance models for network processor design Ieee Transactions On Parallel and Distributed Systems. 17: 548-561. DOI: 10.1109/Tpds.2006.75 |
0.545 |
|
2006 |
Wolf T. Challenges and applications for network-processor-based programmable routers 2006 Ieee Sarnoff Symposium. DOI: 10.1109/SARNOF.2006.4534802 |
0.59 |
|
2006 |
Wolf T. Service-centric end-to-end abstractions in next-generation networks Proceedings - International Conference On Computer Communications and Networks, Icccn. 79-86. DOI: 10.1109/ICCCN.2006.286249 |
0.563 |
|
2003 |
Wolf T, Pappu P, Franklin MA. Predictive scheduling of network processors Computer Networks. 41: 601-621. DOI: 10.1016/S1389-1286(02)00452-8 |
0.538 |
|
2002 |
Wolf T. Network processors - Flexibility and performance for next-generation networks Computer Communication Review. 32: 65. DOI: 10.1145/510726.510739 |
0.541 |
|
2001 |
Wolf T, Turner JS. Design issues for high-performance active routers Ieee Journal On Selected Areas in Communications. 19: 404-409. DOI: 10.1109/49.917702 |
0.613 |
|
1999 |
Decasper DS, Plattner B, Parulkar GM, Choi S, DeHart JD, Wolf T. A scalable high-performance active network node Ieee Network. 13: 8-19. DOI: 10.1109/65.750445 |
0.603 |
|
Show low-probability matches. |