Abstract—Dynamic reconfiguration can be necessary to produce fast and flexible FPGA-based applications. However, in practice very few developers actually use this capability. One reason that runtime reconfiguration is not more commonly used is that it is very difficult to write and execute applications that are spread across multiple configurations. This paper uses the problem of regular expression searching for e-mail spam filtering to illustrate the potential advantages of dynamic reconfiguration and the inherent development problems associated with the conventional design methodology. To solve these problems, we present a regular expression system compiler. This automated tool includes 1) a mechanism to split a large set of searches into...
We present a software toolchain for constructing large-scale regular expression matching (REM) on FP...
[[abstract]]Regular expressions are widely used in the network intrusion detection system (NIDS) to ...
[[abstract]]Regular expressions are widely used in the network intrusion detection system (NIDS) to ...
We present a reconfigurable architecture that can perform highly parallel regular expression matchin...
Regular Expressions are generic representations for a string or a collection of strings. This paper...
ii High performance computing, for example as required in the financial sector, is constantly confro...
In this article we describe how to expand a partially dynamic reconfig- urable pattern matcher for r...
An approach to the automatic generation of efficient Field Programmable Gate Arrays (FPGAs) circuits...
An approach to the automatic generation of efficient Field Programmable Gate Arrays (FPGAs) circuits...
Abstract. In this paper we describe a regular expression pattern matching approach for reconfigurabl...
Regular Expressions (RE) are widely used to find patterns among data, like in genomic markers resear...
Advanced text analytics systems combine regular expres-sion (regex) matching, dictionary processing,...
AbstractIn recent years, regular expression has been widely used in many network fields, but more an...
In this paper, we propose a novel architecture for large-scale regular expression matching, called d...
Field Programmable Gate Arrays (FPGA) based Reconfigurable Computing hardware are programmed with sp...
We present a software toolchain for constructing large-scale regular expression matching (REM) on FP...
[[abstract]]Regular expressions are widely used in the network intrusion detection system (NIDS) to ...
[[abstract]]Regular expressions are widely used in the network intrusion detection system (NIDS) to ...
We present a reconfigurable architecture that can perform highly parallel regular expression matchin...
Regular Expressions are generic representations for a string or a collection of strings. This paper...
ii High performance computing, for example as required in the financial sector, is constantly confro...
In this article we describe how to expand a partially dynamic reconfig- urable pattern matcher for r...
An approach to the automatic generation of efficient Field Programmable Gate Arrays (FPGAs) circuits...
An approach to the automatic generation of efficient Field Programmable Gate Arrays (FPGAs) circuits...
Abstract. In this paper we describe a regular expression pattern matching approach for reconfigurabl...
Regular Expressions (RE) are widely used to find patterns among data, like in genomic markers resear...
Advanced text analytics systems combine regular expres-sion (regex) matching, dictionary processing,...
AbstractIn recent years, regular expression has been widely used in many network fields, but more an...
In this paper, we propose a novel architecture for large-scale regular expression matching, called d...
Field Programmable Gate Arrays (FPGA) based Reconfigurable Computing hardware are programmed with sp...
We present a software toolchain for constructing large-scale regular expression matching (REM) on FP...
[[abstract]]Regular expressions are widely used in the network intrusion detection system (NIDS) to ...
[[abstract]]Regular expressions are widely used in the network intrusion detection system (NIDS) to ...