Abstract — We present a novel algorithm for efficiently gath-ering statistics about the hit frequencies on the nodes of a search tree in a packet processing system, under limiting space constraints. The Expand and Collapse (EaC) algorithm is a heuristic that periodically adjusts the subset of nodes of the search tree at which statistics are gathered, in order to use the limited space available to collect statistics in preference from the currently most heavily-hit nodes in the search tree. We prove convergence and good node-hit coverage of the algorithm and validate its performance on a set of simulated data. The information collected can be useful for a variety of reasons, such as inferring traffic properties, discovering failures and atta...
Data mining is a set of methods used to mine hidden information from data. It mainly includes freque...
Techniques are described herein for an executable greedy algorithm of data collection to produce an ...
Recently, greedy algorithm has received much attention as a cost-effective means to reconstruct the ...
In this work we present a novel concept of augmenting a search tree in a packet-processing system wi...
Abstract — Packet filtering plays a critical role in the performance of many network devices such as...
In this paper we consider the problem of searching for a node or an object (i.e., piece of data, fil...
Packet matching plays a critical role in the performance of many network devices and a tremendous am...
Traditional algorithms for frequent itemset discovery are designed for static data. They cannot be s...
Several efforts were made in the existing solutions to identify a successful packet classification s...
Flooding search has no knowledge about network topology and files distribution, thus it offers an attr...
In this paper we consider the problem of searching for a node or an object (i.e., piece of data, fil...
The Multi-Stream Dependency Detection algorithm finds rules that capture statistical dependencies be...
We investigate the problem of frequent itemset mining over a data stream with bursty traffic. In man...
Capacity expansion for transmission branches is an effective way to reduce the threat of cascading f...
We show how recently-defined abstract models of the Branch & Bound algorithm can be used to obta...
Data mining is a set of methods used to mine hidden information from data. It mainly includes freque...
Techniques are described herein for an executable greedy algorithm of data collection to produce an ...
Recently, greedy algorithm has received much attention as a cost-effective means to reconstruct the ...
In this work we present a novel concept of augmenting a search tree in a packet-processing system wi...
Abstract — Packet filtering plays a critical role in the performance of many network devices such as...
In this paper we consider the problem of searching for a node or an object (i.e., piece of data, fil...
Packet matching plays a critical role in the performance of many network devices and a tremendous am...
Traditional algorithms for frequent itemset discovery are designed for static data. They cannot be s...
Several efforts were made in the existing solutions to identify a successful packet classification s...
Flooding search has no knowledge about network topology and files distribution, thus it offers an attr...
In this paper we consider the problem of searching for a node or an object (i.e., piece of data, fil...
The Multi-Stream Dependency Detection algorithm finds rules that capture statistical dependencies be...
We investigate the problem of frequent itemset mining over a data stream with bursty traffic. In man...
Capacity expansion for transmission branches is an effective way to reduce the threat of cascading f...
We show how recently-defined abstract models of the Branch & Bound algorithm can be used to obta...
Data mining is a set of methods used to mine hidden information from data. It mainly includes freque...
Techniques are described herein for an executable greedy algorithm of data collection to produce an ...
Recently, greedy algorithm has received much attention as a cost-effective means to reconstruct the ...