Efficient Measurement on Programmable Switches Using Probabilistic Recirculation
暂无分享,去创建一个
Ori Rottenstreich | Gil Einziger | Ran Ben-Basat | Xiaoqi Chen | Xiaoqi Chen | R. Ben-Basat | Ori Rottenstreich | Gil Einziger
[1] Shigang Chen,et al. Fast and compact per-flow traffic measurement through randomized counter sharing , 2011, 2011 Proceedings IEEE INFOCOM.
[2] Ming Zhang,et al. MicroTE: fine grained traffic engineering for data centers , 2011, CoNEXT '11.
[3] João Paulo Carvalho,et al. Finding top-k elements in data streams , 2010, Inf. Sci..
[4] Gabriel Maciá-Fernández,et al. Anomaly-based network intrusion detection: Techniques, systems and challenges , 2009, Comput. Secur..
[5] Tooska Dargahi,et al. A Survey on the Security of Stateful SDN Data Planes , 2017, IEEE Communications Surveys & Tutorials.
[6] George Varghese,et al. P4: programming protocol-independent packet processors , 2013, CCRV.
[7] George Varghese,et al. Building a better NetFlow , 2004, SIGCOMM.
[8] Roy Friedman,et al. Randomized admission policy for efficient top-k and frequency estimation , 2016, IEEE INFOCOM 2017 - IEEE Conference on Computer Communications.
[9] Marios Hadjieleftheriou,et al. Methods for finding frequent items in data streams , 2010, The VLDB Journal.
[10] Alvin Cheung,et al. Packet Transactions: High-Level Programming for Line-Rate Switches , 2015, SIGCOMM.
[11] Min Chen,et al. Counter Tree: A Scalable Counter Architecture for Per-Flow Traffic Measurement , 2017, IEEE/ACM Transactions on Networking.
[12] Devavrat Shah,et al. Maintaining Statistics Counters in Router Line Cards , 2002, IEEE Micro.
[13] Gero Dittmann,et al. Network Processor Load Balancing for High-Speed Links , 2000 .
[14] Shigang Chen,et al. Per-Flow Traffic Measurement Through Randomized Counter Sharing , 2012, IEEE/ACM Trans. Netw..
[15] George Varghese,et al. Forwarding metamorphosis: fast programmable match-action processing in hardware for SDN , 2013, SIGCOMM.
[16] Graham Cormode,et al. An improved data stream summary: the count-min sketch and its applications , 2004, J. Algorithms.
[17] Todd L. Heberlein,et al. Network intrusion detection , 1994, IEEE Network.
[18] Richard M. Karp,et al. A simple algorithm for finding frequent elements in streams and bags , 2003, TODS.
[19] Minlan Yu,et al. FlowRadar: A Better NetFlow for Data Centers , 2016, NSDI.
[20] Moses Charikar,et al. Finding frequent items in data streams , 2002, Theor. Comput. Sci..
[21] Rong Pan,et al. AF-QCN: Approximate Fairness with Quantized Congestion Notification for Multi-tenanted Data Centers , 2010, 2010 18th IEEE Symposium on High Performance Interconnects.
[22] David A. Maltz,et al. Network traffic characteristics of data centers in the wild , 2010, IMC '10.
[23] HomemNuno,et al. Finding top-k elements in data streams , 2010 .
[24] S. Muthukrishnan,et al. Heavy-Hitter Detection Entirely in the Data Plane , 2016, SOSR.
[25] Vladimir Braverman,et al. One Sketch to Rule Them All: Rethinking Network Flow Monitoring with UnivMon , 2016, SIGCOMM.
[26] George Varghese,et al. New directions in traffic measurement and accounting , 2002, CCRV.
[27] George Varghese,et al. Efficient implementation of a statistics counter architecture , 2003, SIGMETRICS '03.
[28] Divyakant Agrawal,et al. Efficient Computation of Frequent and Top-k Elements in Data Streams , 2005, ICDT.