Optimizing virtual backup allocation for middleboxes

Y Kanizo, O Rottenstreich, I Segall… - IEEE/ACM Transactions …, 2017 - ieeexplore.ieee.org
In enterprise networks, network functions, such as address translation, firewall, and deep
packet inspection, are often implemented in middleboxes. Those can suffer from temporary …

Cuckoo filters and bloom filters: Comparison and application to packet classification

P Reviriego, J Martínez, D Larrabeiti… - IEEE Transactions on …, 2020 - ieeexplore.ieee.org
Bloom filters are used to perform approximate membership checking in a wide range of
applications in both computing and networking, but the recently introduced cuckoo filter is …

Designing optimal middlebox recovery schemes with performance guarantees

Y Kanizo, O Rottenstreich, I Segall… - IEEE Journal on …, 2018 - ieeexplore.ieee.org
Enabling functionality in a modern network is achieved through the use of middleboxes.
Middleboxes suffer from temporal unavailability due to various reasons, such as hardware …

Parallel d-pipeline: a cuckoo hashing implementation for increased throughput

S Pontarelli, P Reviriego… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Cuckoo hashing has proven to be an efficient option to implement exact matching in
networking applications. It provides good memory utilization and deterministic worst case …

Adaptive one memory access Bloom filters

P Reviriego, A Sánchez-Macián… - … on Network and …, 2022 - ieeexplore.ieee.org
Bloom filters are widely used to perform fast approximate membership checking in
networking applications. The main limitation of Bloom filters is that they suffer from false …

EMOMA: Exact match in one memory access

S Pontarelli, P Reviriego… - IEEE Transactions on …, 2018 - ieeexplore.ieee.org
An important function in modern routers and switches is to perform a lookup for a key. Hash-
based methods, and in particular cuckoo hash tables, are popular for such lookup …

Exploiting asymmetry in eDRAM errors for redundancy-free error-tolerant design

S Liu, P Reviriego, J Guo, J Han… - IEEE Transactions on …, 2019 - ieeexplore.ieee.org
For some applications, errors have a different impact on data and memory systems
depending on whether they change a zero to a one or the other way around; for an unsigned …

[PDF][PDF] A framework for integrating the distributed hash table (dht) with an enhanced bloom's filter in manet

RP Salim, R Rajesh - … Journal of Advanced Computer Science and …, 2022 - researchgate.net
MANET, a self-organizing, infrastructure-less, wireless network is a fast-growing technology
in day-to-day life. There is a rapid growth in the area of mobile computing due to the extent …

Fast updates for line-rate HyperLogLog-based cardinality estimation

P Reviriego, V Bruschi, S Pontarelli… - IEEE …, 2020 - ieeexplore.ieee.org
In a network it is interesting to know the different number of flows that traverse a switch or
link or the number of connections coming from a specific sub-network. This is generally …

REX: Resilient and efficient data structure for tracking network flows

DM Divakaran, LL Ko, L Su, VLL Thing - Computer Networks, 2017 - Elsevier
One of the important tasks for most network security solutions is to track network flows in real-
time. The universe of flow identifiers being huge, hash tables with their fast operations are …