Learn More
We present a new le system that combines name-based and content-based access to les at the same time. Our design allows both methods to be used at any time, thus preserving the bene ts of both. Users can create their own name spaces based on queries, on explicit path names, or on any combination interleaved arbitrarily. All regular le operations { such as(More)
This paper describes a pattern-based approach to building packet classifiers. One novelty of the approach is that it can be implemented efficiently in both software and hardware. A performance study shows that the software implementation is about twice as fast as existing mechanisms, and that the hardware implementation is currently able to keep up with(More)
We present a new file system that combines name-based and content-based access to files at the same time. Our design allows both methods to be used at any time, thus preserving the benefits of both. Users can create their own name spaces based on queries, on explicit path names, or on any combination interleaved arbitrarily. All regular file opemtions such(More)
Computer network security is now a days gaining popularity among network users. Organizations are spending more time and money for securing their information. Security is also more considered by the network researchers due to the importance of network security has grown unbelievably. Finite Automata or the state machine is a mathematical model to designing(More)
  • 1