{"id":"https://openalex.org/W2273728183","doi":"https://doi.org/10.1007/978-3-540-88181-0_27","title":"Dynamic Scheme for Packet Classification Using Splay Trees","display_name":"Dynamic Scheme for Packet Classification Using Splay Trees","publication_year":2008,"publication_date":"2008-10-20","ids":{"openalex":"https://openalex.org/W2273728183","doi":"https://doi.org/10.1007/978-3-540-88181-0_27","mag":"2273728183"},"language":"en","primary_location":{"id":"doi:10.1007/978-3-540-88181-0_27","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-88181-0_27","pdf_url":null,"source":{"id":"https://openalex.org/S4210167543","display_name":"Advances in soft computing","issn_l":"1615-3871","issn":["1615-3871","1860-0794"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Soft Computing","raw_type":"book-chapter"},"type":"book-chapter","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5014528984","display_name":"Nizar Ben Neji","orcid":"https://orcid.org/0000-0002-8927-1100"},"institutions":[{"id":"https://openalex.org/I4210120884","display_name":"Institut Sup\u00e9rieur des \u00c9tudes Technologiques en Communications de Tunis","ror":"https://ror.org/02rfbsc53","country_code":"TN","type":"education","lineage":["https://openalex.org/I4210120884"]}],"countries":["TN"],"is_corresponding":true,"raw_author_name":"Nizar Ben-Neji","raw_affiliation_strings":["Higher School of Communications of Tunis (Sup\u2019Com), University November 7th at Carthage City of Communications Technologies, 2083 El, Ghazala, Ariana, Tunisia","Higher School of Communications of Tunis (Sup'Com), University November 7th at Carthage City of Communications Technologies, 2083 El, Ghazala, Ariana, Tunisia"],"affiliations":[{"raw_affiliation_string":"Higher School of Communications of Tunis (Sup\u2019Com), University November 7th at Carthage City of Communications Technologies, 2083 El, Ghazala, Ariana, Tunisia","institution_ids":["https://openalex.org/I4210120884"]},{"raw_affiliation_string":"Higher School of Communications of Tunis (Sup'Com), University November 7th at Carthage City of Communications Technologies, 2083 El, Ghazala, Ariana, Tunisia","institution_ids":["https://openalex.org/I4210120884"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5075259756","display_name":"Adel Bouhoula","orcid":"https://orcid.org/0000-0003-2920-2338"},"institutions":[{"id":"https://openalex.org/I4210120884","display_name":"Institut Sup\u00e9rieur des \u00c9tudes Technologiques en Communications de Tunis","ror":"https://ror.org/02rfbsc53","country_code":"TN","type":"education","lineage":["https://openalex.org/I4210120884"]}],"countries":["TN"],"is_corresponding":false,"raw_author_name":"Adel Bouhoula","raw_affiliation_strings":["Higher School of Communications of Tunis (Sup\u2019Com), University November 7th at Carthage City of Communications Technologies, 2083 El, Ghazala, Ariana, Tunisia","Higher School of Communications of Tunis (Sup'Com), University November 7th at Carthage City of Communications Technologies, 2083 El, Ghazala, Ariana, Tunisia"],"affiliations":[{"raw_affiliation_string":"Higher School of Communications of Tunis (Sup\u2019Com), University November 7th at Carthage City of Communications Technologies, 2083 El, Ghazala, Ariana, Tunisia","institution_ids":["https://openalex.org/I4210120884"]},{"raw_affiliation_string":"Higher School of Communications of Tunis (Sup'Com), University November 7th at Carthage City of Communications Technologies, 2083 El, Ghazala, Ariana, Tunisia","institution_ids":["https://openalex.org/I4210120884"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5014528984"],"corresponding_institution_ids":["https://openalex.org/I4210120884"],"apc_list":null,"apc_paid":null,"fwci":1.3203,"has_fulltext":false,"cited_by_count":17,"citation_normalized_percentile":{"value":0.81271186,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":null,"issue":null,"first_page":"211","last_page":"218"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12326","display_name":"Network Packet Processing and Optimization","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.991599977016449,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7273818254470825},{"id":"https://openalex.org/keywords/network-packet","display_name":"Network packet","score":0.698672890663147},{"id":"https://openalex.org/keywords/hash-function","display_name":"Hash function","score":0.6580901145935059},{"id":"https://openalex.org/keywords/trie","display_name":"Trie","score":0.6056965589523315},{"id":"https://openalex.org/keywords/computer-network","display_name":"Computer network","score":0.5174872875213623},{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.4876769781112671},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.47038331627845764},{"id":"https://openalex.org/keywords/tree","display_name":"Tree (set theory)","score":0.45638683438301086},{"id":"https://openalex.org/keywords/prefix","display_name":"Prefix","score":0.4551624059677124},{"id":"https://openalex.org/keywords/router","display_name":"Router","score":0.444315642118454},{"id":"https://openalex.org/keywords/filter","display_name":"Filter (signal processing)","score":0.4256250560283661},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.4116593301296234},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.40346425771713257},{"id":"https://openalex.org/keywords/data-structure","display_name":"Data structure","score":0.2055433988571167},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.16595634818077087},{"id":"https://openalex.org/keywords/computer-security","display_name":"Computer security","score":0.10644501447677612},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10242044925689697}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7273818254470825},{"id":"https://openalex.org/C158379750","wikidata":"https://www.wikidata.org/wiki/Q214111","display_name":"Network packet","level":2,"score":0.698672890663147},{"id":"https://openalex.org/C99138194","wikidata":"https://www.wikidata.org/wiki/Q183427","display_name":"Hash function","level":2,"score":0.6580901145935059},{"id":"https://openalex.org/C190290938","wikidata":"https://www.wikidata.org/wiki/Q387015","display_name":"Trie","level":3,"score":0.6056965589523315},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.5174872875213623},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.4876769781112671},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.47038331627845764},{"id":"https://openalex.org/C113174947","wikidata":"https://www.wikidata.org/wiki/Q2859736","display_name":"Tree (set theory)","level":2,"score":0.45638683438301086},{"id":"https://openalex.org/C141603448","wikidata":"https://www.wikidata.org/wiki/Q134830","display_name":"Prefix","level":2,"score":0.4551624059677124},{"id":"https://openalex.org/C2775896111","wikidata":"https://www.wikidata.org/wiki/Q642560","display_name":"Router","level":2,"score":0.444315642118454},{"id":"https://openalex.org/C106131492","wikidata":"https://www.wikidata.org/wiki/Q3072260","display_name":"Filter (signal processing)","level":2,"score":0.4256250560283661},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.4116593301296234},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.40346425771713257},{"id":"https://openalex.org/C162319229","wikidata":"https://www.wikidata.org/wiki/Q175263","display_name":"Data structure","level":2,"score":0.2055433988571167},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.16595634818077087},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.10644501447677612},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10242044925689697},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C31972630","wikidata":"https://www.wikidata.org/wiki/Q844240","display_name":"Computer vision","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1007/978-3-540-88181-0_27","is_oa":false,"landing_page_url":"https://doi.org/10.1007/978-3-540-88181-0_27","pdf_url":null,"source":{"id":"https://openalex.org/S4210167543","display_name":"Advances in soft computing","issn_l":"1615-3871","issn":["1615-3871","1860-0794"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310319965","host_organization_name":"Springer Nature","host_organization_lineage":["https://openalex.org/P4310319965"],"host_organization_lineage_names":["Springer Nature"],"type":"book series"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Advances in Soft Computing","raw_type":"book-chapter"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1874152622","https://openalex.org/W1968801809","https://openalex.org/W2006807783","https://openalex.org/W2021885319","https://openalex.org/W2029413772","https://openalex.org/W2045455109","https://openalex.org/W2047446047","https://openalex.org/W2068974534","https://openalex.org/W2098580177","https://openalex.org/W2105456596","https://openalex.org/W2112208179","https://openalex.org/W2114471387","https://openalex.org/W2125920664","https://openalex.org/W2130055503","https://openalex.org/W2131277998","https://openalex.org/W2137198179","https://openalex.org/W2137748137","https://openalex.org/W2147900802","https://openalex.org/W2155771881","https://openalex.org/W3004434964"],"related_works":["https://openalex.org/W2075698953","https://openalex.org/W1989507269","https://openalex.org/W2212047860","https://openalex.org/W2998324560","https://openalex.org/W2277163753","https://openalex.org/W2773435329","https://openalex.org/W2323304991","https://openalex.org/W2367011915","https://openalex.org/W2227807207","https://openalex.org/W2370014100"],"abstract_inverted_index":null,"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2016,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2014,"cited_by_count":3},{"year":2013,"cited_by_count":2},{"year":2012,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
