Multi-Dimensional Bloom Filter: Design and Evaluation
暂无分享,去创建一个
Siu-Ming Yiu | Jing Xu | Fei Xu | Jianfeng Yang | Pinxin Liu
[1] George Varghese,et al. Beyond bloom filters: from approximate membership checks to approximate state machines , 2006, SIGCOMM.
[2] Margo I. Seltzer,et al. Self-organization in peer-to-peer systems , 2002, EW 10.
[3] Lee L. Gremillion. Designing a Bloom filter for differential file access , 1982, CACM.
[4] Habib Youssef,et al. An efficient source authentication scheme in wireless sensor networks , 2010, ACS/IEEE International Conference on Computer Systems and Applications - AICCSA 2010.
[5] Walid A. Najjar,et al. Automatic Compilation Framework for Bloom Filter Based Intrusion Detection , 2006, ARC.
[6] Chin-Laung Lei,et al. Filtering False Messages En-Route in Wireless Multi-Hop Networks , 2010, 2010 IEEE Wireless Communication and Networking Conference.
[7] James K. Mullin,et al. Optimal Semijoins for Distributed Database Systems , 1990, IEEE Trans. Software Eng..
[8] Philip Gross,et al. Secure "selecticast" for collaborative intrusion detection systems , 2004, ICSE 2004.
[9] M.E. Locasto,et al. Towards collaborative security and P2P intrusion detection , 2005, Proceedings from the Sixth Annual IEEE SMC Information Assurance Workshop.
[10] George Varghese,et al. New directions in traffic measurement and accounting , 2002, CCRV.
[11] Richard P. Martin,et al. PlanetP: using gossiping to build content addressable peer-to-peer information sharing communities , 2003, High Performance Distributed Computing, 2003. Proceedings. 12th IEEE International Symposium on.
[12] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..
[13] David Wetherall,et al. Forwarding without loops in Icarus , 2002, 2002 IEEE Open Architectures and Network Programming Proceedings. OPENARCH 2002 (Cat. No.02EX571).
[14] James K. Mullin. Estimating the size of a relational join , 1993, Inf. Syst..
[15] Udi Manber,et al. An Algorithm for Approximate Membership checking with Application to Password Security , 1994, Inf. Process. Lett..
[16] John Kubiatowicz,et al. Probabilistic location and routing , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[17] David E. Taylor,et al. Longest prefix matching using bloom filters , 2006, TNET.
[18] Haiyun Luo,et al. Statistical en-route filtering of injected false data in sensor networks , 2005, IEEE J. Sel. Areas Commun..