Building high accuracy bloom filters using partitioned hashing
暂无分享,去创建一个
[1] Eugene H. Spafford,et al. OPUS: Preventing weak password choices , 1992, Comput. Secur..
[2] Robert Sedgewick,et al. Algorithms in C , 1990 .
[3] Udi Manber,et al. An Algorithm for Approximate Membership checking with Application to Password Security , 1994, Inf. Process. Lett..
[4] Anna Pagh,et al. Uniform hashing in constant time and linear space , 2003, STOC '03.
[5] Michael Mitzenmacher,et al. Less hashing, same performance: Building a better Bloom filter , 2006, Random Struct. Algorithms.
[6] Bernard Chazelle,et al. The Bloomier filter: an efficient data structure for static support lookup tables , 2004, SODA '04.
[7] Steven S. Lumetta,et al. Using the Power of Two Choices to Improve Bloom Filters , 2007, Internet Math..
[8] Russ Bubley,et al. Randomized algorithms , 1995, CSUR.
[9] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..
[10] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[11] George Varghese,et al. New directions in traffic measurement and accounting , 2002, CCRV.
[12] S. Srinivasa Rao,et al. An optimal Bloom filter replacement , 2005, SODA '05.
[13] George Varghese,et al. Beyond bloom filters: from approximate membership checks to approximate state machines , 2006, SIGCOMM.
[14] Li Fan,et al. Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.