Near-optimal approximate membership query over time-decaying windows
暂无分享,去创建一个
Yong Guan | Yang Liu | Wenji Chen | Y. Guan | Wenji Chen | Yang Liu
[1] George Varghese,et al. Beyond bloom filters: from approximate membership checks to approximate state machines , 2006, SIGCOMM.
[2] S. Muthukrishnan,et al. Data streams: algorithms and applications , 2005, SODA '03.
[3] David Eppstein,et al. Space-Efficient Straggler Identification in Round-Trip Data Streams Via Newton's Identities and Invertible Bloom Filters , 2007, WADS.
[4] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[5] Li Fan,et al. Summary cache: a scalable wide-area web cache sharing protocol , 2000, TNET.
[6] Isaac Keslassy,et al. The Variable-Increment Counting Bloom Filter , 2012, IEEE/ACM Transactions on Networking.
[7] Carey L. Williamson,et al. Internet Web servers: workload characterization and performance implications , 1997, TNET.
[8] Jennifer Widom,et al. Database Systems: The Complete Book , 2001 .
[9] Jennifer Widom,et al. Models and issues in data stream systems , 2002, PODS.
[10] Marcin Zukowski,et al. Architecture-conscious hashing , 2006, DaMoN '06.
[11] Tim Moors,et al. Survey of Research towards Robust Peer-to-Peer Networks: Search Methods , 2007, RFC.
[12] Andrei Broder,et al. Network Applications of Bloom Filters: A Survey , 2004, Internet Math..
[13] Nikolas Askitis,et al. Fast and Compact Hash Tables for Integer Keys , 2009, ACSC.
[14] Ankur Narang,et al. Towards "intelligent compression" in streams: a biased reservoir sampling based Bloom filter approach , 2011, EDBT '12.
[15] Andrei Z. Broder,et al. Efficient URL caching for world wide web crawling , 2003, WWW '03.
[16] Yong Guan,et al. Detecting Click Fraud in Pay-Per-Click Streams of Online Advertising Networks , 2008, 2008 The 28th International Conference on Distributed Computing Systems.
[17] Guy E. Blelloch,et al. Compact dictionaries for variable-length keys and data with applications , 2008, TALG.
[18] Fan Deng,et al. Approximately detecting duplicates for streaming data using stable bloom filters , 2006, SIGMOD Conference.
[19] Charu C. Aggarwal,et al. Data Streams: Models and Algorithms (Advances in Database Systems) , 2006 .
[20] Srikanth Kandula,et al. Botz-4-sale: surviving organized DDoS attacks that mimic flash crowds , 2005, NSDI.
[21] Bruce A. Mah,et al. An empirical model of HTTP network traffic , 1997, Proceedings of INFOCOM '97.
[22] Shonali Krishnaswamy,et al. Mining data streams: a review , 2005, SGMD.
[23] Martin F. Arlitt,et al. Web server workload characterization: the search for invariants , 1996, SIGMETRICS '96.
[24] Larry Carter,et al. Exact and approximate membership testers , 1978, STOC.
[25] Divyakant Agrawal,et al. Duplicate detection in click streams , 2005, WWW '05.
[26] Ely Porat,et al. An Optimal Bloom Filter Replacement Based on Matrix Solving , 2008, CSR.
[27] Rasmus Pagh,et al. Cuckoo Hashing , 2001, Encyclopedia of Algorithms.
[28] Krishna P. Gummadi,et al. On the evolution of user interaction in Facebook , 2009, WOSN '09.