Photo from wikipedia
Sign Up to like & get
recommendations!
1
Published in 2020 at "Wireless Networks"
DOI: 10.1007/s11276-020-02296-1
Abstract: Due to the rapid growth of the Internet and content development services, digital text has become the most extensively used type of media in digital communication. However, digital text is at risk of being illegally…
read more here.
Keywords:
text;
bloom filter;
ownership protection;
Sign Up to like & get
recommendations!
0
Published in 2018 at "Journal of Ambient Intelligence and Humanized Computing"
DOI: 10.1007/s12652-018-0893-1
Abstract: Recently, the amount of data being stored has increased dramatically, and the amount of data backed up on servers increases yearly. However, the share of duplicate data in that backup data is also increasing, and…
read more here.
Keywords:
bloom filter;
filter based;
based data;
deduplication algorithm ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2019 at "Journal of Applied Security Research"
DOI: 10.1080/19361610.2019.1613090
Abstract: Abstract Bloom filters (BF) are widely used in (wireless) network security protocols, searchable encryptions, and many other places. For performance and implementation issues, these applications prefer to use as few hash functions and as small…
read more here.
Keywords:
bloom filter;
hash functions;
bloom;
split bloom ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Access"
DOI: 10.1109/access.2017.2764106
Abstract: In named data networking (NDN), content store (CS) is proposed to provide on-path cache service. When user’s request with content name is forwarded to NDN node, exact match in CS is carried out first. Under…
read more here.
Keywords:
trie based;
compression trie;
filter;
bloom filter ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2018 at "IEEE Access"
DOI: 10.1109/access.2018.2831259
Abstract: Key-value (KV) stores are widely used to provide much higher read and write throughput than traditional SQL databases. In particular, LSM-tree based KV store is popular with many applications since it could eliminate random writes…
read more here.
Keywords:
bloom filter;
key value;
level structure;
bloom ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Access"
DOI: 10.1109/access.2022.3158368
Abstract: As a key component in implementing Named Data Networking (NDN), Pending Interest Table (PIT) requires an efficient exact-matching algorithm for a scalable and fast PIT lookup. A Bloom filter (BF) is a memory-efficient data structure…
read more here.
Keywords:
pit;
rcbf pit;
bloom filter;
pit architectures ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2017 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2017.2702174
Abstract: Bloom filters have been used to reduce the delay in networking and computing applications when a set membership check is to be applied. Error sources can affect the behavior of Bloom filters resulting in a…
read more here.
Keywords:
bloom;
bloom filter;
single event;
event transient ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2020.3036424
Abstract: Bloom filter (BF), when used by an online application, experiences monotonically increasing false-positive errors. The decay of stale elements can control false-positives. Existing mechanisms for decay require unreasonable storage and computation. Inexpensive methods reset the…
read more here.
Keywords:
bloom;
bloom filter;
fadingbf bloom;
filter consistent ... See more keywords
Photo from wikipedia
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2021.3067713
Abstract: The Bloom filter, answering whether an item is in a set, has achieved great success in various fields, including networking, databases, and bioinformatics. However, the Bloom filter has two main shortcomings: no support of item…
read more here.
Keywords:
bloom filter;
elastic fingerprints;
bloom;
elastic bloom ... See more keywords
Sign Up to like & get
recommendations!
2
Published in 2022 at "IEEE Transactions on Computers"
DOI: 10.1109/tc.2021.3112079
Abstract: As a challenging attempt to replace a traditional data structure with a learned model, this paper proposes a learned functional Bloom filter (L-FBF) for a key–value storage. The learned model in the proposed L-FBF learns…
read more here.
Keywords:
value storage;
functional bloom;
bloom filter;
key value ... See more keywords
Sign Up to like & get
recommendations!
1
Published in 2022 at "IEEE Transactions on Information Forensics and Security"
DOI: 10.1109/tifs.2022.3166641
Abstract: When public clouds become the platform of choice for MapReduce processing, users are placing higher demands on the privacy of the job data and program. A number of solutions employed trusted hardware to protect MapReduce…
read more here.
Keywords:
information;
leakage prevention;
mapreduce;
bloom filter ... See more keywords