Articles with "bloom filter" as a keyword



Photo from wikipedia

A novel Bloom-filter-based scheme for secure text ownership protection

Sign Up to like & get
recommendations!
Published in 2020 at "Wireless Networks"

DOI: 10.1007/s11276-020-02296-1

Abstract: Due to the rapid growth of the Internet and content development services, digital text has become the most extensively used type of media in digital communication. However, digital text is at risk of being illegally… read more here.

Keywords: text; bloom filter; ownership protection;
Photo by campaign_creators from unsplash

Design and implementation of a Bloom filter-based data deduplication algorithm for efficient data management

Sign Up to like & get
recommendations!
Published in 2018 at "Journal of Ambient Intelligence and Humanized Computing"

DOI: 10.1007/s12652-018-0893-1

Abstract: Recently, the amount of data being stored has increased dramatically, and the amount of data backed up on servers increases yearly. However, the share of duplicate data in that backup data is also increasing, and… read more here.

Keywords: bloom filter; filter based; based data; deduplication algorithm ... See more keywords
Photo by kellysikkema from unsplash

A Split Bloom Filter for Better Performance

Sign Up to like & get
recommendations!
Published in 2019 at "Journal of Applied Security Research"

DOI: 10.1080/19361610.2019.1613090

Abstract: Abstract Bloom filters (BF) are widely used in (wireless) network security protocols, searchable encryptions, and many other places. For performance and implementation issues, these applications prefer to use as few hash functions and as small… read more here.

Keywords: bloom filter; hash functions; bloom; split bloom ... See more keywords
Photo by newhighmediagroup from unsplash

Adaptive Compression Trie Based Bloom Filter: Request Filter for NDN Content Store

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Access"

DOI: 10.1109/access.2017.2764106

Abstract: In named data networking (NDN), content store (CS) is proposed to provide on-path cache service. When user’s request with content name is forwarded to NDN node, exact match in CS is carried out first. Under… read more here.

Keywords: trie based; compression trie; filter; bloom filter ... See more keywords
Photo by hudsoncrafted from unsplash

FlameDB: A Key-Value Store With Grouped Level Structure and Heterogeneous Bloom Filter

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Access"

DOI: 10.1109/access.2018.2831259

Abstract: Key-value (KV) stores are widely used to provide much higher read and write throughput than traditional SQL databases. In particular, LSM-tree based KV store is popular with many applications since it could eliminate random writes… read more here.

Keywords: bloom filter; key value; level structure; bloom ... See more keywords
Photo by kellysikkema from unsplash

Dynamically Allocated Bloom Filter-Based PIT Architectures

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Access"

DOI: 10.1109/access.2022.3158368

Abstract: As a key component in implementing Named Data Networking (NDN), Pending Interest Table (PIT) requires an efficient exact-matching algorithm for a scalable and fast PIT lookup. A Bloom filter (BF) is a memory-efficient data structure… read more here.

Keywords: pit; rcbf pit; bloom filter; pit architectures ... See more keywords
Photo by susangkomen3day from unsplash

Single Event Transient Tolerant Bloom Filter Implementations

Sign Up to like & get
recommendations!
Published in 2017 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2017.2702174

Abstract: Bloom filters have been used to reduce the delay in networking and computing applications when a set membership check is to be applied. Error sources can affect the behavior of Bloom filters resulting in a… read more here.

Keywords: bloom; bloom filter; single event; event transient ... See more keywords
Photo by kellysikkema from unsplash

FadingBF: A Bloom Filter With Consistent Guarantees for Online Applications

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2020.3036424

Abstract: Bloom filter (BF), when used by an online application, experiences monotonically increasing false-positive errors. The decay of stale elements can control false-positives. Existing mechanisms for decay require unreasonable storage and computation. Inexpensive methods reset the… read more here.

Keywords: bloom; bloom filter; fadingbf bloom; filter consistent ... See more keywords
Photo from wikipedia

Elastic Bloom Filter: Deletable and Expandable Filter Using Elastic Fingerprints

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2021.3067713

Abstract: The Bloom filter, answering whether an item is in a set, has achieved great success in various fields, including networking, databases, and bioinformatics. However, the Bloom filter has two main shortcomings: no support of item… read more here.

Keywords: bloom filter; elastic fingerprints; bloom; elastic bloom ... See more keywords
Photo by kellysikkema from unsplash

Learned FBF: Learning-Based Functional Bloom Filter for Key–Value Storage

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Computers"

DOI: 10.1109/tc.2021.3112079

Abstract: As a challenging attempt to replace a traditional data structure with a learned model, this paper proposes a learned functional Bloom filter (L-FBF) for a key–value storage. The learned model in the proposed L-FBF learns… read more here.

Keywords: value storage; functional bloom; bloom filter; key value ... See more keywords
Photo by freegraphictoday from unsplash

Enhancing Leakage Prevention for MapReduce

Sign Up to like & get
recommendations!
Published in 2022 at "IEEE Transactions on Information Forensics and Security"

DOI: 10.1109/tifs.2022.3166641

Abstract: When public clouds become the platform of choice for MapReduce processing, users are placing higher demands on the privacy of the job data and program. A number of solutions employed trusted hardware to protect MapReduce… read more here.

Keywords: information; leakage prevention; mapreduce; bloom filter ... See more keywords