1 |
Bloom B H . Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 1970,13(7): 422~426
|
2 |
Mcilroy M D . Development of a spelling list. IEEE Transactions on Communications, 1982,30(1): 91~99
|
3 |
Valdurez P , Gardarin G . Join and semijoin algorithms for a multiprocessor database machine. ACM Transactions on Database Systems, 1984,9(1): 133~161
|
4 |
Mackett L F , Lohman G M . Roptimizer validation and performance evaluation for distributed queries.In: Proc of the VLDB, Kyoto,Japan, August 1986
|
5 |
Mullin J K . Optimal semijoins for distributed database systems. IEEE Transactions on Software Engineering, 1990,16(5): 558~560
|
6 |
Fan L , Cao P , Almeida J ,et al. Summary cache:a scalable wide-area Web cache sharing protocol. ACM Transactions on Networking, 2000,8(3): 281~293
|
7 |
Reynolds P , Vahdat A , Efficient peer-to-peer keyword searching.In: Proc of Middleware,Riode Janeiro,Brazil, June 2003
|
8 |
Chen H H , Jin H , Wang J L ,et al. Efficient multi-keyword search over P2P web.In: Proc of the WWW, Beijing,China, April 2008
|
9 |
肖明忠, 代亚非 . Bloom Filter 及其应用综述. 计算机科学 , 2004,31(4): 180~183
|
10 |
Broder A , Mitzenmacher M . Network applications of bloom filters:a survey. Internet Mathematics, 2005,1(4): 485~509
|
11 |
谢鲲, 文吉刚, 张大方 等. 布鲁姆过滤器查询算法. 软件学报, 2009,20(1): 96~108
|
12 |
Bonomi F , Mitzenmacher M , Panigrahy R ,et al. An improved construction for counting bloom filters.In: Lecture Notes in Computer Science, Zurich,Switzerland, September 2006
|
13 |
Ficara D , Giordano S , Procissi G . MultiLayer compressed counting bloom filters.In: Proc of the Infocom, Phoenix,AZ,USA, April 2008
|
14 |
Saar C , Yossi M . Spectral bloom filters.In: Proc of the SIGMOD, San Diego,USA, June 2003
|
15 |
Aguilar-Saborit J , Trancoso P , Muntes-Mulero V . Dynamic count filters.In: Proc of the SIGMOD,Chicago, Chicago,USA, June 2006
|
16 |
肖明忠, 代亚非, 李晓明 . 拆分型Bloom Filter. 电子学报, 2004,32(2): 241~245
|
17 |
Guo D , Wu J , Chen H ,et al. Theory and network applications of dynamic bloom filters.In: Proc of the Infocom,Barcelona, Spain, April 2006
|
18 |
Almeida P S , Baquero C , Preguica N . Scalable bloom filters. Information Processing Letters, 2007,101(6): 255~261
|
19 |
Hao F , Kodialam M , Lakshman T V . Incremental bloom filters.In: Proc of the Infocom, Phoenix,AZ,USA, April 2008
|
20 |
Mitzenmacher M . Compressed bloom filters. ACM Transactions on Networking, 2002,10(5): 604~612
|
21 |
Mullin J K . Optimal semijoins for distributed database systems. IEEE Transactions on Software Engineering, 1990,16(5): 558~560
|
22 |
Udi M , Sun W . An algorithm for approximate membership checking with application to password security. Information Processing Letters, 1994,50(4): 191~197
|
23 |
Gremillion L L . Designing a bloom filter for differential file access. Communications of the ACM, 1982,25(9): 600~604
|
24 |
James K M . A second look at bloom filters. Communications of the ACM, 1983,26(8): 570~571
|
25 |
Ahmed R , Boutaba R . Plexus: a scalable peer-to-peer protocol enabling efficient subset search. ACM Transactions on Networking, 2009,17(1): 130~143
|
26 |
张一鸣, 卢锡城, 郑倩冰 等. 一种面向大规模P2P系统的快速搜索算法. 软件学报, 2008,19(6): 1473~1480
|
27 |
Yu H , Mahapatra R N . A memory-efficient hashing by multi-predicate bloom filters for packet classification.In: Proc of the Infocom, Phoenix,AZ,USA, April 2008
|
28 |
Kumar A , Xu J , Wang J , Spatschek O , et al. SpaceScode bloom filter for efficient persflow traffic measurement.In: Proc of IEEE Infocom, Hongkong, March 2004
|
29 |
叶明江, 崔勇, 徐恪 等. 基于有状态Bloom filter引擎的高速分组检测. 软件学报, 2007,18(1): 117~126
|
30 |
Yu H , Mahapatra R N . A memory-efficient hashing by multipredicate bloom filters for packet classification.In: Proc of Infocom,Phoenix, AZ,USA, April 2008
|
31 |
Sarang D , Haoyu S , Jonathan T , et al. Fast packet classification using bloom filters.In: Proc of the 2006 ACM/IEEE Symp Architecture for Networking and Communications Systems, 2006
|
32 |
Heeyeol Y , Mahapatra R . A memory-efficient hashing by multi-predicate bloom filters for packet classification.In: Proc of the Infocom, Phoenix,AZ,USA, April 2008
|
33 |
Locasto M E , Parekh J J , Keromytis A D , et al. Towards collaborative security and P2P intrusion detection.In: Proc of SMC 2005, NY,USA, June 2005
|
34 |
Hebden P , Pearce A R . Data-centric routing using bloom filters in wireless sensor networks.In: Proc of ICISIP 2006, Bangalore,India, December 2006
|
35 |
Bloomfilter, .
|