Sciweavers

369 search results - page 50 / 74
» Scalable Bloom Filters
Sort
View
DSN
2007
IEEE
14 years 12 days ago
Augmenting Branch Predictor to Secure Program Execution
Although there are various ways to exploit software vulnerabilities for malicious attacks, the attacks always result in unexpected behavior in program execution, deviating from wh...
Yixin Shi, Gyungho Lee
SODA
2008
ACM
110views Algorithms» more  SODA 2008»
13 years 10 months ago
Why simple hash functions work: exploiting the entropy in a data stream
Hashing is fundamental to many algorithms and data structures widely used in practice. For theoretical analysis of hashing, there have been two main approaches. First, one can ass...
Michael Mitzenmacher, Salil P. Vadhan
P2PKM
2004
13 years 9 months ago
A Space-Efficient Model for Sharing Personal Knowledge Objects in Peer Communities
Abstract. In the future it is likely that peer communities will be routinely established for the purpose of sharing electronic resources and targeted information among groups of pe...
Fred S. Annexstein, Kenneth A. Berman
CN
2008
110views more  CN 2008»
13 years 8 months ago
The eternal sunshine of the sketch data structure
In the past years there has been significant research on developing compact data structures for summarizing large data streams. A family of such data structures is the so-called s...
Xenofontas A. Dimitropoulos, Marc Ph. Stoecklin, P...
DATE
2010
IEEE
155views Hardware» more  DATE 2010»
14 years 1 months ago
Scheduling and energy-distortion tradeoffs with operational refinement of image processing
— Ubiquitous image processing tasks (such as transform decompositions, filtering and motion estimation) do not currently provide graceful degradation when their clock-cycles budg...
Davide Anastasia, Yiannis Andreopoulos