Sciweavers

233 search results - page 11 / 47
» Spectral Bloom Filters
Sort
View
SIGCOMM
2005
ACM
15 years 8 months ago
Fast hash table lookup using extended bloom filter: an aid to network processing
Hash table is used as one of the fundamental modules in several network processing algorithms and applications such as route lookup, packet classification, per-flow state manage...
Haoyu Song, Sarang Dharmapurikar, Jonathan S. Turn...
CCS
2004
ACM
15 years 8 months ago
Payload attribution via hierarchical bloom filters
Payload attribution is an important problem often encountered in network forensics. Given an excerpt of a payload, finding its source and destination is useful for many security ...
Kulesh Shanmugasundaram, Hervé Brönnim...
TC
2011
14 years 9 months ago
Software-Based Cache Coherence with Hardware-Assisted Selective Self-Invalidations Using Bloom Filters
— Implementing shared memory consistency models on top of hardware caches gives rise to the well-known cache coherence problem. The standard solution involves implementing cohere...
Thomas J. Ashby, Pedro Diaz, Marcelo Cintra
ACSAC
2006
IEEE
15 years 9 months ago
Enhancing Collaborative Spam Detection with Bloom Filters
Signature-based collaborative spam detection (SCSD) systems provide a promising solution addressing many problems facing statistical spam filters, the most widely adopted technol...
Jeff Yan, Pook Leong Cho
ICCAD
2006
IEEE
98views Hardware» more  ICCAD 2006»
15 years 12 months ago
On the use of Bloom filters for defect maps in nanocomputing
Gang Wang, Wenrui Gong, Ryan Kastner