Sciweavers

101 search results - page 7 / 21
» The Bloom paradox: When not to use a Bloom filter
Sort
View
SIGCOMM
2005
ACM
14 years 27 days ago
Fast hash table lookup using extended bloom filter: an aid to network processing
Hash table is used as one of the fundamental modules in several network processing algorithms and applications such as route lookup, packet classification, per-flow state manage...
Haoyu Song, Sarang Dharmapurikar, Jonathan S. Turn...
TC
2011
13 years 1 months ago
Software-Based Cache Coherence with Hardware-Assisted Selective Self-Invalidations Using Bloom Filters
— Implementing shared memory consistency models on top of hardware caches gives rise to the well-known cache coherence problem. The standard solution involves implementing cohere...
Thomas J. Ashby, Pedro Diaz, Marcelo Cintra
MICRO
2007
IEEE
137views Hardware» more  MICRO 2007»
14 years 1 months ago
Implementing Signatures for Transactional Memory
Transactional Memory (TM) systems must track the read and write sets—items read and written during a transaction—to detect conflicts among concurrent transactions. Several TM...
Daniel Sanchez, Luke Yen, Mark D. Hill, Karthikeya...
WAW
2007
Springer
77views Algorithms» more  WAW 2007»
14 years 1 months ago
Using Bloom Filters to Speed Up HITS-Like Ranking Algorithms
Abstract. This paper describes a technique for reducing the querytime cost of HITS-like ranking algorithm. The basic idea is to compute for each node in the web graph a summary of ...
Sreenivas Gollapudi, Marc Najork, Rina Panigrahy
ICCAD
2006
IEEE
98views Hardware» more  ICCAD 2006»
14 years 4 months ago
On the use of Bloom filters for defect maps in nanocomputing
Gang Wang, Wenrui Gong, Ryan Kastner