-
1
-
-
0014814325
-
Space/time tradeoffs in in hash coding with allowable errors
-
Bloom, B. Space/time tradeoffs in in hash coding with allowable errors, CACM 13 (1970), 422-426.
-
(1970)
CACM
, vol.13
, pp. 422-426
-
-
Bloom, B.1
-
3
-
-
0032613750
-
Membership in constant time and almost minimum space
-
Brodnik, A., Munro, J.I., Membership in constant time and almost minimum space, SIAM J. Comput. 28 (1999), 1628-1640.
-
(1999)
SIAM J. Comput.
, vol.28
, pp. 1628-1640
-
-
Brodnik, A.1
Munro, J.I.2
-
4
-
-
0033701727
-
Are bitvectors optimal?
-
Buhrman, H., Miltersen, P.B., Radhakrishnan, J., Venkatesh, S. Are bitvectors optimal? Proc. 32th STOC (2000), 449-458.
-
(2000)
Proc. 32th STOC
, pp. 449-458
-
-
Buhrman, H.1
Miltersen, P.B.2
Radhakrishnan, J.3
Venkatesh, S.4
-
5
-
-
33744910576
-
Informed content delivery over adaptive overlay networks
-
Computer Communication Review
-
Byers, J., Considine, J., Mitzenmacher, M. Informed content delivery over adaptive overlay networks, Proc. ACM SIGCOMM 2002, Vol. 32:4, Computer Communication Review (2002), 47-60.
-
(2002)
Proc. ACM SIGCOMM 2002
, vol.32
, Issue.4
, pp. 47-60
-
-
Byers, J.1
Considine, J.2
Mitzenmacher, M.3
-
6
-
-
0036041924
-
Randomness conductors and constant-degree expansion beyond the degree /2 barrier
-
Capalbo, M., Reingold, O., Vadhan, S., Wigderson, A. Randomness conductors and constant-degree expansion beyond the degree /2 barrier, Proc. 34th STOC (2002), 659-668.
-
(2002)
Proc. 34th STOC
, pp. 659-668
-
-
Capalbo, M.1
Reingold, O.2
Vadhan, S.3
Wigderson, A.4
-
8
-
-
0003491796
-
PlanetP: Using gossiping to build content addressable peer-to-peer information sharing communities
-
Cuena-Acuna, F.M., Peery, C., Martin, R.P., Nguyen, T.D. PlanetP: Using gossiping to build content addressable peer-to-peer information sharing communities, Rutgers Technical Report DCS-TR-487, 2002.
-
(2002)
Rutgers Technical Report
, vol.DCS-TR-487
-
-
Cuena-Acuna, F.M.1
Peery, C.2
Martin, R.P.3
Nguyen, T.D.4
-
9
-
-
33744912228
-
New directions in traffic measurement and accounting
-
Computer Communication Review
-
Estan, C., Varghese, G. New directions in traffic measurement and accounting, Proc. ACM SIGCOMM 2002, Vol 32:4, Computer Communication Review (2002), 323-336.
-
(2002)
Proc. ACM SIGCOMM 2002
, vol.32
, Issue.4
, pp. 323-336
-
-
Estan, C.1
Varghese, G.2
-
10
-
-
0034206002
-
Summary cache: A scalable wide-area web cache sharing protocol
-
Fan, L., Cao. P., Almeida, J., Broder, A. Summary cache: a scalable wide-area web cache sharing protocol, IEEE /ACM Transactions on Networking, 8 (2000), 281-293.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, pp. 281-293
-
-
Fan, L.1
Cao, P.2
Almeida, J.3
Broder, A.4
-
11
-
-
0002586462
-
Computing iceberg queries efficiently
-
Fang, M., Shivakumar, N., Garcia-Molina, H., Motwani, R., Ullman. J. Computing iceberg queries efficiently, Proc. 24th Int. Conf. on VLDB (1998), 299-310.
-
(1998)
Proc. 24th Int. Conf. on VLDB
, pp. 299-310
-
-
Fang, M.1
Shivakumar, N.2
Garcia-Molina, H.3
Motwani, R.4
Ullman, J.5
-
12
-
-
0035012756
-
Stochastic fair blue: A queue management algorithm for enforcing fairness
-
Feng, W.-C., Shin, K.G., Kandlur, D., Saha, D. Stochastic fair blue: A queue management algorithm for enforcing fairness, INFOCOM '01 (2001), 1520-1529.
-
(2001)
INFOCOM '01
, pp. 1520-1529
-
-
Feng, W.-C.1
Shin, K.G.2
Kandlur, D.3
Saha, D.4
-
13
-
-
0021467937
-
Storing a sparse table with 0(1) worst case access time
-
Fredman, M.L., Komlos, J., Szemeredi, E. Storing a sparse table with 0(1) worst case access time, J. ACM 31 (1984), 538-544.
-
(1984)
J. ACM
, vol.31
, pp. 538-544
-
-
Fredman, M.L.1
Komlos, J.2
Szemeredi, E.3
-
14
-
-
0020186366
-
Designing a Bloom Filter for differential file access
-
Gremillion, L.L. Designing a Bloom Filter for differential file access, Comm. ACM 25 (1982), 600-604.
-
(1982)
Comm. ACM
, vol.25
, pp. 600-604
-
-
Gremillion, L.L.1
-
15
-
-
0042535034
-
Geographical region summary service for geographical routing
-
Hsiao, P. Geographical region summary service for geographical routing, Mobile Computing and Communications Review 5 (2001), 25-39.
-
(2001)
Mobile Computing and Communications Review
, vol.5
, pp. 25-39
-
-
Hsiao, P.1
-
16
-
-
0000294926
-
Families of k-independent sets
-
Kleitman, D.J., Spencer, J. Families of k-independent sets, Discrete Math 6 (1973), 255-262.
-
(1973)
Discrete Math
, vol.6
, pp. 255-262
-
-
Kleitman, D.J.1
Spencer, J.2
-
17
-
-
77954478896
-
Self-organization in peer-to-peer systems
-
September
-
Ledlie, J., Taylor, J., Serban, L., Seltzer, M. Self-organization in peer-to-peer systems, Proc. 10th European SIGOPS Workshop, September 2002.
-
(2002)
Proc. 10th European SIGOPS Workshop
-
-
Ledlie, J.1
Taylor, J.2
Serban, L.3
Seltzer, M.4
-
18
-
-
0029456316
-
PERF join: An alternative to two-way semijoin and bloomjoin
-
November
-
Li, Z., Ross, K.A. PERF join: an alternative to two-way semijoin and bloomjoin CIKM '95, Proc. 1995 In-ternational Conference on Information and Knowledge Management, 137-144, November 1995.
-
(1995)
CIKM '95, Proc. 1995 In-ternational Conference on Information and Knowledge Management
, pp. 137-144
-
-
Li, Z.1
Ross, K.A.2
-
20
-
-
0022821509
-
R* optimizer validation and performance for distributed queries
-
Mackert, L., Lohman, G. R* optimizer validation and performance for distributed queries, Proc. Int'l. Conf. on VLDB (1986), 149-159.
-
(1986)
Proc. Int'l. Conf. on VLDB
, pp. 149-159
-
-
Mackert, L.1
Lohman, G.2
-
21
-
-
0028428699
-
An algorithm for approximate membership checking with application to password security
-
Manber, U., Wu, S. An algorithm for approximate membership checking with application to password security, Information Processing Letters 50 (1994), 191-197.
-
(1994)
Information Processing Letters
, vol.50
, pp. 191-197
-
-
Manber, U.1
Wu, S.2
-
22
-
-
0019909815
-
Development of a spelling list
-
McIlroy, M.D. Development of a spelling list, IEEE Trans. on Communications, COM-30 (1982), 91-99.
-
(1982)
IEEE Trans. on Communications
, vol.COM-30
, pp. 91-99
-
-
McIlroy, M.D.1
-
25
-
-
0011933971
-
Applications of matrix methods to the theory of lower bounds in computational complexity
-
Razborov, A.A. Applications of matrix methods to the theory of lower bounds in computational complexity, Combinatorica 10 (1990), 81-93.
-
(1990)
Combinatorica
, vol.10
, pp. 81-93
-
-
Razborov, A.A.1
-
27
-
-
0032204654
-
Cache digests
-
Rousskov, A., Wessels, D. Cache digests, Computer Networks and ISDN Systems, 30(22-23), 2155-2168, 1998.
-
(1998)
Computer Networks and ISDN Systems
, vol.30
, Issue.22-23
, pp. 2155-2168
-
-
Rousskov, A.1
Wessels, D.2
-
29
-
-
0034775309
-
Hash-based IP traceback
-
Computer Communication Review, August
-
Snoeren, A.C., Partridge, C., Sanchez, L.A., Jones, C.E., Tchakountio, F., Kent, S.T., Strayer W.T. Hash-based IP traceback, Proc. ACM SIGCOMM 2001, Vol. 31:4, Computer Communication Review, 3-14, August 2001.
-
(2001)
Proc. ACM SIGCOMM 2001
, vol.31
, Issue.4
, pp. 3-14
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
Jones, C.E.4
Tchakountio, F.5
Kent, S.T.6
Strayer, W.T.7
|