-
1
-
-
84856598167
-
-
Aguilera M, Ji M, Lillibridge M, MacCormick J, Oertli E, Anderson D, et al. Block-level security for network attached disks. In: Proceedings of the second Usenix conference on file and storage technologies; 2003.
-
-
-
-
2
-
-
33745995128
-
-
Bellovin S, Cheswick W. Privacy-enhanced searches using encrypted bloom filters, draft paper, in preparation.
-
-
-
-
3
-
-
0014814325
-
Space/time tradeoffs in hash coding with allowable errors
-
Bloom B. Space/time tradeoffs in hash coding with allowable errors. Communications of the ACM 13 7 (1970) 422-426
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
4
-
-
70450232823
-
Network applications of bloom filters: a survey
-
Broder A., and Mitzenmacher M. Network applications of bloom filters: a survey. Internet Mathematics 1 4 (2005) 485-509
-
(2005)
Internet Mathematics
, vol.1
, Issue.4
, pp. 485-509
-
-
Broder, A.1
Mitzenmacher, M.2
-
5
-
-
33746020253
-
-
Dharmapurikar S, Attig M, Lockwood J. Design and implementation of a string matching system for network intrusion detection using FPGA-based bloom filters. Washington University in St. Louis, Computer Science Technical Report WUCSE-2004-12; 2004.
-
-
-
-
6
-
-
33745981164
-
-
Dharmapurikar S, Krishnamurthy P, Taylor D. Longest prefix matching using bloom filters. IEEE Transactions on Networking, in press.
-
-
-
-
7
-
-
0011353742
-
-
Estan C, Varghese G. New directions in traffic measurement and accounting. In: Proceedings of the 2001 ACM SIGCOMM internet measurement workshop; 2001.
-
-
-
-
8
-
-
0034206002
-
Summary cache: a scalable wide-area web cache sharing protocol
-
Fan L., Cao P., Almeida J., and Broder A. Summary cache: a scalable wide-area web cache sharing protocol. IEEE/ACM Transactions on Networking 8 3 (2000) 281-293
-
(2000)
IEEE/ACM Transactions on Networking
, vol.8
, Issue.3
, pp. 281-293
-
-
Fan, L.1
Cao, P.2
Almeida, J.3
Broder, A.4
-
9
-
-
0035012756
-
-
Feng W-C, Shin K, Kandlur D, Saha D. Stochastic fair blue: a queue management algorithm for enforcing fairness. In: Proceedings of the twentieth annual joint conference of the IEEE computer and communications societies (INFOCOM 2001); 2001.
-
-
-
-
10
-
-
77954478896
-
-
Ledlie J, Taylor J, Serban L, Seltzer M. Self-organization in peer-to-peer systems. In: Proceedings of the in tenth ACM SIGOPS European workshop; 2002.
-
-
-
-
11
-
-
85043988965
-
-
U. Manber. Finding similar files in a large file system. In: Proceedings of the USENIX winter 1994 technical conference; Jan 1994. p. 1-10.
-
-
-
-
13
-
-
14844288974
-
-
Shanmugasundaram K, Bronnimann H, Memon N. Payload attribution via hierarchical bloom filters. In: Proceedings of the ACM symposium on communication and computer security (CCS'04); 2004.
-
-
-
-
14
-
-
0026869371
-
Opus: preventing weak password choices
-
Spafford E. Opus: preventing weak password choices. Computer and Security 11 (1992) 273-278
-
(1992)
Computer and Security
, vol.11
, pp. 273-278
-
-
Spafford, E.1
-
15
-
-
0021386165
-
Join and semijoin algorithms for a multiprocessor database machine
-
Valdurez P., and Gardarin G. Join and semijoin algorithms for a multiprocessor database machine. ACM Transactions on Database Systems 9 1 (1984) 133-161
-
(1984)
ACM Transactions on Database Systems
, vol.9
, Issue.1
, pp. 133-161
-
-
Valdurez, P.1
Gardarin, G.2
-
16
-
-
84961575319
-
-
Whitaker A, Wetherall D. Forwarding without loops in icarus. In: Proceedings of the fifth IEEE conference on open architectures and network programming; 2002.
-
-
-
|