-
1
-
-
0014814325
-
Space/time tradeoffs in hash coding with allowable errors
-
Bloom B. Space/time tradeoffs in hash coding with allowable errors. Commun ACM 13 7 (1970) 422-426
-
(1970)
Commun ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.1
-
2
-
-
85198674201
-
-
Brin S, Davis J, Garcia-Molina H. Copy detection mechanisms for digital documents. In: Proceedings of the ACM SIGMOD annual conference, San Francisco, CA, May 1995.
-
-
-
-
3
-
-
70450232823
-
Network applications of bloom filters: a survey
-
Broder A., and Mitzenmacher M. Network applications of bloom filters: a survey. Internet Math 1 4 (2005) 485-509
-
(2005)
Internet Math
, vol.1
, Issue.4
, pp. 485-509
-
-
Broder, A.1
Mitzenmacher, M.2
-
4
-
-
34447510586
-
-
Broder A, Glassman S, Manasse M, Zweig G. Syntactic clustering of the web. In: Proceedings of the 6th international world wide web conference, 1997. p. 393-404.
-
-
-
-
5
-
-
0036040277
-
-
Charikar MS. Similarity estimation techniques from rounding algorithms. In: Proceedings of the 34th annual ACM symposium on theory of computing, 2002.
-
-
-
-
6
-
-
85030321143
-
-
Dean J, Ghemawat S. MapReduce: simplified data processing on large clusters. In: Proceedings of the sixth symposium on operating system design and implementation, 2004.
-
-
-
-
7
-
-
34447522595
-
-
Henziger M. Finding near-duplicate web pages: a large-scale evaluation of algorithms. In: Proceedings of the 29th annual international ACM SIGIR conference on research and development on information retrieval, Seattle, 2006.
-
-
-
-
8
-
-
0022030599
-
Efficient randomized pattern-matching algorithms
-
Karp R., and Rabin M. Efficient randomized pattern-matching algorithms. IBM J Res Dev 31 2 (1987) 249-260
-
(1987)
IBM J Res Dev
, vol.31
, Issue.2
, pp. 249-260
-
-
Karp, R.1
Rabin, M.2
-
9
-
-
52249094557
-
-
Kornblum J. Identifying almost identical files using context triggered piecewise hashing. In: Proceedings of the 6th annual DFRWS, Lafayette, IN, Aug 2006.
-
-
-
-
10
-
-
0036806148
-
Compressed bloom filters
-
Mitzenmacher M. Compressed bloom filters. IEEE/ACM Trans Netw 10 5 (October 2002) 613-620
-
(2002)
IEEE/ACM Trans Netw
, vol.10
, Issue.5
, pp. 613-620
-
-
Mitzenmacher, M.1
-
11
-
-
33748374589
-
-
Monostori K, Finkel R, Zaslavsky A, Hodasz G, Pataki M. Comparison of overlap detection techniques. In: Proceedings of the 2002 international conference on computational science (I), Amsterdam, The Netherlands, 2002. p. 51-60.
-
-
-
-
12
-
-
85083946044
-
-
Roussev V, Richard III GG. Breaking the performance wall: the case for distributed digital forensics. In: Proceedings of the 2004 digital forensics research workshop (DFRWS 2004), Baltimore, MD.
-
-
-
-
13
-
-
65249176685
-
-
Roussev V, Chen Y, Bourg T, Richard III GG. md5bloom: forensic filesystem hashing revisited. In: Proceedings of the 6th annual DFRWS, Lafayette, IN, Aug 2006.
-
-
-
-
14
-
-
14844288974
-
-
Shanmugasundaram K, Bronnimann H, Memon N. Payload attribution via hierarchical bloom filters. In: Proceedings of the ACM symposium on communication and computer security (CCS'04), 2004.
-
-
-
-
15
-
-
34447514836
-
-
Shivakumar N, Garcia-Molina H. SCAM: a copy detection mechanism for digital documents. In: Proceedings of the international conference on theory and practice of digital libraries, June 1995.
-
-
-
-
16
-
-
0029696087
-
-
Shivakumar N, Garcia-Molina H. Building a scalable and accurate copy detection mechanism. In: Proceedings of the ACM conference on digital libraries, March 1996. p. 160-8.
-
-
-
-
17
-
-
34447519719
-
-
Shivakumar N, Garcia-Molina H. Finding near-replicas of documents on the web. In: Proceedings of the workshop on web databases, March 1998. p. 204-12.
-
-
-
-
18
-
-
34447521037
-
-
Tridgell A. Spamsum README. ; 2002.
-
-
-
|