메뉴 건너뛰기




Volumn 108, Issue 4, 2008, Pages 210-213

On the false-positive rate of Bloom filters

Author keywords

Analysis of algorithms; Data structures

Indexed keywords

DATA STRUCTURES; FILE ORGANIZATION; RISK ASSESSMENT; TURBULENT FLOW; WAVE FILTERS;

EID: 52049099367     PISSN: 00200190     EISSN: None     Source Type: Journal    
DOI: 10.1016/j.ipl.2008.05.018     Document Type: Article
Times cited : (142)

References (13)
  • 1
    • 52049096451 scopus 로고    scopus 로고
    • S.M. Bellovin, W.R. Cheswick, Privacy-enhanced searches using encrypted Bloom filters, Draft, 2004, http://www.research.att.com/~smb/papers/bloom-encrypt.ps
    • S.M. Bellovin, W.R. Cheswick, Privacy-enhanced searches using encrypted Bloom filters, Draft, 2004, http://www.research.att.com/~smb/papers/bloom-encrypt.ps
  • 2
    • 0014814325 scopus 로고
    • Space/time trade-offs in hash coding with allowable errors
    • Bloom B.H. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM 13 7 (1970) 422-426
    • (1970) Communications of the ACM , vol.13 , Issue.7 , pp. 422-426
    • Bloom, B.H.1
  • 3
    • 52049110805 scopus 로고    scopus 로고
    • A. Broder, M. Mitzenmacher, Network applications of Bloom filters: A survey, in: Proceedings of the 40th Annual Allerton Conference on Communication, Control and Computing, 2002, pp. 636-646
    • A. Broder, M. Mitzenmacher, Network applications of Bloom filters: A survey, in: Proceedings of the 40th Annual Allerton Conference on Communication, Control and Computing, 2002, pp. 636-646
  • 4
    • 0018047004 scopus 로고    scopus 로고
    • L. Carter, R. Floyd, J. Gill, G. Markowsky, M. Wegman, Exact and approximate membership testers, in: Annual ACM Symposium on Theory of Computing, 1978, pp. 59-65
    • L. Carter, R. Floyd, J. Gill, G. Markowsky, M. Wegman, Exact and approximate membership testers, in: Annual ACM Symposium on Theory of Computing, 1978, pp. 59-65
  • 5
    • 52049097098 scopus 로고    scopus 로고
    • E.-J. Goh, Secure indexes for efficient searching on encrypted compressed data, Technical Report 2003/216, Cryptology ePrint Archive, 2003. http://eprint.iacr.org/2003/216/
    • E.-J. Goh, Secure indexes for efficient searching on encrypted compressed data, Technical Report 2003/216, Cryptology ePrint Archive, 2003. http://eprint.iacr.org/2003/216/
  • 7
    • 0020186366 scopus 로고
    • Designing a Bloom filter for differential access
    • Gremillion L.L. Designing a Bloom filter for differential access. Communications of the ACM 25 7 (1982) 600-604
    • (1982) Communications of the ACM , vol.25 , Issue.7 , pp. 600-604
    • Gremillion, L.L.1
  • 8
    • 52049091294 scopus 로고    scopus 로고
    • A. Kamath, R. Motwani, K. Palem, P. Spirakis, Tail bounds for occupancy and the satisfiability threshold conjecture, in: Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science, 1994, pp. 592-603
    • A. Kamath, R. Motwani, K. Palem, P. Spirakis, Tail bounds for occupancy and the satisfiability threshold conjecture, in: Proceedings of the 35th Annual IEEE Symposium on Foundations of Computer Science, 1994, pp. 592-603
  • 9
    • 52049126007 scopus 로고    scopus 로고
    • J. Schachter M. Ceglowski, Loaf, Online at http://loaf.cantbedone.org/
    • J. Schachter M. Ceglowski, Loaf, Online at http://loaf.cantbedone.org/
  • 13
    • 52049124591 scopus 로고
    • Practical performance of Bloom filters and parallel free-text searching
    • Ramakrishna M.V. Practical performance of Bloom filters and parallel free-text searching. Communications of the ACM 25 7 (1982) 600-604
    • (1982) Communications of the ACM , vol.25 , Issue.7 , pp. 600-604
    • Ramakrishna, M.V.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.