-
1
-
-
0030389392
-
Characterizing reference locality in the WWW
-
V. Almeida, A. Bestavros, M. Crovella, and A. de Oliveira. Characterizing reference locality in the WWW. In the 4th Int'l Conf. on Parallel and Distributed Information Systems, pages 92-103, 1996.
-
(1996)
the 4th Int'l Conf. on Parallel and Distributed Information Systems
, pp. 92-103
-
-
Almeida, V.1
Bestavros, A.2
Crovella, M.3
de Oliveira, A.4
-
2
-
-
0014814325
-
Space/time trade-offs in hash coding with allowable errors
-
B. H. Bloom. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 13(7):422-426, 1970.
-
(1970)
Communications of the ACM
, vol.13
, Issue.7
, pp. 422-426
-
-
Bloom, B.H.1
-
4
-
-
33744910576
-
Informed content delivery across adaptive overlay networks
-
J. Byers, J. Considine, M. Mitzenmacher, and S. Rost. Informed content delivery across adaptive overlay networks. In ACM SIGCOMM, pages 47-60, 2002.
-
(2002)
ACM SIGCOMM
, pp. 47-60
-
-
Byers, J.1
Considine, J.2
Mitzenmacher, M.3
Rost, S.4
-
5
-
-
1842473700
-
The Bloomier filter: An efficient data structure for static support lookup tables
-
B. Chazelle, J. Kilian, R. Rubinfeld, and A. Tal. The Bloomier filter: An efficient data structure for static support lookup tables. In the 15th Symp. on Distributed Algorithms, pages 30-39, 2004.
-
(2004)
the 15th Symp. on Distributed Algorithms
, pp. 30-39
-
-
Chazelle, B.1
Kilian, J.2
Rubinfeld, R.3
Tal, A.4
-
6
-
-
1142279462
-
Spectral Bloom filters
-
S. Cohen and Y. Matias. Spectral Bloom filters. In the ACM SIGMOD, pages 241-252, 2003.
-
(2003)
the ACM SIGMOD
, pp. 241-252
-
-
Cohen, S.1
Matias, Y.2
-
7
-
-
0034206002
-
Summary cache: A scalable wide-area web cache sharing protocol
-
L. Fan, P. Cao, J. Almeida, and A. Z. Broder. Summary cache: A scalable wide-area web cache sharing protocol. IEEE/ACM Trans. on Networking, 8(3):281-293, 2000.
-
(2000)
IEEE/ACM Trans. on Networking
, vol.8
, Issue.3
, pp. 281-293
-
-
Fan, L.1
Cao, P.2
Almeida, J.3
Broder, A.Z.4
-
8
-
-
36348934004
-
Building high accuracy Bloom filters using partitioned hashing
-
F. Hao, M. Kodialam, and T. V. Lakshman. Building high accuracy Bloom filters using partitioned hashing. In ACM SIGMETRICS, pages 277-288, 2007.
-
(2007)
ACM SIGMETRICS
, pp. 277-288
-
-
Hao, F.1
Kodialam, M.2
Lakshman, T.V.3
-
9
-
-
84947403595
-
Probability inequalities for sums of bounded random variables
-
W. Hoeffding. Probability inequalities for sums of bounded random variables. Journal of the American Statistical Association, 58(301): 13-30, 1963.
-
(1963)
Journal of the American Statistical Association
, vol.58
, Issue.301
, pp. 13-30
-
-
Hoeffding, W.1
-
10
-
-
0020706194
-
On knapsack partitions and a new dynamic programming techniques for trees
-
D. S. Johnson and K. A. Niemi. On knapsack partitions and a new dynamic programming techniques for trees. Mathematics of Operations Research, 8(1): 1-14, 1983.
-
(1983)
Mathematics of Operations Research
, vol.8
, Issue.1
, pp. 1-14
-
-
Johnson, D.S.1
Niemi, K.A.2
-
14
-
-
25844450270
-
Efficient and scalable query routing for unstructured peer-to-peer networks
-
A. Kumar, J. Xu, and E. W. Zegura. Efficient and scalable query routing for unstructured peer-to-peer networks. In the IEEE INFOCOM, 2005.
-
(2005)
the IEEE INFOCOM
-
-
Kumar, A.1
Xu, J.2
Zegura, E.W.3
-
15
-
-
33644561158
-
On the feasibility of peer-to-peer web indexing and search
-
J. Li, T. Loo, J. Hellerstein, F. Kaashoek, D. R. Karger, and R. Morris. On the feasibility of peer-to-peer web indexing and search. In the 2nd Int'l Workshop on Peer-to-Peer Systems, 2003.
-
(2003)
the 2nd Int'l Workshop on Peer-to-Peer Systems
-
-
Li, J.1
Loo, T.2
Hellerstein, J.3
Kaashoek, F.4
Karger, D.R.5
Morris, R.6
-
16
-
-
0022821509
-
R* optimizer validation and performance evaluation for distributed queries
-
L. F. Mackert and G. M. Lohman. R* optimizer validation and performance evaluation for distributed queries. In the 12th Int'l Conf. on Very Large Data Bases, pages 149-159, 1986.
-
(1986)
the 12th Int'l Conf. on Very Large Data Bases
, pp. 149-159
-
-
Mackert, L.F.1
Lohman, G.M.2
-
17
-
-
0028428699
-
An algorithm for approximate membership checking with application to password security
-
U. Manber and S. Wu. An algorithm for approximate membership checking with application to password security. Information Processing Letters, 50:191-197, 1994.
-
(1994)
Information Processing Letters
, vol.50
, pp. 191-197
-
-
Manber, U.1
Wu, S.2
-
19
-
-
0025432881
-
Optimal semijoins for distributed database systems
-
J. K. Mullin. Optimal semijoins for distributed database systems. IEEE Trans. on Software Engineering, 16(5):558-560, 1990.
-
(1990)
IEEE Trans. on Software Engineering
, vol.16
, Issue.5
, pp. 558-560
-
-
Mullin, J.K.1
-
21
-
-
3042767592
-
A survey of web cache replacement strategies
-
S. Podlipnig and L. Boszormenyi. A survey of web cache replacement strategies. ACM Computing Surveys, 35(4):374-398, 2003.
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.4
, pp. 374-398
-
-
Podlipnig, S.1
Boszormenyi, L.2
-
22
-
-
0024752323
-
Practical performance of Bloom filters and parallel free-text searching
-
M. V. Ramakrishna. Practical performance of Bloom filters and parallel free-text searching. Communications of ACM, 32(10):1237-1239, 1989.
-
(1989)
Communications of ACM
, vol.32
, Issue.10
, pp. 1237-1239
-
-
Ramakrishna, M.V.1
-
23
-
-
3142719373
-
Efficient peer-to-peer keyword searching
-
P. Reynold and A. Vahdat. Efficient peer-to-peer keyword searching. In Middleware, pages 21-40, 2003.
-
(2003)
Middleware
, pp. 21-40
-
-
Reynold, P.1
Vahdat, A.2
-
24
-
-
0036349210
-
Probabilistic location and routing
-
S. Rhea and J. Kubiatowicz. Probabilistic location and routing. In the 21st IEEE INFOCOM, pages 1248-1257, 2002.
-
(2002)
the 21st IEEE INFOCOM
, pp. 1248-1257
-
-
Rhea, S.1
Kubiatowicz, J.2
-
25
-
-
33845195416
-
Optimal resource utilization in content distribution networks
-
Technical Report TR2005-2004, Dept. of Computer Science, Cornell Univ
-
Y. J. Song, V. Ramasubramanian, and E. G. Sirer. Optimal resource utilization in content distribution networks. Technical Report TR2005-2004, Dept. of Computer Science, Cornell Univ., 2005.
-
(2005)
-
-
Song, Y.J.1
Ramasubramanian, V.2
Sirer, E.G.3
-
26
-
-
0026869371
-
Opurs: Preventing weak password choices
-
E. H. Spafford. Opurs: Preventing weak password choices. Computer and Security, 11:273-278, 1992.
-
(1992)
Computer and Security
, vol.11
, pp. 273-278
-
-
Spafford, E.H.1
-
27
-
-
57549110799
-
Replication degree customization for high availability
-
M. Zhong, K. Shen, and J. Seiferas. Replication degree customization for high availability. In the 3rd EuroSys Conf., pages 55-68, 2008.
-
(2008)
the 3rd EuroSys Conf
, pp. 55-68
-
-
Zhong, M.1
Shen, K.2
Seiferas, J.3
|