-
1
-
-
0016518897
-
Efficient string matching: an aid to bibliographic search
-
Aho, A.V. and Corasick, M.J. (1975) ‘Efficient string matching: an aid to bibliographic search’, Communications of the ACM, Vol. 18, No. 6, pp.333–340.
-
(1975)
Communications of the ACM
, vol.18
, Issue.6
, pp. 333-340
-
-
Aho, A.V.1
Corasick, M.J.2
-
3
-
-
33644905483
-
Network applications of bloom filters: a survey
-
Broder, A. and Mitzenmacher, M. (2002). ‘Network applications of bloom filters: a survey’, Allerton 2002, Available at: http://www.eecs.harvard.edu/ichaelm/NEWWORK/papers.
-
(2002)
Allerton 2002
-
-
Broder, A.1
Mitzenmacher, M.2
-
5
-
-
84952951818
-
-
Clementi, A. (2005) ‘Anti-virus comparative’, Available at: http://www.av-comparatives.org/index.html? http://www.av-comparatives.org/seiten/comparatives.html.
-
(2005)
Anti-virus comparative
-
-
Clementi, A.1
-
7
-
-
33846583459
-
-
Dounin, M. (2004) ‘Clamav developer forum’, Available at: http://sourceforge.net/mailarchive/forum.php?forum=clamav-devel.
-
(2004)
Clamav developer forum
-
-
Dounin, M.1
-
10
-
-
84952962082
-
-
GmbH, H.D. (2004) ‘Dazuko’, Available at: http://www.dazuko.org.
-
(2004)
Dazuko
-
-
GmbH, H.D.1
-
14
-
-
84952972410
-
-
Kojm, T. (2004) ‘Clamav’, Available at: http://www.clamav.net.
-
(2004)
Clamav
-
-
Kojm, T.1
-
22
-
-
33846645257
-
-
Scalabium (2004) ‘Elf hash algorithm’, Available at: http://www.scalabium.com/faq/dct0136.htm.
-
(2004)
Elf hash algorithm
-
-
Scalabium1
-
27
-
-
84882658623
-
-
Yigit, O. (1990) ‘sdbm – substitute dbm’, Available at: http://search.cpan.org/src/NWCLARK/perl-5.8.4/ext/SDBM _File/sdbm.
-
(1990)
sdbm – substitute dbm
-
-
Yigit, O.1
-
28
-
-
54249151507
-
-
Yigit, O. (2004) ‘Hash functions’, Available at: http://www.cs. yorku.ca/oz/hash.html.
-
(2004)
Hash functions
-
-
Yigit, O.1
-
29
-
-
84952973489
-
-
Last year’s episode of Download.Ject web site infection (Microsoft, 2004) clearly highlights the importance of scanning viruses at Web proxy gateways
-
Last year’s episode of Download.Ject web site infection (Microsoft, 2004) clearly highlights the importance of scanning viruses at Web proxy gateways.
-
-
-
-
30
-
-
84952957410
-
-
A Bloom filter is a bit array holding results of multiple hash functions on a set of strings. A string can be queried against the filter; the filter generates false positives but never false negatives. Bloom filters are used wherever a compact representation of a set is needed (Broder and Mitzenmacher, 2002)
-
A Bloom filter is a bit array holding results of multiple hash functions on a set of strings. A string can be queried against the filter; the filter generates false positives but never false negatives. Bloom filters are used wherever a compact representation of a set is needed (Broder and Mitzenmacher, 2002).
-
-
-
-
31
-
-
84952962525
-
-
Clam-AV chooses to hash three-byte chunks so that the shift table fits in the CPU cache. It has been suggested that Clam-AV’s choice of three-byte chunks is not optimal and ten-byte chunks should be used. However, we experimented with Clam-AV hashing ten-byte chunks (by setting the parameter BM_MIN_LENGTH to 10), and found that the throughput was reduced by 60%. Thus, in our experiments we use the default Clam-AV settings
-
Clam-AV chooses to hash three-byte chunks so that the shift table fits in the CPU cache. It has been suggested that Clam-AV’s choice of three-byte chunks is not optimal and ten-byte chunks should be used. However, we experimented with Clam-AV hashing ten-byte chunks (by setting the parameter BM_MIN_LENGTH to 10), and found that the throughput was reduced by 60%. Thus, in our experiments we use the default Clam-AV settings.
-
-
-
|