Network Applications of Bloom Filters: A Survey

From MaRDI portal
Publication:4672750

DOI10.1080/15427951.2004.10129096zbMath1090.68515OpenAlexW1993284846WikidataQ55980185 ScholiaQ55980185MaRDI QIDQ4672750

Andrei Z. Broder, Michael Mitzenmacher

Publication date: 3 May 2005

Published in: Internet Mathematics (Search for Journal in Brave)

Full work available at URL: https://doi.org/10.1080/15427951.2004.10129096




Related Items (34)

Support optimality and adaptive cuckoo filtersDictionary Matching in a StreamScalable Bloom filtersBloom Filters in Adversarial EnvironmentsAn approximate dynamic programming approach for improving accuracy of lossy data compression by Bloom filtersAn Insight Review on Bloom Filter and Its Variants with Applications: An Emerging Hash Based Membership Querying TechniqueEfficient and robust associative memory from a generalized Bloom filterBloom filter-based secure data forwarding in large-scale cyber-physical systemsA new analysis of the false positive rate of a Bloom filterXor FiltersOptimizing static and adaptive probing schedules for rapid event detectionA cache architecture for counting bloom filters: theory and applicationImproving counting Bloom filter performance with fingerprintsA novel server-side proxy caching strategy for large-scale multimedia applicationsLess hashing, same performance: Building a better Bloom filterImproving the performance of invertible Bloom lookup tablesImproving resource location with locally precomputed partial random walksDealing with Liars: Misbehavior Identification via Rényi-Ulam GamesScaling metagenome sequence assembly with probabilistic de Bruijn graphsAggregate query processing in the presence of duplicates in wireless sensor networksAn index-split Bloom filter for deep packet inspectionUnnamed ItemOn the false-positive rate of Bloom filtersSampling for passive internet measurement: a reviewTight bounds for sliding Bloom filtersIndex structures for fast similarity search for symbol stringsUsing Bloom Filters to Speed Up HITS-Like Ranking AlgorithmsAn Optimal Bloom Filter Replacement Based on Matrix SolvingUnnamed ItemUpper and lower bounds on black-box steganographyA symmetric cryptographic scheme for data integrity verification in cloud databasesA Survey of Data Structures in the Bitprobe ModelAdaptive Cuckoo FiltersA Theoretical Perspective on Hyperdimensional Computing




This page was built for publication: Network Applications of Bloom Filters: A Survey