咨询与建议

限定检索结果

文献类型

  • 13 篇 期刊文献
  • 9 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 23 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 17 篇 计算机科学与技术...
    • 9 篇 电气工程
    • 7 篇 信息与通信工程
    • 2 篇 软件工程
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物工程
  • 3 篇 理学
    • 1 篇 数学
    • 1 篇 生物学

主题

  • 23 篇 probabilistic da...
  • 5 篇 bloom filters
  • 5 篇 bloom filter
  • 2 篇 indexes
  • 2 篇 big data
  • 2 篇 cuckoo filters
  • 2 篇 count-min sketch
  • 2 篇 network security
  • 2 篇 quotient filter
  • 1 篇 internet of thin...
  • 1 篇 intrusion detect...
  • 1 篇 dns water tortur...
  • 1 篇 privacy in outso...
  • 1 篇 internet of thin...
  • 1 篇 snp
  • 1 篇 standard templat...
  • 1 篇 libraries
  • 1 篇 social network a...
  • 1 篇 metagenomics
  • 1 篇 location-based s...

机构

  • 3 篇 deemed univ thap...
  • 2 篇 swiss fed inst t...
  • 1 篇 johns hopkins un...
  • 1 篇 dynatrace res a-...
  • 1 篇 natl inst teleco...
  • 1 篇 univ sydney ctr ...
  • 1 篇 king abdulaziz u...
  • 1 篇 inst telecomunic...
  • 1 篇 univ london impe...
  • 1 篇 birla inst techn...
  • 1 篇 iit hyderabad hy...
  • 1 篇 aalto univ dept ...
  • 1 篇 univ innsbruck d...
  • 1 篇 asia univ dept c...
  • 1 篇 univ ghent dept ...
  • 1 篇 chandigarh univ ...
  • 1 篇 univ british col...
  • 1 篇 tech univ wien i...
  • 1 篇 natl tech univ a...
  • 1 篇 xidian univ sch ...

作者

  • 6 篇 kumar neeraj
  • 5 篇 batra shalini
  • 5 篇 garg sahil
  • 5 篇 singh amritpal
  • 2 篇 aujla gagangeet ...
  • 2 篇 filic mia
  • 1 篇 moerman ingrid
  • 1 篇 markelon sam a.
  • 1 篇 rodrigues joel j...
  • 1 篇 moser georg
  • 1 篇 unnikrishnan anu...
  • 1 篇 maio dario
  • 1 篇 almeida paulo se...
  • 1 篇 tapp darren
  • 1 篇 kim kisu
  • 1 篇 kumar nikhil
  • 1 篇 zomaya albert y.
  • 1 篇 kim kwangsik
  • 1 篇 pavlidis adam
  • 1 篇 ding wenxiu

语言

  • 23 篇 英文
检索条件"主题词=Probabilistic Data Structures"
23 条 记 录,以下是1-10 订阅
排序:
Deletions and Dishonesty: probabilistic data structures in Adversarial Settings  30th
Deletions and Dishonesty: Probabilistic Data Structures in A...
收藏 引用
30th International Conference on the Theory and Application of Cryptology and Information Security
作者: Filic, Mia Kocher, Keran Kummer, Ella Unnikrishnan, Anupama Swiss Fed Inst Technol Zurich Switzerland
probabilistic data structures (PDS) are compact representations of high-volume data that provide approximate answers to queries about the data. They are commonplace in today's computing systems, finding use in dat... 详细信息
来源: 评论
A probabilistic data structures-Based Anomaly Detection Scheme for Software-Defined Internet of Vehicles
收藏 引用
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 2021年 第6期22卷 3557-3566页
作者: Garg, Sahil Singh, Amritpal Aujla, Gagangeet Singh Kaur, Sukhdeep Batra, Shalini Kumar, Neeraj Univ Quebec Elect Engn Dept Ecole Technol Super Montreal PQ H3C 1K3 Canada Natl Inst Technol Comp Sci & Engn Dept Jalandhar 144805 Punjab India Newcastle Univ Sch Comp Newcastle Upon Tyne NE4 5TG Tyne & Wear England Chandigarh Univ Comp Sci & Engn Dept Mohali 140413 India Thapar Inst Engn & Technol Patiala 147001 Punjab India Asia Univ Dept Comp Sci & Informat Engn Taichung 41354 Taiwan King Abdulaziz Univ Jeddah 21589 Saudi Arabia
Internet of Vehicles (IoV) has escalated the movement of big data across moving vehicles which create a huge burden on the network infrastructure. In IoV environment, effective handling of streaming data has to face v... 详细信息
来源: 评论
probabilistic data structures for big data analytics: A comprehensive review
收藏 引用
KNOWLEDGE-BASED SYSTEMS 2020年 188卷
作者: Singh, Amritpal Garg, Sahil Kaur, Ravneet Batra, Shalini Kumar, Neeraj Zomaya, Albert Y. Deemed Univ Thapar Inst Engn & Technol Comp Sci & Engn Dept Patiala Punjab India Univ Sydney Ctr Distributed & High Performance Comp Sydney NSW Australia
An exponential increase in the data generation resources is widely observed in last decade, because of evolution in technologies such as-cloud computing, IoT, social networking, etc. This enormous and unlimited growth... 详细信息
来源: 评论
ProIDS: probabilistic data structures based Intrusion Detection System for Network Traffic Monitoring
<i>ProIDS</i>: Probabilistic Data Structures based Intrusion...
收藏 引用
IEEE Global Telecommunications Conference (GLOBECOM)
作者: Gupta, Divya Garg, Sahil Singh, Amritpal Batra, Shalini Kumar, Neeraj Obaidat, M. S. Thapar Univ Comp Sci & Engn Dept Patiala Punjab India Univ Jordan King Abdullah Sch Informat Technol Amman Jordan
Internet is an integrated platform where the data is growing at an exponential rate. Since it incorporates numerous business and personal services, we need to protect the data from illegal access or modifications. In ... 详细信息
来源: 评论
Automated Expected Amortised Cost Analysis of probabilistic data structures  34th
Automated Expected Amortised Cost Analysis of Probabilistic ...
收藏 引用
34th International Conference on Computer-Aided Verification (CAV) held as part of the Federated Logic Conference (FLoC)
作者: Leutgeb, Lorenz Moser, Georg Zuleger, Florian Max Planck Inst Informat Saarland Informat Campus Saarbrucken Germany Grad Sch Comp Sci Saarland Informat Campus Saarbrucken Germany Univ Innsbruck Dept Comp Sci Innsbruck Austria Tech Univ Wien Inst Log & Computat 192 4 Vienna Austria
In this paper, we present the first fully-automated expected amortised cost analysis of self-adjusting data structures, that is, of randomised splay trees, randomised splay heaps and randomised meldable heaps, which s... 详细信息
来源: 评论
LSM tree read-deletion operations optimization through the implementation of cuckoo filters
收藏 引用
JOURNAL OF BIG data 2025年 第1期12卷 1-20页
作者: Valverde, Humberto Cesar Villalta Kim, Kwangsik Kim, Kisu Kwon, Jinman Lim, Jaechoon Jun, Yongjoo Dtonic Seongnam 13591 Gyeonggido South Korea
This study aims to develop an LSM tree that uses two different kinds of probabilistic data structures (PDS). These two data structures are the Bloom Filters and the state-of-the-art Cuckoo Filter released in 2014 by F... 详细信息
来源: 评论
EPMDroid: Efficient and privacy-preserving malware detection based on SGX through data fusion
收藏 引用
INFORMATION FUSION 2022年 82卷 43-57页
作者: Wei, Wentao Wang, Jie Yan, Zheng Ding, Wenxiu Xidian Univ Sch Cyber Engn State Key Lab Integrated Serv Networks Xian Peoples R China Aalto Univ Dept Commun & Networking Espoo Finland
Android has stood at a predominant position in mobile operating systems for many years. However, its popularity and openness make it a desirable target of malicious attackers. There is an increasing need for mobile ma... 详细信息
来源: 评论
Privacy preservation in outsourced mobility traces through compact data structures
收藏 引用
JOURNAL OF INFORMATION SECURITY AND APPLICATIONS 2020年 55卷
作者: Calderoni, Luca Bandini, Samantha Maio, Dario Univ Bologna Dept Comp Sci & Engn Bologna Italy
Indoor localization is widely used as enabling technology for location-based services, such as advertising, indoor routing, and behavioral analysis. To keep these features available, service providers passively collec... 详细信息
来源: 评论
Bloom filter based optimization scheme for massive data handling in IoT environment
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2018年 82卷 440-449页
作者: Singh, Amritpal Garg, Sahil Batra, Shalini Kumar, Neeraj Rodrigues, Joel J. P. C. Deemed Univ Thapar Inst Engn & Technol Comp Sci & Engn Dept Patiala Punjab India Natl Inst Telecommun Inatel Santa Rita Do Sapucai MG Brazil Inst Telecomunicacoes Santa Rita Do Sapucai MG Brazil ITMO Univ St Petersburg Russia Univ Fortaleza UNIFOR Fortaleza Ceara Brazil
With the widespread popularity of big data usage across various applications, need for efficient storage, processing, and retrieval of massive datasets generated from different applications has become inevitable. Furt... 详细信息
来源: 评论
probabilistic data structure-based community detection and storage scheme in online social networks
收藏 引用
FUTURE GENERATION COMPUTER SYSTEMS-THE INTERNATIONAL JOURNAL OF ESCIENCE 2019年 94卷 173-184页
作者: Singh, Amritpal Garg, Sahil Batra, Shalini Kumar, Neeraj Deemed Univ Thapar Inst Engn & Technol Comp Sci & Engn Dept Patiala Punjab India Univ Quebec ETS Elect Engn Dept Montreal PQ H3C 1K3 Canada
With the wide popularity of various social network sites such as - Facebook, Twitter, and Instagram;processing, storage, and analysis of a large volume of data are becoming challenging issues. In general, social netwo... 详细信息
来源: 评论