咨询与建议

限定检索结果

文献类型

  • 13 篇 期刊文献
  • 9 篇 会议
  • 1 篇 学位论文

馆藏范围

  • 23 篇 电子文献
  • 0 种 纸本馆藏

日期分布

学科分类号

  • 22 篇 工学
    • 17 篇 计算机科学与技术...
    • 9 篇 电气工程
    • 7 篇 信息与通信工程
    • 2 篇 软件工程
    • 1 篇 土木工程
    • 1 篇 交通运输工程
    • 1 篇 生物工程
  • 3 篇 理学
    • 1 篇 数学
    • 1 篇 生物学

主题

  • 23 篇 probabilistic da...
  • 5 篇 bloom filters
  • 5 篇 bloom filter
  • 2 篇 indexes
  • 2 篇 big data
  • 2 篇 cuckoo filters
  • 2 篇 count-min sketch
  • 2 篇 network security
  • 2 篇 quotient filter
  • 1 篇 internet of thin...
  • 1 篇 intrusion detect...
  • 1 篇 dns water tortur...
  • 1 篇 privacy in outso...
  • 1 篇 internet of thin...
  • 1 篇 snp
  • 1 篇 standard templat...
  • 1 篇 libraries
  • 1 篇 social network a...
  • 1 篇 metagenomics
  • 1 篇 location-based s...

机构

  • 3 篇 deemed univ thap...
  • 2 篇 swiss fed inst t...
  • 1 篇 johns hopkins un...
  • 1 篇 dynatrace res a-...
  • 1 篇 natl inst teleco...
  • 1 篇 univ sydney ctr ...
  • 1 篇 king abdulaziz u...
  • 1 篇 inst telecomunic...
  • 1 篇 univ london impe...
  • 1 篇 birla inst techn...
  • 1 篇 iit hyderabad hy...
  • 1 篇 aalto univ dept ...
  • 1 篇 univ innsbruck d...
  • 1 篇 asia univ dept c...
  • 1 篇 univ ghent dept ...
  • 1 篇 chandigarh univ ...
  • 1 篇 univ british col...
  • 1 篇 tech univ wien i...
  • 1 篇 natl tech univ a...
  • 1 篇 xidian univ sch ...

作者

  • 6 篇 kumar neeraj
  • 5 篇 batra shalini
  • 5 篇 garg sahil
  • 5 篇 singh amritpal
  • 2 篇 aujla gagangeet ...
  • 2 篇 filic mia
  • 1 篇 moerman ingrid
  • 1 篇 markelon sam a.
  • 1 篇 rodrigues joel j...
  • 1 篇 moser georg
  • 1 篇 unnikrishnan anu...
  • 1 篇 maio dario
  • 1 篇 almeida paulo se...
  • 1 篇 tapp darren
  • 1 篇 kim kisu
  • 1 篇 kumar nikhil
  • 1 篇 zomaya albert y.
  • 1 篇 kim kwangsik
  • 1 篇 pavlidis adam
  • 1 篇 ding wenxiu

语言

  • 23 篇 英文
检索条件"主题词=Probabilistic Data Structures"
23 条 记 录,以下是1-10 订阅
排序:
Deletions and Dishonesty: probabilistic data structures in Adversarial Settings  30th
Deletions and Dishonesty: Probabilistic Data Structures in A...
收藏 引用
30th International Conference on the Theory and Application of Cryptology and Information Security
作者: Filic, Mia Kocher, Keran Kummer, Ella Unnikrishnan, Anupama Swiss Fed Inst Technol Zurich Switzerland
probabilistic data structures (PDS) are compact representations of high-volume data that provide approximate answers to queries about the data. They are commonplace in today's computing systems, finding use in dat... 详细信息
来源: 评论
Automated Expected Amortised Cost Analysis of probabilistic data structures  34th
Automated Expected Amortised Cost Analysis of Probabilistic ...
收藏 引用
34th International Conference on Computer-Aided Verification (CAV) held as part of the Federated Logic Conference (FLoC)
作者: Leutgeb, Lorenz Moser, Georg Zuleger, Florian Max Planck Inst Informat Saarland Informat Campus Saarbrucken Germany Grad Sch Comp Sci Saarland Informat Campus Saarbrucken Germany Univ Innsbruck Dept Comp Sci Innsbruck Austria Tech Univ Wien Inst Log & Computat 192 4 Vienna Austria
In this paper, we present the first fully-automated expected amortised cost analysis of self-adjusting data structures, that is, of randomised splay trees, randomised splay heaps and randomised meldable heaps, which s... 详细信息
来源: 评论
A probabilistic data structures-Based Anomaly Detection Scheme for Software-Defined Internet of Vehicles
收藏 引用
IEEE TRANSACTIONS ON INTELLIGENT TRANSPORTATION SYSTEMS 2021年 第6期22卷 3557-3566页
作者: Garg, Sahil Singh, Amritpal Aujla, Gagangeet Singh Kaur, Sukhdeep Batra, Shalini Kumar, Neeraj Univ Quebec Elect Engn Dept Ecole Technol Super Montreal PQ H3C 1K3 Canada Natl Inst Technol Comp Sci & Engn Dept Jalandhar 144805 Punjab India Newcastle Univ Sch Comp Newcastle Upon Tyne NE4 5TG Tyne & Wear England Chandigarh Univ Comp Sci & Engn Dept Mohali 140413 India Thapar Inst Engn & Technol Patiala 147001 Punjab India Asia Univ Dept Comp Sci & Informat Engn Taichung 41354 Taiwan King Abdulaziz Univ Jeddah 21589 Saudi Arabia
Internet of Vehicles (IoV) has escalated the movement of big data across moving vehicles which create a huge burden on the network infrastructure. In IoV environment, effective handling of streaming data has to face v... 详细信息
来源: 评论
probabilistic data structures for big data analytics: A comprehensive review
收藏 引用
KNOWLEDGE-BASED SYSTEMS 2020年 188卷 104987-104987页
作者: Singh, Amritpal Garg, Sahil Kaur, Ravneet Batra, Shalini Kumar, Neeraj Zomaya, Albert Y. Deemed Univ Thapar Inst Engn & Technol Comp Sci & Engn Dept Patiala Punjab India Univ Sydney Ctr Distributed & High Performance Comp Sydney NSW Australia
An exponential increase in the data generation resources is widely observed in last decade, because of evolution in technologies such as-cloud computing, IoT, social networking, etc. This enormous and unlimited growth... 详细信息
来源: 评论
ProIDS: probabilistic data structures based Intrusion Detection System for Network Traffic Monitoring
<i>ProIDS</i>: Probabilistic Data Structures based Intrusion...
收藏 引用
IEEE Global Telecommunications Conference (GLOBECOM)
作者: Gupta, Divya Garg, Sahil Singh, Amritpal Batra, Shalini Kumar, Neeraj Obaidat, M. S. Thapar Univ Comp Sci & Engn Dept Patiala Punjab India Univ Jordan King Abdullah Sch Informat Technol Amman Jordan
Internet is an integrated platform where the data is growing at an exponential rate. Since it incorporates numerous business and personal services, we need to protect the data from illegal access or modifications. In ... 详细信息
来源: 评论
LSM tree read-deletion operations optimization through the implementation of cuckoo filters
收藏 引用
JOURNAL OF BIG data 2025年 第1期12卷 1-20页
作者: Valverde, Humberto Cesar Villalta Kim, Kwangsik Kim, Kisu Kwon, Jinman Lim, Jaechoon Jun, Yongjoo Dtonic Seongnam 13591 Gyeonggido South Korea
This study aims to develop an LSM tree that uses two different kinds of probabilistic data structures (PDS). These two data structures are the Bloom Filters and the state-of-the-art Cuckoo Filter released in 2014 by F... 详细信息
来源: 评论
A Case for Partitioned Bloom Filters
收藏 引用
IEEE TRANSACTIONS ON COMPUTERS 2023年 第6期72卷 1681-1691页
作者: Almeida, Paulo Sergio INESC TEC P-4200465 Porto Portugal Univ Minho P-4710057 Braga Portugal
In a partitioned Bloom Filter (PBF) the bit vector is split into disjoint parts, one per hash function. Contrary to hardware designs, where they prevail, software implementations mostly ignore PBFs, considering them w... 详细信息
来源: 评论
EPMDroid: Efficient and privacy-preserving malware detection based on SGX through data fusion
收藏 引用
INFORMATION FUSION 2022年 82卷 43-57页
作者: Wei, Wentao Wang, Jie Yan, Zheng Ding, Wenxiu Xidian Univ Sch Cyber Engn State Key Lab Integrated Serv Networks Xian Peoples R China Aalto Univ Dept Commun & Networking Espoo Finland
Android has stood at a predominant position in mobile operating systems for many years. However, its popularity and openness make it a desirable target of malicious attackers. There is an increasing need for mobile ma... 详细信息
来源: 评论
ProbMinHash - A Class of Locality-Sensitive Hash Algorithms for the (Probability) Jaccard Similarity
收藏 引用
IEEE TRANSACTIONS ON KNOWLEDGE AND data ENGINEERING 2022年 第7期34卷 3491-3506页
作者: Ertl, Otmar Dynatrace Res A-4020 Linz Austria
The probability Jaccard similarity was recently proposed as a natural generalization of the Jaccard similarity to measure the proximity of sets whose elements are associated with relative frequencies or probabilities.... 详细信息
来源: 评论
Staggered HLL: Near-continuous-time cardinality estimation with no overhead
收藏 引用
COMPUTER COMMUNICATIONS 2022年 193卷 168-175页
作者: Cornacchia, Alessandro Bianchi, Giuseppe Bianco, Andrea Giaccone, Paolo Politecn Torino Corso Duca Abruzzi 24 I-10129 Turin Italy Univ Roma Tor Vergata CNIT Via Politecn 1 I-00133 Rome Italy
Most of existing cardinality estimation algorithms do not support natively interval queries under a sliding window model and are thereby insensitive to data recency. We present Staggered-HyperLogLog (ST-HLL), a probab... 详细信息
来源: 评论