Results 51 to 60 of about 119,966 (182)
A Bloom Filter for High Dimensional Vectors
Regardless of the type of data, traditional Bloom filters treat each element of a set as a string, and by iterating every character of the string, they discretize all data randomly and uniformly. However, with the data size and dimension increases, these
Chunyan Shuai +3 more
doaj +1 more source
In many cases, databases are incompetent to meet the requirement of the quick query identification and processing of bar codes, such as the automatic sorting system of giant logistics warehouse.
Mai Jiang +3 more
doaj +1 more source
Efficient Dynamic Bloom Filter Hashing Fragmentation for Cloud Data Storage
Security is important in cloud data storage while using the cloud services provided by the service provider in the cloud. Most of the research works have been designed for a secure cloud data storage.
Jegadeeswari S. +2 more
doaj +1 more source
Proof of Concept for a Privacy Preserving National Mortality Register
Introduction National mortality registers are essential for medical research. Therefore, most nations operate such registers. Due to the administrative structure and data protection legislation, there is no such registry in Germany. We demonstrate that a
Rainer Schnell, Christian Borgs
doaj +1 more source
Approximate membership query algorithm for incomplete data based on Bloom filter
More and more scenarios require approximate membership queries for incomplete query data, but traditional Bloom filters for membership queries cannot meet these requirements.
Wu Jiawen +4 more
doaj +1 more source
Scalable Techniques for Similarity Search [PDF]
Document similarity is similar to the nearest neighbour problem and has applications in various domains. In order to determine the similarity / dissimilarity of the documents first they need to be converted into sets containing shingles. Each document is
Nagireddy, Siddartha Reddy
core +1 more source
Bloom filter–based efficient broadcast algorithm for the Internet of things
In the Internet of things, a large number of objects can be embedded over a region of interest where almost every device is connected to the Internet.
Anum Talpur +5 more
doaj +1 more source
A Partially Distributed Intrusion Detection System for Wireless Sensor Networks
The increasing use of wireless sensor networks, which normally comprise several very small sensor nodes, makes their security an increasingly important issue. They can be practically and efficiently secured using intrusion detection systems. Conventional
Eung Jun Cho +3 more
doaj +1 more source
A new problem in string searching
We describe a substring search problem that arises in group presentation simplification processes. We suggest a two-level searching model: skip and match levels.
Havas, George, Lian, Jin Xian
core +1 more source
Longest-First Search Using Bloom Filter: Algorithm and FPGA Implementation
Due to the surge in Internet traffic and the rapid increase in forwarding table entries, achieving wire-speed packet forwarding in Internet routers demands both algorithmic enhancements and hardware innovations.
Jinsol Lee, Hyesook Lim
doaj +1 more source

