Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Theory and practice of bloom filters for distributed systems
S Tarkoma, CE Rothenberg… - … Surveys & Tutorials, 2011 - ieeexplore.ieee.org
Many network solutions and overlay networks utilize probabilistic techniques to reduce
information processing and networking costs. This survey article presents a number of …
information processing and networking costs. This survey article presents a number of …
Xor filters: Faster and smaller than bloom and cuckoo filters
The Bloom filter provides fast approximate set membership while using little memory.
Engineers often use these filters to avoid slow operations such as disk or network accesses …
Engineers often use these filters to avoid slow operations such as disk or network accesses …
Practical volume-hiding encrypted multi-maps with optimal overhead and beyond
Encrypted multi-map (EMM), as a special case of structured encryption, has attracted
extensive attention recently. However, most of EMM constructions reveal the real volumes of …
extensive attention recently. However, most of EMM constructions reveal the real volumes of …
Searchable symmetric encryption: optimal locality in linear space via two-dimensional balanced allocations
Searchable symmetric encryption (SSE) enables a client to store a database on an untrusted
server while supporting keyword search in a secure manner. Despite the rapidly increasing …
server while supporting keyword search in a secure manner. Despite the rapidly increasing …
Hash, displace, and compress
A hash function h, ie, a function from the set U of all keys to the range range [m]={0,..., m− 1}
is called a perfect hash function (PHF) for a subset S⊆ U of size n≤ m if h is 1-1 on S. The …
is called a perfect hash function (PHF) for a subset S⊆ U of size n≤ m if h is 1-1 on S. The …
Tight thresholds for cuckoo hashing via XORSAT
We settle the question of tight thresholds for offline cuckoo hashing. The problem can be
stated as follows: we have n keys to be hashed into m buckets each capable of holding a …
stated as follows: we have n keys to be hashed into m buckets each capable of holding a …
Backyard cuckoo hashing: Constant worst-case operations with a succinct representation
The performance of a dynamic dictionary is measured mainly by its update time, lookup time,
and space consumption. In terms of update time and lookup time there are known …
and space consumption. In terms of update time and lookup time there are known …
Ribbon filter: practically smaller than Bloom and Xor
PC Dillinger, S Walzer - arxiv preprint arxiv:2103.02515, 2021 - arxiv.org
Filter data structures over-approximate a set of hashable keys, ie set membership queries
may incorrectly come out positive. A filter with false positive rate $ f\in (0, 1] $ is known to …
may incorrectly come out positive. A filter with false positive rate $ f\in (0, 1] $ is known to …
Binary fuse filters: Fast and smaller than xor filters
Bloom and cuckoo filters provide fast approximate set membership while using little memory.
Engineers use them to avoid expensive disk and network accesses. The recently introduced …
Engineers use them to avoid expensive disk and network accesses. The recently introduced …
Probabilistic data structures in adversarial environments
Probabilistic data structures use space-efficient representations of data in order to
(approximately) respond to queries about the data. Traditionally, these structures are …
(approximately) respond to queries about the data. Traditionally, these structures are …