Theory and practice of bloom filters for distributed systems

S Tarkoma, CE Rothenberg… - … Surveys & Tutorials, 2011 - ieeexplore.ieee.org
Many network solutions and overlay networks utilize probabilistic techniques to reduce
information processing and networking costs. This survey article presents a number of …

[BOK][B] Large scale and big data: Processing and management

S Sakr, M Gaber - 2014 - books.google.com
This book provides a central source of reference on the various data management
techniques of large scale data processing and its technology application. This book presents …

Streaming quotient filter: A near optimal approximate duplicate detection approach for data streams

S Dutta, A Narang, SK Bera - Proceedings of the VLDB Endowment, 2013 - dl.acm.org
The unparalleled growth and popularity of the Internet coupled with the advent of diverse
modern applications such as search engines, on-line transactions, climate warning systems …

[HTML][HTML] An approach for removing redundant data from RFID data streams

H Mahdin, J Abawajy - Sensors, 2011 - mdpi.com
Radio frequency identification (RFID) systems are emerging as the primary object
identification mechanism, especially in supply chain management. However, RFID naturally …

One-hashing bloom filter

J Lu, T Yang, Y Wang, H Dai, L **… - 2015 IEEE 23rd …, 2015 - ieeexplore.ieee.org
Bloom filters are widely used in many network applications but the high computation cost
limits the system performance. In this paper, we introduce a new variation of Bloom filter …

Application of the sliding window method and Mask-RCNN method to nuclear recognition in oral cytology

E Mitate, K Inoue, R Sato, Y Shimomoto, S Ohba… - Diagnostic …, 2022 - Springer
Background We aimed to develop an artificial intelligence (AI)-assisted oral cytology
method, similar to cervical cytology. We focused on the detection of cell nuclei because the …

[PDF][PDF] Handling duplicate data in data warehouse for data mining

JJ Tamilselvi, CB Gifta - International Journal of Computer Applications, 2011 - Citeseer
The problem of detecting and eliminating duplicated data is one of the major problems in the
broad area of data cleaning and data quality in data warehouse. Many times, the same …

Low computational cost bloom filters

J Lu, T Yang, Y Wang, H Dai, X Chen… - IEEE/ACM …, 2018 - ieeexplore.ieee.org
Bloom filters (BFs) are widely used in many network applications but the high computational
cost limits the system performance. In this paper, we introduce a low computational cost …

Data management in multi-agent simulation systems

D Glake, F Panse, N Ritter, T Clemen, U Lenfers - BTW 2021, 2021 - dl.gi.de
Multi-agent simulations are an upcoming trend to deal with the urgent need to predict
complex situations as they arise in many real-life areas, such as disaster or traffic …

[HTML][HTML] Reducing false negative reads in RFID data streams using an adaptive sliding-window approach

LV Massawe, JDM Kinyua, H Vermaak - Sensors, 2012 - mdpi.com
Unreliability of the data streams generated by RFID readers is among the primary factors
which limit the widespread adoption of the RFID technology. RFID data cleaning is …