Edindex: Enabling fast data queries in edge storage systems
In an edge storage system, popular data can be stored on edge servers to enable low-
latency data retrieval for nearby users. Suffering from constrained storage capacities, edge …
latency data retrieval for nearby users. Suffering from constrained storage capacities, edge …
Fast tag searching protocol for large-scale RFID systems
Fast searching a particular subset in a large number of products attached with radio
frequency identification (RFID) tags is of practical importance for a variety of applications, but …
frequency identification (RFID) tags is of practical importance for a variety of applications, but …
P-MTI: Physical-layer missing tag identification via compressive sensing
Radio frequency identification (RFID) systems are emerging platforms that support a variety
of pervasive applications. RFID tags can be used to label items and enable item-level …
of pervasive applications. RFID tags can be used to label items and enable item-level …
Privacy-preserving multi-keyword hybrid search over encrypted data in cloud
Data outsourcing to the cloud is gaining popularity day by day in cloud computing. It requires
a dynamic architecture that avoids loopholes and stops intruders from entering the cloud …
a dynamic architecture that avoids loopholes and stops intruders from entering the cloud …
The power of evil choices in bloom filters
T Gerbet, A Kumar, C Lauradoux - 2015 45th Annual IEEE/IFIP …, 2015 - ieeexplore.ieee.org
A Bloom filter is a probabilistic hash-based data structure extensively used in software
including online security applications. This paper raises the following important question …
including online security applications. This paper raises the following important question …
A generalized bloom filter to secure distributed network applications
Distributed applications use Bloom filters to transmit large sets in a compact form. However,
attackers can easily disrupt these applications by using or advertising saturated filters. In this …
attackers can easily disrupt these applications by using or advertising saturated filters. In this …
Exploiting efficient and scalable shuffle transfers in future data center networks
Distributed computing systems like MapReduce in data centers transfer massive amount of
data across successive processing stages. Such shuffle transfers contribute most of the …
data across successive processing stages. Such shuffle transfers contribute most of the …
Set reconciliation via counting bloom filters
In this paper, we study the set reconciliation problem, in which each member of a node pair
has a set of objects and seeks to deliver its unique objects to the other member. How could …
has a set of objects and seeks to deliver its unique objects to the other member. How could …
A secure anonymous tracing fog-assisted method for the internet of robotic things
A Alamer - Library Hi Tech, 2022 - emerald.com
Purpose Employing a fog computing (FC) network system in the robotic network system is an
effective solution to support robotic application issues. The interconnection between robotic …
effective solution to support robotic application issues. The interconnection between robotic …
On the evolutionary of bloom filter false positives-an information theoretical approach to optimizing bloom filter parameters
The fundamental issue of how to calculate the false positive probability of widely used
Bloom Filters (BF), from which the conventional wisdom is to derive the optimal value of …
Bloom Filters (BF), from which the conventional wisdom is to derive the optimal value of …