Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Optimizing bloom filter: Challenges, solutions, and comparisons
Bloom filter (BF) has been widely used to support membership query, ie, to judge whether a
given element x is a member of a given set S or not. Recent years have seen a flourish …
given element x is a member of a given set S or not. Recent years have seen a flourish …
SoK: Applications of sketches and rollups in blockchain networks
A Kotzer, D Gandelman… - IEEE Transactions on …, 2024 - ieeexplore.ieee.org
Blockchain networks suffer from a critical scalability problem that is often expressed in two
dimensions: the size of the network state and the computational overhead in processing …
dimensions: the size of the network state and the computational overhead in processing …
HeavyKeeper: An Accurate Algorithm for Finding Top- Elephant Flows
Finding top-elephant flows is a critical task in network traffic measurement, with many
applications in congestion control, anomaly detection and traffic engineering. As the line …
applications in congestion control, anomaly detection and traffic engineering. As the line …
RNS-based adaptive compression scheme for the block data in the blockchain for IIoT
Z Guo, Z Gao, Q Liu, C Chakraborty… - IEEE Transactions …, 2022 - ieeexplore.ieee.org
The Industrial Internet of Things (IIoT) is the essential component of Industry 4.0. Blockchain
is a promising technology for secure data sharing and trustable cooperation between IIoT …
is a promising technology for secure data sharing and trustable cooperation between IIoT …
Approximate computing: Concepts, architectures, challenges, applications, and future directions
The unprecedented progress in computational technologies led to a substantial proliferation
of artificial intelligence applications, notably in the era of big data and IoT devices. In the …
of artificial intelligence applications, notably in the era of big data and IoT devices. In the …
A framework for anomaly detection in blockchain networks with sketches
T Voronov, D Raz… - IEEE/ACM Transactions on …, 2023 - ieeexplore.ieee.org
A blockchain is a distributed ledger composed of immutable blocks of data that often refer to
money transfers. As blockchain networks gain popularity, there is a rising concern for …
money transfers. As blockchain networks gain popularity, there is a rising concern for …
Memory-efficient performance monitoring on programmable switches with lean algorithms
Network performance problems are notoriously difficult to diagnose. Prior profiling systems
collect performance statistics by kee** information about each network flow, but …
collect performance statistics by kee** information about each network flow, but …
Weightless neural networks as memory segmented bloom filters
Abstract Weightless Neural Networks (WNNs) are Artificial Neural Networks based on RAM
memory broadly explored as solution for pattern recognition applications. Memory-oriented …
memory broadly explored as solution for pattern recognition applications. Memory-oriented …
KA: Keyword-based auditing with frequency hiding and retrieval reliability for smart government
J Xue, S Luo, Q Deng, L Shi, X Zhang… - Journal of Systems …, 2023 - Elsevier
In a keyword-based auditing paradigm, users typically focus on specific parts of a dataset
rather than the integrity of the dataset as a whole. However, this approach is subjective and …
rather than the integrity of the dataset as a whole. However, this approach is subjective and …
Sketches for blockchains
O Rottenstreich - 2021 International Conference on …, 2021 - ieeexplore.ieee.org
Blockchains suffer from a critical scalability problem where traditionally each network node
maintains all network state, including records since the establishment of the blockchain …
maintains all network state, including records since the establishment of the blockchain …