Designing a Bloom filter for differential file access
Communications of the ACM
Communications of the ACM
Space/time trade-offs in hash coding with allowable errors
Communications of the ACM
Practical performance of Bloom filters and parallel free-text searching
Communications of the ACM
Optimal Semijoins for Distributed Database Systems
IEEE Transactions on Software Engineering
On the signature weight in “multiple” m signature files
ACM SIGIR Forum
PERF join: an alternative to two-way semijoin and bloomjoin
CIKM '95 Proceedings of the fourth international conference on Information and knowledge management
Introduction to systems analysis, modeling and simulation
WSC '85 Proceedings of the 17th conference on Winter simulation
Performance analysis in a differential file environment
WSC '85 Proceedings of the 17th conference on Winter simulation
Introduction to systems analysis, modeling and simulation
WSC '86 Proceedings of the 18th conference on Winter simulation
A Decentralized, Adaptive Replica Location Mechanism
HPDC '02 Proceedings of the 11th IEEE International Symposium on High Performance Distributed Computing
Sharing Presence Information and Message Notification in an Ad Hoc Network
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
Discussion paper: privacy-preserving distributed queries for a clinical case research network
CRPIT '14 Proceedings of the IEEE international conference on Privacy, security and data mining - Volume 14
ACM SIGMOD Record
Dynamic adaptive data structures for monitoring data streams
Data & Knowledge Engineering
On the false-positive rate of Bloom filters
Information Processing Letters
An Optimal Bloom Filter Replacement Based on Matrix Solving
CSR '09 Proceedings of the Fourth International Computer Science Symposium in Russia on Computer Science - Theory and Applications
A new analysis of the false positive rate of a Bloom filter
Information Processing Letters
Improving retouched Bloom filter for trading off selected false positives against false negatives
Computer Networks: The International Journal of Computer and Telecommunications Networking
The optimal size of a signature
Mathematical and Computer Modelling: An International Journal
Enhanced authentication for commercial video services
Security and Communication Networks
Optimized hash for network path encoding with minimized false positives
Computer Networks: The International Journal of Computer and Telecommunications Networking
Hi-index | 48.23 |
This note deals with a paper by Gremillion demonstrating the simulation approach to the design of a Bloom filter. It is shown that an analytical approach can yield insights into competing filter design and give expected values for the goodness-of-hash transformations not available with simulation. On the other hand, simulation gives insight into what can be expected with available hash transformation not available from an analytic approach.