Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 225,425,494 papers from all fields of science
Search
Sign In
Create Free Account
Bloom filter
Known as:
Bloom
, Bloomier filter
, Layered Bloom filters
Expand
A Bloom filter is a space-efficient probabilistic data structure, conceived by Burton Howard Bloom in 1970, that is used to test whether an element…
Expand
Wikipedia
(opens in a new tab)
Create Alert
Alert
Related topics
Related topics
46 relations
Aggregate function
Algorithm
Apache Cassandra
Apache HBase
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
2016
2016
An efficient and privacy-preserving location sharing mechanism
Nan Shen
,
Jun Yang
,
Ke Yuan
,
Chuan Fu
,
Chunfu Jia
Comput. Stand. Interfaces
2016
Corpus ID: 43618713
Highly Cited
2012
Highly Cited
2012
Advertising cached contents in the control plane: Necessity and feasibility
Yaogong Wang
,
Kyunghan Lee
,
Balakrishna Venkataraman
,
R. Shamanna
,
I. Rhee
,
Sunhee Yang
Proceedings IEEE INFOCOM Workshops
2012
Corpus ID: 12088849
A key feature of Information-Centric Networking architectures is universal caching where anyone can cache any content and users…
Expand
2011
2011
An experimental analysis of harmful algae–zooplankton interactions and the ultimate defense
Emily J. Remmel
,
Nicole Kohmescher
,
James H. Larson
,
K. Hambright
2011
Corpus ID: 85588374
We examined effects of the invasive, toxigenic haptophyte Prymnesium parvum on grazing rates, feeding behaviors, and life‐history…
Expand
Highly Cited
2008
Highly Cited
2008
Towards a new generation of information-oriented internetworking architectures
Christian Esteve Rothenberg
,
F. Verdi
,
M. Magalhães
Conference on Emerging Network Experiment and…
2008
Corpus ID: 5874058
In response to the limitations of the Internet architecture when used for applications for which it was not originally designed…
Expand
Highly Cited
2006
Highly Cited
2006
Chisel: A Storage-efficient, Collision-free Hash-based Network Processing Architecture
Jahangir Hasan
,
S. Cadambi
,
Venkata Jakkula
,
S. Chakradhar
International Symposium on Computer Architecture
2006
Corpus ID: 14454067
Longest prefix matching (LPM) is a fundamental part of various network processing tasks. Previously proposed approaches for LPM…
Expand
Highly Cited
2005
Highly Cited
2005
GPS: a general peer-to-peer simulator and its use for modeling BitTorrent
Weishuai Yang
,
N. Abu-Ghazaleh
13th IEEE International Symposium on Modeling…
2005
Corpus ID: 790401
Peer-to-Peer (P2P) systems have become popular over the past few years. However, their large scale and the open nature of the…
Expand
2004
2004
IDR: an intrusion detection router for defending against distributed denial-of-service (DDoS) attacks
Eric Y. K. Chan
,
H. Chan
,
+15 authors
KY Yu
7th International Symposium on Parallel…
2004
Corpus ID: 613643
Distributed denial-of-service (DDoS) attack has turned into one of the major security threats in recent years. Usually the only…
Expand
2004
2004
A scoping and consensus building model of a toxic blue-green algae bloom
S. Arquitt
,
R. Johnstone
2004
Corpus ID: 62764399
Nuisance blooms of Lyngbya muiuscula have been occurring with increasing frequency in tropical coastal waters around the world…
Expand
1997
1997
Bloom dynamics : Physiology , behavior , trophic e : ffects
T. Smayda
1997
Corpus ID: 18641429
There are at least eight different modes and mechanisms by which harmful phytoplankton species can cause mortality, physiological…
Expand
Highly Cited
1996
Highly Cited
1996
The End of Literature?: Harold Bloom, The Western Canon: The Books and School of the Ages, Harcourt Brace, New York, 1994
D. Parker
1996
Corpus ID: 164573655
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
(opens in a new tab)
,
Terms of Service
(opens in a new tab)
, and
Dataset License
(opens in a new tab)
ACCEPT & CONTINUE