نتایج جستجو برای: bloom filter

تعداد نتایج: 130787  

Journal: :IJHPCN 2010
Xiuqi Li Jun Xu Jie Wu

In existing query-based routing protocols in wireless sensor networks (WSNs), a node either keeps precise route information to desired events, such as in event flooding, or does not keep any route to desired events, such as in query flooding. In this paper, we propose a routing protocol, called hint-based routing by scope decay bloom filter (HR-SDBF), that employs probabilistic hints. In the HR...

Journal: :J. Network and Computer Applications 2014
Endong Tong Wenjia Niu Gang Li Ding Tang Liang Chang Zhongzhi Shi Song Ci

As a popular service composition technology, workflow has been successfully used in wireless sensor networks (WSNs) to compose a set of atomic services for service-oriented WSN applications. However, in a resource-constrained WSN, the sensed data is usually inaccurate or even missing, and this affects the normal execution of atomic services and may result in the non-guaranteed workflow QoS. Bec...

2017
Peng Liu Hao Wang Siang Gao Tong Yang Lei Zou Lorna Uden Xiaoming Li

The problem of multi-set membership query plays a significant role in many network applications, including routers and firewalls. Answering multi-set membership query means telling whether an element belongs to the multi-set, and if yes, which particular set it belongs to. Most traditional solutions for multi-set membership query are based on Bloom filters. However, these solutions cannot achie...

Journal: :Digital Investigation 2006
Vassil Roussev Yixin Chen Timothy Bourg Golden G. Richard

Hashing is a fundamental tool in digital forensic analysis used both to ensure data integrity and to efficiently identify known data objects. However, despite many years of practice, its basic use has advanced little. Our objective is to leverage advanced hashing techniques in order to improve the efficiency and scalability of digital forensic analysis. Specifically, we explore the use of Bloom...

2015
Babak Nouri-Moghaddam Hamid Reza Naji

Wireless Sensor Networking continues to evolve as one of the most challenging research areas. Considering the insecure nature of these networks and the fact that sensor nodes are distributed in a hostile environment, having a wellimplemented security scheme is absolutely essential. Bearing in mind the important security services like authentication and access control, we have proposed a novel s...

2007
Mahmood Ahmadi Stephan Wong

Packet classification continues to be an important challenge in network processing. It requires matching each packet against a database of rules and forwarding the packet according to the highest priority matching rule. Within the packet classification hash-based algorithms, an algorithm that is gaining interest is the tuple space search algorithm that groups the rules into a set of tuple space...

2007
Susmit Biswas Tzvetan S. Metodi Frederic T. Chong Ryan Kastner Tim Sherwood

Nanoscale technology promises dramatic increases in device density, but reliability is decreased as a sideeffect. With bit-error rates projected to be as high as 10%, designing a usable nanoscale memory system poses a significant challenge. Storing defect information corresponding to every bit in the nanoscale device using a reliable storage bit is prohibitively costly. Using a Bloom filter to ...

2006
Fei Liu Geert J. Heijenk

A novel approach to performing context discovery in ad-hoc networks based on the use of attenuated Bloom filters is proposed in this paper. A Bloom filter is an efficient spacesaving data structure to represent context information. Attenuated Bloom filters are used to advertise the availability of context information multiple hops away, and to guide queries to discover it. In order to investiga...

2009
Arun M A. Krishnan

Modern Network Intrusion Detection Systems (NIDS) inspect the network packet payload to check if it conforms to the security policies of the given network. This process, often referred to as deep packet inspection, involves detection of predefined signature strings or keywords starting at an arbitrary location in the payload. String matching is a computationally intensive task and can become a ...

نمودار تعداد نتایج جستجو در هر سال

با کلیک روی نمودار نتایج را به سال انتشار فیلتر کنید