Hash-Based Techniques for High-Speed Packet Processing

by Adam Kirsch , Michael Mitzenmacher , George Varghese
Citations:9 - 1 self

Active Bibliography

Hash-Based Data Structures for Extreme Conditions – Adam Lavitt Kirsch - 2008
57 Fast hash table lookup using extended Bloom filter: an aid to network processing – Haoyu Song, Sarang Dharmapurikar, Jonathan Turner, John Lockwood - 2005
31 An Improved Construction for Counting Bloom Filters – Flavio Bonomi, Michael Mitzenmacher, Rina Panigrahy, Sushil Singh, George Varghese - 2006
33 Why simple hash functions work: Exploiting the entropy in a data stream – Michael Mitzenmacher, Salil Vadhan - 2008
1 Towards “Intelligent Compression ” in Streams: A Biased Reservoir Sampling based Bloom Filter Approach – Sourav Dutta, Souvik Bhattacherjee, Ankur Narang
28 Less hashing, same performance: Building a better bloom filter – Adam Kirsch, Michael Mitzenmacher - 2006
Design and . . . for Transactional Memory Systems – Daniel Sanchez - 2007
33 Implementing signatures for transactional memory – Daniel Sanchez, Luke Yen, Mark D. Hill, Karthikeyan Sankaralingam - 2007
8 Robust Aggregation in Sensor Networks – George Kollios, John Byers, Jeffrey Considine, Marios Hadjieleftheriou, Feifei Li - 2005
31 Beyond Bloom Filters: From Approximate Membership Checks to Approximate State Machines – Flavio Bonomi, Michael Mitzenmacher, Rina Panigrahy, Sushil Singh, George Varghese - 2006
6 Simple Summaries for Hashing with Choices – Adam Kirsch, Michael Mitzenmacher - 2008
11 Simple Summaries for Hashing with Multiple Choices – Adam Kirsch , Michael Mitzenmacher
Streaming Algorithms for . . . – Ashwin Lall - 2008
8 Building a better Bloom filter – Adam Kirsch, Michael Mitzenmacher - 2005
Fast Filtered Sampling – Jianning Mai A, Ashwin Sridharan B, Hui Zang B, Chen-nee Chuah A
1 High-Speed Per-Flow Traffic Measurement with Probabilistic Multiplicity Counting – Peter Lieven, Björn Scheuermann
32 A robust system for accurate real-time summaries of internet traffic – Ken Keys, Cristian Estan - 2005
9 Retouched bloom filters: allowing networked applications to trade off selected false positives against false negatives – Benoit Donnet, Bruno Baynat, Timur Friedman - 2006
Traffic Analysis for Network Security using Learning Theory and Streaming Algorithms – Shobha Venkataraman - 2008