《A Declarative Query Language for Data Provenance》.pdf
《A Hierarchical Bloom Filter Index with Applications to Distributed Data Provenance》.pdf
《A Model for Learned Bloom Filters,and Optimizing by Sandwiching》.pdf
《A Multi-attribute Data Structure with Parallel Bloom Filters for Network Services》.pdf
《Accelerating Braided B+ Tree Searches on a GPU with CUDA》.pdf
《Acoustics to the Rescue Physical Key Inference Attack Revisited》.pdf
《Adaptive Learned Bloom Filter (Ada-BF) Efficient Utilization of the Classifier with Application to Real-Time Information Filtering on the Web》.pdf
《An Improved Construction for Counting Bloom Filters》.pdf
《An Introduction to Bε-trees and Write-Optimization》.pdf
《Analysis of Encryption Algorithms to Basic Operations on Outsourced B+ Data Privacy》.pdf
《Analysis_of_B-tree_data_structure_and_its_usage_in_computer_forensics》.pdf
《Benchmarking a B-tree compression method》.pdf
《Blitz Secure Multi-Hop Payments Without Two-Phase Commits》.pdf
《Bloom Filters Design Innovations and Novel Applications》.pdf
《Bloom Filters in Adversarial Environments》.pdf
《Bloom Filters – Short Tutorial》.pdf
《Bp-Tree A Predictive B+-Tree for Reducing Writes on Phase Change Memory》.pdf
《Cache Efficient Bloom Filters for Shared Memory Machines》.pdf
《Cache-, Hash- and Space-Efficient Bloom Filters》.pdf
《Caches and Hash Trees for Efficient Memory Integrity Verification》.pdf
《Compressed Bloom Filters》.pdf
《Constructing Red-Black Trees》.pdf
《Cuckoo Filter Practically Better Than Bloom》.pdf
《Data Step Hash Objects as Programming Tools》.pdf
《Deletion The curse of the red-black tree》.pdf
《Detailed Provenance Metadata from Statistical Analysis Software》.pdf
《Efficient Sparse Merkle Trees Caching Strategies and Secure (Non-)Membership Proofs》.pdf
《Efficient Update Control of Bloom Filter Replicas in Distributed Systems》.pdf
《Enhancing the B tree by Dynamic Node Popularity Caching》.pdf
《Experimental B+-tree for GPU》.pdf
《Feature Hashing for Large Scale Multitask Learning》.pdf
《Hash, displace, and compress》.pdf
《Hash-routing Schemes for Information Centric Networking Hash Join Algorithms for Multi-core CPUs》.pdf
《Hash-routing Schemes for Information Centric Networking》.pdf
《How to Break MD5 and Other Hash Functions》.pdf
《HyperChromatic trees a fine-grained approach to distributed algorithms on RedBlack trees》.pdf
《Implementing Deletion in B+-Trees》.pdf
《Incrementally Distributed B+ Challenges》.pdf
《Inexpensive Brainwave Authentication New Techniques and Insights on User Acceptance》.pdf
《Introduction to Red Black Trees》.pdf
《Jungle Towards Dynamically Adjustable Key-Value Store by Combining LSM-Tree and Copy-On-Write B+-Tree》.pdf
《Learned Hash-Index A Collision Competition》.pdf
《Left-Leaning Red-Black Trees》.pdf
《Lock-Free Red-Black Trees Using CAS》.pdf
《Making B+-Trees Cache Conscious in Main Memory》.pdf
《MilliSort and MilliQuery Large-Scale Data-Intensive Computing in Milliseconds》.pdf
《Modern B-Tree Techniques》.pdf
《Network Applications of Bloom Filters A Survey》.pdf
《Optimal Parameter Selection for Efficient Memory Integrity Verification Using Merkle Hash Trees》.pdf
《Persistent B+-Trees in Non-Volatile Main Memory》.pdf
《Persistent Bloom Filter Membership Testing for the Entire History》.pdf
《Prefix Hash Tree An Indexing Data Structure over Distributed Hash Tables》.pdf
《Provenance expressiveness benchmarking on non-deterministic executions》.pdf
《Red-Black Trees with Types》.pdf
《Red-black and AA trees》.pdf
《Red-black trees CSS230》.pdf
《Red-black trees with relative node keys》.pdf
《Red_Black_Trees_Final》.pdf
《Relaxed Red-Black Trees with Group Updates》.pdf
《Role of Bloom Filter in Big Data Research A Survey》.pdf
《Scalable Bloom Filters》.pdf
《Selecting a Hashing Algorithm》.pdf
《Social Hash Partitioner A Scalable Distributed Hypergraph Partitioner》.pdf
《Specification of Red-Black Trees:Specification of Red-Black Trees》.pdf
《Swiped Analyzing Ground-truth Data of a Marketplace for Stolen Debit and Credit Cards》.pdf
《The Adaptive Radix Tree:ARTful Indexing for Main-Memory Databases》.pdf
《The Bw-Tree A B-tree for New Hardware Platforms》.pdf
《The Ubiquitous B-Tree》.pdf
《Trie An Alternative Data Structure for Data Mining Algorithms》.pdf
《Type-Safe Modular Hash-Consing》.pdf
《Understanding Bloom Filter Intersection Caching Strategies and Secure (Non-)Membership Proofs》.pdf
《Verification of B+ Trees An Experiment Combining Shape Analysis and Interactive Theorem Proving》.pdf
《Weaponizing Middleboxes for TCP Reflected Amplification》.pdf
《Weighted Bloom Filter》.pdf
《Workload Aware B+ Trees》.pdf
《YARIX Scalable YARA-based Malware Intelligence》.pdf
Latest commit 王文超
Jul 13, 2021
You can’t perform that action at this time.