Author of the publication

One memory access bloom filters and their generalization.

, , and . INFOCOM, page 1745-1753. IEEE, (2011)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

An adaptive stochastic search algorithm., , , , and . ICAL, page 154-158. IEEE, (2011)Multi-Point Ethernet over Next-Generation SONET/SDH., , , , , , and . ICC, page 1-6. IEEE, (2009)A Virtual Wafer-based Scheduling Method for Dual-arm Cluster Tools with Chamber Cleaning Requirements., , , , , and . ICNSC, page 1-6. IEEE, (2021)Implementation of Novel Scheduling Methods for Dual-arm Cluster Tools with Multiple-time Reentrant flows based on Petri Nets., , , , and . ICNSC, page 1-6. IEEE, (2023)A Security Steganography Scheme Based On HDR Image., , and . VSIP, page 44-48. ACM, (2019)Estimating the Persistent Spreads in High-Speed Networks., , , and . ICNP, page 131-142. IEEE Computer Society, (2014)Searching for Widespread Events in Large Networked Systems by Cooperative Monitoring., , , and . ICNP, page 123-133. IEEE Computer Society, (2015)Quasi Group Role Assignment With Role Awareness in Self-Service Spatiotemporal Crowdsourcing., , , , and . IEEE Trans. Comput. Soc. Syst., 9 (5): 1456-1468 (2022)Non-intrusive Balance Tomography Using Reinforcement Learning in the Lightning Network., , and . ACM Trans. Priv. Secur., 27 (1): 12:1-12:32 (2024)CVaR Prediction Model of the Investment Portfolio Based on the Convolutional Neural Network Facilitates the Risk Management of the Financial Market., , , and . J. Glob. Inf. Manag., 30 (7): 1-19 (2022)