299 Hits in 5.0 sec

Enhanced Methods of Mobile Cache Sharing and Pre-fetching for Required Web Contents

2019 International journal of recent technology and engineering  
Efficiency of mobile caching and pre-fetching is improved using Enhanced Bloom Filter technique and data is shared among cooperative users by establishing a voluntary hub.  ...  The unwanted contents in the web page can be considered as noise which is removed when storing the web pages in cache or pre-fetch area.  ...  The flow chart for enhanced bloom filter technique used for web caching is given in Fig. 1 . Fig. 1.  ... 
doi:10.35940/ijrte.c6310.098319 fatcat:3pcjf5cx2faddgxadajgl4xb6q

Theory and Practice of Bloom Filters for Distributed Systems

Sasu Tarkoma, Christian Esteve Rothenberg, Eemil Lagerspetz
2012 IEEE Communications Surveys and Tutorials  
Bloom filters and their variants are of prime importance, and they are heavily used in various distributed systems.  ...  This has been reflected in recent research and many new algorithms have been proposed for distributed systems that are either directly or indirectly based on Bloom filters.  ...  The summary cache-based technique is used in the popular Squid Web Proxy Cache 1 . Squid uses Bloom filters for socalled cache digests.  ... 
doi:10.1109/surv.2011.031611.00024 fatcat:ziz4fwmd5jhizjvjpltaejhnmy

SPACE: A lightweight collaborative caching for clusters

Mursalin Akon, Towhidul Islam, Xuemin Shen, Ajit Singh
2009 Peer-to-Peer Networking and Applications  
In this paper, we introduce Systematic P2P Aided Cache Enhancement or SPACE, a new collaboration scheme among clients in a computer cluster of a high performance computing facility to share their caches  ...  In addition, the results show that SPACE evenly distributes work loads among participators, and entirely eliminates any requirement of a central cache manager.  ...  Bloom filter used in this paper can be replaced with Optimal Bloom filter [29] , which reduces memory and communication overhead due to digest by 30.6%.  ... 
doi:10.1007/s12083-009-0047-5 fatcat:qxlc72b6ajdhnjwfgal56ejvoa

Privacy in content-oriented networking

Abdelberi Chaabane, Emiliano De Cristofaro, Mohamed Ali Kaafar, Ersin Uzun
2013 Computer communication review  
However, it remains an interesting open question whether or not, and to what extent, this emerging networking paradigm bears new privacy challenges.  ...  CON comes with a potential for a wide range of benefits, including reduced congestion and improved delivery speed by means of content caching, simpler configuration of network devices, and security at  ...  A counting bloom filter for each interface used as a PIT table [75]. 3. A hierarchical bloom filter used as the router storage.  ... 
doi:10.1145/2500098.2500102 fatcat:gyxqqzmxqzffnkenz5ldih7dku

Privacy in Content-Oriented Networking: Threats and Countermeasures [article]

Abdelberi Chaabane and Emiliano De Cristofaro and Mohammed-Ali Kaafar and Ersin Uzun
2013 arXiv   pre-print
However, it remains an interesting open question whether or not, and to what extent, this emerging networking paradigm bears new privacy challenges.  ...  CON comes with a potential for a wide range of benefits, including reduced congestion and improved delivery speed by means of content caching, simpler configuration of network devices, and security at  ...  using hierarchical bloom filter 2.  ... 
arXiv:1211.5183v4 fatcat:7kb7jcjhzzaxfdawekgx33mz6m

Hinky: Defending against Text-Based Message Spam on Smartphones

Abdelkader Lahmadi, Laurent Delosieres, Olivier Festor
2011 2011 IEEE International Conference on Communications (ICC)  
Our solution relies on a social network based collaborative approach to filter this type of spam using Bloom filters and content hashing.  ...  We show that a content hashing based approach provides better lookup than a bloom filter with the same storage space and false positive probability close to 10 −9 .  ...  We used a Cold Cache strategy for the filter where we remove all elements when the filter is full. A hashing based method provides the maximum filtering capacity of 5 × 10 7 .  ... 
doi:10.1109/icc.2011.5962722 dblp:conf/icc/LahmadiDF11 fatcat:cgeugrxt7fahlnq4rgmxl7x7w4

Flask coherence: A morphable hybrid coherence protocol to balance energy, performance and scalability

Lucia G. Menezo, Valentin Puente, Jose-Angel Gregorio
2015 2015 IEEE 21st International Symposium on High Performance Computer Architecture (HPCA)  
This filter also enables the coherence controller storage used to track shared blocks and filter private block misses to change dynamically according to the data-sharing properties of the application.  ...  To achieve these results, the proposal uses an improved counting bloom filter, which provides twice the space efficiency of a conventional one with similar implementation cost.  ...  of the presence of a tag in any private cache in the filter.  ... 
doi:10.1109/hpca.2015.7056033 dblp:conf/hpca/MenezoPG15 fatcat:4lssxzd2ozdf7eonk44s3dmsge


Evaggelia Pitoura, Serge Abiteboul, Dieter Pfoser, George Samaras, Michalis Vazirgiannis
2003 SIGMOD record  
for efficiently routing path queries on hierarchical data, and (d) querying using the AXML language that incorporates service calls inside XML documents.  ...  following topics: (a) infrastructure support, including mobile peers and the creation of context-dependent communities, (b) metadata management for services and peers, including locationdependent data, (c) filters  ...  Bloom Filters are used for routing queries at the appropriate sites.  ... 
doi:10.1145/945721.945737 fatcat:p7l225mdyzatzovfedz3zgl6ae

Security, Privacy, and Access Control in Information-Centric Networking: A Survey [article]

Reza Tourani, Travis Mick, Satyajayant Misra, Gaurav Panwar
2017 arXiv   pre-print
In the broad area of security, we review attack scenarios, such as denial of service, cache pollution, and content poisoning.  ...  Information-Centric Networking (ICN) is a new networking paradigm, which replaces the widely used host-centric networking paradigm in communication networks (e.g., Internet, mobile ad hoc networks) with  ...  [46] , [47] proposed a DoSresistant self-routing mechanism using Bloom filters.  ... 
arXiv:1603.03409v3 fatcat:ynhnoqve3nbzrdvlxy4jigzlkq

Rethinking Context for Pervasive Computing: Adaptive Shared Perspectives

Christine Julien, Agoston Petz, Evan Grim
2012 2012 12th International Symposium on Pervasive Systems, Algorithms and Networks  
Efficiently tracking this interest offers yet another challenge, leading to the development of a new probabilistic data structure variant, a spatiotemporal bloom filter (SpTBF, or "spitty bif") tailored  ...  The dual delivery vectors allow us to provide uninterrupted connectivity to any given web service, even as the user moves between content caches and WiFi access areas promoting a frustration-free user  ... 
doi:10.1109/i-span.2012.7 fatcat:ae65g4snbbekjjshcnbsjzoizq

TRIBLER: a social-based peer-to-peer system

J. A. Pouwelse, P. Garbacki, J. Wang, A. Bakker, J. Yang, A. Iosup, D. H. J. Epema, M. Reinders, M. R. van Steen, H. J. Sips
2007 Concurrency and Computation  
However, social phenomena such as friendship and the existence of communities of users with similar tastes or interests may well be exploited in such systems in order to increase their usability and performance  ...  In this paper we present a novel social-based P2P file-sharing paradigm that exploits social phenomena by maintaining social networks and using these in content discovery, content recommendation, and downloading  ...  Based on these numbers, we can compute that 260 bytes are needed to discover the common friends-of-friends of two peers using a Bloom filter.  ... 
doi:10.1002/cpe.1189 fatcat:2ob5nujcarbqhpoou3ayymjd3e

Information centric network: Research challenges and opportunities

Athanasios V. Vasilakos, Zhe Li, Gwendal Simon, Wei You
2015 Journal of Network and Computer Applications  
It investigates various key aspects such as naming and routing schemes, in-network caching policies, etc., and highlights the benefit of implementing ICN, open research issues and new interests in this  ...  The end-to-end model, which was designed for special data transmission in the early age of Internet, is causing troubles everywhere in nowadays content based web services.  ...  Finally the role of the FNs is to use a Bloom filter based forwarding implementation to realize the content forwarding from the content container to the subscribers.  ... 
doi:10.1016/j.jnca.2015.02.001 fatcat:nol5ntcthzdgboh3zaxticygfa

A survey on content-centric technologies for the current Internet: CDN and P2P solutions

Andrea Passarella
2012 Computer Communications  
As the Bloom filter is an imprecise representation, the Bloom filter precision is used as a measure of the probability that the content actually contains all keywords in K, i.e. that the content actually  ...  Therefore, the Bloom filter of the content BF c is compared with the Bloom filter of the query BF Q . If there is a match, the content may be in the result set.  ... 
doi:10.1016/j.comcom.2011.10.005 fatcat:mqpp6bmqxncfxlucseqkd3xjhe

BEAD: Best Effort Autonomous Deletion in Content-Centric Networking [article]

Cesar Ghali, Gene Tsudik, Christopher A. Wood
2015 arXiv   pre-print
A core feature of Content-Centric Networking (CCN) is opportunistic content caching in routers.  ...  We discuss several methods of routing BEAD messages from producers to caching routers with varying levels of network overhead and efficacy.  ...  However, so-called Counting Bloom Filters (CBFs) [27] support set membership queries with removal. Instead of using bits to indicate set membership, CBFs use counters.  ... 
arXiv:1512.07311v1 fatcat:hvvsdolfcre7rolpgooqxvspdu

Collaborative Ranking and Profiling: Exploiting the Wisdom of Crowds in Tailored Web Search [chapter]

Pascal Felber, Peter Kropf, Lorenzo Leonini, Toan Luu, Martin Rajman, Etienne Rivière
2010 Lecture Notes in Computer Science  
Elements pertaining to an implicitly targeted interest domain with low popularity are usually ranked lower than expected by the user.  ...  Leveraging semantic information can help avoid such situations by proposing complementary results that are carefully tailored to match user interests.  ...  called time-decaying bloom filters [8] .  ... 
doi:10.1007/978-3-642-13645-0_17 fatcat:eyrlpjh6qjehrdl4r5efwnyfjy
« Previous Showing results 1 — 15 out of 299 results