{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T15:58:58Z","timestamp":1725897538366},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642310195"},{"type":"electronic","value":"9783642310201"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31020-1_65","type":"book-chapter","created":{"date-parts":[[2012,6,12]],"date-time":"2012-06-12T12:59:14Z","timestamp":1339505954000},"page":"543-552","source":"Crossref","is-referenced-by-count":2,"title":["Optimizing Hash Function Number for BF-Based Object Locating Algorithm"],"prefix":"10.1007","author":[{"given":"Zhu","family":"Wang","sequence":"first","affiliation":[]},{"given":"Tiejian","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"7","key":"65_CR1","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"B. Bloom","year":"1970","unstructured":"Bloom, B.: Space\/time Trade-offs in Hash Coding with Allowable Errors. Communications of the ACM\u00a013(7), 422\u2013426 (1970)","journal-title":"Communications of the ACM"},{"key":"65_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"98","DOI":"10.1007\/978-3-540-45172-3_9","volume-title":"Peer-to-Peer Systems II","author":"M. Kaashoek","year":"2003","unstructured":"Kaashoek, M., Karger, D.: A Simple Degree-Optimal Distributed Hash Table. In: Kaashoek, M.F., Stoica, I. (eds.) IPTPS 2003. LNCS, vol.\u00a02735, pp. 98\u2013107. Springer, Heidelberg (2003)"},{"issue":"1","key":"65_CR3","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/356643.356645","volume":"7","author":"W.D. Maurer","year":"1975","unstructured":"Maurer, W.D.: Hash Table Methods. ACM Computing Surveys\u00a07(1), 5\u201319 (1975)","journal-title":"ACM Computing Surveys"},{"key":"65_CR4","volume-title":"Principles of Distributed Database Systems","author":"M.T. Ozsu","year":"1999","unstructured":"Ozsu, M.T., Valduriez, P.: Principles of Distributed Database Systems. Prentice Hall, Upper Saddle River (1999)"},{"key":"65_CR5","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1080\/15427951.2004.10129096","volume":"1","author":"A. Broder","year":"2003","unstructured":"Broder, A., Mitzenmacher, M.: Network Applications of Bloom Filters: A Survey. Internet Mathematics\u00a01, 485\u2013509 (2003)","journal-title":"Internet Mathematics"},{"key":"65_CR6","first-page":"149","volume-title":"2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications","author":"I. Stoica","year":"2001","unstructured":"Stoica, I., Morris, R., Karger, D., Kaashoek, M., Balakrishnan, H.: Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications. In: 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 149\u2013160. ACM, New York (2001)"},{"key":"65_CR7","unstructured":"Pathan, A.M.K., Buyya, R.: A Taxonomy and Survey of Content Delivery Networks. Technical report, GRIDS-TR-2007-4 (2007)"},{"key":"65_CR8","first-page":"1248","volume-title":"21st Annual Joint Conference of the IEEE Computer and Communications Societies","author":"S.C. Rhea","year":"2002","unstructured":"Rhea, S.C., Kubiatowicz, J.: Probabilistic Location and Routing. In: 21st Annual Joint Conference of the IEEE Computer and Communications Societies, pp. 1248\u20131257. IEEE Press, New York (2002)"},{"key":"65_CR9","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1145\/1133373.1133397","volume-title":"10th Workshop on ACM SIGOPS European Workshop","author":"J. Ledlie","year":"2002","unstructured":"Ledlie, J., Taylor, M.J., Serban, L., Seltzer, M.: Self-Organization in Peer-to-peer Systems. In: 10th Workshop on ACM SIGOPS European Workshop, pp. 125\u2013132. ACM, New York (2002)"},{"key":"65_CR10","doi-asserted-by":"publisher","first-page":"236","DOI":"10.1109\/HPDC.2003.1210033","volume-title":"12th IEEE International Symposium on High Performance Distributed Computing","author":"F.M. Cuenca-Acuna","year":"2003","unstructured":"Cuenca-Acuna, F.M., Peery, C., Martin, R.P., Nguyen, T.D.: Using Gossiping to Build Content Addressable Peer-to-peer Information Sharing Communities. In: 12th IEEE International Symposium on High Performance Distributed Computing, pp. 236\u2013246. IEEE Press, New York (2003)"},{"key":"65_CR11","first-page":"413","volume-title":"2006 International Workshop on Applied Reconfigurable Computing","author":"D.C. Suresh","year":"2006","unstructured":"Suresh, D.C., Guo, Z., Buyukkurt, B., Najjar, W.A.: Automatic Compilation Framework for Bloom Filter Based Intrusion Detection. In: 2006 International Workshop on Applied Reconfigurable Computing, pp. 413\u2013418. Springer, Germany (2006)"},{"key":"65_CR12","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1109\/IAW.2005.1495971","volume-title":"5th IEEE Workshop on Information Assurance and Security","author":"M.E. Locasto","year":"2005","unstructured":"Locasto, M.E., Parekh, J.J., Keromytis, A.D., Stolfo, S.J.: Towards Collaborative Security and P2P Intrusion Detection. In: 5th IEEE Workshop on Information Assurance and Security, pp. 333\u2013339. IEEE Press, New York (2005)"},{"key":"65_CR13","first-page":"323","volume-title":"2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications","author":"C. Estan","year":"2002","unstructured":"Estan, C., Varghese, G.: New Directions in Traffic Measurement and Accounting. In: 2002 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 323\u2013336. ACM, New York (2002)"},{"key":"65_CR14","first-page":"3","volume-title":"2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications","author":"A.C. Snoeren","year":"2001","unstructured":"Snoeren, A.C., Partridge, C., Sanchez, L.A., Jones, C.E., Tchakountio, F., Kent, S.T., Strayer, W.T.: Hash-Based IP Traceback. In: 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pp. 3\u201314. ACM, New York (2001)"},{"issue":"3","key":"65_CR15","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/90.851975","volume":"8","author":"L. Fan","year":"2000","unstructured":"Fan, L., Cao, P., Almeida, J., Broder, A.Z.: Summary Cache: A Scalable Wide-Area Web Cache Sharing Protocol. IEEE\/ACM Transactions on Networking\u00a08(3), 281\u2013293 (2000)","journal-title":"IEEE\/ACM Transactions on Networking"},{"issue":"5","key":"65_CR16","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1109\/TNET.2002.803864","volume":"10","author":"M. Mitzenmacher","year":"2002","unstructured":"Mitzenmacher, M.: Compressed Bloom Filters. IEEE\/ACM Transactions on Networking\u00a010(5), 604\u2013612 (2002)","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"65_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1007\/11841036_61","volume-title":"Algorithms \u2013 ESA 2006","author":"F. Bonomi","year":"2006","unstructured":"Bonomi, F., Mitzenmacher, M., Panigrahy, R., Singh, S., Varghese, G.: An Improved Construction for Counting Bloom Filters. In: Azar, Y., Erlebach, T. (eds.) ESA 2006. LNCS, vol.\u00a04168, pp. 684\u2013695. Springer, Heidelberg (2006)"},{"key":"65_CR18","doi-asserted-by":"publisher","first-page":"241","DOI":"10.1145\/872757.872787","volume-title":"2003 ACM SIGMOD International Conference on Management of Data","author":"S. Cohen","year":"2003","unstructured":"Cohen, S., Matias, Y.: Spectral Bloom Filters. In: 2003 ACM SIGMOD International Conference on Management of Data, pp. 241\u2013252. ACM, New York (2003)"}],"container-title":["Lecture Notes in Computer Science","Advances in Swarm Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31020-1_65.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T07:40:58Z","timestamp":1620114058000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31020-1_65"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642310195","9783642310201"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31020-1_65","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}