{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,12]],"date-time":"2025-07-12T22:47:12Z","timestamp":1752360432541,"version":"3.40.3"},"publisher-location":"Singapore","reference-count":19,"publisher":"Springer Singapore","isbn-type":[{"type":"print","value":"9789811359064"},{"type":"electronic","value":"9789811359071"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-981-13-5907-1_6","type":"book-chapter","created":{"date-parts":[[2019,2,7]],"date-time":"2019-02-07T07:01:52Z","timestamp":1549522912000},"page":"56-62","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Evaluation for Two Bloom Filters\u2019 Configuration"],"prefix":"10.1007","author":[{"given":"Chenxi","family":"Luo","sequence":"first","affiliation":[]},{"given":"Zhu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Tiejian","family":"Luo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,2,8]]},"reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1007\/11841036_61","volume-title":"Algorithms \u2013 ESA 2006","author":"F Bonomi","year":"2006","unstructured":"Bonomi, F., Mitzenmacher, M., Panigrahy, R., Singh, S., Varghese, G.: An improved construction for counting bloom filters. In: Azar, Y., Erlebach, T. (eds.) ESA 2006. LNCS, vol. 4168, pp. 684\u2013695. Springer, Heidelberg (2006). \n                    https:\/\/doi.org\/10.1007\/11841036_61"},{"issue":"3","key":"6_CR2","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/90.851975","volume":"8","author":"L Fan","year":"2000","unstructured":"Fan, L., Cao, P., Almeida, J., Broder, A.Z.: Summary cache: a scalable wide-area web cache sharing protocol. IEEE\/ACM Trans. Netw. 8(3), 281\u2013293 (2000)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Ficara, D., Giordano, S., Procissi, G., Vitucci, F.: Multilayer compressed counting bloom filters. In: Proceedings of the 27th Conference on Computer Communications (INFOCOM), pp. 311\u2013315. IEEE (2008)","DOI":"10.1109\/INFOCOM.2007.71"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Song, H., Dharmapurikar, S., Turner, J., Lockwood, J.: Fast hash table lookup using extended bloom filter: an aid to network processing. In: Proceedings of the 2005 Conference on Applications, Technologies, Architectures and Protocols for Computer Communications (SIGCOMM), pp. 181\u2013192. ACM (2005)","DOI":"10.1145\/1080091.1080114"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Bonomi, F., Mitzenmacher, M., Panigrah, R., Singh, S., Varghese, G.: Beyond bloom filters: from approximate membership checks to approximate state machines. In: Proceedings of the 2006 Conference on Applications, Technologies, Architectures and Protocols for Computer Communications (SIGCOMM), pp. 315\u2013326. ACM (2006)","DOI":"10.1145\/1159913.1159950"},{"issue":"6","key":"6_CR6","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1109\/TNET.2007.911427","volume":"16","author":"M Sung","year":"2008","unstructured":"Sung, M., Xu, J., Li, J., Li, L.: Large-scale ip traceback in high-speed internet: Practical techniques and information-theoretic foundation. IEEE\/ACM Trans. Netw. 16(6), 1253\u20131266 (2008)","journal-title":"IEEE\/ACM Trans. Netw."},{"key":"6_CR7","unstructured":"Wang, Z., Luo, T.: Intelligent video content routing in a direct access network. In: Proceedings of the 3rd Symposium on Web Society, pp. 147\u2013152. IEEE Computer Society (2011)"},{"key":"6_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1007\/978-3-642-37015-1_52","volume-title":"Pervasive Computing and the Networked World","author":"Z Wang","year":"2013","unstructured":"Wang, Z., Luo, T., Xu, Y., Cheng, F., Zhang, X., Wang, X.: A fast indexing algorithm optimization with user behavior pattern. In: Zu, Q., Hu, B., El\u00e7i, A. (eds.) ICPCA\/SWS 2012. LNCS, vol. 7719, pp. 592\u2013605. Springer, Heidelberg (2013). \n                    https:\/\/doi.org\/10.1007\/978-3-642-37015-1_52"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Du, Y., Wang, S.: Two-stage adaptive bloom filters for per-flow monitoring in software defined networks. In: Proceedings of the 2018 IEEE International Conference on Communications (ICC), pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/ICC.2018.8422430"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Lei, K., Li, K., Huang, J., Li, W., Xing, J., Wang, Y.: Measuring the control-data plane consistency in software defined networking. In: Proceedings of the 2018 IEEE International Conference on Communications (ICC), pp. 1\u20137. IEEE (2018)","DOI":"10.1109\/ICC.2018.8422613"},{"issue":"4","key":"6_CR11","doi-asserted-by":"publisher","first-page":"195","DOI":"10.1145\/1594977.1592592","volume":"39","author":"Petri Jokela","year":"2009","unstructured":"Jokela, P., Zahemszky, A., Rothenberg, C.E., Arianfar, S., Nikander, P.: Lipsin: line speed publish\/subscribe inter-networking. In: Proceedings of the 2009 Conference on Applications, Technologies, Architectures and Protocols for Computer Communications (SIGCOMM), pp. 195\u2013206. ACM (2009)","journal-title":"ACM SIGCOMM Computer Communication Review"},{"issue":"4","key":"6_CR12","doi-asserted-by":"publisher","first-page":"1359","DOI":"10.1016\/j.adhoc.2010.10.004","volume":"11","author":"T Chen","year":"2013","unstructured":"Chen, T., Guo, D., He, Y., Chen, H., Liu, X., Luo, X.: A bloom filters based dissemination protocol in wireless sensor networks. Ad Hoc Netw. 11(4), 1359\u20131371 (2013)","journal-title":"Ad Hoc Netw."},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Takiguchi, T., Saruwatari, S., Morito, T., Ishida, S., Minami, M., Morikawa, H.: A novel wireless wake-up mechanism for energy-efficient ubiquitous networks. In: Proceedings of the 2009 IEEE International Conference on Communications Workshops, pp. 1\u20135. IEEE (2009)","DOI":"10.1109\/ICCW.2009.5208044"},{"key":"6_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/11682127_20","volume-title":"Architecture of Computing Systems - ARCS 2006","author":"M Ghosh","year":"2006","unstructured":"Ghosh, M., \u00d6zer, E., Biles, S., Lee, Hsien-Hsin S.: Efficient system-on-chip energy management with a segmented bloom filter. In: Grass, W., Sick, B., Waldschmidt, K. (eds.) ARCS 2006. LNCS, vol. 3894, pp. 283\u2013297. Springer, Heidelberg (2006). \n                    https:\/\/doi.org\/10.1007\/11682127_20"},{"key":"6_CR15","unstructured":"Jimeno, M.: Saving Energy in Network Hosts with an Application Layer Proxy: Design and Evaluation of New Methods that Utilize Improved Bloom Filters. PhD thesis, University of South Florida (2010)"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Qwasmi, N., Liscano, R.: Bloom filter supporting distributed policy-based management in wireless sensor networks. In: Proceedings of the 4th International Conference on Ambient Systems, Networks and Technologies, pp. 248\u2013255. Elsevier (2013)","DOI":"10.1016\/j.procs.2013.06.036"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"231","DOI":"10.1007\/978-3-319-94289-6_15","volume-title":"Web Services \u2013 ICWS 2018","author":"Z Wang","year":"2018","unstructured":"Wang, Z., Luo, C., Luo, T.: Selection optimization of bloom filter-based index services in ubiquitous embedded systems. In: Jin, H., Wang, Q., Zhang, L.-J. (eds.) ICWS 2018. LNCS, vol. 10966, pp. 231\u2013245. Springer, Cham (2018). \n                    https:\/\/doi.org\/10.1007\/978-3-319-94289-6_15"},{"issue":"7","key":"6_CR18","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422\u2013426 (1970)","journal-title":"Commun. ACM"},{"issue":"4","key":"6_CR19","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1080\/15427951.2004.10129096","volume":"1","author":"A Broder","year":"2004","unstructured":"Broder, A., Mitzenmacher, M.: Network applications of bloom filters: a survey. Internet Math. 1(4), 485\u2013509 (2004)","journal-title":"Internet Math."}],"container-title":["Communications in Computer and Information Science","Parallel and Distributed Computing, Applications and Technologies"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-13-5907-1_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,21]],"date-time":"2019-05-21T00:00:37Z","timestamp":1558396837000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-981-13-5907-1_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9789811359064","9789811359071"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-981-13-5907-1_6","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 February 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PDCAT","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Parallel and Distributed Computing: Applications and Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Jeju Island","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Korea (Republic of)","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"20 August 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 August 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pdcat2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.pdcat2018.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}