{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,26]],"date-time":"2025-09-26T13:05:34Z","timestamp":1758891934099},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,6]]},"DOI":"10.1109\/iwqos.2017.7969125","type":"proceedings-article","created":{"date-parts":[[2017,7,7]],"date-time":"2017-07-07T18:35:28Z","timestamp":1499452528000},"page":"1-6","source":"Crossref","is-referenced-by-count":7,"title":["Ultra-Fast Bloom Filters using SIMD techniques"],"prefix":"10.1109","author":[{"given":"Jianyuan","family":"Lu","sequence":"first","affiliation":[]},{"family":"Ying Wan","sequence":"additional","affiliation":[]},{"family":"Yang Li","sequence":"additional","affiliation":[]},{"family":"Chuwen Zhang","sequence":"additional","affiliation":[]},{"given":"Huichen","family":"Dai","sequence":"additional","affiliation":[]},{"given":"Yi","family":"Wang","sequence":"additional","affiliation":[]},{"family":"Gong Zhang","sequence":"additional","affiliation":[]},{"given":"Bin","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2004.1268997"},{"journal-title":"Intel IA-64 Architecture Software Developer s Manual","year":"2017","key":"ref11"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2619228.2619234"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934972"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-72845-0_9"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2015.7404748"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.20208"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5062180"},{"journal-title":"Intel intrinsics guide","year":"2017","key":"ref18"},{"journal-title":"CAIDA Anonymized Internet Trace","year":"2016","author":"walsworth","key":"ref19"},{"journal-title":"Huawei launches world's first end-to-end 100g solutions","year":"2017","key":"ref4"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/SURV.2011.031611.00024"},{"journal-title":"Huawei ne9000","year":"2017","key":"ref6"},{"journal-title":"Cisco crs-x","year":"2017","key":"ref5"},{"key":"ref8","article-title":"Why simple hash functions work: Exploiting the entropy in a data stream","author":"mitzenmacher","year":"2008","journal-title":"SODA"},{"journal-title":"Crypto++ 5 6 0 Benchmarks","year":"2017","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129096"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/863977.863979"},{"journal-title":"Murmurhash","year":"2017","author":"appleby","key":"ref20"},{"journal-title":"lookup3 hash function","year":"2017","author":"jenkins","key":"ref21"}],"event":{"name":"2017 IEEE\/ACM 25th International Symposium on Quality of Service (IWQoS)","start":{"date-parts":[[2017,6,14]]},"location":"Vilanova i la Geltr\u00fa, Spain","end":{"date-parts":[[2017,6,16]]}},"container-title":["2017 IEEE\/ACM 25th International Symposium on Quality of Service (IWQoS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7959754\/7969104\/07969125.pdf?arnumber=7969125","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,21]],"date-time":"2017-07-21T05:17:45Z","timestamp":1500614265000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7969125\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/iwqos.2017.7969125","relation":{},"subject":[],"published":{"date-parts":[[2017,6]]}}}