{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:31Z","timestamp":1750306171464,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":20,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1145\/2968456.2968461","type":"proceedings-article","created":{"date-parts":[[2016,10,13]],"date-time":"2016-10-13T19:25:51Z","timestamp":1476386751000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["A practical methodology to validate the statistical behavior of bloom filters"],"prefix":"10.1145","author":[{"given":"Venkateshwar","family":"Kottapalli","sequence":"first","affiliation":[{"name":"Texas A&amp;M University"}]},{"given":"Sunil","family":"Khatri","sequence":"additional","affiliation":[{"name":"Texas A&amp;M University"}]}],"member":"320","published-online":{"date-parts":[[2016,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2805789.2805800"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"A. Z. Broder and M. Mitzenmacher \"Network applications of Bloom filters: A survey \" Internet Mathematics vol. 1 no. 4 2003.  A. Z. Broder and M. Mitzenmacher \"Network applications of Bloom filters: A survey \" Internet Mathematics vol. 1 no. 4 2003.","DOI":"10.1080\/15427951.2004.10129096"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1365815.1365816"},{"key":"e_1_3_2_1_5_1","unstructured":"A. Yakunin \"Nice Bloom filter application \" http:\/\/blog.alexyakunin.com May 2014.  A. Yakunin \"Nice Bloom filter application \" http:\/\/blog.alexyakunin.com May 2014."},{"key":"e_1_3_2_1_6_1","unstructured":"\"Verifying multi-threaded software with spin \" http:\/\/spinroot.com\/spin\/whatispin.html.  \"Verifying multi-threaded software with spin \" http:\/\/spinroot.com\/spin\/whatispin.html."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2039370.2039380"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1521747.1521793"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TVLSI.2008.2000244"},{"key":"e_1_3_2_1_10_1","unstructured":"A. Rukhin J. Soto J. Nechvatal E. Barker S. Leigh M. Levenson D. Banks A. Heckert J. Dray S. Vo M. Smid M. Vangel and L. Bassham \"A statistical test suite for random and pseudorandom number generators for cryptographic applications \" NIST April 2010.  A. Rukhin J. Soto J. Nechvatal E. Barker S. Leigh M. Levenson D. Banks A. Heckert J. Dray S. Vo M. Smid M. Vangel and L. Bassham \"A statistical test suite for random and pseudorandom number generators for cryptographic applications \" NIST April 2010."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACSAC.2008.12"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/rsa.v33:2"},{"key":"e_1_3_2_1_13_1","unstructured":"J. Soto \"Statistical testing of random number generators nist \" 2000. {Online}. Available: http:\/\/csrc.nist.gov\/aes\/  J. Soto \"Statistical testing of random number generators nist \" 2000. {Online}. Available: http:\/\/csrc.nist.gov\/aes\/"},{"key":"e_1_3_2_1_14_1","first-page":"746","volume-title":"SODA '08","author":"Mitzenmacher M.","year":"2008"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.46"},{"key":"e_1_3_2_1_16_1","first-page":"25","volume-title":"LIPIcs","author":"Dietzfelbinger M.","year":"2012"},{"key":"e_1_3_2_1_17_1","first-page":"f3","volume-title":"SODA '05","author":"Pagh A.","year":"2005"},{"key":"e_1_3_2_1_18_1","first-page":"564","article-title":"Cryptographic randomness testing of block ciphers and hash functions","volume":"2010","author":"Doganaksoy A.","year":"2010","journal-title":"IACR Cryptology ePrint Archive"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2011.5934972"},{"key":"e_1_3_2_1_20_1","unstructured":"\"Secure hash standard (SHS) \" http:\/\/csrc.nist.gov\/publications\/fips\/fips180-4\/fips-180-4.pdf Aug 2015.  \"Secure hash standard (SHS) \" http:\/\/csrc.nist.gov\/publications\/fips\/fips180-4\/fips-180-4.pdf Aug 2015."}],"event":{"name":"ESWEEK'16: TWELFTH EMBEDDED SYSTEM WEEK","acronym":"ESWEEK'16","location":"Pittsburgh Pennsylvania"},"container-title":["Proceedings of the Eleventh IEEE\/ACM\/IFIP International Conference on Hardware\/Software Codesign and System Synthesis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2968456.2968461","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2968456.2968461","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:40:10Z","timestamp":1750218010000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2968456.2968461"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":20,"alternative-id":["10.1145\/2968456.2968461","10.1145\/2968456"],"URL":"https:\/\/doi.org\/10.1145\/2968456.2968461","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]},"assertion":[{"value":"2016-10-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}