Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- abstractJune 2024
Analysis of False Negative Rates for Recycling Bloom Filters (Yes, They Happen!)
SIGMETRICS/PERFORMANCE '24: Abstracts of the 2024 ACM SIGMETRICS/IFIP PERFORMANCE Joint International Conference on Measurement and Modeling of Computer SystemsPages 17–18https://doi.org/10.1145/3652963.3655044Bloom Filters are a desirable data structure for distinguishing new values in sequences of data (i.e., messages), due to their space efficiency, their low false positive rates (incorrectly classifying a new value as a repeat), and never producing false ...
Also Published in:
ACM SIGMETRICS Performance Evaluation Review: Volume 52 Issue 1 - research-articleMay 2024
Analysis of False Negative Rates for Recycling Bloom Filters (Yes, They Happen!)
Proceedings of the ACM on Measurement and Analysis of Computing Systems (POMACS), Volume 8, Issue 2Article No.: 21, Pages 1–34https://doi.org/10.1145/3656005Bloom Filters are a desirable data structure for distinguishing new values in sequences of data (i.e., messages), due to their space efficiency, their low false positive rates (incorrectly classifying a new value as a repeat), and never producing false ...
- research-articleMay 2023
Representing (Dis)Similarities Between Prediction and Fixation Maps Using Intersection-over-Union Features
ETRA '23: Proceedings of the 2023 Symposium on Eye Tracking Research and ApplicationsArticle No.: 68, Pages 1–8https://doi.org/10.1145/3588015.3589843A classic evaluation of the quality of gaze prediction models consists in comparing a set of ground truth fixation maps against a set of predictions. The quality of the prediction depends on the spatial similarity between the predicted and the observed ...
- research-articleJanuary 2014
A case study of user-level spam filtering
AISC '14: Proceedings of the Twelfth Australasian Information Security Conference - Volume 149Pages 67–75There are number of Anti-Spam filters that have reduced the amount of email spam in the inbox but the problem still continues as the spammers circumvent these techniques. The problems need to be addressed from different aspects. Major problem for ...
- ArticleSeptember 2012
To what extent could we detect field defects? an empirical study of false negatives in static bug finding tools
ASE '12: Proceedings of the 27th IEEE/ACM International Conference on Automated Software EngineeringPages 50–59https://doi.org/10.1145/2351676.2351685Software defects can cause much loss. Static bug-finding tools are believed to help detect and remove defects. These tools are designed to find programming errors; but, do they in fact help prevent actual defects that occur in the field and reported by ...
- research-articleJuly 2011
Continuation equivalence: a correctness criterion for static optimizations of dynamic analyses
WODA '11: Proceedings of the Ninth International Workshop on Dynamic AnalysisPages 24–28https://doi.org/10.1145/2002951.2002958Dynamic analyses reason about a program's concrete heap and control flow and hence can report on actual program behavior with high or even perfect accuracy. But many dynamic analyses require extensive program instrumentation, often slowing down the ...
- ArticleOctober 2010
Identifying clinical concepts in unstructured clinical notes using existing knowledge within the corpus
CBMS '10: Proceedings of the 2010 IEEE 23rd International Symposium on Computer-Based Medical SystemsPages 66–71https://doi.org/10.1109/CBMS.2010.6042616This paper, reports on the results of research which is based originally on the 2009 criteria and corpus of "The Obesity Challenge ", defined by Informatics for Integrating Biology and the Bedside (i2b2), a National Center for Biomedical Computing. In ...
- ArticleAugust 2009
A Step Towards a More Practical Protocol Conformance Checking Algorithm
SEAA '09: Proceedings of the 2009 35th Euromicro Conference on Software Engineering and Advanced ApplicationsPages 458–465https://doi.org/10.1109/SEAA.2009.50In previous works we suggested an approach to verify if in a component-based system the interaction behavior to a component obeys the specified requirements.We can capture unbounded recursion, synchronous method calls and call backs as well as ...
- research-articleJanuary 2009
An efficient analytical solution to thwart DDoS attacks in public domain
ICAC3 '09: Proceedings of the International Conference on Advances in Computing, Communication and ControlPages 503–509https://doi.org/10.1145/1523103.1523203In this paper, an analytical model for DDoS attacks detection is proposed, in which propagation of abrupt traffic changes inside public domain is monitored to detect a wide range of DDoS attacks. Although, various statistical measures can be used to ...
- articleSeptember 2008
MONI: Mobile Agents Ontology based for Network Intrusions Management
International Journal of Advanced Media and Communication (IJAMC), Volume 2, Issue 3Pages 288–307https://doi.org/10.1504/IJAMC.2008.020181We address ourselves in this paper to the issues of organisation, representation, management and operational use of knowledge in network-based IDS and IPS to reduce the number of false positives and false negatives in these systems. Our approach is based on ...
- articleApril 2008
Extracting user preference from Web browsing behaviour for spam filtering
International Journal of Advanced Intelligence Paradigms (IJAIP), Volume 1, Issue 2Pages 126–138https://doi.org/10.1504/IJAIP.2008.024769We focus on user behaviour that most e-mail users browse the web. In this paper, we attempt to exploit user preference extracted from the behaviour in a spam filtering method. The method reduces troublesome maintenance of the filter, since it keeps ...
- ArticleJune 2007
Event processing using database technology
SIGMOD '07: Proceedings of the 2007 ACM SIGMOD international conference on Management of dataPages 1169–1170https://doi.org/10.1145/1247480.1247645This tutorial deals with applications that help systems and individuals respond to critical conditions in their environments. The identification of critical conditions requires correlating vast amounts of data within and outside an enterprise. ...
- research-articleDecember 2006
Retouched bloom filters: allowing networked applications to trade off selected false positives against false negatives
CoNEXT '06: Proceedings of the 2006 ACM CoNEXT conferenceArticle No.: 13, Pages 1–12https://doi.org/10.1145/1368436.1368454Where distributed agents must share voluminous set membership information, Bloom filters provide a compact, though lossy, way for them to do so. Numerous recent networking papers have examined the trade-offs between the bandwidth consumed by the ...
- ArticleMay 1996
An empirical study of static call graph extractors
Informally, a call graph represents calls between entities in a given program. The call graphs that compilers compute to determine the applicability of an optimization must typically be conservative: a call may be omitted only if it can never occur an ...
- research-articleJanuary 1994
Automated Verification of Behavioral Equivalence for Microprocessors
IEEE Transactions on Computers (ITCO), Volume 43, Issue 1Pages 115–117https://doi.org/10.1109/12.250616Presents a new method for verifying, in a fully automated way, that two synchronous sequential circuits have the same input/output behavior. The method applies to designs in which a distinction between data path and control can be made, and in ...