Author:
Wang Xu An,Xhafa Fatos,Luo Xiaoshuang,Zhang Shuaiwei,Ding Yong
Funder
Natural Science Foundation of Shaanxi Province
National Natural Science Foundation of China
Publisher
Springer Science and Business Media LLC
Subject
Geometry and Topology,Theoretical Computer Science,Software
Reference33 articles.
1. Bloom B (1970) Space/time trade-offs in hash coding with allowable errors. Commun ACM 13(7):422–426
2. Bose P, Guo H, Kranakis E, Maheshwari A, Morin P, Morrison J, Smid MHM, Tang Y (2008) On the false-positive rate of bloom filters. Inf Process Lett 108(4):210–213
3. Camenisch J, Zaverucha GM (2009) Private intersection of certified sets. In: Dingledine R, Golle P (eds) FC 2009. LNCS, vol 5628. Springer, Berlin, pp 108–127
4. Cheielewski L, Hoepman J (2008) Fuzzy private matching (extended abstract). In: Third international conference on IEEE availability, reliability and security
5. Chen C, Pai P, Hung W (2013) A new decision making process for selecting project leader based on social network and knowledge map. Int J Fuzzy Syst 15(1):36–46
Cited by
14 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献