Author:
Ma Heng,Tseng Ying-Chih,Chen Lu-I.
Publisher
Springer Science and Business Media LLC
Subject
Artificial Intelligence,Software
Reference22 articles.
1. Tan L, Brotherton B, Sherwood T (2006) Bit-split string-matching engines for intrusion detection and prevention. ACM Trans Archit Code Optim 3(1):3–34
2. Bentley J, Sedgewick R (1997) Fast algorithms for sorting and searching strings. In: Proceedings of ACM-SIAM symposium on discrete algorithms, pp 360–369
3. Matias Y, Muthukrishnan S, Sahinalp S, Ziv J (1998) Augmenting suffix trees, with applications. In: Proceedings of European symposium on algorithms, pp 67–78
4. Bloom BH (1970) Space/time trade-offs in hash coding with allowable errors. Commun ACM 13(7):422–426
5. Stranneheim H, Kaller M, Allander T, Andersson B, Arvestad L, Lundeberg J (2010) Classification of DNA sequences using Bloom filters. Bioinformatics 26(13):1595–1600
Cited by
6 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献