[1] | Zwolenski M, Weatherill L. The digital universe rich data and the increasing value of the Internet of things[J]. Australian Journal of Telecommunications & the Digital Economy, 2014, 2(3):471-479. |
[2] | DeCandia G, Hastorun D, Jampani M, et al. Dynamo:Amazon's highly available key-value store[J]. ACM SIGOPS Operating Systems Review, 2007, 41(6):205-220. |
[3] | Chang F, Dean J, Ghemawat S, et al. Bigtable:A distributed storage system for structured data[J]. ACM Transactions on Computer Systems (TOCS), 2008, 26(2):4-4. |
[4] | Lakshman A, Malik P. Cassandra:A decentralized structured storage system[J]. ACM SIGOPS Operating Systems Review, 2010, 44(2):35-40. |
[5] | Henke C, Schmoll C, Zseby T. Empirical evaluation of Hash functions for multipoint measurements[J]. ACM SIGCOMM Computer Communication Review, 2008, 38(3):39-50. |
[6] | Christian H, Carsten S, Tanja Z. Empirical evaluation of Hash functions for packetID generation in sampled multipoint measurements[C]//Passive and Active Network Measurement, International Conference 2009. Seoul, Korea:Proceedings, 2009:197-206. |
[7] | Rivest R L. The MD5 message-digest algorithm[J]. Network Working Group IETF, 1992, 473(10):303-311. |
[8] | Eastlake Rd D, Jones P. US Secure Hash Algorithm 1(SHA1)[M]. Los Argeles County:RFC Editor, 2001. |
[9] | Peterson W W, Brown D T. Cyclic codes for error detection[J]. Proceedings of the IRE, 1961, 49(1):228-235. |
[10] | Enbody R J, Du H C. Dynamic hashing schemes[J]. ACM Computing Surveys (CSUR), 1988, 20(2):850-113. |
[11] | Larson P A. Dynamic hashing[J]. BIT Numerical Mathematics, 1978, 18(2):184-201. |
[12] | Singh B, Yadav I, Agarwal S, et al. An efficient word searching algorithm through splitting and hashing the offline text[C]//Advances in Recent Technologies in Communication and Computing. Kottayam, India:IEEE Press, 2009:387-389. |
[1] | 郭少茹, 张虎, 钱揖丽, 李茹, 杨陟卓, 顾兆军, 马淑晖. 面向高考阅读理解的句子语义相关度[J]. 清华大学学报(自然科学版), 2017, 57(6): 575-579,585. | [2] | 蔡鸿明, 姜祖海, 姜丽红. 分布式环境下业务模型的数据存储及访问框架[J]. 清华大学学报(自然科学版), 2017, 57(6): 569-574. | [3] | 周树桥, 李铎. 双冗余控制器的失效状态分析及面向高可靠度的设计[J]. 清华大学学报(自然科学版), 2017, 57(4): 399-404. | [4] | 林正航, 强茂山, 袁尚南. 大型国际工程承包商核心能力模型评价[J]. 清华大学学报(自然科学版), 2015, 55(12): 1309-1314,1323. | [5] | 韩心慧, 肖祥全, 张建宇, 刘丙双, 张缘. 基于社交关系的DHT网络Sybil攻击防御[J]. 清华大学学报(自然科学版), 2014, 54(1): 1-7. |
|