135
Riferimenti bibliografici
[1] M. Durand and P.Flajolet, “ Loglog counting of large cardinalities”, in In Esa, pp. 605-617, 2003.
[2] M. Thorup and Y. Zhang, “Tabulation based 4-universal hashing with applications to second moment estimation”, in Proceeding of the annual ACM-SIAm symposium on Discrete algorithms (SODA), (Phladelphia, PA, USA), pp. 615-624, Society for Industrial and Applied Mathematics, 2004.
[3] R. Schweller, Z. Li, Y. Chen, Y. Gao, A. Gupta, E. Parsons, Y. Zhangy, P. Dinda, M. Kao, G. Memik, “Reversible sketches: enabling monitoring and analysis over high-speed data streams”, in IEEE/ACM Transactions on Networking, Volume 15, Issue 5, Oct. 2007.
[4] B. Krishnamurthy, S. Sen, Y. Zhang, “Sketch-based Change Detection: Methods, Evaluation, and Applications”, IMC’03, October 27–29, 2003, Miami Beach, Florida, USA. [5] O.Salem, S. Vaton, A. Gravey, “A scalable, efficient and informative approach for anomaly-based intrusion detection systems: theory and practice”, in International Journal of Network Management Volume 20 Issue 5, September 2010.
136
[6] “The Internet2 Network.”
http://www.internet2.edu/network
[7] Jacquet P., Szpankowski W, “Analytical depoissonizationn and its applications”, Theoretical Computer Science 201,1-2 (1998).