2014
DOI: 10.1109/surv.2013.052213.00186
|View full text |Cite
|
Sign up to set email alerts
|

On Protocol-Independent Data Redundancy Elimination

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
5
0

Year Published

2016
2016
2021
2021

Publication Types

Select...
6
2

Relationship

0
8

Authors

Journals

citations
Cited by 25 publications
(6 citation statements)
references
References 37 publications
0
5
0
Order By: Relevance
“…We adopt a content-defined chunking algorithm for the first time to convert a sequence-type feature into a set for the purpose of indexing and search of malicious PE files [15]. We choose an asymmetric extremum (AE) chunking algorithm because this runs quickly and divides any sequence into evenly-sized chunks around the average chunk size [16].…”
Section: B Feature Set Convertermentioning
confidence: 99%
“…We adopt a content-defined chunking algorithm for the first time to convert a sequence-type feature into a set for the purpose of indexing and search of malicious PE files [15]. We choose an asymmetric extremum (AE) chunking algorithm because this runs quickly and divides any sequence into evenly-sized chunks around the average chunk size [16].…”
Section: B Feature Set Convertermentioning
confidence: 99%
“…Redundant data consumes the network resources and deteriorate the network performance by increasing the congestion. Due to the rapid increase of internet data, many data redundancy techniques have been introduced in recent years [12,13,14]. Many current techniques provided suitable solutions to improve the network performance by removing the data redundancy in the network.…”
Section: Related Work and Motivationsmentioning
confidence: 99%
“…It has been broadly agreed that data redundancy eradication offers great benefits in practice. Generally, the benefit of removing the data redundancy is the improved network performance in terms of higher network throughput and lower end to end delay [12,13,14]. However, the currently provided solutions are not so effective and remove a part of the original data with redundant data.…”
Section: Related Work and Motivationsmentioning
confidence: 99%
See 1 more Smart Citation
“…Disappointingly, Internet-related protocols are not really good at this aspect: The "link rot" problem [44,45] often causes inaccessibility, and target host-centric requests result in repeated transmissions and significant waste on bandwidth [46]. Though remedial measures such as content distribution network (CDN) and peer-to-peer (P2P) overlays have been proposed, these patching methods inevitably introduce extra complexity and unexpected problems, as the high financial cost for content publishers and maintenance cost for service providers in CDN [47]; and a massive amount of cross-ISP traffic which is contradictory to policies of ISPs in P2P [48].…”
Section: Named Content Retrievalmentioning
confidence: 99%