Skip to content

DDI

Data-driven intelligence

Month: September 2012

Why Bloom filters work the way they do

Imagine you’re a programmer who is developing a new web browser. There are many malicious sites on the web, and you want your browser to warn users when they attempt to access dangerous sites. For example, suppose the user attempts to access http://domain/etc. You’d like a way of checking whether domain is known to be… Continue reading Why Bloom filters work the way they do

Published September 26, 2012
Categorized as Uncategorized

Follow Michael

  • Subscribe to this blog
  • Michael's main blog
  • Follow Michael on Twitter

Other places on the web

  • GitHub
  • Delicious
  • Delicious research links for book project
  • Delicious research links for last book
  • Google Plus

Books


Reinventing Discovery: The New Era of Networked Science (Errata)


Quantum Computation and Quantum Information

Other projects

  • Essays
  • TEDxWaterloo video about open science
  • Quantum computing for the determined
  • Polymath wiki

Recent Posts

  • How the backpropagation algorithm works
  • Reinventing Explanation
  • How the Bitcoin protocol actually works
  • Neural Networks and Deep Learning: first chapter now live
  • Why Bloom filters work the way they do

Recent Comments

  • Rich on How the Bitcoin protocol actually works
  • Kaitlyn on If correlation doesn’t imply causation, then what does?
  • Kaitlyn on If correlation doesn’t imply causation, then what does?
  • What I learned at Build Peace (by Jonathan Stray) | Build Peace on If correlation doesn’t imply causation, then what does?
  • What I learned at Build Peace (Jonathan Stray) | Build Peace on If correlation doesn’t imply causation, then what does?

Linklog

Documentaries

Search

Archives

  • April 2014
  • January 2014
  • December 2013
  • November 2013
  • September 2012
  • August 2012
  • June 2012
  • April 2012
  • March 2012
  • February 2012
  • January 2012
  • July 2011
  • June 2011
DDI
Proudly powered by WordPress.