ELEMENTS OF COMPUTER SCIENCE
open-menucloseme
Home
Books
About us
  • Utilizing Bloom filters for efficient querying in large-scale datasets - Part 7

    calendarFeb 13, 2025 · 3 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this final post, we will provide a brief overview of the applications of Bloom filters and discuss their potential limitations.
    Read More
  • Utilizing Bloom filters for efficient querying in large-scale datasets - Part 6

    calendarFeb 13, 2025 · 3 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this post, we will implement a Bloom filter in C# and demonstrate its functionality through a concrete application: we will show how it can be used to quickly check if a URL is malicious.
    Read More
  • Utilizing Bloom filters for efficient querying in large-scale datasets - Part 5

    calendarFeb 13, 2025 · 7 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this post, we will formalize what we previously discussed and provide a precise definition of a Bloom filter. We will then delve into the mathematical principles behind it, focusing on the optimization of its parameters.
    Read More
  • Utilizing Bloom filters for efficient querying in large-scale datasets - Part 4

    calendarFeb 13, 2025 · 5 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this post, we will provide an informal introduction to Bloom filters using a simple analogy with a stamp collection.
    Read More
  • Utilizing Bloom filters for efficient querying in large-scale datasets - Part 3

    calendarFeb 13, 2025 · 2 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this post, we will briefly explore a concrete example where the techniques mentioned earlier fall short of fully addressing the problem. We will then discuss why a new solution is required.
    Read More
  • Utilizing Bloom filters for efficient querying in large-scale datasets - Part 2

    calendarFeb 13, 2025 · 6 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this post, we will explore various techniques for storing and querying massive amounts of data, with a particular emphasis on hashing.
    Read More
  • Utilizing Bloom filters for efficient querying in large-scale datasets - Part 1

    calendarFeb 13, 2025 · 2 min read  ·
    Share on: twitterfacebooklinkedincopy
    Starting today, we are introducing a series on using Bloom filters for efficiently determining the existence of elements in large datasets. Our objective is to provide a comprehensive overview, exploring their necessity for scalable querying, analyzing their time complexity, and demonstrating a simple implementation in …
    Read More
  • Implementing the Google's autocomplete feature with ngram language models - Part 6

    calendarJan 8, 2025 · 4 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this final post, we will briefly examine the strengths and weaknesses of n-gram models and explore why it may be necessary to refine them for improved predictions.
    Read More
  • Implementing the Google's autocomplete feature with ngram language models - Part 5

    calendarJan 8, 2025 · 6 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this post, we will implement a simple n-gram model in C# using a limited corpus. This will highlight the key considerations to keep in mind when it comes to coding.
    Read More
  • Implementing the Google's autocomplete feature with ngram language models - Part 4

    calendarJan 8, 2025 · 7 min read  ·
    Share on: twitterfacebooklinkedincopy
    In this post, we will build on the concepts covered in the previous posts and explore how they can be applied to n-gram language models.
    Read More
    • ««
    • «
    • 1
    • 2
    • 3
    • 4
    • 5
    • »
    • »»

Nicolas DESCARTES

This blog gathers the contributions of a passionate software engineer convinced that getting to the bottom of things is the best way to truly understand the big picture. Follow @EOCS_Descartes
Read More

Don't miss new articles

/* Real people should not fill this in and expect good things - do not remove this or risk form bot signups. */

Recent Posts

  • Securing credentials in Azure-hosted applications using managed identities and Azure Key Vault - Implementing Azure Key Vault
  • Securing credentials in Azure-hosted applications using managed identities and Azure Key Vault - Implementing managed identities
  • Securing credentials in Azure-hosted applications using managed identities and Azure Key Vault - The traditional approach and its drawbacks
  • Securing credentials in Azure-hosted applications using managed identities and Azure Key Vault - Introduction
  • Engineering a compiler through examples: building a mathematical expression engine - Part 6
  • Engineering a compiler through examples: building a mathematical expression engine - Part 5
  • Engineering a compiler through examples: building a mathematical expression engine - Part 4
  • Engineering a compiler through examples: building a mathematical expression engine - Part 3
Nicolas DESCARTES

Copyright  NICOLAS DESCARTES

to-top