مصادر الجداول
-
(2-1) Fraud dataset with known classifications.
-
(3-1) Key−value database.
-
(3-2) A coded character string.
-
(4-1) 10-bit array.
-
(4-2) Summary of hash function results.
-
(4-3) Bloom filter for malicious email addresses.
-
(4-4) Votes cast for each webpage.
-
(6-1) Books bought by Smith, Jones, and Brown.
-
(6-2) Jaccard index and distance.
-
(6-3) Star ratings for purchases.