Location via proxy:   [ UP ]  
[Report a bug]   [Manage cookies]                
skip to main content
10.1007/11841036_61guideproceedingsArticle/Chapter ViewAbstractPublication PagesConference Proceedingsacm-pubtype
Article

An improved construction for counting bloom filters

Published: 11 September 2006 Publication History

Abstract

A counting Bloom filter (CBF) generalizes a Bloom filter data structure so as to allow membership queries on a set that can be changing dynamically via insertions and deletions. As with a Bloom filter, a CBF obtains space savings by allowing false positives. We provide a simple hashing-based alternative based on d -left hashing called a d -left CBF (dlCBF). The dlCBF offers the same functionality as a CBF, but uses less space, generally saving a factor of two or more. We describe the construction of dlCBFs, provide an analysis, and demonstrate their effectiveness experimentally.

References

[1]
Y. Azar, A. Broder, A. Karlin, and E. Upfal. Balanced allocations. SIAM Journal of Computing 29(1):180-200, 1999.
[2]
P. Berenbrink, A. Czumaj, A. Steger, and B. Vöcking. Balanced allocations: the heavily loaded case. In <i&gt;Proc. of the 32nd Annual ACM STOC, pp. 745-754, 2000.
[3]
B. Bloom. Space/time tradeoffs in in hash coding with allowable errors. Communications of the ACM , 13(7):422-426, 1970.
[4]
F. Bonomi, M. Mitzenmacher, R. Panigrahy, S. Singh, and G. Varghese. Beyond Bloom filters: From approximate membership checks to approximate state machines. To appear in Proc. of SIGCOMM , 2006.
[5]
A. Broder and M. Mitzenmacher. Using multiple hash functions to improve IP Lookups. In Proceedings of IEEE INFOCOM , pp. 1454-1463, 2001.
[6]
A. Broder and M. Mitzenmacher. Network applications of Bloom filters: A survey. Internet Mathematics , 1(4):485-509, 2004.
[7]
S. Cohen and Y. Matias. Spectral Bloom Filters. Proceedings of the 2003 ACM SIGMOD Conference , pp. 241-252.
[8]
S. Dharmapurikar, P. Krishnamurthy, T. Sproull, and J. Lockwood. Deep Packet Inspection using Parallel Bloom Filters. In IEEE Hot Interconnects 12 , 2003.
[9]
S. Dharmapurikar, P. Krishnamurthy, and D. Taylor. Longest prefix matching using Bloom filters. Proceedings of the ACM SIGCOMM 2003 , pp. 201-212.
[10]
L. Fan, P. Cao, J. Almeida, and A. Z. Broder. Summary cache: a scalable widearea Web cache sharing protocol. IEEE/ACM Trans. on Networking , 8(3):281-293, 2000.
[11]
K. Kenthapadi and R. Panigrahy. Balanced allocation on graphs. In Proc. of the Seventeenth Annual ACM-SIAM Symp. on Discrete Algorithms , pp. 434-443, 2006.
[12]
Y. Lu, B. Prabhakar, and F. Bonomi. Perfect Hashing for Network Applications. To appear in Proc. of ISIT 2006 .
[13]
M. Mitzenmacher and E. Upfal. Probability and Computing: Randomized Algorithms and Probabilistic Analysis . Cambridge University Press, 2005.
[14]
M. Mitzenmacher and B. Vöcking. The asymptotics of selecting the shortest of two, improved. In Analytic Methods in Applied Probability: In Memory of Fridrikh Karpelevich , edited by Y. Suhov, American Mathematical Society, 2003.
[15]
R. Pagh and F. Rodler. Cuckoo Hashing. In Proc. of the 9th Annual European Symposium on Algorithms , pp. 121-133, 2001.
[16]
R. Panigrahy. Efficient hashing with lookups in two memory accesses. In Proc. of the Sixteenth Annual ACM-SIAM Symp. on Discrete Algorithms , pp. 830-839, 2005.
[17]
A. Pagh, R. Pagh, and S. Rao. An Optimal Bloom Filter Replacement. In Proc. of the Sixteenth Annual ACM-SIAM Symp. on Discrete Algorithms , pp. 823-829, 2005.
[18]
R. Rajwar, M. Herlihy, and K. Lai. Virtualizing Transactional Memory. In Proc. of the 32nd Annual Int'l Symp. on Computer Architecture , pp. 494-505, 2005.
[19]
M. Sharma and J. Byers. Scalable Coordination Techniques for Distributed Network Monitoring. 6th International Workshop on Passive and Active Network Measurement (PAM) , pp. 349-352, 2005.
[20]
B. Vöcking. How asymmetry helps load balancing. In Proceedings of the 40 th IEEE-FOCS , pp. 131-140, 1999.

Cited By

View all
  • (2024)Adaptive Quotient FiltersProceedings of the ACM on Management of Data10.1145/36771282:4(1-28)Online publication date: 30-Sep-2024
  • (2024)Call Me By My Name: Simple, Practical Private Information Retrieval for Keyword QueriesProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670271(4107-4121)Online publication date: 2-Dec-2024
  • (2024)Wormhole Filters: Caching Your Hash on Persistent MemoryProceedings of the Nineteenth European Conference on Computer Systems10.1145/3627703.3629590(456-471)Online publication date: 22-Apr-2024
  • Show More Cited By

Recommendations

Comments

Information & Contributors

Information

Published In

cover image Guide Proceedings
ESA'06: Proceedings of the 14th conference on Annual European Symposium - Volume 14
September 2006
840 pages
ISBN:3540388753

Publisher

Springer-Verlag

Berlin, Heidelberg

Publication History

Published: 11 September 2006

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)0
  • Downloads (Last 6 weeks)0
Reflects downloads up to 18 Feb 2025

Other Metrics

Citations

Cited By

View all
  • (2024)Adaptive Quotient FiltersProceedings of the ACM on Management of Data10.1145/36771282:4(1-28)Online publication date: 30-Sep-2024
  • (2024)Call Me By My Name: Simple, Practical Private Information Retrieval for Keyword QueriesProceedings of the 2024 on ACM SIGSAC Conference on Computer and Communications Security10.1145/3658644.3670271(4107-4121)Online publication date: 2-Dec-2024
  • (2024)Wormhole Filters: Caching Your Hash on Persistent MemoryProceedings of the Nineteenth European Conference on Computer Systems10.1145/3627703.3629590(456-471)Online publication date: 22-Apr-2024
  • (2024)Beyond Bloom: A Tutorial on Future Feature-Rich FiltersCompanion of the 2024 International Conference on Management of Data10.1145/3626246.3654681(636-644)Online publication date: 9-Jun-2024
  • (2024)Flexible fingerprint cuckoo filter for information retrieval optimization in distributed networkDistributed and Parallel Databases10.1007/s10619-024-07440-w42:3(377-401)Online publication date: 11-Apr-2024
  • (2023)MBFGraph: An SSD-based External Graph System for Evolving GraphsProceedings of the International Conference for High Performance Computing, Networking, Storage and Analysis10.1145/3581784.3607070(1-13)Online publication date: 12-Nov-2023
  • (2023)Probabilistic Causal Contexts for Scalable CRDTsProceedings of the 10th Workshop on Principles and Practice of Consistency for Distributed Data10.1145/3578358.3591331(1-8)Online publication date: 8-May-2023
  • (2023)High-Performance Filters for GPUsProceedings of the 28th ACM SIGPLAN Annual Symposium on Principles and Practice of Parallel Programming10.1145/3572848.3577507(160-173)Online publication date: 25-Feb-2023
  • (2023)A Case for Partitioned Bloom FiltersIEEE Transactions on Computers10.1109/TC.2022.321899572:6(1681-1691)Online publication date: 1-Jun-2023
  • (2023)Popularity Cuckoo Filter: Always Keeping Popular Items in MindAlgorithms and Architectures for Parallel Processing10.1007/978-981-97-0808-6_25(428-445)Online publication date: 20-Oct-2023
  • Show More Cited By

View Options

View options

Figures

Tables

Media

Share

Share

Share this Publication link

Share on social media