Nothing Special   »   [go: up one dir, main page]

skip to main content
article
Free access

A second look at bloom filters

Published: 01 August 1983 Publication History

Abstract

This note deals with a paper by Gremillion demonstrating the simulation approach to the design of a Bloom filter. It is shown that an analytical approach can yield insights into competing filter design and give expected values for the goodness-of-hash transformations not available with simulation. On the other hand, simulation gives insight into what can be expected with available hash transformation not available from an analytic approach.

References

[1]
Bloom, B.H. Space/time tradeoffs in hash coding with allowable errors. Comm. ACM 13, 7 (July 1970), 422--426.
[2]
Gremillion, L.L. Designing a Bloom Filter for differential file access. Comm. ACM 25, 9 (Sept. 1982). 600-604.
[3]
Lum, V.Y., Yuen, P.S.T. and Dodd, M. Key to address transformation techniques: A fundamental performance study on large existing formatted files. Comm. ACM 14, 4 (April 1971), 228-239.

Cited By

View all
  • (2024)Tree-ORAP: A Tree-Based Oblivious Random-Access Protocol for Privacy-Protected BlockchainIEEE Transactions on Services Computing10.1109/TSC.2023.334758917:3(1252-1264)Online publication date: May-2024
  • (2024)Secure and Efficient Bloom-Filter-Based Image Search in Cloud-Based Internet of ThingsIEEE Internet of Things Journal10.1109/JIOT.2023.330196911:3(5024-5035)Online publication date: 1-Feb-2024
  • (2024)A Scalable, Fault Resilient and Balanced Storage Architecture for Cyber-Physical Systems2024 IEEE 19th Conference on Industrial Electronics and Applications (ICIEA)10.1109/ICIEA61579.2024.10665062(1-6)Online publication date: 5-Aug-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image Communications of the ACM
Communications of the ACM  Volume 26, Issue 8
Aug. 1983
50 pages
ISSN:0001-0782
EISSN:1557-7317
DOI:10.1145/358161
Issue’s Table of Contents
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 August 1983
Published in CACM Volume 26, Issue 8

Permissions

Request permissions for this article.

Check for updates

Author Tags

  1. bloom
  2. differential file
  3. filter

Qualifiers

  • Article

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)127
  • Downloads (Last 6 weeks)14
Reflects downloads up to 09 Nov 2024

Other Metrics

Citations

Cited By

View all
  • (2024)Tree-ORAP: A Tree-Based Oblivious Random-Access Protocol for Privacy-Protected BlockchainIEEE Transactions on Services Computing10.1109/TSC.2023.334758917:3(1252-1264)Online publication date: May-2024
  • (2024)Secure and Efficient Bloom-Filter-Based Image Search in Cloud-Based Internet of ThingsIEEE Internet of Things Journal10.1109/JIOT.2023.330196911:3(5024-5035)Online publication date: 1-Feb-2024
  • (2024)A Scalable, Fault Resilient and Balanced Storage Architecture for Cyber-Physical Systems2024 IEEE 19th Conference on Industrial Electronics and Applications (ICIEA)10.1109/ICIEA61579.2024.10665062(1-6)Online publication date: 5-Aug-2024
  • (2024)Leveraging HBM2 for Accelerating k-mer Counting with oneAPI on FPGAs2024 34th International Conference on Field-Programmable Logic and Applications (FPL)10.1109/FPL64840.2024.00022(92-99)Online publication date: 2-Sep-2024
  • (2024)Verifiable Changeable Threshold Secret Image Sharing Scheme Based on LWE ProblemWireless Personal Communications: An International Journal10.1007/s11277-024-11454-z137:2(1099-1118)Online publication date: 1-Jul-2024
  • (2023)MWPoW+: A Strong Consensus Protocol for Intra-Shard Consensus in Blockchain ShardingACM Transactions on Internet Technology10.1145/358402023:2(1-27)Online publication date: 18-May-2023
  • (2023)Probabilistic Causal Contexts for Scalable CRDTsProceedings of the 10th Workshop on Principles and Practice of Consistency for Distributed Data10.1145/3578358.3591331(1-8)Online publication date: 8-May-2023
  • (2023)A Case for Partitioned Bloom FiltersIEEE Transactions on Computers10.1109/TC.2022.321899572:6(1681-1691)Online publication date: 1-Jun-2023
  • (2023)LWE‐based verifiable essential secret image sharing scheme ((t,s,k,n)$( {t,s,k,n} )$ ‐ VESIS)IET Image Processing10.1049/ipr2.13006Online publication date: 8-Dec-2023
  • (2023)A verifiable essential secret image sharing scheme based on HLRs (VESIS‐(t, s, k, n))CAAI Transactions on Intelligence Technology10.1049/cit2.122719:2(388-410)Online publication date: 20-Oct-2023
  • Show More Cited By

View Options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Get Access

Login options

Full Access

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media