Ieee Infocom 2004
DOI: 10.1109/infcom.2004.1354643
|View full text |Cite
|
Sign up to set email alerts
|

Approximate caches for packet classification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1
1
1

Citation Types

0
81
0
1

Publication Types

Select...
4
3
1

Relationship

0
8

Authors

Journals

citations
Cited by 113 publications
(82 citation statements)
references
References 21 publications
0
81
0
1
Order By: Relevance
“…However, this design makes inefficient use of storage and is unlikely to perform competitively with the BGP . The concept of maintaining and swapping two temporally-separated Bloom filters has been previously employed in software for filtering dynamic data [59,60,61]. BGP is the first application of such a scheme to memory access granularity prediction in hardware and is unique in its implementation and default prediction inverting algorithm.…”
Section: Other Dynamic Bloom-filter Mechanismsmentioning
confidence: 99%
“…However, this design makes inefficient use of storage and is unlikely to perform competitively with the BGP . The concept of maintaining and swapping two temporally-separated Bloom filters has been previously employed in software for filtering dynamic data [59,60,61]. BGP is the first application of such a scheme to memory access granularity prediction in hardware and is unique in its implementation and default prediction inverting algorithm.…”
Section: Other Dynamic Bloom-filter Mechanismsmentioning
confidence: 99%
“…But we need to address the problems of Bloom filter mentioned in Section III-B. Our idea is to design a Bloom filter array (BFA) with the following functionalities, not available in the original Bloom filter [9] and [16]: 1) Removal functionality: We implement insertion and removal operations synergistically by using insertionremoval pair vectors. The trick is that, rather than removing f (p ) from the insertion vector, we create a removal vector and insert f (p ) into the removal vector.…”
Section: Bloom Filter Arraymentioning
confidence: 99%
“…end if 11) end function 12) function ProcOutbound(p ) 13) for j ← I to (I − w + 1)%w 14) if BloomFilterSearch(RV j , f (p )) returns true then 15) break 16) if BloomFilterSearch(IV j , f (p )) returns true then 17) …”
Section: Round Robin Sliding Windowunclassified
“…Among them, hash-based schemes have been favored due to power efficiency and balanced memory access againt the others. As a hash-based scheme, a Bloom filter (BF) has been widely documented in literature on networking [1][2][3][4][5][6]. A BF is essentially a generalized hash mechanism on a key set with k hash functions for approximate membership testing.…”
Section: Introductionmentioning
confidence: 99%