2018 IEEE 59th Annual Symposium on Foundations of Computer Science (FOCS) 2018
DOI: 10.1109/focs.2018.00026
|View full text |Cite
|
Sign up to set email alerts
|

Bloom Filters, Adaptivity, and the Dictionary Problem

Abstract: An approximate membership query data structure (AMQ)-such as a Bloom, quotient, or cuckoo filter-maintains a compact, probabilistic representation of a set S of keys from a universe U. It supports lookups and inserts. Some AMQs also support deletes. A query for x ∈ S returns PRESENT. A query for x ∈ S returns PRESENT with a tunable false-positive probability ε, and otherwise returns ABSENT.AMQs are widely used to speed up dictionaries that are stored remotely (e.g., on disk or across a network). The AMQ is sto… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
32
0

Year Published

2019
2019
2024
2024

Publication Types

Select...
4
2
2

Relationship

2
6

Authors

Journals

citations
Cited by 36 publications
(32 citation statements)
references
References 34 publications
0
32
0
Order By: Relevance
“…Proof. The starting point for our design is the adaptive filter of Bender et al [12]. Like a stash, their filter is a space-efficient internal-memory data structure that summarizes the state of an external-memory key-value dictionary.…”
Section: An Optimal Internal-memory Stashmentioning
confidence: 99%
See 1 more Smart Citation
“…Proof. The starting point for our design is the adaptive filter of Bender et al [12]. Like a stash, their filter is a space-efficient internal-memory data structure that summarizes the state of an external-memory key-value dictionary.…”
Section: An Optimal Internal-memory Stashmentioning
confidence: 99%
“…bits, where m is the capacity of the filter. 12 The basic idea behind the adaptive filter of [12] is to store a fingerprint for each key x, where each fingerprint is taken to be some prefix of the hash h(x). Different keys have different-length fingerprints, and the invariant maintained by the filter is that no fingerprint is a prefix of any other fingerprint.…”
Section: An Optimal Internal-memory Stashmentioning
confidence: 99%
“…The buffered quotient filter stores newly inserted items in an in-memory quotient filter [6,7]. When the in-memory quotient filter fills, its entire contents are flushed to the on-disk quotient filter.…”
Section: Insertion-buffer Backgroundmentioning
confidence: 99%
“…Simulations over real datasets show a reduction on the false positive rate in practice. In [9], the authors use similar techniques to build an adaptive oracle called the broom filters with strong theoretical guarantees. More precisely, they prove that the probability that an item is a false positive (even if S is chosen by an adversary learning from perfect oracle answers) is bounded by a constant < 1.…”
Section: Adaptivitymentioning
confidence: 99%
“…f) Memory partitioning: In this first simulation, we aim at determining the best way to partition a given amount of memory among our two bloom filters. Let N be the total amount of memory we can afford, then we set n = N • 0.1 • i (for i ∈ [1,9]) and n = N − n. In Figure 1, we present the results for a zipf-0.5 distribution, B = 100 and N = 500. The results are similar for others values of B or N .…”
Section: A Single Windowmentioning
confidence: 99%