2015 IEEE Conference on Computer Communications (INFOCOM) 2015
DOI: 10.1109/infocom.2015.7218646
|View full text |Cite
|
Sign up to set email alerts
|

Independent counter estimation buckets

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
8
0

Year Published

2017
2017
2024
2024

Publication Types

Select...
5
3

Relationship

3
5

Authors

Journals

citations
Cited by 21 publications
(8 citation statements)
references
References 21 publications
0
8
0
Order By: Relevance
“…Other methods such as Counter Braids [42] reduce the meta data size but require a long decode operation and are therefore not applicable to caching. Another approach is to compress the counter representation itself [52,34,54,20]. In TinyLFU we manage to represent the histogram using short counters, and thus these methods do not help us.…”
Section: Approximate Counting Architecturesmentioning
confidence: 99%
“…Other methods such as Counter Braids [42] reduce the meta data size but require a long decode operation and are therefore not applicable to caching. Another approach is to compress the counter representation itself [52,34,54,20]. In TinyLFU we manage to represent the histogram using short counters, and thus these methods do not help us.…”
Section: Approximate Counting Architecturesmentioning
confidence: 99%
“…By separating flows into different buckets with different scales, the Independent Counter Estimation Buckets (ICE-BUCKETS) [34] algorithm allows to further improve the upper bound on the relative counting error of up to 57 times over real traffic traces.…”
Section: Related Workmentioning
confidence: 99%
“…Estimators reduce the size of counters using probabilistic techniques [9]- [11]. This enables maintaining one counter per flow in SRAM at the cost of reduced accuracy.…”
Section: A Backgroundmentioning
confidence: 99%
“…These methods trade precision for space and allow more counters to be contained in SRAM. This idea was first introduced by Approximate Counting [35] and was adapted to networking devices [9]- [11], [36]. The downside of estimators is that they require storing a flow-to-counter mapping for every flow, a requirement that has many overheads.…”
Section: Network Monitoring Architecturesmentioning
confidence: 99%