2017
DOI: 10.12928/telkomnika.v15i4.4447
|View full text |Cite
|
Sign up to set email alerts
|

Bloom Filter Implementation in Cache with Low Level of False Positive

Abstract: Searching techniques significantly determine the speed of getting the information or objects. Finding an object in a set is related to membership checking. In the case of massive data, it needs an appropriate technique to search an object accurately and faster. This research implements searching methods, namely Bloom Filter and Sequential Search algorithms, to find objects in a set of data. It aims to improve our system getting a proper item. Due to the possibility of False-Positive existence as a result of Bl… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 8 publications
(7 reference statements)
0
2
0
Order By: Relevance
“…In paper [12] the package is deployed to be stored in network nodes but still maintained to ensure there are no redundant packets, to save resources, using bloom filter. The lack of bloom filter technique relatedto false positive problems corrected by A. Hidayat et al [13]. In this technique, bloom filter is combining with sequential search algorithm.…”
Section: Cache Placementmentioning
confidence: 99%
See 1 more Smart Citation
“…In paper [12] the package is deployed to be stored in network nodes but still maintained to ensure there are no redundant packets, to save resources, using bloom filter. The lack of bloom filter technique relatedto false positive problems corrected by A. Hidayat et al [13]. In this technique, bloom filter is combining with sequential search algorithm.…”
Section: Cache Placementmentioning
confidence: 99%
“…One time, a node can be a producer and sometimes it turns into theconsumer. In the NDN node can be embedded with various cache rules, including to determine which content will be selected and deleted from content store [5], [9], [10], the selection of places where a content will be cached [10]- [13], and cache policy that imply the model of cooperation between nodes to determinethe caching decision [14]- [17]. Related to node mobility, several techniques have been studied to maintain the performance of the system even though the nodes move in and out of coverage [18]- [21].…”
Section: Introductionmentioning
confidence: 99%