2013
DOI: 10.1016/j.jnca.2012.12.031
|View full text |Cite
|
Sign up to set email alerts
|

Fast and deterministic hash table lookup using discriminative bloom filters

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3

Citation Types

0
3
0

Year Published

2013
2013
2020
2020

Publication Types

Select...
6
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(3 citation statements)
references
References 32 publications
0
3
0
Order By: Relevance
“…A functional Bloom filter satisfies the key-value operation required in various applications [20][21][22][23][24][25]. Unlike a hash table, a functional Bloom filter does not require to store input keys, as different combinations of Bloom filter indexes for each input key can work as the signature of the input key.…”
Section: Introductionmentioning
confidence: 99%
“…A functional Bloom filter satisfies the key-value operation required in various applications [20][21][22][23][24][25]. Unlike a hash table, a functional Bloom filter does not require to store input keys, as different combinations of Bloom filter indexes for each input key can work as the signature of the input key.…”
Section: Introductionmentioning
confidence: 99%
“…Besides state symbols, multi-bit words were also employed as an auxiliary array, where membership could be determined in only a small number of memory accesses [21]. Taking reducing memory access into account, a collision-free hashing scheme was developed on discriminative Bloom filters to speed up the lookup process [20]. A combinatorial Bloom filter was proposed using multiple sets of hash functions to code an input element into a binary array as the group identity of the element.…”
Section: Introductionmentioning
confidence: 99%
“…The name space of named data is undoubtedly much larger than that of IP addresses and the data names themselves can also get very complex [ [3] but at the cost of checking multiple locations in the table for a single lookup query. In order to solve this problem, it has been proposed to keep some info of the off-chip hash table in the on-chip memory to assist the locating process, as in [4]. However these techniques require additional space and calculation resources dedicated to maintain these info.…”
Section: Introductionmentioning
confidence: 99%