IEEE INFOCOM 2014 - IEEE Conference on Computer Communications 2014
DOI: 10.1109/infocom.2014.6848046
|View full text |Cite
|
Sign up to set email alerts
|

kBF: A Bloom Filter for key-value storage with an application on approximate state machines

Abstract: Abstract-Key-value (k-v) storage has been used as a crucial component for many network applications, such as social networks, online retailing, and cloud computing. Such storage usually provides support for operations on key-value pairs, and can be stored in memory to speed up responses to queries. So far, existing methods have been deterministic: they will faithfully return previously inserted key-value pairs. Providing such accuracy, however, comes at the cost of memory and CPU time. In contrast, in this pap… Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
26
0

Year Published

2017
2017
2022
2022

Publication Types

Select...
3
2
1

Relationship

1
5

Authors

Journals

citations
Cited by 26 publications
(26 citation statements)
references
References 15 publications
(23 reference statements)
0
26
0
Order By: Relevance
“…kBF. Instead of saving the KV pairs directly, kBF [19] converts the values into fixed-length string bits with respect to given constraints. kBF consists of cells, each of which has two components, i.e., the counter to track the number of encodings into the cell, and the encoding field records either an original encoding, or the XOR results of the encodings that are mapped to this cell.…”
Section: Key-valuesmentioning
confidence: 99%
See 2 more Smart Citations
“…kBF. Instead of saving the KV pairs directly, kBF [19] converts the values into fixed-length string bits with respect to given constraints. kBF consists of cells, each of which has two components, i.e., the counter to track the number of encodings into the cell, and the encoding field records either an original encoding, or the XOR results of the encodings that are mapped to this cell.…”
Section: Key-valuesmentioning
confidence: 99%
“…Multi-class BF [3] Optihash [67] FPF-MBF [43] Retouched BF [75] MPCBF [77] Ternary BF [134] Generalized BF [76] Cross-checking BF [72] Complement BF [73] Yes-no BF [74] VI-CBF [83] FP-CBF [84] Selected Hash [78] [79] Space-code BF [88] Adaptive BF [114] Spectral BF [112] Loglog BF [113] Dynamic BF [89] Variable length signatures [117] Scalable BF [118] DBA [90] Par-BF [91] Weighted BF [119] Popularity conscious BF [120] BloomStore [17] kBF [19] IBLT [21] k-mer BF [131] Spatial BF [17] CBF [36] Deletable BF [133] Distance-sensitive BF [143] Locality-sensitive BF [144] Less hash [85] DLB-BF [96] Combinatorial BF [97] Bloom-1 [92] OMASS [93] Compressed BF [99] Compacted BF [100] Forest-structured BF [106] Stable BF [135] Temporal CBF [136] d-left CBF [101] Memo. Opti.…”
Section: Bit Vectormentioning
confidence: 99%
See 1 more Smart Citation
“…In our previous work [12], we have investigated the feasibility of this approach with a prototype implementation. Specifically, we proposed a method to encode the values into a special type of binary encodings that can fit into the cells of bloom filters.…”
Section: Introductionmentioning
confidence: 99%
“…• We extend our method in [12], and present a comprehensive set of programming APIs for cloud computing users to use kBFs as if they were objects in their software implementations. These new APIs include CREATE, JOIN, and COMPRESS, which support operations on multiple kBF objects.…”
Section: Introductionmentioning
confidence: 99%