2012
DOI: 10.1109/surv.2011.031611.00024
|View full text |Cite
|
Sign up to set email alerts
|

Theory and Practice of Bloom Filters for Distributed Systems

Abstract: Abstract-Many network solutions and overlay networks utilize probabilistic techniques to reduce information processing and networking costs. This survey article presents a number of frequently used and useful probabilistic techniques. Bloom filters and their variants are of prime importance, and they are heavily used in various distributed systems. This has been reflected in recent research and many new algorithms have been proposed for distributed systems that are either directly or indirectly based on Bloom … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
2

Citation Types

0
244
0

Year Published

2015
2015
2024
2024

Publication Types

Select...
6
2
1

Relationship

0
9

Authors

Journals

citations
Cited by 434 publications
(253 citation statements)
references
References 115 publications
(122 reference statements)
0
244
0
Order By: Relevance
“…It is based on hash to detect whether an element exists in a particular set. It is a space-and time-efficient data structure [8].…”
Section: Parallel Url Duplicate Checking Modulementioning
confidence: 99%
See 1 more Smart Citation
“…It is based on hash to detect whether an element exists in a particular set. It is a space-and time-efficient data structure [8].…”
Section: Parallel Url Duplicate Checking Modulementioning
confidence: 99%
“…In the case that hash functions are properly selected, it is obvious that the array size i and the number of hash functions j determine the probability of False Positive. According to the literature [8], we have the exact probability of False Positives below:…”
Section: Parallel Url Duplicate Checking Modulementioning
confidence: 99%
“…A number of techniques are proposed for dealing with event notification in such a kind of systems, by using both existing solutions (classical CAN and CAN FD) and new technologies, like the CAN with eXtensible in-frame Reply (CAN XR) proposal [9]. The adoption of Bloom filters [10], [11]-a data structure conceived for efficiently managing huge data sets-has also been considered for those scenarios where false positives are tolerated. Simple metrics have been employed to assess, in very general terms, the performance these solutions offer.…”
Section: Introductionmentioning
confidence: 99%
“…But it has always been a concern that how we can select a proper and strong password that cannot be predicted or cracked easily. Lots of approaches and techniques have been proposed in this area that try to generate a complicated combination of characters and numbers as password [14,15]. In the most cases it works but it is not always comfortable for the user to have or memorize a system generated password, instead if we could have a dictionary of weak passwords which are easy to recognize by attackers and check them against the entered password proposed by user we can easily decide the selected password by end user is strong enough or not.…”
Section: Introductionmentioning
confidence: 99%