[go: up one dir, main page]
More Web Proxy on the site http://driver.im/ skip to main content
10.1145/383962.384004acmconferencesArticle/Chapter ViewAbstractPublication PagespodcConference Proceedingsconference-collections
Article

Compressed bloom filters

Published: 01 August 2001 Publication History

Abstract

A Bloom filter is a simple space-efficient randomized data structure for representing a set in order to support membership queries. Although Bloom filters allow false positives, for many applications the space savings outweigh this draw-back when the probability of an error is sufficiently low. We introduce compressed Bloom filters, which improve performance when the Bloom filter is passed as a message, and its transmission size is a limiting factor. For example, Bloom filters have been suggested as a means for sharing Web cache information. In this setting, proxies do not share the exact contents of their caches, but instead periodically broadcast Bloom filters representing their cache. By using compressed Bloom filters, proxies can reduce the number of bits broadcast, the false positive rate, and/or the amount of computation per lookup. The cost is the processing time for compression and decompression, which can use simple arithmetic coding, and more memory use at the proxies, which utilize the larger uncompressed form of the Bloom filter.

References

[1]
M. Adler, S. Chakrabarti, M. Mitzenmacher, L. Rasmussen. Parallel randomized load balancing. Random Structures and Algorithms, 13(2), pages 159-188, 1998.
[2]
B. Bloom. Space/time tradeoffs in in hash coding with allowable errors. Communications of the A CM, 13(7):422-426, July 1970.
[3]
J. Carpinelli, W. Salomonsen, A. Moffat, R. Neal, and I. H. Witten. Source code for arithmetic coding, Version 1. Available at http ://www. cs. mu. oz. au/-alistair/arith_coder/. March 1995.
[4]
J. L. Carter and M. N. Wegman. Universal classes of hash functions. Journal of Computer and System Sciences, 18, pages 143-154, 1979.
[5]
S. Czerwinski, B. Zhao, T. Hodes, A. Joseph, and R. Katz. An architecture for a secure service discovery service. In Proceedings of the Fifth Annual International Conference on Mobile Computing and Networks (MobiCOM '99), 1999.
[6]
L. Fan, P. Cao, J. Almeida, and A. Broder. Summary cache: A scalable wide-area Web cache sharing protocol. In Proceeding of SIGCOMM '98, 1998. Extended version available as Technical Report 1361, Computer Sciences Department, Univ. of Wisconsin-Madison, February 1999.
[7]
P. G. Howard and J. Vitter. Analysis of arithmetic coding for data compression. Information Processing and Management, vol 28. no. 6, pages 749-763, 1992.
[8]
J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, and B. Zhao. OceanStore: An architecture for global-scale persistent storage. In Proceedings of ASPLOS 2000, 2000.
[9]
A. Moffat, R. Neal, and I. H. Witten. Arithmetic coding revisited. ACM Transactions on Information Systems, 16(3):256-294, July 1998.
[10]
M. V. Ramakrishna. Practical performance of Bloom filters and parallel free-text searching. Communications of the ACM, 32(10):1237-1239, October 1989.
[11]
I. H. Witten, A. Moffat, and T. Bell. Managing Gigabytes (2nd Edition). Morgan Kaufmann, San Francisco, 1999.

Cited By

View all
  • (2025)Skip index: Supporting efficient inter-block queries and query authentication on the blockchainFuture Generation Computer Systems10.1016/j.future.2024.107556164(107556)Online publication date: Mar-2025
  • (2024)ESTELLE: An Efficient and Cost-effective Cloud Log EngineCompanion of the 2024 International Conference on Management of Data10.1145/3626246.3653387(201-213)Online publication date: 9-Jun-2024
  • (2024)A Scalable and Resilient Protocol for Synchronous Collaboration2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD)10.1109/CSCWD61410.2024.10580450(441-446)Online publication date: 8-May-2024
  • Show More Cited By

Recommendations

Comments

Please enable JavaScript to view thecomments powered by Disqus.

Information & Contributors

Information

Published In

cover image ACM Conferences
PODC '01: Proceedings of the twentieth annual ACM symposium on Principles of distributed computing
August 2001
323 pages
ISBN:1581133839
DOI:10.1145/383962
Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

Sponsors

Publisher

Association for Computing Machinery

New York, NY, United States

Publication History

Published: 01 August 2001

Permissions

Request permissions for this article.

Check for updates

Qualifiers

  • Article

Conference

PODC01
Sponsor:

Acceptance Rates

PODC '01 Paper Acceptance Rate 39 of 118 submissions, 33%;
Overall Acceptance Rate 740 of 2,477 submissions, 30%

Contributors

Other Metrics

Bibliometrics & Citations

Bibliometrics

Article Metrics

  • Downloads (Last 12 months)90
  • Downloads (Last 6 weeks)21
Reflects downloads up to 18 Dec 2024

Other Metrics

Citations

Cited By

View all
  • (2025)Skip index: Supporting efficient inter-block queries and query authentication on the blockchainFuture Generation Computer Systems10.1016/j.future.2024.107556164(107556)Online publication date: Mar-2025
  • (2024)ESTELLE: An Efficient and Cost-effective Cloud Log EngineCompanion of the 2024 International Conference on Management of Data10.1145/3626246.3653387(201-213)Online publication date: 9-Jun-2024
  • (2024)A Scalable and Resilient Protocol for Synchronous Collaboration2024 27th International Conference on Computer Supported Cooperative Work in Design (CSCWD)10.1109/CSCWD61410.2024.10580450(441-446)Online publication date: 8-May-2024
  • (2024)Reputation is not enough: Ensuring strong order-fairness in Byzantine consensusComputer Standards & Interfaces10.1016/j.csi.2024.10385590(103855)Online publication date: Aug-2024
  • (2024)MaSTer: Maliciously Secure Truncation for Replicated Secret Sharing Without Pre-processingCryptology and Network Security10.1007/978-981-97-8013-6_3(49-73)Online publication date: 24-Sep-2024
  • (2023)Content-Based Approach for Improving Bloom Filter EfficiencyApplied Sciences10.3390/app1313792213:13(7922)Online publication date: 6-Jul-2023
  • (2023)Popularity Cuckoo Filter: Always Keeping Popular Items in MindAlgorithms and Architectures for Parallel Processing10.1007/978-981-97-0808-6_25(428-445)Online publication date: 20-Oct-2023
  • (2021)A four-dimensional analysis of partitioned approximate filtersProceedings of the VLDB Endowment10.14778/3476249.347628614:11(2355-2368)Online publication date: 27-Oct-2021
  • (2021)Compressed Oblivious Encoding for Homomorphically Encrypted SearchProceedings of the 2021 ACM SIGSAC Conference on Computer and Communications Security10.1145/3460120.3484792(2277-2291)Online publication date: 12-Nov-2021
  • (2020)Neural Serendipity RecommendationACM Transactions on Knowledge Discovery from Data10.1145/339660714:4(1-25)Online publication date: 16-Jun-2020
  • Show More Cited By

View Options

Login options

View options

PDF

View or Download as a PDF file.

PDF

eReader

View online with eReader.

eReader

Media

Figures

Other

Tables

Share

Share

Share this Publication link

Share on social media