249
Views
1
CrossRef citations to date
0
Altmetric
Original Articles

Cluster-based distributed dynamic cuckoo filter system for Redis

ORCID Icon, , &
Pages 340-353 | Received 27 Dec 2018, Accepted 23 Mar 2019, Published online: 02 Apr 2019

References

  • Carlson JL. Redis in action. Greenwich (CT): Manning Publications Co.; 2013.
  • Oliveira F. Redis cookbook. Sebastopol (CA): O'Reilly; 2011.
  • Chen S, Tang X, Wang H, et al. Towards scalable and reliable in-memory storage system: A case study with Redis. 2016 IEEE Trustcom/BigDataSE/ISPA; 2016. p. 1660–1667.
  • Liu TS, Li J, Cao QN. Study on a network communication optimization algorithm of P2P mode. International Conference on Artificial Intelligence and Computational Intelligence. Shanghai (China): IEEE Computer Society; 2009. p. 212–217.
  • Kiss SZ, Hosszu É, Tapolcai J, et al. Bloom filter with a false positive free zone. IEEE INFOCOM 2018-IEEE Conference on Computer Communications. Honolulu (HI); 2018. p. 1412–1420.
  • Bonomi F, Mitzenmacher M, Panigrahy R, et al. An improved construction for counting Bloom filters. Eur Symp Algorithms. 2006;14(1):684–695.
  • Fan B, Andersen DG, Kaminsky M, et al. Cuckoo filter: practically better than bloom. ACM International on Conference on Emerging Networking Experiments and Technologies. Sydney (Australia); 2014. p. 75–88.
  • Fan B, Andersen DG, Kaminsky M, et al. Cuckoo filter. New York: The ACM International; 2014. p. 75-88.
  • Pagh R, Rodler FF. Cuckoo hashing. J Algorithms. 2004;51(2):122–144. doi: 10.1016/j.jalgor.2003.12.002
  • Chen H, Liao L, Jin H, et al. The dynamic cuckoo filter. IEEE International Conference on Network Protocols. Toronto (ON): IEEE Computer Society; 2017. p. 1–10.
  • Yan Y, Wu L, Gao G, et al. A dynamic integrity verification scheme of cloud storage data based on lattice and Bloom filter. J Inf Secur Appl. 2018;39(1):10–18.
  • Wei J, Jiang H, Zhou K, et al. DBA: a dynamic bloom filter array for scalable membership representation of variable large data sets. IEEE, International Symposium on Modeling, Analysis & Simulation of Computer and Telecommunication Systems. Singapore (Singapore); 2011. p. 466–468.
  • Huang TC, Chu KC, Lin JH, et al. Workload alleviation scheduling framework to alleviate negative performance impact of intermediate data skew in small-scale MapReduce cloud. 2018 International Conference on System Science and Engineering (ICSSE). New Taipei (Taiwan); 2018. p. 1–6.
  • Kirsch A, Mitzenmacher M. Less hashing, same performance: building a better Bloom filter. Random Struct Algorithms. 2008;33(2):187–218. doi: 10.1002/rsa.20208
  • Liu XG, Lee J, Wang G, et al. K-divided bloom filter algorithm and its analysis. IEEE; 2007.
  • Hua N, Zhao H, Lin B, et al. Rank-indexed hashing: a compact construction of Bloom filters and variants. IEEE International Conference on Network Protocols. Orlando (FL); 2008. p. 73–82.
  • Lin P, Wang F, Tan W, et al. Enhancing dynamic packet filtering technique with d-left counting bloom filter algorithm. Second International Conference on Intelligent Networks and Intelligent Systems. Tianjin (China): IEEE Computer Society; 2009. p. 530–533.
  • Bender MA, Farach-Colton M, Johnson R, et al. Don't thrash: how to cache your hash on flash. Proc VLDB Endowment. 2012;5(11):1627–1637. doi: 10.14778/2350229.2350275
  • Arbitman Y, Naor M, Segev G. Backyard Cuckoo hashing: constant worst-case operations with a succinct representation. IEEE Foundations of Computer Science; 2010. p. 787–796.
  • Devine R. Design and implementation of DDH: a distributed dynamic hashing algorithm. Foundations of Data Organization and Algorithms. Berlin: Springer; 1993. p. 101–114.
  • Li Q, Wang K, Wei S, et al. A data placement strategy based on clustering and consistent hashing algorithm in cloud computing. International Conference on Communications and Networking in China. Maoming (China); 2015. p. 478–483.
  • Qiu N, Hu X, Wang P, et al. Research on Optimization strategy to data Clustered storage of consistent hashing algorithm. TELKOMNIKA. 2016;14(3):824. doi: 10.12928/telkomnika.v14i3.3550
  • Lu Y, Sun H, Wang X, et al. R-Memcached: a consistent cache replication scheme with Memcached. Posters & Demos Session, ACM; 2014. p. 29–30.
  • Cao NN, Hwang S, Kim J S. Making a case for the on-demand multiple distributed message queue system in a Hadoop cluster. Cluster Comput. 2017;20(3):2095–2106. doi: 10.1007/s10586-017-1031-0
  • Banino C, Beaumont O, Carter L, et al. Scheduling strategies for master-slave tasking on heterogeneous processor platforms. IEEE Trans Parallel Distrib Syst. 2013;15(4):319–330. doi: 10.1109/TPDS.2004.1271181

Reprints and Corporate Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

To request a reprint or corporate permissions for this article, please click on the relevant link below:

Academic Permissions

Please note: Selecting permissions does not provide access to the full text of the article, please see our help page How do I view content?

Obtain permissions instantly via Rightslink by clicking on the button below:

If you are unable to obtain permissions via Rightslink, please complete and submit this Permissions form. For more information, please visit our Permissions help page.