Cuckoo filter: Practically better than bloom

B Fan, DG Andersen, M Kaminsky… - Proceedings of the 10th …, 2014 - dl.acm.org
In many networking systems, Bloom filters are used for high-speed set membership tests.
They permit a small fraction of false positive answers with very good space efficiency …

SlimDB: A space-efficient key-value storage engine for semi-sorted data

K Ren, Q Zheng, J Arulraj, G Gibson - Proceedings of the VLDB …, 2017 - dl.acm.org
Modern key-value stores often use write-optimized indexes and compact in-memory indexes
to speed up read and write performance. One popular write-optimized index is the Log …

Matching recovery threshold for correlated random graphs

J Ding, H Du - The Annals of Statistics, 2023 - projecteuclid.org
Matching recovery threshold for correlated random graphs Page 1 The Annals of Statistics
2023, Vol. 51, No. 4, 1718–1743 https://doi.org/10.1214/23-AOS2305 © Institute of …

Detection threshold for correlated Erdős-Rényi graphs via densest subgraph

J Ding, H Du - IEEE Transactions on Information Theory, 2023 - ieeexplore.ieee.org
The problem of detecting edge correlation between two Erdős-Rényi random graphs on
unlabeled nodes can be formulated as a hypothesis testing problem: under the null …

Consistent hashing with bounded loads

V Mirrokni, M Thorup, M Zadimoghaddam - … of the Twenty-Ninth Annual ACM …, 2018 - SIAM
In dynamic load balancing, we wish to allocate a set of clients (balls) to a set of servers
(bins) with the goal of minimizing the maximum load of any server and also minimizing the …

Hashing, load balancing and multiple choice

U Wieder - … and Trends® in Theoretical Computer Science, 2017 - nowpublishers.com
Many tasks in computer systems could be abstracted as distributing items into buckets, so
that the allocation of items across buckets is as balanced as possible, and furthermore …

The consistent cuckoo filter

L Luo, D Guo, O Rottenstreich, RTB Ma… - … -IEEE Conference on …, 2019 - ieeexplore.ieee.org
The emergence of large-scale dynamic sets in networking applications attaches stringent
requirements to approximate set representation. The existing data structures (including …

ShockHash: Towards optimal-space minimal perfect hashing beyond brute-force

HP Lehmann, P Sanders, S Walzer - 2024 Proceedings of the Symposium on …, 2024 - SIAM
A minimal perfect hash function (MPHF) maps a set S of n keys to the first n integers without
collisions. There is a lower bound of n log2 ℓ—O (log n) bits of space needed to represent …

MCFsyn: A multi-party set reconciliation protocol with the marked cuckoo filter

L Luo, D Guo, Y Zhao, O Rottenstreich… - … on Parallel and …, 2021 - ieeexplore.ieee.org
Multi-party set reconciliation is a key component in distributed and networking systems. It
naturally contains two dimensions, ie, set representation and reconciliation protocol …

Peeling close to the orientability threshold–spatial coupling in hashing-based data structures

S Walzer - Proceedings of the 2021 ACM-SIAM Symposium on …, 2021 - SIAM
In multiple-choice data structures each element x in a set S of m keys is associated with a
random set e (x)⊆[n] of buckets with capacity ℓ≥ 1 by hash functions. This setting is …