This note deals with a paper by Gremillion demonstrating the simulation approach to the design of a Bloom filter. It is shown that an analytical approach can yield insights into competing filter design and give expected values for the goodness-of-hash transformations not available with simulation. On the other hand, simulation gives insight into what can be expected with available hash transformation not available from an analytic approach. © 1983, ACM. All rights reserved.
CITATION STYLE
Mullin, J. K. (1983). A second look at bloom filters. Communications of the ACM, 26(8), 570–571. https://doi.org/10.1145/358161.358167
Mendeley helps you to discover research relevant for your work.