Optimizing bloom filter: Challenges, solutions, and comparisons

L Luo, D Guo, RTB Ma… - … Surveys & Tutorials, 2018 - ieeexplore.ieee.org
Bloom filter (BF) has been widely used to support membership query, ie, to judge whether a
given element x is a member of a given set S or not. Recent years have seen a flourish …

A large-scale analysis of hundreds of in-memory key-value cache clusters at twitter

J Yang, Y Yue, KV Rashmi - ACM Transactions on Storage (TOS), 2021 - dl.acm.org
Modern web services use in-memory caching extensively to increase throughput and reduce
latency. There have been several workload analyses of production systems that have fueled …

Elastic sketch: Adaptive and fast network-wide measurements

T Yang, J Jiang, P Liu, Q Huang, J Gong… - Proceedings of the …, 2018 - dl.acm.org
When network is undergoing problems such as congestion, scan attack, DDoS attack, etc.,
measurements are much more important than usual. In this case, traffic characteristics …

Netcache: Balancing key-value stores with fast in-network caching

X Jin, X Li, H Zhang, R Soulé, J Lee, N Foster… - Proceedings of the 26th …, 2017 - dl.acm.org
We present NetCache, a new key-value store architecture that leverages the power and
flexibility of new-generation programmable switches to handle queries on hot items and …

The design and implementation of open {vSwitch}

B Pfaff, J Pettit, T Koponen, E Jackson, A Zhou… - … USENIX symposium on …, 2015 - usenix.org
We describe the design and implementation of Open vSwitch, a multi-layer, open source
virtual switch for all major hypervisor platforms. Open vSwitch was designed de novo for …

Cuckoo filter: Practically better than bloom

B Fan, DG Andersen, M Kaminsky… - Proceedings of the 10th …, 2014 - dl.acm.org
In many networking systems, Bloom filters are used for high-speed set membership tests.
They permit a small fraction of false positive answers with very good space efficiency …

Wisckey: Separating keys from values in ssd-conscious storage

L Lu, TS Pillai, H Gopalakrishnan… - ACM Transactions On …, 2017 - dl.acm.org
We present WiscKey, a persistent LSM-tree-based key-value store with a performance-
oriented data layout that separates keys from values to minimize I/O amplification. The …

{FaRM}: Fast remote memory

A Dragojević, D Narayanan, M Castro… - 11th USENIX Symposium …, 2014 - usenix.org
We describe the design and implementation of FaRM, a new main memory distributed
computing platform that exploits RDMA to improve both latency and throughput by an order …

In-memory big data management and processing: A survey

H Zhang, G Chen, BC Ooi, KL Tan… - IEEE Transactions on …, 2015 - ieeexplore.ieee.org
Growing main memory capacity has fueled the development of in-memory big data
management and processing. By eliminating disk I/O bottleneck, it is now possible to support …

Using RDMA efficiently for key-value services

A Kalia, M Kaminsky, DG Andersen - … of the 2014 ACM Conference on …, 2014 - dl.acm.org
This paper describes the design and implementation of HERD, a key-value system designed
to make the best use of an RDMA network. Unlike prior RDMA-based key-value systems …