skip to main content
article
Free Access

Designing a Bloom filter for differential file access

Published:01 September 1982Publication History
Skip Abstract Section

Abstract

The use of a differential file for a database update can yield integrity and performance benefits, but it can also present problems in providing current data to subsequent accessing transactions. A mechanism known as a Bloom filter can solve these problems by preventing most unnecessary searches of the differential file. Here, the design process for a Bloom filter for an on-line student database is described, and it is shown that a very effective filter can be constructed with a modest expenditure of system resources.

References

  1. 1 Bloom, B.H. Space/time tradeoffs in hash coding with allowable errors. Comm. ACM 13, 7 (July 1970), 422-426. How hash coding methods which involve a small but tolerable error rate can be used to reduce the amount of space required for hash coded information. Google ScholarGoogle ScholarDigital LibraryDigital Library
  2. 2 Martin, J. Computer Data Base Organization. Prentice-Hall, Englewood Cliffs, N.J., 1977, pp. 382-385. A comprehensive textbook on the physical and logical design of databases. Google ScholarGoogle ScholarDigital LibraryDigital Library
  3. 3 Rappaport, R.L. File structure design to facilitate on-line instantaneous updating. Proc. 1975 ACM SIGMOD Conf., San Jose, Calif., May 1975, pp. 1-14. Desc-;bes a system that uses a type of differential file to facilitate database recovery after power failures. Google ScholarGoogle ScholarDigital LibraryDigital Library
  4. 4 Severance, D.G., and Lob_man, G.M. Differential files: Their application to the maintenance of large databases. A CM Trans. Database Systs. 11, 3 (Sept. 1976), 257-267. Discusses the uses and advantages of differential files for database modifications. Google ScholarGoogle ScholarDigital LibraryDigital Library

Index Terms

  1. Designing a Bloom filter for differential file access

      Recommendations

      Comments

      Login options

      Check if you have access through your login credentials or your institution to get full access on this article.

      Sign in

      Full Access

      • Published in

        cover image Communications of the ACM
        Communications of the ACM  Volume 25, Issue 9
        Sept 1982
        71 pages
        ISSN:0001-0782
        EISSN:1557-7317
        DOI:10.1145/358628
        Issue’s Table of Contents

        Copyright © 1982 ACM

        Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

        Publisher

        Association for Computing Machinery

        New York, NY, United States

        Publication History

        • Published: 1 September 1982

        Permissions

        Request permissions about this article.

        Request Permissions

        Check for updates

        Qualifiers

        • article

      PDF Format

      View or Download as a PDF file.

      PDF

      eReader

      View online with eReader.

      eReader