Page 434 - 《软件学报》2025年第7期
P. 434

王瀚橙 等: 无锁并发布谷鸟过滤器                                                               3355


                  [8]  Dai HP, Li M, Liu AX, Zheng JQ, Chen GH. Finding persistent items in distributed datasets. IEEE/ACM Trans. on Networking, 2020,
                     28(1): 1–14. [doi: 10.1109/TNET.2019.2946417]
                  [9]  Zhao QC, Huang C, Dai LH. VULDEFF: Vulnerability detection method based on function fingerprints and code differences. Knowledge-
                     based Systems, 2023, 260: 110139. [doi: 10.1016/J.KNOSYS.2022.110139]
                 [10]  Yang  JS,  Jia  WC,  Gao  Z,  Guo  ZH,  Zhou  Y,  Pan  Z.  Cuckoo-store  engine:  A  Reed-Solomon  code-based  ledger  storage  optimization
                     scheme for blockchain-enabled IoT. Electronics, 2023, 12(15): 3328. [doi: 10.3390/electronics12153328]
                 [11]  Sajitha M, Kavitha D, Reddy PC. An optimized clone node detection in WSN using cuckoo filter. SN Computer Science, 2023, 4(2): 167.
                     [doi: 10.1007/S42979-022-01586-Z]
                 [12]  The Apache software foundation. Bloom filter index. 2022. https://doris.apache.org/docs/1.2/data-table/index/bloomfilter/
                 [13]  Honarkhah  M,  Talebzadeh  A.  HyperLogLog  in  presto:  A  significantly  faster  way  to  handle  cardinality  estimation.  2018.  https://
                     engineering.fb.com/2018/12/13/data-infrastructure/hyperloglog/
                 [14]  Ray  N,  Yang  FJ.  How  we  scaled  HyperLogLog:  Three  real-world  optimizations.  2014.  https://metamarkets.com/2014/engineering-
                     hyperloglog-optimizations-for-real-world-systems/
                 [15]  Ghemawat S, Dean J. LevelDB. 2023. https://github.com/google/leveldb
                 [16]  Meta Inc. Rocksdb. 2023. https://github.com/facebook/rocksdb
                 [17]  Gu R, Li SM, Dai HP, Wang HC, Luo YL, Fan B, Basat RB, Wang K, Song ZY, Chen SW, Wang BN, Huang YH, Chen GH. Adaptive
                     online cache capacity optimization via lightweight working set size estimation at scale. In: Proc. of the 2023 USENIX Annual Technical
                     Conf. Boston: USENIX Association, 2023. 467–484.
                 [18]  Sutter H. The free lunch is over: A fundamental turn toward concurrency in software. Dr. Dobb’s Journal, 2005, 30(3): 202–210.
                 [19]  Lü TG, Hong RC, He J, Hu SJ. Multimodal-guided local feature selection for few-shot learning. Ruan Jian Xue Bao/Journal of Software,
                     2023, 34(5): 2068–2082 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6771.htm [doi: 10.13328/j.cnki.jos.006771]
                 [20]  Liu RC, Zhang JC, Luo YP, Jin PQ. Heterogeneous index for non-volatile memory. Ruan Jian Xue Bao/Journal of Software, 2022, 33(3):
                     832–848 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6456.htm [doi: 10.13328/j.cnki.jos.006456]
                 [21]  Fu  PT,  Luo  LL,  Guo  DK,  Zhao  X,  Li  SS,  Wang  HM.  Jump  filter:  Dynamic  sketch  design  for  big  data  governance.  Ruan  Jian  Xue
                     Bao/Journal of Software, 2023, 34(3): 1193–1212 (in Chinese with English abstract). http://www.jos.org.cn/1000-9825/6782.htm [doi: 10.
                     13328/j.cnki.jos.006782]
                 [22]  Li XZ, Andersen DG, Kaminsky M, Freedman MJ. Algorithmic improvements for fast concurrent cuckoo hashing. In: Proc. of the 9th
                     European Conf. on Computer Systems. Amsterdam: ACM, 2014. 27. [doi: 10.1145/2592798.2592820]
                 [23]  Rinberg A, Spiegelman A, Bortnikov E, Hillel E, Keidar I, Rhodes L, Serviansky H. Fast concurrent data sketches. In: Proc. of the 25th
                     ACM SIGPLAN Symp. on Principles and Practice of Parallel Programming. San Diego: ACM, 2020. 117–129. [doi: 10.1145/3332466.
                     3374512]
                 [24]  Arpaci-Dusseau RH, Arpaci-Dusseau AC. Operating Systems: Three Easy Pieces. North Charleston: CreateSpace Independent Publishing
                     Platform, 2018.
                 [25]  Abraham S, Peter BG, Greg G. Operating System Concepts. 10th ed., Hoboken: John Wiley & Sons, 2018.
                 [26]  The Apache Software Foundation. Atomic instructions. 2023. https://brpc.incubator.apache.org/docs/rpc-in-depth/atomic-instructions/
                 [27]  Bloom BH. Space/time trade-offs in hash coding with allowable errors. Communications of the ACM, 1970, 13(7): 422–426. [doi: 10.
                     1145/362686.362692]
                 [28]  Xie K, Wen JG, Zhang DF, Xie GG. Bloom filter query algorithm. Ruan Jian Xue Bao/Journal of Software, 2009, 20(1): 96–108 (in
                     Chinese with English abstract). http://www.jos.org.cn/1000-9825/3458.htm [doi: 10.3724/SP.J.1001.2009.03458]
                 [29]  Wang HC, Dai HP, Li M, Yu J, Gu R, Zheng JQ, Chen GH. Bamboo filters: Make resizing smooth. In: Proc. of the 38th IEEE Int’l Conf.
                     on Data Engineering. Kuala Lumpur: IEEE, 2022. 979–991. [doi: 10.1109/ICDE53745.2022.00078]
                 [30]  Fan B, Andersen DG, Kaminsky M, Mitzenmacher MD. Cuckoo filter: Practically better than bloom. In: Proc. of the 10th ACM Int’l on
                     Conf. on Emerging Networking Experiments and Technologies. Sydney: ACM, 2014. 75–88. [doi: 10.1145/2674005.2674994]
                 [31]  Voras I, Žagar M. Adapting the bloom filter to multithreaded environments. In: Proc. of the 15th IEEE Mediterranean Electrotechnical
                     Conf. Valletta: IEEE, 2010. 1488–1493. [doi: 10.1109/MELCON.2010.5476244]
                 [32]  Pandey P, Conway A, Durie J, Bender MA, Farach-Colton M, Johnson R. Vector quotient filters: Overcoming the time/space trade-off in
                     filter design. In: Proc. of the 2021 Int’l Conf. on Management of Data. ACM, 2021. 1386–1399. [doi: 10.1145/3448016.3452841]
                 [33]  Bender MA, Farach-Colton M, Johnson R, Karner R, Kuszmaul BC, Medjedovic D, Montes P, Shetty P, Spillane RP, Zadok E. Don’t
                     thrash: How to cache your hash on flash. Proc. of the VLDB Endowment, 2012, 5(11): 1627–1637. [doi: 10.14778/2350229.2350275]
                 [34]  Pandey P, Bender MA, Johnson R, Patro R. A general-purpose counting filter: Making every bit count. In: Proc. of the 2017 ACM Int’l
   429   430   431   432   433   434   435   436   437   438   439