is_occupied表示是否已经有商号对应该槽,如果是被迫转移过来的,那么不应该将其设置成1,只有在计算出某个商号对应该槽号后,才将其设置成1
is_continuation不是放在自己本身的槽中,被迫后移,与前面的元素形成连续集群
is_shifed 是不是放在与自己商号对应的槽中,如果不是,被迫后移动的,那么将该状态设置成1
Quotient Filter
- The QF is a space-efficient and cache-friendly probabilistic data structure that uses the quotienting technique of hashing [12] to store a set S⊂U efficiently. Mapping is done for every element × ∈S to h(x), where h(x) is a primary hash function resulting in a set of p bits named as the fingerprint of x, that is, h(x)↦{0,…,2P−1}⇒fp(x).
- fp(x) is an open hash table with m=2q buckets where each bucket has (r+3) bits. In fp(x), the least significant bits are denoted by r, and the most significant bits in quotienting are represented by q=(p−r). Insertion operation in the QF is performed by computing the quotient fq←(⌊fp(x)/2r⌋) and remainder fr←(fp(x)mod 2r) of every considered element. Here, the index of the bucket used for inserting an element is denoted by fq, whereas fr represents a value inserted in the bucket fq.
- Two important terms used for identifying the appropriate positions for insertion and querying in QF are run and cluster. Run refers to a scenario where remainders of different fingerprints having the same fq are stored contiguously, that is, fq of two items collide but fr are distinct. Such collisions are resolved through linear probing. In such scenarios, remainders associated with different fq are shifted and corresponding meta-data bits are updated for each bucket if required. A cluster is a sequence of one or more consecutive runs with no empty bucket between them. A cluster is immediately followed by an empty slot.
- A general observation is that a Bloom filter (BF) has more hashing functions as compared to a QF. Since hash functions are generated only once per QF and every signature is implemented using one location, single-memory access is required to check the presence of a signature. Thus, in comparison to BF, QF has higher throughput.
参考:
[1].博客
[2].Edge Computing-Based Security Framework for Big Data Analytics in VANETs