Check out the new USENIX Web site. next up previous
Next: 3.5 Cryptographic details Up: 3 Implementation Previous: 3.3 Capabilities


3.4 Bloom filter parameters

We use two 32KB bloom filters (262,144 bits each). We determined the other parameters by optimizing, using statistical simulation, for the maximum number of requests on average that can be supported per epoch subject to a maximum false-positive rate, measured over the last 1,000 requests, of 0.1%. The resulting parameters--$ n=9$ hash functions and about 47% of bits used in a full filter--yield epochs lasting 18,640 requests on average, or 30 minutes under the request rate of the trace used in Section 4.1.



Mark Lillibridge 2003-01-06