Question

The Bloom Filter has reasonably accurate computation for the false positive rate pkpk, assuming the kk...

The Bloom Filter has reasonably accurate computation for the false positive rate pkpk, assuming the kk hash functions are uniformly random is

pk=12×(1−(1−1m)kn)kpk=12×(1−(1−1m)kn)k

where nn is the number of values already added.

Also, the literature suggests trying to ensure  (1−(1−1m)kn)(1−(1−1m)kn) is close to 1/2.

Suppose you inserted 211,422 words into a Bloom Filter with 3 hash functions, and you will be searching 2,135 words.

By setting the size of the Bloom Filter to be 1,120,000 bits or 131,250 bytes, the false positive rate for the word list will be smaller than 10%

Select one:

True

False

0 0
Add a comment Improve this question Transcribed image text
Answer #1

The answer is True.

If you are sure in prior that you wanted the false positive rate (FP rate %) to be
smaller than some small value, then, the number of elements 'n' to be inserted can be determined based on k and m.

Ensure that (1 - (1-1/m)
kn) is constant which is close to 1/2.

In order to ensure a false positive rate (FP rate) of smaller than 10% (percentage) in a word list, please make sure to assign 'm' to at least 1,120,000 or 131,250 bytes.

Add a comment
Know the answer?
Add Answer to:
The Bloom Filter has reasonably accurate computation for the false positive rate pkpk, assuming the kk...
Your Answer:

Post as a guest

Your Name:

What's your source?

Earn Coins

Coins can be redeemed for fabulous gifts.

Not the answer you're looking for? Ask your own homework help question. Our experts will answer your question WITHIN MINUTES for Free.
Similar Homework Help Questions
  • 1 Objective Build a hashing algorithm that is suitable for use in a Bloom Filter. Please...

    1 Objective Build a hashing algorithm that is suitable for use in a Bloom Filter. Please note that while a cryptographic hash is quite common in many Bloom Filters, the hashing algorithm to be implemented is a mix of the the following algorithmic models, specifically, a multiply & rotate hash colloquially known as a murmur hash, and an AND, rolale, & XOR hash colloquially known as an ARX hash. 2 Requirements • Inputs. Read the input file which contains strings...

ADVERTISEMENT
Free Homework Help App
Download From Google Play
Scan Your Homework
to Get Instant Free Answers
Need Online Homework Help?
Ask a Question
Get Answers For Free
Most questions answered within 3 hours.
ADVERTISEMENT
ADVERTISEMENT
ADVERTISEMENT