{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T02:26:58Z","timestamp":1743733618968,"version":"3.37.3"},"reference-count":43,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2016,5,2]],"date-time":"2016-05-02T00:00:00Z","timestamp":1462147200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2016,5,2]],"date-time":"2016-05-02T00:00:00Z","timestamp":1462147200000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100004318","name":"Microsoft","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100004318","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1409416"],"award-info":[{"award-number":["1409416"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["0964471"],"award-info":[{"award-number":["0964471"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Science Foundation","award":["1319527"],"award-info":[{"award-number":["1319527"]}]},{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"crossref","award":["FA8750- 11-2-0084"],"award-info":[{"award-number":["FA8750- 11-2-0084"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Cluster Comput"],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1007\/s10586-016-0567-8","type":"journal-article","created":{"date-parts":[[2016,5,2]],"date-time":"2016-05-02T10:39:01Z","timestamp":1462185541000},"page":"879-892","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":9,"title":["Idempotent distributed counters using a forgetful bloom filter"],"prefix":"10.1007","volume":"19","author":[{"given":"Rajath","family":"Subramanyam","sequence":"first","affiliation":[]},{"given":"Indranil","family":"Gupta","sequence":"additional","affiliation":[]},{"given":"Luke M.","family":"Leslie","sequence":"additional","affiliation":[]},{"given":"Wenting","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,2]]},"reference":[{"issue":"2","key":"567_CR1","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1145\/1773912.1773922","volume":"44","author":"A Lakshman","year":"2010","unstructured":"Lakshman, A., Malik, P.: Cassandra: a decentralized structured storage system. SIGOPS Oper. Syst. Rev. 44(2), 35\u201340 (2010). doi:\n                    10.1145\/1773912.1773922","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"567_CR2","unstructured":"The Apache Cassandra Project. \n                    http:\/\/cassandra.apache.org\n                    \n                  . Accessed 11 May 2011"},{"key":"567_CR3","unstructured":"RIAK. \n                    http:\/\/basho.com\n                    \n                  . Accessed 11 May 2011"},{"key":"567_CR4","unstructured":"Chang, F., Dean, J., Ghemawat, S., Hsieh, W.C., Wallach, D.A., Burrows, M., Chandra, T., Fikes, A., Gruber, R.E.: Bigtable: a distributed storage system for structured data. In: Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation, vol. 7, pp. 15\u201315. ser. OSDI \u201906. USENIX Association, Berkeley (2006). \n                    http:\/\/dl.acm.org\/citation.cfmid=1267308.1267323"},{"issue":"6","key":"567_CR5","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1145\/1323293.1294281","volume":"41","author":"G DeCandia","year":"2007","unstructured":"DeCandia, G., Hastorun, D., Jampani, M., Kakulapati, G., Lakshman, A., Pilchin, A., Sivasubramanian, S., Vosshall, P., Vogels, W.: Dynamo: amazon\u2019s highly available key-value store. SIGOPS Oper. Syst. Rev. 41(6), 205\u2013220 (2007). doi:\n                    10.1145\/1323293.1294281","journal-title":"SIGOPS Oper. Syst. Rev."},{"key":"567_CR6","unstructured":"AWS | Dynamo DB - NoSQL Cloud Database Service. \n                    http:\/\/aws.amazon.com\/dynamodb\n                    \n                  . Accessed 11 May 2015"},{"key":"567_CR7","unstructured":"Using a counter. \n                    http:\/\/www.datastax.com\/documentation\/cql\/3.0\/cql\/cqlXXSlahUndXXusing\/useXXSlahUndXXcounterXXSlahUndXXt.html\n                    \n                  . Accessed 11 May 2015"},{"key":"567_CR8","unstructured":"Counters in RIAK 1.4. \n                    http:\/\/basho.com\/counters-in-riak-1-4\n                    \n                  . Accessed 11 May 2015"},{"key":"567_CR9","unstructured":"Databases | Research at Facebook. \n                    https:\/\/research.facebook.com\/databases\n                    \n                  . Accessed 11 May 2015"},{"key":"567_CR10","unstructured":"\u201cRainbird: Real-time analytics at Twitter.\u201d \n                    http:\/\/cdn.oreillystatic.com\/en\/assets\/1\/event\/55\/Realtime%20Analytics%20at%20Twitter%20Presentation.pdf\n                    \n                  . Accessed 11 May 2015"},{"issue":"1","key":"567_CR11","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1145\/2080.357392","volume":"2","author":"AD Birrell","year":"1984","unstructured":"Birrell, A.D., Nelson, B.J.: Implementing remote procedure calls. ACM Trans. Comput. Syst. 2(1), 39\u201359 (1984). doi:\n                    10.1145\/2080.357392","journal-title":"ACM Trans. Comput. Syst."},{"key":"567_CR12","unstructured":"[CASSANDRA-2495] Add a proper retry mechanism for counters in case of failed requests. \n                    https:\/\/issues.apache.org\/jira\/browse\/CASSANDRA-2495\n                    \n                  . Accessed 11 May 2015"},{"issue":"7","key":"567_CR13","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/362686.362692","volume":"13","author":"BH Bloom","year":"1970","unstructured":"Bloom, B.H.: Space\/time trade-offs in hash coding with allowable errors. Commun. ACM 13(7), 422\u2013426 (1970). doi:\n                    10.1145\/362686.362692","journal-title":"Commun. ACM"},{"key":"567_CR14","unstructured":"Wikipedia, \u201cBloom filter.\u201d \n                    http:\/\/en.wikipedia.org\/wiki\/BloomXXSlahUndXXfilter\n                    \n                   (2015). Accessed 11 May 2015"},{"issue":"3","key":"567_CR15","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1109\/90.851975","volume":"8","author":"L Fan","year":"2000","unstructured":"Fan, L., Cao, P., Almeida, J., Broder, A.Z.: Summary cache: a scalable wide-area web cache sharing protocol. IEEE ACM Trans. Netw. 8(3), 281\u2013293 (2000). doi:\n                    10.1109\/90.851975","journal-title":"IEEE ACM Trans. Netw."},{"key":"567_CR16","doi-asserted-by":"crossref","unstructured":"Jacobson, V.: Congestion avoidance and control. In: Symposium Proceedings on Communications Architectures and Protocols. ser. SIGCOMM \u201988, pp. 314\u2013329. ACM, New York, 1988. \n                    http:\/\/doi.acm.org\/10.1145\/52324.52356","DOI":"10.1145\/52324.52356"},{"issue":"4","key":"567_CR17","doi-asserted-by":"publisher","first-page":"485","DOI":"10.1080\/15427951.2004.10129096","volume":"1","author":"A Broder","year":"2004","unstructured":"Broder, A., Mitzenmacher, M.: Network applications of bloom filters: a survey. Internet Math. 1(4), 485\u2013509 (2004)","journal-title":"Internet Math."},{"key":"567_CR18","unstructured":"Karger, D., Lehman, E., Leighton, T., Panigrahy, R., Levine, M., Lewin, D.: Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the world wide web. In: Proceedings of the 29th Annual ACM Symposium on Theory of Computing. ser. STOC \u201997, pp. 654\u2013663. ACM, New York, 1997. \n                    http:\/\/doi.acm.org\/10.1145\/258533.258660"},{"key":"567_CR19","unstructured":"Counters in Cassandra. \n                    http:\/\/wiki.apache.org\/cassandra\/CountersHrBHrB\n                    \n                  . Accessed 11 May 2015"},{"key":"567_CR20","unstructured":"Durability Cassandra. \n                    http:\/\/wiki.apache.org\/cassandra\/DurabilityHrBHrB\n                    \n                  . Accessed 11 May 2014"},{"key":"567_CR21","unstructured":"MemTable in Cassandra. \n                    http:\/\/wiki.apache.org\/cassandra\/MemtableSSTable\n                    \n                  . Accessed 11 May 2015"},{"key":"567_CR22","unstructured":"Partitioned Counters Design Document. \n                    https:\/\/issues.apache.org\/jira\/secure\/attachment\/12459754\/Partitionedcountersdesigndoc.pdf\n                    \n                  . Accessed 11 May 2015"},{"key":"567_CR23","unstructured":"Read Repair on Apache Cassandra Wiki. \n                    http:\/\/wiki.apache.org\/cassandra\/ReadRepair\n                    \n                  . Accessed 11 May 2015"},{"key":"567_CR24","unstructured":"Anti-entropy on apache cassandra Wiki. \n                    https:\/\/wiki.apache.org\/cassandra\/AntiEntropy\n                    \n                  . Accessed 11 May 2015"},{"issue":"6","key":"567_CR25","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1145\/1466443.1466448","volume":"6","author":"W Vogels","year":"2008","unstructured":"Vogels, W.: Eventually consistent. Queue 6(6), 14\u201319 (2008). doi:\n                    10.1145\/1466443.1466448","journal-title":"Queue"},{"key":"567_CR26","unstructured":"SSTable in Cassandra. \n                    http:\/\/wiki.apache.org\/cassandra\/MemtableHrBSSTableHrB\n                    \n                  . Accessed 16 Dec 2015"},{"key":"567_CR27","unstructured":"A C++ Cassandra simulator. \n                    https:\/\/github.com\/rajath26\/CassandraHrBSimulatorHrB\n                    \n                  . Accessed 11 May 2015"},{"key":"567_CR28","unstructured":"Network emulation testbed home. \n                    https:\/\/www.emulab.net\/\n                    \n                  . Accessed 11 May 2015"},{"key":"567_CR29","unstructured":"Architecture internals on Cassandra Wiki. \n                    https:\/\/wiki.apache.org\/cassandra\/ArchitectureInternals\n                    \n                  . Accessed 11 July 2015"},{"key":"567_CR30","unstructured":"Java Driver 2.0 for apache Cassandra. \n                    http:\/\/docs.datastax.com\/en\/developer\/java-driver\/2.0\/java-driver\/whatsNew2.html\n                    \n                  . Accessed 11 July 2015"},{"key":"567_CR31","unstructured":"Datastax Java Driver for Apache Cassandra on Github. \n                    https:\/\/github.com\/datastax\/java-driver\n                    \n                  . Accessed 11 May 2015"},{"key":"567_CR32","unstructured":"Keyspace docuemntation on Datastax. \n                    http:\/\/docs.datastax.com\/en\/cql\/3.0\/cql\/cqlXXSlahUndXXreference\/createXXSlahUndXXkeyspaceXXSlahUndXXr.html\n                    \n                  . Accessed 11 July 2015"},{"key":"567_CR33","unstructured":"Couchbase. \n                    http:\/\/www.couchbase.com\/\n                    \n                  . Accessed 11 May 2015"},{"key":"567_CR34","unstructured":"Shapiro, M., Pregui\u00e7a, N., Baquero, C., Zawirski, M.: Conflict-free replicated data types. In: Proceedings of the 13th International Conference on Stabilization, Safety, and Security of Distributed Systems, ser. SSS\u201911, pp. 386\u2013400. Springer, Berlin, 2011. \n                    http:\/\/dl.acm.org\/citation.cfmid=2050613.2050642"},{"key":"567_CR35","unstructured":"What\u2019s new in Cassandra 2.1: better implementation of counters. \n                    http:\/\/www.datastax.com\/dev\/blog\/whats-new-in-cassandra-2-1-a-better-implementation-of-counters\n                    \n                  . Accessed 16 Dec 2014"},{"key":"567_CR36","unstructured":"No more over-counting: making apache storm counters easy and idempotent using kafka and redis. \n                    https:\/\/blog.deck36.de\/no-more-over-counting-\/\/making-counters-in-apache-storm-idempotent-using-redis-hyperloglog\/\n                    \n                  . Accessed 11 May 2015"},{"key":"567_CR37","unstructured":"Redis. \n                    http:\/\/redis.io\/\n                    \n                  . Accessed 11 May 2015"},{"key":"567_CR38","unstructured":"Apache Kafka. \n                    http:\/\/kafka.apache.org\/\n                    \n                  . Accessed 11 May 2015"},{"key":"567_CR39","unstructured":"Rhea, S.C., Kubiatowicz, J.: Probabilistic location and routing (2002)"},{"key":"567_CR40","unstructured":"Mitzenmacher, M.: Compressed bloom filters. In: Proceedings of the 20th Annual ACM Symposium on Principles of Distributed Computing, ser. PODC \u201901, pp. 144\u2013150. ACM, New York (2001). \n                    http:\/\/doi.acm.org\/10.1145\/383962.384004"},{"key":"567_CR41","unstructured":"Bonomi, F., Mitzenmacher, M., Panigrahy, R., Singh, S., Varghese, G.: An improved construction for counting bloom filters. In: Proceedings of the 14th Conference on Annual European Symposium, ser. ESA\u201906, vol. 14, pp. 684\u2013695. Springer, London (2006). \n                    http:\/\/dx.doi.org\/10.1007\/11841036XXSlahUndXX61"},{"key":"567_CR42","unstructured":"Cohen, S., Matias, Y.: Spectral bloom filters. In: Proceedings of the 2003 ACM SIGMOD International Conference on Management of Data, ser. SIGMOD \u201903, pp. 241\u2013252. ACM, New York (2003). \n                    http:\/\/doi.acm.org\/10.1145\/872757.872787"},{"key":"567_CR43","unstructured":"Deng, F., Rafiei, D.: Approximately detecting duplicates for streaming data using stable bloom filters. In: Proceedings of the 2006 ACM SIGMOD International Conference on Management of Data, ser. SIGMOD \u201906, pp. 25\u201336. ACM, New York (2006). \n                    http:\/\/doi.acm.org\/10.1145\/1142473.1142477"}],"container-title":["Cluster Computing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10586-016-0567-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-016-0567-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-016-0567-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10586-016-0567-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,17]],"date-time":"2020-05-17T15:15:02Z","timestamp":1589728502000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10586-016-0567-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,2]]},"references-count":43,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2016,6]]}},"alternative-id":["567"],"URL":"https:\/\/doi.org\/10.1007\/s10586-016-0567-8","relation":{},"ISSN":["1386-7857","1573-7543"],"issn-type":[{"type":"print","value":"1386-7857"},{"type":"electronic","value":"1573-7543"}],"subject":[],"published":{"date-parts":[[2016,5,2]]},"assertion":[{"value":"16 January 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"23 March 2016","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"4 April 2016","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 May 2016","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}