logoalt Hacker News

gopalvlast Friday at 4:22 PM1 replyview on HN

> But for just the cost of doubling our space, we can use two Bloom filters!

We can optimize the hash function to make it more space efficient.

Instead of using remainders to locate filter positions, we can use a mersenne prime number mask (like say 31), but in this case I have a feeling the best hash function to use would be to mask with (2^1)-1.


Replies

AlotOfReadinglast Friday at 5:47 PM

This produced strange results on my ternary computer. I had to use a recursive popcnt instead.

show 1 reply