{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T14:19:08Z","timestamp":1761401948643,"version":"3.37.3"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2018,4,11]],"date-time":"2018-04-11T00:00:00Z","timestamp":1523404800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Primary Research & Development Plan of China","award":["2016YFB1000304"],"award-info":[{"award-number":["2016YFB1000304"]}]},{"DOI":"10.13039\/501100012166","name":"National Basic Research Program of China","doi-asserted-by":"crossref","award":["2014CB340405"],"award-info":[{"award-number":["2014CB340405"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100001809","name":"NSFC","doi-asserted-by":"crossref","award":["61672061"],"award-info":[{"award-number":["61672061"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"the Open Project Funding of CAS Key Lab of Network Data Science and Technology, Institute of Computing Technology, Chinese Academy of Sciences."}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["World Wide Web"],"published-print":{"date-parts":[[2019,11]]},"DOI":"10.1007\/s11280-018-0546-5","type":"journal-article","created":{"date-parts":[[2018,4,11]],"date-time":"2018-04-11T02:35:51Z","timestamp":1523414151000},"page":"2675-2696","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["FID-sketch: an accurate sketch to store frequencies in data streams"],"prefix":"10.1007","volume":"22","author":[{"given":"Tong","family":"Yang","sequence":"first","affiliation":[]},{"given":"Haowei","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Muhammad","family":"Shahzad","sequence":"additional","affiliation":[]},{"given":"Xue","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Qin","family":"Xin","sequence":"additional","affiliation":[]},{"given":"Xiaoming","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,4,11]]},"reference":[{"key":"546_CR1","doi-asserted-by":"crossref","unstructured":"Aguilar-Saborit, J., Trancoso, P., Muntes-Mulero, V., Larriba-Pey, J. -L.: Dynamic count filters. ACM SIGMOD Record, pp\/ 26\u201332 (2006)","DOI":"10.1145\/1121995.1122000"},{"key":"546_CR2","doi-asserted-by":"crossref","unstructured":"Barman, D., Satapathy, P., Ciardo, G.: Detecting attacks in routers using sketches. In: Proceedings of the High Performance Switching and Routing (2007)","DOI":"10.1109\/HPSR.2007.4281248"},{"key":"546_CR3","doi-asserted-by":"crossref","unstructured":"Bu, T., Cao, J., Chen, A., Lee, P.P.: A fast and compact method for unveiling significant patterns in high speed networks. In: Proceedings of the IEEE INFOCOM, pp. 1893\u20131901 (2007)","DOI":"10.1109\/INFCOM.2007.220"},{"key":"546_CR4","doi-asserted-by":"crossref","unstructured":"Callegari, C., Cyprus, N.: Statistical approaches for network anomaly detection. In: Proceedings of the ICIMP (2009)","DOI":"10.1002\/sec.104"},{"issue":"2-3","key":"546_CR5","first-page":"199","volume":"10","author":"K Chakrabarti","year":"2000","unstructured":"Chakrabarti, K., Garofalakis, M., Rastogi, R., Shim, K.: Approximate query processing using wavelets. VLDB 10(2-3), 199\u2013223 (2000)","journal-title":"VLDB"},{"key":"546_CR6","doi-asserted-by":"crossref","unstructured":"Charikar, M., Chen, K., Farach-Colton, M.: Finding frequent items in data streams. In: Automata, Languages and Programming (2002)","DOI":"10.1007\/3-540-45465-9_59"},{"key":"546_CR7","doi-asserted-by":"crossref","unstructured":"Chen, A., Jin, Y., Cao, J., Li, L.E.: Tracking long duration flows in network traffic. In: Proceedings of the IEEE INFOCOM (2010)","DOI":"10.1109\/INFCOM.2010.5462244"},{"key":"546_CR8","unstructured":"Cisco visual networking index: Forecast and methodology, 2015\u20132020. CISCO White paper"},{"key":"546_CR9","doi-asserted-by":"crossref","unstructured":"Cohen, S., Matias, Y.: Spectral bloom filters. In: Proceedings of the ACM SIGMOD, pp. 241\u2013252 (2003)","DOI":"10.1145\/872757.872787"},{"key":"546_CR10","unstructured":"Cormode, G., Garofalakis, M.: Sketching streams through the net: Distributed approximate query tracking. In: Proceedings of the VLDB (2005)"},{"issue":"1","key":"546_CR11","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1016\/j.jalgor.2003.12.001","volume":"55","author":"G Cormode","year":"2005","unstructured":"Cormode, G., Muthukrishnan, S.: An improved data stream summary: the count-min sketch and its applications. J. Algorithm. 55(1), 58\u201375 (2005)","journal-title":"J. Algorithm."},{"key":"546_CR12","doi-asserted-by":"crossref","unstructured":"Cormode, G., Johnson, T., et al.: Holistic udafs at streaming speeds. In: Proceedings of the SIGMOD (2004)","DOI":"10.1145\/1007568.1007575"},{"issue":"2","key":"546_CR13","doi-asserted-by":"publisher","first-page":"1530","DOI":"10.14778\/1454159.1454225","volume":"1","author":"G Cormode","year":"2008","unstructured":"Cormode, G., Hadjieleftheriou, M.: Finding frequent items in data streams. Proc. VLDB 1(2), 1530\u20131541 (2008)","journal-title":"Proc. VLDB"},{"issue":"4","key":"546_CR14","doi-asserted-by":"publisher","first-page":"323","DOI":"10.1145\/964725.633056","volume":"32","author":"C Estan","year":"2002","unstructured":"Estan, C., Varghese, G.: New directions in traffic measurement and accounting. Proc. ACM SIGMCOMM 32(4), 323\u2013338 (2002)","journal-title":"Proc. ACM SIGMCOMM"},{"key":"546_CR15","doi-asserted-by":"crossref","unstructured":"Fan, L., Cao, P., Almeida, J., Broder, A.Z.: Summary cache: A scalable wide-area web cache sharing protocol. In: Proceedings of the ACM SIGCOMM (1998)","DOI":"10.1145\/285237.285287"},{"issue":"1","key":"546_CR16","first-page":"26","volume":"28","author":"G Kollios","year":"2005","unstructured":"Kollios, G., Byers, J.W., Considine, J., Hadjieleftheriou, M., Li, F.: Robust aggregation in sensor networks. IEEE Data Eng. Bull. 28(1), 26\u201332 (2005)","journal-title":"IEEE Data Eng. Bull."},{"issue":"4","key":"546_CR17","first-page":"277","volume":"13","author":"R Pike","year":"2005","unstructured":"Pike, R., Dorward, S., Griesemer, R., Quinlan, S.: Interpreting the data Parallel analysis with sawzall. Dyn. Grids Worldw. Comput. 13(4), 277\u2013298 (2005)","journal-title":"Dyn. Grids Worldw. Comput."},{"key":"546_CR18","unstructured":"Pitel, G., Fouquier, G.: Count-min-log sketch: Approximately counting with approximate counters. arXiv:\n1502.04885\n\n (2015)"},{"key":"546_CR19","doi-asserted-by":"crossref","unstructured":"Potti, N., Patel, J.M.: Daq: a new paradigm for approximate query processing. In: Proceedings of the VLDB (2015)","DOI":"10.14778\/2777598.2777599"},{"key":"546_CR20","doi-asserted-by":"crossref","unstructured":"Powers, D.M.: Applications and explanations of Zipf\u2019s law. In: Proceedings of the EMNLP-CoNLL. Association for Computational Linguistics (1998)","DOI":"10.3115\/1603899.1603924"},{"key":"546_CR21","unstructured":"Source code of FID sketches with CUDA implementation. \nhttps:\/\/github.com\/papers2016\/FID-sketch.git"},{"key":"546_CR22","doi-asserted-by":"crossref","unstructured":"Yang, T., Xie, G., Li, Y., et al.: Guarantee IP lookup performance with FIB explosion. In: Proceedings of the SIGCOMM (2014)","DOI":"10.1145\/2619239.2626297"},{"key":"546_CR23","doi-asserted-by":"crossref","unstructured":"Yang, T., Liu, A.X., Shahzad, M., Zhong, Y., Fu, Q., Li, Z., Xie, G., Li, X.: A shifting bloom Filter Framework for Set Queries. In: Proceedings of the VLDB (2016)","DOI":"10.14778\/2876473.2876476"},{"key":"546_CR24","doi-asserted-by":"crossref","unstructured":"Yang, T., Liu, A.X., Shahzad, M., Yang, D., Fu, Q., Xie, G., Li, X.: A Shifting Framework for Set Queries. In: Proceedings of the IEEE\/ACM Transaction on Networking (ToN) (2017)","DOI":"10.1109\/TNET.2017.2730227"},{"key":"546_CR25","doi-asserted-by":"crossref","unstructured":"Yang, T., Zhou, Y., Jin, H., Chen, S., Li, X.: Pyramid Sketch: a Sketch Framework for Frequency Estimation of Data Streams. In: Proceedings of the VLDB (2017)","DOI":"10.14778\/3137628.3137652"},{"key":"546_CR26","doi-asserted-by":"crossref","unstructured":"Zhang, Y., Singh, S., Sen, S., Duffield, N., Lund, C.: Online identification of hierarchical heavy hitters: algorithms, evaluation, and applications. In: Proceedings of the ACM IMC (2004)","DOI":"10.1145\/1028788.1028802"},{"key":"546_CR27","doi-asserted-by":"crossref","unstructured":"Zhao, Q.G., Ogihara, M., Wang, H., Xu, J.J.: Finding global icebergs over distributed data sets. In: Proceedigs of the ACM PODS. ACM (2006)","DOI":"10.1145\/1142351.1142394"},{"key":"546_CR28","doi-asserted-by":"crossref","unstructured":"Zhou, Y., Yang, T., Jiang, J., Cui, B., Yu, M., Li, X., Uhlig, S.: Cold Filter: A Meta-Framework for Faster and More Accurate Stream Processing. In: Proceedings of the SIGMOD (2018)","DOI":"10.1145\/3183713.3183726"}],"container-title":["World Wide Web"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-018-0546-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11280-018-0546-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11280-018-0546-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,11,23]],"date-time":"2019-11-23T06:13:06Z","timestamp":1574489586000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11280-018-0546-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4,11]]},"references-count":28,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2019,11]]}},"alternative-id":["546"],"URL":"https:\/\/doi.org\/10.1007\/s11280-018-0546-5","relation":{},"ISSN":["1386-145X","1573-1413"],"issn-type":[{"type":"print","value":"1386-145X"},{"type":"electronic","value":"1573-1413"}],"subject":[],"published":{"date-parts":[[2018,4,11]]},"assertion":[{"value":"7 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 February 2018","order":2,"name":"revised","label":"Revised","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"12 March 2018","order":3,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 April 2018","order":4,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}