{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,29]],"date-time":"2025-11-29T07:52:41Z","timestamp":1764402761919},"reference-count":32,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2017,2,1]],"date-time":"2017-02-01T00:00:00Z","timestamp":1485907200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1007\/s11704-016-6053-x","type":"journal-article","created":{"date-parts":[[2017,1,18]],"date-time":"2017-01-18T11:19:06Z","timestamp":1484738346000},"page":"119-129","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["Fast counting the cardinality of flows for big traffic over sliding windows"],"prefix":"10.1007","volume":"11","author":[{"given":"Jingsong","family":"Shan","sequence":"first","affiliation":[]},{"given":"Yinjin","family":"Fu","sequence":"additional","affiliation":[]},{"given":"Guiqiang","family":"Ni","sequence":"additional","affiliation":[]},{"given":"Jianxin","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Zhaofeng","family":"Wu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,4,7]]},"reference":[{"key":"6053_CR1","first-page":"1","volume-title":"Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems.","author":"C. Callegari","year":"2015","unstructured":"Callegari C, Giordano S, Pagano M, Procissi G. Opencounter: counting unknown flows in software defined networks. In: Proceedings of the International Symposium on Performance Evaluation of Computer and Telecommunication Systems. 2015, 1\u20137"},{"key":"6053_CR2","first-page":"1287","volume-title":"Proceedings of IEEE International Conference on Communications.","author":"C. Callegari","year":"2012","unstructured":"Callegari C, Pietro A D, Giordano S, Pepe T, Procissi G. The loglog counting reversible sketch: a distributed architecture for detecting anomalies in backbone networks. In: Proceedings of IEEE International Conference on Communications. 2012, 1287\u20131291"},{"issue":"3","key":"6053_CR3","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1145\/859716.859719","volume":"21","author":"C. Estan","year":"2003","unstructured":"Estan C, Varghese G. New directions in traffic measurement and accounting: focusing on the elephants, ignoring the mice. ACM Transactions on Computer Systems, 2003, 21(3): 270\u2013313","journal-title":"ACM Transactions on Computer Systems"},{"issue":"5","key":"6053_CR4","doi-asserted-by":"crossref","first-page":"925","DOI":"10.1109\/TNET.2006.882836","volume":"14","author":"C. Estan","year":"2006","unstructured":"Estan C, Varghese G, Fisk M E. Bitmap algorithms for counting active flows on high-speed links. IEEE\/ACM Transactions on Networking, 2006, 14(5): 925\u2013937","journal-title":"IEEE\/ACM Transactions on Networking"},{"key":"6053_CR5","first-page":"1788","volume-title":"Proceedings of IEEE International Conference on Communications.","author":"W. J. Chen","year":"2013","unstructured":"Chen W J, Liu Y, Guan Y. Cardinality change-based early detection of large-scale cyber-attacks. In: Proceedings of IEEE International Conference on Communications. 2013, 1788\u20131796"},{"key":"6053_CR6","first-page":"810","volume-title":"Proceedings of IEEE International Conference on Communications.","author":"J. Cao","year":"2009","unstructured":"Cao J, Jin Y, Chen A, Bu T, Zhang Z L. Identifying high cardinality internet hosts. In: Proceedings of IEEE International Conference on Communications. 2009, 810\u2013818"},{"key":"6053_CR7","first-page":"908","volume-title":"Proceedings of IEEE International Conference on Communications.","author":"Y. Q. Zheng","year":"2013","unstructured":"Zheng Y Q, Li M. ZOE: fast cardinality estimation for large-scale RFID systems. In: Proceedings of IEEE International Conference on Communications. 2013, 908\u2013916"},{"key":"6053_CR8","first-page":"819","volume-title":"Proceedings of IEEE International Conference on Communications.","author":"A. Chen","year":"2009","unstructured":"Chen A, Li L E, Cao J. Tracking cardinality distributions in network traffic. In: Proceedings of IEEE International Conference on Communications. 2009, 819\u2013827"},{"key":"6053_CR9","first-page":"1420","volume-title":"Proceedings of IEEE International Conference on Communications.","author":"Q. Huang","year":"2014","unstructured":"Huang Q, Lee P P C. Ld-sketch: a distributed sketching design for accurate and scalable anomaly detection in network data streams. In: Proceedings of IEEE International Conference on Communications. 2014, 1420\u20131428"},{"key":"6053_CR10","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1016\/j.comnet.2015.08.025","volume":"91","author":"Q. Huang","year":"2015","unstructured":"Huang Q, Lee P P C. A hybrid local and distributed sketching design for accurate and scalable heavy key detection in network data streams. Computer Networks, 2015, 91: 298\u2013315","journal-title":"Computer Networks"},{"key":"6053_CR11","first-page":"1","volume-title":"Proceedings of the 21st Symposium on Principles of Database Systems.","author":"B. Babcock","year":"2002","unstructured":"Babcock B, Babu S, Datar M, Motwani R, Widom J. Models and issues in data stream systems. In: Proceedings of the 21st Symposium on Principles of Database Systems. 2002, 1\u201316"},{"key":"6053_CR12","first-page":"909","volume-title":"Proceedings of the 10th Annual ACM-SIAM Symposium on Discrete Algorithms.","author":"P. B. Gibbons","year":"1999","unstructured":"Gibbons P B, Matias Y. Synopsis data structures for massive data sets. In: Proceedings of the 10th Annual ACM-SIAM Symposium on Discrete Algorithms. 1999, 909\u2013910"},{"issue":"6","key":"6053_CR13","doi-asserted-by":"crossref","first-page":"817","DOI":"10.1109\/TC.2011.108","volume":"61","author":"Y. Hua","year":"2012","unstructured":"Hua Y, Xiao B, Veeravalli B, Feng D. Locality-sensitive bloom filter for approximate membership query. IEEE Transactions on Computers, 2012, 61(6): 817\u2013830","journal-title":"IEEE Transactions on Computers"},{"key":"6053_CR14","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1145\/2620728.2620739","volume-title":"Proceedings of the 3rd Workshop on Hot Topics in Software Defined Networking.","author":"Y. Yu","year":"2014","unstructured":"Yu Y, Qian C, Li X. Distributed and collaborative traffic monitoring in software defined networks. In: Proceedings of the 3rd Workshop on Hot Topics in Software Defined Networking. 2014, 85\u201390"},{"issue":"02","key":"6053_CR15","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1145\/78922.78925","volume":"15","author":"K. Whang","year":"1990","unstructured":"Whang K, Zanden B T V, Taylor H M. A linear-time probabilistic counting algorithm for database applications. ACM Transactions on Database Systems, 1990, 15(02): 208\u2013229","journal-title":"ACM Transactions on Database Systems"},{"issue":"2","key":"6053_CR16","doi-asserted-by":"crossref","first-page":"182","DOI":"10.1016\/0022-0000(85)90041-8","volume":"31","author":"P. Flajolet","year":"1985","unstructured":"Flajolet P, Martin G N. Probabilistic counting algorithms for data base applications. Journal of Computer and System Sciences, 1985, 31(2): 182\u2013209","journal-title":"Journal of Computer and System Sciences"},{"issue":"2","key":"6053_CR17","doi-asserted-by":"crossref","first-page":"406","DOI":"10.1016\/j.dam.2008.06.020","volume":"157","author":"F. Giroire","year":"2009","unstructured":"Giroire F. Order statistics and estimating cardinalities of massive data sets. Discrete Applied Mathematics, 2009, 157(2): 406\u2013427","journal-title":"Discrete Applied Mathematics"},{"key":"6053_CR18","first-page":"605","volume-title":"Proceedings of European Symposium on Algorithms.","author":"M. Durand","year":"2003","unstructured":"Durand M, Flajolet P. Loglog counting of large cardinalities (extended abstract). In: Proceedings of European Symposium on Algorithms. 2003, 605\u2013617"},{"key":"6053_CR19","first-page":"297","volume-title":"Proceedings of ACM Special Interest Group on Management Of Data.","author":"E. Oneil","year":"1993","unstructured":"Oneil E, Oneil P, Weikum G. The LRU-K page replacement algorithm for database disk buffering. In: Proceedings of ACM Special Interest Group on Management Of Data. 1993, 297\u2013306"},{"key":"6053_CR20","doi-asserted-by":"crossref","first-page":"683","DOI":"10.1145\/2452376.2452456","volume-title":"Proceedings of Joint International Conference on Extending Database Technology.","author":"S. Heule","year":"2013","unstructured":"Heule S, Nunkesser M, Hall A. Hyperloglog in practice: algorithmic engineering of a state of the art cardinality estimation algorithm. In: Proceedings of Joint International Conference on Extending Database Technology. 2013, 683\u2013692"},{"key":"6053_CR21","first-page":"1171","volume-title":"Proceedings of the 25th International Council for Open and Distance Education.","author":"A. Chen","year":"2009","unstructured":"Chen A, Cao J. Distinct counting with a self-learning bitmap. In: Proceedings of the 25th International Council for Open and Distance Education. 2009, 1171\u20131174"},{"key":"6053_CR22","doi-asserted-by":"crossref","first-page":"618","DOI":"10.1145\/1353343.1353418","volume-title":"Proceedings of Joint International Conference on Extending Database Technology.","author":"A. Metwally","year":"2008","unstructured":"Metwally A, Agrawal D, El Abbadi A. Why go logarithmic if we can go linear?: Towards effective distinct counting of search traffic. In: Proceedings of Joint International Conference on Extending Database Technology. 2008, 618\u2013629"},{"key":"6053_CR23","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/1317331.1317335","volume-title":"Proceedings of the 10th ACM International Workshop on Data Warehousing and OLAP.","author":"K. Aouiche","year":"2007","unstructured":"Aouiche K, Lemire D. A comparison of five probabilistic view-size estimation techniques in OLAP. In: Proceedings of the 10th ACM International Workshop on Data Warehousing and OLAP. 2007, 17\u201324"},{"key":"6053_CR24","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1186\/1687-417X-2014-5","volume":"2014","author":"Y. Chabchoub","year":"2014","unstructured":"Chabchoub Y, Chiky R, Dogan B. How can sliding hyperloglog and EWMA detect port scan attacks in IP traffic? EURASIP Journal on Information Security, 2014, 2014: 5","journal-title":"EURASIP Journal on Information Security"},{"key":"6053_CR25","volume-title":"Proceedings of IEEE International Conference on Communications.","author":"R. Ben-Basat","year":"2016","unstructured":"Ben-Basat R, Einziger G, Friedman R, Kassner Y. Heavy hitters in streams and sliding windows. In: Proceedings of IEEE International Conference on Communications. 2016"},{"issue":"6","key":"6053_CR26","doi-asserted-by":"crossref","first-page":"1794","DOI":"10.1137\/S0097539701398363","volume":"31","author":"M. Datar","year":"2002","unstructured":"Datar M, Gionis A, Indyk P, Motwani R. Maintaining stream statistics over sliding windows. SIAM Journal on Computing, 2002, 31(6): 1794\u20131813","journal-title":"SIAM Journal on Computing"},{"key":"6053_CR27","first-page":"3888","volume-title":"Proceedings of IEEE Global Communications Conference.","author":"H. Kim","year":"2003","unstructured":"Kim H, O\u2019Hallaron D R. Counting network flows in real time. In: Proceedings of IEEE Global Communications Conference. 2003, 3888\u20133893"},{"key":"6053_CR28","first-page":"79","volume-title":"Proceedings of International Conference on Research in Networking.","author":"J. Sanju\u00e0s-Cuxart","year":"2009","unstructured":"Sanju\u00e0s-Cuxart J, Barlet-Ros P, Sol\u00e9-Pareta J. Counting flows over sliding windows in high speed networks. In: Proceedings of International Conference on Research in Networking. 2009, 79\u201391"},{"issue":"1","key":"6053_CR29","first-page":"2","volume":"39","author":"K. Yi","year":"2014","unstructured":"Yi K, Wang L, Wei Z W. Indexing for summary queries: theory and practice. ACM Transactions on Database Systems, 2014, 39(1): 2","journal-title":"ACM Transactions on Database Systems"},{"key":"6053_CR30","doi-asserted-by":"crossref","first-page":"70","DOI":"10.1016\/j.comcom.2014.12.003","volume":"61","author":"Z. Zhang","year":"2015","unstructured":"Zhang Z, Wang B Q, Lan J L. Identifying elephant flows in Internet backbone traffic with bloom filters and LRU. Computer Communications, 2015, 61: 70\u201378","journal-title":"Computer Communications"},{"key":"6053_CR31","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511813603","volume-title":"Probability and Computing: Randomized Algorithms and Probabilistic Analysis","author":"M. Mitzenmacher","year":"2005","unstructured":"Mitzenmacher M, Upfal E. Probability and Computing: Randomized Algorithms and Probabilistic Analysis. New York: Cambridge University Press, 2005"},{"issue":"6","key":"6053_CR32","doi-asserted-by":"crossref","first-page":"986","DOI":"10.1109\/JSAC.1986.1146410","volume":"4","author":"R. Jain","year":"1986","unstructured":"Jain R, Rountier S A. Packet trains-measurements and a new model for computer network traffic. IEEE Journal on Selected Areas in Communications, 1986, 4(6): 986\u2013995","journal-title":"IEEE Journal on Selected Areas in Communications"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-016-6053-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-016-6053-x\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-016-6053-x.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,22]],"date-time":"2022-07-22T00:20:29Z","timestamp":1658449229000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-016-6053-x"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,2]]},"references-count":32,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["6053"],"URL":"https:\/\/doi.org\/10.1007\/s11704-016-6053-x","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017,2]]}}}