{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,2]],"date-time":"2025-11-02T02:47:38Z","timestamp":1762051658835,"version":"build-2065373602"},"reference-count":58,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,6,1]],"date-time":"2023-06-01T00:00:00Z","timestamp":1685577600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100018707","name":"Technion Hiroshi Fujiwara Cyber Security Research Center and the Israel National Cyber Directorate","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100018707","id-type":"DOI","asserted-by":"publisher"}]},{"name":"German-Israeli Science Foundation (GIF) Young Scientists Program"},{"name":"Taub Family Foundation"},{"name":"Polak Fund for Applied Research"},{"name":"Gordon Fund for System Engineering, at the Technion"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Netw. Serv. Manage."],"published-print":{"date-parts":[[2023,6]]},"DOI":"10.1109\/tnsm.2022.3172299","type":"journal-article","created":{"date-parts":[[2022,5,20]],"date-time":"2022-05-20T19:32:33Z","timestamp":1653075153000},"page":"1962-1975","source":"Crossref","is-referenced-by-count":3,"title":["Compressing Distributed Network Sketches With Traffic-Aware Summaries"],"prefix":"10.1109","volume":"20","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-4404-4975","authenticated-orcid":false,"given":"Dor","family":"Harris","sequence":"first","affiliation":[{"name":"Department of Computer Science, Technion, Haifa, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9625-0140","authenticated-orcid":false,"given":"Arik","family":"Rinberg","sequence":"additional","affiliation":[{"name":"Department of Electrical and Computer Engineering, Technion, Haifa, Israel"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4064-1238","authenticated-orcid":false,"given":"Ori","family":"Rottenstreich","sequence":"additional","affiliation":[{"name":"Department of Computer Science and the Department of Electrical and Computer Engineering, Technion, Haifa, Israel"}]}],"member":"263","reference":[{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1921659.1921667"},{"key":"ref57","first-page":"1","article-title":"Optimizing cost and performance in online service provider networks","author":"zhang","year":"2010","journal-title":"Proc USENIX NSDI"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/3452296.3472892"},{"journal-title":"GZIP file format specification version 4 3","year":"1952","author":"deutsch","key":"ref15"},{"key":"ref14","first-page":"1","article-title":"Comparing data streams using hamming norms","author":"datar","year":"2002","journal-title":"Proc Int Conf Very Large Databases (VLDB)"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/TIT.1977.1055714"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387542"},{"key":"ref11","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1561\/1900000004","article-title":"Synopses for massive data: Samples, histograms, wavelets, sketches","volume":"4","author":"cormode","year":"2012","journal-title":"Foundations and Trends in Databases"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3422604.3425946"},{"key":"ref10","article-title":"Sketch techniques for approximate query processing","author":"cormode","year":"2011","journal-title":"Foundations and Trends in Databases"},{"key":"ref54","first-page":"29","article-title":"Softwaredefined traffic measurement with OpenSketch","author":"yu","year":"2013","journal-title":"Proc USENIX NSDI"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39658-1_55"},{"journal-title":"How We Scaled HyperLogLog Three Real-World Optimizations","year":"2021","key":"ref16"},{"journal-title":"An Introduction to Probability Theory and Its Applications","year":"1957","author":"feller","key":"ref19"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/859716.859719"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882946"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3332466.3374512"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2020.2987890"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2021.3068604"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS51098.2021.9352944"},{"journal-title":"HyperLogLog in Presto A significantly faster way to handle cardinality estimation","year":"2021","key":"ref42"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/3482898.3483359"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TNANO.2021.3139394"},{"journal-title":"Yahoo Research","year":"2021","key":"ref43"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737645"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1672308.1672325"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45726-7_1"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1080\/15326349708807412"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2018.02.018"},{"year":"2021","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131407"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2500128"},{"key":"ref40","first-page":"1","article-title":"Efficient computation of frequent and top-k elements in data streams","author":"metwally","year":"2005","journal-title":"Proc Int Conf Database Theory"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1921168.1921179"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3359989.3365433"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948236"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836091"},{"key":"ref31","first-page":"1093","article-title":"Sketch algorithms for estimating point queries in NLP","author":"goyal","year":"2012","journal-title":"Proc Joint Conf Empir Methods Nat Lang Process Comput Nat Lang Learn"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/JRPROC.1952.273898"},{"key":"ref33","first-page":"1","article-title":"A peer-to-peer architecture for synchronous collaboration over low-bandwidth networks","author":"margaritis","year":"2003","journal-title":"Proc PCI"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/502051.502052"},{"journal-title":"Source Code","year":"2021","key":"ref2"},{"journal-title":"Intel Tofino Series","year":"2021","key":"ref1"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"ref38","first-page":"311","article-title":"FlowRadar: A better NetFlow for data centers","author":"li","year":"2016","journal-title":"Proc USENIX NSDI"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.23919\/IFIPNetworking52078.2021.9472827"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2946704"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3405669.3405820"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185476"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.46298\/dmtcs.3545"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.dam.2008.06.020"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1983.46"},{"journal-title":"Hillview A Big Data Spreadsheet","year":"2021","key":"ref28"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2452376.2452456"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098831"}],"container-title":["IEEE Transactions on Network and Service Management"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4275028\/10168539\/09779208.pdf?arnumber=9779208","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,7,17]],"date-time":"2023-07-17T17:45:33Z","timestamp":1689615933000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9779208\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,6]]},"references-count":58,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tnsm.2022.3172299","relation":{},"ISSN":["1932-4537","2373-7379"],"issn-type":[{"type":"electronic","value":"1932-4537"},{"type":"electronic","value":"2373-7379"}],"subject":[],"published":{"date-parts":[[2023,6]]}}}