{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,25]],"date-time":"2025-11-25T21:32:14Z","timestamp":1764106334167,"version":"3.37.3"},"reference-count":115,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2022,11,1]],"date-time":"2022-11-01T00:00:00Z","timestamp":1667260800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"name":"Key-Area Research and Development Program of Guangdong Province","award":["2020B0101390001"],"award-info":[{"award-number":["2020B0101390001"]}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61772265","61802172","62072228"],"award-info":[{"award-number":["61772265","61802172","62072228"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Collaborative Innovation Center of Novel Software Technology and Industrialization"},{"name":"Jiangsu Innovation and Entrepreneurship"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Serv. Comput."],"published-print":{"date-parts":[[2022,11,1]]},"DOI":"10.1109\/tsc.2021.3103968","type":"journal-article","created":{"date-parts":[[2021,8,11]],"date-time":"2021-08-11T19:51:58Z","timestamp":1628711518000},"page":"3649-3667","source":"Crossref","is-referenced-by-count":18,"title":["Rethinking Fine-Grained Measurement From Software-Defined Perspective: A Survey"],"prefix":"10.1109","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2663-4146","authenticated-orcid":false,"given":"Hao","family":"Zheng","sequence":"first","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]},{"given":"Yanan","family":"Jiang","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2710-7628","authenticated-orcid":false,"given":"Chen","family":"Tian","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1736-0873","authenticated-orcid":false,"given":"Long","family":"Cheng","sequence":"additional","affiliation":[{"name":"Computer Science Department, Clemson University, Clemson, SC, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2387-6131","authenticated-orcid":false,"given":"Qun","family":"Huang","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, Peking University, Beijing, China"}]},{"given":"Weichao","family":"Li","sequence":"additional","affiliation":[{"name":"Institute of Future Networks, Southern University of Science and Technology, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9095-6879","authenticated-orcid":false,"given":"Yi","family":"Wang","sequence":"additional","affiliation":[{"name":"Institute of Future Networks, Southern University of Science and Technology, Shenzhen, Guangdong, China"}]},{"given":"Qianyi","family":"Huang","sequence":"additional","affiliation":[{"name":"Institute of Future Networks, Southern University of Science and Technology, Shenzhen, Guangdong, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6855-5094","authenticated-orcid":false,"given":"Jiaqi","family":"Zheng","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]},{"given":"Rui","family":"Xia","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]},{"given":"Yi","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Modern Posts, Nanjing University of Posts and Telecommunications, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4833-2023","authenticated-orcid":false,"given":"Wanchun","family":"Dou","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6934-1685","authenticated-orcid":false,"given":"Guihai","family":"Chen","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, China"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2933358"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230559"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45749-6_33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45465-9_59"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1012888.1005709"},{"key":"ref30","doi-asserted-by":"crossref","first-page":"662","DOI":"10.1109\/TNET.2011.2169424","article-title":"Spatio-temporal compressive sensing and internet traffic matrices (extended version)","volume":"20","author":"zhang","year":"2012","journal-title":"IEEE\/ACM Trans Netw"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-016-6053-x"},{"key":"ref36","first-page":"29","article-title":"Software defined traffic measurement with opensketch","author":"yu","year":"2013","journal-title":"Proc 10th USENIX Conf Netw Syst Des Implementation"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626291"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50038-X"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/863955.863992"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1015467.1015495"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.863456"},{"year":"0","key":"ref20"},{"year":"0","key":"ref22"},{"key":"ref21","first-page":"117","article-title":"The design and implementation of open vSwitch","author":"pfaf","year":"2015","journal-title":"Proc 12th USENIX Conf Netw Syst Des Implementation"},{"year":"0","key":"ref24"},{"year":"0","key":"ref23"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/1644893.1644918"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2014.2321898"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1145\/2829988.2787496"},{"year":"0","key":"ref25"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3035963"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-009-0172-z"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/1384529.1375472"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230555"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"ref56","first-page":"991","article-title":"LightGuardian: A full-visibility, lightweight, in-band telemetry system using sketchlets","author":"zhao","year":"2021","journal-title":"Proc 18th USENIX Symp Netw Syst Des Implementation"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836099"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098829"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098831"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2015.08.025"},{"key":"ref40","first-page":"24","article-title":"Big data analytics for network intrusion detection: A survey","volume":"7","author":"wang","year":"2017","journal-title":"International Journal of Networks and Communications"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.17487\/rfc3954"},{"article-title":"Introducing VPC flow logs network transparency in near real-time","year":"0","author":"envid","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50038-X"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2004.1281630"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2535372.2535411"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633056"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/COMSNETS.2009.4808888"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2007.305"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.860096"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524500"},{"article-title":"Adaptive algorithms for the identification of large flows in IP traffic","year":"2009","author":"azzana","key":"ref42"},{"key":"ref41","article-title":"A survey of network traffic monitoring and analysis tools","author":"so-in","year":"0","journal-title":"Cse 576m Computer System Analysis Project"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098832"},{"key":"ref43","first-page":"398","article-title":"Efficient computation of frequent and top-K elements in data streams","author":"metwally","year":"2005","journal-title":"Proc 10th Int Conf Database Theory"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195691"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/1090191.1080118"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177099"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/2834050.2834098"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3229543.3229545"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/2566486.2568017"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2915223"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.14778\/3099622.3099627"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(85)90041-8"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.14778\/3137628.3137652"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405865"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342076"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2019.8737499"},{"key":"ref65","first-page":"311","article-title":"FlowRadar: A better netFlow for data centers","author":"li","year":"2016","journal-title":"Proc 13th Usenix Conf Netw Syst Des Implementation"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155541"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2010.06.018"},{"key":"ref68","first-page":"1027","article-title":"Toward nearly-zero-error sketching via compressive sensing","author":"huang","year":"2021","journal-title":"Proc 18th USENIX Symp Netw Syst Des Implementation"},{"article-title":"Azure networking fall 2018 update","year":"0","author":"khalidi","key":"ref2"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v25i1.7976"},{"year":"0","key":"ref1","article-title":"Network analytics market by type, by end user - Global forecast to 2020"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.14778\/2078331.2078335"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3406214"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882946"},{"key":"ref94","first-page":"233","article-title":"CSAMP: A system for network-wide flow monitoring","author":"sekar","year":"2008","journal-title":"Proc 5th USENIX Symp Netw Syst Des Implementation"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787483"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/3387514.3405877"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626310"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3183737"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838228"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848077"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2014.31"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/Allerton.2011.6120248"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/GLOCOM.2014.7037094"},{"key":"ref102","first-page":"57","article-title":"Profiling network performance for multi-tier data center applications","author":"yu","year":"2011","journal-title":"Proc 8th USENIX Conf Netw Syst Des Implementation"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/3005745.3005748"},{"key":"ref112","first-page":"207","article-title":"Compiling path queries","author":"narayana","year":"2016","journal-title":"Proc 13th Usenix Conf Netw Syst Des Implementation"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/2034574.2034812"},{"key":"ref98","doi-asserted-by":"publisher","DOI":"10.1145\/1355734.1355746"},{"key":"ref99","first-page":"71","article-title":"I know what your packet did last hop: Using packet histories to troubleshoot networks","author":"handigol","year":"2014","journal-title":"Proc 11th USENIX Conf Netw Syst Des Implementation"},{"key":"ref96","first-page":"13","article-title":"Online measurement of large traffic aggregates on commodity switches","author":"jose","year":"2011","journal-title":"Proc 11th USENIX Conf Hot Top Manage Internet Cloud Enterprise Netw Serv"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848022"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2008.2001730"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2633579"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2013.6567024"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2017.2751251"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2005.860096"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2007.896150"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.46298\/dmtcs.3545"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882948"},{"key":"ref81","first-page":"605","article-title":"Loglog counting of large cardinalities (extended abstract)","author":"durand","year":"2003","journal-title":"Proc Eur Symp Algorithms"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3183726"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/1140103.1140295"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3183759"},{"article-title":"New cardinality estimation algorithms for hyperLogLog sketches","year":"0","author":"ertl","key":"ref83"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/2619239.2626292"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2010.2066987"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/78922.78925"},{"key":"ref115","first-page":"467","article-title":"Stroboscope: Declarative network monitoring on a budget","author":"tilmans","year":"2018","journal-title":"Proc 15th USENIX Conf Netw Syst Des Implementation"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1145\/872785.872787"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/3131365.3131375"},{"article-title":"Hierarchical heavy hitters with the space saving algorithm","year":"2011","author":"mitzenmacher","key":"ref86"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061956"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080114"}],"container-title":["IEEE Transactions on Services Computing"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/4629386\/9985445\/09511799.pdf?arnumber=9511799","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,9]],"date-time":"2023-01-09T21:13:35Z","timestamp":1673298815000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9511799\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,11,1]]},"references-count":115,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/tsc.2021.3103968","relation":{},"ISSN":["1939-1374","2372-0204"],"issn-type":[{"type":"electronic","value":"1939-1374"},{"type":"electronic","value":"2372-0204"}],"subject":[],"published":{"date-parts":[[2022,11,1]]}}}