{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T16:02:29Z","timestamp":1774540949518,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":41,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,7,11]],"date-time":"2011-07-11T00:00:00Z","timestamp":1310342400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,7,11]]},"DOI":"10.1145\/2002259.2002294","type":"proceedings-article","created":{"date-parts":[[2011,7,15]],"date-time":"2011-07-15T12:25:09Z","timestamp":1310732709000},"page":"255-266","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["Space-efficient tracking of persistent items in a massive data stream"],"prefix":"10.1145","author":[{"given":"Bibudh","family":"Lahiri","sequence":"first","affiliation":[{"name":"Iowa State University, Ames, IA, USA"}]},{"given":"Jaideep","family":"Chandrashekar","sequence":"additional","affiliation":[{"name":"Intel Labs Berkeley, Berkeley, CA, USA"}]},{"given":"Srikanta","family":"Tirthapura","sequence":"additional","affiliation":[{"name":"Iowa State University, Ames, IA, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,7,11]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.2001.1813"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1545"},{"key":"e_1_3_2_1_3_1","unstructured":"A. Appleby. Murmurhash 2.0. http:\/\/sites.google.com\/site\/murmurhash\/.  A. Appleby. Murmurhash 2.0. http:\/\/sites.google.com\/site\/murmurhash\/."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055558.1055598"},{"key":"e_1_3_2_1_5_1","unstructured":"CAIDA. OC48 traces dataset. https:\/\/data.caida.org\/datasets\/oc48\/oc48-original\/20020814\/5min\/.  CAIDA. OC48 traces dataset. https:\/\/data.caida.org\/datasets\/oc48\/oc48-original\/20020814\/5min\/."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11672142_15"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/646255.684566"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(03)00400-6"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1833515.1833557"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.14778\/1454159.1454225"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007588"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/773153.773182"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/859716.859719"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(85)90041-8"},{"key":"e_1_3_2_1_16_1","volume-title":"International Workshop on Quality of Service","author":"Gao Y.","year":"2007","unstructured":"Y. Gao , Y. Zhao , R. Schweller , S. Venkataraman , Y. Chen , D. Song , and M.-Y. Kao . Detecting stealthy attacks using online histograms . In International Workshop on Quality of Service , 2007 . Y. Gao, Y. Zhao, R. Schweller, S. Venkataraman, Y. Chen, D. Song, and M.-Y. Kao. Detecting stealthy attacks using online histograms. In International Workshop on Quality of Service, 2007."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/378580.378687"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04342-0_17"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/375663.375670"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452538"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/946243.946312"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807085.1807094"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1140277.1140295"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142351.1142393"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1533057.1533063"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1287369.1287400"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30570-5_27"},{"key":"e_1_3_2_1_28_1","volume-title":"Finding repeated elements. Science of Computer Programming, 2(2)","author":"Misra J.","year":"1982","unstructured":"J. Misra and D. Gries . Finding repeated elements. Science of Computer Programming, 2(2) , 1982 . J. Misra and D. Gries. Finding repeated elements. Science of Computer Programming, 2(2), 1982."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1452520.1452539"},{"key":"e_1_3_2_1_30_1","unstructured":"P. Porras H. Saidi and V. Yegneswaran. An Analysis of the iKeeB (duh) iPhone botnet (worm). http:\/\/mtc.sri.com\/iPhone\/.  P. Porras H. Saidi and V. Yegneswaran. An Analysis of the iKeeB (duh) iPhone botnet (worm). http:\/\/mtc.sri.com\/iPhone\/."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1177080.1177086"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031495.1031524"},{"key":"e_1_3_2_1_33_1","volume-title":"Practical automated detection of stealthy portscans","author":"Staniford S.","year":"2002","unstructured":"S. Staniford , J. A. Hoagland , and J. M. McAlerney . Practical automated detection of stealthy portscans . volume 10 . 2002 . S. Staniford, J. A. Hoagland, and J. M. McAlerney. Practical automated detection of stealthy portscans. volume 10. 2002."},{"key":"e_1_3_2_1_34_1","unstructured":"Advanced Persistent Threat. http:\/\/www.usenix.org\/event\/lisa09\/tech\/slides\/daly.pdf.  Advanced Persistent Threat. http:\/\/www.usenix.org\/event\/lisa09\/tech\/slides\/daly.pdf."},{"key":"e_1_3_2_1_35_1","unstructured":"Botnet Reporting and Termination. http:\/\/spamtrackers.eu\/wiki\/index.php\/Botnet_Reporting.  Botnet Reporting and Termination. http:\/\/spamtrackers.eu\/wiki\/index.php\/Botnet_Reporting."},{"key":"e_1_3_2_1_36_1","unstructured":"Google Ad Words. http:\/\/www.google.com\/ads\/adwords2\/.  Google Ad Words. http:\/\/www.google.com\/ads\/adwords2\/."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"CERT advisory CA-1996-21 TCP SYN flooding and IP spoofing attacks. http:\/\/www.cert.org\/advisories\/CA-1996-21.html.  CERT advisory CA-1996-21 TCP SYN flooding and IP spoofing attacks. http:\/\/www.cert.org\/advisories\/CA-1996-21.html.","DOI":"10.1016\/S1353-4858(96)90059-8"},{"key":"e_1_3_2_1_38_1","unstructured":"CERT advisory CA-1996-01 UDP port denial-of-service attack. http:\/\/www.cert.org\/advisories\/CA-1996-01.html.  CERT advisory CA-1996-01 UDP port denial-of-service attack. http:\/\/www.cert.org\/advisories\/CA-1996-01.html."},{"key":"e_1_3_2_1_39_1","volume-title":"NDSS","author":"Venkataraman S.","year":"2005","unstructured":"S. Venkataraman , D. X. Song , P. B. Gibbons , and A. Blum . New streaming algorithms for fast detection of superspreaders . In NDSS , 2005 . S. Venkataraman, D. X. Song, P. B. Gibbons, and A. Blum. New streaming algorithms for fast detection of superspreaders. In NDSS, 2005."},{"key":"e_1_3_2_1_40_1","volume-title":"SODA","author":"Woodruff D. P.","year":"2004","unstructured":"D. P. Woodruff . Optimal space lower bounds for all frequency moments . In SODA , 2004 . D. P. Woodruff. Optimal space lower bounds for all frequency moments. In SODA, 2004."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2008.98"}],"event":{"name":"DEBS '11: The 5th ACM International Conference on Distributed Event-based system","location":"New York New York USA","acronym":"DEBS '11","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 5th ACM international conference on Distributed event-based system"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2002259.2002294","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2002259.2002294","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:22:20Z","timestamp":1750245740000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2002259.2002294"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,11]]},"references-count":41,"alternative-id":["10.1145\/2002259.2002294","10.1145\/2002259"],"URL":"https:\/\/doi.org\/10.1145\/2002259.2002294","relation":{},"subject":[],"published":{"date-parts":[[2011,7,11]]},"assertion":[{"value":"2011-07-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}