{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T15:38:54Z","timestamp":1774539534073,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T00:00:00Z","timestamp":1531958400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,7,19]]},"DOI":"10.1145\/3219819.3219978","type":"proceedings-article","created":{"date-parts":[[2018,7,19]],"date-time":"2018-07-19T13:05:12Z","timestamp":1532005512000},"page":"2584-2593","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":112,"title":["HeavyGuardian"],"prefix":"10.1145","author":[{"given":"Tong","family":"Yang","sequence":"first","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Junzhi","family":"Gong","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Haowei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Lei","family":"Zou","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Lei","family":"Shi","sequence":"additional","affiliation":[{"name":"SKLCS, Institute of Software, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Xiaoming","family":"Li","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2018,7,19]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"The source codes of heavyguardian and other related algorithms. https:\/\/github.com\/Gavindeed\/HeavyGuardianvspace0.03in.  The source codes of heavyguardian and other related algorithms. https:\/\/github.com\/Gavindeed\/HeavyGuardianvspace0.03in."},{"key":"e_1_3_2_2_2_1","volume-title":"New streaming algorithms for fast detection of superspreaders. Department of Electrical and Computing Engineering, page 6","author":"Venkataraman Shoba","year":"2005"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41019-016-0021-1"},{"key":"e_1_3_2_2_4_1","first-page":"29","volume-title":"NSDI","volume":"13","author":"Yu Minlan","year":"2013"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/s41019-017-0053-1"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30570-5_27"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30570-5_27"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1315451.1315492"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3098822.3098832"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2915223"},{"key":"e_1_3_2_2_11_1","volume-title":"Sketch techniques for approximate query processing. Foundations and Trends in Databases","author":"Cormode Graham","year":"2011"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882948"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.14778\/3137628.3137652"},{"key":"e_1_3_2_2_14_1","first-page":"311","volume-title":"NSDI","author":"Li Yuliang","year":"2016"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/859716.859719"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592600"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879175"},{"key":"e_1_3_2_2_18_1","volume-title":"A manifesto for modeling and measurement in social media. First Monday, 15(9)","author":"Cormode Graham","year":"2010"},{"key":"e_1_3_2_2_19_1","volume-title":"Unraveling the complexity of network management","author":"Maltz Dave","year":"2009"},{"key":"e_1_3_2_2_20_1","volume-title":"Dynamic prioritization of traffic in home networks","author":"Bozkurt Ilker Nadi","year":"2015"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.14778\/3099622.3099627"},{"key":"e_1_3_2_2_22_1","first-page":"784","volume-title":"Finding frequent items in data streams. Automata, languages and programming","author":"Charikar Moses","year":"2002"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"e_1_3_2_2_24_1","unstructured":"Yang Zhou Tong Yang Jie Jiang Bin Cui Minlan Yu Xiaoming Li and Steve Uhlig. Cold filter: A meta-framework for faster and more accurate stream processing.  Yang Zhou Tong Yang Jie Jiang Bin Cui Minlan Yu Xiaoming Li and Steve Uhlig. Cold filter: A meta-framework for faster and more accurate stream processing."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-015-0382-5"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1892099"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3050220.3063772"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367935"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/647912.740658"},{"key":"e_1_3_2_2_30_1","first-page":"346","volume-title":"Approximate frequency counts over data streams. In \u00b6roc VLDB","author":"Manku Gurmeet Singh","year":"2002"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1080\/15427951.2004.10129079"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/948205.948236"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1028788.1028814"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1002\/for.3980120103"},{"key":"e_1_3_2_2_35_1","first-page":"448","volume-title":"VLDB","author":"Poosala Viswanath","year":"1996"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.14778\/2824032.2824097"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1005686.1005709"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-016-0424-7"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/312129.312199"},{"key":"e_1_3_2_2_40_1","article-title":"Dynamic compressive wide-band spectrum sensing based on channel energy reconstruction in cognitive internet of things","author":"Li Zhetao","year":"2018","journal-title":"IEEE Transactions on Industrial Informatics"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.14778\/2535568.2448943"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSAC.2018.2804018"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1140277.1140295"},{"key":"e_1_3_2_2_44_1","unstructured":"The caida anonymized internet traces 2016. http:\/\/www.caida.org\/data\/overview\/vspace0.03in.  The caida anonymized internet traces 2016. http:\/\/www.caida.org\/data\/overview\/vspace0.03in."},{"key":"e_1_3_2_2_45_1","unstructured":"Frequent itemset mining dataset repository. http:\/\/fimi.ua.ac.be\/data\/.  Frequent itemset mining dataset repository. http:\/\/fimi.ua.ac.be\/data\/."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1384609.1384614"}],"event":{"name":"KDD '18: The 24th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","location":"London United Kingdom","acronym":"KDD '18","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3219819.3219978","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3219819.3219978","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T02:07:22Z","timestamp":1750212442000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3219819.3219978"}},"subtitle":["Separate and Guard Hot Items in Data Streams"],"short-title":[],"issued":{"date-parts":[[2018,7,19]]},"references-count":46,"alternative-id":["10.1145\/3219819.3219978","10.1145\/3219819"],"URL":"https:\/\/doi.org\/10.1145\/3219819.3219978","relation":{},"subject":[],"published":{"date-parts":[[2018,7,19]]},"assertion":[{"value":"2018-07-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}