{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,31]],"date-time":"2026-03-31T09:34:26Z","timestamp":1774949666362,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T00:00:00Z","timestamp":1597881600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61832001, 61702016, 61672061"],"award-info":[{"award-number":["61832001, 61702016, 61672061"]}]},{"name":"PKU-Baidu Fund","award":["2019BD006"],"award-info":[{"award-number":["2019BD006"]}]},{"name":"National Key R&D Program of China","award":["2018YFB1004403"],"award-info":[{"award-number":["2018YFB1004403"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,8,23]]},"DOI":"10.1145\/3394486.3403144","type":"proceedings-article","created":{"date-parts":[[2020,8,20]],"date-time":"2020-08-20T23:04:00Z","timestamp":1597964640000},"page":"1015-1025","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":51,"title":["Sliding Sketches: A Framework using Time Zones for Data Stream Processing in Sliding Windows"],"prefix":"10.1145","author":[{"given":"Xiangyang","family":"Gou","sequence":"first","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Long","family":"He","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Yinda","family":"Zhang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Ke","family":"Wang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Xilai","family":"Liu","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Tong","family":"Yang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Yi","family":"Wang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, Shenzhen, China"}]},{"given":"Bin","family":"Cui","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2020,8,20]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/11836810_30"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30428-6_8"},{"key":"e_1_3_2_1_3_1","first-page":"1","volume-title":"A flexible and extensible contract aggregation framework (caf) for financial data stream analytics","author":"Ball Bryan","year":"2014","unstructured":"Bryan Ball , Mark Flood , H. V. Jagadish , Joe Langsam , Louiqa Raschid , and Peratham Wiriyathammabhum . A flexible and extensible contract aggregation framework (caf) for financial data stream analytics . pages 1 -- 6 , 2014 . Bryan Ball, Mark Flood, H. V. Jagadish, Joe Langsam, Louiqa Raschid, and Peratham Wiriyathammabhum. A flexible and extensible contract aggregation framework (caf) for financial data stream analytics. pages 1--6, 2014."},{"key":"e_1_3_2_1_4_1","volume-title":"Quantitative Finance","author":"Gyurk\u00f3 Lajos Gergely","year":"2013","unstructured":"Lajos Gergely Gyurk\u00f3 , Terry Lyons , Mark Kontkowski , and Jonathan Field . Extracting information from the signature of a financial data stream . Quantitative Finance , 2013 . Lajos Gergely Gyurk\u00f3, Terry Lyons, Mark Kontkowski, and Jonathan Field. Extracting information from the signature of a financial data stream. Quantitative Finance, 2013."},{"issue":"3","key":"e_1_3_2_1_5_1","first-page":"793","article-title":"Stability analysis of wireless sensor network service via data stream methods","volume":"6","author":"Hu Ruo","year":"2012","unstructured":"Ruo Hu . Stability analysis of wireless sensor network service via data stream methods . Applied Mathematics & Information Sciences , 6 ( 3 ): 793 -- 798 , 2012 . Ruo Hu. Stability analysis of wireless sensor network service via data stream methods. Applied Mathematics & Information Sciences, 6(3):793--798, 2012.","journal-title":"Applied Mathematics & Information Sciences"},{"key":"e_1_3_2_1_6_1","first-page":"869","volume-title":"International Conference on Advanced Information NETWORKING and Applications","author":"Figueiredo Carlos M. S.","year":"2007","unstructured":"Carlos M. S. Figueiredo , Carlos M. S. Figueiredo , Eduardo F. Nakamura , Luciana S. Buriol , Antonio A. F. Loureiro , Antnio Otvio Fernandes , and Claudionor J. N . Jr Coelho. Data stream based algorithms for wireless sensor network applications . In International Conference on Advanced Information NETWORKING and Applications , pages 869 -- 876 , 2007 . Carlos M. S. Figueiredo, Carlos M. S. Figueiredo, Eduardo F. Nakamura, Luciana S. Buriol, Antonio A. F. Loureiro, Antnio Otvio Fernandes, and Claudionor J. N. Jr Coelho. Data stream based algorithms for wireless sensor network applications. In International Conference on Advanced Information NETWORKING and Applications, pages 869--876, 2007."},{"key":"e_1_3_2_1_7_1","unstructured":"FPGA data sheet [on line]. http:\/\/www.xilinx.com\/support\/documentation\/data_sheets\/ds180_7Series_Overview.pdf.  FPGA data sheet [on line]. http:\/\/www.xilinx.com\/support\/documentation\/data_sheets\/ds180_7Series_Overview.pdf."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"e_1_3_2_1_10_1","volume-title":"New directions in traffic measurement and accounting. ACM SIGMCOMM CCR, 32(4)","author":"Estan Cristian","year":"2002","unstructured":"Cristian Estan and George Varghese . New directions in traffic measurement and accounting. ACM SIGMCOMM CCR, 32(4) , 2002 . Cristian Estan and George Varghese. New directions in traffic measurement and accounting. ACM SIGMCOMM CCR, 32(4), 2002."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1137\/S0097539701398363"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2004.1354643"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-016-0567-8"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.136"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.14778\/2336664.2336672"},{"key":"e_1_3_2_1_17_1","volume-title":"Lap Kei Lee, and Hing Fung Ting. Continuous Monitoring of Distributed Data Streams over a Time-Based Sliding Window.","author":"Chan Ho Leung","year":"2009","unstructured":"Ho Leung Chan , Tak Wah Lam , Lap Kei Lee, and Hing Fung Ting. Continuous Monitoring of Distributed Data Streams over a Time-Based Sliding Window. 2009 . Ho Leung Chan, Tak Wah Lam, Lap Kei Lee, and Hing Fung Ting. Continuous Monitoring of Distributed Data Streams over a Time-Based Sliding Window. 2009."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993806.1993839"},{"key":"e_1_3_2_1_19_1","first-page":"1","volume-title":"IEEE INFOCOM 2016 - the IEEE International Conference on Computer Communications","author":"Ran Ben Basat","year":"2016","unstructured":"Ben Basat Ran , Gil Einziger , Roy Friedman , and Yaron Kassner . Heavy hitters in streams and sliding windows . In IEEE INFOCOM 2016 - the IEEE International Conference on Computer Communications , pages 1 -- 9 , 2016 . Ben Basat Ran, Gil Einziger, Roy Friedman, and Yaron Kassner. Heavy hitters in streams and sliding windows. In IEEE INFOCOM 2016 - the IEEE International Conference on Computer Communications, pages 1--9, 2016."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142351.1142393"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2009.01.027"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/646255.684566"},{"key":"e_1_3_2_1_23_1","first-page":"909","volume-title":"2018 USENIX Annual Technical Conference (USENIX ATC 18)","author":"Gong Junzhi","year":"2018","unstructured":"Junzhi Gong , Tong Yang , Haowei Zhang , Hao Li , Steve Uhlig , Shigang Chen , Lorna Uden , and Xiaoming Li. Heavykeeper : An accurate algorithm for finding top-k elephant flows . In 2018 USENIX Annual Technical Conference (USENIX ATC 18) , pages 909 -- 921 , Boston, MA , 2018 . USENIX Association. Junzhi Gong, Tong Yang, Haowei Zhang, Hao Li, Steve Uhlig, Shigang Chen, Lorna Uden, and Xiaoming Li. Heavykeeper: An accurate algorithm for finding top-k elephant flows. In 2018 USENIX Annual Technical Conference (USENIX ATC 18), pages 909--921, Boston, MA, 2018. USENIX Association."},{"key":"e_1_3_2_1_24_1","unstructured":"\"source code of sliding sketches and other sketches\". https:\/\/github.com\/sliding-sketch\/Sliding-Sketch.  \"source code of sliding sketches and other sketches\". https:\/\/github.com\/sliding-sketch\/Sliding-Sketch."},{"key":"e_1_3_2_1_25_1","volume-title":"Proc Symposium on Discrete Algorithms","author":"Nelson David","year":"2004","unstructured":"David Nelson . The bloomier filter: An efficient data structure for static support lookup tables . Proc Symposium on Discrete Algorithms , 2004 . David Nelson. The bloomier filter: An efficient data structure for static support lookup tables. Proc Symposium on Discrete Algorithms, 2004."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1121995.1122000"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2009.5061957"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14778\/2876473.2876476"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14778\/3137628.3137652"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2882948"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.14778\/3099622.3099627"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3183726"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/647912.740658"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-155860869-6\/50038-X"},{"key":"e_1_3_2_1_36_1","first-page":"398","volume-title":"International Conference on Database Theory","author":"Metwally Ahmed","year":"2005","unstructured":"Ahmed Metwally , Divyakant Agrawal , and Amr El Abbadi . Efficient computation of frequent and top-k elements in data streams . In International Conference on Database Theory , pages 398 -- 412 . Springer , 2005 . Ahmed Metwally, Divyakant Agrawal, and Amr El Abbadi. Efficient computation of frequent and top-k elements in data streams. In International Conference on Database Theory, pages 398--412. Springer, 2005."},{"key":"e_1_3_2_1_37_1","volume-title":"Data sketches for disaggregated subset sum and frequent item estimation","author":"Ting Daniel","year":"2017","unstructured":"Daniel Ting . Data sketches for disaggregated subset sum and frequent item estimation . 2017 . Daniel Ting. Data sketches for disaggregated subset sum and frequent item estimation. 2017."},{"key":"e_1_3_2_1_38_1","unstructured":"textCaida anonymized 2016 internet traces. http:\/\/www.caida.org\/data\/overview\/.  textCaida anonymized 2016 internet traces. http:\/\/www.caida.org\/data\/overview\/."},{"key":"e_1_3_2_1_39_1","unstructured":"Real-life transactional dataset. http:\/\/fimi.ua.ac.be\/data\/.  Real-life transactional dataset. http:\/\/fimi.ua.ac.be\/data\/."},{"key":"e_1_3_2_1_40_1","unstructured":"textThe Network dataset Internet Traces. http:\/\/snap.stanford.edu\/data\/.  textThe Network dataset Internet Traces. http:\/\/snap.stanford.edu\/data\/."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.576"},{"key":"e_1_3_2_1_42_1","volume-title":"Applications and explanations of Zipf's law. In \u00b6roc EMNLP-CoNLL","author":"Powers David MW","year":"1998","unstructured":"David MW Powers . Applications and explanations of Zipf's law. In \u00b6roc EMNLP-CoNLL . Association for Computational Linguistics , 1998 . David MW Powers. Applications and explanations of Zipf's law. In \u00b6roc EMNLP-CoNLL. Association for Computational Linguistics, 1998."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1055558.1055598"}],"event":{"name":"KDD '20: The 26th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Virtual Event CA USA","acronym":"KDD '20","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 26th ACM SIGKDD International Conference on Knowledge Discovery &amp; Data Mining"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394486.3403144","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3394486.3403144","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:31:34Z","timestamp":1750195894000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3394486.3403144"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,8,20]]},"references-count":42,"alternative-id":["10.1145\/3394486.3403144","10.1145\/3394486"],"URL":"https:\/\/doi.org\/10.1145\/3394486.3403144","relation":{},"subject":[],"published":{"date-parts":[[2020,8,20]]},"assertion":[{"value":"2020-08-20","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}