{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T10:07:45Z","timestamp":1775815665389,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T00:00:00Z","timestamp":1752969600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,7,20]]},"DOI":"10.1145\/3690624.3709167","type":"proceedings-article","created":{"date-parts":[[2025,4,4]],"date-time":"2025-04-04T18:42:22Z","timestamp":1743792142000},"page":"1244-1255","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["HeavyLocker: Lock Heavy Hitters in Distributed Data Streams"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5550-0692","authenticated-orcid":false,"given":"Qilong","family":"Shi","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5783-6226","authenticated-orcid":false,"given":"Xirui","family":"Li","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6942-3729","authenticated-orcid":false,"given":"Hanyue","family":"Zheng","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2402-5854","authenticated-orcid":false,"given":"Tong","family":"Yang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2713-0748","authenticated-orcid":false,"given":"Yangyang","family":"Wang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4847-4585","authenticated-orcid":false,"given":"Mingwei","family":"Xu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,7,20]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"[n. d.]. The CAIDA traces. http:\/\/www.caida.org\/data\/overview\/."},{"key":"e_1_3_2_2_2_1","unstructured":"[n. d.]. Hash website. http:\/\/burtleburtle.net\/bob\/hash\/evahash.html."},{"key":"e_1_3_2_2_3_1","unstructured":"[n. d.]. Our open source Github. https:\/\/github.com\/HeavyLocker\/HeavyLockerSketch."},{"key":"e_1_3_2_2_4_1","volume-title":"USENIX NSDI","author":"Agarwal Anup","year":"2022","unstructured":"Anup Agarwal, Zaoxing Liu, and Srinivasan Seshan. 2022. {HeteroSketch}: Coordinating network-wide monitoring in heterogeneous and dynamic networks. in USENIX NSDI (2022)."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185475"},{"key":"e_1_3_2_2_6_1","volume-title":"Jalil Moraney, and Danny Raz.","author":"Basat Ran Ben","year":"2018","unstructured":"Ran Ben Basat, Gil Einziger, Shir Landau Feibish, Jalil Moraney, and Danny Raz. 2018. Network-wide routing-oblivious heavy hitters. in ACM ANCS (2018)."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2017.8057215"},{"key":"e_1_3_2_2_8_1","volume-title":"SALSA: Self-Adjusting Lean Streaming Analytics. in IEEE ICDE","author":"Basat Ran Ben","year":"2021","unstructured":"Ran Ben Basat, Gil Einziger, Michael Mitzenmacher, and Shay Vargaftik. 2021. SALSA: Self-Adjusting Lean Streaming Analytics. in IEEE ICDE (2021)."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2021.3061737"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2016.7524364"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3034786.3034798"},{"key":"e_1_3_2_2_12_1","volume-title":"Zaoxing Liu, Gianni Antichi, Giuseppe Bianchi, and Michael Mitzenmacher.","author":"Bruschi Valerio","year":"2020","unstructured":"Valerio Bruschi, Ran Ben Basat, Zaoxing Liu, Gianni Antichi, Giuseppe Bianchi, and Michael Mitzenmacher. 2020. DISCOvering the heavy hitters with disaggregated sketches. in ACM CoNEXT (2020)."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3452784"},{"key":"e_1_3_2_2_14_1","volume-title":"TRUSTSKETCH: Trustworthy Sketch-based Telemetry on Cloud Hosts. in NDSS","author":"Cheng Zhuo","year":"2024","unstructured":"Zhuo Cheng, Maria Apostolaki, Zaoxing Liu, and Vyas Sekar. 2024. TRUSTSKETCH: Trustworthy Sketch-based Telemetry on Cloud Hosts. in NDSS (2024)."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jalgor.2003.12.001"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.2968979"},{"key":"e_1_3_2_2_17_1","volume-title":"ACM VLDB","author":"Graham Cormode","year":"2003","unstructured":"Cormode Graham, Korn Flip, Muthukrishnan Shanmugavelayutham, and Srivastava Divesh. 2003. Finding hierarchical heavy hitters in data streams. in ACM VLDB (2003)."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3185467.3185476"},{"key":"e_1_3_2_2_19_1","volume-title":"Arpit Gupta, Ross Teixeira, S Muthukrishnan, and Jennifer Rexford.","author":"Harrison Rob","year":"2020","unstructured":"Rob Harrison, Shir Landau Feibish, Arpit Gupta, Ross Teixeira, S Muthukrishnan, and Jennifer Rexford. 2020. Carpe elephants: Seize the global heavy hitters. in ACM SPIN (2020)."},{"key":"e_1_3_2_2_20_1","volume-title":"Proteus: A self-designing range filter. in ACM SIGMOD","author":"Knorr Eric R","year":"2022","unstructured":"Eric R Knorr, Baptiste Lemaire, Andrew Lim, Siqiang Luo, Huanchen Zhang, Stratos Idreos, and Michael Mitzenmacher. 2022. Proteus: A self-designing range filter. in ACM SIGMOD (2022)."},{"key":"e_1_3_2_2_21_1","volume-title":"Chainedfilter: Combining membership filters by chain rule. in ACM SIGMOD","author":"Li Haoyu","year":"2023","unstructured":"Haoyu Li, LiuhuiWang, Qizhi Chen, Jianan Ji, YuhanWu, Yikai Zhao, Tong Yang, and Aditya Akella. 2023. Chainedfilter: Combining membership filters by chain rule. in ACM SIGMOD (2023)."},{"key":"e_1_3_2_2_22_1","volume-title":"Tight-sketch: A high-performance sketch for heavy item-oriented data stream mining with limited memory size. in ACM CIKM","author":"Li Weihe","year":"2023","unstructured":"Weihe Li and Paul Patras. 2023. Tight-sketch: A high-performance sketch for heavy item-oriented data stream mining with limited memory size. in ACM CIKM (2023)."},{"key":"e_1_3_2_2_23_1","volume-title":"Flowradar: A better netflow for data centers. in USENIX NSDI","author":"Li Yuliang","year":"2016","unstructured":"Yuliang Li, Rui Miao, Changhoon Kim, and Minlan Yu. 2016. Flowradar: A better netflow for data centers. in USENIX NSDI (2016)."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341302.3342076"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934906"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3588910"},{"key":"e_1_3_2_2_27_1","volume-title":"Ark filter: A general and space-efficient sketch for network flow analysis","author":"Luo Lailong","year":"2023","unstructured":"Lailong Luo, Pengtao Fu, Shangsen Li, Deke Guo, Qianzhen Zhang, and Huaimin Wang. 2023. Ark filter: A general and space-efficient sketch for network flow analysis. IEEE\/ACM Transactions on Networking (2023)."},{"key":"e_1_3_2_2_28_1","volume-title":"Zaoxing Liu, and Vyas Sekar.","author":"Manousis Antonis","year":"2022","unstructured":"Antonis Manousis, Zhuo Cheng, Ran Ben Basat, Zaoxing Liu, and Vyas Sekar. 2022. Enabling efficient and general subpopulation analytics in multidimensional data streams. in ACM VLDB (2022)."},{"key":"e_1_3_2_2_29_1","volume-title":"Springer ICDT","author":"Metwally Ahmed","year":"2005","unstructured":"Ahmed Metwally, Divyakant Agrawal, and Amr El Abbadi. 2005. Efficient computation of frequent and top-k elements in data streams. in Springer ICDT (2005)."},{"key":"e_1_3_2_2_30_1","volume-title":"Trumpet: Timely and precise triggers in data centers. in ACM SIGCOMM","author":"Moshref Masoud","year":"2016","unstructured":"Masoud Moshref, Minlan Yu, Ramesh Govindan, and Amin Vahdat. 2016. Trumpet: Timely and precise triggers in data centers. in ACM SIGCOMM (2016)."},{"key":"e_1_3_2_2_31_1","volume-title":"USENIX NSDI","author":"Namkung Hun","year":"2022","unstructured":"Hun Namkung, Zaoxing Liu, Daehyeok Kim, Vyas Sekar, and Peter Steenkiste. 2022. {SketchLib}: Enabling efficient sketch-based monitoring on programmable switches. in USENIX NSDI (2022)."},{"key":"e_1_3_2_2_32_1","volume-title":"Sketchovsky: Enabling ensembles of sketches on programmable switches. in USENIX NSDI","author":"Namkung Hun","year":"2023","unstructured":"Hun Namkung, Zaoxing Liu, Daehyeok Kim, Vyas Sekar, and Peter Steenkiste. 2023. Sketchovsky: Enabling ensembles of sketches on programmable switches. in USENIX NSDI (2023)."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318464.3380598"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.3115\/1603899.1603924"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.576"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3588937"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE60146.2024.00366"},{"key":"e_1_3_2_2_38_1","volume-title":"Cuckoo Counter: Adaptive Structure of Counters for Accurate Frequency and Top-k Estimation","author":"Shi Qilong","year":"2023","unstructured":"Qilong Shi, Yuchen Xu, Jiuhua Qi, Wenjun Li, Tong Yang, Yang Xu, and Yi Wang. 2023. Cuckoo Counter: Adaptive Structure of Counters for Accurate Frequency and Top-k Estimation. IEEE\/ACM Transactions on Networking (2023)."},{"key":"e_1_3_2_2_39_1","volume-title":"Mv-sketch: A fast and compact invertible sketch for heavy flow detection in network data streams","author":"Tang Lu","year":"2019","unstructured":"Lu Tang, Qun Huang, and Patrick PC Lee. 2019. Mv-sketch: A fast and compact invertible sketch for heavy flow detection in network data streams. IEEE INFOCOM (2019)."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNET.2020.3011798"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3183759"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.14778\/3529337.3529347"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3588935"},{"key":"e_1_3_2_2_44_1","volume-title":"She: A generic framework for data stream mining over sliding windows. in ICPP","author":"Wu Yuhan","year":"2022","unstructured":"Yuhan Wu, Zhuochen Fan, Qilong Shi, Yixin Zhang, Tong Yang, Cheng Chen, Zheng Zhong, Junnan Li, Ariel Shtul, and Yaofeng Tu. 2022. She: A generic framework for data stream mining over sliding windows. in ICPP (2022)."},{"key":"e_1_3_2_2_45_1","volume-title":"Sketchint: Empowering int with towersketch for per-flow per-switch measurement","author":"Yang Kaicheng","year":"2023","unstructured":"Kaicheng Yang, Sheng Long, Qilong Shi, Yuanpeng Li, Zirui Liu, YuhanWu, Tong Yang, and Zhengyi Jia. 2023. Sketchint: Empowering int with towersketch for per-flow per-switch measurement. IEEE Transactions on Parallel and Distributed Systems (2023)."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3230543.3230544"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314212.3314215"},{"key":"e_1_3_2_2_48_1","volume-title":"USENIX NSDI","author":"Yu Minlan","year":"2013","unstructured":"Minlan Yu, Lavanya Jose, and Rui Miao. 2013. Software Defined Traffic Measurement with OpenSketch. in USENIX NSDI (2013)."},{"key":"e_1_3_2_2_49_1","volume-title":"CAFE: Towards Compact, Adaptive, and Fast Embedding for Large-scale Recommendation Models. in ACM SIGMOD","author":"Zhang Hailin","year":"2024","unstructured":"Hailin Zhang, Zirui Liu, Boxuan Chen, Yikai Zhao, Tong Zhao, Tong Yang, and Bin Cui. 2024. CAFE: Towards Compact, Adaptive, and Fast Embedding for Large-scale Recommendation Models. in ACM SIGMOD (2024)."},{"key":"e_1_3_2_2_50_1","volume-title":"Continuous Network Monitoring over Multiple Cores. in USENIX NSDI","author":"Zhang Yinda","year":"2024","unstructured":"Yinda Zhang, Peiqing Chen, and Zaoxing Liu. 2024. {OctoSketch}: Enabling {Real-Time}, Continuous Network Monitoring over Multiple Cores. in USENIX NSDI (2024)."},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467353"},{"key":"e_1_3_2_2_52_1","volume-title":"Divyakant Agrawal, Amr El Abbadi, Arpit Gupta, and Zaoxing Liu.","author":"Zhao Fuheng","year":"2023","unstructured":"Fuheng Zhao, Punnal Ismail Khan, Divyakant Agrawal, Amr El Abbadi, Arpit Gupta, and Zaoxing Liu. 2023. Panakos: Chasing the Tails for Multidimensional Data Streams. in ACM VLDB (2023)."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3588933"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3448016.3452775"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3183726"},{"key":"e_1_3_2_2_56_1","volume-title":"Newton: Intent-driven network traffic monitoring. in ACM CoNEXT","author":"Zhou Yu","year":"2020","unstructured":"Yu Zhou, Dai Zhang, Kai Gao, Chen Sun, Jiamin Cao, Yangyang Wang, Mingwei Xu, and Jianping Wu. 2020. Newton: Intent-driven network traffic monitoring. in ACM CoNEXT (2020)."}],"event":{"name":"KDD '25: The 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining","location":"Toronto ON Canada","acronym":"KDD '25","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGKDD ACM Special Interest Group on Knowledge Discovery in Data"]},"container-title":["Proceedings of the 31st ACM SIGKDD Conference on Knowledge Discovery and Data Mining V.1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690624.3709167","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3690624.3709167","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,16]],"date-time":"2025-08-16T15:38:38Z","timestamp":1755358718000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3690624.3709167"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,7,20]]},"references-count":56,"alternative-id":["10.1145\/3690624.3709167","10.1145\/3690624"],"URL":"https:\/\/doi.org\/10.1145\/3690624.3709167","relation":{},"subject":[],"published":{"date-parts":[[2025,7,20]]},"assertion":[{"value":"2025-07-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}