2008
DOI: 10.1016/j.datak.2007.12.006
|View full text |Cite
|
Sign up to set email alerts
|

Dynamic adaptive data structures for monitoring data streams

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2010
2010
2017
2017

Publication Types

Select...
4
2
1

Relationship

0
7

Authors

Journals

citations
Cited by 7 publications
(4 citation statements)
references
References 30 publications
0
4
0
Order By: Relevance
“…Bloom filter [1] is a space‐efficient data structure that can be used to process queries by answering whether an arbitrary element belongs to a certain set. Recently, thousands of real‐time network applications and services [29] (such as DDoS attack detection and protection [2–4], multicast routing [6], cache filtering in CDN networks [7], high‐speed flow measurement [8], and data‐stream monitoring [9]) are found taking Bloom filter as a fundamental component. The above applications make up just a tip of the entire iceberg.…”
Section: Introductionmentioning
confidence: 99%
“…Bloom filter [1] is a space‐efficient data structure that can be used to process queries by answering whether an arbitrary element belongs to a certain set. Recently, thousands of real‐time network applications and services [29] (such as DDoS attack detection and protection [2–4], multicast routing [6], cache filtering in CDN networks [7], high‐speed flow measurement [8], and data‐stream monitoring [9]) are found taking Bloom filter as a fundamental component. The above applications make up just a tip of the entire iceberg.…”
Section: Introductionmentioning
confidence: 99%
“…Therefore, we need ways whereby frequent item sets could be found by one-time data scanning. This problem was solved through presenting a demonstration to store summarized received data [13][14][15]. This algorithm mines frequent item sets by keeping part of the latest received data and storing them as bit-based representation.…”
Section: Introductionmentioning
confidence: 99%
“…We briefly examine some key cases in this domain, for example detection of heavy flows, Iceberg queries, packet attribution, and approximate state machines. Key functions for monitoring include flow classification [96], [97] and approximate counting and summarization of flows and packets [98], [99].…”
Section: Monitoring and Measurementmentioning
confidence: 99%