{"id":"https://openalex.org/W2790391732","doi":"https://doi.org/10.1109/infocom.2018.8486425","title":"Finding Persistent Items in Distributed Datasets","display_name":"Finding Persistent Items in Distributed Datasets","publication_year":2018,"publication_date":"2018-04-01","ids":{"openalex":"https://openalex.org/W2790391732","doi":"https://doi.org/10.1109/infocom.2018.8486425","mag":"2790391732"},"language":"en","primary_location":{"id":"doi:10.1109/infocom.2018.8486425","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2018.8486425","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2018 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5003181030","display_name":"Haipeng Dai","orcid":"https://orcid.org/0000-0003-0545-8187"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Haipeng Dai","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, CHINA"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, CHINA","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100755573","display_name":"Meng Li","orcid":"https://orcid.org/0000-0001-5764-960X"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meng Li","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, CHINA"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, CHINA","institution_ids":["https://openalex.org/I881766915"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5008787905","display_name":"Alex X. Liu","orcid":"https://orcid.org/0000-0002-6916-1326"},"institutions":[{"id":"https://openalex.org/I881766915","display_name":"Nanjing University","ror":"https://ror.org/01rxvg760","country_code":"CN","type":"education","lineage":["https://openalex.org/I881766915"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Alex Liu","raw_affiliation_strings":["State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, CHINA"],"affiliations":[{"raw_affiliation_string":"State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, Jiangsu, CHINA","institution_ids":["https://openalex.org/I881766915"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5003181030"],"corresponding_institution_ids":["https://openalex.org/I881766915"],"apc_list":null,"apc_paid":null,"fwci":4.9824,"has_fulltext":false,"cited_by_count":34,"citation_normalized_percentile":{"value":0.95646599,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1403","last_page":"1411"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11478","display_name":"Caching and Content Delivery","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10764","display_name":"Privacy-Preserving Technologies in Data","score":0.9950000047683716,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9937000274658203,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8217020034790039},{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.8181082010269165},{"id":"https://openalex.org/keywords/bloom-filter","display_name":"Bloom filter","score":0.8015216588973999},{"id":"https://openalex.org/keywords/intrusion-detection-system","display_name":"Intrusion detection system","score":0.6461468935012817},{"id":"https://openalex.org/keywords/probabilistic-logic","display_name":"Probabilistic logic","score":0.640789270401001},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.5767394304275513},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.4985342025756836},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.4622037410736084},{"id":"https://openalex.org/keywords/compression-ratio","display_name":"Compression ratio","score":0.44989013671875},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.352175235748291},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.32730138301849365},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.25197291374206543},{"id":"https://openalex.org/keywords/mathematics","display_name":"Mathematics","score":0.1014886200428009}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8217020034790039},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.8181082010269165},{"id":"https://openalex.org/C147224247","wikidata":"https://www.wikidata.org/wiki/Q885373","display_name":"Bloom filter","level":2,"score":0.8015216588973999},{"id":"https://openalex.org/C35525427","wikidata":"https://www.wikidata.org/wiki/Q745881","display_name":"Intrusion detection system","level":2,"score":0.6461468935012817},{"id":"https://openalex.org/C49937458","wikidata":"https://www.wikidata.org/wiki/Q2599292","display_name":"Probabilistic logic","level":2,"score":0.640789270401001},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.5767394304275513},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.4985342025756836},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.4622037410736084},{"id":"https://openalex.org/C25797200","wikidata":"https://www.wikidata.org/wiki/Q828137","display_name":"Compression ratio","level":3,"score":0.44989013671875},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.352175235748291},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32730138301849365},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.25197291374206543},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.1014886200428009},{"id":"https://openalex.org/C171146098","wikidata":"https://www.wikidata.org/wiki/Q124192","display_name":"Automotive engineering","level":1,"score":0.0},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C511840579","wikidata":"https://www.wikidata.org/wiki/Q12757","display_name":"Internal combustion engine","level":2,"score":0.0},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.0},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/infocom.2018.8486425","is_oa":false,"landing_page_url":"https://doi.org/10.1109/infocom.2018.8486425","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"IEEE INFOCOM 2018 - IEEE Conference on Computer Communications","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W1521238083","https://openalex.org/W1967373117","https://openalex.org/W1995328140","https://openalex.org/W2013419690","https://openalex.org/W2061373204","https://openalex.org/W2102116440","https://openalex.org/W2116400826","https://openalex.org/W2122701518","https://openalex.org/W2133225898","https://openalex.org/W2146183750","https://openalex.org/W2156632255","https://openalex.org/W2161317557","https://openalex.org/W2166767032","https://openalex.org/W2167652903","https://openalex.org/W2168580011","https://openalex.org/W2296600582","https://openalex.org/W2306067489","https://openalex.org/W2577957252","https://openalex.org/W4229922087","https://openalex.org/W4248080722"],"related_works":["https://openalex.org/W2086572746","https://openalex.org/W2157216338","https://openalex.org/W121740227","https://openalex.org/W2135966669","https://openalex.org/W4307097729","https://openalex.org/W3212420620","https://openalex.org/W2912174957","https://openalex.org/W4220987233","https://openalex.org/W3080614128","https://openalex.org/W3199001438"],"abstract_inverted_index":{"This":[0,157],"paper":[1],"concerns":[2],"the":[3,24,61,82,90,93,96,99,104,115,119,124,131,146,150,161,164,179,203],"problem":[4],"of":[5,26,84,98,126,130,166,187,223],"finding":[6,35],"persistent":[7,36,53,100,144,167],"items":[8,37,54,142],"in":[9,38,55,74,77,163,221],"distributed":[10,39,56],"datasets,":[11],"which":[12,138],"has":[13],"many":[14],"applications":[15],"such":[16,141],"as":[17],"port":[18],"scanning":[19],"and":[20,172,191,202,206,215],"intrusion":[21],"detection.":[22],"To":[23],"best":[25],"our":[27,209],"knowledge,":[28],"there":[29],"is":[30,66,159],"no":[31],"existing":[32],"solution":[33],"for":[34],"datasets.":[40,62],"In":[41,176,193],"this":[42],"paper,":[43],"we":[44],"propose":[45],"DISPERSE,":[46],"a":[47,78,136,154,184,196],"probabilistic":[48],"algorithm":[49],"that":[50,67,108,140],"can":[51,148,211],"find":[52],"datasets":[57],"without":[58],"collecting":[59],"all":[60],"Our":[63],"basic":[64],"idea":[65],"each":[68,71],"monitor":[69],"compresses":[70],"item":[72,87,113,120,133,151],"ID":[73,134,152],"its":[75,174],"dataset":[76],"lossy":[79,105],"fashion,":[80],"sends":[81],"set":[83],"lossily":[85,111,127],"compressed":[86,112,128],"IDs":[88,97],"to":[89],"server,":[91],"then":[92],"server":[94,116,147],"recovers":[95],"items.":[101,168],"We":[102,169],"design":[103],"compression":[106,185,224],"so":[107],"given":[109],"one":[110],"ID,":[114,121],"cannot":[117],"recover":[118,149],"but":[122],"when":[123],"number":[125],"versions":[129],"same":[132],"exceeds":[135],"threshold,":[137],"means":[139],"are":[143],"ones,":[145],"with":[153,178,189,195],"high":[155],"probability.":[156],"threshold":[158,162],"exactly":[160],"definition":[165],"implemented":[170],"DISPERSE":[171,182],"evaluated":[173],"performance.":[175],"comparison":[177,194],"straightforward":[180],"solution,":[181],"achieves":[183],"ratio":[186],"26.5%":[188],"FNR=3.5%":[190],"FPR=O.":[192],"developed":[197],"Bloom":[198],"filter":[199],"based":[200],"scheme":[201,210],"adapted":[204],"kBF":[205],"IBF":[207],"schemes,":[208],"achieve":[212],"7.9,":[213],"5.7,":[214],"6.6":[216],"times":[217],"performance":[218],"gains,":[219],"respectively,":[220],"terms":[222],"ratio.":[225]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2024,"cited_by_count":1},{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":3},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":9},{"year":2018,"cited_by_count":11}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
