{"id":"https://openalex.org/W2102231621","doi":"https://doi.org/10.1109/pccc.2010.5682303","title":"Mnemonic Lossy Counting: An efficient and accurate heavy-hitters identification algorithm","display_name":"Mnemonic Lossy Counting: An efficient and accurate heavy-hitters identification algorithm","publication_year":2010,"publication_date":"2010-12-01","ids":{"openalex":"https://openalex.org/W2102231621","doi":"https://doi.org/10.1109/pccc.2010.5682303","mag":"2102231621"},"language":"en","primary_location":{"id":"doi:10.1109/pccc.2010.5682303","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pccc.2010.5682303","pdf_url":null,"source":{"id":"https://openalex.org/S4306420035","display_name":"International Performance, Computing, and Communications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Performance Computing and Communications Conference","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5090825870","display_name":"Qiong Rong","orcid":null},"institutions":[{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]},{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Qiong Rong","raw_affiliation_strings":["Network Technology Research Center, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Network Technology Research Center, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5106486109","display_name":"Guangxing Zhang","orcid":"https://orcid.org/0009-0002-2789-1723"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Guangxing Zhang","raw_affiliation_strings":["Network Technology Research Center, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Network Technology Research Center, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5030689390","display_name":"Gaogang Xie","orcid":"https://orcid.org/0000-0003-4964-1135"},"institutions":[{"id":"https://openalex.org/I4210090176","display_name":"Institute of Computing Technology","ror":"https://ror.org/0090r4d87","country_code":"CN","type":"facility","lineage":["https://openalex.org/I19820366","https://openalex.org/I4210090176"]},{"id":"https://openalex.org/I19820366","display_name":"Chinese Academy of Sciences","ror":"https://ror.org/034t30j35","country_code":"CN","type":"funder","lineage":["https://openalex.org/I19820366"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Gaogang Xie","raw_affiliation_strings":["Network Technology Research Center, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"],"affiliations":[{"raw_affiliation_string":"Network Technology Research Center, Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China","institution_ids":["https://openalex.org/I4210090176","https://openalex.org/I19820366"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5010294597","display_name":"Kav\u00e9 Salamatian","orcid":"https://orcid.org/0000-0001-5557-9134"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Kave Salamatian","raw_affiliation_strings":["LISTIC-Polytech Annecy-Chamb\u00e9ry, Universit\u00e9 de Savoie, Annecy-le-vieux, France"],"affiliations":[{"raw_affiliation_string":"LISTIC-Polytech Annecy-Chamb\u00e9ry, Universit\u00e9 de Savoie, Annecy-le-vieux, France","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5090825870"],"corresponding_institution_ids":["https://openalex.org/I19820366","https://openalex.org/I4210090176"],"apc_list":null,"apc_paid":null,"fwci":0.8135,"has_fulltext":false,"cited_by_count":7,"citation_normalized_percentile":{"value":0.738622,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":96},"biblio":{"volume":"3","issue":null,"first_page":"255","last_page":"262"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11598","display_name":"Internet Traffic Analysis and Secure E-voting","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10138","display_name":"Network Traffic and Congestion Control","score":0.9984999895095825,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7858940958976746},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.6355991363525391},{"id":"https://openalex.org/keywords/lossy-compression","display_name":"Lossy compression","score":0.5976507663726807},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.579402506351471},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.5263351798057556},{"id":"https://openalex.org/keywords/auxiliary-memory","display_name":"Auxiliary memory","score":0.4531288146972656},{"id":"https://openalex.org/keywords/high-memory","display_name":"High memory","score":0.4239668548107147},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.33604735136032104},{"id":"https://openalex.org/keywords/parallel-computing","display_name":"Parallel computing","score":0.2559904456138611},{"id":"https://openalex.org/keywords/computer-hardware","display_name":"Computer hardware","score":0.14309397339820862},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.139605313539505}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7858940958976746},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.6355991363525391},{"id":"https://openalex.org/C165021410","wikidata":"https://www.wikidata.org/wiki/Q55564","display_name":"Lossy compression","level":2,"score":0.5976507663726807},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.579402506351471},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.5263351798057556},{"id":"https://openalex.org/C82687282","wikidata":"https://www.wikidata.org/wiki/Q66221","display_name":"Auxiliary memory","level":2,"score":0.4531288146972656},{"id":"https://openalex.org/C2781357197","wikidata":"https://www.wikidata.org/wiki/Q5757597","display_name":"High memory","level":2,"score":0.4239668548107147},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.33604735136032104},{"id":"https://openalex.org/C173608175","wikidata":"https://www.wikidata.org/wiki/Q232661","display_name":"Parallel computing","level":1,"score":0.2559904456138611},{"id":"https://openalex.org/C9390403","wikidata":"https://www.wikidata.org/wiki/Q3966","display_name":"Computer hardware","level":1,"score":0.14309397339820862},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.139605313539505},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.0},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/pccc.2010.5682303","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pccc.2010.5682303","pdf_url":null,"source":{"id":"https://openalex.org/S4306420035","display_name":"International Performance, Computing, and Communications Conference","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"International Performance Computing and Communications Conference","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.666.2412","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.666.2412","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://fi.ict.ac.cn/uploads/PublicationsAmpTalks/2010_Mnemonic+Lossy+Counting_+An+Efficient+and+Accurate+Heavy-hitters+Identification+Algorithm.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":26,"referenced_works":["https://openalex.org/W139562302","https://openalex.org/W1493892051","https://openalex.org/W1675727887","https://openalex.org/W1753705435","https://openalex.org/W1970779762","https://openalex.org/W1973515534","https://openalex.org/W2012549717","https://openalex.org/W2033896090","https://openalex.org/W2069980026","https://openalex.org/W2080234606","https://openalex.org/W2101212349","https://openalex.org/W2102481563","https://openalex.org/W2103049975","https://openalex.org/W2105047865","https://openalex.org/W2109341366","https://openalex.org/W2113139394","https://openalex.org/W2122114583","https://openalex.org/W2124850309","https://openalex.org/W2126922390","https://openalex.org/W2139054829","https://openalex.org/W2143024194","https://openalex.org/W2146223937","https://openalex.org/W2156447535","https://openalex.org/W2162332844","https://openalex.org/W6629496199","https://openalex.org/W6681654339"],"related_works":["https://openalex.org/W1995805316","https://openalex.org/W2387503788","https://openalex.org/W2059658550","https://openalex.org/W3035532779","https://openalex.org/W2526409495","https://openalex.org/W4385819989","https://openalex.org/W3040903763","https://openalex.org/W2289732183","https://openalex.org/W2086670463","https://openalex.org/W2036308532"],"abstract_inverted_index":{"Identifying":[0],"heavy-hitter":[1],"traffic":[2,14,128],"flows":[3,27],"efficiently":[4],"and":[5,13,37,90,130,143,158,165,172,176,195,219,239],"accurately":[6],"is":[7,30,106],"essential":[8],"for":[9,24],"Internet":[10],"security,":[11],"accounting":[12],"engineering.":[15],"However,":[16],"finding":[17],"all":[18],"heavy-hitters":[19,56,83,98],"might":[20],"require":[21],"large":[22],"memory":[23,60,159,210,221,228],"storage":[25],"of":[26,35,55,82,117,156,186,202],"information":[28,102],"that":[29,78],"incompatible":[31],"with":[32,58,135,153,224],"the":[33,53,80,114,122,187,215],"usage":[34,222,229],"fast":[36],"small":[38],"memory.":[39],"Moreover,":[40],"upcoming":[41],"100Gbps":[42],"transmission":[43],"rates":[44],"make":[45],"this":[46],"recognition":[47],"more":[48],"challenging.":[49],"How":[50],"to":[51,108,200],"improve":[52],"accuracy":[54,81],"identification":[57,84],"limited":[59],"space":[61,91],"has":[62,190,206,234],"become":[63],"a":[64,70,87,100,179,191,207],"critical":[65],"issue.":[66],"This":[67,104],"paper":[68],"presents":[69],"scalable":[71],"algorithm":[72,94,124],"named":[73],"Mnemonic":[74],"Lossy":[75,140,145],"Counting":[76,141,146],"(MLC)":[77],"improves":[79],"while":[85],"having":[86],"reasonable":[88],"time":[89,241],"complexity.":[92],"MLC":[93,123,161,175,205,233],"holds":[95],"potential":[96],"candidate":[97,118],"in":[99],"historical":[101],"table.":[103],"table":[105],"used":[107],"obtain":[109],"tighter":[110],"error":[111],"bounds":[112],"on":[113],"estimated":[115],"sizes":[116],"heavy-hitters.":[119,203],"We":[120],"validate":[121],"using":[125],"real":[126],"network":[127],"traces,":[129],"we":[131],"compared":[132],"its":[133,220],"performance":[134],"two":[136],"state-of-the-art":[137],"algorithms,":[138],"namely":[139],"(LC)":[142],"Probabilistic":[144],"(PLC).":[147],"The":[148],"results":[149],"reveal":[150],"that:":[151],"1)":[152],"same":[154],"set":[155],"parameters":[157],"usage,":[160],"achieves":[162],"between":[163],"31.5%":[164],"6.67%":[166],"fewer":[167],"false":[168,181,193],"positives":[169],"than":[170,212,237,242],"LC":[171,177,213],"PLC.":[173,243],"2)":[174],"have":[178],"zero":[180],"negative":[182],"ratio,":[183],"whereas":[184],"38%":[185],"cases":[188],"PLC":[189,196,227],"non-zero":[192],"negatives":[194],"can":[197],"miss":[198],"up":[199],"4.4%":[201],"3)":[204],"slightly":[208],"lower":[209],"cost":[211],"during":[214],"first":[216],"few":[217],"windows":[218],"decreases":[223],"time,":[225],"when":[226],"declines":[230],"sharply.":[231],"4)":[232],"similar":[235],"runtime":[236],"LC,":[238],"smaller":[240]},"counts_by_year":[{"year":2020,"cited_by_count":1},{"year":2018,"cited_by_count":1},{"year":2017,"cited_by_count":2},{"year":2015,"cited_by_count":1},{"year":2013,"cited_by_count":1}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
