{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T07:56:40Z","timestamp":1776931000405,"version":"3.51.2"},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2007,7]]},"DOI":"10.1109\/ssdbm.2007.34","type":"proceedings-article","created":{"date-parts":[[2007,8,7]],"date-time":"2007-08-07T20:50:52Z","timestamp":1186519852000},"page":"28-28","source":"Crossref","is-referenced-by-count":42,"title":["Enabling Real-Time Querying of Live and Historical Stream Data"],"prefix":"10.1109","author":[{"given":"Frederick","family":"Reiss","sequence":"first","affiliation":[]},{"given":"Kurt","family":"Stockinger","sequence":"additional","affiliation":[]},{"given":"Kesheng","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Arie","family":"Shoshani","sequence":"additional","affiliation":[]},{"given":"Joseph M.","family":"Hellerstein","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/776985.776986"},{"key":"ref11","first-page":"509","article-title":"Goetz graefe","volume":"18","author":"graefe","year":"2006","journal-title":"SIGMOD Record"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/304182.304208"},{"key":"ref13","author":"iannaccone","year":"2005","journal-title":"CoMo An Open Infrastructure for Network Monitoring - Research Agenda"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1330107.1330137"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/253260.253268"},{"key":"ref16","article-title":"Bro: A System for Detecting Network Intruders in Real-Time","author":"paxson","year":"1998","journal-title":"USENIX Security Symposium"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24668-8_22"},{"key":"ref18","author":"reiss","year":"2006","journal-title":"Data Triage"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.46"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012088469-8\/50006-1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/B978-012088469-8.50033-4"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1145\/502585.502689","article-title":"A Performance Comparison of Bitmap Indices","author":"wu","year":"2001","journal-title":"CIKM"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/304181.304201"},{"key":"ref6","article-title":"Toward a Query Language for Network Attack Data","author":"chen","year":"2006","journal-title":"NetDB Workshop"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1132863.1132864"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872857"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030086"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872838"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/VAST.2006.261437"},{"key":"ref9","article-title":"Design Considerations for High Fan-in Systems: The HiFi Approach","author":"franklin","year":"2005","journal-title":"CIDR"},{"key":"ref1","first-page":"2003","article-title":"The CQL continuous query language: Semantic foundations and query execution","author":"arasu","year":"2003","journal-title":"Technical Report"},{"key":"ref20","article-title":"Snort-Lightweight Intrusion Detection for Networks","author":"roesch","year":"1999","journal-title":"Usenix LISA"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1007568.1007662"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1099554.1099718"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/E2EMON.2005.1564467"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/SSDM.1999.787637"},{"key":"ref26","article-title":"Tribeca: A system for Managing Large Databases of Network Traffic","author":"sullivan","year":"1998","journal-title":"USENIX"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2005.47"}],"event":{"name":"19th International Conference on Scientific and Statistical Database Management (SSDBM 2007)","location":"Bamff, AB, Canada","start":{"date-parts":[[2007,7,9]]},"end":{"date-parts":[[2007,7,11]]}},"container-title":["19th International Conference on Scientific and Statistical Database Management (SSDBM 2007)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4274937\/4274938\/04274973.pdf?arnumber=4274973","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,20]],"date-time":"2025-01-20T05:28:23Z","timestamp":1737350903000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4274973\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,7]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/ssdbm.2007.34","relation":{},"ISSN":["1551-6393"],"issn-type":[{"value":"1551-6393","type":"print"}],"subject":[],"published":{"date-parts":[[2007,7]]}}}