{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:22:30Z","timestamp":1750306950447,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,6,29]],"date-time":"2013-06-29T00:00:00Z","timestamp":1372464000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,6,29]]},"DOI":"10.1145\/2488222.2488268","type":"proceedings-article","created":{"date-parts":[[2013,7,2]],"date-time":"2013-07-02T14:33:48Z","timestamp":1372775628000},"page":"249-258","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Tutorial"],"prefix":"10.1145","author":[{"given":"Scott","family":"Schneider","sequence":"first","affiliation":[{"name":"IBM Watson Research Center, Yorktown Heights, NY, USA"}]},{"given":"Martin","family":"Hirzel","sequence":"additional","affiliation":[{"name":"IBM Watson Research Center, Yorktown Heights, NY, USA"}]},{"given":"Bu\u011fra","family":"Gedik","sequence":"additional","affiliation":[{"name":"Bilkent University, Ankara, Turkey"}]}],"member":"320","published-online":{"date-parts":[[2013,6,29]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"277","volume-title":"Conference on Innovative Data Systems Research (CIDR)","author":"Abadi Daniel J.","year":"2005"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1289612.1289615"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-004-0147-z"},{"key":"e_1_3_2_1_4_1","first-page":"480","volume-title":"Very Large Data Bases (VLDB)","author":"Arasu Arvind","year":"2004"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/301816.301823"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335420"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1385989.1386023"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1315451.1315523"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335432"},{"key":"e_1_3_2_1_10_1","first-page":"137","volume-title":"Operating Systems Design and Implementation (OSDI)","author":"Dean Jeffrey","year":"2004"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(82)90020-0"},{"key":"e_1_3_2_1_12_1","unstructured":"Hector Garcia-Molina Jeffrey D. Ullman and Jennifer Widom. Database Systems: The Complete Book. Pearson \/ Prentice Hall second edition 2008.   Hector Garcia-Molina Jeffrey D. Ullman and Jennifer Widom. Database Systems: The Complete Book. Pearson \/ Prentice Hall second edition 2008."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497448"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168877"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/605397.605428"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/93597.98720"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2009.39"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14778\/2350229.2350244"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","unstructured":"D. Karger E. Lehman T. Leighton R. Panigrahy M. Levine and D. Lewin. Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the world wide web. 1997.  D. Karger E. Lehman T. Leighton R. Panigrahy M. Levine and D. Lewin. Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the world wide web. 1997.","DOI":"10.1145\/258533.258660"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1813355.1813377"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1025127.1026015"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/PROC.1987.13876"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10424-4_16"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/238721.238771"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2010.172"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2005.13"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2006.105"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370816.2370826"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065910.1065927"},{"key":"e_1_3_2_1_32_1","unstructured":"Storm. http:\/\/storm-project.net\/. Retrieved April 2013.  Storm. http:\/\/storm-project.net\/. Retrieved April 2013."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/1315451.1315479"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1854273.1854319"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502057"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/1496950.1496970"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629600"}],"event":{"name":"DEBS '13: The 7th ACM International Conference on Distributed Event-Based Systems","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Arlington Texas USA","acronym":"DEBS '13"},"container-title":["Proceedings of the 7th ACM international conference on Distributed event-based systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2488222.2488268","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2488222.2488268","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:38:58Z","timestamp":1750235938000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2488222.2488268"}},"subtitle":["stream processing optimizations"],"short-title":[],"issued":{"date-parts":[[2013,6,29]]},"references-count":35,"alternative-id":["10.1145\/2488222.2488268","10.1145\/2488222"],"URL":"https:\/\/doi.org\/10.1145\/2488222.2488268","relation":{},"subject":[],"published":{"date-parts":[[2013,6,29]]},"assertion":[{"value":"2013-06-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}