{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:19:28Z","timestamp":1750306768285,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,3]],"date-time":"2013-11-03T00:00:00Z","timestamp":1383436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["931508"],"award-info":[{"award-number":["931508"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006919","name":"Massachusetts Institute of Technology","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006919","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,3]]},"DOI":"10.1145\/2517349.2522717","type":"proceedings-article","created":{"date-parts":[[2013,10,8]],"date-time":"2013-10-08T13:27:04Z","timestamp":1381238824000},"page":"85-100","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["Timecard"],"prefix":"10.1145","author":[{"given":"Lenin","family":"Ravindranath","sequence":"first","affiliation":[{"name":"M.I.T. &amp; Microsoft Research"}]},{"given":"Jitendra","family":"Padhye","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Ratul","family":"Mahajan","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Hari","family":"Balakrishnan","sequence":"additional","affiliation":[{"name":"M.I.T."}]}],"member":"320","published-online":{"date-parts":[[2013,11,3]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"NSDI","author":"Agarwal A.","year":"2009","unstructured":"A. Agarwal , S. Kandula , N. Bruno , M. Wu , I. Stoica , and J. Zhou . Re-optimizing Data-Parallel Computing . In NSDI , 2009 . A. Agarwal, S. Kandula, N. Bruno, M. Wu, I. Stoica, and J. Zhou. Re-optimizing Data-Parallel Computing. In NSDI, 2009."},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402967"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851275.1851192"},{"key":"e_1_3_2_2_4_1","volume-title":"OSDI","author":"Barham P.","year":"2004","unstructured":"P. Barham , A. Donnelly , R. Isaacs , and R. Mortier . Using Magpie for Request Extraction and Workload Modelling . In OSDI , 2004 . P. Barham, A. Donnelly, R. Isaacs, and R. Mortier. Using Magpie for Request Extraction and Workload Modelling. In OSDI, 2004."},{"key":"e_1_3_2_2_5_1","unstructured":"J. Brutlag. Speed matters for Google web search. http:\/\/googleresearch.blogspot.com\/2009\/06\/speed-matters.html#!\/2009\/06\/speed-matters.html 2009.  J. Brutlag. Speed matters for Google web search. http:\/\/googleresearch.blogspot.com\/2009\/06\/speed-matters.html#!\/2009\/06\/speed-matters.html 2009."},{"key":"e_1_3_2_2_6_1","unstructured":"Background Transfer Service for Windows Phone. http:\/\/msdn.microsoft.com\/en-us\/library\/hh202955(v=vs.92).aspx.  Background Transfer Service for Windows Phone. http:\/\/msdn.microsoft.com\/en-us\/library\/hh202955(v=vs.92).aspx."},{"key":"e_1_3_2_2_7_1","volume-title":"Google","author":"Chelba C.","year":"2012","unstructured":"C. Chelba , D. Bikel , M. Shugrina , P. Nguyen , and S. Kumar . Large scale language modeling in automatic speech recognition. Technical report , Google , 2012 . C. Chelba, D. Bikel, M. Shugrina, P. Nguyen, and S. Kumar. Large scale language modeling in automatic speech recognition. Technical report, Google, 2012."},{"key":"e_1_3_2_2_8_1","volume-title":"NSDI","author":"Chen M.","year":"2004","unstructured":"M. Chen , A. Accardi , E. Kiciman , J. Lloyd , D. Patterson , A. Fox , and E. Brewer . Path-Based Failure and Evolution Mangement . In NSDI , 2004 . M. Chen, A. Accardi, E. Kiciman, J. Lloyd, D. Patterson, A. Fox, and E. Brewer. Path-Based Failure and Evolution Mangement. In NSDI, 2004."},{"key":"e_1_3_2_2_9_1","volume-title":"OSDI","author":"Corbett J. C.","year":"2012","unstructured":"J. C. Corbett : Googles Globally-Distributed Database . In OSDI , 2012 . J. C. Corbett et al. Spanner: Googles Globally-Distributed Database. In OSDI, 2012."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/645609.662464"},{"key":"e_1_3_2_2_11_1","unstructured":"Flurry. http:\/\/www.flurry.com\/.  Flurry. http:\/\/www.flurry.com\/."},{"key":"e_1_3_2_2_12_1","volume-title":"NSDI","author":"Fonseca R.","year":"2007","unstructured":"R. Fonseca , G. Porter , R. H. Katz , S. Shenker , and I. Stoica . X-Trace: A Pervasive Network Tracing Framework . In NSDI , 2007 . R. Fonseca, G. Porter, R. H. Katz, S. Shenker, and I. Stoica. X-Trace: A Pervasive Network Tracing Framework. In NSDI, 2007."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.3115\/991250.991310"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592576"},{"key":"e_1_3_2_2_15_1","unstructured":"J. Hamilton. The cost of latency. http:\/\/perspectives.mvdirona.com\/2009\/10\/31\/TheCostOfLatency.aspx.  J. Hamilton. The cost of latency. http:\/\/perspectives.mvdirona.com\/2009\/10\/31\/TheCostOfLatency.aspx."},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2465430"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307658"},{"key":"e_1_3_2_2_18_1","volume-title":"HotNets","author":"Kandula S.","year":"2009","unstructured":"S. Kandula , J. Padhye , and P. Bahl . Flyways To De-Congest Data Center Networks . In HotNets , 2009 . S. Kandula, J. Padhye, and P. Bahl. Flyways To De-Congest Data Center Networks. In HotNets, 2009."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1504\/IJAHUC.2006.010505"},{"key":"e_1_3_2_2_20_1","volume-title":"Network time protocol version 4: Protocol and algorithms specification. RFC 5905","author":"Mills D.","year":"2010","unstructured":"D. Mills , J. Martin , J. Burbank , and W. Kiasch . Network time protocol version 4: Protocol and algorithms specification. RFC 5905 , 2010 . D. Mills, J. Martin, J. Burbank, and W. Kiasch. Network time protocol version 4: Protocol and algorithms specification. RFC 5905, 2010."},{"key":"e_1_3_2_2_21_1","volume-title":"INFOCOM","author":"Moon S.","year":"2009","unstructured":"S. Moon , P. Skelly , and D. Towsley . Estimation and removal of clock skew from network delay measurements . In INFOCOM , 2009 . S. Moon, P. Skelly, and D. Towsley. Estimation and removal of clock skew from network delay measurements. In INFOCOM, 2009."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464452"},{"key":"e_1_3_2_2_23_1","volume-title":"OSDI","author":"Nightingale E. B.","year":"2012","unstructured":"E. B. Nightingale , J. Elson , J. Fan , O. Hofmann , J. Howell , and Y. Suzue . Flat Datacenter Storage . In OSDI , 2012 . E. B. Nightingale, J. Elson, J. Fan, O. Hofmann, J. Howell, and Y. Suzue. Flat Datacenter Storage. In OSDI, 2012."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/285243.285291"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168841"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/277858.277865"},{"key":"e_1_3_2_2_27_1","unstructured":"Preemptive. http:\/\/www.preemptive.com\/.  Preemptive. http:\/\/www.preemptive.com\/."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1999995.2000026"},{"key":"e_1_3_2_2_29_1","volume-title":"OSDI","author":"Ravindranath L.","year":"2012","unstructured":"L. Ravindranath , J. Padhye , S. Agarwal , R. Mahajan , I. Obermiller , and S. Shayandeh . AppInsight: Mobile App Performance Monitoring in the Wild . In OSDI , 2012 . L. Ravindranath, J. Padhye, S. Agarwal, R. Mahajan, I. Obermiller, and S. Shayandeh. AppInsight: Mobile App Performance Monitoring in the Wild. In OSDI, 2012."},{"key":"e_1_3_2_2_30_1","volume-title":"additional bytes, and http chunking in web search. O'Reilly Velocity","author":"Shurman E.","year":"2009","unstructured":"E. Shurman . The user and business impact of server delays , additional bytes, and http chunking in web search. O'Reilly Velocity , 2009 . E. Shurman. The user and business impact of server delays, additional bytes, and http chunking in web search. O'Reilly Velocity, 2009."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592604"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043164.2018479"},{"key":"e_1_3_2_2_33_1","volume-title":"NSDI","author":"Winstein K.","year":"2013","unstructured":"K. Winstein , A. Sivaraman , and H. Balakrishnan . Stochastic Forecasts Achieve High Throughput and Low Delay over Cellular Networks . In NSDI , 2013 . K. Winstein, A. Sivaraman, and H. Balakrishnan. Stochastic Forecasts Achieve High Throughput and Low Delay over Cellular Networks. In NSDI, 2013."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2462456.2464453"}],"event":{"name":"SOSP '13: ACM SIGOPS 24th Symposium on Operating Systems Principles","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Farminton Pennsylvania","acronym":"SOSP '13"},"container-title":["Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517349.2522717","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2517349.2522717","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:53Z","timestamp":1750231733000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517349.2522717"}},"subtitle":["controlling user-perceived delays in server-based mobile applications"],"short-title":[],"issued":{"date-parts":[[2013,11,3]]},"references-count":34,"alternative-id":["10.1145\/2517349.2522717","10.1145\/2517349"],"URL":"https:\/\/doi.org\/10.1145\/2517349.2522717","relation":{},"subject":[],"published":{"date-parts":[[2013,11,3]]},"assertion":[{"value":"2013-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}