{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T02:16:10Z","timestamp":1773886570337,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,3]],"date-time":"2013-11-03T00:00:00Z","timestamp":1383436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,3]]},"DOI":"10.1145\/2517349.2522738","type":"proceedings-article","created":{"date-parts":[[2013,10,8]],"date-time":"2013-10-08T13:27:04Z","timestamp":1381238824000},"page":"439-455","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":498,"title":["Naiad"],"prefix":"10.1145","author":[{"given":"Derek G.","family":"Murray","sequence":"first","affiliation":[{"name":"Microsoft Research Silicon Valley"}]},{"given":"Frank","family":"McSherry","sequence":"additional","affiliation":[{"name":"Microsoft Research Silicon Valley"}]},{"given":"Rebecca","family":"Isaacs","sequence":"additional","affiliation":[{"name":"Microsoft Research Silicon Valley"}]},{"given":"Michael","family":"Isard","sequence":"additional","affiliation":[{"name":"Microsoft Research Silicon Valley"}]},{"given":"Paul","family":"Barham","sequence":"additional","affiliation":[{"name":"Microsoft Research Silicon Valley"}]},{"given":"Mart\u00edn","family":"Abadi","sequence":"additional","affiliation":[{"name":"Microsoft Research Silicon Valley"}]}],"member":"320","published-online":{"date-parts":[[2013,11,3]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"The ClueWeb09 Dataset. http:\/\/lemurproject.org\/clueweb09.  The ClueWeb09 Dataset. http:\/\/lemurproject.org\/clueweb09."},{"key":"e_1_3_2_2_2_1","unstructured":"Parallel Data Warehouse. http:\/\/www.microsoft.com\/en-us\/sqlserver\/solutions-technologies\/data-warehousing\/pdw.aspx.  Parallel Data Warehouse. http:\/\/www.microsoft.com\/en-us\/sqlserver\/solutions-technologies\/data-warehousing\/pdw.aspx."},{"key":"e_1_3_2_2_3_1","unstructured":"Storm: Distributed and fault-tolerant realtime computation. http:\/\/storm-project.net\/.  Storm: Distributed and fault-tolerant realtime computation. http:\/\/storm-project.net\/."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38592-6_2"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536222.2536229"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851192"},{"key":"e_1_3_2_2_7_1","volume-title":"Proceedings of the 5th Conference on Innovative Data Systems Research (CIDR)","author":"Alvaro P.","year":"2011"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043571"},{"issue":"1","key":"e_1_3_2_2_9_1","first-page":"241","volume":"2","author":"Chandramouli B.","year":"2009","journal-title":"On-the-fly progress detection in iterative stream queries. Proceedings of the Very Large Database Endowment (PVLDB)"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168846"},{"key":"e_1_3_2_2_11_1","volume-title":"Proceedings of the 14th Workshop on Hot Topics in Operating Systems (HotOS)","author":"Cipar J.","year":"2013"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"crossref","unstructured":"D. D. Clark. Window and acknowledgement strategy in TCP. RFC 813 July 1982.   D. D. Clark. Window and acknowledgement strategy in TCP. RFC 813 July 1982.","DOI":"10.17487\/rfc0813"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2391229.2391230"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408794"},{"key":"e_1_3_2_2_15_1","volume-title":"Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Dean J.","year":"2004"},{"key":"e_1_3_2_2_16_1","volume-title":"Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Gonzalez J. E.","year":"2012"},{"key":"e_1_3_2_2_17_1","volume-title":"Scaling Up Machine Learning: Parallel and Distributed Approaches","author":"Hsu D.","year":"2011"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273005"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465354"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/354871.354874"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1772690.1772751"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453890"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1142473.1142485"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095818"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1080091.1080126"},{"key":"e_1_3_2_2_26_1","volume-title":"Proceedings of the 26th Conference on Uncertainty in Artificial Intelligence (UAI)","author":"Low Y.","year":"2010"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807167.1807184"},{"key":"e_1_3_2_2_28_1","volume-title":"Proceedings of the 6th Conference on Innovative Data Systems Research (CIDR)","author":"McSherry F.","year":"2013"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2349896.2349907"},{"key":"e_1_3_2_2_30_1","volume-title":"Proceedings of the 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Murray D. G.","year":"2011"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2004.57"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"crossref","unstructured":"J. Nagle. Congestion control in IP\/TCP internetworks. RFC 896 Jan. 1984.   J. Nagle. Congestion control in IP\/TCP internetworks. RFC 896 Jan. 1984.","DOI":"10.17487\/rfc0896"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557914.1557933"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2124295.2124310"},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the 8th IEEE Symposium on High Performance Interconnects (HOT Interconnects)","author":"Pelissier J.","year":"2000"},{"key":"e_1_3_2_2_36_1","volume-title":"Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Peng D.","year":"2010"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/359060.359076"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2003.1198390"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502057"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2484425.2484427"},{"key":"e_1_3_2_2_41_1","volume-title":"Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Yu Y.","year":"2008"},{"key":"e_1_3_2_2_42_1","volume-title":"Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Zaharia M.","year":"2012"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522737"},{"key":"e_1_3_2_2_44_1","volume-title":"Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Zaharia M.","year":"2008"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038916.2038929"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2287036.2287041"}],"event":{"name":"SOSP '13: ACM SIGOPS 24th Symposium on Operating Systems Principles","location":"Farminton Pennsylvania","acronym":"SOSP '13","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517349.2522738","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2517349.2522738","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:53Z","timestamp":1750231733000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517349.2522738"}},"subtitle":["a timely dataflow system"],"short-title":[],"issued":{"date-parts":[[2013,11,3]]},"references-count":46,"alternative-id":["10.1145\/2517349.2522738","10.1145\/2517349"],"URL":"https:\/\/doi.org\/10.1145\/2517349.2522738","relation":{},"subject":[],"published":{"date-parts":[[2013,11,3]]},"assertion":[{"value":"2013-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}