{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,15]],"date-time":"2026-01-15T13:46:31Z","timestamp":1768484791591,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,5,9]],"date-time":"2017-05-09T00:00:00Z","timestamp":1494288000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,5,9]]},"DOI":"10.1145\/3035918.3035928","type":"proceedings-article","created":{"date-parts":[[2017,5,10]],"date-time":"2017-05-10T18:09:00Z","timestamp":1494439740000},"page":"541-556","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":65,"title":["MacroBase"],"prefix":"10.1145","author":[{"given":"Peter","family":"Bailis","sequence":"first","affiliation":[{"name":"Stanford Infolab, Stanford, CA, USA"}]},{"given":"Edward","family":"Gan","sequence":"additional","affiliation":[{"name":"Stanford Infolab, Stanford, CA, USA"}]},{"given":"Samuel","family":"Madden","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, Cambridge, MA, USA"}]},{"given":"Deepak","family":"Narayanan","sequence":"additional","affiliation":[{"name":"Stanford Infolab, Stanford, CA, USA"}]},{"given":"Kexin","family":"Rong","sequence":"additional","affiliation":[{"name":"Stanford Infolab, Stanford, CA, USA"}]},{"given":"Sahaana","family":"Suri","sequence":"additional","affiliation":[{"name":"Stanford Infolab, Stanford, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,5,9]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Caviar test case scenarios. http:\/\/homepages.inf.ed.ac.uk\/rbf\/CAVIAR\/.  Caviar test case scenarios. http:\/\/homepages.inf.ed.ac.uk\/rbf\/CAVIAR\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Opengamma 2015. http:\/\/www.opengamma.com\/.  Opengamma 2015. http:\/\/www.opengamma.com\/."},{"key":"e_1_3_2_1_3_1","unstructured":"Summary of the Amazon DynamoDB service disruption and related impacts in the US-East region 2015. https:\/\/aws.amazon.com\/message\/5467D2\/.  Summary of the Amazon DynamoDB service disruption and related impacts in the US-East region 2015. https:\/\/aws.amazon.com\/message\/5467D2\/."},{"key":"e_1_3_2_1_4_1","volume-title":"CIDR","author":"Abadi D. J.","year":"2005","unstructured":"D. J. Abadi The design of the borealis stream processing engine . In CIDR , 2005 . D. J. Abadi et al. The design of the borealis stream processing engine. In CIDR, 2005."},{"key":"e_1_3_2_1_5_1","volume-title":"VLDB","author":"Aggarwal C. C.","year":"2006","unstructured":"C. C. Aggarwal . On biased reservoir sampling in the presence of stream evolution . In VLDB , 2006 . C. C. Aggarwal. On biased reservoir sampling in the presence of stream evolution. In VLDB, 2006."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1196418"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"C. C. Aggarwal. Outlier Analysis. Springer 2013.   C. C. Aggarwal. Outlier Analysis. Springer 2013.","DOI":"10.1007\/978-1-4614-6396-2"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2012.02.002"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-004-0147-z"},{"key":"e_1_3_2_1_10_1","volume-title":"Observability at Twitter: technical overview, part i","author":"Asta A.","year":"2016","unstructured":"A. Asta . Observability at Twitter: technical overview, part i , 2016 . https:\/\/blog.twitter.com\/2016\/observability-at-twitter-technical-overview-part-i. A. Asta. Observability at Twitter: technical overview, part i, 2016. https:\/\/blog.twitter.com\/2016\/observability-at-twitter-technical-overview-part-i."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674061.2674064"},{"key":"e_1_3_2_1_12_1","first-page":"1165","volume-title":"The control of the false discovery rate in multiple testing under dependency. Annals of statistics","author":"Benjamini Y.","year":"2001","unstructured":"Y. Benjamini and D. Yekutieli . The control of the false discovery rate in multiple testing under dependency. Annals of statistics , pages 1165 -- 1188 , 2001 . Y. Benjamini and D. Yekutieli. The control of the false discovery rate in multiple testing under dependency. Annals of statistics, pages 1165--1188, 2001."},{"key":"e_1_3_2_1_13_1","first-page":"235","volume-title":"Statistical fraud detection: A review. Statistical science","author":"Bolton R. J.","year":"2002","unstructured":"R. J. Bolton and D. J. Hand . Statistical fraud detection: A review. Statistical science , pages 235 -- 249 , 2002 . R. J. Bolton and D. J. Hand. Statistical fraud detection: A review. Statistical science, pages 235--249, 2002."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-39940-9_290"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176349264"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.14778\/2733004.2733045"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2014.6816641"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.14778\/2735496.2735503"},{"key":"e_1_3_2_1_20_1","volume-title":"CIDR","author":"Chandrasekaran S.","year":"2003","unstructured":"S. Chandrasekaran : Continuous dataflow processing for an uncertain world . In CIDR , 2003 . S. Chandrasekaran et al. TelegraphCQ: Continuous dataflow processing for an uncertain world. In CIDR, 2003."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/69.3.653"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1078026.1078407"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/3227207.3227306"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1561\/1900000004"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-009-0172-z"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497562"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872838"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-24024-4_12"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/946247.946720"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.14778\/2735461.2735467"},{"key":"e_1_3_2_1_31_1","volume-title":"network security beyond the firewall","author":"Escamilla T.","year":"1998","unstructured":"T. Escamilla . Intrusion detection : network security beyond the firewall . John Wiley & Sons, Inc. , 1998 . T. Escamilla. Intrusion detection: network security beyond the firewall. John Wiley & Sons, Inc., 1998."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213874"},{"key":"e_1_3_2_1_33_1","volume-title":"Fournier-Viger","author":"P.","year":"2015","unstructured":"P. Fournier-Viger . SPMF : An Open-Source Data Mining Library - - Performance, 2015 . http:\/\/www.philippe-fournier-viger.com\/spmf\/. P. Fournier-Viger. SPMF: An Open-Source Data Mining Library -- Performance, 2015. http:\/\/www.philippe-fournier-viger.com\/spmf\/."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1111\/anzs.12144"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182886"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1371\/journal.pone.0152173"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-006-0059-1"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/335191.335372"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-9473(02)00280-3"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1198\/106186005X77685"},{"key":"e_1_3_2_1_42_1","volume-title":"United Nations Economic Commission for Europe (UNECE)","author":"Hellerstein J. M.","year":"2008","unstructured":"J. M. Hellerstein . Quantitative data cleaning for large databases . United Nations Economic Commission for Europe (UNECE) , 2008 . J. M. Hellerstein. Quantitative data cleaning for large databases. United Nations Economic Commission for Europe (UNECE), 2008."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"e_1_3_2_1_44_1","volume-title":"RapidMiner: Data mining use cases and business analytics applications","author":"Hofmann M.","year":"2013","unstructured":"M. Hofmann and R. Klinkenberg . RapidMiner: Data mining use cases and business analytics applications . CRC Press , 2013 . M. Hofmann and R. Klinkenberg. RapidMiner: Data mining use cases and business analytics applications. CRC Press, 2013."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04898-2_594"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1002\/wics.61"},{"key":"e_1_3_2_1_47_1","volume-title":"analysis of Horsehead Corporation Monaca Refinery fatal explosion and fire","author":"Hunter W. H.","year":"2015","unstructured":"W. H. Hunter . US Chemical Safety Board : analysis of Horsehead Corporation Monaca Refinery fatal explosion and fire , 2015 . http:\/\/www.csb.gov\/horsehead-holding-company-fatal-explosion-and-fire\/. W. H. Hunter. US Chemical Safety Board: analysis of Horsehead Corporation Monaca Refinery fatal explosion and fire, 2015. http:\/\/www.csb.gov\/horsehead-holding-company-fatal-explosion-and-fire\/."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.72"},{"key":"e_1_3_2_1_49_1","volume-title":"Rich data and the increasing value of the internet of things","author":"DC.","year":"2014","unstructured":"I DC. The digital universe of opportunities : Rich data and the increasing value of the internet of things , 2014 . http:\/\/www.emc.com\/leadership\/digital-universe\/. IDC. The digital universe of opportunities: Rich data and the increasing value of the internet of things, 2014. http:\/\/www.emc.com\/leadership\/digital-universe\/."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1561\/1900000045"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273005"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376686"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732951.2732959"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2742788"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065215"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ivs.9500089"},{"key":"e_1_3_2_1_57_1","volume-title":"The internet of things: mapping the value beyond the hype","author":"J. Manyika. McKinsey Global Institute","year":"2015","unstructured":"J. Manyika. McKinsey Global Institute : The internet of things: mapping the value beyond the hype . 2015 . J. Manyika. McKinsey Global Institute: The internet of things: mapping the value beyond the hype. 2015."},{"key":"e_1_3_2_1_58_1","volume-title":"Maintenance for industrial systems","author":"Manzini R.","year":"2009","unstructured":"R. Manzini , A. Regattieri , H. Pham , and E. Ferrari . Maintenance for industrial systems . Springer Science & Business Media , 2009 . R. Manzini, A. Regattieri, H. Pham, and E. Ferrari. Maintenance for industrial systems. Springer Science & Business Media, 2009."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1002\/0470010940"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.14778\/2733004.2733070"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30570-5_27"},{"key":"e_1_3_2_1_62_1","volume-title":"Statistics in medicine: Calculating confidence intervals for relative risks (odds ratios) and standardised ratios and rates. British medical journal (Clinical research ed.), 296(6632):1313","author":"Morris J. A.","year":"1988","unstructured":"J. A. Morris and M. J. Gardner . Statistics in medicine: Calculating confidence intervals for relative risks (odds ratios) and standardised ratios and rates. British medical journal (Clinical research ed.), 296(6632):1313 , 1988 . J. A. Morris and M. J. Gardner. Statistics in medicine: Calculating confidence intervals for relative risks (odds ratios) and standardised ratios and rates. British medical journal (Clinical research ed.), 296(6632):1313, 1988."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.283931"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788624"},{"key":"e_1_3_2_1_65_1","volume-title":"Android fragmentation visualized (august","year":"2015","unstructured":"OpenSignal. Android fragmentation visualized (august 2015 ). http:\/\/opensignal.com\/reports\/2015\/08\/android-fragmentation\/. OpenSignal. Android fragmentation visualized (august 2015). http:\/\/opensignal.com\/reports\/2015\/08\/android-fragmentation\/."},{"key":"e_1_3_2_1_66_1","volume-title":"A comprehensive survey of data mining-based fraud detection research. arXiv preprint arXiv:1009.6119","author":"Phua C.","year":"2010","unstructured":"C. Phua , V. Lee , K. Smith , and R. Gayler . A comprehensive survey of data mining-based fraud detection research. arXiv preprint arXiv:1009.6119 , 2010 . C. Phua, V. Lee, K. Smith, and R. Gayler. A comprehensive survey of data mining-based fraud detection research. arXiv preprint arXiv:1009.6119, 2010."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIDM.2007.368917"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1081\/SAC-100001856"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.2307\/1270566"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113365"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588578"},{"key":"e_1_3_2_1_72_1","volume-title":"Simultaneous statistical inference","author":"Rupert G.","year":"2012","unstructured":"G. Rupert Jr Simultaneous statistical inference . Springer Science & Business Media , 2012 . G. Rupert Jr et al. Simultaneous statistical inference. Springer Science & Business Media, 2012."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.14778\/2824032.2824115"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207390601116086"},{"key":"e_1_3_2_1_76_1","volume-title":"VLDB","author":"Subramaniam S.","year":"2006","unstructured":"S. Subramaniam , T. Palpanas , D. Papadopoulos , V. Kalogeraki , and D. Gunopulos . Online outlier detection in sensor data using non-parametric models . In VLDB , 2006 . S. Subramaniam, T. Palpanas, D. Papadopoulos, V. Kalogeraki, and D. Gunopulos. Online outlier detection in sensor data using non-parametric models. In VLDB, 2006."},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.07.012"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3147.3165"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2750549"},{"key":"e_1_3_2_1_80_1","volume-title":"Datanami","author":"Woodie A.","year":"2015","unstructured":"A. Woodie . Kafka tops 1 trillion messages per day at LinkedIn . Datanami , September 2015 . http:\/\/www.datanami.com\/2015\/09\/02\/kafka-tops-1-trillion-messages-per-day-at-linkedin\/. A. Woodie. Kafka tops 1 trillion messages per day at LinkedIn. Datanami, September 2015. http:\/\/www.datanami.com\/2015\/09\/02\/kafka-tops-1-trillion-messages-per-day-at-linkedin\/."},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536354.2536356"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2915218"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2007.4629246"}],"event":{"name":"SIGMOD\/PODS'17: International Conference on Management of Data","location":"Chicago Illinois USA","acronym":"SIGMOD\/PODS'17","sponsor":["SIGMOD ACM Special Interest Group on Management of Data"]},"container-title":["Proceedings of the 2017 ACM International Conference on Management of Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3035918.3035928","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3035918.3035928","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:36:47Z","timestamp":1750217807000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3035918.3035928"}},"subtitle":["Prioritizing Attention in Fast Data"],"short-title":[],"issued":{"date-parts":[[2017,5,9]]},"references-count":82,"alternative-id":["10.1145\/3035918.3035928","10.1145\/3035918"],"URL":"https:\/\/doi.org\/10.1145\/3035918.3035928","relation":{},"subject":[],"published":{"date-parts":[[2017,5,9]]},"assertion":[{"value":"2017-05-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}