{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T09:49:45Z","timestamp":1773481785786,"version":"3.50.1"},"reference-count":115,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T00:00:00Z","timestamp":1544054400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Database Syst."],"published-print":{"date-parts":[[2018,12,31]]},"abstract":"<jats:p>\n            As data volumes continue to rise, manual inspection is becoming increasingly untenable. In response, we present MacroBase, a data analytics engine that prioritizes end-user attention in high-volume\n            <jats:italic>fast data<\/jats:italic>\n            streams. MacroBase enables efficient, accurate, and modular analyses that highlight and aggregate important and unusual behavior, acting as a search engine for fast data. MacroBase is able to deliver order-of-magnitude speedups over alternatives by optimizing the combination of explanation (i.e., feature selection) and classification tasks and by leveraging a new reservoir sampler and heavy-hitters sketch specialized for fast data streams. As a result, MacroBase delivers accurate results at speeds of up to 2M events per second per query on a single core. The system has delivered meaningful results in production, including at a telematics company monitoring hundreds of thousands of vehicles.\n          <\/jats:p>","DOI":"10.1145\/3276463","type":"journal-article","created":{"date-parts":[[2018,12,6]],"date-time":"2018-12-06T13:34:16Z","timestamp":1544103256000},"page":"1-45","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["MacroBase"],"prefix":"10.1145","volume":"43","author":[{"given":"Firas","family":"Abuzaid","sequence":"first","affiliation":[{"name":"Stanford InfoLab, Stanford, CA"}]},{"given":"Peter","family":"Bailis","sequence":"additional","affiliation":[{"name":"Stanford InfoLab, Stanford, CA"}]},{"given":"Jialin","family":"Ding","sequence":"additional","affiliation":[{"name":"Stanford InfoLab, Stanford, CA"}]},{"given":"Edward","family":"Gan","sequence":"additional","affiliation":[{"name":"Stanford InfoLab, Stanford, CA"}]},{"given":"Samuel","family":"Madden","sequence":"additional","affiliation":[{"name":"MIT CSAIL, Cambridge, MA"}]},{"given":"Deepak","family":"Narayanan","sequence":"additional","affiliation":[{"name":"Stanford InfoLab, Stanford, CA"}]},{"given":"Kexin","family":"Rong","sequence":"additional","affiliation":[{"name":"Stanford InfoLab, Stanford, CA"}]},{"given":"Sahaana","family":"Suri","sequence":"additional","affiliation":[{"name":"Stanford InfoLab, Stanford, CA"}]}],"member":"320","published-online":{"date-parts":[[2018,12,6]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Retrieved","year":"2016","unstructured":"2016. OpenGamma. Retrieved July 2016 from http:\/\/www.opengamma.com\/. 2016. OpenGamma. Retrieved July 2016 from http:\/\/www.opengamma.com\/."},{"key":"e_1_2_1_2_1","volume-title":"Summary of the Amazon DynamoDB Service Disruption and Related Impacts in the US-East Region. Retrieved","year":"2016","unstructured":"2016. Summary of the Amazon DynamoDB Service Disruption and Related Impacts in the US-East Region. Retrieved February 2016 from https:\/\/aws.amazon.com\/message\/5467D2\/. 2016. Summary of the Amazon DynamoDB Service Disruption and Related Impacts in the US-East Region. Retrieved February 2016 from https:\/\/aws.amazon.com\/message\/5467D2\/."},{"key":"e_1_2_1_3_1","volume-title":"CAVIAR Test Case Scenarios. Retrieved","year":"2017","unstructured":"2017. CAVIAR Test Case Scenarios. Retrieved November 2017 from http:\/\/homepages.inf.ed.ac.uk\/rbf\/CAVIAR\/. 2017. CAVIAR Test Case Scenarios. Retrieved November 2017 from http:\/\/homepages.inf.ed.ac.uk\/rbf\/CAVIAR\/."},{"key":"e_1_2_1_4_1","volume-title":"Abadi et al","author":"Daniel","year":"2005","unstructured":"Daniel J. Abadi et al . 2005 . The design of the Borealis stream processing engine. In CIDR. Daniel J. Abadi et al. 2005. The design of the Borealis stream processing engine. In CIDR."},{"key":"e_1_2_1_5_1","unstructured":"Charu C. Aggarwal. 2006. On biased reservoir sampling in the presence of stream evolution. In VLDB.   Charu C. Aggarwal. 2006. On biased reservoir sampling in the presence of stream evolution. In VLDB."},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1196418"},{"key":"e_1_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Charu C. Aggarwal. 2013. Outlier Analysis.   Charu C. Aggarwal. 2013. Outlier Analysis.","DOI":"10.1007\/978-1-4614-6396-2"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.procs.2015.08.220"},{"key":"e_1_2_1_9_1","first-page":"119","article-title":"Approximate is better than \u201cexact\u201d for interval estimation of binomial proportions","volume":"52","author":"Agresti Alan","year":"1998","unstructured":"Alan Agresti and Brent A. Coull . 1998 . Approximate is better than \u201cexact\u201d for interval estimation of binomial proportions . The American Statistician 52 , 2 (1998), 119 -- 126 . Alan Agresti and Brent A. Coull. 1998. Approximate is better than \u201cexact\u201d for interval estimation of binomial proportions. The American Statistician 52, 2 (1998), 119--126.","journal-title":"The American Statistician"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cie.2012.02.002"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2017.04.070"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.016"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-014-0365-y"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-004-0147-z"},{"key":"e_1_2_1_15_1","unstructured":"Anthony Asta. 2016. Observability at Twitter: Technical overview part I. Retrieved from https:\/\/blog.twitter.com\/2016\/observability-at-twitter-technical-overview-part-i.  Anthony Asta. 2016. Observability at Twitter: Technical overview part I. Retrieved from https:\/\/blog.twitter.com\/2016\/observability-at-twitter-technical-overview-part-i."},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3035928"},{"key":"e_1_2_1_17_1","unstructured":"Peter Bailis Edward Gan Kexin Rong and Sahaana Suri. 2017. Prioritizing attention in fast data: Principles and promise. In CIDR.  Peter Bailis Edward Gan Kexin Rong and Sahaana Suri. 2017. Prioritizing attention in fast data: Principles and promise. In CIDR."},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2674061.2674064"},{"key":"e_1_2_1_19_1","volume-title":"The control of the false discovery rate in multiple testing under dependency. Annals of Statistics","author":"Benjamini Yoav","year":"2001","unstructured":"Yoav Benjamini and Daniel Yekutieli . 2001. The control of the false discovery rate in multiple testing under dependency. Annals of Statistics ( 2001 ), 1165--1188. Yoav Benjamini and Daniel Yekutieli. 2001. The control of the false discovery rate in multiple testing under dependency. Annals of Statistics (2001), 1165--1188."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1756006.1859903"},{"key":"e_1_2_1_21_1","volume-title":"Hand","author":"Bolton Richard J.","year":"2002","unstructured":"Richard J. Bolton and David J . Hand . 2002 . Statistical fraud detection: A review. Statistical Science ( 2002), 235--249. Richard J. Bolton and David J. Hand. 2002. Statistical fraud detection: A review. Statistical Science (2002), 235--249."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335388"},{"key":"e_1_2_1_23_1","volume-title":"Encyclopedia of Database Systems. 2235--2240.","author":"Buragohain Chiranjeeb","unstructured":"Chiranjeeb Buragohain and Subhash Suri . 2009. Quantiles on streams . In Encyclopedia of Database Systems. 2235--2240. Chiranjeeb Buragohain and Subhash Suri. 2009. Quantiles on streams. In Encyclopedia of Database Systems. 2235--2240."},{"key":"e_1_2_1_24_1","unstructured":"R. W. Butler P. L. Davies and M. Jhun. 1993. Asymptotics for the minimum covariance determinant estimator. The Annals of Statistics (1993) 1385--1400.  R. W. Butler P. L. Davies and M. Jhun. 1993. Asymptotics for the minimum covariance determinant estimator. The Annals of Statistics (1993) 1385--1400."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-015-0444-8"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14778\/2733004.2733045"},{"key":"e_1_2_1_27_1","volume-title":"Rundensteiner","author":"Cao Lei","year":"2014","unstructured":"Lei Cao , Di Yang , Qingyang Wang , Yanwei Yu , Jiayuan Wang , and Elke A . Rundensteiner . 2014 . Scalable distance-based outlier detection over high-volume data streams. In ICDE. Lei Cao, Di Yang, Qingyang Wang, Yanwei Yu, Jiayuan Wang, and Elke A. Rundensteiner. 2014. Scalable distance-based outlier detection over high-volume data streams. In ICDE."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.14778\/2735496.2735503"},{"key":"e_1_2_1_30_1","doi-asserted-by":"crossref","unstructured":"Sirish Chandrasekaran et al. 2003. TelegraphCQ: Continuous dataflow processing for an uncertain world. In CIDR.  Sirish Chandrasekaran et al. 2003. TelegraphCQ: Continuous dataflow processing for an uncertain world. In CIDR.","DOI":"10.1145\/872757.872857"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/69.3.653"},{"key":"e_1_2_1_32_1","unstructured":"Mike Chen Alice X. Zheng Jim Lloyd Michael I. Jordan and Eric Brewer. 2004. Failure diagnosis using decision trees. In ICAC.  Mike Chen Alice X. Zheng Jim Lloyd Michael I. Jordan and Eric Brewer. 2004. Failure diagnosis using decision trees. In ICAC."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-007-0092-4"},{"key":"e_1_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Kai-Wen Cheng Yie-Tarng Chen and Wen-Hsien Fang. 2015. Video anomaly detection and localization using hierarchical feature representation and Gaussian process regression. In CVPR. 2909--2917.  Kai-Wen Cheng Yie-Tarng Chen and Wen-Hsien Fang. 2015. Video anomaly detection and localization using hierarchical feature representation and Gaussian process regression. In CVPR. 2909--2917.","DOI":"10.1109\/CVPR.2015.7298909"},{"key":"e_1_2_1_35_1","unstructured":"David Clayton Michael Hills and A. Pickles. 1993. Statistical Models in Epidemiology. Vol. 161. Oxford University Press Oxford.  David Clayton Michael Hills and A. Pickles. 1993. Statistical Models in Epidemiology. Vol. 161. Oxford University Press Oxford."},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1561\/1900000004"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-009-0172-z"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497562"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872838"},{"key":"e_1_2_1_40_1","first-page":"149","article-title":"SAMOA: Scalable advanced massive online analysis","volume":"16","author":"Francisci Morales Gianmarco De","year":"2015","unstructured":"Gianmarco De Francisci Morales and Albert Bifet . 2015 . SAMOA: Scalable advanced massive online analysis . Journal of Machine Learning Resarche 16 , 1 (2015), 149 -- 153 . Gianmarco De Francisci Morales and Albert Bifet. 2015. SAMOA: Scalable advanced massive online analysis. Journal of Machine Learning Resarche 16, 1 (2015), 149--153.","journal-title":"Journal of Machine Learning Resarche"},{"key":"e_1_2_1_41_1","volume-title":"Algorithms, Probability, Networks, and Games","author":"Efraimidis Pavlos S.","unstructured":"Pavlos S. Efraimidis . 2015. Weighted random sampling over data streams . In Algorithms, Probability, Networks, and Games . Springer , 183--195. Pavlos S. Efraimidis. 2015. Weighted random sampling over data streams. In Algorithms, Probability, Networks, and Games. Springer, 183--195."},{"key":"e_1_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Alexei A. Efros Alexander C. Berg Greg Mori and Jitendra Malik. 2003. Recognizing action at a distance. In ICCV.   Alexei A. Efros Alexander C. Berg Greg Mori and Jitendra Malik. 2003. Recognizing action at a distance. In ICCV.","DOI":"10.1109\/ICCV.2003.1238420"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.14778\/2735461.2735467"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patcog.2016.03.028"},{"key":"e_1_2_1_45_1","volume-title":"Intrusion Detection: Network Security Beyond the Firewall","author":"Escamilla Terry","year":"1998","unstructured":"Terry Escamilla . 1998 . Intrusion Detection: Network Security Beyond the Firewall . John Wiley 8 Sons, Inc. Terry Escamilla. 1998. Intrusion Detection: Network Security Beyond the Firewall. John Wiley 8 Sons, Inc."},{"key":"e_1_2_1_46_1","unstructured":"Martin Ester Hans-Peter Kriegel J\u00f6rg Sander and Xiaowei Xu. 1996. A density-based algorithm for discovering clusters in large spatial databases with noise. In KDD. 226--231.   Martin Ester Hans-Peter Kriegel J\u00f6rg Sander and Xiaowei Xu. 1996. A density-based algorithm for discovering clusters in large spatial databases with noise. In KDD. 226--231."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213874"},{"key":"e_1_2_1_48_1","volume-title":"Bolles","author":"Fischler Martin A.","year":"1987","unstructured":"Martin A. Fischler and Robert C . Bolles . 1987 . Readings in computer vision: Issues, problems, principles, and paradigms. Chapter : Random Sample Consensus: A Paradigm for Model Fitting with Applications to Image Analysis and Automated Cartography , 726--740. Martin A. Fischler and Robert C. Bolles. 1987. Readings in computer vision: Issues, problems, principles, and paradigms. Chapter: Random Sample Consensus: A Paradigm for Model Fitting with Applications to Image Analysis and Automated Cartography, 726--740."},{"key":"e_1_2_1_49_1","volume-title":"SPMF: An Open-Source Data Mining Library -- Performance.","author":"Fournier-Viger Philippe","year":"2015","unstructured":"Philippe Fournier-Viger . 2015 . SPMF: An Open-Source Data Mining Library -- Performance. Retrieved from http:\/\/www.philippe-fournier-viger.com\/spmf\/. Philippe Fournier-Viger. 2015. SPMF: An Open-Source Data Mining Library -- Performance. Retrieved from http:\/\/www.philippe-fournier-viger.com\/spmf\/."},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523813"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064035"},{"key":"e_1_2_1_52_1","volume-title":"Garthwaite and Inge Koch","author":"Paul","year":"2016","unstructured":"Paul H. Garthwaite and Inge Koch . 2016 . Evaluating the contributions of individual variables to a quadratic form. Australian 8 New Zealand Journal of Statistics 58, 1 (2016), 99--119. Paul H. Garthwaite and Inge Koch. 2016. Evaluating the contributions of individual variables to a quadratic form. Australian 8 New Zealand Journal of Statistics 58, 1 (2016), 99--119."},{"key":"e_1_2_1_53_1","volume-title":"Wavescope: A signal-oriented data stream management system. In ICDE.","author":"Lewis Girod","year":"2006","unstructured":"Lewis Girod et al. 2006 . Wavescope: A signal-oriented data stream management system. In ICDE. Lewis Girod et al. 2006. Wavescope: A signal-oriented data stream management system. In ICDE."},{"key":"e_1_2_1_54_1","volume-title":"A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PLoS One 11, 4 (04","author":"Goldstein Markus","year":"2016","unstructured":"Markus Goldstein and Seiichi Uchida . 2016. A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PLoS One 11, 4 (04 2016 ), 1--31. Markus Goldstein and Seiichi Uchida. 2016. A comparative evaluation of unsupervised anomaly detection algorithms for multivariate data. PLoS One 11, 4 (04 2016), 1--31."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/2621979"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10618-006-0059-1"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/342009.335372"},{"key":"e_1_2_1_59_1","volume-title":"Rocke","author":"Hardin Johanna","year":"2004","unstructured":"Johanna Hardin and David M . Rocke . 2004 . Outlier detection in the multiple cluster setting using the minimum covariance determinant estimator. Computational Statistics 8 Data Analysis 44, 4 (2004), 625--638. Johanna Hardin and David M. Rocke. 2004. Outlier detection in the multiple cluster setting using the minimum covariance determinant estimator. Computational Statistics 8 Data Analysis 44, 4 (2004), 625--638."},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1198\/106186005X77685"},{"key":"e_1_2_1_61_1","volume-title":"The Elements of Statistical Learning","author":"Hastie Trevor","unstructured":"Trevor Hastie , Robert Tibshirani , and Jerome Friedman . 2009. The Elements of Statistical Learning . Springer-Verlag , New York . Trevor Hastie, Robert Tibshirani, and Jerome Friedman. 2009. The Elements of Statistical Learning. Springer-Verlag, New York."},{"key":"e_1_2_1_62_1","unstructured":"Joseph M. Hellerstein. 2008. Quantitative data cleaning for large databases. United Nations Economic Commission for Europe (UNECE).  Joseph M. Hellerstein. 2008. Quantitative data cleaning for large databases. United Nations Economic Commission for Europe (UNECE)."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"e_1_2_1_64_1","volume-title":"RapidMiner: Data Mining Use Cases and Business Analytics Applications","author":"Hofmann Markus","unstructured":"Markus Hofmann and Ralf Klinkenberg . 2013. RapidMiner: Data Mining Use Cases and Business Analytics Applications . CRC Press . Markus Hofmann and Ralf Klinkenberg. 2013. RapidMiner: Data Mining Use Cases and Business Analytics Applications. CRC Press."},{"key":"e_1_2_1_65_1","volume-title":"Robust Statistics","author":"Huber Peter J.","unstructured":"Peter J. Huber . 2011. Robust Statistics . Springer . Peter J. Huber. 2011. Robust Statistics. Springer."},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1002\/wics.61"},{"key":"e_1_2_1_67_1","unstructured":"William H. Hunter. 2015. US Chemical Safety Board: Analysis of Horsehead Corporation Monaca Refinery Fatal Explosion and Fire. Retrieved from http:\/\/www.csb.gov\/horsehead-holding-company-fatal-explosion-and-fire\/.  William H. Hunter. 2015. US Chemical Safety Board: Analysis of Horsehead Corporation Monaca Refinery Fatal Explosion and Fire. Retrieved from http:\/\/www.csb.gov\/horsehead-holding-company-fatal-explosion-and-fire\/."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.72"},{"key":"e_1_2_1_69_1","unstructured":"IDC. 2014. The Digital Universe of Opportunities: Rich Data and the Increasing Value of the Internet of Things. Retrieved from http:\/\/www.emc.com\/leadership\/digital-universe\/.  IDC. 2014. The Digital Universe of Opportunities: Rich Data and the Increasing Value of the Internet of Things. Retrieved from http:\/\/www.emc.com\/leadership\/digital-universe\/."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1561\/1900000045"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376686"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.14778\/3137628.3137664"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732951.2732959"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065215"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1058150.1058158"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.ivs.9500089"},{"key":"e_1_2_1_77_1","volume-title":"European Symposium on Artificial Neural Networks. 89","author":"Malhotra Pankaj","year":"2015","unstructured":"Pankaj Malhotra , Lovekesh Vig , Gautam Shroff , and Puneet Agarwal . 2015 . Long short term memory networks for anomaly detection in time series . In European Symposium on Artificial Neural Networks. 89 . Pankaj Malhotra, Lovekesh Vig, Gautam Shroff, and Puneet Agarwal. 2015. Long short term memory networks for anomaly detection in time series. In European Symposium on Artificial Neural Networks. 89."},{"key":"e_1_2_1_78_1","volume-title":"Maintenance for Industrial Systems","author":"Manzini Riccardo","unstructured":"Riccardo Manzini , Alberto Regattieri , Hoang Pham , and Emilio Ferrari . 2009. Maintenance for Industrial Systems . Springer Science 8 Business Media. Riccardo Manzini, Alberto Regattieri, Hoang Pham, and Emilio Ferrari. 2009. Maintenance for Industrial Systems. Springer Science 8 Business Media."},{"key":"e_1_2_1_79_1","volume-title":"Robust Statistics","author":"Maronna RARD","unstructured":"RARD Maronna , Douglas Martin , and Victor Yohai . 2006. Robust Statistics . John Wiley 8 Sons, Chichester. ISBN. RARD Maronna, Douglas Martin, and Victor Yohai. 2006. Robust Statistics. John Wiley 8 Sons, Chichester. ISBN."},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.14778\/2733004.2733070"},{"key":"e_1_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30570-5_27"},{"key":"e_1_2_1_82_1","volume-title":"Gardner","author":"Morris Julie A.","year":"1988","unstructured":"Julie A. Morris and Martin J . Gardner . 1988 . Statistics in medicine: Calculating confidence intervals for relative risks (odds ratios) and standardised ratios and rates. British Medical Journal (Clinical Research ed.) 296, 6632 (1988), 1313. Julie A. Morris and Martin J. Gardner. 1988. Statistics in medicine: Calculating confidence intervals for relative risks (odds ratios) and standardised ratios and rates. British Medical Journal (Clinical Research ed.) 296, 6632 (1988), 1313."},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.283931"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788624"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177704472"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.14778\/2824032.2824078"},{"key":"e_1_2_1_87_1","unstructured":"Clifton Phua Vincent Lee Kate Smith and Ross Gayler. 2010. A comprehensive survey of data mining-based fraud detection research. arXiv preprint arXiv:1009.6119  Clifton Phua Vincent Lee Kate Smith and Ross Gayler. 2010. A comprehensive survey of data mining-based fraud detection research. arXiv preprint arXiv:1009.6119"},{"key":"e_1_2_1_88_1","doi-asserted-by":"crossref","unstructured":"Dragoljub Pokrajac Aleksandar Lazarevic and Longin Jan Latecki. 2007. Incremental local outlier detection for data streams. In CIDM.  Dragoljub Pokrajac Aleksandar Lazarevic and Longin Jan Latecki. 2007. Incremental local outlier detection for data streams. In CIDM.","DOI":"10.1109\/CIDM.2007.368917"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1081\/SAC-100001856"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2396776"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.14778\/3137628.3137645"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.2307\/1270566"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1002\/widm.2"},{"key":"e_1_2_1_94_1","volume-title":"Igor Dvorkin, and Manish Kumar.","author":"Roy Sudip","year":"2015","unstructured":"Sudip Roy , Arnd Christian K\u00f6nig , Igor Dvorkin, and Manish Kumar. 2015 . Perfaugur : Robust diagnostics for performance anomalies in cloud services. In ICDE. Sudip Roy, Arnd Christian K\u00f6nig, Igor Dvorkin, and Manish Kumar. 2015. Perfaugur: Robust diagnostics for performance anomalies in cloud services. In ICDE."},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588578"},{"key":"e_1_2_1_96_1","volume-title":"et al","author":"Rupert G.","year":"2012","unstructured":"G. Rupert , Jr. et al . 2012 . Simultaneous Statistical Inference. Springer Science 8 Business Media. G. Rupert, Jr. et al. 2012. Simultaneous Statistical Inference. Springer Science 8 Business Media."},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022810614389"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1162\/089976601750264965"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.14778\/2824032.2824115"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207390601116086"},{"key":"e_1_2_1_102_1","unstructured":"Herbert A. Simon. 1971. Designing organizations for an information rich world. In Computers Communications and the Public Interest. 37--72. http:\/\/opacplus.bsb-muenchen.de\/search?isbn&equals;0-8018-1135-X.  Herbert A. Simon. 1971. Designing organizations for an information rich world. In Computers Communications and the Public Interest. 37--72. http:\/\/opacplus.bsb-muenchen.de\/search?isbn&equals;0-8018-1135-X."},{"key":"e_1_2_1_103_1","unstructured":"Sharmila Subramaniam et al. 2006. Online outlier detection in sensor data using non-parametric models. In VLDB.   Sharmila Subramaniam et al. 2006. Online outlier detection in sensor data using non-parametric models. In VLDB."},{"key":"e_1_2_1_104_1","volume-title":"DROP: Dimensionality reduction optimization for time series. arXiv:1708.00183. https:\/\/arxiv.org\/pdf\/1708.00183.pdf.","author":"Suri Sahaana","year":"2017","unstructured":"Sahaana Suri and Peter Bailis . 2017 . DROP: Dimensionality reduction optimization for time series. arXiv:1708.00183. https:\/\/arxiv.org\/pdf\/1708.00183.pdf. Sahaana Suri and Peter Bailis. 2017. DROP: Dimensionality reduction optimization for time series. arXiv:1708.00183. https:\/\/arxiv.org\/pdf\/1708.00183.pdf."},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183713.3196930"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2009.07.012"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1145\/3147.3165"},{"key":"e_1_2_1_108_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.95"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2750549"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018046501280"},{"key":"e_1_2_1_111_1","volume-title":"Kafka tops 1 trillion messages per day at LinkedIn. Datanami (September","author":"Woodie Alex","year":"2015","unstructured":"Alex Woodie . 2015. Kafka tops 1 trillion messages per day at LinkedIn. Datanami (September 2015 ). http:\/\/www.datanami.com\/2015\/09\/02\/kafka-tops-1-trillion-messages-per-day-at-linkedin\/. Alex Woodie. 2015. Kafka tops 1 trillion messages per day at LinkedIn. Datanami (September 2015). http:\/\/www.datanami.com\/2015\/09\/02\/kafka-tops-1-trillion-messages-per-day-at-linkedin\/."},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536354.2536356"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2915218"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2007.4629246"},{"key":"e_1_2_1_115_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098052"},{"key":"e_1_2_1_116_1","volume-title":"Learning under concept drift: An overview. CoRR abs\/1010.4784","author":"Zliobaite Indre","year":"2010","unstructured":"Indre Zliobaite . 2010. Learning under concept drift: An overview. CoRR abs\/1010.4784 ( 2010 ). http:\/\/arxiv.org\/abs\/1010.4784 Indre Zliobaite. 2010. Learning under concept drift: An overview. CoRR abs\/1010.4784 (2010). http:\/\/arxiv.org\/abs\/1010.4784"}],"container-title":["ACM Transactions on Database Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3276463","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3276463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:01:58Z","timestamp":1750208518000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3276463"}},"subtitle":["Prioritizing Attention in Fast Data"],"short-title":[],"issued":{"date-parts":[[2018,12,6]]},"references-count":115,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12,31]]}},"alternative-id":["10.1145\/3276463"],"URL":"https:\/\/doi.org\/10.1145\/3276463","relation":{},"ISSN":["0362-5915","1557-4644"],"issn-type":[{"value":"0362-5915","type":"print"},{"value":"1557-4644","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,12,6]]},"assertion":[{"value":"2017-11-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2018-12-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}