{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T18:20:09Z","timestamp":1766600409255,"version":"3.37.3"},"reference-count":24,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T00:00:00Z","timestamp":1631491200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T00:00:00Z","timestamp":1631491200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"National Science Foundation","award":["NSF CNS-1329807","NSF CNS-1318678"],"award-info":[{"award-number":["NSF CNS-1329807","NSF CNS-1318678"]}]},{"name":"National Science Foundation","award":["NSF XPS-1533870","NSF XPS-1533802"],"award-info":[{"award-number":["NSF XPS-1533870","NSF XPS-1533802"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Distrib. Comput."],"published-print":{"date-parts":[[2021,10]]},"DOI":"10.1007\/s00446-021-00402-w","type":"journal-article","created":{"date-parts":[[2021,9,13]],"date-time":"2021-09-13T08:03:02Z","timestamp":1631520182000},"page":"319-348","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["Precision, recall, and sensitivity of monitoring partially synchronous distributed programs"],"prefix":"10.1007","volume":"34","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4894-5217","authenticated-orcid":false,"given":"Duong","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Sorrachai","family":"Yingchareonthawornchai","sequence":"additional","affiliation":[]},{"given":"Vidhya","family":"Tekken Valapil","sequence":"additional","affiliation":[]},{"given":"Sandeep S.","family":"Kulkarni","sequence":"additional","affiliation":[]},{"given":"Murat","family":"Demirbas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,13]]},"reference":[{"key":"402_CR1","doi-asserted-by":"crossref","unstructured":"Almeida, J.B., Almeida, P.S., Baquero, C.: Bounded version vectors. In: Guerraoui, R. (ed.) Distributed Computing, 18th International Conference, DISC 2004, Amsterdam, The Netherlands, October 4\u20137, 2004, Proceedings, Lecture Notes in Computer Science, vol. 3274, pp. 102\u2013116. Springer (2004)","DOI":"10.1007\/978-3-540-30186-8_8"},{"issue":"1","key":"402_CR2","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1016\/0020-0190(91)90055-M","volume":"39","author":"B Charron-Bost","year":"1991","unstructured":"Charron-Bost, B.: Concerning the size of logical clocks in distributed systems. Inf. Process. Lett. 39(1), 11\u201316 (1991)","journal-title":"Inf. Process. Lett."},{"key":"402_CR3","unstructured":"Chow, M., Meisner, D., Flinn, J., Peek, D., Wenisch, T.: The mystery machine: end-to-end performance analysis of large-scale internet services. In: 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI 14), pp. 217\u2013231 (2014)"},{"key":"402_CR4","doi-asserted-by":"crossref","unstructured":"Cooper, R., Marzullo, K.: Consistent detection of global predicates. In: Proceedings of the ACM\/ONR Workshop on Parallel and Distributed Debugging, Santa Cruz, California, USA, May 20\u201321, 1991, pp. 167\u2013174 (1991)","DOI":"10.1145\/122759.122774"},{"key":"402_CR5","unstructured":"Corbett, J.C., Dean, J., Epstein, M., Fikes, A., Frost, C., Furman, J.J., Ghemawat, S., Gubarev, A., Heiser, C., Hochschild, P., Hsieh, W., Kanthak, S., Kogan, E., Li, H., Lloyd, A., Melnik, S., Mwaura, D., Nagle, D., Quinlan, S., Rao, R., Rolig, L., Saito, Y., Szymaniak, M., Taylor, C., Wang, R., Woodford, D.: Spanner: Google\u2019s globally-distributed database. In: Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation, OSDI\u201912, pp. 251\u2013264. USENIX Association, Berkeley, CA, USA (2012). http:\/\/dl.acm.org\/citation.cfm?id=2387880.2387905"},{"key":"402_CR6","unstructured":"Demirbas, M., Kulkarni, S.: Beyond truetime: using augmentedtime for improving google spanner. In: LADIS \u201913: 7th Workshop on Large-Scale Distributed Systems and Middleware (2013)"},{"key":"402_CR7","unstructured":"Fidge, J.: Timestamps in message-passing systems that preserve the partial ordering. In: Proceedings of the 11th Australian Computer Science Conference, vol. 10(1), pp. 56\u201366 (1988)"},{"key":"402_CR8","doi-asserted-by":"crossref","unstructured":"Garg, V.K., Chase, C.: Distributed algorithms for detecting conjunctive predicates. In: International Conference on Distributed Computing Systems, vol. 423\u2013430 (1995)","DOI":"10.1109\/ICDCS.1995.500047"},{"issue":"4","key":"402_CR9","doi-asserted-by":"publisher","first-page":"660","DOI":"10.1109\/TWC.2002.804190","volume":"1","author":"WB Heinzelman","year":"2002","unstructured":"Heinzelman, W.B., Chandrakasan, A.P., Balakrishnan, H.: An application-specific protocol architecture for wireless microsensor networks. IEEE Trans. Wirel. Commun. 1(4), 660\u2013670 (2002)","journal-title":"IEEE Trans. Wirel. Commun."},{"issue":"9","key":"402_CR10","doi-asserted-by":"publisher","first-page":"7320","DOI":"10.3390\/s90907320","volume":"9","author":"D Kandris","year":"2009","unstructured":"Kandris, D., Tsioumas, P., Tzes, A., Nikolakopoulos, G., Vergados, D.D.: Power conservation through energy efficient routing in wireless sensor networks. Sensors 9(9), 7320\u20137342 (2009)","journal-title":"Sensors"},{"issue":"1","key":"402_CR11","first-page":"55","volume":"2","author":"SS Kulkarni","year":"2006","unstructured":"Kulkarni, S.S., Arumugam, M.: Infuse: a TDMA based data dissemination protocol for sensor networks. IJDSN 2(1), 55\u201378 (2006)","journal-title":"IJDSN"},{"key":"402_CR12","doi-asserted-by":"crossref","unstructured":"Kulkarni, S.S., Demirbas, M., Madappa, D., Avva, B., Leone, M.: Logical physical clocks. In: 18th International Conference on Principles of Distributed Systems OPODIS 2014, vol. 8878, pp. 17\u201332 (2014)","DOI":"10.1007\/978-3-319-14472-6_2"},{"issue":"7","key":"402_CR13","doi-asserted-by":"publisher","first-page":"558","DOI":"10.1145\/359545.359563","volume":"21","author":"L Lamport","year":"1978","unstructured":"Lamport, L.: Time, clocks, and the ordering of events in a distributed system. Commun. ACM 21(7), 558\u2013565 (1978)","journal-title":"Commun. ACM"},{"key":"402_CR14","doi-asserted-by":"crossref","unstructured":"Lu, H., Veeraraghavan, K., Ajoux, P., Hunt, J., Song, Y.J., Tobagus, W., Kumar, S., Lloyd, W.: Existential consistency: measuring and understanding consistency at facebook. In: Proceedings of the 25th Symposium on Operating Systems Principles, pp. 295\u2013310. ACM (2015)","DOI":"10.1145\/2815400.2815426"},{"key":"402_CR15","unstructured":"Mattern, F.: Virtual time and global states of distributed systems. Parallel Distrib. Algorithms, 215\u2013226 (1989)"},{"issue":"2","key":"402_CR16","doi-asserted-by":"publisher","first-page":"9","DOI":"10.1145\/956981.956983","volume":"33","author":"D Mills","year":"2003","unstructured":"Mills, D.: A brief history of ntp time: memoirs of an internet timekeeper. ACM SIGCOMM Comput. Commun. Rev. 33(2), 9\u201321 (2003)","journal-title":"ACM SIGCOMM Comput. Commun. Rev."},{"key":"402_CR17","doi-asserted-by":"publisher","unstructured":"Mostafa, M., Bonakdarpour, B.: Decentralized runtime verification of LTL specifications in distributed systems. In: 2015 IEEE International Parallel and Distributed Processing Symposium, IPDPS 2015, Hyderabad, India, May 25\u201329, 2015, pp. 494\u2013503 (2015). https:\/\/doi.org\/10.1109\/IPDPS.2015.95","DOI":"10.1109\/IPDPS.2015.95"},{"key":"402_CR18","doi-asserted-by":"publisher","unstructured":"Nguyen, D.: Supplementary Materials (Source Code and Raw Experimental Results) for the Paper Precision, Recall, and Sensitivity of Monitoring Partially Synchronous Distributed Programs (2020). https:\/\/doi.org\/10.5281\/zenodo.3778190","DOI":"10.5281\/zenodo.3778190"},{"key":"402_CR19","doi-asserted-by":"publisher","unstructured":"Nguyen, D.: Quasi-asynchronous Monitors: Supplementary Materials (source Code and Raw Experimental Results) for the Paper Precision, Recall, and Sensitivity of Monitoring Partially Synchronous Distributed Programs (2021). https:\/\/doi.org\/10.5281\/zenodo.4557924","DOI":"10.5281\/zenodo.4557924"},{"issue":"1","key":"402_CR20","doi-asserted-by":"publisher","first-page":"10:1","DOI":"10.1186\/s13173-019-0091-9","volume":"25","author":"DN Nguyen","year":"2019","unstructured":"Nguyen, D.N., Charapko, A., Kulkarni, S.S., Demirbas, M.: Using weaker consistency models with monitoring and recovery for improving performance of key-value stores. J. Braz. Comput. Soc. 25(1), 10:1\u201310:25 (2019)","journal-title":"J. Braz. Comput. Soc."},{"key":"402_CR21","unstructured":"Sigelman, B., Barroso, L., Burrows, M., Stephenson, P., Plakal, M., Beaver, D., Jaspan, S., Shanbhag, C.: Dapper, a Large-scale Distributed Systems Tracing Infrastructure. Technical repory, Google, Inc. (2010). http:\/\/research.google.com\/archive\/papers\/dapper-2010-1.pdf"},{"issue":"2","key":"402_CR22","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s004460050069","volume":"13","author":"S Stoller","year":"2000","unstructured":"Stoller, S.: Detecting global predicates in distributed systems with clocks. Distrib. Comput. 13(2), 85\u201398 (2000)","journal-title":"Distrib. Comput."},{"key":"402_CR23","unstructured":"Verissimo, P.: Real-time communication. Distrib. Syst. 2 (1993)"},{"key":"402_CR24","doi-asserted-by":"publisher","unstructured":"Yingchareonthawornchai, S., Kulkarni, S.S., Demirbas, M.: Analysis of bounds on hybrid vector clocks. In: OPODIS 2015, December 14\u201317, 2015, Rennes, France, pp. 34:1\u201334:17 (2015). https:\/\/doi.org\/10.4230\/LIPIcs.OPODIS.2015.34","DOI":"10.4230\/LIPIcs.OPODIS.2015.34"}],"container-title":["Distributed Computing"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00446-021-00402-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s00446-021-00402-w\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s00446-021-00402-w.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T07:32:35Z","timestamp":1725780755000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s00446-021-00402-w"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,9,13]]},"references-count":24,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2021,10]]}},"alternative-id":["402"],"URL":"https:\/\/doi.org\/10.1007\/s00446-021-00402-w","relation":{},"ISSN":["0178-2770","1432-0452"],"issn-type":[{"type":"print","value":"0178-2770"},{"type":"electronic","value":"1432-0452"}],"subject":[],"published":{"date-parts":[[2021,9,13]]},"assertion":[{"value":"16 May 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"7 August 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"13 September 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that they have no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}}]}}