{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,24]],"date-time":"2025-12-24T12:13:51Z","timestamp":1766578431758,"version":"3.41.0"},"reference-count":34,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2006,3,1]],"date-time":"2006-03-01T00:00:00Z","timestamp":1141171200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGACT News"],"published-print":{"date-parts":[[2006,3]]},"abstract":"<jats:p>The evolution of distributed computing and applications has put new challenges on models, architectures and systems. To name just one, 'reconciling uncertainty with predictability' is required by today's simultaneous pressure on increasing the quality of service of applications, and on degrading the assurance given by the infrastructure.This challenge can be mapped onto more than one facet, such as time or security or others. In this paper we explore the time facet, reviewing past and present of distributed systems models, and making the case for the use of hybrid (vs. homogeneous) models, as a key to overcoming some of the difficulties faced when asynchronous models (uncertainty) meet timing specifications (predictability). The Wormholes paradigm is described as the first experiment with hybrid distributed systems models.<\/jats:p>","DOI":"10.1145\/1122480.1122497","type":"journal-article","created":{"date-parts":[[2006,5,8]],"date-time":"2006-05-08T22:51:53Z","timestamp":1147128713000},"page":"66-81","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":66,"title":["Travelling through wormholes"],"prefix":"10.1145","volume":"37","author":[{"given":"Paulo E.","family":"Ver\u00edssimo","sequence":"first","affiliation":[{"name":"Univ. of Lisboa Faculty of Sciences, Lisboa, Portugal"}]}],"member":"320","published-online":{"date-parts":[[2006,3]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/645959.676130"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/800221.806707"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/WFCS.2000.882542"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/248052.248120"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/226643.226647"},{"key":"e_1_2_1_8_1","first-page":"140","volume-title":"Proceedings of the 28th IEEE International Symposium on Fault-Tolerant Computing","author":"Christian F.","year":"1998"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-004-0110-7"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/645333.649842"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/647883.738264"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/7531.7533"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1176979"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"volume-title":"International Workshop on Future Directions of Distributed Computing, FuDiCo","year":"2002","author":"Friedman R.","key":"e_1_2_1_16_1"},{"volume-title":"5th European Dependable Computing Conference (EDCC'05)","author":"Friedman Roy","key":"e_1_2_1_17_1"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.879773"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/504192.504195"},{"key":"e_1_2_1_20_1","first-page":"214","volume-title":"Proceedings of the 17th IEEE International Symposium on Fault-Tolerant Computing","author":"Meyer F.","year":"1987"},{"volume-title":"Int. IEEE\/IFIP Conference on Dependable Systems and Networks (DSN'03)","author":"Most\u00e9faoui A.","key":"e_1_2_1_21_1"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2005.153"},{"volume-title":"Proceedings of the 22nd IEEE International Symposium of Fault-Tolerant Computing","year":"1992","author":"Powell D.","key":"e_1_2_1_23_1"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1988.5327"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1052796.1052806"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11429647_21"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.55"},{"key":"e_1_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Jan\n      van Leeuwen\n     and \n      Jir\n      Wiedermann\n    .\n  Beyond the turing limit: Evolving interactive systems\n  . In Leszek Pacholski and Peter Ruzicka editors SOFSEM\n  : Theory and Practice of Informatics 28th Conference on Current Trends in Theory and Practice of Informatics volume \n  2234\n   of \n  Lecture Notes in Computer Science pages \n  90\n  --\n  109 Piestany Slovak Republic 2001\n  . \n  Springer\n  .]]   Jan van Leeuwen and Jir Wiedermann. Beyond the turing limit: Evolving interactive systems. In Leszek Pacholski and Peter Ruzicka editors SOFSEM: Theory and Practice of Informatics 28th Conference on Current Trends in Theory and Practice of Informatics volume 2234 of Lecture Notes in Computer Science pages 90--109 Piestany Slovak Republic 2001. Springer.]]","DOI":"10.1007\/3-540-45627-9_8"},{"key":"e_1_2_1_29_1","doi-asserted-by":"crossref","unstructured":"P.\n      Ver\u00edssimo\n    .\n  Uncertainty and predictability: Can they be reconciled? In Future Directions in Distributed Computing volume \n  2584\n   of \n  Lecture Notes in Computer Science pages \n  108\n  --\n  113\n  . \n  Springer-Verlag 2003\n  .]]  P. Ver\u00edssimo. Uncertainty and predictability: Can they be reconciled? In Future Directions in Distributed Computing volume 2584 of Lecture Notes in Computer Science pages 108--113. Springer-Verlag 2003.]]","DOI":"10.1007\/3-540-37795-6_20"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2002.1024739"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/647881.737914"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/558179"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1007949113722"},{"volume-title":"Proceedings of the 4th IFIP International Working Conference on Dependable Computing for Critical Applications","year":"1994","author":"Walter C.","key":"e_1_2_1_34_1"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571638"}],"container-title":["ACM SIGACT News"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1122480.1122497","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1122480.1122497","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:37Z","timestamp":1750262917000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1122480.1122497"}},"subtitle":["a new look at distributed systems models"],"short-title":[],"issued":{"date-parts":[[2006,3]]},"references-count":34,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2006,3]]}},"alternative-id":["10.1145\/1122480.1122497"],"URL":"https:\/\/doi.org\/10.1145\/1122480.1122497","relation":{},"ISSN":["0163-5700"],"issn-type":[{"type":"print","value":"0163-5700"}],"subject":[],"published":{"date-parts":[[2006,3]]},"assertion":[{"value":"2006-03-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}