{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:53Z","timestamp":1750307153879,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,23]],"date-time":"2011-10-23T00:00:00Z","timestamp":1319328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,23]]},"DOI":"10.1145\/2043556.2043570","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"129-142","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Thialfi"],"prefix":"10.1145","author":[{"given":"Atul","family":"Adya","sequence":"first","affiliation":[{"name":"Google, Inc."}]},{"given":"Gregory","family":"Cooper","sequence":"additional","affiliation":[{"name":"Google, Inc."}]},{"given":"Daniel","family":"Myers","sequence":"additional","affiliation":[{"name":"Google, Inc."}]},{"given":"Michael","family":"Piatek","sequence":"additional","affiliation":[{"name":"Google, Inc."}]}],"member":"320","published-online":{"date-parts":[[2011,10,23]]},"reference":[{"key":"e_1_3_2_1_2_1","volume-title":"Proc. of CIDR","author":"Baker J.","year":"2011","unstructured":"J. Baker , C. Bond , J. C. Corbett , J. Furman , A. Khorlin , J. Larson , J.-M. Leon , Y. Li , A. Lloyd , and V. Yushprak . Megastore: Providing scalable, highly available storage for interactive service . In Proc. of CIDR , 2011 . J. Baker, C. Bond, J. C. Corbett, J. Furman, A. Khorlin, J. Larson, J.-M. Leon, Y. Li, A. Lloyd, and V. Yushprak. Megastore: Providing scalable, highly available storage for interactive service. In Proc. of CIDR, 2011."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879141.1879175"},{"key":"e_1_3_2_1_4_1","volume-title":"Proc. of OSDI","author":"Burrows M.","year":"2006","unstructured":"M. Burrows . The Chubby lock service for loosely-coupled distributed systems . In Proc. of OSDI , 2006 . M. Burrows. The Chubby lock service for loosely-coupled distributed systems. In Proc. of OSDI, 2006."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.675713"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/380749.380767"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of OSDI","author":"Chang F.","year":"2006","unstructured":"F. Chang , J. Dean , S. Ghemawat , W. C. Hsieh , D. A. Wallach , M. Burrows , T. Chandra , A. Fikes , and R. E. Gruber . Bigtable: A distributed storage system for structured data . In Proc. of OSDI , 2006 . F. Chang, J. Dean, S. Ghemawat, W. C. Hsieh, D. A. Wallach, M. Burrows, T. Chandra, A. Fikes, and R. E. Gruber. Bigtable: A distributed storage system for structured data. In Proc. of OSDI, 2006."},{"key":"e_1_3_2_1_8_1","volume-title":"Proc. of USENIX","author":"Cowling J.","year":"2009","unstructured":"J. Cowling , D. R. K. Ports , B. Liskov , R. A. Popa , and A. Gaikwad . Census: Location-aware membership management for large-scale distributed systems . In Proc. of USENIX , 2009 . J. Cowling, D. R. K. Ports, B. Liskov, R. A. Popa, and A. Gaikwad. Census: Location-aware membership management for large-scale distributed systems. In Proc. of USENIX, 2009."},{"key":"e_1_3_2_1_9_1","volume-title":"LADIS Keynote","author":"Dean J.","year":"2009","unstructured":"J. Dean . Designs, lessons and advice from building large distributed systems . In LADIS Keynote , 2009 . J. Dean. Designs, lessons and advice from building large distributed systems. In LADIS Keynote, 2009."},{"key":"e_1_3_2_1_10_1","first-page":"3174","article-title":"US secure hash algorithm 1 (SHA1)","author":"Eastlake D. E.","year":"2001","unstructured":"D. E. Eastlake and P. E. Jones . US secure hash algorithm 1 (SHA1) . Internet RFC 3174 , 2001 . D. E. Eastlake and P. E. Jones. US secure hash algorithm 1 (SHA1). Internet RFC 3174, 2001.","journal-title":"Internet RFC"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of OSDI","author":"Ford D.","year":"2010","unstructured":"D. Ford , F. Labelle , F. I. Popovici , M. Stokely , V.-A. Truong , L. Barroso , C. Grimes , and S. Quinlan . Availability in globally distributed storage systems . In Proc. of OSDI , 2010 . D. Ford, F. Labelle, F. I. Popovici, M. Stokely, V.-A. Truong, L. Barroso, C. Grimes, and S. Quinlan. Availability in globally distributed storage systems. In Proc. of OSDI, 2010."},{"key":"e_1_3_2_1_12_1","unstructured":"HBase. http:\/\/hbase.apache.org\/.  HBase. http:\/\/hbase.apache.org\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Hadoop Distributed File System http:\/\/hadoop.apache.org\/hdfs\/.  Hadoop Distributed File System http:\/\/hadoop.apache.org\/hdfs\/."},{"key":"e_1_3_2_1_14_1","unstructured":"I. Hickson. The WebSocket API. http:\/\/dev.w3.org\/html5\/websockets\/.  I. Hickson. The WebSocket API. http:\/\/dev.w3.org\/html5\/websockets\/."},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. of USENIX","author":"Hunt P.","year":"2010","unstructured":"P. Hunt , M. Konar , F. P. Junqueira , and B. Reed . Zookeeper: Wait-free coordination for Internet-scale systems . In Proc. of USENIX , 2010 . P. Hunt, M. Konar, F. P. Junqueira, and B. Reed. Zookeeper: Wait-free coordination for Internet-scale systems. In Proc. of USENIX, 2010."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"key":"e_1_3_2_1_17_1","volume-title":"Comet and Reverse Ajax: The Next-Generation Ajax 2.0","author":"McCarthy P.","year":"2008","unstructured":"P. McCarthy and D. Crane . Comet and Reverse Ajax: The Next-Generation Ajax 2.0 . Apress , 2008 . P. McCarthy and D. Crane. Comet and Reverse Ajax: The Next-Generation Ajax 2.0. Apress, 2008."},{"key":"e_1_3_2_1_19_1","volume-title":"Proc. of OSDI","author":"Narayanan D.","year":"2008","unstructured":"D. Narayanan , A. Donnelly , E. Thereska , S. Elnikety , and A. Rowstron . Everest: Scaling down peak loads through i\/o off-loading . In Proc. of OSDI , 2008 . D. Narayanan, A. Donnelly, E. Thereska, S. Elnikety, and A. Rowstron. Everest: Scaling down peak loads through i\/o off-loading. In Proc. of OSDI, 2008."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/646854.708058"},{"key":"e_1_3_2_1_21_1","volume-title":"Proc. of FAST","author":"Pinheiro E.","year":"2007","unstructured":"E. Pinheiro , W.-D. Weber , and L. A. Barroso . Failure trends in a large disk drive population . In Proc. of FAST , 2007 . E. Pinheiro, W.-D. Weber, and L. A. Barroso. Failure trends in a large disk drive population. In Proc. of FAST, 2007."},{"key":"e_1_3_2_1_22_1","volume-title":"Proc. of OSDI","author":"Ports D. R. K.","year":"2010","unstructured":"D. R. K. Ports , A. T. Clements , I. Zhang , S. Madden , and B. Liskov . Transactional consistency and automatic management in an application data cache . In Proc. of OSDI , 2010 . D. R. K. Ports, A. T. Clements, I. Zhang, S. Madden, and B. Liskov. Transactional consistency and automatic management in an application data cache. In Proc. of OSDI, 2010."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/648089.747486"},{"key":"e_1_3_2_1_24_1","unstructured":"J. Ruderman. Same origin policy for JavaScript. https:\/\/developer.mozilla.org\/En\/Same_origin_policy_for_JavaScript.  J. Ruderman. Same origin policy for JavaScript. https:\/\/developer.mozilla.org\/En\/Same_origin_policy_for_JavaScript."},{"key":"e_1_3_2_1_25_1","volume-title":"Proc. Intl. Symposium on Software Reliability Engineering","author":"Strom R.","year":"1998","unstructured":"R. Strom , G. Banavar , T. Chandra , M. Kaplan , K. Miller , B. Mukherjee , D. Sturman , and M. Ward . Gryphon: An information flow based approach to message brokering . In Proc. Intl. Symposium on Software Reliability Engineering , 1998 . R. Strom, G. Banavar, T. Chandra, M. Kaplan, K. Miller, B. Mukherjee, D. Sturman, and M. Ward. Gryphon: An information flow based approach to message brokering. In Proc. Intl. Symposium on Software Reliability Engineering, 1998."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/227210.227229"},{"key":"e_1_3_2_1_27_1","unstructured":"Extensible Messaging and Presence Protocol. http:\/\/xmpp.org\/xmpp-protocols.  Extensible Messaging and Presence Protocol. http:\/\/xmpp.org\/xmpp-protocols."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/371920.371935"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/378344.378347"}],"event":{"name":"SOSP '11: ACM SIGOPS 23nd Symposium on Operating Systems Principles","sponsor":["INESC Systems and Computer Engineering Institute","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Cascais Portugal","acronym":"SOSP '11"},"container-title":["Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043556.2043570","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2043556.2043570","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:18Z","timestamp":1750240458000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043556.2043570"}},"subtitle":["a client notification service for internet-scale applications"],"short-title":[],"issued":{"date-parts":[[2011,10,23]]},"references-count":27,"alternative-id":["10.1145\/2043556.2043570","10.1145\/2043556"],"URL":"https:\/\/doi.org\/10.1145\/2043556.2043570","relation":{},"subject":[],"published":{"date-parts":[[2011,10,23]]},"assertion":[{"value":"2011-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}