{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T20:48:39Z","timestamp":1773953319655,"version":"3.50.1"},"reference-count":19,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2013,1,29]],"date-time":"2013-01-29T00:00:00Z","timestamp":1359417600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGOPS Oper. Syst. Rev."],"published-print":{"date-parts":[[2013,1,29]]},"abstract":"<jats:p>Castro and Liskov proposed in 1999 a successful solution for byzantine fault-tolerant replication, named PBFT, which overcame performance drawbacks of earlier byzantine faulttolerant replication protocols. Other proposals extended PBFT with further optimizations, improving PBFT performance in certain conditions. One of the key optimizations of PBFT-based protocols is the use a request batching mechanism. If the target distributed system is dynamic, that is, if its underlying characteristics change dynamically, such as workload, channel QoS, network topology, etc., the configuration of the request batching mechanism must follow the dynamics of the system or it may not yield the desired performance improvement. This paper addresses this challenge by proposing an innovative solution to the dynamic configuration of request batching parameters inspired on feedback control theory. In order to evaluate its efficiency, the proposed solution is simulated in various scenarios and compared with the original version used in the PBFT-family protocols.<\/jats:p>","DOI":"10.1145\/2433140.2433149","type":"journal-article","created":{"date-parts":[[2013,2,5]],"date-time":"2013-02-05T13:19:41Z","timestamp":1360070381000},"page":"35-42","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Adaptive request batching for byzantine replication"],"prefix":"10.1145","volume":"47","author":[{"given":"Al\u00edrio Santos","family":"de S\u00e1","sequence":"first","affiliation":[{"name":"Distributed Systems Laboratory (LaSiD), Computer Science Departament (DCC), Federal University of Bahia (UFBA), Salvador, BA, Brazil"}]},{"given":"Allan Edgard","family":"Silva Freitas","sequence":"additional","affiliation":[{"name":"Distributed Systems Laboratory (LaSiD), Computer Science Departament (DCC), Federal University of Bahia (UFBA), Salvador, BA, Brazil and Federal Institute of Bahia (IFBA), Salvador, BA, Brazil"}]},{"given":"Raimundo Jos\u00e9","family":"de Ara\u00fajo Mac\u00eado","sequence":"additional","affiliation":[{"name":"Distributed Systems Laboratory (LaSiD), Computer Science Departament (DCC), Federal University of Bahia (UFBA), Salvador, BA, Brazil"}]}],"member":"320","published-online":{"date-parts":[[2013,1,29]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/647881.737912"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/296806.296824"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/571637.571640"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/505202.505230"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/62212.62225"},{"key":"e_1_2_1_7_1","first-page":"826","volume-title":"Proceedings of the 27th Brazilian Symposium on Computer Networks and Distributed Systems (SBRC)","author":"Freitas A.","year":"2009"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/167088.167101"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755950"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/74681.74686"},{"key":"e_1_2_1_11_1","first-page":"219","volume-title":"Proceedings of the 22nd Symposium on Reliable Distributed Systems (SRDS)","author":"Kong L.","year":"2003"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294267"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357176"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/LADC.2011.24"},{"key":"e_1_2_1_15_1","first-page":"116","volume-title":"Proceedings of the 10th Computer Security Foundations Workshop (CSFW)","author":"Malkhi D.","year":"2002"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/SBESC.2012.32"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-13645-0_10"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1558977.1558994"}],"container-title":["ACM SIGOPS Operating Systems Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2433140.2433149","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2433140.2433149","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:14:09Z","timestamp":1750277649000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2433140.2433149"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,1,29]]},"references-count":19,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2013,1,29]]}},"alternative-id":["10.1145\/2433140.2433149"],"URL":"https:\/\/doi.org\/10.1145\/2433140.2433149","relation":{},"ISSN":["0163-5980"],"issn-type":[{"value":"0163-5980","type":"print"}],"subject":[],"published":{"date-parts":[[2013,1,29]]},"assertion":[{"value":"2013-01-29","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}