{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,8]],"date-time":"2026-04-08T08:54:02Z","timestamp":1775638442451,"version":"3.50.1"},"reference-count":34,"publisher":"Association for Computing Machinery (ACM)","issue":"3","license":[{"start":{"date-parts":[[2015,2,17]],"date-time":"2015-02-17T00:00:00Z","timestamp":1424131200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"DARPA","doi-asserted-by":"crossref","award":["FA8750-10-2-0238"],"award-info":[{"award-number":["FA8750-10-2-0238"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"crossref"}]},{"name":"NSF","award":["CNS-1111698 and SA4897-10808PG"],"award-info":[{"award-number":["CNS-1111698 and SA4897-10808PG"]}]},{"DOI":"10.13039\/100000181","name":"AFOSR","doi-asserted-by":"crossref","award":["FA9550-11-1-0137"],"award-info":[{"award-number":["FA9550-11-1-0137"]}],"id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[2015,4,16]]},"abstract":"<jats:p>This article explains the full reconfigurable multidecree Paxos (or multi-Paxos) protocol. Paxos is by no means a simple protocol, even though it is based on relatively simple invariants. We provide pseudocode and explain it guided by invariants. We initially avoid optimizations that complicate comprehension. Next we discuss liveness, list various optimizations that make the protocol practical, and present variants of the protocol.<\/jats:p>","DOI":"10.1145\/2673577","type":"journal-article","created":{"date-parts":[[2015,2,18]],"date-time":"2015-02-18T13:24:05Z","timestamp":1424265845000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":92,"title":["Paxos Made Moderately Complex"],"prefix":"10.1145","volume":"47","author":[{"given":"Robbert","family":"Van Renesse","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, NY"}]},{"given":"Deniz","family":"Altinbuken","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY"}]}],"member":"320","published-online":{"date-parts":[[2015,2,17]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1713254.1713261"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/200836.200869"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/637437.637447"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1972457.1972472"},{"key":"e_1_2_1_5_1","volume-title":"Distributed Systems","author":"Budhiraja Navin","unstructured":"Navin Budhiraja , Keith Marzullo , Fred B. Schneider , and Sam Toueg . 1993. The primary-backup approach . In Distributed Systems ( 2 nd ed.), S. Mullender (Ed.). ACM Press\/Addison-Wesley , New York, NY, 199--216. Navin Budhiraja, Keith Marzullo, Fred B. Schneider, and Sam Toueg. 1993. The primary-backup approach. In Distributed Systems (2nd ed.), S. Mullender (Ed.). ACM Press\/Addison-Wesley, New York, NY, 199--216.","edition":"2"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298455.1298487"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/112600.112627"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(00)00042-6"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3149.214121"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-002-0070-8"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/74850.74870"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1529974.1529979"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"key":"e_1_2_1_16_1","first-page":"51","article-title":"Paxos made simple","volume":"32","author":"Lamport Leslie","year":"2001","unstructured":"Leslie Lamport . 2001 . Paxos made simple . ACM SIGACT News 32 , 4, 51 -- 58 . Leslie Lamport. 2001. Paxos made simple. ACM SIGACT News 32, 4, 51--58.","journal-title":"ACM SIGACT News"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-006-0005-x"},{"key":"e_1_2_1_19_1","volume-title":"Technical Report. Microsoft Research","author":"Lamport Leslie","unstructured":"Leslie Lamport , Dahlia Malkhi , and Lidong Zhou . 2008. Stoppable Paxos . Technical Report. Microsoft Research , Mountain View, CA . Available at http:\/\/research.microsoft.com\/apps\/pubs\/default.aspx&quest;id=101826 Leslie Lamport, Dahlia Malkhi, and Lidong Zhou. 2008. Stoppable Paxos. Technical Report. Microsoft Research, Mountain View, CA. Available at http:\/\/research.microsoft.com\/apps\/pubs\/default.aspx&quest;id=101826"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1582716.1582783"},{"key":"e_1_2_1_21_1","volume-title":"Cheap Paxos. In Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN'04)","author":"Lamport Leslie","year":"2004","unstructured":"Leslie Lamport and Mike Massa . 2004 . Cheap Paxos. In Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN'04) . IEEE, Los Alamitos, CA, 307--315. Leslie Lamport and Mike Massa. 2004. Cheap Paxos. In Proceedings of the 2004 International Conference on Dependable Systems and Networks (DSN'04). IEEE, Los Alamitos, CA, 307--315."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/645953.675640"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/383962.383969"},{"key":"e_1_2_1_24_1","volume-title":"Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems (SRDS'07)","author":"Li Harry C.","unstructured":"Harry C. Li , Allen Clement , Amitanand S. Aiyer , and Lorenzo Alvisi. 2007. The Paxos register . In Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems (SRDS'07) . IEEE, Los Alamitos, CA, 114--126. Harry C. Li, Allen Clement, Amitanand S. Aiyer, and Lorenzo Alvisi. 2007. The Paxos register. In Proceedings of the 26th IEEE International Symposium on Reliable Distributed Systems (SRDS'07). IEEE, Los Alamitos, CA, 114--126."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217946"},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (OSDI'08)","author":"Mao Yanhua","year":"2008","unstructured":"Yanhua Mao , Flavio P. Junqueira , and Keith Marzullo . 2008 . Mencius: Building efficient replicated state machines for WANs . In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (OSDI'08) . 369--384. Yanhua Mao, Flavio P. Junqueira, and Keith Marzullo. 2008. Mencius: Building efficient replicated state machines for WANs. In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation (OSDI'08). 369--384."},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03850-6_1"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/128765.128770"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2517350"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/62546.62549"},{"key":"e_1_2_1_32_1","volume-title":"Proceedings of the 2014 USENIX Annual Technical Conference (ATC'14)","author":"Ongaro Diego","year":"2014","unstructured":"Diego Ongaro and John Ousterhout . 2014 . In search of an understandable consensus algorithm . In Proceedings of the 2014 USENIX Annual Technical Conference (ATC'14) . 305--319. Diego Ongaro and John Ousterhout. 2014. In search of an understandable consensus algorithm. In Proceedings of the 2014 USENIX Annual Technical Conference (ATC'14). 305--319."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/357369.357371"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/320071.320076"},{"key":"e_1_2_1_36_1","first-page":"1","article-title":"Vive la diff\u00e9rence: Paxos vs. Viewstamped Replication vs","volume":"99","author":"van Renesse Robbert","year":"2014","unstructured":"Robbert van Renesse , Nicolas Schiper , and Fred B. Schneider . 2014 . Vive la diff\u00e9rence: Paxos vs. Viewstamped Replication vs . Zab. IEEE Transactions on Dependable and Secure Computing PP , 99 , 1 . Robbert van Renesse, Nicolas Schiper, and Fred B. Schneider. 2014. Vive la diff\u00e9rence: Paxos vs. Viewstamped Replication vs. Zab. IEEE Transactions on Dependable and Secure Computing PP, 99, 1.","journal-title":"Zab. IEEE Transactions on Dependable and Secure Computing PP"},{"key":"e_1_2_1_37_1","volume-title":"Nerio: Leader Election and Edict Ordering. Technical Report","author":"van Renesse Robbert","year":"2011","unstructured":"Robbert van Renesse , Fred B. Schneider , and Johannes Gehrke . 2011 . Nerio: Leader Election and Edict Ordering. Technical Report . Cornell University , Ithaca, NY . Available at http:\/\/hdl.handle.net\/1813\/23631 Robbert van Renesse, Fred B. Schneider, and Johannes Gehrke. 2011. Nerio: Leader Election and Edict Ordering. Technical Report. Cornell University, Ithaca, NY. Available at http:\/\/hdl.handle.net\/1813\/23631"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2673577","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2673577","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:17:03Z","timestamp":1750227423000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2673577"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2,17]]},"references-count":34,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2015,4,16]]}},"alternative-id":["10.1145\/2673577"],"URL":"https:\/\/doi.org\/10.1145\/2673577","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015,2,17]]},"assertion":[{"value":"2013-08-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2014-09-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2015-02-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}