{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T08:09:16Z","timestamp":1759133356932,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":38,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,11,24]],"date-time":"2015-11-24T00:00:00Z","timestamp":1448323200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"FCT","award":["UID\/CEC\/50021\/2013"],"award-info":[{"award-number":["UID\/CEC\/50021\/2013"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,11,24]]},"DOI":"10.1145\/2814576.2814809","type":"proceedings-article","created":{"date-parts":[[2015,11,30]],"date-time":"2015-11-30T19:03:51Z","timestamp":1448910231000},"page":"88-99","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Q-OPT"],"prefix":"10.1145","author":[{"given":"Maria","family":"Couceiro","sequence":"first","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa"}]},{"given":"Gayana","family":"Chandrasekara","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa"}]},{"given":"Manuel","family":"Bravo","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa"}]},{"given":"Matti","family":"Hiltunen","sequence":"additional","affiliation":[{"name":"AT&amp;T Labs Research"}]},{"given":"Paolo","family":"Romano","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa"}]},{"given":"Lu\u00eds","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"INESC-ID, Instituto Superior T\u00e9cnico, Universidade de Lisboa"}]}],"member":"320","published-online":{"date-parts":[[2015,11,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1582716.1582726"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321211.1321226"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.14778\/2212351.2212359"},{"key":"e_1_3_2_1_4_1","volume-title":"Reliable Distributed Computing with the ISIS Toolkit","author":"Birman K.","year":"1994","unstructured":"K. Birman and R. V. Renesse . Reliable Distributed Computing with the ISIS Toolkit . 1994 . K. Birman and R. V. Renesse. Reliable Distributed Computing with the ISIS Toolkit. 1994."},{"key":"e_1_3_2_1_5_1","first-page":"199","volume-title":"The primary-backup approach","author":"Budhiraja N.","year":"1993","unstructured":"N. Budhiraja , K. Marzullo , F. Schneider , and S. Toueg . The primary-backup approach , pages 199 -- 216 . ACM Press\/Addison-Wesley , 1993 . N. Budhiraja, K. Marzullo, F. Schneider, and S. Toueg. The primary-backup approach, pages 199--216. ACM Press\/Addison-Wesley, 1993."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/226643.226647"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTER.2012.56"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807152"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-25821-3_16"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575311"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294281"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2371536.2371559"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/259380.259424"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398776.2398827"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/4221.4223"},{"key":"e_1_3_2_1_16_1","first-page":"1","volume-title":"Distributed Computing","author":"Gilbert S.","year":"2010","unstructured":"S. Gilbert , N. A. Lynch , and A. A. Shvartsman . Rambo: a robust, reconfigurable atomic memory service for dynamic networks . Distributed Computing , pages 1 -- 48 , 2010 . S. Gilbert, N. A. Lynch, and A. A. Shvartsman. Rambo: a robust, reconfigurable atomic memory service for dynamic networks. Distributed Computing, pages 1--48, 2010."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/343477.343630"},{"key":"e_1_3_2_1_18_1","volume-title":"Introduction to Reliable Distributed Programming","author":"Guerraoui R.","year":"2006","unstructured":"R. Guerraoui and L. Rodrigues . Introduction to Reliable Distributed Programming . Springer , 2006 . R. Guerraoui and L. Rodrigues. Introduction to Reliable Distributed Programming. Springer, 2006."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/22952.22953"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:AIRE.0000045502.10941.a9"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/937598.937601"},{"key":"e_1_3_2_1_22_1","volume-title":"A new approach to linear filtering and prediction problems. Journal of basic Engineering, 82(1):35--45","author":"R. Kalman","year":"1960","unstructured":"R. Kalman et al. A new approach to linear filtering and prediction problems. Journal of basic Engineering, 82(1):35--45 , 1960 . R. Kalman et al. A new approach to linear filtering and prediction problems. Journal of basic Engineering, 82(1):35--45, 1960."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687657"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1773912.1773922"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/112600.112601"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258650"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30570-5_27"},{"key":"e_1_3_2_1_29_1","volume-title":"McGraw Hill series in computer science","author":"Mitchell T.","year":"1997","unstructured":"T. Mitchell . Machine learning. McGraw Hill series in computer science . McGraw-Hill , 1997 . T. Mitchell. Machine learning. McGraw Hill series in computer science. McGraw-Hill, 1997."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1994.365692"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755938"},{"key":"e_1_3_2_1_32_1","first-page":"100","volume-title":"Biometrika","author":"Page E.","year":"1954","unstructured":"E. Page . Continuous inspection schemes . Biometrika , pages 100 -- 115 , 1954 . E. Page. Continuous inspection schemes. Biometrika, pages 100--115, 1954."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1006\/inco.1995.1169"},{"key":"e_1_3_2_1_34_1","unstructured":"J. Quinlan. C5.0\/see5.0. http:\/\/www.rulequest.com\/see5-info.html.  J. Quinlan. C5.0\/see5.0. http:\/\/www.rulequest.com\/see5-info.html."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.29"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522731"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2011.70"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/850927.851782"}],"event":{"name":"Middleware '15: 16th International Middleware Conference","sponsor":["ACM Association for Computing Machinery","USENIX Assoc USENIX Assoc","IFIP International Federation for Information Processing"],"location":"Vancouver BC Canada","acronym":"Middleware '15"},"container-title":["Proceedings of the 16th Annual Middleware Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2814576.2814809","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2814576.2814809","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:48:53Z","timestamp":1750225733000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2814576.2814809"}},"subtitle":["Self-tuning Quorum System for Strongly Consistent Software Defined Storage"],"short-title":[],"issued":{"date-parts":[[2015,11,24]]},"references-count":38,"alternative-id":["10.1145\/2814576.2814809","10.1145\/2814576"],"URL":"https:\/\/doi.org\/10.1145\/2814576.2814809","relation":{},"subject":[],"published":{"date-parts":[[2015,11,24]]},"assertion":[{"value":"2015-11-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}