{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T20:53:20Z","timestamp":1760043200655,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":52,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,3,25]],"date-time":"2019-03-25T00:00:00Z","timestamp":1553472000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100014037","name":"National Defense Science and Engineering Graduate","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100014037","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1717554"],"award-info":[{"award-number":["1717554"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,3,25]]},"DOI":"10.1145\/3302424.3303987","type":"proceedings-article","created":{"date-parts":[[2019,3,22]],"date-time":"2019-03-22T13:10:03Z","timestamp":1553260203000},"page":"1-16","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Efficient, Consistent Distributed Computation with Predictive Treaties"],"prefix":"10.1145","author":[{"given":"Tom","family":"Magrino","sequence":"first","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Jed","family":"Liu","sequence":"additional","affiliation":[{"name":"Barefoot Networks Ithaca, NY, USA"}]},{"given":"Nate","family":"Foster","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]},{"given":"Johannes","family":"Gehrke","sequence":"additional","affiliation":[{"name":"Microsoft Corporation Redmond, WA, USA"}]},{"given":"Andrew C.","family":"Myers","sequence":"additional","affiliation":[{"name":"Cornell University, Ithaca, NY, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,3,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328438.1328476"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/223784.223787"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/259380.259425"},{"key":"e_1_3_2_1_4_1","volume-title":"Compilers: Principles, Techniques, and Tools","author":"Aho A. V.","year":"2006","unstructured":"Aho , A. V. , Lam , M. S. , Sethi , R. , And Ullman , J. D. Compilers: Principles, Techniques, and Tools ( 2 nd Edition). Addison-Wesley Longman Publishing Co., Inc. , 2006 . Aho, A. V., Lam, M. S., Sethi, R., And Ullman, J. D. Compilers: Principles, Techniques, and Tools (2nd Edition). Addison-Wesley Longman Publishing Co., Inc., 2006.","edition":"2"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/65.844498"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/872757.872764"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.14778\/2735508.2735509"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741972"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2015.32"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01232643"},{"key":"e_1_3_2_1_11_1","volume-title":"Concurrency Control and Recovery in Database Systems","author":"Bernstein P. A.","year":"1987","unstructured":"Bernstein , P. A. , Hadzilacos , V. , And Goodman , N. Concurrency Control and Recovery in Database Systems . Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA , 1987 . Bernstein, P. A., Hadzilacos, V., And Goodman, N. Concurrency Control and Recovery in Database Systems. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1987."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038916.2038923"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.5.1.63"},{"key":"e_1_3_2_1_14_1","first-page":"8","volume":"91","author":"Chong C.-Y.","year":"2003","unstructured":"Chong , C.-Y. , And Kumar , S. P. Sensor networks: Evolution, opportunities, and challenges. Proceedings of the IEEE 91 , 8 ( 2003 ), 1247--1256. Chong, C.-Y., And Kumar, S. P. Sensor networks: Evolution, opportunities, and challenges. Proceedings of the IEEE 91, 8 (2003), 1247--1256.","journal-title":"Proceedings of the IEEE"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491245"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2481528.2481530"},{"key":"e_1_3_2_1_17_1","volume-title":"R","author":"Durrett","year":"2010","unstructured":"Durrett , R . Probability : Theory and Examples, 4 th ed. Cambridge University Press , 2010 . Durrett, R. Probability: Theory and Examples, 4th ed. Cambridge University Press, 2010.","edition":"4"},{"key":"e_1_3_2_1_18_1","volume-title":"Mathematical Logic. Undergraduate Texts in Mathematics","author":"Ebbinghaus H.","year":"1996","unstructured":"Ebbinghaus , H. , Flum , J. , And Thomas , W. Mathematical Logic. Undergraduate Texts in Mathematics . Springer New York , 1996 . Ebbinghaus, H., Flum, J., And Thomas, W. Mathematical Logic. Undergraduate Texts in Mathematics. Springer New York, 1996."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/360363.360369"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536206.2536220"},{"key":"e_1_3_2_1_21_1","first-page":"81","volume-title":"15th USENIX Symp. on Networked Systems Design and Implementation (NSDI) (Apr.","author":"Geng Y.","year":"2018","unstructured":"Geng , Y. , Liu , S. , Yin , Z. , Naik , A. , Prabhakar , B. , Rosenblum , M. , And Vahdat , A. Exploiting a natural network effect for scalable, fine-grained clock synchronization . In 15th USENIX Symp. on Networked Systems Design and Implementation (NSDI) (Apr. 2018 ), pp. 81 -- 94 . Geng, Y., Liu, S., Yin, Z., Naik, A., Prabhakar, B., Rosenblum, M., And Vahdat, A. Exploiting a natural network effect for scalable, fine-grained clock synchronization. In 15th USENIX Symp. on Networked Systems Design and Implementation (NSDI) (Apr. 2018), pp. 81--94."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213867"},{"key":"e_1_3_2_1_23_1","volume-title":"Modeling in Data Base Management Systems.","author":"Gray J.","year":"1976","unstructured":"Gray , J. , Lorie , R. , Putzolu , G. , And Traiger , I. Granularity of locks and degrees of consistency in a shared database . In Modeling in Data Base Management Systems. Amsterdam : Elsevier North-Holland , 1976 . Also available in Chapter 3 of Readings in Database Systems, Second Edition, M. Stonebraker Editor, Morgan Kaufmann, 1994. Gray, J., Lorie, R., Putzolu, G., And Traiger, I. Granularity of locks and degrees of consistency in a shared database. In Modeling in Data Base Management Systems. Amsterdam: Elsevier North-Holland, 1976. Also available in Chapter 3 of Readings in Database Systems, Second Edition, M. Stonebraker Editor, Morgan Kaufmann, 1994."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170066"},{"key":"e_1_3_2_1_26_1","volume-title":"Pittsburgh ONR memorandum","author":"Holt C. C.","year":"1957","unstructured":"Holt , C. C. Forecasting trends and seasonals by exponentially weighted averages. carnegie institute of technology. Tech. rep ., Pittsburgh ONR memorandum , 1957 . Holt, C. C. Forecasting trends and seasonals by exponentially weighted averages. carnegie institute of technology. Tech. rep., Pittsburgh ONR memorandum, 1957."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2011.102"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465363"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934885"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/112600.112601"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/103720.103722"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629606"},{"key":"e_1_3_2_1_33_1","first-page":"513","volume-title":"11th USENIX Symp. on Networked Systems Design and Implementation (NSDI) (Apr.","author":"Liu J.","year":"2014","unstructured":"Liu , J. , Magrino , T. , Arden , O. , George , M. D. , And Myers , A. C. Warranties for faster strong consistency . In 11th USENIX Symp. on Networked Systems Design and Implementation (NSDI) (Apr. 2014 ), pp. 513 -- 517 . Liu, J., Magrino, T., Arden, O., George, M. D., And Myers, A. C. Warranties for faster strong consistency. In 11th USENIX Symp. on Networked Systems Design and Implementation (NSDI) (Apr. 2014), pp. 513--517."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043593"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/3030207.3030212"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC1305"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/7239.7265"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/566500.566512"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/322154.322158"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/795670.796831"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/1924943.1924963"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066116.1189038"},{"key":"e_1_3_2_1_44_1","volume-title":"Database Management Systems, 3 ed","author":"Ramakrishnan R.","year":"2003","unstructured":"Ramakrishnan , R. , And Gehrke , J. Database Management Systems, 3 ed . McGraw-Hill, Inc. , New York, NY, USA , 2003 . Ramakrishnan, R., And Gehrke, J. Database Management Systems, 3 ed. McGraw-Hill, Inc., New York, NY, USA, 2003."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2723720"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3300069"},{"key":"e_1_3_2_1_47_1","first-page":"386","volume-title":"Proceedings of the 13th International Conference on Stabilization, Safety, and Security of Distributed Systems (Berlin, Heidelberg, 2011), SSS'11, Springer-Verlag","author":"Shapiro M.","unstructured":"Shapiro , M. , Pregui\u00e7 A, N. , Baquero , C. , And Zawirski , M. Conflict-free replicated data types . In Proceedings of the 13th International Conference on Stabilization, Safety, and Security of Distributed Systems (Berlin, Heidelberg, 2011), SSS'11, Springer-Verlag , pp. 386 -- 400 . Shapiro, M., Pregui\u00e7A, N., Baquero, C., And Zawirski, M. Conflict-free replicated data types. In Proceedings of the 13th International Conference on Stabilization, Safety, and Security of Distributed Systems (Berlin, Heidelberg, 2011), SSS'11, Springer-Verlag, pp. 386--400."},{"key":"e_1_3_2_1_48_1","first-page":"67","volume":"104","author":"Shapiro M.","year":"2011","unstructured":"Shapiro , M. , Pregui\u00e7 A, N. M. , Baquero , C. , And Zawirski , M. Convergent and commutative replicated data types. Bulletin of the EATCS 104 ( 2011 ), 67 -- 88 . Shapiro, M., Pregui\u00e7A, N. M., Baquero, C., And Zawirski, M. Convergent and commutative replicated data types. Bulletin of the EATCS 104 (2011), 67--88.","journal-title":"Bulletin of the EATCS"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1292609.1292613"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/324138.324313"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522731"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1435417.1435432"},{"key":"e_1_3_2_1_54_1","volume-title":"4th USENIX Symp. on Operating Systems Design and Implementation (OSDI)","author":"Yu H.","year":"2000","unstructured":"Yu , H. , And Vahdat , A. Design and evaluation of a continuous consistency model for replicated services . In 4th USENIX Symp. on Operating Systems Design and Implementation (OSDI) ( 2000 ). Yu, H., And Vahdat, A. Design and evaluation of a continuous consistency model for replicated services. In 4th USENIX Symp. on Operating Systems Design and Implementation (OSDI) (2000)."},{"key":"e_1_3_2_1_55_1","volume-title":"9th USENIX Symp. on Networked Systems Design and Implementation (NSDI)","author":"Zaharia M.","year":"2012","unstructured":"Zaharia , M. , Chowdhury , M. , Das , T. , Dave , A. , Ma , J. , McCauley , M. , Franklin , M. J. , Shenker , S. , And Stoica , I. Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing . In 9th USENIX Symp. on Networked Systems Design and Implementation (NSDI) ( 2012 ). Zaharia, M., Chowdhury, M., Das, T., Dave, A., Ma, J., McCauley, M., Franklin, M. J., Shenker, S., And Stoica, I. Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing. In 9th USENIX Symp. on Networked Systems Design and Implementation (NSDI) (2012)."}],"event":{"name":"EuroSys '19: Fourteenth EuroSys Conference 2019","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Dresden Germany","acronym":"EuroSys '19"},"container-title":["Proceedings of the Fourteenth EuroSys Conference 2019"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3302424.3303987","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3302424.3303987","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3302424.3303987","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:01:49Z","timestamp":1750208509000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3302424.3303987"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,25]]},"references-count":52,"alternative-id":["10.1145\/3302424.3303987","10.1145\/3302424"],"URL":"https:\/\/doi.org\/10.1145\/3302424.3303987","relation":{},"subject":[],"published":{"date-parts":[[2019,3,25]]},"assertion":[{"value":"2019-03-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}