{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:53Z","timestamp":1750220933602,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":94,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T00:00:00Z","timestamp":1559952000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1513687"],"award-info":[{"award-number":["1513687"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,8]]},"DOI":"10.1145\/3314221.3314586","type":"proceedings-article","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T21:02:18Z","timestamp":1559941338000},"page":"1010-1026","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Ignis: scaling distribution-oblivious systems with light-touch distribution"],"prefix":"10.1145","author":[{"given":"Nikos","family":"Vasilakis","sequence":"first","affiliation":[{"name":"University of Pennsylvania, USA"}]},{"given":"Ben","family":"Karel","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, USA"}]},{"given":"Yash","family":"Palkhiwala","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, USA"}]},{"given":"John","family":"Sonchack","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, USA"}]},{"given":"Andr\u00e9","family":"DeHon","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, USA"}]},{"given":"Jonathan M.","family":"Smith","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,6,8]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.33"},{"key":"e_1_3_2_2_2_1","unstructured":"Peter Alvaro Neil Conway Joseph M Hellerstein and William R Marczak. 2011. Consistency Analysis in Bloom: a CALM and Collected Approach.. In CIDR. 249\u2013260.  Peter Alvaro Neil Conway Joseph M Hellerstein and William R Marczak. 2011. Consistency Analysis in Bloom: a CALM and Collected Approach.. In CIDR. 249\u2013260."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.1999.797382"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-739X(97)00037-X"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/38765.38836"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2013.6575306"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/323647.323636"},{"key":"e_1_3_2_2_8_1","volume-title":"Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201908)","author":"Bittau Andrea","year":"2008","unstructured":"Andrea Bittau , Petr Marchenko , Mark Handley , and Brad Karp . 2008 . Wedge: Splitting Applications into Reduced-privilege Compartments . In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201908) . USENIX Association, Berkeley, CA, USA, 309\u2013322. http:\/\/dl.acm.org\/citation.cfm?id=1387589.1387611 Andrea Bittau, Petr Marchenko, Mark Handley, and Brad Karp. 2008. Wedge: Splitting Applications into Reduced-privilege Compartments. In Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201908). USENIX Association, Berkeley, CA, USA, 309\u2013322. http:\/\/dl.acm.org\/citation.cfm?id=1387589.1387611"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1238844.1238855"},{"key":"e_1_3_2_2_10_1","volume-title":"AOSD\u00e2\u0102\u017907: Proceedings of the 6th International Conference on Aspect-Oriented Software Development.","author":"Bon\u00e9r Jonas","year":"2007","unstructured":"Jonas Bon\u00e9r and Eugene Kuleshov . 2007 . Clustering the Java virtual machine using aspect-oriented programming . In AOSD\u00e2\u0102\u017907: Proceedings of the 6th International Conference on Aspect-Oriented Software Development. Jonas Bon\u00e9r and Eugene Kuleshov. 2007. Clustering the Java virtual machine using aspect-oriented programming. In AOSD\u00e2\u0102\u017907: Proceedings of the 6th International Conference on Aspect-Oriented Software Development."},{"key":"e_1_3_2_2_11_1","volume-title":"Proceedings of the 13th Conference on USENIX Security Symposium -","volume":"13","author":"Brumley David","year":"2004","unstructured":"David Brumley and Dawn Song . 2004 . Privtrans: Automatically Partitioning Programs for Privilege Separation . In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 (SSYM\u201904). USENIX Association, Berkeley, CA, USA, 5\u20135. http:\/\/dl.acm.org\/ citation.cfm?id=1251375.1251380 David Brumley and Dawn Song. 2004. Privtrans: Automatically Partitioning Programs for Privilege Separation. In Proceedings of the 13th Conference on USENIX Security Symposium - Volume 13 (SSYM\u201904). USENIX Association, Berkeley, CA, USA, 5\u20135. http:\/\/dl.acm.org\/ citation.cfm?id=1251375.1251380"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/12276.13328"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1103845.1094852"},{"volume-title":"MongoDB: the definitive guide. \" O\u2019Reilly Media","author":"Chodorow Kristina","key":"e_1_3_2_2_14_1","unstructured":"Kristina Chodorow . 2013. MongoDB: the definitive guide. \" O\u2019Reilly Media , Inc .\". Kristina Chodorow. 2013. MongoDB: the definitive guide. \" O\u2019Reilly Media, Inc.\"."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966473"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/323647.323635"},{"key":"e_1_3_2_2_17_1","volume-title":"Usenix Security","volume":"2","author":"Crosby Scott A","year":"2003","unstructured":"Scott A Crosby and Dan S Wallach . 2003 . Denial of Service via Algorithmic Complexity Attacks .. In Usenix Security , Vol. 2 . Scott A Crosby and Dan S Wallach. 2003. Denial of Service via Algorithmic Complexity Attacks.. In Usenix Security, Vol. 2."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1814433.1814441"},{"key":"e_1_3_2_2_19_1","unstructured":"Ryan Dahl and the Node.js Foundation. 2009. Node.js. https:\/\/nodejs. org Accessed: 2017-06-11.  Ryan Dahl and the Node.js Foundation. 2009. Node.js. https:\/\/nodejs. org Accessed: 2017-06-11."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123878.3131990"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1002\/bltj.2028"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837650"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/PERCOMW.2017.7917534"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2034675.2034690"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2525528.2525538"},{"key":"e_1_3_2_2_27_1","unstructured":"Martin Fowler and James Lewis. 2014. Microservices. http: \/\/martinfowler.com\/articles\/microservices.html Accessed: 2015-02-17.  Martin Fowler and James Lewis. 2014. Microservices. http: \/\/martinfowler.com\/articles\/microservices.html Accessed: 2015-02-17."},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/277652.277725"},{"key":"e_1_3_2_2_29_1","unstructured":"Nicolas Giard and Wiki.js Contributors. 2018. wiki.js. https:\/\/wiki.js. org\/ Accessed: 2018-09-18.  Nicolas Giard and Wiki.js Contributors. 2018. wiki.js. https:\/\/wiki.js. org\/ Accessed: 2018-09-18."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/564585.564601"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/605397.605428"},{"key":"e_1_3_2_2_32_1","volume-title":"Systems Performance: Enterprise and the Cloud","author":"Gregg Brendan","year":"2013","unstructured":"Brendan Gregg . 2013 . Systems Performance: Enterprise and the Cloud ( 1 st ed.). Prentice Hall Press , Upper Saddle River, NJ, USA. Brendan Gregg. 2013. Systems Performance: Enterprise and the Cloud (1st ed.). Prentice Hall Press, Upper Saddle River, NJ, USA.","edition":"1"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.546613"},{"key":"e_1_3_2_2_34_1","unstructured":"Michael Hart. 1971. Project Gutenberg. https:\/\/www.gutenberg.org\/  Michael Hart. 1971. Project Gutenberg. https:\/\/www.gutenberg.org\/"},{"volume-title":"Serverless Computation with OpenLambda. In 8th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 16)","author":"Hendrickson Scott","key":"e_1_3_2_2_35_1","unstructured":"Scott Hendrickson , Stephen Sturdevant , Tyler Harter , Venkateshwaran Venkataramani , Andrea C. Arpaci-Dusseau , and Remzi H . ArpaciDusseau. 2016 . Serverless Computation with OpenLambda. In 8th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 16) . USENIX Association, Denver, CO. https:\/\/www.usenix.org\/conference\/ hotcloud16\/workshop-program\/presentation\/hendrickson Scott Hendrickson, Stephen Sturdevant, Tyler Harter, Venkateshwaran Venkataramani, Andrea C. Arpaci-Dusseau, and Remzi H. ArpaciDusseau. 2016. Serverless Computation with OpenLambda. In 8th USENIX Workshop on Hot Topics in Cloud Computing (HotCloud 16). USENIX Association, Denver, CO. https:\/\/www.usenix.org\/conference\/ hotcloud16\/workshop-program\/presentation\/hendrickson"},{"key":"e_1_3_2_2_36_1","volume-title":"Koajs Examples: Blog. https:\/\/github.com\/koajs\/examples\/tree\/master\/blog Accessed: 2019-03-01.","author":"Holowaychuk TJ","year":"2009","unstructured":"TJ Holowaychuk and the Koa.js Developers. 2009 . Koajs Examples: Blog. https:\/\/github.com\/koajs\/examples\/tree\/master\/blog Accessed: 2019-03-01. TJ Holowaychuk and the Koa.js Developers. 2009. Koajs Examples: Blog. https:\/\/github.com\/koajs\/examples\/tree\/master\/blog Accessed: 2019-03-01."},{"volume-title":"Proceedings of the Third Symposium on Operating Systems Design and Implementation (OSDI \u201999)","author":"Galen","key":"e_1_3_2_2_37_1","unstructured":"Galen C. Hunt and Michael L. Scott. 1999. The Coign Automatic Distributed Partitioning System . In Proceedings of the Third Symposium on Operating Systems Design and Implementation (OSDI \u201999) . USENIX Association, Berkeley, CA, USA, 187\u2013200. http:\/\/dl.acm.org\/citation. cfm?id=296806.296826 Galen C. Hunt and Michael L. Scott. 1999. The Coign Automatic Distributed Partitioning System. In Proceedings of the Third Symposium on Operating Systems Design and Implementation (OSDI \u201999). USENIX Association, Berkeley, CA, USA, 187\u2013200. http:\/\/dl.acm.org\/citation. cfm?id=296806.296826"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1093\/ietisy\/e89-d.2.399"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/258533.258660"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.86108"},{"key":"e_1_3_2_2_41_1","volume-title":"European conference on object-oriented programming. Springer, 220\u2013242","author":"Kiczales Gregor","year":"1997","unstructured":"Gregor Kiczales , John Lamping , Anurag Mendhekar , Chris Maeda , Cristina Lopes , Jean-Marc Loingtier , and John Irwin . 1997 . Aspectoriented programming . In European conference on object-oriented programming. Springer, 220\u2013242 . Gregor Kiczales, John Lamping, Anurag Mendhekar, Chris Maeda, Cristina Lopes, Jean-Marc Loingtier, and John Irwin. 1997. Aspectoriented programming. In European conference on object-oriented programming. Springer, 220\u2013242."},{"volume-title":"The Art of the Metaobject Protocol","author":"Kiczales Gregor","key":"e_1_3_2_2_42_1","unstructured":"Gregor Kiczales and Jim Des Rivieres . 1991. The Art of the Metaobject Protocol . MIT Press, Cambridge, MA , USA. Gregor Kiczales and Jim Des Rivieres. 1991. The Art of the Metaobject Protocol. MIT Press, Cambridge, MA, USA."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250755"},{"key":"e_1_3_2_2_44_1","volume-title":"Privman: A Library for Partitioning Applications. In USENIX Annual Technical Conference, FREENIX Track. 273\u2013284","author":"Kilpatrick Douglas","year":"2003","unstructured":"Douglas Kilpatrick . 2003 . Privman: A Library for Partitioning Applications. In USENIX Annual Technical Conference, FREENIX Track. 273\u2013284 . Douglas Kilpatrick. 2003. Privman: A Library for Partitioning Applications. In USENIX Annual Technical Conference, FREENIX Track. 273\u2013284."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195845"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250759"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3144555.3144562"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/850657.850658"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/800216.806603"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/800213.806531"},{"volume-title":"Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL \u201997)","author":"Amy","key":"e_1_3_2_2_51_1","unstructured":"Amy W. Lim and Monica S. Lam. 1997. Maximizing Parallelism and Minimizing Synchronization with Affine Transforms . In Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL \u201997) . ACM, New York, NY, USA, 201\u2013214. Amy W. Lim and Monica S. Lam. 1997. Maximizing Parallelism and Minimizing Synchronization with Affine Transforms. In Proceedings of the 24th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages (POPL \u201997). ACM, New York, NY, USA, 201\u2013214."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/41457.37514"},{"key":"e_1_3_2_2_53_1","unstructured":"Haonan Lu Christopher Hodsdon Khiem Ngo Shuai Mu and Wyatt Lloyd. 2016. The SNOW Theorem and Latency-Optimal Read-Only Transactions.. In OSDI. 135\u2013150.   Haonan Lu Christopher Hodsdon Khiem Ngo Shuai Mu and Wyatt Lloyd. 2016. The SNOW Theorem and Latency-Optimal Read-Only Transactions.. In OSDI. 135\u2013150."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872386"},{"key":"e_1_3_2_2_55_1","unstructured":"Neil McAllister. 2012. Twitter survives election after Ruby-to-Java move. https:\/\/www.theregister.co.uk\/2012\/11\/08\/twitter_epic_traffic_ saved_by_java\/ Accessed: 2019-04-11.  Neil McAllister. 2012. Twitter survives election after Ruby-to-Java move. https:\/\/www.theregister.co.uk\/2012\/11\/08\/twitter_epic_traffic_ saved_by_java\/ Accessed: 2019-04-11."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2745947.2745954"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183895.3183899"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.53354"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1355284.1355292"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522738"},{"key":"e_1_3_2_2_61_1","volume-title":"Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (NSDI\u201911)","author":"Murray Derek G.","year":"2011","unstructured":"Derek G. Murray , Malte Schwarzkopf , Christopher Smowton , Steven Smith , Anil Madhavapeddy , and Steven Hand . 2011 . CIEL: A Universal Execution Engine for Distributed Data-flow Computing . In Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (NSDI\u201911) . USENIX Association, Berkeley, CA, USA, 113\u2013126. http:\/\/dl.acm.org\/citation.cfm?id= 1972457.1972470 Derek G. Murray, Malte Schwarzkopf, Christopher Smowton, Steven Smith, Anil Madhavapeddy, and Steven Hand. 2011. CIEL: A Universal Execution Engine for Distributed Data-flow Computing. In Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (NSDI\u201911). USENIX Association, Berkeley, CA, USA, 113\u2013126. http:\/\/dl.acm.org\/citation.cfm?id=1972457.1972470"},{"volume-title":"Building Microservices. O\u2019Reilly Media","author":"Newman Sam","key":"e_1_3_2_2_62_1","unstructured":"Sam Newman . 2015. Building Microservices. O\u2019Reilly Media , Inc . Sam Newman. 2015. Building Microservices. O\u2019Reilly Media, Inc."},{"key":"e_1_3_2_2_63_1","volume-title":"Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201909)","author":"Newton Ryan","year":"2009","unstructured":"Ryan Newton , Sivan Toledo , Lewis Girod , Hari Balakrishnan , and Samuel Madden . 2009 . Wishbone: Profile-based Partitioning for Sensornet Applications . In Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201909) . USENIX Association, Berkeley, CA, USA, 395\u2013408. http:\/\/dl.acm.org\/citation. cfm?id=1558977.1559004 Ryan Newton, Sivan Toledo, Lewis Girod, Hari Balakrishnan, and Samuel Madden. 2009. Wishbone: Profile-based Partitioning for Sensornet Applications. In Proceedings of the 6th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201909). USENIX Association, Berkeley, CA, USA, 395\u2013408. http:\/\/dl.acm.org\/citation. cfm?id=1558977.1559004"},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.16"},{"key":"e_1_3_2_2_65_1","volume-title":"Polaris: A new-generation parallelizing compiler for MPPs. In In CSRD Rept. No. 1306. Univ. of Illinois at Urbana-Champaign.","author":"Padua David A","year":"1993","unstructured":"David A Padua , Rudolf Eigenmann , Jay Hoeflinger , Paul Petersen , Peng Tu , Stephen Weatherford , and Keith Faigin . 1993 . Polaris: A new-generation parallelizing compiler for MPPs. In In CSRD Rept. No. 1306. Univ. of Illinois at Urbana-Champaign. David A Padua, Rudolf Eigenmann, Jay Hoeflinger, Paul Petersen, Peng Tu, Stephen Weatherford, and Keith Faigin. 1993. Polaris: A new-generation parallelizing compiler for MPPs. In In CSRD Rept. No. 1306. Univ. of Illinois at Urbana-Champaign."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"e_1_3_2_2_67_1","volume-title":"Proceedings of the summer 1990 UKUUG Conference. 1\u20139. http:\/\/css.csail.mit.edu\/6.824\/2014\/papers\/plan9.pdf","author":"Pike Rob","year":"1990","unstructured":"Rob Pike , Dave Presotto , Ken Thompson , Howard Trickey , 1990 . Plan 9 from Bell Labs . In Proceedings of the summer 1990 UKUUG Conference. 1\u20139. http:\/\/css.csail.mit.edu\/6.824\/2014\/papers\/plan9.pdf Rob Pike, Dave Presotto, Ken Thompson, Howard Trickey, et al. 1990. Plan 9 from Bell Labs. In Proceedings of the summer 1990 UKUUG Conference. 1\u20139. http:\/\/css.csail.mit.edu\/6.824\/2014\/papers\/plan9.pdf"},{"key":"e_1_3_2_2_68_1","volume-title":"11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)","author":"Rabkin Ariel","year":"2014","unstructured":"Ariel Rabkin , Matvey Arye , Siddhartha Sen , Vivek S Pai , and Michael J Freedman . 2014 . Aggregation and Degradation in JetStream: Streaming analytics in the wide area . In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14) . USENIX Association, 275\u2013288. Ariel Rabkin, Matvey Arye, Siddhartha Sen, Vivek S Pai, and Michael J Freedman. 2014. Aggregation and Degradation in JetStream: Streaming analytics in the wide area. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14). USENIX Association, 275\u2013288."},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/800216.806593"},{"key":"e_1_3_2_2_70_1","volume-title":"Proceedings of the 6th Conference on Symposium on Opearting Systems Design &amp; Implementation -","volume":"6","author":"Rinard Martin","unstructured":"Martin Rinard , Cristian Cadar , Daniel Dumitran , Daniel M. Roy , Tudor Leu , and William S . Beebee, Jr. 2004. Enhancing Server Availability and Security Through Failure-oblivious Computing . In Proceedings of the 6th Conference on Symposium on Opearting Systems Design &amp; Implementation - Volume 6 (OSDI\u201904). USENIX Association, Berkeley, CA, USA, 21\u201321. http:\/\/dl.acm.org\/citation.cfm?id=1251254.1251275 Martin Rinard, Cristian Cadar, Daniel Dumitran, Daniel M. Roy, Tudor Leu, and William S. Beebee, Jr. 2004. Enhancing Server Availability and Security Through Failure-oblivious Computing. In Proceedings of the 6th Conference on Symposium on Opearting Systems Design &amp; Implementation - Volume 6 (OSDI\u201904). USENIX Association, Berkeley, CA, USA, 21\u201321. http:\/\/dl.acm.org\/citation.cfm?id=1251254.1251275"},{"key":"e_1_3_2_2_71_1","volume-title":"21st USENIX Security Symposium (USENIX Security 12)","author":"Rizzo Luigi","year":"2012","unstructured":"Luigi Rizzo . 2012 . Netmap: a novel framework for fast packet I\/O . In 21st USENIX Security Symposium (USENIX Security 12) . 101\u2013112. Luigi Rizzo. 2012. Netmap: a novel framework for fast packet I\/O. In 21st USENIX Security Symposium (USENIX Security 12). 101\u2013112."},{"key":"e_1_3_2_2_72_1","unstructured":"Marc Rozier Vadim Abrossimov Fran\u00e7ois Armand Ivan Boule Michel Gien Marc Guillemont Fr\u00e9d\u00e9ric Herrmann Claude Kaiser Sylvain Langlois Pierre L\u00e9onard etal 1991. Overview of the chorus distributed operating systems. In Computing Systems.  Marc Rozier Vadim Abrossimov Fran\u00e7ois Armand Ivan Boule Michel Gien Marc Guillemont Fr\u00e9d\u00e9ric Herrmann Claude Kaiser Sylvain Langlois Pierre L\u00e9onard et al. 1991. Overview of the chorus distributed operating systems. In Computing Systems."},{"key":"e_1_3_2_2_73_1","unstructured":"Jan Sacha Henning Schild Jeff Napper Noah Evans and Sape Mullender. 2013. Message passing and scheduling in Osprey. (2013). http:\/\/sfma13.cs.washington.edu\/wp-content\/uploads\/2013\/ 04\/sfma2013-final6.pdf  Jan Sacha Henning Schild Jeff Napper Noah Evans and Sape Mullender. 2013. Message passing and scheduling in Osprey. (2013). http:\/\/sfma13.cs.washington.edu\/wp-content\/uploads\/2013\/ 04\/sfma2013-final6.pdf"},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/MPRV.2009.82"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2332"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500727.2500739"},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/1086365.1086370"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508250"},{"volume-title":"Proceedings of the Annual Conference on USENIX Annual Technical Conference (ATEC \u201905)","author":"Sidiroglou Stelios","key":"e_1_3_2_2_79_1","unstructured":"Stelios Sidiroglou , Michael E. Locasto , Stephen W. Boyd , and Angelos D. Keromytis . 2005. Building a Reactive Immune System for Software Services . In Proceedings of the Annual Conference on USENIX Annual Technical Conference (ATEC \u201905) . USENIX Association, Berkeley, CA, USA, 11\u201311. http:\/\/dl.acm.org\/citation.cfm?id=1247360.1247371 Stelios Sidiroglou, Michael E. Locasto, Stephen W. Boyd, and Angelos D. Keromytis. 2005. Building a Reactive Immune System for Software Services. In Proceedings of the Annual Conference on USENIX Annual Technical Conference (ATEC \u201905). USENIX Association, Berkeley, CA, USA, 11\u201311. http:\/\/dl.acm.org\/citation.cfm?id=1247360.1247371"},{"key":"e_1_3_2_2_80_1","unstructured":"Joel Spolsky. 2000. Things You Should Never Do Part I. https: \/\/tinyurl.com\/j5ml4gg Accessed: 2017-12-11.  Joel Spolsky. 2000. Things You Should Never Do Part I. https: \/\/tinyurl.com\/j5ml4gg Accessed: 2017-12-11."},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1010079421970"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.663936"},{"key":"e_1_3_2_2_83_1","unstructured":"The gRPC Authors. 2018. gRPC. https:\/\/grpc.io\/ Accessed: 2019-04-16.  The gRPC Authors. 2018. gRPC. https:\/\/grpc.io\/ Accessed: 2019-04-16."},{"key":"e_1_3_2_2_84_1","volume-title":"Workshop on Foundations of Computer Security 2017 (FCS\u201917)","author":"Tsampas Stylianos","year":"2017","unstructured":"Stylianos Tsampas , Akram El-Korashy , Marco Patrignani , Dominique Devriese , Deepak Garg , and Frank Piessens . 2017 . Towards automatic compartmentalization of C programs on capability machines . In Workshop on Foundations of Computer Security 2017 (FCS\u201917) . 1\u201314. Stylianos Tsampas, Akram El-Korashy, Marco Patrignani, Dominique Devriese, Deepak Garg, and Frank Piessens. 2017. Towards automatic compartmentalization of C programs on capability machines. In Workshop on Foundations of Computer Security 2017 (FCS\u201917). 1\u201314."},{"volume-title":"Proceedings of the 9th Workshop on Programming Languages and Operating Systems (PLOS\u201917)","author":"Vasilakis Nikos","key":"e_1_3_2_2_85_1","unstructured":"Nikos Vasilakis , Ben Karel , Nick Roessler , Nathan Dautenhahn , Andr\u00e9 DeHon , and Jonathan M. Smith . 2017. Towards Fine-grained, Automated Application Compartmentalization . In Proceedings of the 9th Workshop on Programming Languages and Operating Systems (PLOS\u201917) . ACM, New York, NY, USA, 43\u201350. Nikos Vasilakis, Ben Karel, Nick Roessler, Nathan Dautenhahn, Andr\u00e9 DeHon, and Jonathan M. Smith. 2017. Towards Fine-grained, Automated Application Compartmentalization. In Proceedings of the 9th Workshop on Programming Languages and Operating Systems (PLOS\u201917). ACM, New York, NY, USA, 43\u201350."},{"key":"e_1_3_2_2_86_1","volume-title":"Smith","author":"Vasilakis Nikos","year":"2018","unstructured":"Nikos Vasilakis , Ben Karel , Nick Roessler , Nathan Dautenhahn , Andr\u00e9 DeHon , and Jonathan M . Smith . 2018 . BreakApp: Automated, Flexible Application Compartmentalization. In Networked and Distributed Systems Security (NDSS\u2019 18). Nikos Vasilakis, Ben Karel, Nick Roessler, Nathan Dautenhahn, Andr\u00e9 DeHon, and Jonathan M. Smith. 2018. BreakApp: Automated, Flexible Application Compartmentalization. In Networked and Distributed Systems Security (NDSS\u201918)."},{"volume-title":"15th Workshop on Hot Topics in Operating Systems (HotOS XV). USENIX Association","author":"Vasilakis Nikos","key":"e_1_3_2_2_87_1","unstructured":"Nikos Vasilakis , Ben Karel , and Jonathan M. Smith . 2015. From Lone Dwarfs to Giant Superclusters: Rethinking Operating System Abstractions for the Cloud . In 15th Workshop on Hot Topics in Operating Systems (HotOS XV). USENIX Association , Kartause Ittingen, Switzerland. https:\/\/www.usenix.org\/conference\/hotos15\/ workshop-program\/presentation\/vasilakis Nikos Vasilakis, Ben Karel, and Jonathan M. Smith. 2015. From Lone Dwarfs to Giant Superclusters: Rethinking Operating System Abstractions for the Cloud. In 15th Workshop on Hot Topics in Operating Systems (HotOS XV). USENIX Association, Kartause Ittingen, Switzerland. https:\/\/www.usenix.org\/conference\/hotos15\/ workshop-program\/presentation\/vasilakis"},{"volume-title":"Concurrent Programming in ERLANG (2Nd Ed.)","author":"Virding Robert","key":"e_1_3_2_2_88_1","unstructured":"Robert Virding , Claes Wikstr\u00f6m , and Mike Williams . 1996. Concurrent Programming in ERLANG (2Nd Ed.) . Prentice Hall International (UK) Ltd ., Hertfordshire, UK, UK. Robert Virding, Claes Wikstr\u00f6m, and Mike Williams. 1996. Concurrent Programming in ERLANG (2Nd Ed.). Prentice Hall International (UK) Ltd., Hertfordshire, UK, UK."},{"key":"e_1_3_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/773379.806615"},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/IEEE.EDGE.2017.42"},{"key":"e_1_3_2_2_91_1","doi-asserted-by":"publisher","DOI":"10.5555\/874075.876396"},{"key":"e_1_3_2_2_92_1","volume-title":"Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI\u201912)","author":"Zaharia Matei","year":"2012","unstructured":"Matei Zaharia , Mosharaf Chowdhury , Tathagata Das , Ankur Dave , Justin Ma , Murphy McCauley , Michael J. Franklin , Scott Shenker , and Ion Stoica . 2012 . Resilient Distributed Datasets: A Fault-tolerant Abstraction for In-memory Cluster Computing . In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI\u201912) . USENIX Association, Berkeley, CA, USA, 2\u20132. http:\/\/dl.acm.org\/citation.cfm?id=2228298.2228301 Matei Zaharia, Mosharaf Chowdhury, Tathagata Das, Ankur Dave, Justin Ma, Murphy McCauley, Michael J. Franklin, Scott Shenker, and Ion Stoica. 2012. Resilient Distributed Datasets: A Fault-tolerant Abstraction for In-memory Cluster Computing. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI\u201912). USENIX Association, Berkeley, CA, USA, 2\u20132. http:\/\/dl.acm.org\/citation.cfm?id=2228298.2228301"},{"key":"e_1_3_2_2_93_1","unstructured":"Jamie Zawinski. 1999. Resignation and Postmortem. https:\/\/www. jwz.org\/gruntle\/nomo.html Accessed: 2018-02-12.  Jamie Zawinski. 1999. Resignation and Postmortem. https:\/\/www. jwz.org\/gruntle\/nomo.html Accessed: 2018-02-12."},{"key":"e_1_3_2_2_94_1","unstructured":"John N Zigman Ramesh Sankaranarayana etal 2002. dJVM-A distributed JVM on a Cluster. (2002).  John N Zigman Ramesh Sankaranarayana et al. 2002. dJVM-A distributed JVM on a Cluster. (2002)."}],"event":{"name":"PLDI '19: 40th ACM SIGPLAN Conference on Programming Language Design and Implementation","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Phoenix AZ USA","acronym":"PLDI '19"},"container-title":["Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314221.3314586","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314221.3314586","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314221.3314586","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:22Z","timestamp":1750204402000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314221.3314586"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,8]]},"references-count":94,"alternative-id":["10.1145\/3314221.3314586","10.1145\/3314221"],"URL":"https:\/\/doi.org\/10.1145\/3314221.3314586","relation":{},"subject":[],"published":{"date-parts":[[2019,6,8]]},"assertion":[{"value":"2019-06-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}