{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,22]],"date-time":"2025-10-22T18:12:44Z","timestamp":1761156764508,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,27]],"date-time":"2019-10-27T00:00:00Z","timestamp":1572134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1730628"],"award-info":[{"award-number":["CCF-1730628"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,27]]},"DOI":"10.1145\/3341301.3359653","type":"proceedings-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T13:34:22Z","timestamp":1571664862000},"page":"338-352","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Lineage stash"],"prefix":"10.1145","author":[{"given":"Stephanie","family":"Wang","sequence":"first","affiliation":[{"name":"UC Berkeley"}]},{"given":"John","family":"Liagouris","sequence":"additional","affiliation":[{"name":"ETH Zurich"}]},{"given":"Robert","family":"Nishihara","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]},{"given":"Philipp","family":"Moritz","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]},{"given":"Ujval","family":"Misra","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]},{"given":"Alexey","family":"Tumanov","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology"}]},{"given":"Ion","family":"Stoica","sequence":"additional","affiliation":[{"name":"UC Berkeley"}]}],"member":"320","published-online":{"date-parts":[[2019,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"An Overview of End-to-End Exactly-Once Processing in Apache Flink (with Apache Kafka too!). https:\/\/flink.apache.org\/features\/2018\/03\/01\/end-to-end-exactly-once-apache-flink.html.  An Overview of End-to-End Exactly-Once Processing in Apache Flink (with Apache Kafka too!). https:\/\/flink.apache.org\/features\/2018\/03\/01\/end-to-end-exactly-once-apache-flink.html."},{"volume-title":"Proceedings of the 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI)","year":"2016","author":"Abadi M.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536222.2536229"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/248052.248061"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.666828"},{"key":"e_1_3_2_1_6_1","unstructured":"Armstrong J. Virding R. Wikstr\u00f6m C. and Williams M. Concurrent programming in ERLANG.  Armstrong J. Virding R. Wikstr\u00f6m C. and Williams M. Concurrent programming in ERLANG."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Blumofe R. D. Joerg C. F. Kuszmaul B.C. Leiserson C. E. Randall K. H. and Zhou Y. Cilk: An efficient multithreaded runtime system. Journal of parallel and distributed computing 37 1 (1996) 55--69.  Blumofe R. D. Joerg C. F. Kuszmaul B.C. Leiserson C. E. Randall K. H. and Zhou Y. Cilk: An efficient multithreaded runtime system. Journal of parallel and distributed computing 37 1 (1996) 55--69.","DOI":"10.1006\/jpdc.1996.0107"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038916.2038932"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.14778\/3137765.3137777"},{"key":"e_1_3_2_1_10_1","unstructured":"Carbone P. F\u00f3ra G. Ewen S. Haridi S. and Tzoumas K. Lightweight asynchronous snapshots for distributed dataflows. CoRR abs\/1506.08603 (2015).  Carbone P. F\u00f3ra G. Ewen S. Haridi S. and Tzoumas K. Lightweight asynchronous snapshots for distributed dataflows. CoRR abs\/1506.08603 (2015)."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1978915.1978919"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/214451.214456"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Chang F. Dean J. Ghemawat S. Hsieh W. C. Wallach D. a. Burrows M. Chandra T. Fikes a. and Gruber R. E. Bigtable: A distributed storage system for structured data. ACM Transactions on Computer Systems (TOCS) 26 2 (2008) 4.  Chang F. Dean J. Ghemawat S. Hsieh W. C. Wallach D. a. Burrows M. Chandra T. Fikes a. and Gruber R. E. Bigtable: A distributed storage system for structured data. ACM Transactions on Computer Systems (TOCS) 26 2 (2008) 4.","DOI":"10.1145\/1365815.1365816"},{"key":"e_1_3_2_1_14_1","first-page":"4","article-title":"Provenance in databases: Why, how, and where","volume":"1","author":"Cheney J.","year":"2009","journal-title":"Foundations and Trends\u00ae in Databases"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"e_1_3_2_1_16_1","first-page":"205","volume-title":"ACM SIGOPS operating systems review","author":"DeCandia G.","year":"2007"},{"volume-title":"Rice University","year":"1994","author":"Elnozahy E. N.","key":"e_1_3_2_1_17_1"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/568522.568525"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1994.315630"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30218-6_19"},{"key":"e_1_3_2_1_21_1","first-page":"213","volume-title":"13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","author":"Gjengset J.","year":"2018"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884813"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2005.72"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232562"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.14778\/1453856.1453920"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Mohan C. Haderle D. Lindsay B. Pirahesh H. and Schwarz P. Aries: a transaction recovery method supporting fine-granularity locking and partial rollbacks using write-ahead logging. ACM Transactions on Database Systems (TODS) 17 1 (1992) 94--162.  Mohan C. Haderle D. Lindsay B. Pirahesh H. and Schwarz P. Aries: a transaction recovery method supporting fine-granularity locking and partial rollbacks using write-ahead logging. ACM Transactions on Database Systems (TODS) 17 1 (1992) 94--162.","DOI":"10.1145\/128765.128770"},{"volume-title":"13th USENIX Symposium on Operating Systems Design and Implementation (OSDI 18)","year":"2018","author":"Moritz P.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522738"},{"volume-title":"Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation","year":"2011","author":"Murray D. G.","key":"e_1_3_2_1_29_1"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.842260"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Schlichting R. D. and Schneider F. B. Fail-stop processors: an approach to designing fault-tolerant computing systems. ACM Transactions on Computer Systems (TOCS) 1 3 (1983) 222--238.  Schlichting R. D. and Schneider F. B. Fail-stop processors: an approach to designing fault-tolerant computing systems. ACM Transactions on Computer Systems (TOCS) 1 3 (1983) 222--238.","DOI":"10.1145\/357369.357371"},{"key":"e_1_3_2_1_32_1","unstructured":"Sergeev A. and Del Balso M. Horovod: fast and easy distributed deep learning in tensorflow. arXiv preprint arXiv:1802.05799 (2018).  Sergeev A. and Del Balso M. Horovod: fast and easy distributed deep learning in tensorflow. arXiv preprint arXiv:1802.05799 (2018)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/197917.198186"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132750"},{"volume-title":"Inc.","year":"2012","author":"White T.","key":"e_1_3_2_1_35_1"},{"key":"e_1_3_2_1_36_1","first-page":"2","volume-title":"Proceedings of the 9th USENIX conference on Networked Systems Design and Implementation","author":"Zaharia M.","year":"2012"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522737"}],"event":{"name":"SOSP '19: ACM SIGOPS 27th Symposium on Operating Systems Principles","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX Assoc USENIX Assoc"],"location":"Huntsville Ontario Canada","acronym":"SOSP '19"},"container-title":["Proceedings of the 27th ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341301.3359653","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341301.3359653","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:56Z","timestamp":1750201976000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341301.3359653"}},"subtitle":["fault tolerance off the critical path"],"short-title":[],"issued":{"date-parts":[[2019,10,27]]},"references-count":37,"alternative-id":["10.1145\/3341301.3359653","10.1145\/3341301"],"URL":"https:\/\/doi.org\/10.1145\/3341301.3359653","relation":{},"subject":[],"published":{"date-parts":[[2019,10,27]]},"assertion":[{"value":"2019-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}