{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,1]],"date-time":"2026-01-01T10:06:57Z","timestamp":1767262017280,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":105,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,3,9]],"date-time":"2020-03-09T00:00:00Z","timestamp":1583712000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"EPSRC","award":["EP\/M027317\/1","EP\/L01503X\/1"],"award-info":[{"award-number":["EP\/M027317\/1","EP\/L01503X\/1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,3,9]]},"DOI":"10.1145\/3373376.3378496","type":"proceedings-article","created":{"date-parts":[[2020,3,13]],"date-time":"2020-03-13T22:37:01Z","timestamp":1584139021000},"page":"201-217","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":34,"title":["Hermes: A Fast, Fault-Tolerant and Linearizable Replication Protocol"],"prefix":"10.1145","author":[{"given":"Antonios","family":"Katsarakis","sequence":"first","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"given":"Vasilis","family":"Gavrielatos","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"given":"M.R. Siavash","family":"Katebzadeh","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"given":"Arpit","family":"Joshi","sequence":"additional","affiliation":[{"name":"Intel, Portland, OR, USA"}]},{"given":"Aleksandar","family":"Dragojevic","sequence":"additional","affiliation":[{"name":"Microsoft Research, Cambridge, United Kingdom"}]},{"given":"Boris","family":"Grot","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]},{"given":"Vijay","family":"Nagarajan","sequence":"additional","affiliation":[{"name":"University of Edinburgh, Edinburgh, United Kingdom"}]}],"member":"320","published-online":{"date-parts":[[2020,3,13]]},"reference":[{"volume-title":"Proceedings of the 12th Conference on Operating Systems Design and Implementation (OSDI'16)","year":"2016","author":"Adya Atul","key":"e_1_3_2_1_1_1"},{"volume-title":"Proceedings of the 14th Conference on Distributed Computing (DISC '00)","year":"2000","author":"Aguilera Marcos","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294278"},{"volume-title":"Jo ao Leit ao, and Lu'is Rodrigues","year":"2013","author":"Almeida S\u00e9rgio","key":"e_1_3_2_1_4_1"},{"volume-title":"Datastore Based on Chain Replication. In Proceedings of the 8th ACM European Conference on Computer Systems (EuroSys '13)","author":"Consistent","key":"e_1_3_2_1_5_1"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/800253.807732"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/210223.210224"},{"volume-title":"Proceedings of the International Conference for High Performance Computing, Networking, Storage, and Analysis (SC '18)","author":"Anwar Ali","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2318857.2254766"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/200836.200869"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/176575.176576"},{"volume-title":"Proceedings of the Conference on Innovative Data system Research (CIDR) . .","year":"2011","author":"Baker Jason","key":"e_1_3_2_1_12_1"},{"volume-title":"Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI'12)","author":"Balakrishnan Mahesh","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","unstructured":"Dotan Barak. 2013. Tips and tricks to optimize your RDMA code . https:\/\/www.rdmamojo.com\/2013\/06\/08\/tips-and-tricks-to-optimize-your-rdma-code\/. (Accessed on 13\/08\/2019).  Dotan Barak. 2013. Tips and tricks to optimize your RDMA code . https:\/\/www.rdmamojo.com\/2013\/06\/08\/tips-and-tricks-to-optimize-your-rdma-code\/. (Accessed on 13\/08\/2019)."},{"key":"e_1_3_2_1_15_1","unstructured":"Dotan Barak. 2015. RDMA Aware Networks Programming User Manual .  Dotan Barak. 2015. RDMA Aware Networks Programming User Manual ."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00874ED3V01Y201809CAC046"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3015146"},{"volume-title":"Derecho: Group Communication at the Speed of Light . Technical Report","year":"2016","author":"Behrens Jonathan","key":"e_1_3_2_1_18_1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/41457.37515"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1972457.1972472"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/EWSDN.2013.13"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/343477.343502"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.37"},{"volume-title":"Proceedings of the 2013 Conference on Annual Technical Conference (ATC'13)","year":"2013","author":"Bronson Nathan","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 7th USENIX Symposium on Operating Systems Design and Implementation -","volume":"7","author":"Burrows Mike","year":"2006"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2933057.2933111"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/226643.226647"},{"key":"e_1_3_2_1_28_1","unstructured":"Kelly Clay. 2013. Amazon.com Goes Down Loses $66 240 Per Minute. https:\/\/www.forbes.com\/sites\/kellyclay\/2013\/08\/19\/amazon-com-goes-down-loses-66240-per-minute\/#4e849f8b495c . (Accessed on 13\/08\/2019).  Kelly Clay. 2013. Amazon.com Goes Down Loses $66 240 Per Minute. https:\/\/www.forbes.com\/sites\/kellyclay\/2013\/08\/19\/amazon-com-goes-down-loses-66240-per-minute\/#4e849f8b495c . (Accessed on 13\/08\/2019)."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807152"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2518037.2491245"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2774993.2774999"},{"key":"e_1_3_2_1_32_1","first-page":"5","article-title":"Dynamo: Amazon's Highly Available Key-value Store","volume":"41","author":"DeCandia Giuseppe","year":"2007","journal-title":"SIGOPS Oper. Sys."},{"volume-title":"FaRM: Fast Remote Memory. In 11th USENIX Symposium on Networked Systems Design and Implementation (NSDI 14)","year":"2014","author":"Aleksandar Dragojevi\u0107","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815425"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/42282.42283"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Niklas Ekstr\u00f6 m and Seif Haridi. 2016. A Fault-Tolerant Sequentially Consistent DSM With a Compositional Correctness Proof .arxiv: 1608.02442  Niklas Ekstr\u00f6 m and Seif Haridi. 2016. A Fault-Tolerant Sequentially Consistent DSM With a Compositional Correctness Proof .arxiv: 1608.02442","DOI":"10.1007\/978-3-319-46140-3_14"},{"key":"e_1_3_2_1_37_1","unstructured":"Nathan Farrington. 2009. Multipath TCP under Massive Packet Reordering.  Nathan Farrington. 2009. Multipath TCP under Massive Packet Reordering."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190550"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/564585.564601"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018477"},{"volume-title":"Operating Systems, An Advanced Course","author":"Gray Jim","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s446-002-8027-4"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2007.80"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/829520.830872"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934908"},{"volume-title":"The Art of Multiprocessor Programming","author":"Herlihy Maurice","key":"e_1_3_2_1_46_1"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/78969.78972"},{"key":"e_1_3_2_1_48_1","unstructured":"Heidi Howard. 2019. Distributed consensus revised (Thesis).  Heidi Howard. 2019. Distributed consensus revised (Thesis)."},{"volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC'10)","year":"2010","author":"Hunt Patrick","key":"e_1_3_2_1_49_1"},{"volume-title":"Proceedings of the 13th Usenix Conference on Networked Systems Design and Implementation (NSDI'16)","year":"2016","author":"Istv\u00e1n Zsolt","key":"e_1_3_2_1_50_1"},{"key":"e_1_3_2_1_51_1","article-title":"Derecho","volume":"36","author":"Jha Sagar","year":"2019","journal-title":"Fast State Machine Replication for Cloud Services. Trans. Comput. Syst."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/937598.937601"},{"volume-title":"NetChain: Scale-Free Sub-RTT Coordination. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","year":"2018","author":"Jin Xin","key":"e_1_3_2_1_53_1"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958223"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190546"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2740070.2626299"},{"volume-title":"Proceedings of the 2016 USENIX Conference on Usenix Annual Technical Conference (USENIX ATC '16). USENIX Association","year":"2016","author":"Kalia Anuj","key":"e_1_3_2_1_57_1"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465363"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/190314.190324"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1773912.1773922"},{"key":"e_1_3_2_1_61_1","unstructured":"Christoph Lameter. 2005. Effective synchronization on Linux\/NUMA systems.  Christoph Lameter. 2005. Effective synchronization on Linux\/NUMA systems."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/177492.177726"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"key":"e_1_3_2_1_65_1","unstructured":"Leslie Lamport. 2005. Generalized consensus and Paxos .  Leslie Lamport. 2005. Generalized consensus and Paxos ."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-006-0005-x"},{"key":"e_1_3_2_1_67_1","first-page":"18","article-title":"Paxos made simple","volume":"32","author":"Leslie Lamport","year":"2001","journal-title":"ACM Sigact News"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1582716.1582783"},{"volume-title":"Proceedings of the 12th USENIX Conference on Operating Systems Design and Implementation (OSDI'16)","author":"Li Jialin","key":"e_1_3_2_1_69_1"},{"volume-title":"Proceedings of the 11th Networked Systems Design and Implementation (NSDI'14)","year":"2014","author":"Lim Hyeontaek","key":"e_1_3_2_1_70_1"},{"key":"e_1_3_2_1_71_1","unstructured":"Barbara Liskov and James Cowling. 2012. Viewstamped replication revisited.  Barbara Liskov and James Cowling. 2012. Viewstamped replication revisited."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043593"},{"volume-title":"Multi-Path Transport for RDMA in Datacenters. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","year":"2018","author":"Lu Yuanwei","key":"e_1_3_2_1_73_1"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"crossref","unstructured":"Nancy Lynch and Alexander Shvartsman. 1997. Robust emulation of shared memory using dynamic quorum-acknowledged broadcasts. bibinfonumpages272--281 pages. https:\/\/doi.org\/10.1109\/FTCS.1997.614100  Nancy Lynch and Alexander Shvartsman. 1997. Robust emulation of shared memory using dynamic quorum-acknowledged broadcasts. bibinfonumpages272--281 pages. https:\/\/doi.org\/10.1109\/FTCS.1997.614100","DOI":"10.1109\/FTCS.1997.614100"},{"volume-title":"Proceedings of the 8th Conference on Operating Systems Design and Implementation (OSDI'08)","year":"2008","author":"Mao Yanhua","key":"e_1_3_2_1_75_1"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958258"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2010.5544272"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359657"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2517350"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670979.2671001"},{"volume-title":"Presented as part of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12)","author":"Nightingale Edmund B.","key":"e_1_3_2_1_81_1"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987550.2987577"},{"volume-title":"Proceedings of the Seventh Symposium on Principles of Distributed Computing (PODC '88)","author":"Brian","key":"e_1_3_2_1_83_1"},{"volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX ATC'14)","year":"2014","author":"Ongaro Diego","key":"e_1_3_2_1_84_1"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043560"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.5555\/3323234.3323240"},{"key":"e_1_3_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/2749246.2749267"},{"volume-title":"Proceedings of the 26th International Symposium on High-Performance Parallel and Distributed Computing (HPDC '17)","author":"Poke Marius","key":"e_1_3_2_1_88_1"},{"key":"e_1_3_2_1_89_1","unstructured":"Ian Prittie. 2018. Windows Time Service | Microsoft Docs . https:\/\/docs.microsoft.com\/en-us\/windows-server\/networking\/windows-time-service\/windows-time-service-top . (Accessed on 13\/08\/2019).  Ian Prittie. 2018. Windows Time Service | Microsoft Docs . https:\/\/docs.microsoft.com\/en-us\/windows-server\/networking\/windows-time-service\/windows-time-service-top . (Accessed on 13\/08\/2019)."},{"key":"e_1_3_2_1_90_1","first-page":"1","article-title":"A Simple Totally Ordered Broadcast Protocol. In Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware (LADIS '08)","volume":"2","author":"Reed Benjamin","year":"2008","journal-title":"ACM, USA"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"crossref","unstructured":"Michael L. Scott. 2013. Shared-Memory Synchronization.  Michael L. Scott. 2013. Shared-Memory Synchronization.","DOI":"10.1007\/978-3-031-01740-7"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/3299869.3300069"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787508"},{"key":"e_1_3_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/582318.582339"},{"volume-title":"Proceedings of the 2009 Conference on USENIX Annual Technical Conference (USENIX'09)","author":"Terrace Jeff","key":"e_1_3_2_1_96_1"},{"volume-title":"Horus: A Flexible Group Communications System . Technical Report","year":"1995","author":"Renesse Robbert Van","key":"e_1_3_2_1_97_1"},{"volume-title":"Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation (OSDI'04)","author":"van Renesse Robbert","key":"e_1_3_2_1_98_1"},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/2926965"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/1435417.1435432"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1145\/3127479.3128609"},{"volume-title":"Proceedings of the 14th Conference on Networked Systems Design and Implementation (NSDI'17)","year":"2017","author":"Wei Michael","key":"e_1_3_2_1_102_1"},{"volume-title":"Elastic Scaling of Stateful Network Functions. In 15th Symposium on Networked Systems Design and Implementation (NSDI 18)","year":"2018","author":"Woo Shinae","key":"e_1_3_2_1_103_1"},{"key":"e_1_3_2_1_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522729"},{"key":"e_1_3_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.14778\/3368289.3368301"}],"event":{"name":"ASPLOS '20: Architectural Support for Programming Languages and Operating Systems","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture","SIGBED ACM Special Interest Group on Embedded Systems"],"location":"Lausanne Switzerland","acronym":"ASPLOS '20"},"container-title":["Proceedings of the Twenty-Fifth International Conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373376.3378496","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3373376.3378496","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:32:59Z","timestamp":1750199579000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3373376.3378496"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,3,9]]},"references-count":105,"alternative-id":["10.1145\/3373376.3378496","10.1145\/3373376"],"URL":"https:\/\/doi.org\/10.1145\/3373376.3378496","relation":{},"subject":[],"published":{"date-parts":[[2020,3,9]]},"assertion":[{"value":"2020-03-13","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}