{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:04:00Z","timestamp":1750309440797,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100018877","name":"Research and Innovation Foundation","doi-asserted-by":"publisher","award":["PHD IN INDUSTRY\/1222\/0121","DUAL USE\/0922\/0048"],"award-info":[{"award-number":["PHD IN INDUSTRY\/1222\/0121","DUAL USE\/0922\/0048"]}],"id":[{"id":"10.13039\/501100018877","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,30]]},"DOI":"10.1145\/3721473.3722140","type":"proceedings-article","created":{"date-parts":[[2025,4,2]],"date-time":"2025-04-02T21:48:18Z","timestamp":1743630498000},"page":"1-7","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Dynamic Distributed Shared Memory: When&amp;How?"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-4360-0260","authenticated-orcid":false,"given":"Chryssis","family":"Georgiou","sequence":"first","affiliation":[{"name":"Department of Computer Science, University of Cyprus, Nicosia, Aglatzia, Cyprus"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4872-7180","authenticated-orcid":false,"given":"Nicolas","family":"Nicolaou","sequence":"additional","affiliation":[{"name":"Algolysis Ltd, Limassol, Cyprus"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3369-6767","authenticated-orcid":false,"given":"Andria","family":"Trigeorgi","sequence":"additional","affiliation":[{"name":"Algolysis Ltd, Limassol, Cyprus"},{"name":"Department of Computer Science, University of Cyprus, Nicosia, Aglatzia, Cyprus"}]}],"member":"320","published-online":{"date-parts":[[2025,4,2]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1582716.1582726"},{"key":"e_1_3_2_1_2_1","volume-title":"Sharing Memory Robustly in Message-Passing Systems. Journal of the ACM (JACM), 42(1):124--142","author":"Attiya H.","year":"1995","unstructured":"H. Attiya, A. Bar-Noy, and D. Dolev. Sharing Memory Robustly in Message-Passing Systems. Journal of the ACM (JACM), 42(1):124--142, 1995."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2867479"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ic.2022.104869"},{"key":"e_1_3_2_1_5_1","volume-title":"Anomaly detection with prometheus","author":"Baselga Diego Mart\u00ednez","year":"2020","unstructured":"Diego Mart\u00ednez Baselga. Anomaly detection with prometheus, 2020. Bachelor's thesis, Tampere University."},{"key":"e_1_3_2_1_6_1","unstructured":"Columntransformer. https:\/\/scikit-learn.org\/1.5\/modules\/generated\/sklearn.compose.ColumnTransformer.html. Accessed: 2024-12-16."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45014-9_1"},{"key":"e_1_3_2_1_8_1","first-page":"140","article-title":"Elastic Configuration Maintenance via a Parsimonious Speculating Snapshot Solution. Lecture Notes in Computer Science (including subseries Lecture Notes","volume":"9363","author":"Gafni E.","year":"2015","unstructured":"E. Gafni and D. Malkhi. Elastic Configuration Maintenance via a Parsimonious Speculating Snapshot Solution. Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics), 9363:140--153, 2015.","journal-title":"Artificial Intelligence and Lecture Notes in Bioinformatics)"},{"key":"e_1_3_2_1_9_1","first-page":"187","volume-title":"Proceedings of the 43rd International Symposium on Reliable Distributed Systems, SRDS'24","author":"Georgiou Chryssis","year":"2024","unstructured":"Chryssis Georgiou, Nicolas Nicolaou, and Andria Trigeorgi. Ares II: Tracing the Flaws of a (Storage) God. In Proceedings of the 43rd International Symposium on Reliable Distributed Systems, SRDS'24, page 187--197, 2024."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 6th Workshop on Advanced Tools, Programming Languages, and PLatforms for Implementing and Evaluating Algorithms for Distributed Systems, ApPLIED'24, page 1--6","author":"Georgiou Chryssis","year":"2024","unstructured":"Chryssis Georgiou, Nicolas Nicolaou, and Andria Trigeorgi. Tracing the Latencies of Ares: A DSM Case Study. In Proceedings of the 6th Workshop on Advanced Tools, Programming Languages, and PLatforms for Implementing and Evaluating Algorithms for Distributed Systems, ApPLIED'24, page 1--6, 2024."},{"issue":"4","key":"e_1_3_2_1_11_1","first-page":"225","article-title":"RAMBO: a Robust","volume":"23","author":"Gilbert Seth","year":"2010","unstructured":"Seth Gilbert, Nancy A. Lynch, and Alexander A. Shvartsman. RAMBO: a Robust, Reconfigurable Atomic Memory Service for Dynamic Networks. Distributed Computing, 23(4):225--272, 2010.","journal-title":"Reconfigurable Atomic Memory Service for Dynamic Networks. Distributed Computing"},{"key":"e_1_3_2_1_12_1","volume-title":"Consistent Distributed Storage. Synthesis Lectures on Distributed Computing Theory","author":"Gramoli Vincent","year":"2021","unstructured":"Vincent Gramoli, Nicolas Nicolaou, and Alexander A. Schwarzmann. Consistent Distributed Storage. Synthesis Lectures on Distributed Computing Theory. Morgan & Claypool Publishers, 2021."},{"key":"e_1_3_2_1_13_1","unstructured":"Isolationforest. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.ensemble.IsolationForest.html. Accessed: 2024-12-16."},{"key":"e_1_3_2_1_14_1","unstructured":"Hal Daum\u00e9 III. A course in machine learning. http:\/\/ciml.info\/ 2013."},{"key":"e_1_3_2_1_15_1","unstructured":"iperf3. https:\/\/iperf.fr\/. Accessed: 2024-12-16."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1007\/978-3-662-48653-5_11","volume-title":"International Symposium on Distributed Computing","author":"Jehl L.","year":"2015","unstructured":"L. Jehl, R. Vitenberg, and H. Meling. Smartmerge: A New Approach to Reconfiguration for Atomic Storage. In International Symposium on Distributed Computing, pages 154--169. Springer, 2015."},{"key":"e_1_3_2_1_17_1","volume-title":"https:\/\/machinelearningmastery.com\/k-fold-cross-validation\/","author":"A","year":"2018","unstructured":"A gentle introduction to k-fold cross-validation. https:\/\/machinelearningmastery.com\/k-fold-cross-validation\/, 2018. Accessed: 2024-12-16."},{"key":"e_1_3_2_1_18_1","unstructured":"Kmeans. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.cluster.KMeans.html. Accessed: 2024-12-16."},{"key":"e_1_3_2_1_19_1","unstructured":"Kneighborsclassifier. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.neighbors.KNeighborsClassifier.html. Accessed: 2024-12-16."},{"key":"e_1_3_2_1_20_1","volume-title":"Data characterization and anomaly detection for hpc datacenters using machine learning","author":"Liang Wenjun","year":"2023","unstructured":"Wenjun Liang. Data characterization and anomaly detection for hpc datacenters using machine learning, 2023. Master thesis, Vrije Universiteit Amsterdam."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","first-page":"598","DOI":"10.1007\/978-3-642-15396-9_47","volume-title":"Principles and Practice of Constraint Programming - CP 2010","author":"Michel Laurent","year":"2010","unstructured":"Laurent Michel, Alexander A. Shvartsman, Elaine Sonderegger, and Pascal Van Hentenryck. Load balancing and almost symmetries for rambo quorum hosting. In David Cohen, editor, Principles and Practice of Constraint Programming - CP 2010, pages 598--612, Berlin, Heidelberg, 2010. Springer Berlin Heidelberg."},{"key":"e_1_3_2_1_22_1","first-page":"3622426","article-title":"An lstm-autoencoder architecture for anomaly detection applied on compressors audio data","volume":"2022","author":"Mobtahej Pooyan","year":"2022","unstructured":"Pooyan Mobtahej, Xulong Zhang, Maryam Hamidi, and Jing Zhang. An lstm-autoencoder architecture for anomaly detection applied on compressors audio data. Computational and Mathematical Methods, 2022:3622426, 2022.","journal-title":"Computational and Mathematical Methods"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/MilCIS.2015.7348942"},{"key":"e_1_3_2_1_24_1","unstructured":"Nagios. https:\/\/www.nagios.org. Accessed: 2024-12-16."},{"issue":"4","key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3510613","article-title":"Adaptive, reconfigurable, erasure coded, atomic storage","volume":"18","author":"Nicolaou Nicolas","year":"2022","unstructured":"Nicolas Nicolaou, Viveck Cadambe, Narayana Prakash, Andria Trigeorgi, Kishori Konwar, Muriel Medard, and Nancy Lynch. Ares: Adaptive, reconfigurable, erasure coded, atomic storage. Journal of ACM Transactions on Storage, 18(4):1--39, 2022. Implementation and evaluation by the author of this thesis; algorithm design by Nicolaou et al.","journal-title":"Journal of ACM Transactions on Storage"},{"key":"e_1_3_2_1_26_1","volume-title":"Surf machine metric dataset [2019-12-29","author":"Laursen Olason Kristian V.","year":"2020","unstructured":"Kristian V. Laursen Olason, Alexandru Uta, Alexandru Iosup, Paul Melis, Damian Podareanu, and Valeriu Codreanu. Surf machine metric dataset [2019-12-29, 2020-08-07], 2021."},{"key":"e_1_3_2_1_27_1","unstructured":"Onehotencoder. https:\/\/scikit-learn.org\/1.5\/modules\/generated\/sklearn.preprocessing.OneHotEncoder.html. Accessed: 2024-12-16."},{"key":"e_1_3_2_1_28_1","unstructured":"Over-sampling. https:\/\/imbalanced-learn.org\/stable\/over_sampling.html. Accessed: 2024-12-16."},{"key":"e_1_3_2_1_29_1","unstructured":"Prometheus. https:\/\/prometheus.io. Accessed: 2024-12-16."},{"key":"e_1_3_2_1_30_1","unstructured":"Randomforest. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.ensemble.RandomForestClassifier.html. Accessed: 2024-12-16."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","first-page":"97","DOI":"10.1109\/CSCloud.2017.15","volume-title":"2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud)","author":"Salman Tara","year":"2017","unstructured":"Tara Salman, Deval Bhamare, Aiman M. Erbad, Raj Jain, and Mohammed Samaka. Machine learning for anomaly detection and categorization in multi-cloud environments. 2017 IEEE 4th International Conference on Cyber Security and Cloud Computing (CSCloud), pages 97--103, 2017."},{"key":"e_1_3_2_1_32_1","unstructured":"Sensu. https:\/\/sensu.io. Accessed: 2024-12-16."},{"key":"e_1_3_2_1_33_1","unstructured":"Signoz. https:\/\/signoz.io. Accessed: 2024-12-16."},{"key":"e_1_3_2_1_34_1","unstructured":"Standardscaler. https:\/\/scikit-learn.org\/1.5\/modules\/generated\/sklearn.preprocessing.StandardScaler.html. Accessed: 2024-12-16."},{"key":"e_1_3_2_1_35_1","unstructured":"Stress tool. https:\/\/linux.die.net\/man\/1\/stress. Accessed: 2024-12-16."},{"key":"e_1_3_2_1_36_1","unstructured":"Under-sampling. https:\/\/imbalanced-learn.org\/stable\/under_sampling.html. Accessed: 2024-12-16."},{"key":"e_1_3_2_1_37_1","unstructured":"Zabbix. https:\/\/www.zabbix.com. Accessed: 2024-12-16."}],"event":{"name":"PaPoC '25: 12th Workshop on Principles and Practice of Consistency for Distributed Data","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"World Trade Center Rotterdam Netherlands","acronym":"PaPoC '25"},"container-title":["Proceedings of the 12th Workshop on Principles and Practice of Consistency for Distributed Data"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3721473.3722140","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3721473.3722140","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T01:09:47Z","timestamp":1750295387000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3721473.3722140"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,30]]},"references-count":37,"alternative-id":["10.1145\/3721473.3722140","10.1145\/3721473"],"URL":"https:\/\/doi.org\/10.1145\/3721473.3722140","relation":{},"subject":[],"published":{"date-parts":[[2025,3,30]]},"assertion":[{"value":"2025-04-02","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}