{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T17:23:30Z","timestamp":1763054610566,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,10,13]]},"DOI":"10.1145\/3766882.3767182","type":"proceedings-article","created":{"date-parts":[[2025,10,1]],"date-time":"2025-10-01T13:55:02Z","timestamp":1759326902000},"page":"81-86","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Intent-based System Design and Operation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8502-0657","authenticated-orcid":false,"given":"Vaastav","family":"Anand","sequence":"first","affiliation":[{"name":"Max Planck Institute for Software Systems, Germany and Microsoft, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-8370-644X","authenticated-orcid":false,"given":"Yichen","family":"Li","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong and Microsoft, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5433-4688","authenticated-orcid":false,"given":"Alok Gautam","family":"Kumbhare","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3951-9320","authenticated-orcid":false,"given":"Celine","family":"Irvene","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0102-8139","authenticated-orcid":false,"given":"Chetan","family":"Bansal","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6949-8685","authenticated-orcid":false,"given":"Gagan","family":"Somashekar","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3701-9296","authenticated-orcid":false,"given":"Jonathan","family":"Mace","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7590-3736","authenticated-orcid":false,"given":"Pedro","family":"Las-Casas","sequence":"additional","affiliation":[{"name":"Microsoft Brazil"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5971-5084","authenticated-orcid":false,"given":"Ricardo","family":"Bianchini","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9662-2661","authenticated-orcid":false,"given":"Rodrigo","family":"Fonseca","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]}],"member":"320","published-online":{"date-parts":[[2025,10,13]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Dapr: Distributed application runtime. https:\/\/dapr.io\/."},{"key":"e_1_3_2_1_2_1","volume-title":"Agile software development methods: Review and analysis. arXiv preprint arXiv:1709.08439","author":"Abrahamsson P.","year":"2017","unstructured":"P. Abrahamsson, O. Salo, J. Ronkainen, and J. Warsta. Agile software development methods: Review and analysis. arXiv preprint arXiv:1709.08439, 2017."},{"key":"e_1_3_2_1_3_1","first-page":"957","volume-title":"19th USENIX Symposium on Operating Systems Design and Implementation (OSDI 25)","author":"Adam J.","year":"2025","unstructured":"J. Adam, C. Zech, L. Zhu, S. Rajesh, N. Harbison, M. Jethwa, W. Crichton, S. Krishnamurthi, and M. Schwarzkopf. Paralegal: Practical static analysis for privacy bugs. In 19th USENIX Symposium on Operating Systems Design and Implementation (OSDI 25), pages 957--978, 2025."},{"key":"e_1_3_2_1_4_1","volume-title":"Iridescent: A framework enabling online system implementation specialization. arXiv preprint arXiv:2508.16690","author":"Anand V.","year":"2025","unstructured":"V. Anand, D. Garg, and A. Kaufmann. Iridescent: A framework enabling online system implementation specialization. arXiv preprint arXiv:2508.16690, 2025."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3600006.3613138"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/AIOps66738.2025.00006"},{"key":"e_1_3_2_1_7_1","volume-title":"Building effective agents. Accessed","author":"Blog Anthropic","year":"2025","unstructured":"Anthropic Blog. Building effective agents. Accessed July 2025 from https:\/\/www.anthropic.com\/engineering\/building-effective-agents, 2024."},{"volume-title":"Accessed 9th","year":"2024","key":"e_1_3_2_1_8_1","unstructured":"Asim. How a single chatgpt mistake cost us $10,000+. Accessed 9th June, 2024 from https:\/\/web.archive.org\/web\/20240610032818\/https:\/\/asim.bearblog.dev\/how-a-single-chatgpt-mistake-cost-us-10000\/, 2024."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483540"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3458336.3465286"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3712057"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.17487\/RFC9315"},{"key":"e_1_3_2_1_13_1","volume-title":"The evolution of microservices. (April","author":"Cockcroft A.","year":"2016","unstructured":"A. Cockcroft. The evolution of microservices. (April 2016). Retrieved October 2020 from https:\/\/www.slideshare.net\/adriancockcroft\/evolution-of-microservices-craft-conference, 2016."},{"key":"e_1_3_2_1_14_1","volume-title":"Microservices workshop: Why, what, and how to get there. (April 2016","author":"Cockcroft A.","year":"2020","unstructured":"A. Cockcroft. Microservices workshop: Why, what, and how to get there. (April 2016). Retrieved October 2020 from https:\/\/www.slideshare.net\/adriancockcroft\/microservices-workshop-craft-conference, 2016."},{"key":"e_1_3_2_1_15_1","volume-title":"Building reliable cloud services using p#(experience report). arXiv preprint arXiv:2002.04903","author":"Deligiannis P.","year":"2020","unstructured":"P. Deligiannis, N. Ganapathy, A. Lal, and S. Qadeer. Building reliable cloud services using p#(experience report). arXiv preprint arXiv:2002.04903, 2020."},{"key":"e_1_3_2_1_16_1","volume-title":"i destroyed months of your work in seconds' says ai coding tool after deleting a dev's entire database during a code freeze: 'i panicked instead of thinking'. Accessed","author":"Edser A.","year":"2025","unstructured":"A. Edser. 'i destroyed months of your work in seconds' says ai coding tool after deleting a dev's entire database during a code freeze: 'i panicked instead of thinking'. Accessed July 2025 from https:\/\/www.pcgamer.com\/software\/ai\/i-destroyed-months-of-your-work-in-seconds-says-ai-coding-tool-after-deleting-a-devs-entire-database-during-a-code-freeze-i-panicked-instead-of-thinking\/, 2025."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3613898"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3593856.3595909"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3542929.3563482"},{"key":"e_1_3_2_1_20_1","volume-title":"Accessed","author":"Gluck A.","year":"2024","unstructured":"A. Gluck. Introducing domain-oriented microservice architecture. Accessed June 2024 from https:\/\/www.uber.com\/blog\/microservice-architecture\/, 2020."},{"key":"e_1_3_2_1_21_1","first-page":"152","volume-title":"Proceedings of the IEEE International Symposium on Requirements Engineering","author":"Goguen J. A.","year":"1993","unstructured":"J. A. Goguen and C. Linde. Techniques for requirements elicitation. In [1993] Proceedings of the IEEE International Symposium on Requirements Engineering, pages 152--164. IEEE, 1993."},{"key":"e_1_3_2_1_22_1","volume-title":"Service-oriented architecture: Scaling the uber engineering codebase as we grow. (September","author":"Haddad E.","year":"2015","unstructured":"E. Haddad. Service-oriented architecture: Scaling the uber engineering codebase as we grow. (September 2015). Retrieved October 2020 from https:\/\/eng.uber.com\/service-oriented-architecture\/, 2015."},{"key":"e_1_3_2_1_23_1","volume-title":"(January","author":"Hashemi M.","year":"2017","unstructured":"M. Hashemi. The infrastructure behind twitter: Scale. (January 2017). Retrieved February 2021 from https:\/\/blog.twitter.com\/engineering\/en_us\/topics\/infrastructure\/2017\/the-infrastructure-behind-twitter-scale.html, 2017."},{"key":"e_1_3_2_1_24_1","first-page":"73","volume-title":"16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22)","author":"Huang L.","year":"2022","unstructured":"L. Huang, M. Magnusson, A. B. Muralikrishna, S. Estyak, R. Isaacs, A. Aghayev, T. Zhu, and A. Charapko. Metastable failures in the wild. In 16th USENIX Symposium on Operating Systems Design and Implementation (OSDI 22), pages 73--90, 2022."},{"key":"e_1_3_2_1_25_1","volume-title":"A survey on hallucination in large language models: Principles, taxonomy, challenges, and open questions. arXiv preprint arXiv:2311.05232","author":"Huang L.","year":"2023","unstructured":"L. Huang, W. Yu, W. Ma, W. Zhong, Z. Feng, H. Wang, Q. Chen, W. Peng, X. Feng, B. Qin, et al. A survey on hallucination in large language models: Principles, taxonomy, challenges, and open questions. arXiv preprint arXiv:2311.05232, 2023."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2025.3574626"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132749"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3689051.3689056"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00085"},{"volume-title":"Build something lovable: Create apps and websites by chatting with ai. Accessed","year":"2025","key":"e_1_3_2_1_30_1","unstructured":"Lovable. Build something lovable: Create apps and websites by chatting with ai. Accessed July 2025 from https:\/\/lovable.dev\/, 2025."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1218063.1217964"},{"key":"e_1_3_2_1_32_1","volume-title":"achieving 100 Accessed","author":"Nam J.","year":"2025","unstructured":"J. Nam. [autobe] we made ai-friendly compilers for vibe coding, achieving 100 Accessed July 2025 from https:\/\/dev.to\/samchon\/autobe-we-made-ai-friendly-compilers-for-vibe-coding-491k, 2025."},{"key":"e_1_3_2_1_33_1","volume-title":"Accessed","author":"Shanks E.","year":"2024","unstructured":"E. Shanks. Kubernetes - desired state and control loops. Accessed July, 2024 from https:\/\/theithollow.com\/2019\/09\/16\/kubernetes-desired-state-and-control-loops\/, 2019."},{"key":"e_1_3_2_1_34_1","first-page":"1101","volume-title":"21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24)","author":"Somashekar G.","year":"2024","unstructured":"G. Somashekar, K. Tandon, A. Kini, C.-C. Chang, P. Husak, R. Bhagwan, M. Das, A. Gandhi, and N. Natarajan. OPPerTune: Post-Deployment configuration tuning of services made easy. In 21st USENIX Symposium on Networked Systems Design and Implementation (NSDI 24), pages 1101--1120, Santa Clara, CA, Apr. 2024. USENIX Association."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/337180.337184"},{"key":"e_1_3_2_1_36_1","volume-title":"The shift from models to compound ai systems. Accessed","author":"Zaharia M.","year":"2025","unstructured":"M. Zaharia, O. Khattab, L. Chen, J. Q. Davis, H. Miller, C. Potts, J. Zou, M. Carbin, J. Frankle, N. Rao, and A. Ghodsi. The shift from models to compound ai systems. Accessed July 2025 from https:\/\/bair.berkeley.edu\/blog\/2024\/02\/18\/compound-ai- systems\/, 2024."}],"event":{"name":"SOSP '25: ACM SIGOPS 31st Symposium on Operating Systems Principles","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Seoul Republic of Korea","acronym":"SOSP '25"},"container-title":["Proceedings of the 4th Workshop on Practical Adoption Challenges of ML for Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3766882.3767182","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,13]],"date-time":"2025-11-13T17:20:02Z","timestamp":1763054402000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3766882.3767182"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,13]]},"references-count":36,"alternative-id":["10.1145\/3766882.3767182","10.1145\/3766882"],"URL":"https:\/\/doi.org\/10.1145\/3766882.3767182","relation":{},"subject":[],"published":{"date-parts":[[2025,10,13]]},"assertion":[{"value":"2025-10-13","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}