Fig. 1From: Using weaker consistency models with monitoring and recovery for improving performance of key-value storesThe detect-rollback approach: when the predicate of interest is violated, system state is restored to the most recent consistent snapshot and the computation resumes from thereBack to article page