Fig. 7From: Using weaker consistency models with monitoring and recovery for improving performance of key-value storesTwo client tasks involved in a violation. Since detection latency is much smaller than the Read phase time, violation will be notified within Read phase of the current task of at least one clientBack to article page