{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T07:31:44Z","timestamp":1725521504376},"publisher-location":"Berlin, Heidelberg","reference-count":29,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540938996"},{"type":"electronic","value":"9783540939009"}],"license":[{"start":{"date-parts":[[2008,1,1]],"date-time":"2008-01-01T00:00:00Z","timestamp":1199145600000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008]]},"DOI":"10.1007\/978-3-540-93900-9_18","type":"book-chapter","created":{"date-parts":[[2008,12,15]],"date-time":"2008-12-15T09:35:59Z","timestamp":1229333759000},"page":"198-213","source":"Crossref","is-referenced-by-count":14,"title":["Finding Concurrency-Related Bugs Using Random Isolation"],"prefix":"10.1007","author":[{"given":"Nicholas","family":"Kidd","sequence":"first","affiliation":[]},{"given":"Thomas","family":"Reps","sequence":"additional","affiliation":[]},{"given":"Julian","family":"Dolby","sequence":"additional","affiliation":[]},{"given":"Mandana","family":"Vaziri","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"18_CR1","doi-asserted-by":"crossref","unstructured":"Vaziri, M., Tip, F., Dolby, J.: Associating synchronization constraints with data in an object-oriented language. In: POPL (2006)","DOI":"10.1145\/1111037.1111067"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Bouajjani, A., Esparza, J., Touili, T.: A generic approach to the static analysis of concurrent programs with procedures. In: POPL (2003)","DOI":"10.1145\/604131.604137"},{"key":"18_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"334","DOI":"10.1007\/11691372_22","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"S. Chaki","year":"2006","unstructured":"Chaki, S., Clarke, E., Kidd, N., Reps, T., Touili, T.: Verifying concurrent message-passing C programs with recursive calls. In: Hermanns, H., Palsberg, J. (eds.) TACAS 2006. LNCS, vol.\u00a03920, pp. 334\u2013349. Springer, Heidelberg (2006)"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Hammer, C., Dolby, J., Vaziri, M., Tip, F.: Dynamic detection of atomic-set-serializability violations. In: ICSE (2008)","DOI":"10.1145\/1368088.1368120"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Strom, R.E., Yemini, S.: Typestate: A programming language concept for enhancing software reliability. In: TSE (1986)","DOI":"10.1109\/TSE.1986.6312929"},{"issue":"3","key":"18_CR6","doi-asserted-by":"publisher","first-page":"267","DOI":"10.1002\/cpe.1068","volume":"19","author":"Y. Eytani","year":"2007","unstructured":"Eytani, Y., Havelund, K., Stoller, S.D., Ur, S.: Towards a framework and a benchmark for testing tools for multi-threaded programs. Conc. and Comp.: Prac. and Exp.\u00a019(3), 267\u2013279 (2007)","journal-title":"Conc. and Comp.: Prac. and Exp."},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Jones, N., Muchnick, S.: A flexible approach to interprocedural data flow analysis and programs with recursive data structures. In: POPL (1982)","DOI":"10.1145\/582153.582161"},{"key":"18_CR8","doi-asserted-by":"crossref","unstructured":"Milanova, A., Rountev, A., Ryder, B.G.: Parameterized object sensitivity for points-to analysis for Java. TOSEM 14(1) (2005)","DOI":"10.1145\/1044834.1044835"},{"key":"18_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/978-3-540-69166-2_19","volume-title":"Static Analysis","author":"N. Kidd","year":"2008","unstructured":"Kidd, N., Lal, A., Reps, T.: Language strength reduction. In: Alpuente, M., Vidal, G. (eds.) SAS 2008. LNCS, vol.\u00a05079, pp. 283\u2013298. Springer, Heidelberg (2008)"},{"key":"18_CR10","unstructured":"Watson Libraries for\u00a0Analysis (WALA), T.J.: http:\/\/wala.sourceforge.net\/wiki\/index.php"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Horwitz, S., Pfeiffer, P., Reps, T.: Dependence analysis for pointer variables. In: PLDI (1989)","DOI":"10.1145\/73141.74821"},{"key":"18_CR12","volume-title":"Program Flow Analysis: Theory and Applications","author":"N. Jones","year":"1981","unstructured":"Jones, N., Muchnick, S.: Flow analysis and optimization of Lisp-like structures. In: Program Flow Analysis: Theory and Applications. Prentice-Hall, Englewood Cliffs (1981)"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Sagiv, M., Reps, T., Wilhelm, R.: Parametric shape analysis via 3-valued logic. ACM Transactions on Programming Languages and Systems 24(3) (2002)","DOI":"10.1145\/514188.514190"},{"key":"18_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1007\/11823230_15","volume-title":"Static Analysis","author":"G. Balakrishnan","year":"2006","unstructured":"Balakrishnan, G., Reps, T.: Recency-abstraction for heap-allocated storage. In: Yi, K. (ed.) SAS 2006. LNCS, vol.\u00a04134, pp. 221\u2013239. Springer, Heidelberg (2006)"},{"key":"18_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1007\/3-540-48153-2_17","volume-title":"Correct Hardware Design and Verification Methods","author":"K. McMillan","year":"1999","unstructured":"McMillan, K.: Verification of infinite state systems by compositional model checking. In: Pierre, L., Kropf, T. (eds.) CHARME 1999. LNCS, vol.\u00a01703, pp. 219\u2013237. Springer, Heidelberg (1999)"},{"key":"18_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1007\/3-540-45657-0_9","volume-title":"Computer Aided Verification","author":"A. Pnueli","year":"2002","unstructured":"Pnueli, A., Xu, J., Zuck, L.: Liveness with (0,1,\u2009\u221e\u2009)-counter abstraction. In: Brinksma, E., Larsen, K.G. (eds.) CAV 2002. LNCS, vol.\u00a02404, p. 107. Springer, Heidelberg (2002)"},{"key":"18_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1007\/3-540-45789-5_8","volume-title":"Static Analysis","author":"T. Yavuz-Kahveci","year":"2002","unstructured":"Yavuz-Kahveci, T., Bultan, T.: Automated verification of concurrent linked lists with counters. In: Hermenegildo, M.V., Puebla, G. (eds.) SAS 2002. LNCS, vol.\u00a02477, pp. 69\u201384. Springer, Heidelberg (2002)"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Boyapati, C., Lee, R., Rinard, M.: Ownership types for safe programming: Preventing data races and deadlocks. In: OOPSLA (2002)","DOI":"10.1145\/582419.582440"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Qadeer, S., Wu, D.: Kiss: keep it simple and sequential. In: PLDI (2004)","DOI":"10.1145\/996841.996845"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Naik, M., Aiken, A.: Conditional must not aliasing for static race detection. In: POPL (2007)","DOI":"10.1145\/1190216.1190265"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"von Praun, C., Gross, T.R.: Object race detection. In: OOPSLA (2001)","DOI":"10.1145\/504282.504288"},{"key":"18_CR22","doi-asserted-by":"crossref","unstructured":"Min, S.L., Choi, J.D.: An efficient cache-based access anomaly detection scheme. In: ASPLOS (1991)","DOI":"10.1145\/106972.106996"},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"O\u2019Callahan, R., Choi, J.D.: Hybrid dynamic data race detection. In: PPoPP (2003)","DOI":"10.1145\/781498.781528"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"Artho, C., Havelund, K., Biere, A.: High-level data races. In: Proc. NDDL\/VVEIS 2003 (2003)","DOI":"10.1002\/stvr.281"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Burrows, M., Leino, K.R.M.: Finding stale-value errors in concurrent programs. Conc. and Comp.: Prac. and Exp.\u00a016(12) (2004)","DOI":"10.1002\/cpe.866"},{"key":"18_CR26","doi-asserted-by":"crossref","unstructured":"Flanagan, C., Freund, S.N.: Atomizer: a dynamic atomicity checker for multithreaded programs. In: POPL, pp. 256\u2013267 (2004)","DOI":"10.1145\/964001.964023"},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"Sasturkar, A., Agarwal, R., Wang, L., Stoller, S.D.: Automated type-based analysis of data races and atomicity. In: PPoPP (2005)","DOI":"10.1145\/1065944.1065956"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Lu, S., Tucek, J., Qin, F., Zhou, Y.: AVIO: Detecting atomicity violations via access interleaving invariants. In: ASPLOS (2006)","DOI":"10.1145\/1168857.1168864"},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"Wang, L., Stoller, S.D.: Accurate and efficient runtime detection of atomicity errors in concurrent programs. In: PPoPP (2006)","DOI":"10.1145\/1122971.1122993"}],"container-title":["Lecture Notes in Computer Science","Verification, Model Checking, and Abstract Interpretation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-93900-9_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,16]],"date-time":"2019-05-16T08:11:33Z","timestamp":1557994293000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-93900-9_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008]]},"ISBN":["9783540938996","9783540939009"],"references-count":29,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-93900-9_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2008]]}}}