{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T15:57:55Z","timestamp":1729612675167,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1109\/cdc.2012.6426112","type":"proceedings-article","created":{"date-parts":[[2013,2,8]],"date-time":"2013-02-08T22:05:08Z","timestamp":1360361108000},"page":"7230-7237","source":"Crossref","is-referenced-by-count":4,"title":["On atomicity enforcement in concurrent software via Discrete Event Systems theory"],"prefix":"10.1109","author":[{"given":"Yin","family":"Wang","sequence":"first","affiliation":[]},{"given":"Peng","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Terence","family":"Kelly","sequence":"additional","affiliation":[]},{"given":"Stephane","family":"Lafortune","sequence":"additional","affiliation":[]},{"given":"Spyros","family":"Reveliotis","sequence":"additional","affiliation":[]},{"given":"Charles","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2011.6160535"},{"key":"17","article-title":"A survey and comparison of Petri netbased deadlock prevention policies for flexible manufacturing systems","volume":"38","author":"li","year":"2008","journal-title":"IEEE Transactions on Systems Man and Cybernetics"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2010.5716934"},{"key":"15","article-title":"Deadlock immunity: Enabling systems to defend against deadlocks","author":"jula","year":"2008","journal-title":"OSDI"},{"key":"16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-01719-3","author":"larus","year":"2007","journal-title":"Transactional Memory"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/ACC.2010.5530904"},{"key":"14","article-title":"Automated atomicityviolation fixing","author":"jin","year":"2011","journal-title":"Proc Conf Programming Language Design and Implementation"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1002\/047166880X"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001438"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227184"},{"key":"20","article-title":"Schedulability analysis of Petri nets based on structural properties","author":"liu","year":"2006","journal-title":"Proc 3rd Int Conf Application of Concurrency to System Design"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346323"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4615-5711-1"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/TAC.2010.2095612"},{"journal-title":"The Theory of Database Concurrency Control","year":"1986","author":"papadimitriou","key":"25"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1137\/0325013"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048073"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111067"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375591"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1787234.1787255"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ICESS.2009.12"},{"year":"0","key":"1"},{"key":"30","article-title":"Gadara: Dynamic deadlock avoidance for multithreaded programs","author":"wang","year":"2008","journal-title":"OSDI"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-5695-3"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1755888.1755898"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2009.5399950"},{"key":"5","article-title":"Kivati: Fast detection and prevention of atomicity violations","author":"chew","year":"2010","journal-title":"Eurosys"},{"key":"31","article-title":"The theory of deadlock avoidance via discrete control","author":"wang","year":"2009","journal-title":"Proc Symp Principles of Programming Languages"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-68612-7"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/945465.945468"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453122"}],"event":{"name":"2012 IEEE 51st Annual Conference on Decision and Control (CDC)","start":{"date-parts":[[2012,12,10]]},"location":"Maui, HI, USA","end":{"date-parts":[[2012,12,13]]}},"container-title":["2012 IEEE 51st IEEE Conference on Decision and Control (CDC)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6416474\/6425800\/06426112.pdf?arnumber=6426112","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,5]],"date-time":"2024-05-05T19:08:50Z","timestamp":1714936130000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6426112\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/cdc.2012.6426112","relation":{},"subject":[],"published":{"date-parts":[[2012,12]]}}}