{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:20Z","timestamp":1763468240443},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,2]]},"DOI":"10.1109\/cgo.2015.7054187","type":"proceedings-article","created":{"date-parts":[[2015,3,10]],"date-time":"2015-03-10T21:47:12Z","timestamp":1426024032000},"page":"56-67","source":"Crossref","is-referenced-by-count":11,"title":["On performance debugging of unnecessary lock contentions on multicore processors: A replay-based approach"],"prefix":"10.1109","author":[{"given":"Long","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Xiaofei","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Bingsheng","family":"He","sequence":"additional","affiliation":[]},{"given":"Song","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Jin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Intel Architecture Instruction Set Extensions Programming Reference","year":"2013","key":"ref10"},{"journal-title":"MySql","year":"0","key":"ref11"},{"key":"ref12","article-title":"Bugnet: Continuously recording program execution for deterministic replay debugging","author":"narayanasamy","year":"0","journal-title":"ISCA '05"},{"key":"ref13","article-title":"Automatically classifying benign and harmful data races using replay analysis","author":"narayanasamy","year":"0","journal-title":"PLDI '07"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1254810.1254820"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508256"},{"journal-title":"OpenLDAP","year":"0","key":"ref16"},{"journal-title":"PARSEC","year":"0","key":"ref17"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1772954.1772958"},{"journal-title":"pbzip2","year":"0","key":"ref19"},{"key":"ref28","article-title":"Exploiting hardware transactional memory in main-memory databases","author":"viktor leis","year":"0","journal-title":"ICDE'14"},{"key":"ref4","article-title":"Effective data-race detection for the kernel","author":"erickson","year":"0","journal-title":"OSDI'10"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451130"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2485922.2485942"},{"key":"ref6","article-title":"Call path profiling","author":"hall","year":"0","journal-title":"ICSE'92"},{"key":"ref29","article-title":"Debugging performance impact of unnecessary lock contentions via replay technique","author":"zheng","year":"2014","journal-title":"Technical report Huazhong University of Science and Technology"},{"journal-title":"Topological Graph Theory","year":"1987","author":"gross","key":"ref5"},{"journal-title":"Handbrake","year":"0","key":"ref8"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227198"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985995"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1454115.1454152"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2611462.2611482"},{"journal-title":"The PIN tool","year":"0","key":"ref20"},{"key":"ref22","article-title":"Speculative lock elision: Enabling highly concurrent multithreaded execution","author":"rajwar","year":"0","journal-title":"MIRCO'01"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2014.6835923"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519094"},{"key":"ref23","article-title":"Transactional lock-free execution of lock-based programs","author":"rajwar","year":"0","journal-title":"ASPLOS'02"},{"journal-title":"Transmission","year":"0","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"}],"event":{"name":"2015 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)","start":{"date-parts":[[2015,2,7]]},"location":"San Francisco, CA, USA","end":{"date-parts":[[2015,2,11]]}},"container-title":["2015 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7041249\/7054173\/07054187.pdf?arnumber=7054187","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T02:50:44Z","timestamp":1490323844000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7054187\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,2]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/cgo.2015.7054187","relation":{},"subject":[],"published":{"date-parts":[[2015,2]]}}}