{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T08:00:47Z","timestamp":1725523247412},"reference-count":24,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,8]]},"DOI":"10.1109\/chinacom.2012.6417441","type":"proceedings-article","created":{"date-parts":[[2013,1,30]],"date-time":"2013-01-30T22:52:09Z","timestamp":1359586329000},"page":"18-23","source":"Crossref","is-referenced-by-count":0,"title":["Parallelizing sequential network applications with customized lock-free data structures"],"prefix":"10.1109","author":[{"family":"Junchang Wang","sequence":"first","affiliation":[]},{"family":"Kai Zhang","sequence":"additional","affiliation":[]},{"family":"Bei Hua","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"300","article-title":"A pragmatic implementation of non-blocking linkedlists","author":"harris","year":"2001","journal-title":"Proceedings of the 15th International Symposium on DIStributed Computing"},{"key":"22","first-page":"13","article-title":"Expressing and exploiting concurrency in networked applications in aspen","author":"upadhyaya","year":"2007","journal-title":"Proc 4th ACM SIGPLAN Symp Principles and Practice of Parallel Programming"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/224964.224988"},{"key":"23","first-page":"297","article-title":"MIDeA: A multiparallel intrusion detection architecture","author":"vasiliadis","year":"2011","journal-title":"Proceedings of the 18th ACM Conference on Computer and Communications Security"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1011767.1011773"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ICPADS.2011.37"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/564879.564881"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1542275.1542307"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/996893.996848"},{"key":"14","article-title":"ABA prevention using single-word instructions","author":"michael","year":"2004","journal-title":"Technical Report RC 230089 IBM T J Watson Research Center"},{"year":"0","key":"11"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/571825.571829"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1145\/78969.78972"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1233307.1233309"},{"journal-title":"Concurrent Building Blocks","article-title":"Defcon 9 capture the flag data","year":"2001","key":"20"},{"key":"2","article-title":"Malloc() performance in a multithreaded linux environment","author":"borheham","year":"2000","journal-title":"USENIX 2000 Annual Technical Conference FREENIX Track"},{"key":"1","article-title":"Fastforward: A cache-optimized concurrent lock-free queue","author":"giacomoni","year":"2008","journal-title":"PPoPP '08"},{"journal-title":"Lock-free Interprocess Communication","year":"2006","author":"dokumentov","key":"10"},{"key":"7","article-title":"A comprehensive strategy for contention management in software transactional memory","author":"spear","year":"2009","journal-title":"14th ACM Symp on Principles and Practice of Parallel Programming (PPoPP 2009)"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506431"},{"journal-title":"Application-Level Abstractions for Lock-Free Data Sharing","year":"2007","author":"clare","key":"5"},{"key":"4","article-title":"DARPA intrusion detection system evaluation: Design and procedures","author":"haines","year":"1999","journal-title":"Technical Report 1062 MIT Lincoln Laboratory"},{"key":"9","article-title":"Atomic quake: Using transactional memory in an interactive multiplayer game server","author":"zyulkyarov","year":"2009","journal-title":"Proc of ACM PPoPP'09"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1583991.1584012"}],"event":{"name":"2012 7th International ICST Conference on Communications and Networking in China (CHINACOM 2012)","start":{"date-parts":[[2012,8,8]]},"location":"Kun Ming","end":{"date-parts":[[2012,8,10]]}},"container-title":["7th International Conference on Communications and Networking in China"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6410218\/6417432\/06417441.pdf?arnumber=6417441","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,21]],"date-time":"2017-03-21T20:19:27Z","timestamp":1490127567000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6417441\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,8]]},"references-count":24,"URL":"https:\/\/doi.org\/10.1109\/chinacom.2012.6417441","relation":{},"subject":[],"published":{"date-parts":[[2012,8]]}}}