{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:12:08Z","timestamp":1774627928361,"version":"3.50.1"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/dsn.2010.5544315","type":"proceedings-article","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T16:44:07Z","timestamp":1281458647000},"page":"221-230","source":"Crossref","is-referenced-by-count":49,"title":["A study of the internal and external effects of concurrency bugs"],"prefix":"10.1109","author":[{"given":"P","family":"Fonseca","sequence":"first","affiliation":[]},{"family":"Cheng Li","sequence":"additional","affiliation":[]},{"given":"V","family":"Singhal","sequence":"additional","affiliation":[]},{"given":"R","family":"Rodrigues","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1148493.1148516"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294268"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1992.243586"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/2.386988"},{"key":"ref10","article-title":"Practical byzantine fault tolerance","author":"castro","year":"1999","journal-title":"Proc Operating System Design and Implementation (OSDI)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSN.2000.857521"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502042"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945468"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2003.1213511"},{"key":"ref15","article-title":"Why do computers stop and what can be done about it?","author":"gray","year":"1986","journal-title":"Proc Symp Reliability Distributed Software Database Syst"},{"key":"ref16","article-title":"Characterization of linux kernel behavior under errors","author":"gu","year":"2003","journal-title":"Proc of International Conference on Dependable Systems and Networks"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"289","DOI":"10.1145\/173682.165164","article-title":"Transactional memory: Architectural support for lock-free data structures","volume":"21","author":"herlihy","year":"1993","journal-title":"SIGArch Computer Architecture News"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1028664.1028717"},{"key":"ref19","article-title":"Deadlock immunity: Enabling systems to defend against deadlocks","author":"jula","year":"2008","journal-title":"Proc Operating System Design and Implementation (OSDI)"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095833"},{"key":"ref4","year":"0","journal-title":"MySQL Market Share"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508249"},{"key":"ref3","year":"0","journal-title":"Intel Previews Intel Xeon &#x2018;Nehalem-EX&#x2019; Processor"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1147403.1147410"},{"key":"ref29","article-title":"An empirical study of reported bugs in server software with implications for automated bug diagnosis","author":"sahoo","year":"2009","journal-title":"Tech Report 2142\/13697"},{"key":"ref5","year":"0","journal-title":"MySQL The world's most popular open source database"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317470"},{"key":"ref7","article-title":"Parallel programming must be deterministic by default","author":"bocchino","year":"2009","journal-title":"Proc of Workshop on Hot Topics in Parallelism (HotPar)"},{"key":"ref2","year":"0","journal-title":"GeForce GTX 295"},{"key":"ref9","article-title":"Microreboot - A technique for cheap recovery","author":"candea","year":"2004","journal-title":"Proc Operating System Design and Implementation (OSDI)"},{"key":"ref1","year":"0","journal-title":"Azul Systems - Industry's Leading Azul Compute Appliances"},{"key":"ref20","article-title":"Eliminating concurrency bugs with control engineering","volume":"99","author":"kelly","year":"2009","journal-title":"IEEE Computer"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1353534.1346323"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181314"},{"key":"ref24","article-title":"Predicting vulnerable software components","author":"neuhaus","year":"2007","journal-title":"Proc of Conference on Computer and Communications Security (CCS)"},{"key":"ref23","article-title":"Finding and reproducing heisenbugs in concurrent programs","author":"musuvathi","year":"2008","journal-title":"Proc Operating System Design and Implementation (OSDI)"},{"key":"ref26","article-title":"Understanding MySQL internals","author":"pachev","year":"2007"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.49"}],"event":{"name":"Networks (DSN)","location":"Chicago, IL","start":{"date-parts":[[2010,6,28]]},"end":{"date-parts":[[2010,7,1]]}},"container-title":["2010 IEEE\/IFIP International Conference on Dependable Systems &amp; Networks (DSN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5532324\/5544245\/05544315.pdf?arnumber=5544315","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T08:24:19Z","timestamp":1497860659000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5544315\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/dsn.2010.5544315","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}