{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T14:51:04Z","timestamp":1773499864684,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,10,14]],"date-time":"2007-10-14T00:00:00Z","timestamp":1192320000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,10,14]]},"DOI":"10.1145\/1294261.1294276","type":"proceedings-article","created":{"date-parts":[[2007,10,19]],"date-time":"2007-10-19T12:15:18Z","timestamp":1192796118000},"page":"145-158","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":167,"title":["\/*icomment"],"prefix":"10.1145","author":[{"given":"Lin","family":"Tan","sequence":"first","affiliation":[{"name":"University of Illinois: Urbana-Champaign, Urbana, IL"}]},{"given":"Ding","family":"Yuan","sequence":"additional","affiliation":[{"name":"University of Illinois: Urbana-Champaign, Urbana, IL"}]},{"given":"Gopal","family":"Krishna","sequence":"additional","affiliation":[{"name":"University of Illinois: Urbana-Champaign, Urbana, IL"}]},{"given":"Yuanyuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of Illinois: Urbana-Champaign, Urbana, IL"}]}],"member":"320","published-online":{"date-parts":[[2007,10,14]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"C# XML comments let you build documentation directly from your Visual Studio .NET source files. http:\/\/msdn.microsoft.com\/msdnmag\/issues\/02\/06\/XMLC\/.  C# XML comments let you build documentation directly from your Visual Studio .NET source files. http:\/\/msdn.microsoft.com\/msdnmag\/issues\/02\/06\/XMLC\/."},{"key":"e_1_3_2_2_2_1","unstructured":"CoNLL-2000 shared task web page -- with data software and systems' outputs availble. http:\/\/www.cnts.ua.ac.be\/conll\/.  CoNLL-2000 shared task web page -- with data software and systems' outputs availble. http:\/\/www.cnts.ua.ac.be\/conll\/."},{"key":"e_1_3_2_2_3_1","unstructured":"Doxygen -- source code documentation generator tool. http:\/\/www.stack.nl\/ dimitri\/doxygen\/.  Doxygen -- source code documentation generator tool. http:\/\/www.stack.nl\/ dimitri\/doxygen\/."},{"key":"e_1_3_2_2_4_1","unstructured":"FreeBSD problem report database. http:\/\/www.freebsd.org\/support\/bugreports.html.  FreeBSD problem report database. http:\/\/www.freebsd.org\/support\/bugreports.html."},{"key":"e_1_3_2_2_5_1","unstructured":"Java annotations. http:\/\/java.sun.com\/j2se\/1.5.0\/docs\/guide\/language\/annotations.html.  Java annotations. http:\/\/java.sun.com\/j2se\/1.5.0\/docs\/guide\/language\/annotations.html."},{"key":"e_1_3_2_2_6_1","unstructured":"Javadoc tool. http:\/\/java.sun.com\/j2se\/javadoc\/.  Javadoc tool. http:\/\/java.sun.com\/j2se\/javadoc\/."},{"key":"e_1_3_2_2_7_1","unstructured":"Lock_Lint -- Static data race and deadlock detection tool for C. http:\/\/developers.sun.com\/sunstudio\/articles\/locklint.html.  Lock_Lint -- Static data race and deadlock detection tool for C. http:\/\/developers.sun.com\/sunstudio\/articles\/locklint.html."},{"key":"e_1_3_2_2_8_1","unstructured":"MSDN run-time library reference -- SAL annotations. http:\/\/msdn2.microsoft.com\/en--us\/library\/ms235402.aspx.  MSDN run-time library reference -- SAL annotations. http:\/\/msdn2.microsoft.com\/en--us\/library\/ms235402.aspx."},{"key":"e_1_3_2_2_9_1","unstructured":"NLP tools. http:\/\/l2r.cs.uiuc.edu\/~cogcomp\/tools.php.  NLP tools. http:\/\/l2r.cs.uiuc.edu\/~cogcomp\/tools.php."},{"key":"e_1_3_2_2_10_1","unstructured":"RDoc -- documentation from Ruby source files. http:\/\/rdoc.sourceforge.net\/.  RDoc -- documentation from Ruby source files. http:\/\/rdoc.sourceforge.net\/."},{"key":"e_1_3_2_2_11_1","unstructured":"Sparse -- A semantic parser for C. http:\/\/www.kernel.org\/pub\/software\/devel\/sparse\/.  Sparse -- A semantic parser for C. http:\/\/www.kernel.org\/pub\/software\/devel\/sparse\/."},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945454"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/158511.158639"},{"key":"e_1_3_2_2_14_1","unstructured":"D. L. Detlefs K. R. M. Leino G. Nelson and J. B. Saxe. Extended static checking SRC research report 159. ftp:\/\/gatekeeper.research.compaq.com\/pub\/DEC\/SRC\/researchreports\/SRC-159.ps.  D. L. Detlefs K. R. M. Leino G. Nelson and J. B. Saxe. Extended static checking SRC research report 159. ftp:\/\/gatekeeper.research.compaq.com\/pub\/DEC\/SRC\/researchreports\/SRC-159.ps."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945468"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502041"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/337180.337240"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.976940"},{"key":"e_1_3_2_2_19_1","volume-title":"Proceedings of the Conference on Empirical Methods for Natural Language Processing","author":"Even-Zohar Y.","year":"2001","unstructured":"Y. Even-Zohar and D. Roth . A sequential model for multi class classification . In Proceedings of the Conference on Empirical Methods for Natural Language Processing , 2001 . Y. Even-Zohar and D. Roth. A sequential model for multi class classification. In Proceedings of the Conference on Empirical Methods for Natural Language Processing, 2001."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512539"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.44365"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138030"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1247360.1247361"},{"key":"e_1_3_2_2_24_1","volume-title":"Proceedings of the 7th USENIX Symposium on Operating System Design and Implementation","author":"Kremenek T.","year":"2006","unstructured":"T. Kremenek , P. Twohey , G. Back , A. Y. Ng , and D. R. Engler . From uncertainty to belief: Inferring the specification within . In Proceedings of the 7th USENIX Symposium on Operating System Design and Implementation , 2006 . T. Kremenek, P. Twohey, G. Back, A. Y. Ng, and D. R. Engler. From uncertainty to belief: Inferring the specification within. In Proceedings of the 7th USENIX Symposium on Operating System Design and Implementation, 2006."},{"key":"e_1_3_2_2_25_1","volume-title":"USENIX Annual Technical Conference","author":"Li T.","year":"2005","unstructured":"T. Li , C. Ellis , A. Lebeck , and D. Sorin . On-demand and semantic-free dynamic deadlock detection with speculative execution . In USENIX Annual Technical Conference , 2005 . T. Li, C. Ellis, A. Lebeck, and D. Sorin. On-demand and semantic-free dynamic deadlock detection with speculative execution. In USENIX Annual Technical Conference, 2005."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081755"},{"key":"e_1_3_2_2_27_1","volume-title":"Foundations Of Statistical Natural Language Processing","author":"Manning C. D.","year":"2001","unstructured":"C. D. Manning and H. Sch\u00fctze . Foundations Of Statistical Natural Language Processing . The MIT Press , 2001 . C. D. Manning and H. Sch\u00fctze. Foundations Of Statistical Natural Language Processing. The MIT Press, 2001."},{"key":"e_1_3_2_2_28_1","volume-title":"Machine Learning","author":"Mitchell T.","year":"1997","unstructured":"T. Mitchell . Machine Learning . McGraw Hill , 1997 . T. Mitchell. Machine Learning. McGraw Hill, 1997."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060297"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/363516.363526"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168630"},{"key":"e_1_3_2_2_32_1","volume-title":"Proceedings of the Conference on Advances in Neural Information Processing Systems","author":"Punyakanok V.","year":"2001","unstructured":"V. Punyakanok and D. Roth . The use of classifiers in sequential inference . In Proceedings of the Conference on Advances in Neural Information Processing Systems , 2001 . V. Punyakanok and D. Roth. The use of classifiers in sequential inference. In Proceedings of the Conference on Advances in Neural Information Processing Systems, 2001."},{"key":"e_1_3_2_2_33_1","volume-title":"Proceedings of the International Joint Conference on Artificial Intelligence","author":"Punyakanok V.","year":"2005","unstructured":"V. Punyakanok , D. Roth , and W. Yih . The necessity of syntactic parsing for semantic role labeling . In Proceedings of the International Joint Conference on Artificial Intelligence , 2005 . V. Punyakanok, D. Roth, and W. Yih. The necessity of syntactic parsing for semantic role labeling. In Proceedings of the International Joint Conference on Artificial Intelligence, 2005."},{"key":"e_1_3_2_2_34_1","volume-title":"Morgan Kaufmann","author":"Quilan R. J.","year":"1993","unstructured":"R. J. Quilan . C4.5 : Programs for Machine Learning . Morgan Kaufmann , 1993 . R. J. Quilan. C4.5: Programs for Machine Learning. Morgan Kaufmann, 1993."},{"key":"e_1_3_2_2_35_1","volume-title":"Proceedings of the Conference on Empirical Methods in Natural Language Processing","author":"Ratnaparkhi A.","year":"1996","unstructured":"A. Ratnaparkhi . A maximum entropy model for part-of-speech tagging . In Proceedings of the Conference on Empirical Methods in Natural Language Processing , 1996 . A. Ratnaparkhi. A maximum entropy model for part-of-speech tagging. In Proceedings of the Conference on Empirical Methods in Natural Language Processing, 1996."},{"key":"e_1_3_2_2_36_1","unstructured":"K. Rustan M. Leino G. Nelson and J. B. Saxe. ESC\/Java user's manual SRC technical note 2000-002. http:\/\/gatekeeper.dec.com\/pub\/DEC\/SRC\/technicalnotes\/abstracts\/src-tn-2000-002.html.  K. Rustan M. Leino G. Nelson and J. B. Saxe. ESC\/Java user's manual SRC technical note 2000-002. http:\/\/gatekeeper.dec.com\/pub\/DEC\/SRC\/technicalnotes\/abstracts\/src-tn-2000-002.html."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/237721.237727"},{"key":"e_1_3_2_2_39_1","first-page":"97","volume-title":"USENIX Winter Technical Conference","author":"Sterling N.","year":"1993","unstructured":"N. Sterling . WARLOCK -- A static data race analysis tool . In USENIX Winter Technical Conference , pages 97 -- 106 , 1993 . N. Sterling. WARLOCK -- A static data race analysis tool. In USENIX Winter Technical Conference, pages 97--106, 1993."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1162\/089120102762671936"},{"key":"e_1_3_2_2_41_1","volume-title":"Data Mining: Practical machine learning tools and techniques","author":"Witten I. H.","year":"2005","unstructured":"I. H. Witten and E. Frank . Data Mining: Practical machine learning tools and techniques ( 2 nd Ed.). Morgan Kaufmann , 2005 . I. H. Witten and E. Frank. Data Mining: Practical machine learning tools and techniques (2nd Ed.). Morgan Kaufmann, 2005.","edition":"2"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/800078.802534"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/829515.830562"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083142.1083152"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014150"},{"key":"e_1_3_2_2_46_1","volume-title":"Proceedings of the 7th Symposium on Operating System Design and Implementation","author":"Zhou F.","year":"2006","unstructured":"F. Zhou , J. Condit , Z. Anderson , I. Bagrak , R. Ennals , M. Harren , G. Necula , and E. Brewer . SafeDrive: Safe and recoverable extensions using language-based techniques . In Proceedings of the 7th Symposium on Operating System Design and Implementation , 2006 . F. Zhou, J. Condit, Z. Anderson, I. Bagrak, R. Ennals, M. Harren, G. Necula, and E. Brewer. SafeDrive: Safe and recoverable extensions using language-based techniques. In Proceedings of the 7th Symposium on Operating System Design and Implementation, 2006."}],"event":{"name":"SOSP07: ACM SIGOPS 21st Symposium on Operating Systems Principles 2007","location":"Stevenson Washington USA","acronym":"SOSP07","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","ACM Association for Computing Machinery"]},"container-title":["Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1294261.1294276","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1294261.1294276","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:52:22Z","timestamp":1750243942000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1294261.1294276"}},"subtitle":["bugs or bad comments?*\/"],"short-title":[],"issued":{"date-parts":[[2007,10,14]]},"references-count":46,"alternative-id":["10.1145\/1294261.1294276","10.1145\/1294261"],"URL":"https:\/\/doi.org\/10.1145\/1294261.1294276","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1323293.1294276","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2007,10,14]]},"assertion":[{"value":"2007-10-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}