{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:56Z","timestamp":1772163956108,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":32,"publisher":"ACM","license":[{"start":{"date-parts":[[2009,6,15]],"date-time":"2009-06-15T00:00:00Z","timestamp":1245024000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2009,6,15]]},"DOI":"10.1145\/1542476.1542488","type":"proceedings-article","created":{"date-parts":[[2009,6,16]],"date-time":"2009-06-16T09:34:36Z","timestamp":1245144876000},"page":"98-109","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Lightweight annotations for controlling sharing in concurrent data structures"],"prefix":"10.1145","author":[{"given":"Zachary R.","family":"Anderson","sequence":"first","affiliation":[{"name":"University of California, Berkeley, Berkeley, CA, USA"}]},{"given":"David","family":"Gay","sequence":"additional","affiliation":[{"name":"Intel Research, Berkeley, Berkeley, CA, USA"}]},{"given":"Mayur","family":"Naik","sequence":"additional","affiliation":[{"name":"Intel Research, Berkeley, Berkeley, CA, USA"}]}],"member":"320","published-online":{"date-parts":[[2009,6,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375600"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1038\/324446a0"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582440"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/604131.604156"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781168"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512560"},{"key":"e_1_3_2_1_9_1","volume-title":"ESOP'07","author":"Condit J.","unstructured":"Condit , J. , Harren , M. , Anderson , Z. , Gay , D. , and Necula , G . Dependent types for low-level programming . In ESOP'07 . Condit, J., Harren, M., Anderson, Z., Gay, D., and Necula, G. Dependent types for low-level programming. In ESOP'07."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/292540.292564"},{"key":"e_1_3_2_1_11_1","unstructured":"developers.sun.com. LockLint -- static data race and deadlock detection tool for C. http:\/\/developers.sun.com\/solaris\/articles\/locklint.html.  developers.sun.com. LockLint -- static data race and deadlock detection tool for C. http:\/\/developers.sun.com\/solaris\/articles\/locklint.html."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250762"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945468"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964023"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040294.1040299"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/378795.378815"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2005.03.002"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/604174.604177"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/169627.169724"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111068"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190265"},{"key":"e_1_3_2_1_22_1","first-page":"213","volume-title":"CC'04","author":"Necula G. C.","unstructured":"Necula , G. C. , McPeak , S. , and Weimer , W . CIL: Intermediate language and tools for the analysis of C programs . In CC'04 , pp. 213 -- 228 . http:\/\/cil.sourceforge.net\/. Necula, G. C., McPeak, S., and Weimer, W. CIL: Intermediate language and tools for the analysis of C programs. In CC'04, pp. 213--228. http:\/\/cil.sourceforge.net\/."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134019"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1138912.1138924"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065944.1065956"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266641"},{"key":"e_1_3_2_1_27_1","volume-title":"Pattern Languages of Program Design 3","author":"Schmidt D.","year":"2013","unstructured":"Schmidt , D. , and Harrison , T . Double-Checked Locking . In Chapter 20 of Pattern Languages of Program Design 3 , Addison-Wesley , ISBN 0 2013 10112. Schmidt, D., and Harrison, T. Double-Checked Locking. In Chapter 20 of Pattern Languages of Program Design 3, Addison-Wesley, ISBN 0201310112."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375583"},{"key":"e_1_3_2_1_29_1","unstructured":"Tofte M. and Talpin J.-P. Region-based memory management.  Tofte M. and Talpin J.-P. Region-based memory management."},{"key":"e_1_3_2_1_30_1","unstructured":"In Information and Computation (1977) vol. 132 pp. 109--176.  In Information and Computation (1977) vol. 132 pp. 109--176."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945471"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287654"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/223982.223990"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095832"}],"event":{"name":"PLDI '09: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Dublin Ireland","acronym":"PLDI '09","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 30th ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1542476.1542488","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1542476.1542488","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:29:56Z","timestamp":1750238996000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1542476.1542488"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,6,15]]},"references-count":32,"alternative-id":["10.1145\/1542476.1542488","10.1145\/1542476"],"URL":"https:\/\/doi.org\/10.1145\/1542476.1542488","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1543135.1542488","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2009,6,15]]},"assertion":[{"value":"2009-06-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}