{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:30:05Z","timestamp":1750307405486,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,4,24]],"date-time":"2010-04-24T00:00:00Z","timestamp":1272067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,4,24]]},"DOI":"10.1145\/1772954.1772970","type":"proceedings-article","created":{"date-parts":[[2010,4,27]],"date-time":"2010-04-27T12:45:48Z","timestamp":1272372348000},"page":"101-110","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":26,"title":["An efficient software transactional memory using commit-time invalidation"],"prefix":"10.1145","author":[{"given":"Justin E.","family":"Gottschlich","sequence":"first","affiliation":[{"name":"University of Colorado at Boulder, Boulder, CO, USA"}]},{"given":"Manish","family":"Vachharajani","sequence":"additional","affiliation":[{"name":"University of Colorado at Boulder, Boulder, CO, USA"}]},{"given":"Jeremy G.","family":"Siek","sequence":"additional","affiliation":[{"name":"University of Colorado at Boulder, Boulder, CO, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,4,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/362686.362692"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454456.1454466"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1693453.1693464"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11864219_14"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2007.38"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1233307.1233309"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/319702.319704"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1512762.1512768"},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the Workshop on Exploiting Parallelism with Transactional Memory and other Hardware Assisted Methods","author":"Gottschlich J. E.","year":"2008","unstructured":"J. E. Gottschlich and D. A. Connors . Extending contention managers for user-defined priority-based transactions . In Proceedings of the Workshop on Exploiting Parallelism with Transactional Memory and other Hardware Assisted Methods , 2008 . J. E. Gottschlich and D. A. Connors. Extending contention managers for user-defined priority-based transactions. In Proceedings of the Workshop on Exploiting Parallelism with Transactional Memory and other Hardware Assisted Methods, 2008."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073814.1073863"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1345206.1345233"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/949305.949340"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/872035.872048"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/165123.165164"},{"key":"e_1_3_2_1_16_1","volume-title":"The Art of Multiprocessor Programming","author":"Herlihy M.","year":"2008","unstructured":"M. Herlihy and N. Shavit . The Art of Multiprocessor Programming . Elsevier, Inc. , 2008 . M. Herlihy and N. Shavit. The Art of Multiprocessor Programming. Elsevier, Inc., 2008."},{"key":"e_1_3_2_1_17_1","author":"Larus J. R.","year":"2006","unstructured":"J. R. Larus and R. Rajwar . Transactional Memory.Morgan & Claypool , 2006 . J. R. Larus and R. Rajwar. Transactional Memory.Morgan & Claypool, 2006.","journal-title":"Transactional Memory.Morgan & Claypool"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1345206.1345240"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2006.1598134"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1299042.1299063"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","DOI":"10.21236\/ADA611686","volume-title":"A trace-driven analysis of the UNIX 4.2BSD file system. Technical report","author":"Ousterhout J. K.","year":"1985","unstructured":"J. K. Ousterhout , H. Da Costa , D. Harrison , J. A. Kunze , M. Kupfer , and J. G. Thompson . A trace-driven analysis of the UNIX 4.2BSD file system. Technical report , Berkeley, CA , 1985 . J. K. Ousterhout, H. Da Costa, D. Harrison, J. A. Kunze, M. Kupfer, and J. G. Thompson. A trace-driven analysis of the UNIX 4.2BSD file system. Technical report, Berkeley, CA, 1985."},{"key":"e_1_3_2_1_22_1","volume-title":"Serializability of concurrent data base updates. Technical report","author":"Papadimitriou C. H.","year":"1979","unstructured":"C. H. Papadimitriou . Serializability of concurrent data base updates. Technical report , Cambridge, MA ., 1979 . C. H. Papadimitriou. Serializability of concurrent data base updates. Technical report, Cambridge, MA., 1979."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1521747.1521799"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1504176.1504201"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1122971.1123001"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1073814.1073861"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the Workshop on Transactional Computing","author":"Scott M. L.","year":"2006","unstructured":"M. L. Scott . Sequential specification of transactional memory semantics . In Proceedings of the Workshop on Transactional Computing , 2006 . M. L. Scott. Sequential specification of transactional memory semantics. In Proceedings of the Workshop on Transactional Computing, 2006."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/224964.224987"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1504176.1504199"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/11864219_13"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1378533.1378583"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/319151.319158"}],"event":{"name":"CGO '10: 8th Annual IEEE\/ ACM International Symposium on Code Generation and Optimization","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGMICRO ACM Special Interest Group on Microarchitectural Research and Processing","IEEE CS uArch"],"location":"Toronto Ontario Canada","acronym":"CGO '10"},"container-title":["Proceedings of the 8th annual IEEE\/ACM international symposium on Code generation and optimization"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1772954.1772970","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1772954.1772970","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:27Z","timestamp":1750246767000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1772954.1772970"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,4,24]]},"references-count":31,"alternative-id":["10.1145\/1772954.1772970","10.1145\/1772954"],"URL":"https:\/\/doi.org\/10.1145\/1772954.1772970","relation":{},"subject":[],"published":{"date-parts":[[2010,4,24]]},"assertion":[{"value":"2010-04-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}