{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:29:38Z","timestamp":1750307378931,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":25,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,5,1]],"date-time":"2010-05-01T00:00:00Z","timestamp":1272672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["9.08E+15"],"award-info":[{"award-number":["9.08E+15"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100002855","name":"Ministry of Science and Technology of the People's Republic of China","doi-asserted-by":"publisher","award":["2009AA01Z1482007AA010302"],"award-info":[{"award-number":["2009AA01Z1482007AA010302"]}],"id":[{"id":"10.13039\/501100002855","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1145\/1808954.1808963","type":"proceedings-article","created":{"date-parts":[[2010,6,1]],"date-time":"2010-06-01T12:21:35Z","timestamp":1275394895000},"page":"32-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Enabling multi-core based monitoring and fault tolerance in C++\/Java"],"prefix":"10.1145","author":[{"given":"Lu","family":"Yang","sequence":"first","affiliation":[{"name":"Nanjing University, Nanjing, Jiangsu, P.R. China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Liqian","family":"Yu","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, Jiangsu, P.R. China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianwen","family":"Tang","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, Jiangsu, P.R. China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Linzhang","family":"Wang","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, Jiangsu, P.R. China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jianhua","family":"Zhao","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, Jiangsu, P.R. China"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xuandong","family":"Li","sequence":"additional","affiliation":[{"name":"Nanjing University, Nanjing, Jiangsu, P.R. China"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2010,5]]},"reference":[{"volume-title":"Wiley","year":"1995","author":"Lyu M. R.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/280277.280278"},{"volume-title":"Morgan Kaufmann","year":"2002","author":"Dongarra J.","key":"e_1_3_2_1_3_1"},{"volume-title":"MIT Press","year":"1994","author":"Gropp W.","key":"e_1_3_2_1_4_1"},{"volume-title":"MIT Press","year":"1994","author":"Koebel C. H.","key":"e_1_3_2_1_5_1"},{"volume-title":"Addison-Wesley","year":"1997","author":"Butenhof D. R.","key":"e_1_3_2_1_6_1"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/99.660313"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"K. A. Yelick etal Titanium: A high-performance Java dialect. Concurrency - Practice and Experience 10(11--13):825--836 1998.  K. A. Yelick et al. Titanium: A high-performance Java dialect. Concurrency - Practice and Experience 10(11--13):825--836 1998.","DOI":"10.1002\/(SICI)1096-9128(199809\/11)10:11\/13<825::AID-CPE383>3.0.CO;2-H"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/289918.289920"},{"volume-title":"George Washington University","year":"2003","author":"El-Ghazawi T.","key":"e_1_3_2_1_10_1"},{"volume-title":"IBM Research","year":"2006","author":"Saraswat V.","key":"e_1_3_2_1_11_1"},{"volume-title":"Inc.","year":"2007","author":"Allen E.","key":"e_1_3_2_1_12_1"},{"volume-title":"Cray Inc.","year":"2008","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31980-1_36"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297069"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"M. Kim S. Kannan I. Lee O. Sokolsky and M. Viswanathan. Java-MaC: a run-time assurance tool for Java programs. Electronic Notes in Theoretical Computer Science 55(2) 2001.  M. Kim S. Kannan I. Lee O. Sokolsky and M. Viswanathan. Java-MaC: a run-time assurance tool for Java programs. Electronic Notes in Theoretical Computer Science 55(2) 2001.","DOI":"10.1016\/S1571-0661(04)00254-3"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:FORM.0000017721.39909.4b"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083249"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","unstructured":"K. Havelund and G. Rosu. Monitoring Java programs with Java PathExplorer. Electronic Notes in Theoretical Computer Science 55(2) 2001.  K. Havelund and G. Rosu. Monitoring Java programs with Java PathExplorer. Electronic Notes in Theoretical Computer Science 55(2) 2001.","DOI":"10.1016\/S1571-0661(05)00258-6"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"H.\n       \n      Barringer A.\n       \n      Goldberg K.\n       \n      Havelund and \n      \n      \n      K.\n       \n      Sen\n      \n  \n  . \n  Rule-based runtime verification. In B. Steffen and G. Levi editors Proceedings of the 5th International Conference on Verification Model Checking and Abstract Interpretation (VMCAI'04) volume \n  2937\n   of \n  Lecture Notes in Computer Science pages \n  44\n  --\n  57 Venice January \n  2004\n  . \n  Springer\n  .  H. Barringer A. Goldberg K. Havelund and K. Sen. Rule-based runtime verification. In B. Steffen and G. Levi editors Proceedings of the 5th International Conference on Verification Model Checking and Abstract Interpretation (VMCAI'04) volume 2937 of Lecture Notes in Computer Science pages 44--57 Venice January 2004. Springer.","DOI":"10.1007\/978-3-540-24622-0_5"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1531793.1531798"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70724"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770532.1770550"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370082.1370094"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCC.2009.44"}],"event":{"name":"ICSE '10: 32nd International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Cape Town South Africa","acronym":"ICSE '10"},"container-title":["Proceedings of the 3rd International Workshop on Multicore Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1808954.1808963","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1808954.1808963","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:23:13Z","timestamp":1750245793000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1808954.1808963"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":25,"alternative-id":["10.1145\/1808954.1808963","10.1145\/1808954"],"URL":"https:\/\/doi.org\/10.1145\/1808954.1808963","relation":{},"subject":[],"published":{"date-parts":[[2010,5]]},"assertion":[{"value":"2010-05-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}