{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:29:39Z","timestamp":1750307379119,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":19,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,5,1]],"date-time":"2010-05-01T00:00:00Z","timestamp":1272672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1145\/1808954.1808964","type":"proceedings-article","created":{"date-parts":[[2010,6,1]],"date-time":"2010-06-01T12:21:35Z","timestamp":1275394895000},"page":"40-47","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Concurrency design patterns, software quality attributes and their tactics"],"prefix":"10.1145","author":[{"given":"Jiang","family":"Zheng","sequence":"first","affiliation":[{"name":"Industrial Software Systems, ABB Corporate Research, Raleigh, NC"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"K. Eric","family":"Harper","sequence":"additional","affiliation":[{"name":"Industrial Software Systems, ABB Corporate Research, Raleigh, NC"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2010,5]]},"reference":[{"unstructured":"Bacon et al. 2001. \"The 'Double-Checked Locking is Broken' Declaration\" http:\/\/www.cs.umd.edu\/~pugh\/java\/memoryModel\/DoubleCheckedLocking.html.  Bacon et al. 2001. \"The 'Double-Checked Locking is Broken' Declaration\" http:\/\/www.cs.umd.edu\/~pugh\/java\/memoryModel\/DoubleCheckedLocking.html.","key":"e_1_3_2_1_1_1"},{"unstructured":"Bass L. Clements P. and Kazman R. 2007. Software Architecture in Practice. Second Edition Addison-Wesley New York (November 2007).   Bass L. Clements P. and Kazman R. 2007. Software Architecture in Practice. Second Edition Addison-Wesley New York (November 2007).","key":"e_1_3_2_1_2_1"},{"unstructured":"Gamma E. Helm R. Johnson R. and Vlissides J. 1995. Design Patterns. Addison-Wesley (1995).  Gamma E. Helm R. Johnson R. and Vlissides J. 1995. Design Patterns. Addison-Wesley (1995).","key":"e_1_3_2_1_3_1"},{"unstructured":"Grand M. 2002. Patterns in Java Volume 1: A Catalog of Reusable Design Patterns Illustrated with UML. Second Edition John Wiley &amp; Sons (2002).   Grand M. 2002. Patterns in Java Volume 1: A Catalog of Reusable Design Patterns Illustrated with UML. Second Edition John Wiley &amp; Sons (2002).","key":"e_1_3_2_1_4_1"},{"unstructured":"Grand M. 2002. Patterns in Java Volume 3: Java Enterprise Design Patterns. Second Edition John Wiley &amp; Sons (2002).  Grand M. 2002. Patterns in Java Volume 3: Java Enterprise Design Patterns. Second Edition John Wiley &amp; Sons (2002).","key":"e_1_3_2_1_5_1"},{"volume-title":"Proceedings of the Second Pattern Languages of Programs conference","year":"1995","author":"Lavender G.","key":"e_1_3_2_1_6_1"},{"unstructured":"Lea D. 1999. Concurrent Programming in Java: Design Principles and Patterns. Second Edition Addison-Wesley (November 1999).   Lea D. 1999. Concurrent Programming in Java: Design Principles and Patterns. Second Edition Addison-Wesley (November 1999).","key":"e_1_3_2_1_7_1"},{"unstructured":"Mahemoff M. 2006. Ajax Design Patterns: Creating Web 2.0 Sites with Programming and Usability Patterns. O'Reilly. (June 2006).   Mahemoff M. 2006. Ajax Design Patterns: Creating Web 2.0 Sites with Programming and Usability Patterns. O'Reilly. (June 2006).","key":"e_1_3_2_1_8_1"},{"unstructured":"MSDN. Multi-threaded Programming with the Event-based Asynchronous Pattern. http:\/\/msdn.microsoft.com\/en-us\/library\/hkasytyf.aspx  MSDN. Multi-threaded Programming with the Event-based Asynchronous Pattern. http:\/\/msdn.microsoft.com\/en-us\/library\/hkasytyf.aspx","key":"e_1_3_2_1_9_1"},{"unstructured":"MSDN. PictureBox Class. http:\/\/msdn.microsoft.com\/en-us\/library\/system.windows.forms.picturebox.aspx  MSDN. PictureBox Class. http:\/\/msdn.microsoft.com\/en-us\/library\/system.windows.forms.picturebox.aspx","key":"e_1_3_2_1_10_1"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_11_1","DOI":"10.1145\/269629.269648"},{"volume-title":"Reactor: An Object Behavioral Pattern for Concurrent Event Demultiplexing and Event Handler Dispatching. In Pattern Languages of Program Design","year":"1995","author":"Schmidt D. C.","key":"e_1_3_2_1_12_1"},{"key":"e_1_3_2_1_13_1","first-page":"9","article-title":"Strategized Locking, Thread-safe Decorator, and Scoped Locking: Patterns and Idioms for Simplifying Multi-threaded C++ Components. C++ Report","volume":"11","author":"Schmidt D. C.","year":"1999","journal-title":"SIGS."},{"volume-title":"SIGS, (October","year":"2000","author":"Schmidt D. C.","key":"e_1_3_2_1_14_1"},{"volume-title":"Proceedings of the Second Pattern Languages of Programs Conference.","year":"1995","author":"Schmidt D. C.","key":"e_1_3_2_1_15_1"},{"volume-title":"Proceedings of the Third Annual Pattern Languages of Programming Conference","year":"1996","author":"Schmidt D. C.","key":"e_1_3_2_1_16_1"},{"volume-title":"Proceedings of the Fourth Annual Pattern Languages of Programming Conference","year":"1997","author":"Schmidt D. C.","key":"e_1_3_2_1_17_1"},{"volume-title":"Proceedings of the 7th Pattern Languages of Programs Conference","year":"2000","author":"Schmidt D. C.","key":"e_1_3_2_1_18_1"},{"volume-title":"Intel: Programmers Face Multi-Core Challenge. (April 2008) http:\/\/www.pcadvisor.co.uk\/news\/index.cfm?newsid=12594","year":"2008","author":"Shah A.","key":"e_1_3_2_1_19_1"}],"event":{"sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"acronym":"ICSE '10","name":"ICSE '10: 32nd International Conference on Software Engineering","location":"Cape Town South Africa"},"container-title":["Proceedings of the 3rd International Workshop on Multicore Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1808954.1808964","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1808954.1808964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:23:13Z","timestamp":1750245793000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1808954.1808964"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":19,"alternative-id":["10.1145\/1808954.1808964","10.1145\/1808954"],"URL":"https:\/\/doi.org\/10.1145\/1808954.1808964","relation":{},"subject":[],"published":{"date-parts":[[2010,5]]},"assertion":[{"value":"2010-05-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}