{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:36Z","timestamp":1772163996866,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,10,17]],"date-time":"2010-10-17T00:00:00Z","timestamp":1287273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,10,17]]},"DOI":"10.1145\/1869459.1869473","type":"proceedings-article","created":{"date-parts":[[2010,10,19]],"date-time":"2010-10-19T08:41:35Z","timestamp":1287477695000},"page":"140-159","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Composable specifications for structured shared-memory communication"],"prefix":"10.1145","author":[{"given":"Benjamin P.","family":"Wood","sequence":"first","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Adrian","family":"Sampson","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Luis","family":"Ceze","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]},{"given":"Dan","family":"Grossman","sequence":"additional","affiliation":[{"name":"University of Washington, Seattle, WA, USA"}]}],"member":"320","published-online":{"date-parts":[[2010,10,17]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1119479.1119480"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101944"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375600"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542488"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167488"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/504282.504287"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582440"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/277651.277696"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512560"},{"key":"e_1_3_2_1_10_1","volume-title":"Tool-supported Program Abstraction for Finite-state Verification. In ACM\/IEEE International Conference on Software Engineering","author":"Dwyer M.","year":"2001","unstructured":"}} M. Dwyer , J. Hatcliff , R. Joehanes , S. Laubach , C. Pasareanu , Robby, W. Visser , and H. Zheng . Tool-supported Program Abstraction for Finite-state Verification. In ACM\/IEEE International Conference on Software Engineering , 2001 . }}M. Dwyer, J. Hatcliff, R. Joehanes, S. Laubach, C. Pasareanu, Robby, W. Visser, and H. Zheng. Tool-supported Program Abstraction for Finite-state Verification. In ACM\/IEEE International Conference on Software Engineering, 2001."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1480881.1480885"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945468"},{"key":"e_1_3_2_1_13_1","volume-title":"Object Types Against Races. In International Conference on Concurrency Theory","volume":"1664","author":"Flanagan C.","year":"1999","unstructured":"}} C. Flanagan and M. Abadi . Object Types Against Races. In International Conference on Concurrency Theory , volume 1664 of Lecture Notes in Computer Science. Springer-Verlag , 1999 . }}C. Flanagan and M. Abadi. Object Types Against Races. In International Conference on Concurrency Theory, volume 1664 of Lecture Notes in Computer Science. Springer-Verlag, 1999."},{"key":"e_1_3_2_1_14_1","volume-title":"Types for Safe Locking. In European Symposium on Programming","volume":"1576","author":"Flanagan C.","year":"1999","unstructured":"}} C. Flanagan and M. Abadi . Types for Safe Locking. In European Symposium on Programming , volume 1576 of Lecture Notes in Computer Science. Springer-Verlag , 1999 . }}C. Flanagan and M. Abadi. Types for Safe Locking. In European Symposium on Programming, volume 1576 of Lecture Notes in Computer Science. Springer-Verlag, 1999."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349328"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964023"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542490"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781169"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/604174.604176"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2004.12.006"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375618"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263717"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/604174.604177"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996844"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/197320.197383"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669181"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1706299.1706351"},{"key":"e_1_3_2_1_28_1","volume-title":"Finding and Reproducing Heisenbugs in Concurrent Programs. In USENIX Symposium on Operating Systems Design and Implementation","author":"Musuvathi M.","year":"2008","unstructured":"}} M. Musuvathi , S. Qadeer , T. Ball , G. Basler , P. Nainar , and I. Neamtiu . Finding and Reproducing Heisenbugs in Concurrent Programs. In USENIX Symposium on Operating Systems Design and Implementation , 2008 . }}M. Musuvathi, S. Qadeer, T. Ball, G. Basler, P. Nainar, and I. Neamtiu. Finding and Reproducing Heisenbugs in Concurrent Programs. In USENIX Symposium on Operating Systems Design and Implementation, 2008."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190265"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134018"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/952532.952741"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453121"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134019"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/596980.596982"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/379539.379553"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/582034.582042"},{"key":"e_1_3_2_1_38_1","volume-title":"USENIX Winter Technical Conference","author":"Sterling N.","year":"1993","unstructured":"}} N. Sterling . A Static Data Race Analysis Tool . In USENIX Winter Technical Conference , 1993 . }}N. Sterling. A Static Data Race Analysis Tool. In USENIX Winter Technical Conference, 1993."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1693453.1693485"},{"key":"e_1_3_2_1_40_1","volume-title":"Model Checking Programs. In IEEE\/ACM International Conference on Automated Software Engineering","author":"Visser W.","year":"2000","unstructured":"}} W. Visser , G. P. B. Klaus Havelund , and S. Park . Model Checking Programs. In IEEE\/ACM International Conference on Automated Software Engineering , 2000 . }}W. Visser, G. P. B. Klaus Havelund, and S. Park. Model Checking Programs. In IEEE\/ACM International Conference on Automated Software Engineering, 2000."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/504282.504288"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781145"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287654"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1122971.1122993"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/360204.360206"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555754.1555796"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095832"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2007.346191"}],"event":{"name":"SPLASH '10: Systems Programming Languages and Applications: Software for Humanity","location":"Reno\/Tahoe Nevada USA","acronym":"SPLASH '10","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the ACM international conference on Object oriented programming systems languages and applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1869459.1869473","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1869459.1869473","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T08:08:14Z","timestamp":1750234094000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1869459.1869473"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,17]]},"references-count":48,"alternative-id":["10.1145\/1869459.1869473","10.1145\/1869459"],"URL":"https:\/\/doi.org\/10.1145\/1869459.1869473","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1932682.1869473","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2010,10,17]]},"assertion":[{"value":"2010-10-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}