{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:04Z","timestamp":1772164024316,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":66,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,3,5]],"date-time":"2011-03-05T00:00:00Z","timestamp":1299283200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,3,5]]},"DOI":"10.1145\/1950365.1950395","type":"proceedings-article","created":{"date-parts":[[2011,3,8]],"date-time":"2011-03-08T10:03:11Z","timestamp":1299578591000},"page":"251-264","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":80,"title":["ConSeq"],"prefix":"10.1145","author":[{"given":"Wei","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Wisconsin--Madison, Madison, WI, USA"}]},{"given":"Junghee","family":"Lim","sequence":"additional","affiliation":[{"name":"University of Wisconsin--Madison, Madison, WI, USA"}]},{"given":"Ramya","family":"Olichandran","sequence":"additional","affiliation":[{"name":"University of Wisconsin--Madison, Madison, WI, USA"}]},{"given":"Joel","family":"Scherpelz","sequence":"additional","affiliation":[{"name":"University of Wisconsin--Madison, Madison, WI, USA"}]},{"given":"Guoliang","family":"Jin","sequence":"additional","affiliation":[{"name":"University of Wisconsin--Madison, Madison, WI, USA"}]},{"given":"Shan","family":"Lu","sequence":"additional","affiliation":[{"name":"University of Wisconsin--Madison, Madison, WI, USA"}]},{"given":"Thomas","family":"Reps","sequence":"additional","affiliation":[{"name":"University of Wisconsin--Madison; GrammaTech,Inc, Madison, WI, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,3,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629594"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31985-6_19"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24723-4_2"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640096"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1646353.1646374"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0039704"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736040"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595700"},{"key":"e_1_3_2_1_9_1","volume-title":"OSDI","author":"Cadar C.","year":"2008","unstructured":"C. Cadar , D. Dunbar , and D. R. Engler . Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs . In OSDI , 2008 . C. Cadar, D. Dunbar, and D. R. Engler. Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In OSDI, 2008."},{"key":"e_1_3_2_1_10_1","unstructured":"Cherokee. Cherokee: The Fastest free Web Server out there! http:\/\/www.cherokee-project.com\/.  Cherokee. Cherokee: The Fastest free Web Server out there! http:\/\/www.cherokee-project.com\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755945"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512560"},{"key":"e_1_3_2_1_13_1","unstructured":"Click. The Click Modular Router Projec. http:\/\/read.cs.ucla.edu\/click\/click.  Click. The Click Modular Router Projec. http:\/\/read.cs.ucla.edu\/click\/click."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508255"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508252"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.411.0111"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/337180.337240"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2007.01.015"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542490"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_21_1","volume-title":"DSN","author":"Gu W.","year":"2003","unstructured":"W. Gu , Z. Kalbarczyk , R. K. Iyer , and Z.-Y. Yang . Characterization of Linux kernel behavior under errors . In DSN , 2003 . W. Gu, Z. Kalbarczyk, R. K. Iyer, and Z.-Y. Yang. Characterization of Linux kernel behavior under errors. In DSN, 2003."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/77606.77608"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592434.1592438"},{"key":"e_1_3_2_1_24_1","volume-title":"OSDI","author":"Jula H.","year":"2008","unstructured":"H. Jula , D. Tralamazza , C. Zamfir , and G. Candea . Deadlock immunity: Enabling systems to defend against deadlocks . In OSDI , 2008 . H. Jula, D. Tralamazza, C. Zamfir, and G. Candea. Deadlock immunity: Enabling systems to defend against deadlocks. In OSDI, 2008."},{"key":"e_1_3_2_1_25_1","volume-title":"Software Tools for Technology Transfer","author":"Kidd N.","year":"2010","unstructured":"N. Kidd , P. Lammich , T. Touilli , and T. Reps . A static technique for checking for multiple-variable data races . Software Tools for Technology Transfer , 2010 . N. Kidd, P. Lammich, T. Touilli, and T. Reps. A static technique for checking for multiple-variable data races. Software Tools for Technology Transfer, 2010."},{"key":"e_1_3_2_1_26_1","volume-title":"USENIX","author":"Kuznetsov V.","year":"2010","unstructured":"V. Kuznetsov , V. Chipounov , and G. Candea . Testing closed-source binary device drivers with DDT . In USENIX , 2010 . V. Kuznetsov, V. Chipounov, and G. Candea. Testing closed-source binary device drivers with DDT. In USENIX, 2010."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-009-0078-9"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1993.627304"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1993.274940"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2007.346196"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294272"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346323"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168864"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669181"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1815961.1815988"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.4"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250785"},{"key":"e_1_3_2_1_39_1","volume-title":"OSDI","author":"Musuvathi M.","year":"2008","unstructured":"M. Musuvathi , S. Qadeer , T. Ball , G. Basler , P. A. Nainar , and I. Neamtiu . Finding and reproducing heisenbugs in concurrent programs . In OSDI , 2008 . M. Musuvathi, S. Qadeer, T. Ball, G. Basler, P. A. Nainar, and I. Neamtiu. Finding and reproducing heisenbugs in concurrent programs. In OSDI, 2008."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250738"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/109625.109640"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508256"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508249"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806838"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629593"},{"key":"e_1_3_2_1_47_1","volume-title":"Fault-Tolerant Computer System Design","author":"Pradhan D. K.","year":"1996","unstructured":"D. K. Pradhan . Fault-Tolerant Computer System Design . Prentice-Hall, Inc orporated, 1996 . D. K. Pradhan. Fault-Tolerant Computer System Design. Prentice-Hall, Incorporated, 1996."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996845"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095833"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519095"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"e_1_3_2_1_52_1","unstructured":"SecurityFocus. Software bug contributed to blackout. http:\/\/www.securityfocus.com\/news\/8016.  SecurityFocus. Software bug contributed to blackout. http:\/\/www.securityfocus.com\/news\/8016."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375584"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869459.1869474"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111067"},{"key":"e_1_3_2_1_57_1","volume-title":"OSDI","author":"Wang Y.","year":"2008","unstructured":"Y. Wang , T. Kelly , M. Kudlur , S. Lafortune , and S. A. Mahlke . Gadara: Dynamic deadlock avoidance for multithreaded programs . In OSDI , 2008 . Y. Wang, T. Kelly, M. Kudlur, S. Lafortune, and S. A. Mahlke. Gadara: Dynamic deadlock avoidance for multithreaded programs. In OSDI, 2008."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736039"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/223982.223990"},{"key":"e_1_3_2_1_61_1","volume-title":"OSDI","author":"Xiong W.","year":"2010","unstructured":"W. Xiong , S. Park , J. Zhang , Y. Zhou , and Z. Ma . Ad hoc synchronization considered harmful . In OSDI , 2010 . W. Xiong, S. Park, J. Zhang, Y. Zhou, and Z. Ma. Ad hoc synchronization considered harmful. In OSDI, 2010."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065013"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555754.1555796"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095832"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755946"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736041"}],"event":{"name":"ASPLOS'11: Sixteenth International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Newport Beach California USA","acronym":"ASPLOS'11","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the sixteenth international conference on Architectural support for programming languages and operating systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1950365.1950395","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1950365.1950395","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:59:32Z","timestamp":1750229972000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1950365.1950395"}},"subtitle":["detecting concurrency bugs through sequential errors"],"short-title":[],"issued":{"date-parts":[[2011,3,5]]},"references-count":66,"alternative-id":["10.1145\/1950365.1950395","10.1145\/1950365"],"URL":"https:\/\/doi.org\/10.1145\/1950365.1950395","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1961295.1950395","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/1961296.1950395","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2011,3,5]]},"assertion":[{"value":"2011-03-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}