{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:29:01Z","timestamp":1750307341911,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,7,17]],"date-time":"2011-07-17T00:00:00Z","timestamp":1310860800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,7,17]]},"DOI":"10.1145\/2002962.2002970","type":"proceedings-article","created":{"date-parts":[[2011,7,20]],"date-time":"2011-07-20T12:34:54Z","timestamp":1311165294000},"page":"35-44","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Refactoring Java programs using concurrent libraries"],"prefix":"10.1145","author":[{"given":"Kazuaki","family":"Ishizaki","sequence":"first","affiliation":[{"name":"IBM Research -- Tokyo"}]},{"given":"Shahrokh","family":"Daijavad","sequence":"additional","affiliation":[{"name":"IBM Research -- T. J. Watson Research Center"}]},{"given":"Toshio","family":"Nakatani","sequence":"additional","affiliation":[{"name":"IBM Research -- Tokyo"}]}],"member":"320","published-online":{"date-parts":[[2011,7,17]]},"reference":[{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094832"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070539"},{"key":"e_1_3_2_1_5_1","volume-title":"Java Concurrency in Practice","author":"Goetz B.","year":"2006","unstructured":"Goetz , B. , Peierls , T. , Bloch , J. , Bowbeer , J. , Holmes , D. , and Lea , D . Java Concurrency in Practice , Addison-Wesley , 2006 . Goetz, B., Peierls, T., Bloch, J., Bowbeer, J., Holmes, D., and Lea, D. Java Concurrency in Practice, Addison-Wesley, 2006."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/355620.361161"},{"key":"e_1_3_2_1_7_1","unstructured":"IBM Corporation. Performance Inspector http:\/\/perfinsp.sourceforge.net\/  IBM Corporation. Performance Inspector http:\/\/perfinsp.sourceforge.net\/"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2009.5306781"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594835.1504226"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1044834.1044835"},{"key":"e_1_3_2_1_11_1","unstructured":"Oracle Corporation. Java Platform Standard Edition 5.0 http:\/\/java.sun.com\/j2se\/1.5.0\/  Oracle Corporation. Java Platform Standard Edition 5.0 http:\/\/java.sun.com\/j2se\/1.5.0\/"},{"key":"e_1_3_2_1_12_1","unstructured":"Oracle Corporation. The Oracle Solaris Studio Performance Tools http:\/\/download.oracle.com\/docs\/cd\/E18659_01\/html\/821-2763\/gkofq.html  Oracle Corporation. The Oracle Solaris Studio Performance Tools http:\/\/download.oracle.com\/docs\/cd\/E18659_01\/html\/821-2763\/gkofq.html"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1883978.1883994"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985804"},{"key":"e_1_3_2_1_15_1","volume-title":"Pattern Languages of Program Design","author":"Schmidt D. C.","year":"1997","unstructured":"Schmidt , D. C. and Harrison , T . Double-Checked Locking -- An Object Behavioral Pattern for Initializing and Accessing Thread-safe Objects Efficiently , in Pattern Languages of Program Design (R. Martin, F. Buschmann, and D. Riehle, eds.), Addison-Wesley , 1997 . Schmidt, D. C. and Harrison, T. Double-Checked Locking -- An Object Behavioral Pattern for Initializing and Accessing Thread-safe Objects Efficiently, in Pattern Languages of Program Design (R. Martin, F. Buschmann, and D. Riehle, eds.), Addison-Wesley, 1997."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094817"},{"key":"e_1_3_2_1_17_1","unstructured":"T. J. Watson Libraries for Analysis (WALA) http:\/\/wala.sf.net\/  T. J. Watson Libraries for Analysis (WALA) http:\/\/wala.sf.net\/"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595723"}],"event":{"name":"ISSTA '11: International Symposium on Software Testing and Analysis","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Toronto Ontario Canada","acronym":"ISSTA '11"},"container-title":["Proceedings of the Workshop on Parallel and Distributed Systems: Testing, Analysis, and Debugging"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2002962.2002970","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2002962.2002970","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:06:22Z","timestamp":1750244782000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2002962.2002970"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,7,17]]},"references-count":16,"alternative-id":["10.1145\/2002962.2002970","10.1145\/2002962"],"URL":"https:\/\/doi.org\/10.1145\/2002962.2002970","relation":{},"subject":[],"published":{"date-parts":[[2011,7,17]]},"assertion":[{"value":"2011-07-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}