{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:25:53Z","timestamp":1750307153237,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,23]],"date-time":"2011-10-23T00:00:00Z","timestamp":1319328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8650-10-C-7024FA8750-10-2-0253"],"award-info":[{"award-number":["FA8650-10-C-7024FA8750-10-2-0253"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1117805CNS-1054906 (CAREER)CNS-1012633CNS-0905246"],"award-info":[{"award-number":["CNS-1117805CNS-1054906 (CAREER)CNS-1012633CNS-0905246"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,23]]},"DOI":"10.1145\/2043556.2043588","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"337-351","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":52,"title":["Efficient deterministic multithreading through schedule relaxation"],"prefix":"10.1145","author":[{"given":"Heming","family":"Cui","sequence":"first","affiliation":[{"name":"Columbia University"}]},{"given":"Jingyue","family":"Wu","sequence":"additional","affiliation":[{"name":"Columbia University"}]},{"given":"John","family":"Gallagher","sequence":"additional","affiliation":[{"name":"Columbia University"}]},{"given":"Huayang","family":"Guo","sequence":"additional","affiliation":[{"name":"Columbia University"}]},{"given":"Junfeng","family":"Yang","sequence":"additional","affiliation":[{"name":"Columbia University"}]}],"member":"320","published-online":{"date-parts":[[2011,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"ab -- Apache HTTP server benchmarking tool. http:\/\/httpd. apache.org\/docs\/2.2\/programs\/ab.html.  ab -- Apache HTTP server benchmarking tool. http:\/\/httpd. apache.org\/docs\/2.2\/programs\/ab.html."},{"key":"e_1_3_2_1_2_1","unstructured":"The LLVM Compiler Framework. http:\/\/llvm.org.  The LLVM Compiler Framework. http:\/\/llvm.org."},{"key":"e_1_3_2_1_3_1","unstructured":"Parallel BZIP2 (PBZIP2). http:\/\/compression.ca\/pbzip2\/.  Parallel BZIP2 (PBZIP2). http:\/\/compression.ca\/pbzip2\/."},{"key":"e_1_3_2_1_4_1","volume-title":"Compilers: Principles, Techniques, and Tools","author":"Aho A. V.","year":"2006","unstructured":"A. V. Aho , M. S. Lam , R. Sethi , and J. D. Ullman . Compilers: Principles, Techniques, and Tools ( 2 nd Edition). Addison-Wesley . 2006 . A. V. Aho, M. S. Lam, R. Sethi, and J. D. Ullman. Compilers: Principles, Techniques, and Tools (2nd Edition). Addison-Wesley. 2006.","edition":"2"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629594"},{"key":"e_1_3_2_1_6_1","unstructured":"Apache Web Server. http:\/\/www.apache.org.  Apache Web Server. http:\/\/www.apache.org."},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10)","author":"Aviram A.","year":"2010","unstructured":"A. Aviram , S.-C. Weng , S. Hu , and B. Ford . Efficient system-enforced deterministic parallelism . In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10) , Oct. 2010 . A. Aviram, S.-C. Weng, S. Hu, and B. Ford. Efficient system-enforced deterministic parallelism. In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10), Oct. 2010."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062520"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736029"},{"key":"e_1_3_2_1_10_1","first-page":"1","volume-title":"Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10)","author":"Bergan T.","year":"2010","unstructured":"T. Bergan . N. Hunt , L. Ceze , and S. D. Gribble . Deterministic process groups in dOS . In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10) , pages 1 -- 16 , Oct. 2010 . T. Bergan. N. Hunt, L. Ceze, and S. D. Gribble. Deterministic process groups in dOS. In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10), pages 1--16, Oct. 2010."},{"key":"e_1_3_2_1_11_1","volume-title":"The 2nd Workshop on Determinism and Correctness in Parallel Programming (WODET '11)","author":"Bergan T.","year":"2011","unstructured":"T. Bergan , J. Devietti , N. Hunt , and L. Ceze . The deterministic execution hammer: how well does it actually pound nails? In The 2nd Workshop on Determinism and Correctness in Parallel Programming (WODET '11) , Mar. 2011 . T. Bergan, J. Devietti, N. Hunt, and L. Ceze. The deterministic execution hammer: how well does it actually pound nails? In The 2nd Workshop on Determinism and Correctness in Parallel Programming (WODET '11), Mar. 2011."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640096"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134760.1220164"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792770"},{"key":"e_1_3_2_1_15_1","first-page":"209","volume-title":"Proceedings of the Eighth Symposium on Operating Systems Design and Implementation (OSDI '08)","author":"Cadar C.","year":"2008","unstructured":"C. Cadar , D. Dunbar , and D. Engler . KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs . In Proceedings of the Eighth Symposium on Operating Systems Design and Implementation (OSDI '08) , pages 209 -- 224 , Dec. 2008 . C. Cadar, D. Dunbar, and D. Engler. KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. In Proceedings of the Eighth Symposium on Operating Systems Design and Implementation (OSDI '08), pages 209--224, Dec. 2008."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346322"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966475"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294274"},{"key":"e_1_3_2_1_19_1","volume-title":"Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10)","author":"Cui H.","year":"2010","unstructured":"H. Cui , J. Wu , C.-C. Tsai , and J. Yang . Stable deterministic multithreading through schedule memoization . In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10) , Oct. 2010 . H. Cui, J. Wu, C.-C. Tsai, and J. Yang. Stable deterministic multithreading through schedule memoization. In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10), Oct. 2010."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508255"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060309"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346256.1346273"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945468"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966465"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950394"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the Fourth Symposium on Networked Systems Design and Implementation (NSDI '07)","author":"Geels D.","year":"2007","unstructured":"D. Geels , G. Altekar , P. Maniatis , T. Roscoe , and I. Stoica . Friday: global comprehension for distributed replay . In Proceedings of the Fourth Symposium on Networked Systems Design and Implementation (NSDI '07) , Apr. 2007 . D. Geels, G. Altekar, P. Maniatis, T. Roscoe, and I. Stoica. Friday: global comprehension for distributed replay. In Proceedings of the Fourth Symposium on Networked Systems Design and Implementation (NSDI '07), Apr. 2007."},{"key":"e_1_3_2_1_27_1","first-page":"193","volume-title":"Proceedings of the Eighth Symposium on Operating Systems Design and Implementation (OSDI '08)","author":"Guo Z.","year":"2008","unstructured":"Z. Guo , X. Wang , J. Tang , X. Liu , Z. Xu , M. Wu , M. F. Kaashoek , and Z. Zhang . R2: An application-level kernel for record and replay . In Proceedings of the Eighth Symposium on Operating Systems Design and Implementation (OSDI '08) , pages 193 -- 208 , Dec. 2008 . Z. Guo, X. Wang, J. Tang, X. Liu, Z. Xu, M. Wu, M. F. Kaashoek, and Z. Zhang. R2: An application-level kernel for record and replay. In Proceedings of the Eighth Symposium on Operating Systems Design and Implementation (OSDI '08), pages 193--208, Dec. 2008."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181785"},{"key":"e_1_3_2_1_29_1","unstructured":"M. D. Hill and M. Xu. Racey: A stress test for deterministic execution. http:\/\/www.cs.wisc.edu\/~markhill\/racey.html.  M. D. Hill and M. Xu. Racey: A stress test for deterministic execution. http:\/\/www.cs.wisc.edu\/~markhill\/racey.html."},{"key":"e_1_3_2_1_30_1","first-page":"1","volume-title":"Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10)","author":"Kim T.","year":"2010","unstructured":"T. Kim , X. Wang , N. Zeldovich , and M. F. Kaashoek . Intrusion recovery using selective re-execution . In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10) , pages 1 -- 9 , Oct. 2010 . T. Kim, X. Wang, N. Zeldovich, and M. F. Kaashoek. Intrusion recovery using selective re-execution. In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10), pages 1--9, Oct. 2010."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/800027.808444"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/846234.849319"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1811039.1811057"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736031"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043587"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168864"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294272"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346323"},{"key":"e_1_3_2_1_40_1","first-page":"215","volume-title":"Proceedings of the International Workshop on Parallel and Distributed Algorithms","author":"Mattern F.","year":"1988","unstructured":"F. Mattern . Virtual time and global states of distributed systems . In Proceedings of the International Workshop on Parallel and Distributed Algorithms , pages 215 -- 226 . 1988 . F. Mattern. Virtual time and global states of distributed systems. In Proceedings of the International Workshop on Parallel and Distributed Algorithms, pages 215--226. 1988."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508254"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508256"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508249"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629593"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/312203.312214"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349325"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"e_1_3_2_1_48_1","first-page":"29","volume-title":"Proceedings of the USENIX Annual Technical Conference (USENIX '04)","author":"Srinivasan S. M.","year":"2004","unstructured":"S. M. Srinivasan , S. Kandula , C. R. Andrews , and Y. Zhou . Flashback: A lightweight extension for rollback and deterministic replay for software debugging . In Proceedings of the USENIX Annual Technical Conference (USENIX '04) , pages 29 -- 44 , June 2004 . S. M. Srinivasan, S. Kandula, C. R. Andrews, and Y. Zhou. Flashback: A lightweight extension for rollback and deterministic replay for software debugging. In Proceedings of the USENIX Annual Technical Conference (USENIX '04), pages 29--44, June 2004."},{"key":"e_1_3_2_1_49_1","first-page":"121","volume-title":"A survey of program slicing techniques. Journal of Programming Languages 3(3)","author":"Tip F.","year":"1995","unstructured":"F. Tip . A survey of program slicing techniques. Journal of Programming Languages 3(3) , pages 121 -- 189 , 1995 . F. Tip. A survey of program slicing techniques. Journal of Programming Languages 3(3), pages 121--189, 1995."},{"key":"e_1_3_2_1_50_1","unstructured":"VMWare Virtual Lab Automation. http:\/\/www.vmware.com\/solutions\/vla\/.  VMWare Virtual Lab Automation. http:\/\/www.vmware.com\/solutions\/vla\/."},{"key":"e_1_3_2_1_51_1","unstructured":"J. Whaley. bddbddb Project. http:\/\/bddbddb.sourceforge.net. URL http:\/\/bddbddb.sourceforge.net.  J. Whaley. bddbddb Project. http:\/\/bddbddb.sourceforge.net. URL http:\/\/bddbddb.sourceforge.net."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996859"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/1924943.1924953"},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10)","author":"Xiong W.","year":"2010","unstructured":"W. Xiong , S. Park , J. Zhang , Y. Zhou , and Z. Ma . Ad hoc synchronization considered harmful . In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10) , Oct. 2010 . W. Xiong, S. Park, J. Zhang, Y. Zhou, and Z. Ma. Ad hoc synchronization considered harmful. In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10), Oct. 2010."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095832"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736038"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755946"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736041"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950395"}],"event":{"name":"SOSP '11: ACM SIGOPS 23nd Symposium on Operating Systems Principles","sponsor":["INESC Systems and Computer Engineering Institute","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Cascais Portugal","acronym":"SOSP '11"},"container-title":["Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043556.2043588","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2043556.2043588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:18Z","timestamp":1750240458000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043556.2043588"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,23]]},"references-count":59,"alternative-id":["10.1145\/2043556.2043588","10.1145\/2043556"],"URL":"https:\/\/doi.org\/10.1145\/2043556.2043588","relation":{},"subject":[],"published":{"date-parts":[[2011,10,23]]},"assertion":[{"value":"2011-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}