{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:27:21Z","timestamp":1750746441206,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,23]],"date-time":"2011-10-23T00:00:00Z","timestamp":1319328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0905149CCF-0916770"],"award-info":[{"award-number":["CNS-0905149CCF-0916770"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CNS-0905149CCF-0916770"],"award-info":[{"award-number":["CNS-0905149CCF-0916770"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,23]]},"DOI":"10.1145\/2043556.2043590","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"369-384","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":67,"title":["Detecting and surviving data races using complementary schedules"],"prefix":"10.1145","author":[{"given":"Kaushik","family":"Veeraraghavan","sequence":"first","affiliation":[{"name":"University of Michigan"}]},{"given":"Peter M.","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"Jason","family":"Flinn","sequence":"additional","affiliation":[{"name":"University of Michigan"}]},{"given":"Satish","family":"Narayanasamy","sequence":"additional","affiliation":[{"name":"University of Michigan"}]}],"member":"320","published-online":{"date-parts":[[2011,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231893"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948147"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640096"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134000"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640097"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806626"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582440"},{"key":"e_1_3_2_1_8_1","volume-title":"The primary-backup approach","author":"Budhiraja N.","year":"1993","unstructured":"N. Budhiraja , K. Marzullo , F. B. Schneider , and S. Toueg . The primary-backup approach . Addison-Wesley , 1993 . in Distributed Systems, edited by Sape Mullender. N. Budhiraja, K. Marzullo, F. B. Schneider, and S. Toueg. The primary-backup approach. Addison-Wesley, 1993. in Distributed Systems, edited by Sape Mullender."},{"key":"e_1_3_2_1_9_1","first-page":"31","volume-title":"Proceedings of the 6th Symposium on Operating Systems Design and Implementation","author":"Candea G.","year":"2004","unstructured":"G. Candea , S. Kawamoto , Y. Fujiki , G. Friedman , and A. Fox . Microreboot -- A technique for cheap recovery . In Proceedings of the 6th Symposium on Operating Systems Design and Implementation , pages 31 -- 44 , San Francisco, CA , December 2004 . G. Candea, S. Kawamoto, Y. Fujiki, G. Friedman, and A. Fox. Microreboot -- A technique for cheap recovery. In Proceedings of the 6th Symposium on Operating Systems Design and Implementation, pages 31--44, San Francisco, CA, December 2004."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512560"},{"key":"e_1_3_2_1_11_1","volume-title":"USENIX Security","author":"Cox B.","year":"2006","unstructured":"B. Cox , D. Evans , A. Filipi , J. Rowanhill , W. Hu , J. Davidson , J. Knight , A. Nguyen-Tuong , and J. Hiser . N-variant systems: A secretless framework for security through diversity . In USENIX Security , August 2006 . B. Cox, D. Evans, A. Filipi, J. Rowanhill, W. Hu, J. Davidson, J. Knight, A. Nguyen-Tuong, and J. Hiser. N-variant systems: A secretless framework for security through diversity. In USENIX Security, August 2006."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 9th Symposium on Operating Systems Design and Implementation","author":"Cui H.","year":"2010","unstructured":"H. Cui , J. Wu , C.-C. Tsai , and J. Yang . Stable deterministic multithreading through schedule memoization . In Proceedings of the 9th Symposium on Operating Systems Design and Implementation , Vancouver, BC , October 2010 . H. Cui, J. Wu, C.-C. Tsai, and J. Yang. Stable deterministic multithreading through schedule memoization. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation, Vancouver, BC, October 2010."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945468"},{"key":"e_1_3_2_1_14_1","volume-title":"Proceedings of the 9th Symposium on Operating Systems Design and Implementation","author":"Erickson J.","year":"2010","unstructured":"J. Erickson , M. Musuvathi , S. Burckhardt , and K. Olynyk . Effective data-race detection for the kernel . In Proceedings of the 9th Symposium on Operating Systems Design and Implementation , Vancouver, BC , October 2010 . J. Erickson, M. Musuvathi, S. Burckhardt, and K. Olynyk. Effective data-race detection for the kernel. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation, Vancouver, BC, October 2010."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542490"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966465"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/822075.822408"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263717"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736062"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/874064.875631"},{"key":"e_1_3_2_1_21_1","first-page":"294","volume-title":"Proceedings of the 8th Symposium on Operating Systems Design and Implementation","author":"Jula H.","year":"2008","unstructured":"H. Jula , D. Tralamazza . C. Zamfir , and G. Candea . Deadlock immunity: Enabling systems to defend against deadlocks . In Proceedings of the 8th Symposium on Operating Systems Design and Implementation , pages 294 -- 308 , San Diego, CA , December 2008 . H. Jula, D. Tralamazza. C. Zamfir, and G. Candea. Deadlock immunity: Enabling systems to defend against deadlocks. In Proceedings of the 8th Symposium on Operating Systems Design and Implementation, pages 294--308, San Diego, CA, December 2008."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948146"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736031"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1993.274940"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251229.1251249"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346323"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.62.0200"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542491"},{"key":"e_1_3_2_1_30_1","first-page":"267","volume-title":"Proceedings of the 8th Symposium on Operating Systems Design and Implementation","author":"Musuvathi M.","year":"2008","unstructured":"M. Musuvathi , S. Qadeer , T. Ball , G. Basler , P. A. Nainar , and I. Neamtiu . Finding and reproducing Heisenbugs in concurrent programs . In Proceedings of the 8th Symposium on Operating Systems Design and Implementation , pages 267 -- 280 , San Diego, CA , December 2008 . M. Musuvathi, S. Qadeer, T. Ball, G. Basler, P. A. Nainar, and I. Neamtiu. Finding and reproducing Heisenbugs in concurrent programs. In Proceedings of the 8th Symposium on Operating Systems Design and Implementation, pages 267--280, San Diego, CA, December 2008."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250738"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095829"},{"key":"e_1_3_2_1_33_1","volume-title":"SecurityFocus","author":"Poulsen K.","year":"2004","unstructured":"K. Poulsen . Software bug contributed to blackout . SecurityFocus , 2004 . K. Poulsen. Software bug contributed to blackout. SecurityFocus, 2004."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/781498.781529"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/859618.859632"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095833"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/312203.312214"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181315"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1519065.1519071"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/73141.74844"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1791194.1791203"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950370"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1515\/9781400882618-003"},{"key":"e_1_3_2_1_46_1","first-page":"281","volume-title":"Proceedings of the 8th Symposium on Operating Systems Design and Implementation","author":"Wang Y.","year":"2008","unstructured":"Y. Wang , T. Kelly , M. Kudlur , S. Lafortune , and S. Mahlke . Gadara: Dynamic deadlock avoidance for multithreaded programs . In Proceedings of the 8th Symposium on Operating Systems Design and Implementation , pages 281 -- 294 , San Diego, CA , December 2008 . Y. Wang, T. Kelly, M. Kudlur, S. Lafortune, and S. Mahlke. Gadara: Dynamic deadlock avoidance for multithreaded programs. In Proceedings of the 8th Symposium on Operating Systems Design and Implementation, pages 281--294, San Diego, CA, December 2008."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA260075"},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the 9th Symposium on Operating Systems Design and Implementation","author":"We J.","year":"2010","unstructured":"J. We , H. Cui , and J. Yang . Bypassing races in live applications with execution filters . In Proceedings of the 9th Symposium on Operating Systems Design and Implementation , Vancouver, BC , October 2010 . J. We, H. Cui, and J. Yang. Bypassing races in live applications with execution filters. In Proceedings of the 9th Symposium on Operating Systems Design and Implementation, Vancouver, BC, October 2010."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065013"},{"key":"e_1_3_2_1_50_1","unstructured":"J. Yu. Collection of concurrency bugs. http:\/\/www.eecs.umich.edu\/jieyu\/bugs.html.  J. Yu. Collection of concurrency bugs. http:\/\/www.eecs.umich.edu\/jieyu\/bugs.html."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555754.1555796"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095832"},{"key":"e_1_3_2_1_53_1","first-page":"159","volume-title":"Proceedings of the 4th Symposium on Networked Systems Design and Implementation","author":"Yumerefendi A. R.","year":"2007","unstructured":"A. R. Yumerefendi , B. Mickle , and L. P. Cox . TightLip: Keeping applications from spilling the beans . In Proceedings of the 4th Symposium on Networked Systems Design and Implementation , pages 159 -- 172 , Cambridge, MA , April 2007 . A. R. Yumerefendi, B. Mickle, and L. P. Cox. TightLip: Keeping applications from spilling the beans. In Proceedings of the 4th Symposium on Networked Systems Design and Implementation, pages 159--172, Cambridge, MA, April 2007."}],"event":{"name":"SOSP '11: ACM SIGOPS 23nd Symposium on Operating Systems Principles","sponsor":["INESC Systems and Computer Engineering Institute","SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Cascais Portugal","acronym":"SOSP '11"},"container-title":["Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043556.2043590","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2043556.2043590","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:18Z","timestamp":1750240458000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043556.2043590"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,23]]},"references-count":53,"alternative-id":["10.1145\/2043556.2043590","10.1145\/2043556"],"URL":"https:\/\/doi.org\/10.1145\/2043556.2043590","relation":{},"subject":[],"published":{"date-parts":[[2011,10,23]]},"assertion":[{"value":"2011-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}