{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:15Z","timestamp":1772164035792,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,3,3]],"date-time":"2012-03-03T00:00:00Z","timestamp":1330732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,3,3]]},"DOI":"10.1145\/2150976.2150997","type":"proceedings-article","created":{"date-parts":[[2012,3,6]],"date-time":"2012-03-06T08:18:26Z","timestamp":1331021906000},"page":"185-198","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":68,"title":["Data races vs. data race bugs"],"prefix":"10.1145","author":[{"given":"Baris","family":"Kasikci","sequence":"first","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"given":"Cristian","family":"Zamfir","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]},{"given":"George","family":"Candea","sequence":"additional","affiliation":[{"name":"EPFL, Lausanne, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2012,3,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.546611"},{"key":"e_1_3_2_1_2_1","volume-title":"Symp. on Operating Sys. Design and Implem.","author":"Aviram A.","year":"2010","unstructured":"A. Aviram , S.-C. Weng , S. Hu , and B. Ford . Efficient system-enforced deterministic parallelism . In Symp. on Operating Sys. Design and Implem. , 2010 . A. Aviram, S.-C. Weng, S. Hu, and B. Ford. Efficient system-enforced deterministic parallelism. In Symp. on Operating Sys. Design and Implem., 2010."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736029"},{"key":"e_1_3_2_1_4_1","volume-title":"USENIX Workshop on Hot Topics in Parallelism","author":"Boehm H.-J.","year":"2011","unstructured":"H.-J. Boehm . How to miscompile programs with \"benign\" data races . In USENIX Workshop on Hot Topics in Parallelism , 2011 . H.-J. Boehm. How to miscompile programs with \"benign\" data races. In USENIX Workshop on Hot Topics in Parallelism, 2011."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806626"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966463"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70545-1_12"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001436"},{"key":"e_1_3_2_1_9_1","volume-title":"Symp. on Operating Sys. Design and Implem.","author":"Cadar C.","year":"2008","unstructured":"C. Cadar , D. Dunbar , and D. R. Engler . KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs . In Symp. on Operating Sys. Design and Implem. , 2008 . C. Cadar, D. Dunbar, and D. R. Engler. KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In Symp. on Operating Sys. Design and Implem., 2008."},{"key":"e_1_3_2_1_10_1","volume-title":"Symp. on Operating Sys. Design and Implem.","author":"Candea G.","year":"2010","unstructured":"G. Candea , S. Bucur , V. Chipounov , V. Kuznetsov , and C. Zamfir . Automated software reliability services: Using reliability tools should be as easy as webmail . Symp. on Operating Sys. Design and Implem. , 2010 . Research Vision Session. G. Candea, S. Bucur, V. Chipounov, V. Kuznetsov, and C. Zamfir. Automated software reliability services: Using reliability tools should be as easy as webmail. Symp. on Operating Sys. Design and Implem., 2010. Research Vision Session."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSNW.2011.5958815"},{"key":"e_1_3_2_1_12_1","unstructured":"Chris Lattner. libc+. wofonthttp:\/\/libcxx.llvm.org\/.  Chris Lattner. libc+. wofonthttp:\/\/libcxx.llvm.org\/."},{"key":"e_1_3_2_1_13_1","volume-title":"Symp. on Operating Sys. Design and Implem.","author":"Cui H.","year":"2010","unstructured":"H. Cui , J. Wu , C. che Tsai , and J. Yang . Stable deterministic multithreading through schedule memoization . In Symp. on Operating Sys. Design and Implem. , 2010 . H. Cui, J. Wu, C. che Tsai, and J. Yang. Stable deterministic multithreading through schedule memoization. In Symp. on Operating Sys. Design and Implem., 2010."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508255"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945468"},{"key":"e_1_3_2_1_16_1","unstructured":"B. Fitzpatrick. memcached. wofonthttp:\/\/memcached.org\/.  B. Fitzpatrick. memcached. wofonthttp:\/\/memcached.org\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806625"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966465"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770351.1770421"},{"key":"e_1_3_2_1_20_1","unstructured":"J. Gilchrist. Parallel BZIP2. wofonthttp:\/\/compression.ca\/pbzip2.  J. Gilchrist. Parallel BZIP2. wofonthttp:\/\/compression.ca\/pbzip2."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629586"},{"key":"e_1_3_2_1_22_1","volume-title":"Network and Distributed System Security Symp.","author":"Godefroid P.","year":"2008","unstructured":"P. Godefroid , M. Y. Levin , and D. Molnar . Automated whitebox fuzz testing . In Network and Distributed System Security Symp. , 2008 . P. Godefroid, M. Y. Levin, and D. Molnar. Automated whitebox fuzz testing. In Network and Distributed System Security Symp., 2008."},{"key":"e_1_3_2_1_23_1","volume-title":"CAV Workshop on Exploiting Concurrency Efficiently and Correctly","author":"Godefroid P.","year":"2008","unstructured":"P. Godefroid and N. Nagappan . Concurrency at Microsoft -- An exploratory survey . In CAV Workshop on Exploiting Concurrency Efficiently and Correctly , 2008 . P. Godefroid and N. Nagappan. Concurrency at Microsoft -- An exploratory survey. In CAV Workshop on Exploiting Concurrency Efficiently and Correctly, 2008."},{"key":"e_1_3_2_1_24_1","unstructured":"Helgrind. wofonthttp:\/\/valgrind.org\/docs\/manual\/hg-manual.html.  Helgrind. wofonthttp:\/\/valgrind.org\/docs\/manual\/hg-manual.html."},{"key":"e_1_3_2_1_25_1","volume-title":"Information technology -- programming languages -- C+","author":"IEC","year":"2011","unstructured":"ISO\/ IEC 14882:2011 : Information technology -- programming languages -- C+ . International Organization for Standardization , 2011 . ISO\/IEC 14882:2011: Information technology -- programming languages -- C+. International Organization for Standardization, 2011."},{"key":"e_1_3_2_1_26_1","volume-title":"Information technology -- programming languages -- C","author":"IEC","year":"2011","unstructured":"ISO\/ IEC 9899:2011 : Information technology -- programming languages -- C . International Organization for Standardization , 2011 . ISO\/IEC 9899:2011: Information technology -- programming languages -- C. International Organization for Standardization, 2011."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2010.5470343"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2155620.2155645"},{"key":"e_1_3_2_1_29_1","volume-title":"Symp. on Operating Sys. Design and Implem.","author":"John Erickson S. B.","year":"2010","unstructured":"S. B. John Erickson , Madanlal Musuvathi and K. Olynyk . Effective data-race detection for the kernel . In Symp. on Operating Sys. Design and Implem. , 2010 . S. B. John Erickson, Madanlal Musuvathi and K. Olynyk. Effective data-race detection for the kernel. In Symp. on Operating Sys. Design and Implem., 2010."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1791194.1791203"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1979.1675439"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_34_1","volume-title":"Reference Manual for the ADA Programming Language","author":"Ledgard H.","year":"1983","unstructured":"H. Ledgard . Reference Manual for the ADA Programming Language . Springer-Verlag New York, Inc. , 1983 . H. Ledgard. Reference Manual for the ADA Programming Language. Springer-Verlag New York, Inc., 1983."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1993.274940"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168864"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040336"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542491"},{"key":"e_1_3_2_1_39_1","unstructured":"C. McPherson. Ctrace. wofonthttp:\/\/ctrace.sourceforge.net.  C. McPherson. Ctrace. wofonthttp:\/\/ctrace.sourceforge.net."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/125826.125861"},{"key":"e_1_3_2_1_41_1","unstructured":"Memcached issue 127. wofonthttp:\/\/code.google.com\/p\/memcached\/issues\/detail?id=127.  Memcached issue 127. wofonthttp:\/\/code.google.com\/p\/memcached\/issues\/detail?id=127."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/106972.106996"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736040"},{"key":"e_1_3_2_1_44_1","volume-title":"Symp. on Operating Sys. Design and Implem.","author":"Musuvathi M.","year":"2008","unstructured":"M. Musuvathi , S. Qadeer , T. Ball , G. Basler , P. A. Nainar , and I. Neamtiu . Finding and reproducing Heisenbugs in concurrent programs . In Symp. on Operating Sys. Design and Implem. , 2008 . M. Musuvathi, S. Qadeer, T. Ball, G. Basler, P. A. Nainar, and I. Neamtiu. Finding and reproducing Heisenbugs in concurrent programs. In Symp. on Operating Sys. Design and Implem., 2008."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250738"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1669112.1669180"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/781498.781528"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/859618.859632"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/989393.989426"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375584"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_1_53_1","volume-title":"wofonthttp:\/\/www.sqlite.org\/","year":"2010","unstructured":"SQLite. wofonthttp:\/\/www.sqlite.org\/ , 2010 . SQLite. wofonthttp:\/\/www.sqlite.org\/, 2010."},{"key":"e_1_3_2_1_54_1","unstructured":"The Associated Press. General Electric acknowledges Northeastern blackout bug. wofonthttp:\/\/www.securityfocus.com\/news\/8032.  The Associated Press. General Electric acknowledges Northeastern blackout bug. wofonthttp:\/\/www.securityfocus.com\/news\/8032."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390649"},{"key":"e_1_3_2_1_56_1","volume-title":"Workshop on Determinism and Correctness in Parallel Programming","author":"Tom Bergan N. H.","year":"2011","unstructured":"N. H. Tom Bergan , Joseph Devietti and L. Ceze . The deterministic execution hammer: How well does it actually pound nails ? In Workshop on Determinism and Correctness in Parallel Programming , 2011 . N. H. Tom Bergan, Joseph Devietti and L. Ceze. The deterministic execution hammer: How well does it actually pound nails? In Workshop on Determinism and Correctness in Parallel Programming, 2011."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043590"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287654"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/223982.223990"},{"key":"e_1_3_2_1_60_1","volume-title":"Symp. on Operating Sys. Design and Implem.","author":"Xiong W.","year":"2010","unstructured":"W. Xiong , S. Park , J. Zhang , Y. Zhou , and Z. Ma . Ad-hoc synchronization considered harmful . In Symp. on Operating Sys. Design and Implem. , 2010 . W. Xiong, S. Park, J. Zhang, Y. Zhou, and Z. Ma. Ad-hoc synchronization considered harmful. In Symp. on Operating Sys. Design and Implem., 2010."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770532.1770541"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095832"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755946"}],"event":{"name":"ASPLOS'12: Seventeenth International Conference on Architectural Support for Programming Languages and Operating Systems","location":"London England, UK","acronym":"ASPLOS'12","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the seventeenth international conference on Architectural Support for Programming Languages and Operating Systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2150976.2150997","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2150976.2150997","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:54:44Z","timestamp":1750226084000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2150976.2150997"}},"subtitle":["telling the difference with portend"],"short-title":[],"issued":{"date-parts":[[2012,3,3]]},"references-count":63,"alternative-id":["10.1145\/2150976.2150997","10.1145\/2150976"],"URL":"https:\/\/doi.org\/10.1145\/2150976.2150997","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2248487.2150997","asserted-by":"object"},{"id-type":"doi","id":"10.1145\/2189750.2150997","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2012,3,3]]},"assertion":[{"value":"2012-03-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}