{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:24:43Z","timestamp":1750307083083,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,9,19]],"date-time":"2012-09-19T00:00:00Z","timestamp":1348012800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,9,19]]},"DOI":"10.1145\/2370816.2370854","type":"proceedings-article","created":{"date-parts":[[2012,9,25]],"date-time":"2012-09-25T23:48:43Z","timestamp":1348616923000},"page":"253-262","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["HaLock"],"prefix":"10.1145","author":[{"given":"Yongbing","family":"Huang","sequence":"first","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Zehan","family":"Cui","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Licheng","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Wenli","family":"Zhang","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Yungang","family":"Bao","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]},{"given":"Mingyu","family":"Chen","sequence":"additional","affiliation":[{"name":"Institute of Computing Technology, Chinese Academy of Sciences, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2012,9,19]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"AMD CodeAnalyst. http:\/\/developer.amd.com\/tools\/codeanalyst\/pages\/default.aspx.  AMD CodeAnalyst. http:\/\/developer.amd.com\/tools\/codeanalyst\/pages\/default.aspx."},{"key":"e_1_3_2_1_2_1","unstructured":"HMTT. http:\/\/asl.ncic.ac.cn\/hmtt\/index.html\/.  HMTT. http:\/\/asl.ncic.ac.cn\/hmtt\/index.html\/."},{"key":"e_1_3_2_1_3_1","volume-title":"August","author":"Profiler Intel Thread","year":"2007","unstructured":"Intel Thread Profiler . http:\/\/software.intel.com\/en-us\/articles\/using-intel-thread-profiler-for-win32-threads-philosophy-and-theory , August 2007 . Intel Thread Profiler. http:\/\/software.intel.com\/en-us\/articles\/using-intel-thread-profiler-for-win32-threads-philosophy-and-theory, August 2007."},{"key":"e_1_3_2_1_4_1","unstructured":"Intel VTune Amplifier XE. http:\/\/software.intel.com\/en-us\/intel-vtune.  Intel VTune Amplifier XE. http:\/\/software.intel.com\/en-us\/intel-vtune."},{"key":"e_1_3_2_1_5_1","unstructured":"Jucprofiler. http:\/\/www.infoq.com\/articles\/jucprofiler.  Jucprofiler. http:\/\/www.infoq.com\/articles\/jucprofiler."},{"key":"e_1_3_2_1_6_1","unstructured":"LockStat. http:\/\/hub.opensolaris.org\/bin\/view\/Community+Group+dtrace\/WebHome.  LockStat. http:\/\/hub.opensolaris.org\/bin\/view\/Community+Group+dtrace\/WebHome."},{"key":"e_1_3_2_1_7_1","unstructured":"TopMC. http:\/\/asg.ict.ac.cn\/projects\/topmc\/.  TopMC. http:\/\/asg.ict.ac.cn\/projects\/topmc\/."},{"key":"e_1_3_2_1_8_1","first-page":"3B","volume":"3","author":"Intel","year":"2011","unstructured":"Intel 64 and IA-32 Architectures Software Developer's Manual , vol. 3A & 3B , 2011 . Intel 64 and IA-32 Architectures Software Developer's Manual, vol. 3A & 3B, 2011.","journal-title":"Architectures Software Developer's Manual"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375457.1375484"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454115.1454128"},{"key":"e_1_3_2_1_11_1","volume-title":"Proceedings of the Linux Symposium","author":"Boyd-Wickizer Silas","year":"2012","unstructured":"Silas Boyd-Wickizer , M. Frans Kaashoek , Robert Morris , and Nickolai Zeldovich . Non-scalable locks are dangerous . In Proceedings of the Linux Symposium , Ottawa, Canada , July 2012 . Silas Boyd-Wickizer, M. Frans Kaashoek, Robert Morris, and Nickolai Zeldovich. Non-scalable locks are dangerous. In Proceedings of the Linux Symposium, Ottawa, Canada, July 2012."},{"key":"e_1_3_2_1_12_1","first-page":"271","volume-title":"Proceedings of the 4th Annual Linux Showcase and Conference","author":"Bryant R.","year":"2000","unstructured":"R. Bryant and J. Hawkes . Lockmeter: Highly-Informative Instrumentation for Spin Locks in the Linux Kernel . In Proceedings of the 4th Annual Linux Showcase and Conference , pages 271 -- 282 , 2000 . R. Bryant and J. Hawkes. Lockmeter: Highly-Informative Instrumentation for Spin Locks in the Linux Kernel. In Proceedings of the 4th Annual Linux Showcase and Conference, pages 271--282, 2000."},{"key":"e_1_3_2_1_13_1","volume-title":"Programming with POSIX threads","author":"Butenhof D. R.","year":"1997","unstructured":"D. R. Butenhof . Programming with POSIX threads . Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA , 1997 . D. R. Butenhof. Programming with POSIX threads. Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA, 1997."},{"key":"e_1_3_2_1_14_1","volume-title":"Low Perturbation Address Trace Collection for Operating System, Multiprogrammed, and Parallel Workloads in Multiprocessors. Technical report","author":"Daigle R.","year":"1996","unstructured":"R. Daigle , C. Xia , and J. Torrellas . Low Perturbation Address Trace Collection for Operating System, Multiprogrammed, and Parallel Workloads in Multiprocessors. Technical report , Center for Supercomputing Research and Development , Univ . of Illinois at Urbana-Champaign, Mar. 1996 . R. Daigle, C. Xia, and J. Torrellas. Low Perturbation Address Trace Collection for Operating System, Multiprogrammed, and Parallel Workloads in Multiprocessors. Technical report, Center for Supercomputing Research and Development, Univ. of Illinois at Urbana-Champaign, Mar. 1996."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/266800.266828"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000064.2000107"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736058"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2155620.2155663"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1816038.1816011"},{"key":"e_1_3_2_1_20_1","volume-title":"The Collection of Complete Traces. In Computer Performance Evaluation '92: Modeling Techniques and Tools","author":"Flanagan J. K.","year":"1993","unstructured":"J. K. Flanagan , B. E. Nelson , J. K Archibald , K. S. Grimsrud . BACH : BYU Address Collection Hardware , The Collection of Complete Traces. In Computer Performance Evaluation '92: Modeling Techniques and Tools , 1993 . J. K. Flanagan, B. E. Nelson, J. K Archibald, K. S. Grimsrud. BACH: BYU Address Collection Hardware, The Collection of Complete Traces. In Computer Performance Evaluation '92: Modeling Techniques and Tools, 1993."},{"key":"e_1_3_2_1_21_1","volume-title":"Memory systems: Cache, dram, disk","author":"Jacob B.","year":"2008","unstructured":"B. Jacob , S. Ng , and D. Wang . Memory systems: Cache, dram, disk . In Elsevier , 2008 . B. Jacob, S. Ng, and D. Wang. Memory systems: Cache, dram, disk. In Elsevier, 2008."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1516360.1516365"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2209249.2209269"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/238020.238040"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2008.7"},{"key":"e_1_3_2_1_26_1","first-page":"27","volume-title":"Proceedings of the 6th Annual Workshop on the Interaction between Operating Systems and Computer Architecture","author":"Qu N.","year":"2005","unstructured":"N. Qu , X. G. Gou , and X. Cheng . Using Uncacheable Memory to Improve Unity Linux Performance . In Proceedings of the 6th Annual Workshop on the Interaction between Operating Systems and Computer Architecture , pages 27 -- 32 , 2005 . N. Qu, X. G. Gou, and X. Cheng. Using Uncacheable Memory to Improve Unity Linux Performance. In Proceedings of the 6th Annual Workshop on the Interaction between Operating Systems and Computer Architecture, pages 27--32, 2005."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2004.22"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1693453.1693489"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/143365.143506"}],"event":{"name":"PACT '12: International Conference on Parallel Architectures and Compilation Techniques","sponsor":["IFIP WG 10.3 IFIP WG 10.3","SIGARCH ACM Special Interest Group on Computer Architecture","IEEE CS TCPP IEEE Computer Society Technical Committee on Parallel Processing","IEEE CS TCAA IEEE CS technical committee on architectural acoustics"],"location":"Minneapolis Minnesota USA","acronym":"PACT '12"},"container-title":["Proceedings of the 21st international conference on Parallel architectures and compilation techniques"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2370816.2370854","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2370816.2370854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:17Z","timestamp":1750239257000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2370816.2370854"}},"subtitle":["hardware-assisted lock contention detection in multithreaded applications"],"short-title":[],"issued":{"date-parts":[[2012,9,19]]},"references-count":29,"alternative-id":["10.1145\/2370816.2370854","10.1145\/2370816"],"URL":"https:\/\/doi.org\/10.1145\/2370816.2370854","relation":{},"subject":[],"published":{"date-parts":[[2012,9,19]]},"assertion":[{"value":"2012-09-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}