{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:15:39Z","timestamp":1763468139666,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":71,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,3]],"date-time":"2013-11-03T00:00:00Z","timestamp":1383436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000181","name":"Air Force Office of Scientific Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000181","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000183","name":"Army Research Office","doi-asserted-by":"publisher","award":["W911NF0910273"],"award-info":[{"award-number":["W911NF0910273"]}],"id":[{"id":"10.13039\/100000183","id-type":"DOI","asserted-by":"publisher"}]},{"name":"MSR-CMU Computational Thinking Center"},{"DOI":"10.13039\/100006602","name":"Air Force Research Laboratory","doi-asserted-by":"publisher","award":["FA8650-11-C-7190, FA8650-10-C-7024, FA8750-10-2-0253"],"award-info":[{"award-number":["FA8650-11-C-7190, FA8650-10-C-7024, FA8750-10-2-0253"]}],"id":[{"id":"10.13039\/100006602","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-12-1-0166"],"award-info":[{"award-number":["N00014-12-1-0166"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000879","name":"Alfred P. Sloan Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000879","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CCF-1162021, CNS-1117805, CNS-1054906, CNS-0905246"],"award-info":[{"award-number":["CCF-1162021, CNS-1117805, CNS-1054906, CNS-0905246"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CCF-1162021, CNS-1117805, CNS-1054906, CNS-0905246"],"award-info":[{"award-number":["CCF-1162021, CNS-1117805, CNS-1054906, CNS-0905246"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100007063","name":"Mellon College of Science, Carnegie Mellon University","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100007063","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,3]]},"DOI":"10.1145\/2517349.2522735","type":"proceedings-article","created":{"date-parts":[[2013,10,8]],"date-time":"2013-10-08T13:27:04Z","timestamp":1381238824000},"page":"388-405","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":58,"title":["Parrot"],"prefix":"10.1145","author":[{"given":"Heming","family":"Cui","sequence":"first","affiliation":[{"name":"Columbia University"}]},{"given":"Jiri","family":"Simsa","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Yi-Hong","family":"Lin","sequence":"additional","affiliation":[{"name":"Columbia University"}]},{"given":"Hao","family":"Li","sequence":"additional","affiliation":[{"name":"Columbia University"}]},{"given":"Ben","family":"Blum","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Xinan","family":"Xu","sequence":"additional","affiliation":[{"name":"Columbia University"}]},{"given":"Junfeng","family":"Yang","sequence":"additional","affiliation":[{"name":"Columbia University"}]},{"given":"Garth A.","family":"Gibson","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]},{"given":"Randal E.","family":"Bryant","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University"}]}],"member":"320","published-online":{"date-parts":[[2013,11,3]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Complete source code benchmark suite and raw results of the PARROT thread runtime. https:\/\/github.com\/columbia\/smt-mc.  Complete source code benchmark suite and raw results of the PARROT thread runtime. https:\/\/github.com\/columbia\/smt-mc."},{"key":"e_1_3_2_2_2_1","unstructured":"The Princeton application repository for shared-memory computers (PARSEC). http:\/\/parsec.cs.princeton.edu\/.  The Princeton application repository for shared-memory computers (PARSEC). http:\/\/parsec.cs.princeton.edu\/."},{"key":"e_1_3_2_2_3_1","unstructured":"Parallel BZIP2 (PBZIP2). http:\/\/compression.ca\/pbzip2\/.  Parallel BZIP2 (PBZIP2). http:\/\/compression.ca\/pbzip2\/."},{"key":"e_1_3_2_2_4_1","unstructured":"Aget. http:\/\/www.enderunix.org\/aget\/.  Aget. http:\/\/www.enderunix.org\/aget\/."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267359.1267387"},{"key":"e_1_3_2_2_6_1","volume-title":"Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10)","author":"Aviram A.","year":"2010","unstructured":"A. Aviram , S.-C. Weng , S. Hu , and B. Ford . Efficient system-enforced deterministic parallelism . In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10) , Oct. 2010 . A. Aviram, S.-C. Weng, S. Hu, and B. Ford. Efficient system-enforced deterministic parallelism. In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10), Oct. 2010."},{"key":"e_1_3_2_2_8_1","unstructured":"Bench3n. http:\/\/libdb.wordpress.com\/3n1\/.  Bench3n. http:\/\/libdb.wordpress.com\/3n1\/."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736029"},{"key":"e_1_3_2_2_10_1","volume-title":"Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10)","author":"Bergan T.","year":"2010","unstructured":"T. Bergan , N. Hunt , L. Ceze , and S. D. Gribble . Deterministic process groups in dOS . In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10) , Oct. 2010 . T. Bergan, N. Hunt, L. Ceze, and S. D. Gribble. Deterministic process groups in dOS. In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10), Oct. 2010."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509508"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640096"},{"key":"e_1_3_2_2_13_1","unstructured":"Berkeley DB. http:\/\/www.sleepycat.com.  Berkeley DB. http:\/\/www.sleepycat.com."},{"key":"e_1_3_2_2_14_1","volume-title":"May","author":"Board O. A. R.","year":"2008","unstructured":"O. A. R. Board . OpenMP application program interface version 3.0 , May 2008 . O. A. R. Board. OpenMP application program interface version 3.0, May 2008."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640097"},{"key":"e_1_3_2_2_16_1","volume-title":"Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10)","author":"Cui H.","year":"2010","unstructured":"H. Cui , J. Wu , C.-C. Tsai , and J. Yang . Stable deterministic multithreading through schedule memoization . In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10) , Oct. 2010 . H. Cui, J. Wu, C.-C. Tsai, and J. Yang. Stable deterministic multithreading through schedule memoization. In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10), Oct. 2010."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043588"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508255"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/233013.233020"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945468"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040315"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263717"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043582"},{"key":"e_1_3_2_2_24_1","unstructured":"M. D. Hill and M. Xu. Racey: A stress test for deterministic execution. http:\/\/www.cs.wisc.edu\/~markhill\/racey.html.  M. D. Hill and M. Xu. Racey: A stress test for deterministic execution. http:\/\/www.cs.wisc.edu\/~markhill\/racey.html."},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451170"},{"key":"e_1_3_2_2_26_1","unstructured":"ImageMagick. http:\/\/www.imagemagick.org\/script\/index.php.  ImageMagick. http:\/\/www.imagemagick.org\/script\/index.php."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.5555\/1361397.1361400"},{"key":"e_1_3_2_2_28_1","first-page":"221","volume-title":"Proceedings of the Tenth Symposium on Operating Systems Design and Implementation (OSDI '12)","author":"Jin G.","year":"2012","unstructured":"G. Jin , W. Zhang , D. Deng , B. Liblit , and S. Lu . Automated concurrency-bug fixing . In Proceedings of the Tenth Symposium on Operating Systems Design and Implementation (OSDI '12) , pages 221 -- 236 , 2012 . G. Jin, W. Zhang, D. Deng, B. Liblit, and S. Lu. Automated concurrency-bug fixing. In Proceedings of the Tenth Symposium on Operating Systems Design and Implementation (OSDI '12), pages 221--236, 2012."},{"key":"e_1_3_2_2_29_1","first-page":"295","volume-title":"Proceedings of the Eighth Symposium on Operating Systems Design and Implementation (OSDI '08)","author":"Jula H.","year":"2008","unstructured":"H. Jula , D. Tralamazza , Z. Cristian , and C. George . Deadlock immunity: Enabling systems to defend against deadlocks . In Proceedings of the Eighth Symposium on Operating Systems Design and Implementation (OSDI '08) , pages 295 -- 308 , Dec. 2008 . H. Jula, D. Tralamazza, Z. Cristian, and C. George. Deadlock immunity: Enabling systems to defend against deadlocks. In Proceedings of the Eighth Symposium on Operating Systems Design and Implementation (OSDI '08), pages 295--308, Dec. 2008."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/1597348.1597350"},{"key":"e_1_3_2_2_31_1","first-page":"243","volume-title":"Proceedings of the Fourth Symposium on Networked Systems Design and Implementation (NSDI '07)","author":"Killian C.","year":"2007","unstructured":"C. Killian , J. W. Anderson , R. Jhala , and A. Vahdat . Life, death, and the critical transition: Finding liveness bugs in systems code . In Proceedings of the Fourth Symposium on Networked Systems Design and Implementation (NSDI '07) , pages 243 -- 256 , Apr. 2007 . C. Killian, J. W. Anderson, R. Jhala, and A. Vahdat. Life, death, and the critical transition: Finding liveness bugs in systems code. In Proceedings of the Fourth Symposium on Networked Systems Design and Implementation (NSDI '07), pages 243--256, Apr. 2007."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.2307\/2005469"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1993.274940"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043587"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168864"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294272"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346323"},{"key":"e_1_3_2_2_38_1","unstructured":"Mongoose. https:\/\/code.google.com\/p\/mongoose\/.  Mongoose. https:\/\/code.google.com\/p\/mongoose\/."},{"key":"e_1_3_2_2_39_1","unstructured":"MPlayer. http:\/\/www.mplayerhq.hu\/design7\/news.html.  MPlayer. http:\/\/www.mplayerhq.hu\/design7\/news.html."},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060297"},{"key":"e_1_3_2_2_41_1","first-page":"267","volume-title":"Proceedings of the Eighth Symposium on Operating Systems Design and Implementation (OSDI '08)","author":"Musuvathi M.","year":"2008","unstructured":"M. Musuvathi , S. Qadeer , T. Ball , G. Basler , P. A. Nainar , and I. Neamtiu . Finding and reproducing heisenbugs in concurrent programs . In Proceedings of the Eighth Symposium on Operating Systems Design and Implementation (OSDI '08) , pages 267 -- 280 , Dec. 2008 . M. Musuvathi, S. Qadeer, T. Ball, G. Basler, P. A. Nainar, and I. Neamtiu. Finding and reproducing heisenbugs in concurrent programs. In Proceedings of the Eighth Symposium on Operating Systems Design and Implementation (OSDI '08), pages 267--280, Dec. 2008."},{"key":"e_1_3_2_2_42_1","unstructured":"NASA Parallel Benchmarks. http:\/\/www.nas.nasa.gov\/publications\/npb.html.  NASA Parallel Benchmarks. http:\/\/www.nas.nasa.gov\/publications\/npb.html."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508256"},{"key":"e_1_3_2_2_44_1","volume-title":"The 2nd Workshop on Determinism and Correctness in Parallel Programming (WODET '11)","author":"Olszewski M.","year":"2011","unstructured":"M. Olszewski , J. Ansel , and S. Amarasinghe . Scaling deterministic multithreading . In The 2nd Workshop on Determinism and Correctness in Parallel Programming (WODET '11) , Mar. 2011 . M. Olszewski, J. Ansel, and S. Amarasinghe. Scaling deterministic multithreading. In The 2nd Workshop on Determinism and Correctness in Parallel Programming (WODET '11), Mar. 2011."},{"key":"e_1_3_2_2_45_1","unstructured":"OpenLDAP. http:\/\/www.openldap.org\/.  OpenLDAP. http:\/\/www.openldap.org\/."},{"key":"e_1_3_2_2_46_1","first-page":"22","volume-title":"Proceedings of Third International Conference on Distributed Computing Systems (ICDCS '82)","author":"Ousterhout J. K.","year":"1982","unstructured":"J. K. Ousterhout . Scheduling Techniques for Concurrent Systems . In Proceedings of Third International Conference on Distributed Computing Systems (ICDCS '82) , pages 22 -- 30 , 1982 . J. K. Ousterhout. Scheduling Techniques for Concurrent Systems. In Proceedings of Third International Conference on Distributed Computing Systems (ICDCS '82), pages 22--30, 1982."},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453121"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508249"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629593"},{"key":"e_1_3_2_2_50_1","unstructured":"Perf. https:\/\/perf.wiki.kernel.org\/index.php\/Main_Page\/.  Perf. https:\/\/perf.wiki.kernel.org\/index.php\/Main_Page\/."},{"key":"e_1_3_2_2_51_1","unstructured":"pfscan. http:\/\/ostatic.com\/pfscan.  pfscan. http:\/\/ostatic.com\/pfscan."},{"key":"e_1_3_2_2_52_1","volume-title":"Feb.","author":"Poulsen K.","year":"2004","unstructured":"K. Poulsen . Software bug contributed to blackout. http:\/\/www.securityfocus.com\/news\/8016 , Feb. 2004 . K. Poulsen. Software bug contributed to blackout. http:\/\/www.securityfocus.com\/news\/8016, Feb. 2004."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2007.346181"},{"key":"e_1_3_2_2_54_1","unstructured":"Redis. http:\/\/redis.io\/.  Redis. http:\/\/redis.io\/."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375584"},{"key":"e_1_3_2_2_57_1","first-page":"188","volume-title":"The 18th International SPIN Workshop on Model Checking of Software (SPIN'11)","author":"Simsa J.","year":"2011","unstructured":"J. Simsa , G. Gibson , and R. Bryant . dBug: Systematic Testing of Unmodified Distributed and Multi-Threaded Systems . In The 18th International SPIN Workshop on Model Checking of Software (SPIN'11) , pages 188 -- 193 , 2011 . J. Simsa, G. Gibson, and R. Bryant. dBug: Systematic Testing of Unmodified Distributed and Multi-Threaded Systems. In The 18th International SPIN Workshop on Model Checking of Software (SPIN'11), pages 188--193, 2011."},{"key":"e_1_3_2_2_58_1","unstructured":"SPLASH-2x. http:\/\/parsec.cs.princeton.edu\/parsec3-doc.htm.  SPLASH-2x. http:\/\/parsec.cs.princeton.edu\/parsec3-doc.htm."},{"key":"e_1_3_2_2_59_1","unstructured":"STL Parallel Mode. http:\/\/gcc.gnu.org\/onlinedocs\/libstdc++\/manual\/parallel_mode.html.  STL Parallel Mode. http:\/\/gcc.gnu.org\/onlinedocs\/libstdc++\/manual\/parallel_mode.html."},{"key":"e_1_3_2_2_60_1","unstructured":"VTune. http:\/\/software.intel.com\/en-us\/intel-vtune-amplifier-xe\/.  VTune. http:\/\/software.intel.com\/en-us\/intel-vtune-amplifier-xe\/."},{"key":"e_1_3_2_2_61_1","first-page":"281","volume-title":"Proceedings of the Eighth Symposium on Operating Systems Design and Implementation (OSDI '08)","author":"Wang Y.","year":"2008","unstructured":"Y. Wang , T. Kelly , M. Kudlur , S. Lafortune , and S. Mahlke . Gadara: Dynamic deadlock avoidance for multithreaded programs . In Proceedings of the Eighth Symposium on Operating Systems Design and Implementation (OSDI '08) , pages 281 -- 294 , Dec. 2008 . Y. Wang, T. Kelly, M. Kudlur, S. Lafortune, and S. Mahlke. Gadara: Dynamic deadlock avoidance for multithreaded programs. In Proceedings of the Eighth Symposium on Operating Systems Design and Implementation (OSDI '08), pages 281--294, Dec. 2008."},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/1924943.1924953"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254090"},{"key":"e_1_3_2_2_64_1","volume-title":"Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10)","author":"Xiong W.","year":"2010","unstructured":"W. Xiong , S. Park , J. Zhang , Y. Zhou , and Z. Ma . Ad hoc synchronization considered harmful . In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10) , Oct. 2010 . W. Xiong, S. Park, J. Zhang, Y. Zhou, and Z. Ma. Ad hoc synchronization considered harmful. In Proceedings of the Ninth Symposium on Operating Systems Design and Implementation (OSDI '10), Oct. 2010."},{"key":"e_1_3_2_2_65_1","first-page":"273","volume-title":"Proceedings of the Sixth Symposium on Operating Systems Design and Implementation (OSDI '04)","author":"Yang J.","year":"2004","unstructured":"J. Yang , P. Twohey , D. Engler , and M. Musuvathi . Using model checking to find serious file system errors . In Proceedings of the Sixth Symposium on Operating Systems Design and Implementation (OSDI '04) , pages 273 -- 288 , Dec. 2004 . J. Yang, P. Twohey, D. Engler, and M. Musuvathi. Using model checking to find serious file system errors. In Proceedings of the Sixth Symposium on Operating Systems Design and Implementation (OSDI '04), pages 273--288, Dec. 2004."},{"key":"e_1_3_2_2_66_1","first-page":"131","volume-title":"Proceedings of the Seventh Symposium on Operating Systems Design and Implementation (OSDI '06)","author":"Yang J.","year":"2006","unstructured":"J. Yang , C. Sar , and D. Engler . Explode: a lightweight, general system for finding serious storage system errors . In Proceedings of the Seventh Symposium on Operating Systems Design and Implementation (OSDI '06) , pages 131 -- 146 , Nov. 2006 . J. Yang, C. Sar, and D. Engler. Explode: a lightweight, general system for finding serious storage system errors. In Proceedings of the Seventh Symposium on Operating Systems Design and Implementation (OSDI '06), pages 131--146, Nov. 2006."},{"key":"e_1_3_2_2_67_1","first-page":"213","volume-title":"Proceedings of the Sixth Symposium on Networked Systems Design and Implementation (NSDI '09)","author":"Yang J.","year":"2009","unstructured":"J. Yang , T. Chen , M. Wu , Z. Xu , X. Liu , H. Lin , M. Yang , F. Long , L. Zhang , and L. Zhou . MODIST: Transparent model checking of unmodified distributed systems . In Proceedings of the Sixth Symposium on Networked Systems Design and Implementation (NSDI '09) , pages 213 -- 228 , Apr. 2009 . J. Yang, T. Chen, M. Wu, Z. Xu, X. Liu, H. Lin, M. Yang, F. Long, L. Zhang, and L. Zhou. MODIST: Transparent model checking of unmodified distributed systems. In Proceedings of the Sixth Symposium on Networked Systems Design and Implementation (NSDI '09), pages 213--228, Apr. 2009."},{"key":"e_1_3_2_2_68_1","volume-title":"the Fourth USENIX Workshop on Hot Topics in Parallelism (HOTPAR '12)","author":"Yang J.","year":"2012","unstructured":"J. Yang , A. Cui , S. Stolfo , and S. Sethumadhavan . Concurrency attacks . In the Fourth USENIX Workshop on Hot Topics in Parallelism (HOTPAR '12) , June 2012 . J. Yang, A. Cui, S. Stolfo, and S. Sethumadhavan. Concurrency attacks. In the Fourth USENIX Workshop on Hot Topics in Parallelism (HOTPAR '12), June 2012."},{"key":"e_1_3_2_2_69_1","volume-title":"the Fifth USENIX Workshop on Hot Topics in Parallelism (HOTPAR '13)","author":"Yang J.","year":"2013","unstructured":"J. Yang , H. Cui , and J. Wu . Determinism is over-rated: What really makes multithreaded programs hard to get right and what can be done about it? In the Fifth USENIX Workshop on Hot Topics in Parallelism (HOTPAR '13) , June 2013 . J. Yang, H. Cui, and J. Wu. Determinism is over-rated: What really makes multithreaded programs hard to get right and what can be done about it? In the Fifth USENIX Workshop on Hot Topics in Parallelism (HOTPAR '13), June 2013."},{"key":"e_1_3_2_2_70_1","volume-title":"Communications of the ACM","author":"Yang J.","year":"2014","unstructured":"J. Yang , H. Cui , J. Wu , Y. Tang , and G. Hu . Determinism is not enough: Making parallel programs reliable with stable multithreading . Communications of the ACM , 2014 . J. Yang, H. Cui, J. Wu, Y. Tang, and G. Hu. Determinism is not enough: Making parallel programs reliable with stable multithreading. Communications of the ACM, 2014."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095832"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736041"}],"event":{"name":"SOSP '13: ACM SIGOPS 24th Symposium on Operating Systems Principles","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"],"location":"Farminton Pennsylvania","acronym":"SOSP '13"},"container-title":["Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517349.2522735","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2517349.2522735","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:53Z","timestamp":1750231733000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517349.2522735"}},"subtitle":["a practical runtime for deterministic, stable, and reliable threads"],"short-title":[],"issued":{"date-parts":[[2013,11,3]]},"references-count":71,"alternative-id":["10.1145\/2517349.2522735","10.1145\/2517349"],"URL":"https:\/\/doi.org\/10.1145\/2517349.2522735","relation":{},"subject":[],"published":{"date-parts":[[2013,11,3]]},"assertion":[{"value":"2013-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}