{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:51:46Z","timestamp":1773773506137,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":64,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T00:00:00Z","timestamp":1415664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,11]]},"DOI":"10.1145\/2635868.2635918","type":"proceedings-article","created":{"date-parts":[[2014,11,4]],"date-time":"2014-11-04T21:44:36Z","timestamp":1415137476000},"page":"353-365","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":53,"title":["Sherlock: scalable deadlock detection for concurrent programs"],"prefix":"10.1145","author":[{"given":"Mahdi","family":"Eslamimehr","sequence":"first","affiliation":[{"name":"University of California at Los Angeles, USA"}]},{"given":"Jens","family":"Palsberg","sequence":"additional","affiliation":[{"name":"University of California at Los Angeles, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"PADTAD","author":"Agarwal R.","year":"2005","unstructured":"R. Agarwal , L. Wang , and S. D. Stoller . Detecting potential deadlocks with static analysis and runtime monitoring . In PADTAD , 2005 . R. Agarwal, L. Wang, and S. D. Stoller. Detecting potential deadlocks with static analysis and runtime monitoring. In PADTAD, 2005."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1449764.1449776"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/872024.872575"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167488"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985827"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/582419.582440"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736040"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.69"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180445"},{"key":"e_1_3_2_1_10_1","first-page":"616","volume-title":"International Conference on Software Engineering","author":"Cai Y.","year":"2012","unstructured":"Y. Cai and W. K. Chan . MagicFuzzer: Scalable deadlock detection for large-scale applications. In ICSE\u201912 , International Conference on Software Engineering , pages 606\u2013 616 , 2012 . Y. Cai and W. K. Chan. MagicFuzzer: Scalable deadlock detection for large-scale applications. In ICSE\u201912, International Conference on Software Engineering, pages 606\u2013616, 2012."},{"key":"e_1_3_2_1_11_1","article-title":"ASN: a dynamic barrier-based approach to confirmation of deadlocks from warnings for large-scale multithreaded programs","author":"Cai Y.","year":"2014","unstructured":"Y. Cai , C.J. Jia , S.R. Wu , K. Zhai , and W.K. Chan . ASN: a dynamic barrier-based approach to confirmation of deadlocks from warnings for large-scale multithreaded programs . IEEE Transactions on Parallel and Distributed Systems , 2014 . Y. Cai, C.J. Jia, S.R. Wu, K. Zhai, and W.K. Chan. ASN: a dynamic barrier-based approach to confirmation of deadlocks from warnings for large-scale multithreaded programs. IEEE Transactions on Parallel and Distributed Systems, 2014.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568312"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-005-0071-z"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199906)29:7%3C577::AID-SPE246%3E3.0.CO;2-V"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.14"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.654"},{"key":"e_1_3_2_1_17_1","unstructured":"ENEA. Jcarder. http:\/\/www.jcarder.org.  ENEA. Jcarder. http:\/\/www.jcarder.org."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945468"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2555243.2555263"},{"key":"e_1_3_2_1_20_1","volume-title":"PADTAD","author":"Farchi E.","year":"2005","unstructured":"E. Farchi , Y. Nir-Buchbinder , and S. Ur . A cross-run lock discipline checker for java . In PADTAD , 2005 . E. Farchi, Y. Nir-Buchbinder, and S. Ur. A cross-run lock discipline checker for java. In PADTAD, 2005."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/11817963_30"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040315"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512558"},{"key":"e_1_3_2_1_24_1","unstructured":"European Organization for Nuclear Research (CERN). Colt. http:\/\/acs.lbl.gov\/software\/colt\/.  European Organization for Nuclear Research (CERN). Colt. http:\/\/acs.lbl.gov\/software\/colt\/."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-06410-9_19"},{"key":"e_1_3_2_1_26_1","unstructured":"Apache Software Foundation. Derby. http:\/\/db.apache.org\/derby.  Apache Software Foundation. Derby. http:\/\/db.apache.org\/derby."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263717"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/645880.672085"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/s100090050043"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.588521"},{"key":"e_1_3_2_1_32_1","volume-title":"Proceedings of the PODC Workshop on Concurrency and Synchronization in Java Programs, 25\u201326","author":"Hovemeyer David","year":"2004","unstructured":"David Hovemeyer and William Pugh . Finding concurrency bugs in Java . In Proceedings of the PODC Workshop on Concurrency and Synchronization in Java Programs, 25\u201326 2004 . David Hovemeyer and William Pugh. Finding concurrency bugs in Java. In Proceedings of the PODC Workshop on Concurrency and Synchronization in Java Programs, 25\u201326 2004."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594330"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462167"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882339"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542489"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_49"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14295-6_39"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the USENIX Technical Conference","author":"Li T.","year":"2005","unstructured":"T. Li , C. S. Ellis , A. R. Lebeck , and D. J. Sorin . A dynamic deadlock detection mechanism using speculative execution . In Proceedings of the USENIX Technical Conference , 2005 . T. Li, C. S. Ellis, A. R. Lebeck, and D. J. Sorin. A dynamic deadlock detection mechanism using speculative execution. In Proceedings of the USENIX Technical Conference, 2005."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594311"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321653"},{"key":"e_1_3_2_1_42_1","volume-title":"International Conference on Software Engineering","author":"Marino Daniel","year":"2013","unstructured":"Daniel Marino , Christian Hammer , Julian Dolby , Mandana Vaziri , Frank Tip , and Jan Vitek . Detecting deadlock in programs with data-centric synchronization. In ICSE\u201913 , International Conference on Software Engineering , 2013 . Daniel Marino, Christian Hammer, Julian Dolby, Mandana Vaziri, Frank Tip, and Jan Vitek. Detecting deadlock in programs with data-centric synchronization. In ICSE\u201913, International Conference on Software Engineering, 2013."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/122759.122768"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070538"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134018"},{"key":"e_1_3_2_1_47_1","volume-title":"Workshop on Concurrency Issues in UML","author":"Newman Elissa","year":"2001","unstructured":"Elissa Newman , Aaron Greenhouse , and William Scherlis . Annotation-based diagrams for shared-data concurrency . In Workshop on Concurrency Issues in UML , 2001 . Elissa Newman, Aaron Greenhouse, and William Scherlis. Annotation-based diagrams for shared-data concurrency. In Workshop on Concurrency Issues in UML, 2001."},{"key":"e_1_3_2_1_48_1","unstructured":"Oracle. Java hotspot vm options. http:\/\/www.oracle.com\/technetwork\/java\/javase\/ tech\/vmoptions-jsp-140102.html.  Oracle. Java hotspot vm options. http:\/\/www.oracle.com\/technetwork\/java\/javase\/ tech\/vmoptions-jsp-140102.html."},{"key":"e_1_3_2_1_49_1","unstructured":"Oracle. The Java tutorials; deadlock. http:\/\/docs.oracle.com\/javase\/tutorial\/ essential\/concurrency\/deadlock.html.  Oracle. The Java tutorials; deadlock. http:\/\/docs.oracle.com\/javase\/tutorial\/ essential\/concurrency\/deadlock.html."},{"key":"e_1_3_2_1_50_1","unstructured":"Oracle. JDK 1.4.2. http:\/\/www.oracle.com\/ technetwork\/java\/javase\/index-jsp-138567.html.  Oracle. JDK 1.4.2. http:\/\/www.oracle.com\/ technetwork\/java\/javase\/index-jsp-138567.html."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509538"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/1986308.1986334"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2555243.2555262"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1176887.1176891"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321746"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/11817963_38"},{"key":"e_1_3_2_1_57_1","volume-title":"Maximal causal models for multithreaded systems. Technical report","author":"Serbanuta Traian Florin","unstructured":"Traian Florin Serbanuta , Feng Chen , and Grigore Rosu . Maximal causal models for multithreaded systems. Technical report , University of Illinois at Urbana-Champaign. Available from ideals.illinois.edu . Traian Florin Serbanuta, Feng Chen, and Grigore Rosu. Maximal causal models for multithreaded systems. Technical report, University of Illinois at Urbana-Champaign. Available from ideals.illinois.edu."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882300"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)80582-6"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985796"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/11531142_26"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.5555\/647476.727758"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/504282.504288"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54013-4_21"},{"key":"e_1_3_2_1_66_1","volume-title":"Proceedings of OSDI\u201908","author":"Wang Yin","year":"2008","unstructured":"Yin Wang , Terence Kelly , Manjunath Kudlur , Stephane Lafortune , and Scott Mahlke . Gadara : Dynamic deadlock avoidance for multithreaded programs . In Proceedings of OSDI\u201908 , 8th USENIX Symposium on Operating Systems Design and Implementation , 2008 . Yin Wang, Terence Kelly, Manjunath Kudlur, Stephane Lafortune, and Scott Mahlke. Gadara: Dynamic deadlock avoidance for multithreaded programs. In Proceedings of OSDI\u201908, 8th USENIX Symposium on Operating Systems Design and Implementation, 2008."}],"event":{"name":"SIGSOFT\/FSE'14: 22nd ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Hong Kong China","acronym":"SIGSOFT\/FSE'14","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2635868.2635918","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2635868.2635918","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:03:44Z","timestamp":1750273424000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2635868.2635918"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,11]]},"references-count":64,"alternative-id":["10.1145\/2635868.2635918","10.1145\/2635868"],"URL":"https:\/\/doi.org\/10.1145\/2635868.2635918","relation":{},"subject":[],"published":{"date-parts":[[2014,11,11]]},"assertion":[{"value":"2014-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}