{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,20]],"date-time":"2026-03-20T16:57:11Z","timestamp":1774025831325,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1145\/3009837.3009883","type":"proceedings-article","created":{"date-parts":[[2016,12,22]],"date-time":"2016-12-22T16:20:29Z","timestamp":1482423629000},"page":"3-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Ogre and Pythia: an invariance proof method for weak consistency models"],"prefix":"10.1145","author":[{"given":"Jade","family":"Alglave","sequence":"first","affiliation":[{"name":"Microsoft Research, UK \/ University College London, UK"}]},{"given":"Patrick","family":"Cousot","sequence":"additional","affiliation":[{"name":"New York University, USA \/ ENS, France"}]}],"member":"320","published-online":{"date-parts":[[2017,1]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(91)90224-P"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01784241"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-012-0161-5"},{"key":"e_1_3_2_1_5_1","volume-title":"Syntax and analytic semantics of LISA. CoRR, abs\/1608.06583","author":"Alglave J.","year":"2016","unstructured":"J. Alglave and P. Cousot . Syntax and analytic semantics of LISA. CoRR, abs\/1608.06583 , 2016 . J. Alglave and P. Cousot. Syntax and analytic semantics of LISA. CoRR, abs\/1608.06583, 2016."},{"key":"e_1_3_2_1_6_1","volume-title":"herd7. virginia.cs.ucl.ac.uk\/herd","author":"Alglave J.","year":"2015","unstructured":"J. Alglave and L. Maranget . herd7. virginia.cs.ucl.ac.uk\/herd , 31 Aug. 2015 . J. Alglave and L. Maranget. herd7. virginia.cs.ucl.ac.uk\/herd, 31 Aug. 2015."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37036-6_28"},{"key":"e_1_3_2_1_8_1","volume-title":"Syntax and semantics of the weak consistency model specification language cat. CoRR, abs\/1608.07531","author":"Alglave J.","year":"2016","unstructured":"J. Alglave , P. Cousot , and L. Maranget . Syntax and semantics of the weak consistency model specification language cat. CoRR, abs\/1608.07531 , 2016 . J. Alglave, P. Cousot, and L. Maranget. Syntax and semantics of the weak consistency model specification language cat. CoRR, abs\/1608.07531, 2016."},{"key":"e_1_3_2_1_9_1","volume-title":"ACM POPL 2010, 7\u201318. M. F. Atig, A. Bouajjani, and G. Parlato. Getting rid of store-buffers in TSO analysis. CAV 2011, LNCS 6806","author":"Atig M. F.","year":"2011","unstructured":"M. F. Atig , A. Bouajjani , S. Burckhardt , and M. Musuvathi . On the verification problem for weak memory models . ACM POPL 2010, 7\u201318. M. F. Atig, A. Bouajjani, and G. Parlato. Getting rid of store-buffers in TSO analysis. CAV 2011, LNCS 6806 , 99\u2013115. Springer , 2011 . M. F. Atig, A. Bouajjani, S. Burckhardt, and M. Musuvathi. On the verification problem for weak memory models. ACM POPL 2010, 7\u201318. M. F. Atig, A. Bouajjani, and G. Parlato. Getting rid of store-buffers in TSO analysis. CAV 2011, LNCS 6806, 99\u2013115. Springer, 2011."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01888227"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89330-1_6"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2429069.2429099"},{"key":"e_1_3_2_1_13_1","volume-title":"New lace and arsenic: adventures in weak memory with a program logic. CoRR, abs\/1512.01416","author":"Bornat R.","year":"2015","unstructured":"R. Bornat , J. Alglave , and M. J. Parkinson . New lace and arsenic: adventures in weak memory with a program logic. CoRR, abs\/1512.01416 , 2015 . R. Bornat, J. Alglave, and M. J. Parkinson. New lace and arsenic: adventures in weak memory with a program logic. CoRR, abs\/1512.01416, 2015."},{"key":"e_1_3_2_1_14_1","first-page":"19","article-title":"Relaxed operational semantics of concurrent programming languages","volume":"2012","author":"Boudol G.","year":"2012","unstructured":"G. Boudol , G. Petri , and B. P. Serpette . Relaxed operational semantics of concurrent programming languages . EXPRESS\/SOS 2012 , 19 \u2013 33 , 2012 . G. Boudol, G. Petri, and B. P. Serpette. Relaxed operational semantics of concurrent programming languages. EXPRESS\/SOS 2012, 19\u201333, 2012.","journal-title":"EXPRESS\/SOS"},{"key":"e_1_3_2_1_15_1","volume-title":"A denotational approach to weak memory concurrency. MFPS XXXII","author":"Brookes S. D.","year":"2016","unstructured":"S. D. Brookes . A denotational approach to weak memory concurrency. MFPS XXXII , LNCS. Springer , 2016 . S. D. Brookes. A denotational approach to weak memory concurrency. MFPS XXXII, LNCS. Springer, 2016."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70545-1_12"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11817963_45"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250737"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1093\/logcom\/exm030"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1137\/0207005"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1137\/0210045"},{"key":"e_1_3_2_1_22_1","volume-title":"Program Flow Analysis: Theory and Applications, 303\u2013342","author":"Cousot P.","year":"1981","unstructured":"P. Cousot . Semantic foundations of program analysis . In Program Flow Analysis: Theory and Applications, 303\u2013342 , Prentice-Hall , 1981 . P. Cousot. Semantic foundations of program analysis. In Program Flow Analysis: Theory and Applications, 303\u2013342, Prentice-Hall, 1981."},{"key":"e_1_3_2_1_23_1","volume-title":"Institut National Polytechnique de Lorraine","author":"Cousot P.","year":"1980","unstructured":"P. Cousot and R. Cousot . Reasoning about program invariance proof methods. Res. rep. CRIN-80-P050, Centre de Recherche en Informatique de Nancy (CRIN) , Institut National Polytechnique de Lorraine , Nancy, France , July 1980 . P. Cousot and R. Cousot. Reasoning about program invariance proof methods. Res. rep. CRIN-80-P050, Centre de Recherche en Informatique de Nancy (CRIN), Institut National Polytechnique de Lorraine, Nancy, France, July 1980."},{"key":"e_1_3_2_1_24_1","volume-title":"CUP","author":"Cousot P.","year":"1982","unstructured":"P. Cousot and R. Cousot . Induction principles for proving invariance properties of programs. In Tools &amp; Notions for Program Construction: an Advanced Course, 75\u2013119 . CUP , Cambridge, UK , 1982 . P. Cousot and R. Cousot. Induction principles for proving invariance properties of programs. In Tools &amp; Notions for Program Construction: an Advanced Course, 75\u2013119. CUP, Cambridge, UK, 1982."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2009.07.040"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46081-8_25"},{"key":"e_1_3_2_1_27_1","volume-title":"ECOOP 2010","author":"D\u2019Hondt T.","year":"2010","unstructured":"T. D\u2019Hondt , editor. ECOOP 2010 , LNCS 6183, 2010 . Springer. T. D\u2019Hondt, editor. ECOOP 2010, LNCS 6183, 2010. Springer."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-49122-5_20"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2429069.2429086"},{"key":"e_1_3_2_1_30_1","volume-title":"ACM Proceedings of POPL","author":"Giacobazzi R.","year":"2013","unstructured":"R. Giacobazzi and R. Cousot , editors . ACM Proceedings of POPL 2013 . R. Giacobazzi and R. Cousot, editors. ACM Proceedings of POPL 2013."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837625"},{"key":"e_1_3_2_1_32_1","volume-title":"ACM Proceedings of OOPSLA","author":"Hosking A. L.","year":"2013","unstructured":"A. L. Hosking , P. T. Eugster , and C. V. Lopes , editors . ACM Proceedings of OOPSLA 2013 . A. L. Hosking, P. T. Eugster, and C. V. Lopes, editors. ACM Proceedings of OOPSLA 2013."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2951913.2951943"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-47666-6_25"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.229904"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1979.1675439"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/12.599898"},{"key":"e_1_3_2_1_38_1","volume-title":"Static analysis of run-time errors in embedded real-time parallel C programs. Logical Methods in Computer Science, 8(1)","author":"Min\u00e9 A.","year":"2012","unstructured":"A. Min\u00e9 . Static analysis of run-time errors in embedded real-time parallel C programs. Logical Methods in Computer Science, 8(1) , 2012 . A. Min\u00e9. Static analysis of run-time errors in embedded real-time parallel C programs. Logical Methods in Computer Science, 8(1), 2012."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-54013-4_3"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/1763507.1763565"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/1775223.1775241"},{"key":"e_1_3_2_1_42_1","first-page":"1","article-title":"The CISE tool: proving weakly-consistent applications correct","volume":"2016","author":"Najafzadeh M.","unstructured":"M. Najafzadeh , A. Gotsman , H. Yang , C. Ferreira , and M. Shapiro . The CISE tool: proving weakly-consistent applications correct . ACM PaPo-CEuroSys 2016 , 2: 1 \u2013 2 :3. P. Naur. Proofs of algorithms by general snapshots. BIT, 6:310\u2013316, 1966. M. Najafzadeh, A. Gotsman, H. Yang, C. Ferreira, and M. Shapiro. The CISE tool: proving weakly-consistent applications correct. ACM PaPo-CEuroSys 2016, 2:1\u20132:3. P. Naur. Proofs of algorithms by general snapshots. BIT, 6:310\u2013316, 1966.","journal-title":"ACM PaPo-CEuroSys"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2006.12.035"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00268134"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","DOI":"10.1145\/1040305","volume-title":"ACM Proceedings of POPL","author":"Palsberg J.","year":"2005","unstructured":"J. Palsberg and M. Abadi , editors . ACM Proceedings of POPL 2005 . J. Palsberg and M. Abadi, editors. ACM Proceedings of POPL 2005."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(81)90106-X"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31980-1_9"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040317"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/42190.42277"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46669-8_30"},{"key":"e_1_3_2_1_51_1","unstructured":"Supported in part by NSF Grant CCF-1617717.  Supported in part by NSF Grant CCF-1617717."}],"event":{"name":"POPL '17: The 44th Annual ACM SIGPLAN Symposium on Principles of Programming Languages","location":"Paris France","acronym":"POPL '17","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGLOG ACM Special Interest Group on Logic and Computation","SIGACT ACM Special Interest Group on Algorithms and Computation Theory"]},"container-title":["Proceedings of the 44th ACM SIGPLAN Symposium on Principles of Programming Languages"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3009837.3009883","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3009837.3009883","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:05:34Z","timestamp":1750259134000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3009837.3009883"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,1]]},"references-count":50,"alternative-id":["10.1145\/3009837.3009883","10.1145\/3009837"],"URL":"https:\/\/doi.org\/10.1145\/3009837.3009883","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3093333.3009883","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2017,1]]},"assertion":[{"value":"2017-01-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}