{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:28:58Z","timestamp":1750220938194,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":72,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T00:00:00Z","timestamp":1559952000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100002418","name":"Intel Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100002418","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000028","name":"Semiconductor Research Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100000028","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,8]]},"DOI":"10.1145\/3314221.3314644","type":"proceedings-article","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T21:02:18Z","timestamp":1559941338000},"page":"453-468","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":4,"title":["Huron: hybrid false sharing detection and repair"],"prefix":"10.1145","author":[{"given":"Tanvir Ahmed","family":"Khan","sequence":"first","affiliation":[{"name":"University of Michigan, USA"}]},{"given":"Yifan","family":"Zhao","sequence":"additional","affiliation":[{"name":"University of Michigan, USA"}]},{"given":"Gilles","family":"Pokam","sequence":"additional","affiliation":[{"name":"Intel, USA"}]},{"given":"Barzan","family":"Mozafari","sequence":"additional","affiliation":[{"name":"University of Michigan, USA"}]},{"given":"Baris","family":"Kasikci","sequence":"additional","affiliation":[{"name":"University of Michigan, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,6,8]]},"reference":[{"key":"e_1_3_2_2_1_1","first-page":"265","article-title":"Tensorflow: a system for large-scale machine learning","volume":"16","author":"Abadi Mart\u00edn","year":"2016","unstructured":"Mart\u00edn Abadi , Paul Barham , Jianmin Chen , Zhifeng Chen , Andy Davis , Jeffrey Dean , Matthieu Devin , Sanjay Ghemawat , Geoffrey Irving , Michael Isard , 2016 . Tensorflow: a system for large-scale machine learning .. In OSDI , Vol. 16. 265 \u2013 283 . Mart\u00edn Abadi, Paul Barham, Jianmin Chen, Zhifeng Chen, Andy Davis, Jeffrey Dean, Matthieu Devin, Sanjay Ghemawat, Geoffrey Irving, Michael Isard, et al. 2016. Tensorflow: a system for large-scale machine learning.. In OSDI, Vol. 16. 265\u2013283.","journal-title":"OSDI"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/173262.155101"},{"key":"e_1_3_2_2_4_1","volume-title":"Carl-Inge Colombo Nilsen, Andreas Austeng, and Sverre Holm.","author":"Asen Jon Petter","year":"2014","unstructured":"Jon Petter Asen , Jo Inge Buskenes , Carl-Inge Colombo Nilsen, Andreas Austeng, and Sverre Holm. 2014 . Implementing capon beamforming on a GP U for real-time cardiac ultrasound imaging. IEEE transactions on ultrasonics, ferroelectrics, and frequency control 61, 1 (2014), 76\u201385. Jon Petter Asen, Jo Inge Buskenes, Carl-Inge Colombo Nilsen, Andreas Austeng, and Sverre Holm. 2014. Implementing capon beamforming on a GP U for real-time cardiac ultrasound imaging. IEEE transactions on ultrasonics, ferroelectrics, and frequency control 61, 1 (2014), 76\u201385."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.467577"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639949.1640096"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2008.4636090"},{"key":"e_1_3_2_2_8_1","volume-title":"Proceedings of the Fourth symposium on Experiences with distributed and multiprocessor systems.","author":"Bolosky William J","year":"1993","unstructured":"William J Bolosky and Michael L Scott . 1993 . False sharing and its effect on shared memory performance . In Proceedings of the Fourth symposium on Experiences with distributed and multiprocessor systems. William J Bolosky and Michael L Scott. 1993. False sharing and its effect on shared memory performance. In Proceedings of the Fourth symposium on Experiences with distributed and multiprocessor systems."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178487.3178499"},{"key":"e_1_3_2_2_10_1","volume-title":"Andersen\u2019s inclusion-based pointer analysis reimplementation in LLVM. https:\/\/github.com\/grievejia\/andersen . {Online","author":"Chen Jia","year":"2018","unstructured":"Jia Chen . 2018. Andersen\u2019s inclusion-based pointer analysis reimplementation in LLVM. https:\/\/github.com\/grievejia\/andersen . {Online ; accessed 16- Nov- 2018 }. Jia Chen. 2018. Andersen\u2019s inclusion-based pointer analysis reimplementation in LLVM. https:\/\/github.com\/grievejia\/andersen . {Online; accessed 16-Nov-2018}."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.08.038"},{"key":"e_1_3_2_2_12_1","first-page":"571","article-title":"Project Adam: Building an Efficient and Scalable Deep Learning Training System","volume":"14","author":"Chilimbi Trishul M","year":"2014","unstructured":"Trishul M Chilimbi , Yutaka Suzue , Johnson Apacible , and Karthik Kalyanaraman . 2014 . Project Adam: Building an Efficient and Scalable Deep Learning Training System .. In OSDI , Vol. 14. 571 \u2013 582 . Trishul M Chilimbi, Yutaka Suzue, Johnson Apacible, and Karthik Kalyanaraman. 2014. Project Adam: Building an Efficient and Scalable Deep Learning Training System.. In OSDI, Vol. 14. 571\u2013582.","journal-title":"OSDI"},{"key":"e_1_3_2_2_13_1","volume-title":"Parallel Processing, 1997., Proceedings of the 1997 International Conference on. IEEE, 396\u2013 403","author":"Chow Jyh-Herng","year":"1997","unstructured":"Jyh-Herng Chow and Vivek Sarkar . 1997 . False sharing elimination by selection of runtime scheduling parameters . In Parallel Processing, 1997., Proceedings of the 1997 International Conference on. IEEE, 396\u2013 403 . Jyh-Herng Chow and Vivek Sarkar. 1997. False sharing elimination by selection of runtime scheduling parameters. In Parallel Processing, 1997., Proceedings of the 1997 International Conference on. IEEE, 396\u2013 403."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2754169.2754181"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2768405.2768407"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2345156.2254076"},{"key":"e_1_3_2_2_17_1","volume-title":"Multithreaded input-sensitive profiling. arXiv preprint arXiv:1304.3804","author":"Coppa Emilio","year":"2013","unstructured":"Emilio Coppa , Camil Demetrescu , Irene Finocchi , and Romolo Marotta . 2013. Multithreaded input-sensitive profiling. arXiv preprint arXiv:1304.3804 ( 2013 ). Emilio Coppa, Camil Demetrescu, Irene Finocchi, and Romolo Marotta. 2013. Multithreaded input-sensitive profiling. arXiv preprint arXiv:1304.3804 (2013)."},{"key":"e_1_3_2_2_18_1","volume-title":"Combined Volumes","author":"Intel Corp","year":"2016","unstructured":"Intel Corp aration. 2016 . Intel (R) 64 and IA-32 Architectures Software Developer\u2019s Manual . Combined Volumes , Dec (2016). Intel Corparation. 2016. Intel (R) 64 and IA-32 Architectures Software Developer\u2019s Manual. Combined Volumes, Dec (2016)."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660193.2660210"},{"key":"e_1_3_2_2_20_1","unstructured":"Jeffrey Dean Greg Corrado Rajat Monga Kai Chen Matthieu Devin Mark Mao Andrew Senior Paul Tucker Ke Yang Quoc V Le etal 2012. Large scale distributed deep networks. In Advances in neural information processing systems. 1223\u20131231.  Jeffrey Dean Greg Corrado Rajat Monga Kai Chen Matthieu Devin Mark Mao Andrew Senior Paul Tucker Ke Yang Quoc V Le et al. 2012. Large scale distributed deep networks. In Advances in neural information processing systems. 1223\u20131231."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3123939.3123947"},{"key":"e_1_3_2_2_22_1","volume-title":"False sharing induced by card table marking. https:\/\/blogs.oracle.com\/dave\/ false-sharing-induced-by-card-table-marking . {Online","author":"Dice David","year":"2018","unstructured":"David Dice . 2011. False sharing induced by card table marking. https:\/\/blogs.oracle.com\/dave\/ false-sharing-induced-by-card-table-marking . {Online ; last accessed 05- August - 2018 }. David Dice. 2011. False sharing induced by card table marking. https:\/\/blogs.oracle.com\/dave\/ false-sharing-induced-by-card-table-marking . {Online; last accessed 05-August-2018}."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2637364.2591992"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908090"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-11515-8_8"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064177"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2024723.2000084"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1791194.1791198"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908123"},{"volume-title":"Tutorial: Identifying False Sharing - C Sample Code. https: \/\/software.intel.com\/en-us\/vtune-memory-access-tutorial-linux-c","year":"2017","key":"e_1_3_2_2_30_1","unstructured":"Intel. 2017 . Tutorial: Identifying False Sharing - C Sample Code. https: \/\/software.intel.com\/en-us\/vtune-memory-access-tutorial-linux-c Intel. 2017. Tutorial: Identifying False Sharing - C Sample Code. https: \/\/software.intel.com\/en-us\/vtune-memory-access-tutorial-linux-c"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2503210.2503269"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/209937.209955"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2004.70"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/648048.745879"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/850940.852827"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/645608.661983"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/646663.700129"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/520793.825717"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/371636.371733"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/224170.224495"},{"key":"e_1_3_2_2_41_1","volume-title":"Fleisch","author":"Hyde Randall L.","year":"1996","unstructured":"Randall L. Hyde and Brett D . Fleisch . 1996 . An Analysis of Degenerate Sharing and False Coherence . 34 (05 1996), 183\u2013195. Randall L. Hyde and Brett D. Fleisch. 1996. An Analysis of Degenerate Sharing and False Coherence. 34 (05 1996), 183\u2013195."},{"key":"e_1_3_2_2_42_1","volume-title":"The BSD conference. 1\u20132.","author":"Lattner Chris","year":"2008","unstructured":"Chris Lattner . 2008 . LLVM and Clang: Next generation compiler technology . In The BSD conference. 1\u20132. Chris Lattner. 2008. LLVM and Clang: Next generation compiler technology. In The BSD conference. 1\u20132."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2012.97"},{"key":"e_1_3_2_2_45_1","volume-title":"False sharing analysis for multithreaded programs. Master\u2019s thesis","author":"Liu CL","year":"2009","unstructured":"CL Liu . 2009. False sharing analysis for multithreaded programs. Master\u2019s thesis , National Chung Cheng University ( 2009 ). CL Liu. 2009. False sharing analysis for multithreaded programs. Master\u2019s thesis, National Chung Cheng University (2009)."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076021.2048070"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2854038.2854039"},{"volume-title":"Proceedings of the 19th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP \u201914)","author":"Liu Tongping","key":"e_1_3_2_2_48_1","unstructured":"Tongping Liu , Chen Tian , Ziang Hu , and Emery D. Berger . 2014. PREDATOR: Predictive False Sharing Detection . In Proceedings of the 19th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP \u201914) . ACM, New York, NY, USA, 3\u201314. Tongping Liu, Chen Tian, Ziang Hu, and Emery D. Berger. 2014. PREDATOR: Predictive False Sharing Detection. In Proceedings of the 19th ACM SIGPLAN Symposium on Principles and Practice of Parallel Programming (PPoPP \u201914). ACM, New York, NY, USA, 3\u201314."},{"key":"e_1_3_2_2_49_1","volume-title":"Proceedings of the Twelfth European Conference on Computer Systems. ACM, 298\u2013313","author":"Liu Tongping","year":"2017","unstructured":"Tongping Liu , Guangming Zeng , Abdullah Muzahid , 2017 . Syncperf: Categorizing, detecting, and diagnosing synchronization performance bugs . In Proceedings of the Twelfth European Conference on Computer Systems. ACM, 298\u2013313 . Tongping Liu, Guangming Zeng, Abdullah Muzahid, et al. 2017. Syncperf: Categorizing, detecting, and diagnosing synchronization performance bugs. In Proceedings of the Twelfth European Conference on Computer Systems. ACM, 298\u2013313."},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065034"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446070"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.982916"},{"key":"e_1_3_2_2_53_1","volume-title":"C2C - False Sharing Detection in Linux Perf. https: \/\/joemario.github.io\/blog\/2016\/09\/01\/c2c-blog\/ . {Online","author":"Mario Joe","year":"2018","unstructured":"Joe Mario . 2016. C2C - False Sharing Detection in Linux Perf. https: \/\/joemario.github.io\/blog\/2016\/09\/01\/c2c-blog\/ . {Online ; last accessed 04- August - 2018 }. Joe Mario. 2016. C2C - False Sharing Detection in Linux Perf. https: \/\/joemario.github.io\/blog\/2016\/09\/01\/c2c-blog\/ . {Online; last accessed 04-August-2018}."},{"volume-title":"Advances in Computers.","author":"Mars Jason","key":"e_1_3_2_2_54_1","unstructured":"Jason Mars and Lingjia Tang . 2013. Understanding application contentiousness and sensitivity on modern multicores . In Advances in Computers. Vol. 91 . Elsevier , 59\u201385. Jason Mars and Lingjia Tang. 2013. Understanding application contentiousness and sensitivity on modern multicores. In Advances in Computers. Vol. 91. Elsevier, 59\u201385."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2366231.2337173"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2983941"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465366"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250746"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486862"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755947"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2007.346181"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503287"},{"key":"e_1_3_2_2_63_1","volume-title":"Analysis of cache misses using SIMICS. Master\u2019s thesis","author":"Schindewolf Martin","year":"2007","unstructured":"Martin Schindewolf . 2007. Analysis of cache misses using SIMICS. Master\u2019s thesis ( 2007 ). Martin Schindewolf. 2007. Analysis of cache misses using SIMICS. Master\u2019s thesis (2007)."},{"key":"e_1_3_2_2_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1030083.1030124"},{"key":"e_1_3_2_2_65_1","volume-title":"Code Generation and Optimization, 2004. CGO 2004. International Symposium on. IEEE, 291\u2013302","author":"So Byoungro","year":"2004","unstructured":"Byoungro So , Mary W Hall , and Heidi E Ziegler . 2004 . Custom data layout for memory parallelism . In Code Generation and Optimization, 2004. CGO 2004. International Symposium on. IEEE, 291\u2013302 . Byoungro So, Mary W Hall, and Heidi E Ziegler. 2004. Custom data layout for memory parallelism. In Code Generation and Optimization, 2004. CGO 2004. International Symposium on. IEEE, 291\u2013302."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/2028905"},{"key":"e_1_3_2_2_67_1","volume-title":"Eliminate false sharing. Dr. Dobb\u2019s Journal 5","author":"Sutter Herb","year":"2009","unstructured":"Herb Sutter . 2009. Eliminate false sharing. Dr. Dobb\u2019s Journal 5 ( 2009 ). Herb Sutter. 2009. Eliminate false sharing. Dr. Dobb\u2019s Journal 5 (2009)."},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/169627.169762"},{"volume-title":"d.}. Atomic operations library. https:\/\/en.cppreference. com\/w\/cpp\/atomic . {Online","year":"2018","key":"e_1_3_2_2_69_1","unstructured":"WikiSysop. {n. d.}. Atomic operations library. https:\/\/en.cppreference. com\/w\/cpp\/atomic . {Online ; last accessed 07- August - 2018 }. WikiSysop. {n. d.}. Atomic operations library. https:\/\/en.cppreference. com\/w\/cpp\/atomic . {Online; last accessed 07-August-2018}."},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/263767.263796"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9578-1"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2011.20"},{"key":"e_1_3_2_2_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952682.1952688"}],"event":{"name":"PLDI '19: 40th ACM SIGPLAN Conference on Programming Language Design and Implementation","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Phoenix AZ USA","acronym":"PLDI '19"},"container-title":["Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314221.3314644","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314221.3314644","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314221.3314644","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:29Z","timestamp":1750204409000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314221.3314644"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,8]]},"references-count":72,"alternative-id":["10.1145\/3314221.3314644","10.1145\/3314221"],"URL":"https:\/\/doi.org\/10.1145\/3314221.3314644","relation":{},"subject":[],"published":{"date-parts":[[2019,6,8]]},"assertion":[{"value":"2019-06-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}