{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,24]],"date-time":"2025-08-24T01:48:59Z","timestamp":1756000139090,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":12,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,18]],"date-time":"2020-07-18T00:00:00Z","timestamp":1595030400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Natural Science Foundation of China","award":["61802166"],"award-info":[{"award-number":["61802166"]}]},{"name":"National Natural Science Foundation of Hebei","award":["18960106D"],"award-info":[{"award-number":["18960106D"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,18]]},"DOI":"10.1145\/3395363.3404368","type":"proceedings-article","created":{"date-parts":[[2020,7,13]],"date-time":"2020-07-13T21:44:18Z","timestamp":1594676658000},"page":"565-568","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["FineLock: automatically refactoring coarse-grained locks into fine-grained locks"],"prefix":"10.1145","author":[{"given":"Yang","family":"Zhang","sequence":"first","affiliation":[{"name":"Hebei University of Science and Technology, China"}]},{"given":"Shuai","family":"Shao","sequence":"additional","affiliation":[{"name":"Hebei University of Science and Technology, China"}]},{"given":"Juan","family":"Zhai","sequence":"additional","affiliation":[{"name":"Rutgers University, USA"}]},{"given":"Shiqing","family":"Ma","sequence":"additional","affiliation":[{"name":"Rutgers University, USA"}]}],"member":"320","published-online":{"date-parts":[[2020,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apache. 2019. Cassandra. https:\/\/cassandra.apache.org\/  Apache. 2019. Cassandra. https:\/\/cassandra.apache.org\/"},{"key":"e_1_3_2_1_2_1","unstructured":"Bela Ban. 2019. JGroups. http:\/\/www.jgroups.org\/  Bela Ban. 2019. JGroups. http:\/\/www.jgroups.org\/"},{"key":"e_1_3_2_1_3_1","unstructured":"Standard Performance Evaluation Corporation. 2013. SPECjbb2005. https:\/\/www. spec.org\/jbb2005\/  Standard Performance Evaluation Corporation. 2013. SPECjbb2005. https:\/\/www. spec.org\/jbb2005\/"},{"key":"e_1_3_2_1_4_1","unstructured":"Eclipse. 2020. Eclipse Java development tools. https:\/\/www.eclipse.org\/jdt\/  Eclipse. 2020. Eclipse Java development tools. https:\/\/www.eclipse.org\/jdt\/"},{"key":"e_1_3_2_1_5_1","unstructured":"Hypersonic SQL Group. 2019. HSQLDB-100 % Java Database. http:\/\/hsqldb.org\/  Hypersonic SQL Group. 2019. HSQLDB-100 % Java Database. http:\/\/hsqldb.org\/"},{"key":"e_1_3_2_1_6_1","unstructured":"IBM. 2018. The t. j. watson libraries for analysis. http:\/\/wala.sourceforge.net\/ wiki\/index.php\/Main_Pag  IBM. 2018. The t. j. watson libraries for analysis. http:\/\/wala.sourceforge.net\/ wiki\/index.php\/Main_Pag"},{"key":"e_1_3_2_1_7_1","unstructured":"Kohsuke Kawaguchi. 2019. Jenkins. https:\/\/jenkins.io\/  Kohsuke Kawaguchi. 2019. Jenkins. https:\/\/jenkins.io\/"},{"volume-title":"Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages. Association for Computing Machinery, 346-358","author":"McCloskey B.","key":"e_1_3_2_1_8_1","unstructured":"B. McCloskey , F. Zhou , D. Gay , and E. A. Brewer . 2006. Autolocker: synchronization inference for atomic sections . In Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages. Association for Computing Machinery, 346-358 . B. McCloskey, F. Zhou, D. Gay, and E. A. Brewer. 2006. Autolocker: synchronization inference for atomic sections. In Conference record of the 33rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages. Association for Computing Machinery, 346-358."},{"key":"e_1_3_2_1_9_1","unstructured":"Benjamin Muskalla. 2008. Concurrency-related refactorings for JDT. https: \/\/wiki.eclipse.org\/Concurrency-related_refactorings_for_JDT  Benjamin Muskalla. 2008. Concurrency-related refactorings for JDT. https: \/\/wiki.eclipse.org\/Concurrency-related_refactorings_for_JDT"},{"volume-title":"Proceedings of the 33rd International Conference on Software Engineering. ACM, 71-80","author":"Sch\u00e4fer M.","key":"e_1_3_2_1_10_1","unstructured":"M. Sch\u00e4fer , M. Sridharan , J. Dolby , and F. Tip . 2011. Refactoring Java programs for flexible locking . In Proceedings of the 33rd International Conference on Software Engineering. ACM, 71-80 . M. Sch\u00e4fer, M. Sridharan, J. Dolby, and F. Tip. 2011. Refactoring Java programs for flexible locking. In Proceedings of the 33rd International Conference on Software Engineering. ACM, 71-80."},{"key":"e_1_3_2_1_11_1","unstructured":"Sixth and Red River Software. 2007. Locksmith. https:\/\/plugins.jetbrains.com\/ plugin\/1358-locksmith  Sixth and Red River Software. 2007. Locksmith. https:\/\/plugins.jetbrains.com\/ plugin\/1358-locksmith"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Y. Zhang S. Dong X. Zhang H. Liu and D. Zhang. 2019. Automated Refactoring for Stampedlock. IEEE Access 7 1 ( 2019 ) 104900-104911.  Y. Zhang S. Dong X. Zhang H. Liu and D. Zhang. 2019. Automated Refactoring for Stampedlock. IEEE Access 7 1 ( 2019 ) 104900-104911.","DOI":"10.1109\/ACCESS.2019.2931953"}],"event":{"name":"ISSTA '20: 29th ACM SIGSOFT International Symposium on Software Testing and Analysis","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Virtual Event USA","acronym":"ISSTA '20"},"container-title":["Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395363.3404368","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3395363.3404368","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:45Z","timestamp":1750199925000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3395363.3404368"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,18]]},"references-count":12,"alternative-id":["10.1145\/3395363.3404368","10.1145\/3395363"],"URL":"https:\/\/doi.org\/10.1145\/3395363.3404368","relation":{},"subject":[],"published":{"date-parts":[[2020,7,18]]},"assertion":[{"value":"2020-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}