{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:51:46Z","timestamp":1773193906285,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":105,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,6,9]],"date-time":"2022-06-09T00:00:00Z","timestamp":1654732800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,6,9]]},"DOI":"10.1145\/3519939.3523723","type":"proceedings-article","created":{"date-parts":[[2022,6,2]],"date-time":"2022-06-02T21:05:05Z","timestamp":1654203905000},"page":"490-505","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Checking robustness to weak persistency models"],"prefix":"10.1145","author":[{"given":"Hamed","family":"Gorjiara","sequence":"first","affiliation":[{"name":"University of California at Irvine, USA"}]},{"given":"Weiyu","family":"Luo","sequence":"additional","affiliation":[{"name":"University of California at Irvine, USA"}]},{"given":"Alex","family":"Lee","sequence":"additional","affiliation":[{"name":"University of California at Irvine, USA"}]},{"given":"Guoqing Harry","family":"Xu","sequence":"additional","affiliation":[{"name":"University of California at Los Angeles, USA"}]},{"given":"Brian","family":"Demsky","sequence":"additional","affiliation":[{"name":"University of California at Irvine, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,6,9]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-010-9172-3"},{"key":"e_1_3_2_2_2_1","unstructured":"ARM. 2021. Arm Architecture Reference Manual Armv8 for A-profile architecture. https:\/\/developer.arm.com\/documentation\/ddi0487\/latest  ARM. 2021. Arm Architecture Reference Manual Armv8 for A-profile architecture. https:\/\/developer.arm.com\/documentation\/ddi0487\/latest"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3054780"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001423"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2926697.2926704"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWAST.2009.5069043"},{"key":"e_1_3_2_2_7_1","unstructured":"Ahmed Bouajjani Roland Meyer and Eike M\u00f6hlmann. 2011. Deciding Robustness against Total Store Ordering. 428\u2013440. isbn:978-3-642-22012-8  Ahmed Bouajjani Roland Meyer and Eike M\u00f6hlmann. 2011. Deciding Robustness against Total Store Ordering. 428\u2013440. isbn:978-3-642-22012-8"},{"key":"e_1_3_2_2_8_1","unstructured":"Bill Bridge. 2021. Nvm-direct library. https:\/\/github.com\/oracle\/nvm-direct  Bill Bridge. 2021. Nvm-direct library. https:\/\/github.com\/oracle\/nvm-direct"},{"key":"e_1_3_2_2_9_1","volume-title":"KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. OSDI\u201908. 209\u2013224.","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , and Dawson Engler . 2008 . KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. OSDI\u201908. 209\u2013224. Cristian Cadar, Daniel Dunbar, and Dawson Engler. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. OSDI\u201908. 209\u2013224."},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455518.1455522"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"Daniel Castro Paolo Romano and Jo\u00e3o Barreto. 2018. Hardware transactional memory meets memory persistency. IPDPS \u201918. 368\u2013377.  Daniel Castro Paolo Romano and Jo\u00e3o Barreto. 2018. Hardware transactional memory meets memory persistency. IPDPS \u201918. 368\u2013377.","DOI":"10.1109\/IPDPS.2018.00046"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394025"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660193.2660224"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.14778\/2752939.2752947"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/NVMSA.2017.8064478"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378515"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3204454"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950380"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378481"},{"key":"e_1_3_2_2_20_1","unstructured":"Inc. Danga Interactive. 2018. Memcached. https:\/\/github.com\/lenovo\/memcached-pmem  Inc. Danga Interactive. 2018. Memcached. https:\/\/github.com\/lenovo\/memcached-pmem"},{"key":"e_1_3_2_2_21_1","unstructured":"Tudor David Aleksandar Dragojevi\u0107 Rachid Guerraoui and Igor Zablotchi. 2018. Log-Free Concurrent Data Structures. USENIX ATC \u201918. 373\u2013385. isbn:9781931971447  Tudor David Aleksandar Dragojevi\u0107 Rachid Guerraoui and Igor Zablotchi. 2018. Log-Free Concurrent Data Structures. USENIX ATC \u201918. 373\u2013385. isbn:9781931971447"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446744"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592814"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA51647.2021.00021"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542490"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO50266.2020.00015"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453483.3454105"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3477132.3483556"},{"key":"e_1_3_2_2_29_1","unstructured":"Ning Gao Zhang Liu and Dirk Grunwald. 2017. DTranx: A SEDA-based Distributed and Transactional Key Value Store with Persistent Memory Log. arxiv:1711.09543.  Ning Gao Zhang Liu and Dirk Grunwald. 2017. DTranx: A SEDA-based Distributed and Transactional Key Value Store with Persistent Memory Log. arxiv:1711.09543."},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3385412.3385991"},{"key":"e_1_3_2_2_31_1","unstructured":"Jerrin Shaji George Mohit Verma Rajesh Venkatasubramanian and Pratap Subrahmanyam. 2020. go-pmem: Native Support for Programming Persistent Memory in Go. 859\u2013872. isbn:978-1-939133-14-4 https:\/\/www.usenix.org\/conference\/atc20\/presentation\/george  Jerrin Shaji George Mohit Verma Rajesh Venkatasubramanian and Pratap Subrahmanyam. 2020. go-pmem: Native Support for Programming Persistent Memory in Go. 859\u2013872. isbn:978-1-939133-14-4 https:\/\/www.usenix.org\/conference\/atc20\/presentation\/george"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092255.3092270"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065036"},{"key":"e_1_3_2_2_34_1","unstructured":"Patrice Godefroid Michael Y. Levin and David Molnar. 2008. Automated Whitebox Fuzz Testing. https:\/\/www.microsoft.com\/en-us\/research\/publication\/automated-whitebox-fuzz-testing\/  Patrice Godefroid Michael Y. Levin and David Molnar. 2008. Automated Whitebox Fuzz Testing. https:\/\/www.microsoft.com\/en-us\/research\/publication\/automated-whitebox-fuzz-testing\/"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192367"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA45697.2020.00060"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446735"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507766"},{"key":"e_1_3_2_2_39_1","volume-title":"InK: In-Kernel Key-Value Storage with Persistent Memory. Electronics, 9, 11","author":"Ha Minjong","year":"2020","unstructured":"Minjong Ha and Sang-Hoon Kim . 2020. InK: In-Kernel Key-Value Storage with Persistent Memory. Electronics, 9, 11 ( 2020 ), 22 pages. issn:2079-9292 https:\/\/doi.org\/10.3390\/electronics9111913 10.3390\/electronics9111913 Minjong Ha and Sang-Hoon Kim. 2020. InK: In-Kernel Key-Value Storage with Persistent Memory. Electronics, 9, 11 (2020), 22 pages. issn:2079-9292 https:\/\/doi.org\/10.3390\/electronics9111913"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446710"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064204"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCD.2018.00045"},{"key":"e_1_3_2_2_43_1","unstructured":"Deukyeon Hwang Wook-Hee Kim Youjip Won and Beomseok Nam. 2018. Endurable Transient Inconsistency in Byte-Addressable Persistent B+-Tree. FAST \u201918. 187\u2013200. isbn:9781931971423  Deukyeon Hwang Wook-Hee Kim Youjip Won and Beomseok Nam. 2018. Endurable Transient Inconsistency in Byte-Addressable Persistent B+-Tree. FAST \u201918. 187\u2013200. isbn:9781931971423"},{"key":"e_1_3_2_2_44_1","unstructured":"Intel. 2020. Third Generation Intel Xeon Processor Scalable Family Technical Overview. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/intel-xeon-processor-scalable-family-overview.html?wapkw=clwb  Intel. 2020. Third Generation Intel Xeon Processor Scalable Family Technical Overview. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/articles\/intel-xeon-processor-scalable-family-overview.html?wapkw=clwb"},{"key":"e_1_3_2_2_45_1","unstructured":"Intel. 2021. Memory Optimized for Data-centeric Workloads. https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/optane-dc-persistent-memory.html  Intel. 2021. Memory Optimized for Data-centeric Workloads. https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/optane-dc-persistent-memory.html"},{"key":"e_1_3_2_2_46_1","unstructured":"Intel. 2021. Revolutionizing Memory and Storage. https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/intel-optane-technology.html  Intel. 2021. Revolutionizing Memory and Storage. https:\/\/www.intel.com\/content\/www\/us\/en\/architecture-and-technology\/intel-optane-technology.html"},{"key":"e_1_3_2_2_47_1","unstructured":"Intel Corporation. 2020. Persistent Memory Development Kit. https:\/\/pmem.io\/pmdk\/.  Intel Corporation. 2020. Persistent Memory Development Kit. https:\/\/pmem.io\/pmdk\/."},{"key":"e_1_3_2_2_48_1","unstructured":"Intel Corporation. 2021. Intel Inspector. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/tools\/oneapi\/ components\/inspector.html.  Intel Corporation. 2021. Intel Inspector. https:\/\/software.intel.com\/content\/www\/us\/en\/develop\/tools\/oneapi\/ components\/inspector.html."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872410"},{"key":"e_1_3_2_2_50_1","volume-title":"Scott","author":"Izraelevitz Joseph","year":"2016","unstructured":"Joseph Izraelevitz , Hammurabi Mendes , and Michael L . Scott . 2016 . Linearizability of Persistent Memory Objects Under a Full-System-Crash Failure Model . 313\u2013327. isbn:978-3-662-53426-7 Joseph Izraelevitz, Hammurabi Mendes, and Michael L. Scott. 2016. Linearizability of Persistent Memory Objects Under a Full-System-Crash Failure Model. 313\u2013327. isbn:978-3-662-53426-7"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446698"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00049"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359631"},{"key":"e_1_3_2_2_54_1","unstructured":"Olzhas Kaiyrakhmet Songyi Lee Beomseok Nam Sam H. Noh and Young ri Choi. 2019. SLM-DB: Single-Level Key-Value Store with Persistent Memory. 191\u2013205. isbn:978-1-939133-09-0 https:\/\/www.usenix.org\/conference\/fast19\/presentation\/kaiyrakhmet  Olzhas Kaiyrakhmet Songyi Lee Beomseok Nam Sam H. Noh and Young ri Choi. 2019. SLM-DB: Single-Level Key-Value Store with Persistent Memory. 191\u2013205. isbn:978-1-939133-09-0 https:\/\/www.usenix.org\/conference\/fast19\/presentation\/kaiyrakhmet"},{"key":"e_1_3_2_2_55_1","unstructured":"Tomasz Kapela. 2015. An introduction to pmemcheck (part 1) - basics. https:\/\/pmem.io\/2015\/07\/17\/pmemcheck-basic.html  Tomasz Kapela. 2015. An introduction to pmemcheck (part 1) - basics. https:\/\/pmem.io\/2015\/07\/17\/pmemcheck-basic.html"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3434328"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872381"},{"key":"e_1_3_2_2_58_1","unstructured":"Harendra Kumar Yuvraj Patel Ram Kesavan and Sumith Makam. 2017. High Performance Metadata Integrity Protection in the WAFL Copy-on-Write File System. 197\u2013212. isbn:978-1-931971-36-2 https:\/\/www.usenix.org\/conference\/fast17\/technical-sessions\/presentation\/kumar  Harendra Kumar Yuvraj Patel Ram Kesavan and Sumith Makam. 2017. High Performance Metadata Integrity Protection in the WAFL Copy-on-Write File System. 197\u2013212. isbn:978-1-931971-36-2 https:\/\/www.usenix.org\/conference\/fast17\/technical-sessions\/presentation\/kumar"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132770"},{"key":"e_1_3_2_2_60_1","unstructured":"Redis Labs. 2020. Redis. https:\/\/github.com\/pmem\/redis  Redis Labs. 2020. Redis. https:\/\/github.com\/pmem\/redis"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314604"},{"key":"e_1_3_2_2_62_1","volume-title":"Yat: A Validation Framework for Persistent Memory Software. 433\u2013438. isbn:978-1-931971-10-2 https:\/\/www.usenix.org\/conference\/atc14\/technical-sessions\/presentation\/lantz","author":"Lantz Philip","year":"2014","unstructured":"Philip Lantz , Subramanya Dulloor , Sanjay Kumar , Rajesh Sankaran , and Jeff Jackson . 2014 . Yat: A Validation Framework for Persistent Memory Software. 433\u2013438. isbn:978-1-931971-10-2 https:\/\/www.usenix.org\/conference\/atc14\/technical-sessions\/presentation\/lantz Philip Lantz, Subramanya Dulloor, Sanjay Kumar, Rajesh Sankaran, and Jeff Jackson. 2014. Yat: A Validation Framework for Persistent Memory Software. 433\u2013438. isbn:978-1-931971-10-2 https:\/\/www.usenix.org\/conference\/atc14\/technical-sessions\/presentation\/lantz"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359635"},{"key":"e_1_3_2_2_64_1","volume-title":"Rajan","author":"Li Guodong","year":"2011","unstructured":"Guodong Li , Indradeep Ghosh , and Sreeranga P . Rajan . 2011 . KLOVER : A Symbolic Execution and Automatic Test Generation Tool for C++ Programs . 609\u2013615. isbn:978-3-642-22110-1 Guodong Li, Indradeep Ghosh, and Sreeranga P. Rajan. 2011. KLOVER: A Symbolic Execution and Automatic Test Generation Tool for C++ Programs. 609\u2013615. isbn:978-3-642-22110-1"},{"key":"e_1_3_2_2_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3465084.3467943"},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379932"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037714"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037714"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2018.00029"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446691"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3373376.3378452"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304015"},{"key":"e_1_3_2_2_73_1","unstructured":"Youyou Lu Jiwu Shu Youmin Chen and Tao Li. 2017. Octopus: an RDMA-enabled Distributed Persistent Memory File System. 773\u2013785. isbn:978-1-931971-38-6 https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/lu  Youyou Lu Jiwu Shu Youmin Chen and Tao Li. 2017. Octopus: an RDMA-enabled Distributed Persistent Memory File System. 773\u2013785. isbn:978-1-931971-38-6 https:\/\/www.usenix.org\/conference\/atc17\/technical-sessions\/presentation\/lu"},{"key":"e_1_3_2_2_74_1","volume-title":"Persistent Memcached: Bringing Legacy Code to Byte-Addressable Persistent Memory. HotStorage\u201917. 4.","author":"Marathe Virendra J.","year":"2017","unstructured":"Virendra J. Marathe , Margo Seltzer , Steve Byan , and Tim Harris . 2017 . Persistent Memcached: Bringing Legacy Code to Byte-Addressable Persistent Memory. HotStorage\u201917. 4. Virendra J. Marathe, Margo Seltzer, Steve Byan, and Tim Harris. 2017. Persistent Memcached: Bringing Legacy Code to Byte-Addressable Persistent Memory. HotStorage\u201917. 4."},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3278141"},{"key":"e_1_3_2_2_76_1","doi-asserted-by":"crossref","unstructured":"Yuri Meshman Noam Rinetzky and Eran Yahav. 2015. Pattern-Based Synthesis of Synchronization for the C++ Memory Model. FMCAD \u201915. 120\u2013127. isbn:9780983567851  Yuri Meshman Noam Rinetzky and Eran Yahav. 2015. Pattern-Based Synthesis of Synchronization for the C++ Memory Model. FMCAD \u201915. 120\u2013127. isbn:9780983567851","DOI":"10.1109\/FMCAD.2015.7542261"},{"key":"e_1_3_2_2_77_1","unstructured":"Moohyeon Nam Hokeun Cha Young-Ri Choi Sam H. Noh and Beomseok Nam. 2019. Write-Optimized Dynamic Hashing for Persistent Memory. FAST \u201919. 31\u201344. isbn:9781931971485  Moohyeon Nam Hokeun Cha Young-Ri Choi Sam H. Noh and Beomseok Nam. 2019. Write-Optimized Dynamic Hashing for Persistent Memory. FAST \u201919. 31\u201344. isbn:9781931971485"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2151018"},{"key":"e_1_3_2_2_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446694"},{"key":"e_1_3_2_2_80_1","volume-title":"AGAMOTTO: How Persistent is your Persistent Memory Application? 1047\u20131064.","author":"Neal Ian","year":"2020","unstructured":"Ian Neal , Ben Reeves , Ben Stoler , and Andrew Quinn . 2020 . AGAMOTTO: How Persistent is your Persistent Memory Application? 1047\u20131064. Ian Neal, Ben Reeves, Ben Stoler, and Andrew Quinn. 2020. AGAMOTTO: How Persistent is your Persistent Memory Application? 1047\u20131064."},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043560"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814286"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/2882903.2915251"},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2014.6853222"},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2015.46"},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.14778\/2732228.2732231"},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390635"},{"key":"e_1_3_2_2_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/3371079"},{"key":"e_1_3_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/2830772.2830802"},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_2_91_1","unstructured":"Nikolai Tillmann and Jonathan de Halleux. 2008. Pex\u2013White Box Test Generation for .NET. 134\u2013153. isbn:978-3-540-79124-9  Nikolai Tillmann and Jonathan de Halleux. 2008. Pex\u2013White Box Test Generation for .NET. 134\u2013153. isbn:978-3-540-79124-9"},{"key":"e_1_3_2_2_92_1","volume-title":"Campbell","author":"Venkataraman Shivaram","year":"2011","unstructured":"Shivaram Venkataraman , Niraj Tolia , Parthasarathy Ranganathan , and Roy H . Campbell . 2011 . Consistent and Durable Data Structures for Non-Volatile Byte-Addressable Memory. FAST\u2019 11. 5. isbn:9781931971829 Shivaram Venkataraman, Niraj Tolia, Parthasarathy Ranganathan, and Roy H. Campbell. 2011. Consistent and Durable Data Structures for Non-Volatile Byte-Addressable Memory. FAST\u201911. 5. isbn:9781931971829"},{"key":"e_1_3_2_2_93_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592810"},{"key":"e_1_3_2_2_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950379"},{"key":"e_1_3_2_2_95_1","doi-asserted-by":"publisher","DOI":"10.1145\/2967360.2967374"},{"key":"e_1_3_2_2_96_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063384.2063436"},{"key":"e_1_3_2_2_97_1","unstructured":"Fei Xia Dejun Jiang Jin Xiong and Ninghui Sun. 2017. HiKV: A Hybrid Index Key-Value Store for DRAM-NVM Memory Systems. USENIX ATC \u201917. 349\u2013362. isbn:9781931971386  Fei Xia Dejun Jiang Jin Xiong and Ninghui Sun. 2017. HiKV: A Hybrid Index Key-Value Store for DRAM-NVM Memory Systems. USENIX ATC \u201917. 349\u2013362. isbn:9781931971386"},{"key":"e_1_3_2_2_98_1","volume-title":"NOVA: A Log-Structured File System for Hybrid Volatile\/Non-Volatile Main Memories. FAST\u201916. 323\u2013338. isbn:9781931971287","author":"Xu Jian","year":"2016","unstructured":"Jian Xu and Steven Swanson . 2016 . NOVA: A Log-Structured File System for Hybrid Volatile\/Non-Volatile Main Memories. FAST\u201916. 323\u2013338. isbn:9781931971287 Jian Xu and Steven Swanson. 2016. NOVA: A Log-Structured File System for Hybrid Volatile\/Non-Volatile Main Memories. FAST\u201916. 323\u2013338. isbn:9781931971287"},{"key":"e_1_3_2_2_99_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132761"},{"key":"e_1_3_2_2_100_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446730"},{"key":"e_1_3_2_2_101_1","volume-title":"Khai Leong Yong, and Bingsheng He","author":"Yang Jun","year":"2015","unstructured":"Jun Yang , Qingsong Wei , Cheng Chen , Chundong Wang , Khai Leong Yong, and Bingsheng He . 2015 . NV-Tree: Reducing Consistency Cost for NVM-Based Single Level Systems. FAST\u2019 15. 167\u2013181. isbn:9781931971201 Jun Yang, Qingsong Wei, Cheng Chen, Chundong Wang, Khai Leong Yong, and Bingsheng He. 2015. NV-Tree: Reducing Consistency Cost for NVM-Based Single Level Systems. FAST\u201915. 167\u2013181. isbn:9781931971201"},{"key":"e_1_3_2_2_102_1","doi-asserted-by":"publisher","DOI":"10.1145\/3453300"},{"key":"e_1_3_2_2_103_1","volume-title":"Pangolin: A Fault-Tolerant Persistent Memory Programming Library. 897\u2013912. isbn:978-1-939133-03-8 https:\/\/www.usenix.org\/conference\/atc19\/presentation\/zhang-lu","author":"Zhang Lu","year":"2019","unstructured":"Lu Zhang and Steven Swanson . 2019 . Pangolin: A Fault-Tolerant Persistent Memory Programming Library. 897\u2013912. isbn:978-1-939133-03-8 https:\/\/www.usenix.org\/conference\/atc19\/presentation\/zhang-lu Lu Zhang and Steven Swanson. 2019. Pangolin: A Fault-Tolerant Persistent Memory Programming Library. 897\u2013912. isbn:978-1-939133-03-8 https:\/\/www.usenix.org\/conference\/atc19\/presentation\/zhang-lu"},{"key":"e_1_3_2_2_104_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447786.3456237"},{"key":"e_1_3_2_2_105_1","doi-asserted-by":"publisher","DOI":"10.14778\/3372716.3372717"}],"event":{"name":"PLDI '22: 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation","location":"San Diego CA USA","acronym":"PLDI '22","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 43rd ACM SIGPLAN International Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3519939.3523723","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3519939.3523723","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:30Z","timestamp":1750183830000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3519939.3523723"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,6,9]]},"references-count":105,"alternative-id":["10.1145\/3519939.3523723","10.1145\/3519939"],"URL":"https:\/\/doi.org\/10.1145\/3519939.3523723","relation":{},"subject":[],"published":{"date-parts":[[2022,6,9]]},"assertion":[{"value":"2022-06-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}