{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,17]],"date-time":"2026-03-17T18:51:52Z","timestamp":1773773512731,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T00:00:00Z","timestamp":1658102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,7,18]]},"DOI":"10.1145\/3533767.3534377","type":"proceedings-article","created":{"date-parts":[[2022,7,15]],"date-time":"2022-07-15T14:28:50Z","timestamp":1657895330000},"page":"455-466","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Deadlock prediction via generalized dependency"],"prefix":"10.1145","author":[{"given":"Jinpeng","family":"Zhou","sequence":"first","affiliation":[{"name":"University of Pittsburgh, USA"}]},{"given":"Hanmei","family":"Yang","sequence":"additional","affiliation":[{"name":"University of Massachusetts at Amherst, USA"}]},{"given":"John","family":"Lange","sequence":"additional","affiliation":[{"name":"Oak Ridge National Laboratory, USA \/ University of Pittsburgh, USA"}]},{"given":"Tongping","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Massachusetts at Amherst, USA"}]}],"member":"320","published-online":{"date-parts":[[2022,7,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1147403.1147413"},{"key":"e_1_3_2_1_2_1","unstructured":"Apache. 2022. ab - apache http server benchmarking tool. https:\/\/httpd.apache.org\/docs\/2.4\/programs\/ab.html \t\t\t\t\t  Apache. 2022. ab - apache http server benchmarking tool. https:\/\/httpd.apache.org\/docs\/2.4\/programs\/ab.html"},{"key":"e_1_3_2_1_3_1","volume-title":"Haifa Verification Conference. 208\u2013223","author":"Bensalem Saddek","year":"2005","unstructured":"Saddek Bensalem and Klaus Havelund . 2005 . Dynamic deadlock analysis of multi-threaded programs . In Haifa Verification Conference. 208\u2013223 . Saddek Bensalem and Klaus Havelund. 2005. Dynamic deadlock analysis of multi-threaded programs. In Haifa Verification Conference. 208\u2013223."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 5th Annual Workshop on Modeling, Benchmarking and Simulation.","author":"Bienia Christian","year":"2009","unstructured":"Christian Bienia and Kai Li . 2009 . PARSEC 2.0: A New Benchmark Suite for Chip-Multiprocessors . In Proceedings of the 5th Annual Workshop on Modeling, Benchmarking and Simulation. Christian Bienia and Kai Li. 2009. PARSEC 2.0: A New Benchmark Suite for Chip-Multiprocessors. In Proceedings of the 5th Annual Workshop on Modeling, Benchmarking and Simulation."},{"key":"e_1_3_2_1_5_1","unstructured":"MySQL Bugzilla. 2013. https:\/\/bugs.mysql.com\/bug.php?id=68251 \t\t\t\t\t  MySQL Bugzilla. 2013. https:\/\/bugs.mysql.com\/bug.php?id=68251"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227156"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2301725"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2537335"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380367"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468549"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.32"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.22"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.14"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945468"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635918"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512558"},{"key":"e_1_3_2_1_17_1","volume-title":"Specification and verification of synchronization with condition variables. Science of computer programming, 163","author":"Gomes Pedro","year":"2018","unstructured":"Pedro de C Gomes , Dilian Gurov , Marieke Huisman , and Cyrille Artho . 2018. Specification and verification of synchronization with condition variables. Science of computer programming, 163 ( 2018 ), 174\u2013189. Pedro de C Gomes, Dilian Gurov, Marieke Huisman, and Cyrille Artho. 2018. Specification and verification of synchronization with condition variables. Science of computer programming, 163 (2018), 174\u2013189."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89884-1_15"},{"key":"e_1_3_2_1_19_1","volume-title":"Finding Concurrency Bugs in Java. In In Proceedings of the PODC Workshop on Concurrency and Synchronization in Java Programs.","author":"Hovemeyer D.","unstructured":"D. Hovemeyer and W. Pugh . 2004 . Finding Concurrency Bugs in Java. In In Proceedings of the PODC Workshop on Concurrency and Synchronization in Java Programs. D. Hovemeyer and W. Pugh. 2004. Finding Concurrency Bugs in Java. In In Proceedings of the PODC Workshop on Concurrency and Synchronization in Java Programs."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594315"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882339"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542489"},{"key":"e_1_3_2_1_23_1","first-page":"295","article-title":"Deadlock Immunity: Enabling Systems to Defend Against Deadlocks","volume":"8","author":"Jula Horatiu","year":"2008","unstructured":"Horatiu Jula , Daniel M Tralamazza , Cristian Zamfir , and George Candea . 2008 . Deadlock Immunity: Enabling Systems to Defend Against Deadlocks .. In OSDI. 8 , 295 \u2013 308 . Horatiu Jula, Daniel M Tralamazza, Cristian Zamfir, and George Candea. 2008. Deadlock Immunity: Enabling Systems to Defend Against Deadlocks.. In OSDI. 8, 295\u2013308.","journal-title":"OSDI."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276516"},{"key":"e_1_3_2_1_25_1","volume-title":"Detecting deadlocks in formal system models with condition synchronization. Electronic Communications of the EASST, 76","author":"Kamburjan Eduard","year":"2019","unstructured":"Eduard Kamburjan . 2019. Detecting deadlocks in formal system models with condition synchronization. Electronic Communications of the EASST, 76 ( 2019 ). Eduard Kamburjan. 2019. Detecting deadlocks in formal system models with condition synchronization. Electronic Communications of the EASST, 76 (2019)."},{"key":"e_1_3_2_1_26_1","unstructured":"Michael Kerrisk. 2021. pthreads - POSIX threads. https:\/\/man7.org\/linux\/man-pages\/man7\/pthreads.7.html \t\t\t\t\t  Michael Kerrisk. 2021. pthreads - POSIX threads. https:\/\/man7.org\/linux\/man-pages\/man7\/pthreads.7.html"},{"key":"e_1_3_2_1_27_1","unstructured":"Redis Labs. 2020. Memtier Benchmark. https:\/\/github.com\/RedisLabs\/memtier_benchmark \t\t\t\t\t  Redis Labs. 2020. Memtier Benchmark. https:\/\/github.com\/RedisLabs\/memtier_benchmark"},{"key":"e_1_3_2_1_28_1","volume-title":"The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy","author":"Laneve Cosimo","unstructured":"Cosimo Laneve and Luca Padovani . 2019. Deadlock analysis of wait-notify coordination . In The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy . Springer , 50\u201367. Cosimo Laneve and Luca Padovani. 2019. Deadlock analysis of wait-notify coordination. In The Art of Modelling Computational Systems: A Journey from Logic and Concurrency to Security and Privacy. Springer, 50\u201367."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070538"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250746"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227145"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254126"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660193.2660238"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2555243.2555262"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2008.68"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-23404-5_13"},{"key":"e_1_3_2_1_37_1","unstructured":"SQLite. 2020. How SQLite Is Tested. https:\/\/www.sqlite.org\/testing.html \t\t\t\t\t  SQLite. 2020. How SQLite Is Tested. https:\/\/www.sqlite.org\/testing.html"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1774"},{"key":"e_1_3_2_1_39_1","unstructured":"Valgrind. 2022. DRD: a thread error detector. https:\/\/valgrind.org\/docs\/manual\/drd-manual.html \t\t\t\t\t  Valgrind. 2022. DRD: a thread error detector. https:\/\/valgrind.org\/docs\/manual\/drd-manual.html"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"crossref","unstructured":"Christoph von Praun. 2004. Detecting synchronization defects in multi-threaded object-oriented programs. Ph. D. Dissertation. Citeseer. \t\t\t\t\t  Christoph von Praun. 2004. Detecting synchronization defects in multi-threaded object-oriented programs. Ph. D. Dissertation. Citeseer.","DOI":"10.1145\/781131.781145"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/11531142_26"},{"key":"e_1_3_2_1_42_1","first-page":"163","article-title":"Ad Hoc Synchronization Considered Harmful","volume":"10","author":"Xiong Weiwei","year":"2010","unstructured":"Weiwei Xiong , Soyeon Park , Jiaqi Zhang , Yuanyuan Zhou , and Zhiqiang Ma . 2010 . Ad Hoc Synchronization Considered Harmful .. In OSDI. 10 , 163 \u2013 176 . Weiwei Xiong, Soyeon Park, Jiaqi Zhang, Yuanyuan Zhou, and Zhiqiang Ma. 2010. Ad Hoc Synchronization Considered Harmful.. In OSDI. 10, 163\u2013176.","journal-title":"OSDI."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115684"}],"event":{"name":"ISSTA '22: 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Virtual South Korea","acronym":"ISSTA '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534377","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3533767.3534377","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T18:43:40Z","timestamp":1750272220000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3533767.3534377"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,18]]},"references-count":43,"alternative-id":["10.1145\/3533767.3534377","10.1145\/3533767"],"URL":"https:\/\/doi.org\/10.1145\/3533767.3534377","relation":{},"subject":[],"published":{"date-parts":[[2022,7,18]]},"assertion":[{"value":"2022-07-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}