{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:16:35Z","timestamp":1750220195831,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":63,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,8]],"date-time":"2022-10-08T00:00:00Z","timestamp":1665187200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,8]]},"DOI":"10.1145\/3559009.3569669","type":"proceedings-article","created":{"date-parts":[[2023,1,27]],"date-time":"2023-01-27T14:02:50Z","timestamp":1674828170000},"page":"223-238","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Understanding and Reaching the Performance Limit of Schedule Tuning on Stable Synchronization Determinism"],"prefix":"10.1145","author":[{"given":"Qi","family":"Zhao","sequence":"first","affiliation":[{"name":"North Carolina State University"}]},{"given":"Zhengyi","family":"Qiu","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Shudi","family":"Shao","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Xinning","family":"Hui","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Hassan Ali","family":"Khan","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Guoliang","family":"Jin","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]}],"member":"320","published-online":{"date-parts":[[2023,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2009. Aget. http:\/\/www.enderunix.org\/aget\/.  2009. Aget. http:\/\/www.enderunix.org\/aget\/."},{"key":"e_1_3_2_1_2_1","unstructured":"2010. pfscan. http:\/\/freshmeat.sourceforge.net\/projects\/pfscan.  2010. pfscan. http:\/\/freshmeat.sourceforge.net\/projects\/pfscan."},{"key":"e_1_3_2_1_3_1","unstructured":"2012. SPLASH-2x. http:\/\/parsec.cs.princeton.edu\/parsec3-doc.htm.  2012. SPLASH-2x. http:\/\/parsec.cs.princeton.edu\/parsec3-doc.htm."},{"key":"e_1_3_2_1_4_1","unstructured":"2012. The PARSEC Benchmark Suite. http:\/\/parsec.cs.princeton.edu\/.  2012. The PARSEC Benchmark Suite. http:\/\/parsec.cs.princeton.edu\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2016. Parallel BZIP2 (PBZIP2). https:\/\/launchpad.net\/pbzip2.  2016. Parallel BZIP2 (PBZIP2). https:\/\/launchpad.net\/pbzip2."},{"key":"e_1_3_2_1_6_1","unstructured":"2017. MPlayer. http:\/\/www.mplayerhq.hu\/design7\/news.html.  2017. MPlayer. http:\/\/www.mplayerhq.hu\/design7\/news.html."},{"key":"e_1_3_2_1_7_1","unstructured":"2017. STL Parallel Mode. http:\/\/gcc.gnu.org\/onlinedocs\/libstdc++\/manual\/parallel_mode.html.  2017. STL Parallel Mode. http:\/\/gcc.gnu.org\/onlinedocs\/libstdc++\/manual\/parallel_mode.html."},{"key":"e_1_3_2_1_8_1","unstructured":"2018. Berkeley DB. https:\/\/www.oracle.com\/database\/technologies\/related\/berkeleydb.html.  2018. Berkeley DB. https:\/\/www.oracle.com\/database\/technologies\/related\/berkeleydb.html."},{"key":"e_1_3_2_1_9_1","unstructured":"2018. ImageMagick. http:\/\/www.imagemagick.org\/script\/index.php.  2018. ImageMagick. http:\/\/www.imagemagick.org\/script\/index.php."},{"key":"e_1_3_2_1_10_1","unstructured":"2018. NASA Parallel Benchmarks. http:\/\/www.nas.nasa.gov\/software\/npb.html.  2018. NASA Parallel Benchmarks. http:\/\/www.nas.nasa.gov\/software\/npb.html."},{"key":"e_1_3_2_1_11_1","unstructured":"2018. OpenLDAP. http:\/\/www.openldap.org\/.  2018. OpenLDAP. http:\/\/www.openldap.org\/."},{"key":"e_1_3_2_1_12_1","unstructured":"2018. Redis. http:\/\/redis.io\/.  2018. Redis. http:\/\/redis.io\/."},{"key":"e_1_3_2_1_13_1","unstructured":"2022. minSMT. https:\/\/github.com\/chyiz\/minSMT\/.  2022. minSMT. https:\/\/github.com\/chyiz\/minSMT\/."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629594"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1924943.1924957"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736029"},{"key":"e_1_3_2_1_17_1","volume-title":"The 2nd Workshop on Determinism and Correctness in Parallel Programming","author":"Bergan Tom","year":"2011","unstructured":"Tom Bergan , Joseph Devietti , Nicholas Hunt , and Luis Ceze . 2011 . The Deterministic Execution Hammer: How Well Does it Actually Pound Nails? . In The 2nd Workshop on Determinism and Correctness in Parallel Programming ( Newport Beach, California, USA) (WODET '11). Tom Bergan, Joseph Devietti, Nicholas Hunt, and Luis Ceze. 2011. The Deterministic Execution Hammer: How Well Does it Actually Pound Nails?. In The 2nd Workshop on Determinism and Correctness in Parallel Programming (Newport Beach, California, USA) (WODET '11)."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation","author":"Bergan Tom","year":"1924","unstructured":"Tom Bergan , Nicholas Hunt , Luis Ceze , and Steven D. Gribble . 2010. Deterministic Process Groups in dOS . In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation ( Vancouver, BC, Canada) (OSDI'10). USENIX Association, Berkeley, CA, USA, 177--191. http:\/\/dl.acm.org\/citation.cfm?id= 1924 943.1924956 Tom Bergan, Nicholas Hunt, Luis Ceze, and Steven D. Gribble. 2010. Deterministic Process Groups in dOS. In Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation (Vancouver, BC, Canada) (OSDI'10). USENIX Association, Berkeley, CA, USA, 177--191. http:\/\/dl.acm.org\/citation.cfm?id=1924943.1924956"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640096"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/865114"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22655-7_15"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1855591.1855595"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640097"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926447"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815427"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522735"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043588"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1924943.1924958"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508255"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950376"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2592798.2592800"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2442516.2442540"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541979"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 2011 IEEE 17th International Symposium on High Performance Computer Architecture (HPCA '11)","author":"Hower Derek R.","year":"2014","unstructured":"Derek R. Hower , Polina Dudnik , Mark D. Hill , and David A. Wood . 2011. Calvin: Deterministic or Not? Free Will to Choose . In Proceedings of the 2011 IEEE 17th International Symposium on High Performance Computer Architecture (HPCA '11) . IEEE Computer Society, Washington, DC, USA, 333--334. http:\/\/dl.acm.org\/citation.cfm?id= 2014 698.2014870 Derek R. Hower, Polina Dudnik, Mark D. Hill, and David A. Wood. 2011. Calvin: Deterministic or Not? Free Will to Choose. In Proceedings of the 2011 IEEE 17th International Symposium on High Performance Computer Architecture (HPCA '11). IEEE Computer Society, Washington, DC, USA, 333--334. http:\/\/dl.acm.org\/citation.cfm?id=2014698.2014870"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882323"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462167"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 2017 USENIX Conference on Usenix Annual Technical Conference (Santa Clara, CA, USA) (USENIX ATC '17). USENIX Association","author":"Huang Shiyou","year":"2017","unstructured":"Shiyou Huang , Bowen Cai , and Jeff Huang . 2017 . Towards Production-run Heisenbugs Reproduction on Commercial Hardware . In Proceedings of the 2017 USENIX Conference on Usenix Annual Technical Conference (Santa Clara, CA, USA) (USENIX ATC '17). USENIX Association , Berkeley, CA, USA, 403--415. http:\/\/dl.acm.org\/citation.cfm?id=3154690.3154729 Shiyou Huang, Bowen Cai, and Jeff Huang. 2017. Towards Production-run Heisenbugs Reproduction on Commercial Hardware. In Proceedings of the 2017 USENIX Conference on Usenix Annual Technical Conference (Santa Clara, CA, USA) (USENIX ATC '17). USENIX Association, Berkeley, CA, USA, 403--415. http:\/\/dl.acm.org\/citation.cfm?id=3154690.3154729"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451170"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation","author":"Kapritsos Manos","year":"2012","unstructured":"Manos Kapritsos , Yang Wang , Vivien Quema , Allen Clement , Lorenzo Alvisi , and Mike Dahlin . 2012 . All about Eve: Execute-Verify Replication for Multi-Core Servers . In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation ( Hollywood, CA, USA) (OSDI'12). USENIX Association, USA, 237--250. Manos Kapritsos, Yang Wang, Vivien Quema, Allen Clement, Lorenzo Alvisi, and Mike Dahlin. 2012. All about Eve: Execute-Verify Replication for Multi-Core Servers. In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (Hollywood, CA, USA) (OSDI'12). USENIX Association, USA, 237--250."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736031"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1993.274940"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192380"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043587"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2555243.2555252"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346323"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037751"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741960"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465365"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304047"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541964"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508256"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629593"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2007.346181"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/291889.291893"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_3_2_1_57_1","unstructured":"SecurityFocus. 2004. Software Bug Contributed to Blackout. http:\/\/www.securityfocus.com\/news\/8016.  SecurityFocus. 2004. Software Bug Contributed to Blackout. http:\/\/www.securityfocus.com\/news\/8016."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2012.6169038"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2628071.2628099"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950370"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254090"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2500875"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293883.3295731"}],"event":{"name":"PACT '22: International Conference on Parallel Architectures and Compilation Techniques","sponsor":["SIGARCH ACM Special Interest Group on Computer Architecture","IFIP WG 10.3 IFIP WG 10.3","IEEE CS"],"location":"Chicago Illinois","acronym":"PACT '22"},"container-title":["Proceedings of the International Conference on Parallel Architectures and Compilation Techniques"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3559009.3569669","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3559009.3569669","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T19:02:38Z","timestamp":1750186958000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3559009.3569669"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,8]]},"references-count":63,"alternative-id":["10.1145\/3559009.3569669","10.1145\/3559009"],"URL":"https:\/\/doi.org\/10.1145\/3559009.3569669","relation":{},"subject":[],"published":{"date-parts":[[2022,10,8]]},"assertion":[{"value":"2023-01-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}