{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T03:34:28Z","timestamp":1767929668389,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2025,3,30]],"date-time":"2025-03-30T00:00:00Z","timestamp":1743292800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/501100006374","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1910568,CCF-1943456"],"award-info":[{"award-number":["CCF-1910568,CCF-1943456"]}],"id":[{"id":"10.13039\/501100006374","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,3,30]]},"DOI":"10.1145\/3676641.3715990","type":"proceedings-article","created":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:47:32Z","timestamp":1743094052000},"page":"244-259","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Dynamic Partial Deadlock Detection and Recovery via Garbage Collection"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-1714-3866","authenticated-orcid":false,"given":"Georgian-Vlad","family":"Saioc","sequence":"first","affiliation":[{"name":"Aarhus University, Aarhus, Denmark and Programming Systems Group, Uber Technologies, Inc., Aarhus, Denmark"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0687-5508","authenticated-orcid":false,"given":"I-Ting Angelina","family":"Lee","sequence":"additional","affiliation":[{"name":"Washington University in St. Louis, St. Louis, Missouri, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1333-2314","authenticated-orcid":false,"given":"Anders","family":"M\u00f8ller","sequence":"additional","affiliation":[{"name":"Aarhus University, Aarhus, Denmark"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1021-7644","authenticated-orcid":false,"given":"Milind","family":"Chabbi","sequence":"additional","affiliation":[{"name":"Programming Systems Group, Uber Technologies, Inc., Sunnyvale, California, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2025,3,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Go GC stats collection at runtime. https:\/\/pkg.go.dev\/runtime."},{"key":"e_1_3_2_1_2_1","unstructured":"[n.d.]. Go source file for escape analysis. https:\/\/tip.golang.org\/src\/ cmd\/compile\/internal\/escape\/escape.go. Accessed on October 2024."},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. Goleak- Goroutine Leak Detector. https:\/\/github.com\/uber go\/goleak."},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 30th Annual Symposium on Foundations of Computer Science (SFCS '89)","author":"Aragon C. R.","year":"1989","unstructured":"C. R. Aragon and R. G. Seidel. 1989. Randomized search trees. In Proceedings of the 30th Annual Symposium on Foundations of Computer Science (SFCS '89). IEEE Computer Society, USA, 540--545. doi:10.1109\/ SFCS.1989.63531"},{"key":"e_1_3_2_1_5_1","unstructured":"Go Authors. 2024. A Guide to the Go Garbage Collector. https: \/\/go.dev\/doc\/gc-guide Accessed: 2025-02-09."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/359642.359655"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8668036"},{"key":"e_1_3_2_1_8_1","volume-title":"ASE 2021","author":"Dilley Nicolas","year":"2021","unstructured":"Nicolas Dilley and Julien Lange. 2021. Automated Verification of Go Programs via Bounded Model Checking. In 36th IEEE\/ACM In ternational Conference on Automated Software Engineering, ASE 2021, Melbourne, Australia, November 15--19, 2021. IEEE, 1016--1027. doi:10. 1109\/ASE51524.2021.9678571"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.13016\/M2KH0F27R"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/359576.359585"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.588521"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-84629-9_8"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3009837.3009847"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180157"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3700436"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3503222.3507753"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3445814.3446756"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--99725--4_18"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892232"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2247684.2247694"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869459.1869482"},{"key":"e_1_3_2_1_22_1","volume-title":"IEEE\/ACM International Symposium on Code Generation and Optimization, CGO 2024","author":"Saioc Georgian-Vlad","year":"2024","unstructured":"Georgian-Vlad Saioc, Dmitriy Shirchenko, and Milind Chabbi. 2024. Unveiling and Vanquishing Goroutine Leaks in Enterprise Microser vices: A Dynamic Analysis Approach. In IEEE\/ACM International Symposium on Code Generation and Optimization, CGO 2024, Edin burgh, United Kingdom, March 2--6, 2024. IEEE, 411--422. doi:10.1109\/ CGO57630.2024.10444835"},{"key":"e_1_3_2_1_23_1","unstructured":"Georgian-Vlad Saioc and Milind Chabbi. 2022. Featherlight In-Production Goroutine Leak LeakProf: Detection. https:\/\/www.uber.com\/en-GB\/blog\/leakprof-featherlight-in production-goroutine-leak-detection\/."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5281\/zenodo.14849367"},{"key":"e_1_3_2_1_25_1","unstructured":"Sourav Choudhary. 2023. Exploring the Inner Workings of Garbage Collection in Golang: Tricolor Mark and Sweep. https:\/\/medium.com\/@souravchoudhary0306\/exploring-the inner-workings-of-garbage-collection-in-golang-tricolor-mark and-sweep-e10eae164a12."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978--3--319--47958"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542478"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC53511"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304069"},{"key":"e_1_3_2_1_30_1","volume-title":"Proceedings 22nd Annual International Symposium on Computer Architecture. 392--403","author":"Tullsen D.M.","unstructured":"D.M. Tullsen, S.J. Eggers, and H.M. Levy. 1995. Simultaneous multi threading: Maximizing on-chip parallelism. In Proceedings 22nd Annual International Symposium on Computer Architecture. 392--403."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3561154"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO51591.2021.9370317"},{"key":"e_1_3_2_1_33_1","volume-title":"2022 USENIX Annual Technical Conference (USENIX ATC 22)","author":"Zhang Zhizhou","year":"2022","unstructured":"Zhizhou Zhang, Murali Krishna Ramanathan, Prithvi Raj, Abhishek Parwal, Timothy Sherwood, and Milind Chabbi. 2022. CRISP: Criti cal Path Analysis of Large-Scale Microservice Architectures. In 2022 USENIX Annual Technical Conference (USENIX ATC 22). USENIX Asso ciation, Carlsbad, CA, 655--672. https:\/\/www.usenix.org\/conference\/ atc22\/presentation\/zhang-zhizhou"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/91556.91597"}],"event":{"name":"ASPLOS '25: 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems","location":"Rotterdam Netherlands","acronym":"ASPLOS '25","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages","SIGOPS ACM Special Interest Group on Operating Systems","SIGARCH ACM Special Interest Group on Computer Architecture"]},"container-title":["Proceedings of the 30th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, Volume 2"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676641.3715990","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3676641.3715990","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,21]],"date-time":"2025-08-21T11:08:45Z","timestamp":1755774525000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3676641.3715990"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,30]]},"references-count":34,"alternative-id":["10.1145\/3676641.3715990","10.1145\/3676641"],"URL":"https:\/\/doi.org\/10.1145\/3676641.3715990","relation":{},"subject":[],"published":{"date-parts":[[2025,3,30]]},"assertion":[{"value":"2025-03-30","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}