{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,7,13]],"date-time":"2024-07-13T13:58:48Z","timestamp":1720879128147},"reference-count":216,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2018,8,1]],"date-time":"2018-08-01T00:00:00Z","timestamp":1533081600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2018,8,1]]},"DOI":"10.1109\/tse.2017.2707089","type":"journal-article","created":{"date-parts":[[2017,5,22]],"date-time":"2017-05-22T21:12:18Z","timestamp":1495487538000},"page":"747-783","source":"Crossref","is-referenced-by-count":37,"title":["A Survey of Recent Trends in Testing Concurrent Software Systems"],"prefix":"10.1109","volume":"44","author":[{"given":"Francesco Adalberto","family":"Bianchi","sequence":"first","affiliation":[]},{"given":"Alessandro","family":"Margara","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Pezze","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref170","first-page":"257","article-title":"WiDS checker: Combating bugs in distributed systems","author":"liu","year":"2007","journal-title":"Proc 3rd Conf Netw Syst Des Implementation"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217973"},{"key":"ref171","first-page":"26","article-title":"Structured\n comparative analysis of systems logs to diagnose performance problems","author":"nagaraj","year":"2012","journal-title":"Proc 3rd Conf Netw Syst Des Implementation"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00722-4_8"},{"key":"ref173","first-page":"423","article-title":"D3S: Debugging deployed distributed systems","author":"liu","year":"2008","journal-title":"Proc 3rd Conf Netw Syst Des Implementation"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1145\/1731060.1731062"},{"key":"ref175","first-page":"229","article-title":"CrystalBall: Predicting and preventing\n inconsistencies in deployed distributed systems","author":"yabandeh","year":"2009","journal-title":"Proc 3rd Conf Netw Syst Des Implementation"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2004.3.6.a5"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1145\/945465.945468"},{"key":"ref168","first-page":"9","article-title":"Pip: Detecting the unexpected in distributed systems","author":"reynolds","year":"2006","journal-title":"Proc 3rd Conf Netw Syst Des Implementation"},{"key":"ref169","first-page":"21","article-title":"Friday: Global comprehension for distributed replay","author":"geels","year":"2007","journal-title":"Proc 3rd Conf Netw Syst Des Implementation"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/2.43525"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111067"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/322154.322158"},{"key":"ref32","author":"godefroid","year":"1996","journal-title":"Partial-Order Methods for the Verification of Concurrent Systems An Approach to the State-Explosion Problem"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250785"},{"key":"ref30","first-page":"337","article-title":"Maximal sound predictive race detection with control flow abstraction","author":"huang","year":"2014","journal-title":"Proc ACM Conf Program Lang Des Implementation"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882300"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1168857.1168864"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375618"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368120"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606578"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070538"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1109\/TCOM.1984.1096074"},{"key":"ref184","first-page":"337","author":"queille","year":"1982","journal-title":"Specification and Verification of Concurrent Systems in CESAR"},{"key":"ref183","first-page":"169","article-title":"Characterizing correctness properties of parallel programs using fixpoints","author":"emerson","year":"1980","journal-title":"Proc Colloq Autom Lang Program"},{"key":"ref182","author":"clarke","year":"1999","journal-title":"Model checking"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68524-1_13"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1007\/s00446-011-0149-1"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1007\/978-0-387-35381-4_5"},{"key":"ref186","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/bxm096"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/238721.238760"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964023"},{"key":"ref179","first-page":"602","article-title":"Static\n deadlock detection for Java libraries","author":"williams","year":"2005","journal-title":"Proc Eur Conf Object-Oriented Program"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103702"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/32.126769"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/78969.78972"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/32.689403"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/5397.5399"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/32.588521"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263717"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542490"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542491"},{"key":"ref154","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001437"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483764"},{"key":"ref156","first-page":"533","article-title":"A study of interleaving\n coverage criteria","author":"lu","year":"2007","journal-title":"Proc Eur Softw Eng Conf Held Jointly ACM SIGSOFT Int Symp Found Softw Eng"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1145\/1065944.1065972"},{"key":"ref150","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375625"},{"key":"ref152","doi-asserted-by":"publisher","DOI":"10.1145\/2555243.2555260"},{"key":"ref151","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926432"},{"key":"ref146","first-page":"110","article-title":"Dynamic partial-order reduction for model checking software","author":"flanagan","year":"2005","journal-title":"Proc Symp Principles of Programming Languages"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351698"},{"key":"ref148","author":"russell","year":"2003","journal-title":"Artificial Intelligence A Modern Approach"},{"key":"ref149","first-page":"267","article-title":"Finding and reproducing Heisenbugs in concurrent programs","author":"musuvathi","year":"2008","journal-title":"Proc Symp Oper Syst Des Implementation"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2150976.2150997"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043590"},{"key":"ref57","first-page":"22","article-title":"Automatically classifying benign and harmful data races using\n replay analysis","author":"narayanasamy","year":"2007","journal-title":"Proc ACM Conf Program Lang Des Implementation"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/859618.859632"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451120"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336780"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048072"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806626"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393651"},{"key":"ref167","first-page":"20","article-title":"X-trace: A pervasive network tracing framework","author":"fonseca","year":"2007","journal-title":"Proc 3rd Conf Netw Syst Des Implementation"},{"key":"ref166","first-page":"18","article-title":"Using magpie for request extraction and\n workload modelling","author":"barham","year":"2004","journal-title":"Proc Symp Oper Syst Des Implementation"},{"key":"ref165","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483773"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.33"},{"key":"ref163","doi-asserted-by":"publisher","DOI":"10.1109\/TEST.1993.470617"},{"key":"ref162","doi-asserted-by":"publisher","DOI":"10.1109\/HLDVT.2010.5496659"},{"key":"ref161","doi-asserted-by":"crossref","first-page":"324","DOI":"10.1007\/11693017_24","article-title":"From faults via test purposes to test cases: On the fault-based testing of concurrent systems","author":"aichernig","year":"2006","journal-title":"Proc 8th Int Conf Fundam Approaches Softw Eng"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/MUTATION.2006.10"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/b95112"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2011.1"},{"key":"ref6","author":"andrews","year":"1991","journal-title":"Concurrent Programming Principles and Practice"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/356901.356903"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/304065.304106"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1979.1675439"},{"key":"ref49","article-title":"Race condition detection for debugging shared-memory parallel\n programs","author":"netzer","year":"1991"},{"key":"ref157","first-page":"177","article-title":"Coverage\n metrics for saturation-based and search-based testing of concurrent software","author":"k?ena","year":"2012","journal-title":"Proc Int'l Conf Runtime Verification"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040336"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.32"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1941553.1941573"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/504282.504288"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/99163.99165"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"ref42","first-page":"167","article-title":"Hybrid dynamic data race detection","author":"o'callahan","year":"2003","journal-title":"Proc Symp Principles Program Lang"},{"key":"ref41","first-page":"229","article-title":"Conditions\n for resolving observability problems in distributed testing","author":"chen","year":"2004","journal-title":"Proc IFIP Int Conf Formal Techn Netw Distrib Syst"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985848"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/1065944.1065958"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250762"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095832"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375584"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522736"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2555243.2555263"},{"key":"ref77","doi-asserted-by":"crossref","first-page":"175","DOI":"10.1145\/2737924.2737998","article-title":"Synthesizing racy tests","author":"samak","year":"2015","journal-title":"Proc ACM Conf Program Lang Des Implementation"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/781498.781529"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568294"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048073"},{"key":"ref79","first-page":"305","article-title":"Commutativity race detection","author":"dimitrov","year":"2014","journal-title":"Proc ACM Conf Program Lang Des Implementation"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390649"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786839"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2803209"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254095"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509538"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594311"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.82"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001436"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/99935.99944"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512560"},{"key":"ref197","doi-asserted-by":"publisher","DOI":"10.1145\/237721.237794"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"ref199","first-page":"10","article-title":"Spark: Cluster computing with working sets","author":"zaharia","year":"2010","journal-title":"Proc USENIX Conf Hot Topics Cloud Comput"},{"key":"ref193","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-4117-1_6"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931068"},{"key":"ref195","author":"campbell","year":"2010","journal-title":"Parallel Programming with Microsoft NET Design Patterns for Decomposition and Coordination on Multicore Architectures"},{"key":"ref196","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568309"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542489"},{"key":"ref94","doi-asserted-by":"crossref","first-page":"245","DOI":"10.1007\/10722468_15","article-title":"Using runtime analysis to guide model checking of Java programs","author":"havelund","year":"2000","journal-title":"Proc of the 7th Int SPIN Workshop on SPIN Model Checking and Software Verification"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73066-8_12"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.45"},{"key":"ref191","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41707-8_7"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806836"},{"key":"ref192","author":"chandra","year":"2001","journal-title":"Parallel Programming in OpenMP"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294272"},{"key":"ref90","author":"bernstein","year":"1987","journal-title":"Concurrency Control and Recovery in Database Systems"},{"key":"ref98","first-page":"491","article-title":"ConLock: A constraint-based\n approach to dynamic checking on deadlocks in multithreaded programs","author":"cai","year":"2014","journal-title":"Proc Int Conf Softw Eng"},{"key":"ref99","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1145\/2635868.2635918","article-title":"Sherlock: Scalable deadlock detection for concurrent programs","author":"eslamimehr","year":"2014","journal-title":"Proc Sixth ACM SIGSOFT Int'l Symp Foundations of Software Eng"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227156"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1145\/2555243.2555262"},{"key":"ref82","doi-asserted-by":"crossref","first-page":"425","DOI":"10.1007\/978-3-642-00593-0_30","article-title":"HAVE: Detecting atomicity violations via\n integrated dynamic and static analysis","author":"chen","year":"2009","journal-title":"Proc 8th Int Conf Fundam Approaches Softw Eng"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065013"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.1599419"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453121"},{"key":"ref80","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1007\/978-3-642-02652-2_21","article-title":"Experience\n with model checking linearizability","author":"vechev","year":"2009","journal-title":"Model Checking Software"},{"key":"ref89","first-page":"131","article-title":"Synthesizing tests for detecting atomicity violations","author":"samak","year":"2015","journal-title":"Proc Sixth ACM SIGSOFT Int'l Symp Foundations of Software Eng"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508249"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806838"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100045"},{"key":"ref88","first-page":"28","article-title":"DoubleChecker: Efficient\n sound and precise atomicity checking","author":"biswas","year":"2014","journal-title":"Proc ACM Conf Program Lang Des Implementation"},{"key":"ref200","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-014-0357-y"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/2688500.2688519"},{"key":"ref100","first-page":"473","article-title":"Multithreaded test synthesis for deadlock detection","author":"samak","year":"2014","journal-title":"Proc Conf Object-Oriented Program Syst Appl"},{"key":"ref209","doi-asserted-by":"crossref","first-page":"273","DOI":"10.1145\/2688500.2688545","article-title":"Efficient\n and reasonable object-oriented concurrency","author":"west","year":"2015","journal-title":"Proceedings of Principles and Practice of Parallel Programming"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-49099-X_7"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1007\/11817949_16"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1145\/2160718.2160735"},{"key":"ref202","author":"virding","year":"1996","journal-title":"Concurrent Programming in Erlang"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375600"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781169"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349328"},{"key":"ref206","doi-asserted-by":"publisher","DOI":"10.1145\/504282.504287"},{"key":"ref211","doi-asserted-by":"crossref","first-page":"154","DOI":"10.1145\/2737924.2737996","article-title":"Asynchronous programming, analysis and testing with state machines","author":"deligiannis","year":"2015","journal-title":"Proc Conf Program Language Des and Implementation ser PLDI"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1145\/2442516.2442540"},{"key":"ref212","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640097"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640096"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736029"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043587"},{"key":"ref216","doi-asserted-by":"publisher","DOI":"10.1145\/2160718.2160742"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926394"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882339"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.88"},{"key":"ref124","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/11693017_25","article-title":"Automated systematic testing of open distributed programs","author":"sen","year":"2006","journal-title":"Proc 8th Int Conf Fundam Approaches Softw Eng"},{"key":"ref129","first-page":"131","article-title":"CDSchecker: Checking concurrent data structures written with C\/C++ atomics","author":"norris","year":"2013","journal-title":"Proc Conf Object-Oriented Program Syst Appl"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029900"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346323"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985824"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336779"},{"key":"ref131","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007526"},{"key":"ref132","doi-asserted-by":"publisher","DOI":"10.1145\/2003476.2003493"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1145\/1639622.1639629"},{"key":"ref135","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693072"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736040"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321679"},{"key":"ref139","doi-asserted-by":"publisher","DOI":"10.1145\/1693453.1693458"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1145\/940071.940116"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSN.2000.857521"},{"key":"ref142","first-page":"221","article-title":"A study of the internal and external\n effects of concurrency bugs","author":"fonseca","year":"2010","journal-title":"Proc Int Conf Depend Syst Netw"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.41"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2011.308"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.87"},{"key":"ref1","author":"mattson","year":"2004","journal-title":"Patterns for Parallel Programming"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022920129859"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950395"},{"key":"ref108","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736041"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950394"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.39"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001438"},{"key":"ref104","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1007\/978-3-642-14295-6_39","article-title":"Universal causality graphs: A precise happens-before model for detecting bugs in concurrent\n programs","author":"kahlon","year":"2010","journal-title":"Proc Int Conf Comput Aided Verification"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321678"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101944"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368119"},{"key":"ref112","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882301"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384651"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375591"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-47993-7_6"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1375527.1375568"},{"key":"ref13","author":"armstrong","year":"2013","journal-title":"Erlang Programming"},{"key":"ref14","author":"wyatt","year":"2013","journal-title":"Akka Concurrency"},{"key":"ref15","article-title":"Communication with automata","author":"petri","year":"1966"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/359576.359585"},{"key":"ref118","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312929"},{"key":"ref17","author":"milner","year":"1982","journal-title":"A Calculus of Communicating Systems"},{"key":"ref117","first-page":"381","article-title":"Detecting\n JavaScript races that matter","author":"mutlu","year":"2015","journal-title":"Proc Sixth ACM SIGSOFT Int'l Symp Foundations of Software Eng"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/361227.361234"},{"key":"ref19","first-page":"119","article-title":"Using high-level petri nets for testing concurrent and real-time systems","volume":"132","author":"morasca","year":"1990","journal-title":"Real-Time Syst Theory Appl"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966465"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/1869459.1869474"},{"key":"ref113","first-page":"847","article-title":"GPredict: generic predictive concurrency analysis","author":"huang","year":"2015","journal-title":"Proceedings of the International Conference on Software Engineering ICSE'94"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594330"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483771"},{"key":"ref120","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610393"},{"key":"ref121","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227145"},{"key":"ref122","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254126"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606574"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/8434075\/07932530.pdf?arnumber=7932530","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T15:12:41Z","timestamp":1643209961000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7932530\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,8,1]]},"references-count":216,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tse.2017.2707089","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,8,1]]}}}