• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 484
Next 10 →

Automated Concurrency-Bug Fixing

by Guoliang Jin, Wei Zhang, Dongdong Deng, Ben Liblit, Shan Lu
"... Concurrency bugs are widespread in multithreaded programs. Fixing them is time-consuming and error-prone. We present CFix, a system that automates the repair of concurrency bugs. CFix works with a wide variety of concurrency-bug detectors. For each failure-inducing interleaving reported by a bug det ..."
Abstract - Cited by 26 (1 self) - Add to MetaCart
Concurrency bugs are widespread in multithreaded programs. Fixing them is time-consuming and error-prone. We present CFix, a system that automates the repair of concurrency bugs. CFix works with a wide variety of concurrency-bug detectors. For each failure-inducing interleaving reported by a bug

Finding Concurrency Bugs in Java

by David Hovemeyer, William Pugh - In Proceedings of the PODC Workshop on Concurrency and Synchronization in Java Programs , 2004
"... Because threads are a core feature of the Java language, the widespread adoption of Java has exposed a much wider audience to concurrency than previous languages have. Concurrent programs are notoriously di#cult to write correctly, and many subtle bugs can result from incorrect use of threads and sy ..."
Abstract - Cited by 18 (2 self) - Add to MetaCart
Because threads are a core feature of the Java language, the widespread adoption of Java has exposed a much wider audience to concurrency than previous languages have. Concurrent programs are notoriously di#cult to write correctly, and many subtle bugs can result from incorrect use of threads

UNDERSTANDING, DETECTING AND EXPOSING CONCURRENCY BUGS

by Shan Lu , 2008
"... Software is pervasive in our daily lives. Unfortunately, software bugs can severely affect the dependability and security of software systems. Among all types of software bugs, the concurrency bug is one of the most troublesome and important. Concurrency bugs widely exist in concurrent programs. The ..."
Abstract - Cited by 1 (0 self) - Add to MetaCart
Software is pervasive in our daily lives. Unfortunately, software bugs can severely affect the dependability and security of software systems. Among all types of software bugs, the concurrency bug is one of the most troublesome and important. Concurrency bugs widely exist in concurrent programs

Concurrent bug patterns and how to test them

by Eitan Farchi, Yarden Nir, Shmuel Ur - In IPDPS ’03: Proceedings of the 17th International Symposium on Parallel and Distributed Processing , 2003
"... We present and categorize a taxonomy of concurrent bug patterns. We then use the taxonomy to create new timing heuristics for ConTest. Initial industrial experience indi-cates that these heuristics improve the bug finding ability of ConTest. We also show how concurrent bug patterns can be derived fr ..."
Abstract - Cited by 79 (3 self) - Add to MetaCart
We present and categorize a taxonomy of concurrent bug patterns. We then use the taxonomy to create new timing heuristics for ConTest. Initial industrial experience indi-cates that these heuristics improve the bug finding ability of ConTest. We also show how concurrent bug patterns can be derived

Applying transactional memory to concurrency bugs

by Haris Volos, Andres Jaan Tack, Michael M. Swift, Shan Lu - In ASPLOS , 2012
"... Multithreaded programs often suffer from synchronization bugs such as atomicity violations and deadlocks. These bugs arise from complicated locking strategies and ad hoc synchronization methods to avoid the use of locks. A survey of the bug databases of major open-source applications shows that conc ..."
Abstract - Cited by 10 (2 self) - Add to MetaCart
that concurrency bugs often take multiple fix attempts, and that fixes often introduce yet more con-currency bugs. Transactional memory (TM) enables programmers to declare regions of code atomic without specifying a lock and has the potential to avoid these bugs. Where most previous studies have focused on using

A Study of the Internal and External Effects of Concurrency Bugs

by Pedro Fonseca, Cheng Li, Vishal Singhal, Rodrigo Rodrigues
"... Concurrent programming is increasingly important for achieving performance gains in the multi-core era, but it is also a difficult and error-prone task. Concurrency bugs are particularly difficult to avoid and diagnose, and therefore in order to improve methods for handling such bugs, we need a bett ..."
Abstract - Cited by 16 (1 self) - Add to MetaCart
Concurrent programming is increasingly important for achieving performance gains in the multi-core era, but it is also a difficult and error-prone task. Concurrency bugs are particularly difficult to avoid and diagnose, and therefore in order to improve methods for handling such bugs, we need a

Finding Concurrency Bugs with Context-Aware Communication Graphs

by Brandon Lucia, Luis Ceze
"... Incorrect thread synchronization often leads to concurrency bugs that manifest nondeterministically and are difficult to detect and fix. Past work on detecting concurrency bugs has addressed the general problem in an ad-hoc fashion, focusing mostly on data races and atomicity violations. Using graph ..."
Abstract - Cited by 36 (5 self) - Add to MetaCart
Incorrect thread synchronization often leads to concurrency bugs that manifest nondeterministically and are difficult to detect and fix. Past work on detecting concurrency bugs has addressed the general problem in an ad-hoc fashion, focusing mostly on data races and atomicity violations. Using

Efficient Concurrency-Bug Detection Across Inputs

by Dongdong Deng, Wei Zhang, Shan Lu
"... In the multi-core era, it is critical to efficiently test multithreaded software and expose concurrency bugs before software release. Previous work has made significant progress in detecting and validating concurrency bugs under a given input. Unfortunately, software testing always faces large sets ..."
Abstract - Cited by 2 (0 self) - Add to MetaCart
In the multi-core era, it is critical to efficiently test multithreaded software and expose concurrency bugs before software release. Previous work has made significant progress in detecting and validating concurrency bugs under a given input. Unfortunately, software testing always faces large sets

AI: A Lightweight System for Tolerating Concurrency Bugs

by Mingxing Zhang, Yongwei Wu, Shan Lu, Shanxiang Qi, Jinglei Ren, Weimin Zheng
"... Concurrency bugs are notoriously difficult to eradicate during software testing because of their non-deterministic nature. More-over, fixing concurrency bugs is time-consuming and error-prone. Thus, tolerating concurrency bugs during production runs is an at-tractive complementary approach to bug de ..."
Abstract - Add to MetaCart
Concurrency bugs are notoriously difficult to eradicate during software testing because of their non-deterministic nature. More-over, fixing concurrency bugs is time-consuming and error-prone. Thus, tolerating concurrency bugs during production runs is an at-tractive complementary approach to bug

RADBench: A Concurrency Bug Benchmark Suite

by Nicholas Jalbert, Cristiano Pereira, Koushik Sen, Gilles Pokam - In HotPar’11 , 2011
"... Testing and debugging tools for concurrent programs are often validated on known bugs. To aid the development of these tools, we present the Race, Atomicity, and Deadlock Benchmark (RADBench) suite. The RADBench suite contains the full source of 10 real concurrency bugs found in large open-source so ..."
Abstract - Cited by 11 (3 self) - Add to MetaCart
Testing and debugging tools for concurrent programs are often validated on known bugs. To aid the development of these tools, we present the Race, Atomicity, and Deadlock Benchmark (RADBench) suite. The RADBench suite contains the full source of 10 real concurrency bugs found in large open
Next 10 →
Results 1 - 10 of 484
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University