2015
DOI: 10.1007/s11227-015-1418-8
|View full text |Cite
|
Sign up to set email alerts
|

Detecting harmful data races through parallel verification

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
7
0

Year Published

2017
2017
2019
2019

Publication Types

Select...
7

Relationship

2
5

Authors

Journals

citations
Cited by 13 publications
(7 citation statements)
references
References 28 publications
0
7
0
Order By: Relevance
“…Future works on this topic may include mining deeper into the source data. Firstly, we can match accounts using some kind of correlational analysis [39][40][41][42][43] instead of simply using email addresses. Secondly, other TarGuess models [7], which utilize PII info, can also be used to improve the result of the proposed guessing algorithm.…”
Section: Impact Of Global Rankingmentioning
confidence: 99%
“…Future works on this topic may include mining deeper into the source data. Firstly, we can match accounts using some kind of correlational analysis [39][40][41][42][43] instead of simply using email addresses. Secondly, other TarGuess models [7], which utilize PII info, can also be used to improve the result of the proposed guessing algorithm.…”
Section: Impact Of Global Rankingmentioning
confidence: 99%
“…In order to reduce the total verification time, we use pre-execution to help divide the potential race [12]. For example, if we need to allocate the multi-thread program FFT to two servers, we first perform FFT on both servers and record the execution time of the FFT on each server.…”
Section: Dividing Racesmentioning
confidence: 99%
“…Multiple potential races in one group can be verified in one execution. Although those detectors identify the harmful races automatically [12], they still suffer from several limitations on efficiency. This greatly affects the software testing process.…”
Section: Introductionmentioning
confidence: 99%
“…Simply put, if one operation modifies data, the data are read by another operation, and the first operation happens-before the second operation, the second operation is guaranteed to see the changes made by the first operation. Having such model is essential for B Jiri Dokulil jiri.dokulil@univie.ac.at 1 Faculty of Computer Science, University of Vienna, Vienna, Austria programmers' understanding of the code, but it can also be used in tools that detect errors such as data races [20,22].…”
Section: Introductionmentioning
confidence: 99%