“…Lock elision, whether in software or hardware or a hybrid fashion, including gaining insights into them, has been extensively studied [22,29,33,[35][36][37][38]43,44,56,57,62,70,70,71,73,79,89,90,92]. Our work uses many of those techniques; for example, the basic design of our runtime controller was inspired by Wang et al [89].…”