“…We have mentioned in Section 1 some of the static methods [3,4], runtime monitoring [5,1,6,7,8], and runtime prediction [9,2,10,11,12,13] for detecting atomicity violations. Lu et al [1] used access interleaving invariants to capture patterns of test runs and then monitor production runs for detecting three-access atomicity violations.…”