GLORIA

GEOMAR Library Ocean Research Information Access

Your email was sent successfully. Check your inbox.

An error occurred while sending the email. Please try again.

Proceed reservation?

Export
  • 1
    Online Resource
    Online Resource
    Association for Computing Machinery (ACM) ; 2009
    In:  ACM SIGARCH Computer Architecture News Vol. 37, No. 1 ( 2009-03), p. 25-36
    In: ACM SIGARCH Computer Architecture News, Association for Computing Machinery (ACM), Vol. 37, No. 1 ( 2009-03), p. 25-36
    Abstract: Multicore hardware is making concurrent programs pervasive. Unfortunately, concurrent programs are prone to bugs. Among different types of concurrency bugs, atomicity violation bugs are common and important. Existing techniques to detect atomicity violation bugs suffer from one limitation: requiring bugs to manifest during monitored runs, which is an open problem in concurrent program testing. This paper makes two contributions. First, it studies the interleaving characteristics of the common practice in concurrent program testing (i.e., running a program over and over) to understand why atomicity violation bugs are hard to expose. Second, it proposes CTrigger to effectively and efficiently expose atomicity violation bugs in large programs. CTrigger focuses on a special type of interleavings (i.e., unserializable interleavings) that are inherently correlated to atomicity violation bugs, and uses trace analysis to systematically identify (likely) feasible unserializable interleavings with low occurrence-probability. CTrigger then uses minimum execution perturbation to exercise low-probability interleavings and expose difficult-to-catch atomicity violation. We evaluate CTrigger with real-world atomicity violation bugs from four sever/desktop applications (Apache, MySQL, Mozilla, and PBZIP2) and three SPLASH2 applications on 8-core machines. CTrigger efficiently exposes the tested bugs within 1--235 seconds, two to four orders of magnitude faster than stress testing. Without CTrigger, some of these bugs do not manifest even after 7 full days of stress testing. In addition, without deterministic replay support, once a bug is exposed, CTrigger can help programmers reliably reproduce it for diagnosis. Our tested bugs are reproduced by CTrigger mostly within 5 seconds, 300 to over 60000 times faster than stress testing.
    Type of Medium: Online Resource
    ISSN: 0163-5964
    RVK:
    Language: English
    Publisher: Association for Computing Machinery (ACM)
    Publication Date: 2009
    detail.hit.zdb_id: 2088489-8
    detail.hit.zdb_id: 186012-4
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 2
    Online Resource
    Online Resource
    Institute of Electrical and Electronics Engineers (IEEE) ; 2021
    In:  IEEE Computer Graphics and Applications Vol. 41, No. 3 ( 2021-5-1), p. 113-123
    In: IEEE Computer Graphics and Applications, Institute of Electrical and Electronics Engineers (IEEE), Vol. 41, No. 3 ( 2021-5-1), p. 113-123
    Type of Medium: Online Resource
    ISSN: 0272-1716 , 1558-1756
    RVK:
    RVK:
    Language: Unknown
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2021
    detail.hit.zdb_id: 2028246-1
    detail.hit.zdb_id: 245654-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 3
    Online Resource
    Online Resource
    Institute of Electrical and Electronics Engineers (IEEE) ; 2023
    In:  IEEE Transactions on Multimedia Vol. 25 ( 2023), p. 2339-2353
    In: IEEE Transactions on Multimedia, Institute of Electrical and Electronics Engineers (IEEE), Vol. 25 ( 2023), p. 2339-2353
    Type of Medium: Online Resource
    ISSN: 1520-9210 , 1941-0077
    RVK:
    Language: Unknown
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2023
    detail.hit.zdb_id: 2033070-4
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 4
    Online Resource
    Online Resource
    Institute of Electrical and Electronics Engineers (IEEE) ; 2012
    In:  IEEE Transactions on Parallel and Distributed Systems Vol. 23, No. 6 ( 2012-06), p. 1060-1072
    In: IEEE Transactions on Parallel and Distributed Systems, Institute of Electrical and Electronics Engineers (IEEE), Vol. 23, No. 6 ( 2012-06), p. 1060-1072
    Type of Medium: Online Resource
    ISSN: 1045-9219
    RVK:
    RVK:
    Language: Unknown
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2012
    detail.hit.zdb_id: 2027774-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 5
    Online Resource
    Online Resource
    Institute of Electrical and Electronics Engineers (IEEE) ; 2007
    In:  IEEE Micro Vol. 27, No. 1 ( 2007-01), p. 26-35
    In: IEEE Micro, Institute of Electrical and Electronics Engineers (IEEE), Vol. 27, No. 1 ( 2007-01), p. 26-35
    Type of Medium: Online Resource
    ISSN: 0272-1732
    RVK:
    Language: Unknown
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2007
    detail.hit.zdb_id: 2027750-7
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 6
    Online Resource
    Online Resource
    Institute of Electrical and Electronics Engineers (IEEE) ; 2017
    In:  IEEE Transactions on Multimedia Vol. 19, No. 5 ( 2017-5), p. 1015-1029
    In: IEEE Transactions on Multimedia, Institute of Electrical and Electronics Engineers (IEEE), Vol. 19, No. 5 ( 2017-5), p. 1015-1029
    Type of Medium: Online Resource
    ISSN: 1520-9210 , 1941-0077
    RVK:
    Language: Unknown
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2017
    detail.hit.zdb_id: 2033070-4
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 7
    Online Resource
    Online Resource
    Institute of Electrical and Electronics Engineers (IEEE) ; 2012
    In:  IEEE Transactions on Software Engineering Vol. 38, No. 4 ( 2012-07), p. 844-860
    In: IEEE Transactions on Software Engineering, Institute of Electrical and Electronics Engineers (IEEE), Vol. 38, No. 4 ( 2012-07), p. 844-860
    Type of Medium: Online Resource
    ISSN: 0098-5589
    RVK:
    RVK:
    Language: Unknown
    Publisher: Institute of Electrical and Electronics Engineers (IEEE)
    Publication Date: 2012
    detail.hit.zdb_id: 189642-8
    detail.hit.zdb_id: 2026617-0
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 8
    Online Resource
    Online Resource
    Elsevier BV ; 2015
    In:  Theoretical Computer Science Vol. 607 ( 2015-11), p. 296-305
    In: Theoretical Computer Science, Elsevier BV, Vol. 607 ( 2015-11), p. 296-305
    Type of Medium: Online Resource
    ISSN: 0304-3975
    RVK:
    Language: English
    Publisher: Elsevier BV
    Publication Date: 2015
    detail.hit.zdb_id: 193706-6
    detail.hit.zdb_id: 1466347-8
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 9
    Online Resource
    Online Resource
    Association for Computing Machinery (ACM) ; 2008
    In:  ACM SIGARCH Computer Architecture News Vol. 36, No. 1 ( 2008-03-25), p. 329-339
    In: ACM SIGARCH Computer Architecture News, Association for Computing Machinery (ACM), Vol. 36, No. 1 ( 2008-03-25), p. 329-339
    Abstract: The reality of multi-core hardware has made concurrent programs pervasive. Unfortunately, writing correct concurrent programs is difficult. Addressing this challenge requires advances in multiple directions, including concurrency bug detection, concurrent program testing, concurrent programming model design, etc. Designing effective techniques in all these directions will significantly benefit from a deep understanding of real world concurrency bug characteristics. This paper provides the first (to the best of our knowledge) comprehensive real world concurrency bug characteristic study. Specifically, we have carefully examined concurrency bug patterns, manifestation, and fix strategies of 105 randomly selected real world concurrency bugs from 4 representative server and client open-source applications (MySQL, Apache, Mozilla and OpenOffice). Our study reveals several interesting findings and provides useful guidance for concurrency bug detection, testing, and concurrent programming language design. Some of our findings are as follows: (1) Around one third of the examined non-deadlock concurrency bugs are caused by violation to programmers' order intentions, which may not be easily expressed via synchronization primitives like locks and transactional memories; (2) Around 34% of the examined non-deadlock concurrency bugs involve multiple variables, which are not well addressed by existing bug detection tools; (3) About 92% of the examined concurrency bugs canbe reliably triggered by enforcing certain orders among no more than 4 memory accesses. This indicates that testing concurrent programs can target at exploring possible orders among every small groups of memory accesses, instead of among all memory accesses; (4) About 73% of the examinednon-deadlock concurrency bugs were not fixed by simply adding or changing locks, and many of the fixes were not correct at the first try, indicating the difficulty of reasoning concurrent execution by programmers.
    Type of Medium: Online Resource
    ISSN: 0163-5964
    RVK:
    Language: English
    Publisher: Association for Computing Machinery (ACM)
    Publication Date: 2008
    detail.hit.zdb_id: 2088489-8
    detail.hit.zdb_id: 186012-4
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
  • 10
    Online Resource
    Online Resource
    Association for Computing Machinery (ACM) ; 2022
    In:  ACM Transactions on Multimedia Computing, Communications, and Applications Vol. 18, No. 3s ( 2022-10-31), p. 1-18
    In: ACM Transactions on Multimedia Computing, Communications, and Applications, Association for Computing Machinery (ACM), Vol. 18, No. 3s ( 2022-10-31), p. 1-18
    Abstract: We consider the task of temporal human action localization in lifestyle vlogs. We introduce a novel dataset consisting of manual annotations of temporal localization for 13,000 narrated actions in 1,200 video clips. We present an extensive analysis of this data, which allows us to better understand how the language and visual modalities interact throughout the videos. We propose a simple yet effective method to localize the narrated actions based on their expected duration. Through several experiments and analyses, we show that our method brings complementary information with respect to previous methods, and leads to improvements over previous work for the task of temporal action localization.
    Type of Medium: Online Resource
    ISSN: 1551-6857 , 1551-6865
    RVK:
    Language: English
    Publisher: Association for Computing Machinery (ACM)
    Publication Date: 2022
    detail.hit.zdb_id: 2182650-X
    Location Call Number Limitation Availability
    BibTip Others were also interested in ...
Close ⊗
This website uses cookies and the analysis tool Matomo. More information can be found here...