{"id":"https://openalex.org/W4308643091","doi":"https://doi.org/10.1145/3540250.3549110","title":"Peahen: fast and precise static deadlock detection via context reduction","display_name":"Peahen: fast and precise static deadlock detection via context reduction","publication_year":2022,"publication_date":"2022-11-07","ids":{"openalex":"https://openalex.org/W4308643091","doi":"https://doi.org/10.1145/3540250.3549110"},"language":"en","primary_location":{"id":"doi:10.1145/3540250.3549110","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3540250.3549110","pdf_url":null,"source":{"id":"https://openalex.org/S4363608883","display_name":"Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5017012201","display_name":"Yuandao Cai","orcid":"https://orcid.org/0000-0001-6340-1416"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":true,"raw_author_name":"Yuandao Cai","raw_affiliation_strings":["Hong Kong University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Hong Kong University of Science and Technology, China","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5000297701","display_name":"Chengfeng Ye","orcid":"https://orcid.org/0000-0002-9529-3410"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Chengfeng Ye","raw_affiliation_strings":["Hong Kong University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Hong Kong University of Science and Technology, China","institution_ids":["https://openalex.org/I200769079"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5034844386","display_name":"Qingkai Shi","orcid":"https://orcid.org/0000-0002-8297-8998"},"institutions":[],"countries":[],"is_corresponding":false,"raw_author_name":"Qingkai Shi","raw_affiliation_strings":["Ant Group, China"],"affiliations":[{"raw_affiliation_string":"Ant Group, China","institution_ids":[]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5101490553","display_name":"Charles Zhang","orcid":"https://orcid.org/0000-0001-6417-1034"},"institutions":[{"id":"https://openalex.org/I200769079","display_name":"Hong Kong University of Science and Technology","ror":"https://ror.org/00q4vv597","country_code":"HK","type":"education","lineage":["https://openalex.org/I200769079"]}],"countries":["HK"],"is_corresponding":false,"raw_author_name":"Charles Zhang","raw_affiliation_strings":["Hong Kong University of Science and Technology, China"],"affiliations":[{"raw_affiliation_string":"Hong Kong University of Science and Technology, China","institution_ids":["https://openalex.org/I200769079"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5017012201"],"corresponding_institution_ids":["https://openalex.org/I200769079"],"apc_list":null,"apc_paid":null,"fwci":1.3368,"has_fulltext":false,"cited_by_count":13,"citation_normalized_percentile":{"value":0.83349071,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"784","last_page":"796"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11424","display_name":"Security and Verification in Computing","score":0.9994000196456909,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9986000061035156,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.83231520652771},{"id":"https://openalex.org/keywords/deadlock","display_name":"Deadlock","score":0.8064619302749634},{"id":"https://openalex.org/keywords/scalability","display_name":"Scalability","score":0.7873708605766296},{"id":"https://openalex.org/keywords/deadlock-prevention-algorithms","display_name":"Deadlock prevention algorithms","score":0.715516984462738},{"id":"https://openalex.org/keywords/lock","display_name":"Lock (firearm)","score":0.6949475407600403},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.6190939545631409},{"id":"https://openalex.org/keywords/static-analysis","display_name":"Static analysis","score":0.5773103833198547},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.5442119836807251},{"id":"https://openalex.org/keywords/false-positive-paradox","display_name":"False positive paradox","score":0.5429790019989014},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.48867371678352356},{"id":"https://openalex.org/keywords/wait-for-graph","display_name":"Wait-for graph","score":0.4386327862739563},{"id":"https://openalex.org/keywords/enhanced-data-rates-for-gsm-evolution","display_name":"Enhanced Data Rates for GSM Evolution","score":0.43337786197662354},{"id":"https://openalex.org/keywords/reduction","display_name":"Reduction (mathematics)","score":0.4230431914329529},{"id":"https://openalex.org/keywords/dependency-graph","display_name":"Dependency graph","score":0.4132750332355499},{"id":"https://openalex.org/keywords/reliability","display_name":"Reliability (semiconductor)","score":0.4122886657714844},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.3324574828147888},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.17656496167182922},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.1543215811252594},{"id":"https://openalex.org/keywords/graph-rewriting","display_name":"Graph rewriting","score":0.1170583963394165},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.10079419612884521},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.08815699815750122}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.83231520652771},{"id":"https://openalex.org/C159023740","wikidata":"https://www.wikidata.org/wiki/Q623276","display_name":"Deadlock","level":2,"score":0.8064619302749634},{"id":"https://openalex.org/C48044578","wikidata":"https://www.wikidata.org/wiki/Q727490","display_name":"Scalability","level":2,"score":0.7873708605766296},{"id":"https://openalex.org/C113429609","wikidata":"https://www.wikidata.org/wiki/Q4060699","display_name":"Deadlock prevention algorithms","level":3,"score":0.715516984462738},{"id":"https://openalex.org/C174839445","wikidata":"https://www.wikidata.org/wiki/Q1134386","display_name":"Lock (firearm)","level":2,"score":0.6949475407600403},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.6190939545631409},{"id":"https://openalex.org/C97686452","wikidata":"https://www.wikidata.org/wiki/Q7604153","display_name":"Static analysis","level":2,"score":0.5773103833198547},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.5442119836807251},{"id":"https://openalex.org/C64869954","wikidata":"https://www.wikidata.org/wiki/Q1859747","display_name":"False positive paradox","level":2,"score":0.5429790019989014},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.48867371678352356},{"id":"https://openalex.org/C106891557","wikidata":"https://www.wikidata.org/wiki/Q4148051","display_name":"Wait-for graph","level":4,"score":0.4386327862739563},{"id":"https://openalex.org/C162307627","wikidata":"https://www.wikidata.org/wiki/Q204833","display_name":"Enhanced Data Rates for GSM Evolution","level":2,"score":0.43337786197662354},{"id":"https://openalex.org/C111335779","wikidata":"https://www.wikidata.org/wiki/Q3454686","display_name":"Reduction (mathematics)","level":2,"score":0.4230431914329529},{"id":"https://openalex.org/C16311509","wikidata":"https://www.wikidata.org/wiki/Q4148050","display_name":"Dependency graph","level":3,"score":0.4132750332355499},{"id":"https://openalex.org/C43214815","wikidata":"https://www.wikidata.org/wiki/Q7310987","display_name":"Reliability (semiconductor)","level":3,"score":0.4122886657714844},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.3324574828147888},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.17656496167182922},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.1543215811252594},{"id":"https://openalex.org/C558772884","wikidata":"https://www.wikidata.org/wiki/Q1508564","display_name":"Graph rewriting","level":3,"score":0.1170583963394165},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.10079419612884521},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.08815699815750122},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C163258240","wikidata":"https://www.wikidata.org/wiki/Q25342","display_name":"Power (physics)","level":2,"score":0.0},{"id":"https://openalex.org/C62520636","wikidata":"https://www.wikidata.org/wiki/Q944","display_name":"Quantum mechanics","level":1,"score":0.0},{"id":"https://openalex.org/C78519656","wikidata":"https://www.wikidata.org/wiki/Q101333","display_name":"Mechanical engineering","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C2524010","wikidata":"https://www.wikidata.org/wiki/Q8087","display_name":"Geometry","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3540250.3549110","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3540250.3549110","pdf_url":null,"source":{"id":"https://openalex.org/S4363608883","display_name":"Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","raw_type":"proceedings-article"},{"id":"pmh:oai:repository.hkust.edu.hk:1783.1-123774","is_oa":false,"landing_page_url":"http://lbdiscover.ust.hk/uresolver?url_ver=Z39.88-2004&rft_val_fmt=info:ofi/fmt:kev:mtx:journal&rfr_id=info:sid/HKUST:SPI&rft.genre=article&rft.issn=&rft.volume=&rft.issue=&rft.date=2022&rft.spage=784&rft.aulast=Cai&rft.aufirst=&rft.atitle=Peahen%3A+fast+and+precise+static+deadlock+detection+via+context+reduction&rft.title=ESEC%2FFSE+2022+-+Proceedings+of+the+30th+ACM+Joint+Meeting+European+Software+Engineering+Conference+and+Symposium+on+the+Foundations+of+Software+Engineering","pdf_url":null,"source":{"id":"https://openalex.org/S4306401796","display_name":"Rare & Special e-Zone (The Hong Kong University of Science and Technology)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/I200769079","host_organization_name":"Hong Kong University of Science and Technology","host_organization_lineage":["https://openalex.org/I200769079"],"host_organization_lineage_names":[],"type":"repository"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"","raw_type":"Conference paper"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Peace, Justice and strong institutions","id":"https://metadata.un.org/sdg/16","score":0.6100000143051147}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":54,"referenced_works":["https://openalex.org/W1534988187","https://openalex.org/W1541313361","https://openalex.org/W1575599371","https://openalex.org/W1862182621","https://openalex.org/W1868584616","https://openalex.org/W1970363544","https://openalex.org/W1996567876","https://openalex.org/W2033651910","https://openalex.org/W2046368282","https://openalex.org/W2049962250","https://openalex.org/W2060234806","https://openalex.org/W2065675749","https://openalex.org/W2067406339","https://openalex.org/W2083342911","https://openalex.org/W2101161997","https://openalex.org/W2113027907","https://openalex.org/W2119494620","https://openalex.org/W2132613390","https://openalex.org/W2132800423","https://openalex.org/W2134164054","https://openalex.org/W2135395375","https://openalex.org/W2140021378","https://openalex.org/W2152777241","https://openalex.org/W2164022236","https://openalex.org/W2166743230","https://openalex.org/W2289498116","https://openalex.org/W2294085393","https://openalex.org/W2380139570","https://openalex.org/W2398231325","https://openalex.org/W2510207151","https://openalex.org/W2767607466","https://openalex.org/W2794682558","https://openalex.org/W2794889478","https://openalex.org/W2798710664","https://openalex.org/W2799226481","https://openalex.org/W2898242299","https://openalex.org/W2899492704","https://openalex.org/W2927543040","https://openalex.org/W3015867278","https://openalex.org/W3034030180","https://openalex.org/W3042552260","https://openalex.org/W3091693993","https://openalex.org/W3106314272","https://openalex.org/W3151416809","https://openalex.org/W3174414418","https://openalex.org/W3174544859","https://openalex.org/W3195446863","https://openalex.org/W4206637743","https://openalex.org/W4210712189","https://openalex.org/W4225528709","https://openalex.org/W4251803824","https://openalex.org/W4284687346","https://openalex.org/W4285490427","https://openalex.org/W4300810260"],"related_works":["https://openalex.org/W2386884462","https://openalex.org/W3140720071","https://openalex.org/W2560925019","https://openalex.org/W1596298878","https://openalex.org/W2120098047","https://openalex.org/W2038880851","https://openalex.org/W2088433124","https://openalex.org/W2008483896","https://openalex.org/W2035968706","https://openalex.org/W4383684213"],"abstract_inverted_index":{"Deadlocks":[0],"still":[1],"severely":[2],"inflict":[3],"reliability":[4],"and":[5,105],"security":[6],"issues":[7],"upon":[8],"software":[9],"systems":[10],"of":[11],"the":[12,48,79,98,120,124],"modern":[13],"age.":[14],"Worse":[15],"still,":[16],"as":[17],"we":[18,62],"note,":[19],"in":[20,123],"prior":[21],"static":[22,71],"deadlock":[23,72,121],"detectors,":[24],"good":[25,57],"precision":[26,85],"does":[27],"not":[28],"go":[29],"hand-in-hand":[30],"with":[31],"high":[32,84],"scalability":[33],"---":[34],"their":[35],"approaches":[36],"are":[37],"either":[38],"context-insensitive,":[39],"thereby":[40],"engendering":[41],"many":[42],"false":[43],"positives,":[44],"or":[45],"suffer":[46],"from":[47],"calling":[49,132],"context":[50],"explosion":[51],"to":[52],"reach":[53],"context-sensitive,":[54],"thus":[55],"compromising":[56],"efficiency.":[58],"In":[59],"this":[60],"paper,":[61],"advocate":[63],"Peahen,":[64],"geared":[65],"towards":[66],"precise":[67,108],"yet":[68,109],"also":[69],"scalable":[70],"detection.":[73],"At":[74],"its":[75],"crux,":[76],"Peahen":[77],"decomposes":[78],"computational":[80],"effort":[81],"for":[82,128],"embracing":[83],"into":[86,117],"two":[87],"cooperative":[88],"analysis":[89],"stages:":[90],"(i)":[91],"context-insensitive":[92],"lock-graph":[93],"construction,":[94],"which":[95,112],"selectively":[96],"encodes":[97],"essential":[99],"lock-acquisition":[100],"information":[101,116],"on":[102],"each":[103],"edge,":[104],"(ii)":[106],"three":[107],"lazy":[110],"refinements,":[111],"incorporate":[113],"such":[114],"edge":[115],"progressively":[118],"refining":[119],"cycles":[122],"lock":[125],"graph":[126],"only":[127],"a":[129],"few":[130],"interesting":[131],"contexts.":[133]},"counts_by_year":[{"year":2026,"cited_by_count":2},{"year":2025,"cited_by_count":3},{"year":2024,"cited_by_count":4},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2026-04-11T08:14:18.477133","created_date":"2025-10-10T00:00:00"}
