{"id":"https://openalex.org/W2060066096","doi":"https://doi.org/10.1145/1839379.1839383","title":"Computer-aided construction of concurrent systems","display_name":"Computer-aided construction of concurrent systems","publication_year":2010,"publication_date":"2010-06-17","ids":{"openalex":"https://openalex.org/W2060066096","doi":"https://doi.org/10.1145/1839379.1839383","mag":"2060066096"},"language":"en","primary_location":{"id":"doi:10.1145/1839379.1839383","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1839379.1839383","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing on International Conference on Computer Systems and Technologies","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5069901599","display_name":"Martin Vechev","orcid":"https://orcid.org/0000-0002-0054-9568"},"institutions":[{"id":"https://openalex.org/I18014758","display_name":"Simon Fraser University","ror":"https://ror.org/0213rcc28","country_code":"CA","type":"education","lineage":["https://openalex.org/I18014758"]}],"countries":["CA"],"is_corresponding":true,"raw_author_name":"Martin Vechev","raw_affiliation_strings":["University of Cambridge, England and Simon Fraser University, Canada"],"affiliations":[{"raw_affiliation_string":"University of Cambridge, England and Simon Fraser University, Canada","institution_ids":["https://openalex.org/I18014758"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5069901599"],"corresponding_institution_ids":["https://openalex.org/I18014758"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.12595162,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"19","last_page":"24"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10054","display_name":"Parallel Computing and Optimization Techniques","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10772","display_name":"Distributed systems and fault tolerance","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10933","display_name":"Real-Time Systems Scheduling","score":0.9988999962806702,"subfield":{"id":"https://openalex.org/subfields/1708","display_name":"Hardware and Architecture"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8854626417160034},{"id":"https://openalex.org/keywords/concurrency","display_name":"Concurrency","score":0.8405882120132446},{"id":"https://openalex.org/keywords/synchronization","display_name":"Synchronization (alternating current)","score":0.696153998374939},{"id":"https://openalex.org/keywords/programmer","display_name":"Programmer","score":0.6469408273696899},{"id":"https://openalex.org/keywords/exploit","display_name":"Exploit","score":0.6118801236152649},{"id":"https://openalex.org/keywords/concurrent-computing","display_name":"Concurrent computing","score":0.5348061323165894},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.47634533047676086},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4201841354370117},{"id":"https://openalex.org/keywords/concurrency-control","display_name":"Concurrency control","score":0.4136943519115448},{"id":"https://openalex.org/keywords/embedded-system","display_name":"Embedded system","score":0.3828669786453247},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.3517799973487854},{"id":"https://openalex.org/keywords/database-transaction","display_name":"Database transaction","score":0.0970781147480011}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8854626417160034},{"id":"https://openalex.org/C193702766","wikidata":"https://www.wikidata.org/wiki/Q1414548","display_name":"Concurrency","level":2,"score":0.8405882120132446},{"id":"https://openalex.org/C2778562939","wikidata":"https://www.wikidata.org/wiki/Q1298791","display_name":"Synchronization (alternating current)","level":3,"score":0.696153998374939},{"id":"https://openalex.org/C2778514511","wikidata":"https://www.wikidata.org/wiki/Q1374194","display_name":"Programmer","level":2,"score":0.6469408273696899},{"id":"https://openalex.org/C165696696","wikidata":"https://www.wikidata.org/wiki/Q11287","display_name":"Exploit","level":2,"score":0.6118801236152649},{"id":"https://openalex.org/C150495011","wikidata":"https://www.wikidata.org/wiki/Q128392","display_name":"Concurrent computing","level":2,"score":0.5348061323165894},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.47634533047676086},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4201841354370117},{"id":"https://openalex.org/C84511453","wikidata":"https://www.wikidata.org/wiki/Q2914952","display_name":"Concurrency control","level":3,"score":0.4136943519115448},{"id":"https://openalex.org/C149635348","wikidata":"https://www.wikidata.org/wiki/Q193040","display_name":"Embedded system","level":1,"score":0.3828669786453247},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.3517799973487854},{"id":"https://openalex.org/C75949130","wikidata":"https://www.wikidata.org/wiki/Q848010","display_name":"Database transaction","level":2,"score":0.0970781147480011},{"id":"https://openalex.org/C31258907","wikidata":"https://www.wikidata.org/wiki/Q1301371","display_name":"Computer network","level":1,"score":0.0},{"id":"https://openalex.org/C127162648","wikidata":"https://www.wikidata.org/wiki/Q16858953","display_name":"Channel (broadcasting)","level":2,"score":0.0},{"id":"https://openalex.org/C38652104","wikidata":"https://www.wikidata.org/wiki/Q3510521","display_name":"Computer security","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/1839379.1839383","is_oa":false,"landing_page_url":"https://doi.org/10.1145/1839379.1839383","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 11th International Conference on Computer Systems and Technologies and Workshop for PhD Students in Computing on International Conference on Computer Systems and Technologies","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":7,"referenced_works":["https://openalex.org/W199538813","https://openalex.org/W1927382928","https://openalex.org/W2104861744","https://openalex.org/W2109033563","https://openalex.org/W2109065830","https://openalex.org/W2122735631","https://openalex.org/W2157062942"],"related_works":["https://openalex.org/W2150179797","https://openalex.org/W2170147831","https://openalex.org/W4242696047","https://openalex.org/W2020936745","https://openalex.org/W2118183611","https://openalex.org/W2086685683","https://openalex.org/W2094991402","https://openalex.org/W2061450115","https://openalex.org/W58532547","https://openalex.org/W2786550303"],"abstract_inverted_index":{"Virtually":[0],"all":[1,31],"chips":[2],"today,":[3],"from":[4],"high-end":[5],"to":[6,36,54],"embedded,":[7],"are":[8],"being":[9],"built":[10],"with":[11],"multiple":[12],"processor":[13],"cores":[14,19],"and":[15,48,83,95,109,144],"the":[16,68,77,99,116,127],"number":[17],"of":[18,67,129,132],"per":[20],"chip":[21],"is":[22,52,113],"increasing.":[23],"To":[24],"effectively":[25],"exploit":[26],"these":[27],"changes":[28],"in":[29,79,115,147],"technology,":[30],"future":[32],"software":[33],"will":[34],"have":[35,73,124],"be":[37,55],"concurrent.":[38],"This":[39],"poses":[40],"tremendous":[41],"challenge":[42],"for":[43,75],"programmers":[44],"as":[45,90,137],"building":[46,81],"correct":[47,108],"efficient":[49,84,110],"concurrent":[50,85,93],"programs":[51],"known":[53],"a":[56,92,96,130],"very":[57],"difficult":[58],"problem.":[59],"In":[60],"this":[61],"paper,":[62],"we":[63,72,123],"briefly":[64],"survey":[65],"some":[66],"most":[69],"recent":[70],"techniques":[71],"developed":[74],"assisting":[76],"programmer":[78],"automatically":[80,106,125],"safe":[82],"systems.":[86],"Our":[87],"approach":[88],"takes":[89],"input":[91],"program":[94,101],"specification":[97],"that":[98],"output":[100,118],"should":[102],"satisfy.":[103],"It":[104],"then":[105],"infers":[107],"synchronization":[111],"which":[112],"implemented":[114],"final":[117],"program.":[119],"Using":[120],"our":[121],"techniques,":[122],"inferred":[126],"usage":[128],"range":[131],"classic":[133],"concurrency":[134],"constructs":[135],"such":[136],"atomic":[138],"sections,":[139],"Hoare's":[140],"conditional":[141],"critical":[142],"regions":[143],"memory":[145,149],"fences":[146],"weak":[148],"models.":[150]},"counts_by_year":[],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
