2012
DOI: 10.1007/978-3-642-31424-7_20
|View full text |Cite
|
Sign up to set email alerts
|

Lock Removal for Concurrent Trace Programs

Abstract: Abstract. We propose a trace-based concurrent program analysis to soundly remove redundant synchronizations such as locks while preserving the behaviors of the concurrent computation. Our new method is computationally efficient in that it involves only thread-local computation and therefore avoids interleaving explosion, which is known as the main hurdle for scalable concurrency analysis. Our method builds on the partial-order theory and a unified analysis framework; therefore, it is more generally applicable … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2013
2013
2015
2015

Publication Types

Select...
3
1
1

Relationship

1
4

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 35 publications
(42 reference statements)
0
2
0
Order By: Relevance
“…There also exists a large body of work on detecting violations of these properties (e.g. [21], [22], [23] and [24], [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [43]). These bug finding methods differ from our new method in that they are checking for different types of properties.…”
Section: Related Workmentioning
confidence: 99%
“…There also exists a large body of work on detecting violations of these properties (e.g. [21], [22], [23] and [24], [25], [26], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38], [39], [40], [41], [42], [43]). These bug finding methods differ from our new method in that they are checking for different types of properties.…”
Section: Related Workmentioning
confidence: 99%
“…When removing lockwords of objects that are not used for locking the memory overhead could be further reduced. For this Kahlon and Wang proposed in [11] the removal of redundant synchronizations by only using thread-local computation. With this approach they were able to completely remove some lockwords while avoiding synchronization problems.…”
Section: Related Workmentioning
confidence: 99%