Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Herding cats: Modelling, simulation, testing, and data mining for weak memory
We propose an axiomatic generic framework for modelling weak memory. We show how to
instantiate this framework for Sequential Consistency (SC), Total Store Order (TSO), C++ …
instantiate this framework for Sequential Consistency (SC), Total Store Order (TSO), C++ …
Software verification for weak memory via program transformation
Multiprocessors implement weak memory models, but program verifiers often assume
Sequential Consistency (SC), and thus may miss bugs due to weak memory. We propose a …
Sequential Consistency (SC), and thus may miss bugs due to weak memory. We propose a …
Bounded model checking of multi-threaded C programs via lazy sequentialization
Bounded model checking (BMC) has successfully been used for many practical program
verification problems, but concurrency still poses a challenge. Here we describe a new …
verification problems, but concurrency still poses a challenge. Here we describe a new …
Stateless model checking for POWER
We present the first framework for efficient application of stateless model checking (SMC) to
programs running under the relaxed memory model of POWER. The framework combines …
programs running under the relaxed memory model of POWER. The framework combines …
Verification of programs under the release-acquire semantics
We address the verification of concurrent programs running under the release-acquire (RA)
semantics. We show that the reachability problem is undecidable even in the case where the …
semantics. We show that the reachability problem is undecidable even in the case where the …
Ogre and Pythia: an invariance proof method for weak consistency models
We design an invariance proof method for concurrent programs parameterised by a weak
consistency model. The calculational design of the invariance proof method is by abstract …
consistency model. The calculational design of the invariance proof method is by abstract …
Unifying operational weak memory verification: an axiomatic approach
In this article, we propose an approach to program verification using an abstract
characterisation of weak memory models. Our approach is based on a hierarchical axiom …
characterisation of weak memory models. Our approach is based on a hierarchical axiom …
[PDF][PDF] Robustness against transactional causal consistency
Distributed storage systems and databases are widely used by various types of applications.
Transactional access to these storage systems is an important abstraction allowing …
Transactional access to these storage systems is an important abstraction allowing …
Counter-example guided fence insertion under TSO
We give a sound and complete fence insertion procedure for concurrent finite-state
programs running under the classical TSO memory model. This model allows “write to read” …
programs running under the classical TSO memory model. This model allows “write to read” …
What's decidable about weak memory models?
We investigate the decidability of the state reachability problem in finite-state programs
running under weak memory models. In [3], we have shown that this problem is decidable …
running under weak memory models. In [3], we have shown that this problem is decidable …