Exploiting purity for atomicity

C Flanagan, SN Freund… - IEEE Transactions on …, 2005 - ieeexplore.ieee.org
… that, while intuitively atomic, are not reducible. In this paper, we exploit the notion of pure
code blocks to verify the atomicity of such irreducible procedures. If a pure block terminates …

Exploiting purity for atomicity

C Flanagan, SN Freund, S Qadeer - Proceedings of the 2004 ACM …, 2004 - dl.acm.org
exploit the notion of pure code blocks to verify the atomicity of such irreducible procedures. If
a pure … We develop a static analysis for atomicity based on this insight, and we illustrate this …

[PDF][PDF] Exploiting Purity for Atomicity (Extended Version)

exploit the notion of pure code blocks to verify the atomicity of such irreducible procedures. If
a pure … We develop a static analysis for atomicity based on this insight, and we illustrate this …

[PDF][PDF] Purifying causal atomicity

B Lerner, D Grossman - 2008 - homes.cs.washington.edu
pure block has done a write. – We show that a single Petri net can compute both purity- and
atomicity… far checks causal atomicity, but contains no way to check for or exploit purity in the …

Accurate and efficient runtime detection of atomicity errors in concurrent programs

L Wang, SD Stoller - Proceedings of the eleventh ACM SIGPLAN …, 2006 - dl.acm.org
… We give conditions on the graph that imply conflict-atomicity and view-atomicity. … their
atomicity type system to verify abstract atomicity of programs by analyzing purity [7]. We …

Causal atomicity

A Farzan, P Madhusudan - … Conference, CAV 2006, Seattle, WA, USA …, 2006 - Springer
… check causal atomicity using Petri net tools based on unfoldings, which exploit the …
extensions of atomicity defined in the literature (for example, purity [9]), in the causal setting. …

AVIO: detecting atomicity violations via access interleaving invariants

S Lu, J Tucek, F Qin, Y Zhou - ACM SIGOPS Operating Systems Review, 2006 - dl.acm.org
… In contrast, AVIOS is a pure software approach which is more … Recently several studies have
exploited hardware support for … Like previous techniques, AVIO also exploits hardware to re…

A calculus of atomic actions

T Elmas, S Qadeer, S Tasiran - ACM SIGPLAN Notices, 2009 - dl.acm.org
atomic actions. We propose a novel, iterative proof style in which alternating use of abstraction
and reduction is exploited to compute larger atomicpurity and allows us to deduce pure

ReImInfer: method purity inference for Java

W Huang, A Milanova - Proceedings of the ACM SIGSOFT 20th …, 2012 - dl.acm.org
… of no purity inference tool that scales to large codes and analyzes both whole programs
and libraries. We build a purity … • Atomicity: Flanagan et al. exploit purity for reasoning about …

Static analysis of atomicity for programs with non-blocking synchronization

L Wang, SD Stoller - Proceedings of the tenth ACM SIGPLAN …, 2005 - dl.acm.org
… et al.’s work on atomicity types [3, 4] and purity [2] in order to … Atomicity used to optimize
model checking can be regarded as a partial-order reduction [14], ie, a method for exploiting