Filters








27,885 Hits in 8.8 sec

Violat: Generating Tests of Observational Refinement for Concurrent Objects [chapter]

Michael Emmi, Constantin Enea
2019 Lecture Notes in Computer Science  
Violat generates self-contained and efficient programs that test observational refinement, i.e., substitutability of a given ADT with a given implementation.  ...  In this work we describe the Violat tool for generating tests that witness violations to atomicity, or weaker consistency properties.  ...  Overview of Test Generation with Violat Violat generates self-contained programs to test the observational refinement of a given concurrent object implementation with respect to its abstract data type  ... 
doi:10.1007/978-3-030-25543-5_30 fatcat:4apmejjvmbhxlpv6ok4j24xczy

Automated atomicity-violation fixing

Guoliang Jin, Linhai Song, Wei Zhang, Shan Lu, Ben Liblit
2011 Proceedings of the 32nd ACM SIGPLAN conference on Programming language design and implementation - PLDI '11  
We present AFix, a tool that automates the whole process of fixing one common type of concurrency bug: single-variable atomicity violations.  ...  It further tries to combine the patches of multiple bugs for better performance and code readability. Finally, AFix's run-time component provides testing customized for each patch.  ...  CTrigger General Operation CTrigger is an in-house concurrency-bug detection and testing framework [25] that targets single-variable atomicity-violation bugs.  ... 
doi:10.1145/1993498.1993544 dblp:conf/pldi/JinSZLL11 fatcat:axff6gjlrfghxp7yvlx22mp6qu

Automated atomicity-violation fixing

Guoliang Jin, Linhai Song, Wei Zhang, Shan Lu, Ben Liblit
2011 SIGPLAN notices  
We present AFix, a tool that automates the whole process of fixing one common type of concurrency bug: single-variable atomicity violations.  ...  It further tries to combine the patches of multiple bugs for better performance and code readability. Finally, AFix's run-time component provides testing customized for each patch.  ...  CTrigger General Operation CTrigger is an in-house concurrency-bug detection and testing framework [25] that targets single-variable atomicity-violation bugs.  ... 
doi:10.1145/1993316.1993544 fatcat:kifgwfu2lvchbmgiq2kqovcmri

Automated atomicity-violation fixing

Guoliang Jin, Linhai Song, Wei Zhang, Shan Lu, Ben Liblit
2012 SIGPLAN notices  
We present AFix, a tool that automates the whole process of fixing one common type of concurrency bug: single-variable atomicity violations.  ...  It further tries to combine the patches of multiple bugs for better performance and code readability. Finally, AFix's run-time component provides testing customized for each patch.  ...  CTrigger General Operation CTrigger is an in-house concurrency-bug detection and testing framework [25] that targets single-variable atomicity-violation bugs.  ... 
doi:10.1145/2345156.1993544 fatcat:3ety5z5spbakdmgq7bh6gbdop4

Precise Detection of Atomicity Violations [chapter]

Ricardo J. Dias, Vasco Pessanha, João M. Lourenço
2013 Lecture Notes in Computer Science  
Concurrent programs that are free of unsynchronized accesses to shared data may still exhibit unpredictable concurrency errors, called atomicity violations, which include both high-level dataraces and  ...  Atomicity violations occur when programmers make wrong assumptions about the atomicity scope of a code block, incorrectly splitting it in two or more atomic blocks and allow them to be interleaved with  ...  When we exit the scope of the condition we remove the The result of these two analysis generate the graph of causal dependencies that is used to detect the existence of atomicity violations in a concurrent  ... 
doi:10.1007/978-3-642-39611-3_8 fatcat:tnt65273brhungsxbtpghxpvqu

Mining Fix Patterns for FindBugs Violations [article]

Kui Liu, Dongsun Kim, Tegawendé F. Bissyandé, Shin Yoo, Yves Le Traon
2018 arXiv   pre-print
It is also noteworthy that the yielded patterns are applicable to four real bugs in the Defects4J major benchmark for software testing and automated repair.  ...  The results show that developers will accept and merge a majority (69/116) of fixes generated from the inferred fix patterns.  ...  Hence, a method of refining the generic AST tree is necessary to reduce such confusions. Algorithm 1 illustrates the algorithm of refining a generic AST tree.  ... 
arXiv:1712.03201v2 fatcat:r37uhraprbhlbgqyyc4nwam7zu

Dynamic detection of atomic-set-serializability violations

Christian Hammer, Julian Dolby, Mandana Vaziri, Frank Tip
2008 Proceedings of the 13th international conference on Software engineering - ICSE '08  
In this paper, we present a dynamic analysis for detecting violations of atomic-set serializability.  ...  We also proposed atomic-set serializability as a correctness criterion for concurrent programs, stating that units of work must be serializable for each atomic set.  ...  Acknowledgments We thank Stephen Fink for useful discussions about program instrumentation with Shrike, and Jan Vitek, Andreas Lochbihler and Daniel Wasserrab for useful feedback.  ... 
doi:10.1145/1368088.1368120 dblp:conf/icse/HammerDVT08 fatcat:3faiedadynegnk5xw2oanr642u

Searching for Safety Violations Using Estimation of Distribution Algorithms

Jan Staunton, John A Clark
2010 2010 Third International Conference on Software Testing, Verification, and Validation Workshops  
Using aspects of model checking to analyse multithreaded software is a promising method for finding common concurrent errors such as deadlock.  ...  Traditional model checking tools exhaustively search the state space of a concurrent system in order to find faults.  ...  The authors would like to thank Simon Poulding for his help with statistical matters.  ... 
doi:10.1109/icstw.2010.24 dblp:conf/icst/StauntonC10 fatcat:surtqrssjvaadj3zvomwmfb65u

Predictive analysis for detecting serializability violations through Trace Segmentation

Arnab Sinha, Sharad Malik, Chao Wang, Aarti Gupta
2011 Ninth ACM/IEEE International Conference on Formal Methods and Models for Codesign (MEMPCODE2011)  
We address the problem of detecting serializability violations in a concurrent program using predictive analysis, where a violation is detected either in an observed trace or in an alternate interleaving  ...  We report experimental results that demonstrate the effectiveness of our method in detecting serializability violations for Java and C/C++ benchmark programs.  ...  Abstract-We address the problem of detecting serializability violations in a concurrent program using predictive analysis, where a violation is detected either in an observed trace or in an alternate interleaving  ... 
doi:10.1109/memcod.2011.5970516 dblp:conf/memocode/SinhaMWG11 fatcat:eejwbjj7vrds5p3ha44th7flgq

Flavor physics and CP violation

Paoti Chang, Kai-Feng Chen, Wei-Shu Hou
2017 Progress in Particle and Nuclear Physics  
CP violating (CPV) phase, with unitarity and the CKM phases triumphantly tested at the B factories.  ...  The main aim of Flavor Physics and CP violation (FPCP) studies is the pursuit to uncover New Physics beyond the Standard Model (SM).  ...  We note that a fourth generation violates MFV3 (MFV with 3 generations, i.e. SM-like) but not the principle of MFV.  ... 
doi:10.1016/j.ppnp.2017.07.001 fatcat:il3eifd4dzgjtcmxz3kb2h5sau

Correlations, Bell Inequality Violation & Quantum Entanglement [article]

Yeong-Cherng Liang
2008 arXiv   pre-print
It has been known for a long time that entanglement is necessary to demonstrate nonclassical correlations, and hence a Bell inequality violation.  ...  However, since some entangled quantum states are known to admit explicit locally causal models, the exact role of entanglement in Bell inequality violation has remained obscure.  ...  To see this, we first note that the global objective function for the general case, as follows from Eq. (5.3) and Eq. (5.8), is always quadratic in the local Hermitian observables {A K , B L }.  ... 
arXiv:0810.5400v1 fatcat:fpzsx2hev5ajjmdumpinxjqzrm

RegionTrack: A Trace-based Sound and Complete Checker to Debug Transactional Atomicity Violations and Non-Serializable Traces [article]

Xiaoxue Ma, Shangru Wu, Ernest Pobee, Xiupei Mei, Hao Zhang, Bo Jiang, Wing-Kwong Chan
2020 arXiv   pre-print
transaction for the above two kinds of issues.  ...  However, dynamic instances of these code regions, called transactions, may fail to behave atomically, resulting in transactional atomicity violations.  ...  Based on an observed trace, these predictive techniques report violations not only for currently observed trace but also for other possible interleavings of the trace.  ... 
arXiv:2008.04479v2 fatcat:irgptfoscfe6rpcomm67fgoqre

Predicting Serializability Violations: SMT-Based Search vs. DPOR-Based Search [chapter]

Arnab Sinha, Sharad Malik, Chao Wang, Aarti Gupta
2012 Lecture Notes in Computer Science  
a given test execution.  ...  In our recent work, we addressed the problem of detecting serializability violations in a concurrent program using predictive analysis, where we used a graph-based method to derive a predictive model from  ...  Although DPOR is efficient in testing concurrent programs, it is not geared toward enumeration of interleavings in a predictive model such as ours.  ... 
doi:10.1007/978-3-642-34188-5_11 fatcat:23aj4d2sjbfsbjkvfnq3ad5a3e

ATOMIC PARITY VIOLATION: PRINCIPLES, RECENT RESULTS, PRESENT MOTIVATIONS

J. GUÉNA, M. LINTZ, M.-A. BOUCHIAT
2005 Modern Physics Letters A  
We review the progress made in the determination of the weak charge, Q\_w, of the cesium nucleus which raises the status of Atomic Parity Violation measurements to that of a precision electroweak test.  ...  Concurrently, an original experimental approach was developed in our group for more than a decade. It is based on detection by stimulated emission with amplification of the left- right asymmetry.  ...  The level of sensitivity is now adequate for a one-to-two percent Q W -precision objective.  ... 
doi:10.1142/s0217732305016853 fatcat:xospl3okezcvfifzn3fmgbmz7m

HashSplit: Exploiting Bitcoin Asynchrony to Violate Common Prefix and Chain Quality [article]

Muhammad Saad, Afsah Anwar, Srivatsan Ravi, David A. Mohaisen
2021 IACR Cryptology ePrint Archive  
To realize the threat of an asynchronous network, we present the HashSplit attack that allows an adversary to orchestrate concurrent mining on multiple branches of the blockchain to violate common prefix  ...  In this paper, we show that the network synchrony does not hold in the real world Bitcoin network which can be exploited to lower the cost of various attacks that violate the blockchain safety and chain  ...  Towards this objective, we present HashSplit which allows an adversary to exploit the asynchrony and orchestrate concurrent mining on multiple branches of a public chain to violate Q cp and Q cq .  ... 
dblp:journals/iacr/SaadARM21 fatcat:zwgzjddlbzfgvfon7xcqbwm7tm
« Previous Showing results 1 — 15 out of 27,885 results