<?xml version="1.0" encoding="UTF-8"?><xml><records><record><source-app name="Biblio" version="6.x">Drupal-Biblio</source-app><ref-type>13</ref-type><contributors><authors><author><style face="normal" font="default" size="100%">Ricardo J. Dias</style></author><author><style face="normal" font="default" size="100%">Dino Distefano</style></author><author><style face="normal" font="default" size="100%">João M. Lourenço</style></author><author><style face="normal" font="default" size="100%">João Costa Seco</style></author></authors></contributors><titles><title><style face="normal" font="default" size="100%">StarTM: Automatic Verification of Snapshot Isolation in Transactional Memory Java Programs</style></title></titles><dates><year><style  face="normal" font="default" size="100%">2011</style></year></dates><urls><related-urls><url><style face="normal" font="default" size="100%">https://docentes.fct.unl.pt/sites/default/files/joao-lourenco/files/ddls11.pdf</style></url></related-urls></urls><number><style face="normal" font="default" size="100%">UNL-DI-6-2011</style></number><publisher><style face="normal" font="default" size="100%">Departamento de Informática FCT/UNL</style></publisher><language><style face="normal" font="default" size="100%">eng</style></language><abstract><style face="normal" font="default" size="100%">&lt;p&gt;This paper presents StarTM , an automatic verification tool for transactional memory Java programs executing under relaxed isolation levels. We certify which transactions in a program are safe to execute under Snapshot Isolation without triggering the write-skew anomaly, opening the way to run-time optimizations that may lead to considerable performance enhancements.&lt;br /&gt;
Our tool builds on a novel shape analysis technique based on Separation Logic to statically approximate the read- and write-sets of a transactional memory Java program. This technique is particularly challenging due to the presence of dynamically allocated memory.&lt;br /&gt;
We implement our technique and apply our tool to a set of intricate examples. We corroborate known results, certifying some of the examples for safe execution under Snapshot Isolation by proving the absence of write-skew anomalies. In other cases we identify transactions that potentially trigger the write-skew anomaly.&lt;/p&gt;
</style></abstract><notes><style face="normal" font="default" size="100%">&lt;p&gt;n/a&lt;/p&gt;
</style></notes></record></records></xml>