Loading...
Search for: lesani--m
0.007 seconds

    Efficient detection and validation of atomicity violations in concurrent programs

    , Article Journal of Systems and Software ; Volume 137 , 2018 , Pages 618-635 ; 01641212 (ISSN) Eslamimehr, M ; Lesani, M ; Edwards, G ; Sharif University of Technology
    Elsevier Inc  2018
    Abstract
    Atomicity violations are a major source of bugs in concurrent programs. Empirical studies have shown that the majority of atomicity violations are instances of the three-access pattern, where two accesses to a shared variable by a thread are interleaved by an access to the same variable by another thread. This article describes two advancements in atomicity violation detection. First, we describe a new technique that directs the execution of a dynamic analysis tool towards three-access pattern (TAP) instances. The directed search is based on constraint solving and concolic execution. We implemented this technique in a tool called AtomChase. Using 27 benchmarks comprising 5.4 million lines of... 

    Polynomial-time fence insertion for structured programs

    , Article 33rd International Symposium on Distributed Computing, DISC 2019, 14 October 2019 through 18 October 2019 ; Volume 146 , 2019 ; 18688969 (ISSN); 9783959771269 (ISBN) Taheri, M ; Pourdamghani, A ; Lesani, M ; Suomela J ; Sharif University of Technology
    Schloss Dagstuhl- Leibniz-Zentrum fur Informatik GmbH, Dagstuhl Publishing  2019
    Abstract
    To enhance performance, common processors feature relaxed memory models that reorder instructions. However, the correctness of concurrent programs is often dependent on the preservation of the program order of certain instructions. Thus, the instruction set architectures offer memory fences. Using fences is a subtle task with performance and correctness implications: using too few can compromise correctness and using too many can hinder performance. Thus, fence insertion algorithms that given the required program orders can automatically find the optimum fencing can enhance the ease of programming, reliability, and performance of concurrent programs. In this paper, we consider the class of... 

    Communication protocol evolution by natural selection

    , Article CIMCA 2006: International Conference on Computational Intelligence for Modelling, Control and Automation, Jointly with IAWTIC 2006: International Conference on Intelligent Agents Web Technologies and International Commerce, Sydney, NSW, 28 November 2006 through 1 December 2006 ; 2006 ; 0769527310 (ISBN); 9780769527314 (ISBN) Khasteh, S. H ; Shouraki, S. B ; Halavati, R ; Lesani, M ; Sharif University of Technology
    IEEE Computer Society  2006
    Abstract
    One of the most important issues discussed in multi-agent systems, is communication between agents. Usually, a predefined communication protocol is used, but predefining a protocol between agents causes some problems; for example it is possible that agents recognize a subject that is not defined in their protocol so they can't express anything about it. In this paper we propose a new method for evolution of a communication protocol between intelligent agents by using natural selection mechanism. Experimental results will be discussed in detail. © 2006 IEEE