000 03679nam a22005295i 4500
001 978-3-031-01806-0
003 DE-He213
005 20240730164226.0
007 cr nn 008mamaa
008 220601s2021 sz | s |||| 0|eng d
020 _a9783031018060
_9978-3-031-01806-0
024 7 _a10.1007/978-3-031-01806-0
_2doi
050 4 _aQA1-939
072 7 _aPB
_2bicssc
072 7 _aMAT000000
_2bisacsh
072 7 _aPB
_2thema
082 0 4 _a510
_223
100 1 _aKrishna, Siddharth.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_983121
245 1 0 _aAutomated Verification of Concurrent Search Structures
_h[electronic resource] /
_cby Siddharth Krishna, Nisarg Patel, Dennis Shasha, Thomas Wies.
250 _a1st ed. 2021.
264 1 _aCham :
_bSpringer International Publishing :
_bImprint: Springer,
_c2021.
300 _aX, 182 p.
_bonline resource.
336 _atext
_btxt
_2rdacontent
337 _acomputer
_bc
_2rdamedia
338 _aonline resource
_bcr
_2rdacarrier
347 _atext file
_bPDF
_2rda
490 1 _aSynthesis Lectures on Computer Science,
_x1932-1686
505 0 _aAcknowledgments -- Introduction -- Preliminaries -- Separation Logic -- Ghost State -- The Keyset Resource Algebra -- The Edgeset Framework for Single-Copy Structures -- The Flow Framework -- Verifying Single-Copy Concurrent Search Structures -- Verifying Multicopy Structures -- The Edgeset Framework for Multicopy Structures -- Reasoning about Non-Static and Non-Local Linearization Points -- Verifying the LSM DAG Template -- Proof Mechanization and Automation -- Related Work, Future Work, and Conclusion -- Bibliography -- Authors' Biographies.
520 _aSearch structures support the fundamental data storage primitives on key-value pairs: insert a pair, delete by key, search by key, and update the value associated with a key. Concurrent search structures are parallel algorithms to speed access to search structures on multicore and distributed servers. These sophisticated algorithms perform fine-grained synchronization between threads, making them notoriously difficult to design correctly. Indeed, bugs have been found both in actual implementations and in the designs proposed by experts in peer-reviewed publications. The rapid development and deployment of these concurrent algorithms has resulted in a rift between the algorithms that can be verified by the state-of-the-art techniques and those being developed and used today. The goal of this book is to show how to bridge this gap in order to bring the certified safety of formal verification to high-performance concurrent search structures. Similar techniques and frameworks can be applied to concurrent graph and network algorithms beyond search structures.
650 0 _aMathematics.
_911584
650 0 _aComputer science.
_99832
650 1 4 _aMathematics.
_911584
650 2 4 _aComputer Science.
_99832
700 1 _aPatel, Nisarg.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_983122
700 1 _aShasha, Dennis.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_983123
700 1 _aWies, Thomas.
_eauthor.
_4aut
_4http://id.loc.gov/vocabulary/relators/aut
_983124
710 2 _aSpringerLink (Online service)
_983127
773 0 _tSpringer Nature eBook
776 0 8 _iPrinted edition:
_z9783031000744
776 0 8 _iPrinted edition:
_z9783031006784
776 0 8 _iPrinted edition:
_z9783031029349
830 0 _aSynthesis Lectures on Computer Science,
_x1932-1686
_983128
856 4 0 _uhttps://doi.org/10.1007/978-3-031-01806-0
912 _aZDB-2-SXSC
942 _cEBK
999 _c85456
_d85456