Atomicity
View article: A Weaker Notion of Atomicity in Integral Domains
A Weaker Notion of Atomicity in Integral Domains Open
In classical factorization theory, an integral domain is called \emph{atomic} if every nonzero nonunit element can be written as a finite product of irreducible elements. Here, we introduce and study a weaker notion of atomicity, which rel…
View article: A Weaker Notion of Atomicity in Integral Domains
A Weaker Notion of Atomicity in Integral Domains Open
In classical factorization theory, an integral domain is called \emph{atomic} if every nonzero nonunit element can be written as a finite product of irreducible elements. Here, we introduce and study a weaker notion of atomicity, which rel…
View article: The Recursive Spiral Framework
The Recursive Spiral Framework Open
Title: Principia Symbolica Recursica: The Recursive Spiral Framework (v2.0) Authors: Sweeney, Christopher and ORCID: 0009-0007-6549-2148 Description:The Recursive Spiral Framework presents a meta-logical architecture for validating symboli…
View article: The Recursive Spiral Framework
The Recursive Spiral Framework Open
Title: Principia Symbolica Recursica: The Recursive Spiral Framework (v2.0) Authors: Sweeney, Christopher and ORCID: 0009-0007-6549-2148 Description:The Recursive Spiral Framework presents a meta-logical architecture for validating symboli…
View article: Emergence Theory: A Conceptual Framework for the Co-Emergence of Space, Time, and Structure
Emergence Theory: A Conceptual Framework for the Co-Emergence of Space, Time, and Structure Open
Emergence Theory: A Coherent Emergence Framework Updated November 27, 2025 Emergence Theory explores how space, time, matter, energy, curvature, and quantum behavior arise from the interaction of simple conceptual axioms. Rather than assum…
View article: Anomaly Pattern-guided Transaction Bug Testing in Relational Databases
Anomaly Pattern-guided Transaction Bug Testing in Relational Databases Open
Concurrent transaction processing is a fundamental capability of Relational Database Management Systems (RDBMSs), widely utilized in applications requiring high levels of parallel user interaction, such as banking systems, e-commerce platf…
View article: Anomaly Pattern-guided Transaction Bug Testing in Relational Databases
Anomaly Pattern-guided Transaction Bug Testing in Relational Databases Open
Concurrent transaction processing is a fundamental capability of Relational Database Management Systems (RDBMSs), widely utilized in applications requiring high levels of parallel user interaction, such as banking systems, e-commerce platf…
View article: It's a Feature, Not a Bug: Secure and Auditable State Rollback for Confidential Cloud Applications
It's a Feature, Not a Bug: Secure and Auditable State Rollback for Confidential Cloud Applications Open
Replay and rollback attacks threaten cloud application integrity by reintroducing authentic yet stale data through an untrusted storage interface to compromise application decision-making. Prior security frameworks mitigate these attacks b…
View article: It's a Feature, Not a Bug: Secure and Auditable State Rollback for Confidential Cloud Applications
It's a Feature, Not a Bug: Secure and Auditable State Rollback for Confidential Cloud Applications Open
Replay and rollback attacks threaten cloud application integrity by reintroducing authentic yet stale data through an untrusted storage interface to compromise application decision-making. Prior security frameworks mitigate these attacks b…
View article: Multithreading Atomicity
Multithreading Atomicity Open
Ensuring thread safety in applications is crucial for preventing subtle and challenging bugs in concurrent programming. This paper presents two algorithmic approaches to improve thread safety through static analysis and to demonstrate thei…
View article: Optimizing Distributed Transactions in Banking APIs: Saga Pattern vs. Two -Phase commit (2PC)
Optimizing Distributed Transactions in Banking APIs: Saga Pattern vs. Two -Phase commit (2PC) Open
As financial institutions increasingly migrate their core platforms to microservices-based architectures, the challenge of managing distributed transactions has gained critical importance. Banking APIs typically require atomicity and consi…
View article: Detecting Smart Contract State-Inconsistency Bugs via Flow Divergence and Multiplex Symbolic Execution
Detecting Smart Contract State-Inconsistency Bugs via Flow Divergence and Multiplex Symbolic Execution Open
Ethereum smart contracts determine state transition results not only by the previous states, but also by a mutable global state consisting of storage variables. This has resulted in state-inconsistency bugs, which grant an attacker the abi…
View article: BMDS-Shard: a parallel and atomicity-guaranteed cross-shard blockchain protocol
BMDS-Shard: a parallel and atomicity-guaranteed cross-shard blockchain protocol Open
Sharding is a key technology to improve the scalability of blockchain, and cross-shard transaction protocols are the core of sharding to ensure transaction atomicity and consistency. Many scholars have conducted related research, including…
View article: Understanding the importance of Atomicity property in Asynchronous Cellular Automata
Understanding the importance of Atomicity property in Asynchronous Cellular Automata Open
To model distributed and concurrent systems, cellular automata (CA) researchers have introduced the notion of fully asynchronous cellular automata (ACA) with atomicity property where the automata system does not allow simultaneous update o…
View article: ESfix: An Embedded Program Repair Tool for Effective Removal of Concurrency Defects
ESfix: An Embedded Program Repair Tool for Effective Removal of Concurrency Defects Open
Embedded programs are not only inseparable from our daily lives but are also widely used in aerospace, medical devices, and other fields that require very high security and stability. The uncertainty and randomness of the large amount of d…
View article: Networcat: applying analysis techniques of shared memory software on message-passing distributed systems
Networcat: applying analysis techniques of shared memory software on message-passing distributed systems Open
Communication models are a key aspect in the design and implementation of distributed system architectures. Application logic must consider the guarantees of these models, which fundamentally influence its correctness. Modern multi-core pr…
View article: Noncommutative Schur functions for posets
Noncommutative Schur functions for posets Open
The machinery of noncommutative Schur functions is a general approach to Schur positivity of symmetric functions initiated by Fomin-Greene. Hwang recently adapted this theory to posets to give a new approach to the Stanley-Stembridge conje…
View article: On the ascent of almost and quasi-atomicity to monoid semidomains
On the ascent of almost and quasi-atomicity to monoid semidomains Open
A commutative monoid is atomic if every non-invertible element factors into irreducibles (also called atoms), while an integral (semi)domain is atomic if its multiplicative monoid is atomic. Notions weaker than atomicity have been introduc…
View article: On Constructing a Byzantine Linearizable SWMR Atomic Register from SWSR Atomic Registers
On Constructing a Byzantine Linearizable SWMR Atomic Register from SWSR Atomic Registers Open
View article: VerIso: Verifiable Isolation Guarantees for Database Transactions
VerIso: Verifiable Isolation Guarantees for Database Transactions Open
Isolation bugs, stemming especially from design-level defects, have been repeatedly found in carefully designed and extensively tested production databases over decades. In parallel, various frameworks for modeling database transactions an…
View article: On primality and atomicity of numerical power monoids
On primality and atomicity of numerical power monoids Open
In the first part of this paper, we establish a variation of a recent result by Bienvenu and Geroldinger on the (almost) non-existence of absolute irreducibles in (restricted) power monoids of numerical monoids: we argue the (almost) non-e…
View article: On the atomicity of one-dimensional monoid algebras
On the atomicity of one-dimensional monoid algebras Open
The ascending chain condition on principal ideals (ACCP) is almost always complementary to atomicity within integral domains: in fact, Cohn initially stated that these two conditions were equivalent. This assertion has been shown to be fal…
View article: Verifying Mutual Exclusion Algorithms with Non-Atomic Registers
Verifying Mutual Exclusion Algorithms with Non-Atomic Registers Open
The work described in this paper develops a formal method for modeling and exhaustive verification of mutual exclusion algorithms. The process is based on timed automata and the Uppaal model checker. The technique was successfully applied …
View article: Exact entanglement correlation complements the chemical bond description
Exact entanglement correlation complements the chemical bond description Open
We analyze the properties of the exact solution obtained by us recently for the extended Heitler-London model of the chemical bonding in an analytic form. The emphasis, put on defining the two-particle entanglement correlation, and express…
View article: Bounded Verification of Atomicity Violations for Interrupt-Driven Programs via Lazy Sequentialization
Bounded Verification of Atomicity Violations for Interrupt-Driven Programs via Lazy Sequentialization Open
Detecting atomicity violations effectively in interrupt-driven programs is difficult due to the asymmetric concurrency interleaving of interrupts. Current approaches face two main challenges: (1) A large number of false positives are gener…
View article: semaphore: Shared Memory Atomic Operations
semaphore: Shared Memory Atomic Operations Open
View article: Mix Testing: Specifying and Testing ABI Compatibility of C/C++ Atomics Implementations
Mix Testing: Specifying and Testing ABI Compatibility of C/C++ Atomics Implementations Open
The correctness of complex software depends on the correctness of both the source code and the compilers that generate corresponding binary code. Compilers must do more than preserve the semantics of a single source file: they must ensure …
View article: Addendum on ‘Natural number dynamics: reconstructing physics from generalized atomicity’ (2021 Eur. J. Phys. 42 025402)
Addendum on ‘Natural number dynamics: reconstructing physics from generalized atomicity’ (2021 Eur. J. Phys. 42 025402) Open
The derivation of the Schrödinger equation is revisited with particular emphasis on the role of the Riccati equation and the relationship between the Hamiltonian and natural number operators.
View article: COMPARATIVE PERFORMANCE ANALYSIS BETWEEN MYSQL AND MONGODB DATA STORAGE ENGINES TO SUPPORT DYNAMIC CONTENT OBJECTS
COMPARATIVE PERFORMANCE ANALYSIS BETWEEN MYSQL AND MONGODB DATA STORAGE ENGINES TO SUPPORT DYNAMIC CONTENT OBJECTS Open
Comparative performance analyses enable users to take informed decisions on technologies beyond current market trends and/or commercial information from vendors. In this paper we present a comparative performance analysis between MySQL and…
View article: BatchIt: Optimizing Message-Passing Allocators for Producer-Consumer Workloads: An Intellectual Abstract
BatchIt: Optimizing Message-Passing Allocators for Producer-Consumer Workloads: An Intellectual Abstract Open
Modern, high-performance memory allocators must scale to a wide array of uses, including producer-consumer workloads. In such workloads, objects are allocated by one thread and deallocated by another, which we call remote deallocations. Th…