-
1
-
-
85094632814
-
SmartFrog meets LCFG Autonomous Reconfiguration with Central Policy Control
-
August
-
P. Anderson, P. Goldsack, and J. Paterson. SmartFrog meets LCFG Autonomous Reconfiguration with Central Policy Control. In LISA, August 2003.
-
(2003)
LISA
-
-
Anderson, P.1
Goldsack, P.2
Paterson, J.3
-
2
-
-
84897813006
-
Using causality to diagnose configuration bugs
-
June
-
M. Attariyan and J. Flinn. Using causality to diagnose configuration bugs. In USENIX, June 2008.
-
(2008)
USENIX
-
-
Attariyan, M.1
Flinn, J.2
-
3
-
-
80053587334
-
Automating configuration troubleshooting with dynamic information flow analysis
-
October
-
M. Attariyan and J. Flinn. Automating configuration troubleshooting with dynamic information flow analysis. In OSDI, October 2010.
-
(2010)
OSDI
-
-
Attariyan, M.1
Flinn, J.2
-
4
-
-
1042290193
-
Undo for Operators: Building an Undoable E-mail Store
-
June
-
A. B. Brown and D. A. Patterson. Undo for Operators: Building an Undoable E-mail Store. In USENIX, June 2003.
-
(2003)
USENIX
-
-
Brown, A.B.1
Patterson, D.A.2
-
7
-
-
70449984613
-
Staged Deployment in Mirage, an Integrated Software Upgrade Testing and Distribution System
-
October
-
O. Crameri, N. Knezevíc, D. Kostíc, R. Bianchini, and W. Zwaenepoel. Staged Deployment in Mirage, an Integrated Software Upgrade Testing and Distribution System. In SOSP'07, October 2007.
-
(2007)
SOSP'07
-
-
Crameri, O.1
Knezevíc, N.2
Kostíc, D.3
Bianchini, R.4
Zwaenepoel, W.5
-
9
-
-
84894553762
-
Detecting BGP configuration faults with static analysis
-
May
-
N. Feamster and H. Balakrishnan. Detecting BGP configuration faults with static analysis. In NSDI, May 2005.
-
(2005)
NSDI
-
-
Feamster, N.1
Balakrishnan, H.2
-
12
-
-
35448971003
-
Improved Error Reporting for Software that Uses Black-Box Components
-
J. Ha, C. J. Rossbach, J. V. Davis, I. Roy, H. E. Ramadan, D. E. Porter, D. L. Chen, and E. Witchel. Improved Error Reporting for Software that Uses Black-Box Components. In PLDI, 2007.
-
(2007)
PLDI
-
-
Ha, J.1
Rossbach, C.J.2
Davis, J.V.3
Roy, I.4
Ramadan, H.E.5
Porter, D.E.6
Chen, D.L.7
Witchel, E.8
-
14
-
-
84870649843
-
-
IBM Corp. IBM Tivoli Software. http://www-01.ibm.com/software/tivoli/.
-
IBM Tivoli Software
-
-
-
17
-
-
53349161146
-
ConfErr: A Tool for Assessing Resilience to Human Configuration Errors
-
June
-
L. Keller, P. Upadhyaya, and G. Candea. ConfErr: A Tool for Assessing Resilience to Human Configuration Errors. In DSN, June 2008.
-
(2008)
DSN
-
-
Keller, L.1
Upadhyaya, P.2
Candea, G.3
-
18
-
-
84912065809
-
Enabling Configuration-Independent Automation by Non-Expert Users
-
October
-
N. Kushman and D. Katabi. Enabling Configuration-Independent Automation by Non-Expert Users. In OSDI, October 2010.
-
(2010)
OSDI
-
-
Kushman, N.1
Katabi, D.2
-
19
-
-
67650533712
-
Learning from mistakes - A comprehensive study on real world concurrency bug characteristics
-
March
-
S. Lu, S. Park, E. Seo, and Y. Zhou. Learning from mistakes - a comprehensive study on real world concurrency bug characteristics. In ASPLOS, March 2008.
-
(2008)
ASPLOS
-
-
Lu, S.1
Park, S.2
Seo, E.3
Zhou, Y.4
-
22
-
-
0029368189
-
Measuring system and software reliability using an automated data collection process
-
B. Murphy and T. Gent. Measuring system and software reliability using an automated data collection process. In Quality and Reliability Engineering International, 11(5),, 1995.
-
(1995)
Quality and Reliability Engineering International
, vol.11
, Issue.5
-
-
Murphy, B.1
Gent, T.2
-
23
-
-
45749084112
-
Understanding and Dealing with Operator Mistakes in Internet Services
-
K. Nagaraja, F. Oliveira, R. Bianchini, R. P. Martin, and T. D. Nguyen. Understanding and Dealing with Operator Mistakes in Internet Services. In OSDI'04,
-
OSDI'04
-
-
Nagaraja, K.1
Oliveira, F.2
Bianchini, R.3
Martin, R.P.4
Nguyen, T.D.5
-
25
-
-
82655168204
-
-
NetApp, Inc. Protection Manager. http://www.netapp.com/us/products/ management-software/protection.html.
-
Protection Manager
-
-
-
26
-
-
82655168201
-
-
NetApp, Inc. Provisioning Manager. http://www.netapp.com/us/products/ management-software/provisioning.html.
-
Provisioning Manager
-
-
-
27
-
-
34748823120
-
Understanding and Validating Database System Administration
-
F. Oliveira, K. Nagaraja, R. Bachwani, R. Bianchini, R. P. Martin, and T. D. Nguyen. Understanding and Validating Database System Administration. In USENIX'06, 2006.
-
(2006)
USENIX'06
-
-
Oliveira, F.1
Nagaraja, K.2
Bachwani, R.3
Bianchini, R.4
Martin, R.P.5
Nguyen, T.D.6
-
28
-
-
77954609831
-
Barricade: Defending Systems Against Operator Mistakes
-
April
-
F. Oliveira, A. Tjang, R. Bianchini, R. P. Martin, and T. D. Nguyen. Barricade: Defending Systems Against Operator Mistakes. In EuroSys'10, April 2010.
-
(2010)
EuroSys'10
-
-
Oliveira, F.1
Tjang, A.2
Bianchini, R.3
Martin, R.P.4
Nguyen, T.D.5
-
30
-
-
0004015896
-
-
Technical Report UCB//CSD-02-1175, University of California, Berkeley, March
-
D. Patterson, A. Brown, P. Broadwell, G. Candea, M. Chen, J. Cutler, P. Enriquez, A. Fox, E. Kiciman, M. Merzbacher, D. Oppenheimer, N. Sastry, W. Tetzlaff, J. Traupman, and N. Treuhaft. Recovery Oriented Computing (ROC): Motivation, Definition, Techniques, and Case Studies. In Technical Report UCB//CSD-02-1175, University of California, Berkeley, March 2002.
-
(2002)
Recovery Oriented Computing (ROC): Motivation, Definition, Techniques, and Case Studies
-
-
Patterson, D.1
Brown, A.2
Broadwell, P.3
Candea, G.4
Chen, M.5
Cutler, J.6
Enriquez, P.7
Fox, A.8
Kiciman, E.9
Merzbacher, M.10
Oppenheimer, D.11
Sastry, N.12
Tetzlaff, W.13
Traupman, J.14
Treuhaft, N.15
-
31
-
-
79959900039
-
Static Extraction of Program Configuration Options
-
May
-
A. Rabkin and R. Katz. Static Extraction of Program Configuration Options. In ICSE, May 2011.
-
(2011)
ICSE
-
-
Rabkin, A.1
Katz, R.2
-
32
-
-
70049092250
-
Determining Configuration Parameter Dependencies via Analysis of Configuration Data from Multi-tiered Enterprise Applications
-
June
-
V. Ramachandran, M. Gupta, M. Sethi, and S. R. Chowdhury. Determining Configuration Parameter Dependencies via Analysis of Configuration Data from Multi-tiered Enterprise Applications. In ICAC, June 2009.
-
(2009)
ICAC
-
-
Ramachandran, V.1
Gupta, M.2
Sethi, M.3
Chowdhury, S.R.4
-
33
-
-
77954702589
-
Using symbolic evaluation to understand behavior in configurable software systems
-
May
-
E. Reisner, C. Song, K.-K. Ma, J. S. Foster, and A. Porter. Using symbolic evaluation to understand behavior in configurable software systems. In ICSE, May 2010.
-
(2010)
ICSE
-
-
Reisner, E.1
Song, C.2
Ma, K.-K.3
Foster, J.S.4
Porter, A.5
-
35
-
-
70449956042
-
AutoBash: Improving configuration management with operating system causality analysis
-
October
-
Y.-Y. Su, M. Attariyan, and J. Flinn. AutoBash: improving configuration management with operating system causality analysis. In SOSP, October 2007.
-
(2007)
SOSP
-
-
Su, Y.-Y.1
Attariyan, M.2
Flinn, J.3
-
36
-
-
0026170711
-
Software defects and their impact on system availability: A study of field failures in operating systems
-
M. Sullivan and R. Chillarege. Software defects and their impact on system availability: A study of field failures in operating systems. In FTCS, 1991.
-
(1991)
FTCS
-
-
Sullivan, M.1
Chillarege, R.2
-
38
-
-
85077048913
-
Automatic Misconfiguration Troubleshooting with PeerPressure
-
October
-
H. J.Wang, J. C. Platt, Y. Chen, R. Zhang, and Y.-M. Wang. Automatic Misconfiguration Troubleshooting with PeerPressure. In OSDI'04, October 2004.
-
(2004)
OSDI'04
-
-
Wang, H.J.1
Platt, J.C.2
Chen, Y.3
Zhang, R.4
Wang, Y.-M.5
-
39
-
-
70349276979
-
Towards Automatic Reverse Engineering of Software Security Configurations
-
October
-
R. Wang, X. Wang, K. Zhang, and Z. li. Towards Automatic Reverse Engineering of Software Security Configurations. In CCS, October 2008.
-
(2008)
CCS
-
-
Wang, R.1
Wang, X.2
Zhang, K.3
Li, Z.4
-
40
-
-
77952114571
-
STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support
-
October
-
Y.-M. Wang, C. Verbowski, J. Dunagan, Y. Chen, H. J. Wang, C. Yuan, and Z. Zhang. STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. In LISA'03, October 2003.
-
(2003)
LISA'03
-
-
Wang, Y.-M.1
Verbowski, C.2
Dunagan, J.3
Chen, Y.4
Wang, H.J.5
Yuan, C.6
Zhang, Z.7
-
41
-
-
34548028878
-
Configuration Debugging as Search: Finding the Needle in the Haystack
-
October
-
A. Whitaker, R. S. Cox, and S. D. Gribble. Configuration Debugging as Search: Finding the Needle in the Haystack. In OSDI, October 2004.
-
(2004)
OSDI
-
-
Whitaker, A.1
Cox, R.S.2
Gribble, S.D.3
-
42
-
-
34748888898
-
Automated Known Problem Diagnosis with Event Traces
-
April
-
C. Yuan, N. Lao, J.-R. Wen, J. Li, Z. Zhang, Y.-M. Wang, and W.-Y. Ma. Automated Known Problem Diagnosis with Event Traces. In EuroSys, April 2006.
-
(2006)
EuroSys
-
-
Yuan, C.1
Lao, N.2
Wen, J.-R.3
Li, J.4
Zhang, Z.5
Wang, Y.-M.6
Ma, W.-Y.7
-
43
-
-
79953093128
-
Improving Software Diagnosability via Log Enhancement
-
March
-
D. Yuan, J. Zheng, S. Park, Y. Zhou, and S. Savage. Improving Software Diagnosability via Log Enhancement. In ASPLOS, March 2011.
-
(2011)
ASPLOS
-
-
Yuan, D.1
Zheng, J.2
Park, S.3
Zhou, Y.4
Savage, S.5
-
44
-
-
74949124706
-
Automatic Configuration of Internet Services
-
March
-
W. Zheng, R. Bianchini, and T. D. Nguyen. Automatic Configuration of Internet Services. In EuroSys, March 2007.
-
(2007)
EuroSys
-
-
Zheng, W.1
Bianchini, R.2
Nguyen, T.D.3
|