-
1
-
-
85076903640
-
NetPrints: Diagnosing home network misconfigurations using shared knowledge
-
Bhavish Aggarwal, Ranjita Bhagwan, Tathagata Das, Siddharth Eswaran, Venkata N. Padmanabhan, and Geoffrey M. Voelker. 2009. NetPrints: Diagnosing home network misconfigurations using shared knowledge. In Proceedings of the 6th USENIX Symposium on Networked System Design and Implementation (NSDI'09).
-
(2009)
Proceedings of the 6th USENIX Symposium on Networked System Design and Implementation (NSDI'09)
-
-
Aggarwal, B.1
Bhagwan, R.2
Das, T.3
Eswaran, S.4
Padmanabhan, V.N.5
Voelker, G.M.6
-
2
-
-
84911993592
-
The stratosphere platform for big data analytics
-
December 2014
-
Alexander Alexandrov, Rico Bergmann, Stephan Ewen, Johann-Christoph Freytag, Fabian Hueske, Arvid Heise, Odej Kao, Marcus Leich, Ulf Leser, Volker Markl, Felix Naumann, Mathias Peters, Astrid Rheinländer, Matthias J. Sax, Sebastian Schelter, Mareike Höger, Kostas Tzoumas, and Daniel Warneke. 2014. The stratosphere platform for big data analytics. The International Journal on Very Large Data Bases (VLDBJ) 23, 6(December 2014), 939-964.
-
(2014)
The International Journal on Very Large Data Bases (VLDBJ)
, vol.23
, Issue.6
, pp. 939-964
-
-
Alexandrov, A.1
Bergmann, R.2
Ewen, S.3
Freytag, J.-C.4
Hueske, F.5
Heise, A.6
Kao, O.7
Leich, M.8
Leser, U.9
Markl, V.10
Naumann, F.11
Peters, M.12
Rheinländer, A.13
Sax, M.J.14
Schelter, S.15
Höger, M.16
Tzoumas, K.17
Warneke, D.18
-
3
-
-
1542489567
-
Hippodrome: Running circles around storage administration
-
Eric Anderson, Michael Hobbs, Kimberly Keeton, Susan Spence, Mustafa Uysal, and Alistair Veitch. 2002. Hippodrome: Running circles around storage administration. In Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02).
-
(2002)
Proceedings of the 1st USENIX Conference on File and Storage Technologies (FAST'02)
-
-
Anderson, E.1
Hobbs, M.2
Keeton, K.3
Spence, S.4
Uysal, M.5
Veitch, A.6
-
7
-
-
84858315350
-
Why software is eating the world
-
August 2011
-
Marc Andreessen. 2011. Why software is eating the world. The Wall Street Journal (August 2011).
-
(2011)
The Wall Street Journal
-
-
Andreessen, M.1
-
8
-
-
68249129760
-
-
Technical Report, University of California Berkeley
-
Michael Armbrust, Armando Fox, Rean Griffith, Anthony D. Joseph, Randy H. Katz, Andrew Konwinski, Gunho Lee, David A. Patterson, Ariel Rabkin, Ion Stoica, and Matei Zaharia. 2009. Above the Clouds: A Berkeley View of Cloud Computing. Technical Report UCB/EECS-2009-28. University of California Berkeley.
-
(2009)
Above the Clouds: A Berkeley View of Cloud Computing
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.H.5
Konwinski, A.6
Lee, G.7
Patterson, D.A.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
12
-
-
80053204575
-
Automating configuration troubleshooting with ConfAid
-
February 2011
-
Mona Attariyan and Jason Flinn. 2011. Automating configuration troubleshooting with ConfAid. USENIX;login:36, 1(February 2011), 27-36.
-
(2011)
USENIX;login
, vol.36
, Issue.1
, pp. 27-36
-
-
Attariyan, M.1
Flinn, J.2
-
13
-
-
21644436956
-
Field studies of computer system administrators: Analysis of system management tools and practices
-
Rob Barrett, Eser Kandogan, Paul P. Maglio, Eben Haber, Leila A. Takayama, and Madhu Prabaker. 2004. Field studies of computer system administrators: Analysis of system management tools and practices. In Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work (CSCW'04).
-
(2004)
Proceedings of the 2004 ACM Conference on Computer Supported Cooperative Work (CSCW'04)
-
-
Barrett, R.1
Kandogan, E.2
Maglio, P.P.3
Haber, E.4
Takayama, L.A.5
Prabaker, M.6
-
15
-
-
79959832940
-
Detecting and resolving policy misconfigurations in access-control systems
-
May 2011
-
Lujo Bauer, Scott Garriss, and Michael K. Reiter. 2011. Detecting and resolving policy misconfigurations in access-control systems. ACM Transactions on Information and System Security (TISSEC) 14, 1(May 2011), 1-28.
-
(2011)
ACM Transactions on Information and System Security (TISSEC)
, vol.14
, Issue.1
, pp. 1-28
-
-
Bauer, L.1
Garriss, S.2
Reiter, M.K.3
-
18
-
-
75749147262
-
A few billion lines of code later: Using static analysis to find bugs in the real world
-
February 2010
-
Al Bessey, Ken Block, Ben Chelf, Andy Chou, Bryan Fulton, Seth Hallem, Charles Henri-Gros, Asya Kamsky, Scott McPeak, and Dawson Engler. 2010. A few billion lines of code later: Using static analysis to find bugs in the real world. Commun. ACM 53, 2(February 2010), 66-75.
-
(2010)
Commun. ACM
, vol.53
, Issue.2
, pp. 66-75
-
-
Al Bessey1
Block, K.2
Chelf, B.3
Chou, A.4
Fulton, B.5
Hallem, S.6
Henri-Gros, C.7
Kamsky, A.8
McPeak, S.9
Engler, D.10
-
20
-
-
85206039182
-
Educating system administrators
-
October 2014
-
Charles Border and Kyrre Begnum. 2014. Educating system administrators. USENIX;login:39, 5(October 2014), 36-39.
-
(2014)
USENIX;login
, vol.39
, Issue.5
, pp. 36-39
-
-
Border, C.1
Begnum, K.2
-
25
-
-
0029311990
-
A site configuration engine
-
1995
-
Mark Burgess. 1995. A site configuration engine. USENIX Computing Systems 8, 3(1995), 309-337.
-
(1995)
USENIX Computing Systems
, vol.8
, Issue.3
, pp. 309-337
-
-
Burgess, M.1
-
29
-
-
78149314253
-
Generic and automatic address configuration for data center networks
-
Kai Chen, Chuanxiong Guo, Haitao Wu, Jing Yuan, Zhenqian Feng, Yan Chen, Songwu Lu, and Wenfei Wu. 2010. Generic and automatic address configuration for data center networks. In Proceedings of 2010 Annual Conference of the ACM Special Interest Group on Data Communication (SIGCOMM'10).
-
(2010)
Proceedings of 2010 Annual Conference of the ACM Special Interest Group on Data Communication (SIGCOMM'10)
-
-
Chen, K.1
Guo, C.2
Wu, H.3
Yuan, J.4
Feng, Z.5
Chen, Y.6
Lu, S.7
Wu, W.8
-
31
-
-
2442424424
-
Grand research challenges in information systems
-
Computing Research Association. 2003. Grand Research Challenges in Information Systems. Technical Report. Retrieved from http://archive.cra.org/reports/gc.systems.pdf.
-
(2003)
Technical Report
-
-
Computing Research Association1
-
33
-
-
84939835499
-
A case study in configuration management tool deployment
-
Narayan Desai, Rick Bradshaw, Scott Matott, Sandra Bittner, Susan Coghlan, Remy Evard, Cory Lueninghoener, Ti Leggett, John-Paul Navarro, Gene Rackow, Craig Stacey, and Tisha Stacey. 2005. A case study in configuration management tool deployment. In Proceedings of the 19th Large Installation System Administration Conference (LISA'05).
-
(2005)
Proceedings of the 19th Large Installation System Administration Conference (LISA'05)
-
-
Desai, N.1
Bradshaw, R.2
Matott, S.3
Bittner, S.4
Coghlan, S.5
Evard, R.6
Lueninghoener, C.7
Leggett, T.8
Navarro, J.-P.9
Rackow, G.10
Stacey, C.11
Stacey, T.12
-
38
-
-
85160732882
-
Configuration management at massive scale: System design and experience
-
William Enck, Patrick McDaniel, Subhabrata Sen, Panagiotis Sebos, Sylke Spoerel, Albert Greenberg, Sanjay Rao, and William Aiello. 2007. Configuration management at massive scale: System design and experience. In Proceedings of 2007 USENIX Annual Technical Conference (USENIX ATC'07).
-
(2007)
Proceedings of 2007 USENIX Annual Technical Conference (USENIX ATC'07)
-
-
Enck, W.1
McDaniel, P.2
Sen, S.3
Sebos, P.4
Spoerel, S.5
Greenberg, A.6
Rao, S.7
Aiello, W.8
-
39
-
-
64249133842
-
Configuration management at massive scale: System design and experience
-
April 2009
-
William Enck, Thomas Moyer, Patrick McDaniel, Subhabrata Sen, Panagiotis Sebos, Sylke Spoerel, Albert Greenberg, Yu-Wei Eric Sung, Sanjay Rao, and William Aiello. 2009. Configuration management at massive scale: System design and experience. IEEE Journal on Selected Areas in Communications (JSAC) 27, 3(April 2009), 323-335.
-
(2009)
IEEE Journal on Selected Areas in Communications (JSAC)
, vol.27
, Issue.3
, pp. 323-335
-
-
Enck, W.1
Moyer, T.2
McDaniel, P.3
Sen, S.4
Sebos, P.5
Spoerel, S.6
Greenberg, A.7
Sung, Y.E.8
Rao, S.9
Aiello, W.10
-
41
-
-
74049125838
-
The smartfrog configuration management framework
-
January 2009
-
Patrick Goldsack, Julio Guijarro, Steve Loughran, Alistair Coles, Andrew Farrell, Antonio Lain, Paul Murray, and Peter Toft. 2009. The smartfrog configuration management framework. SIGOPS Operating System Review 43(January 2009), 16-25.
-
(2009)
SIGOPS Operating System Review
, vol.43
, pp. 16-25
-
-
Goldsack, P.1
Guijarro, J.2
Loughran, S.3
Coles, A.4
Farrell, A.5
Lain, A.6
Murray, P.7
Toft, P.8
-
42
-
-
0003795524
-
Why do computers stop and what can be done about it?
-
June 1985
-
Jim Gray. 1985. Why do computers stop and what can be done about it? Tandem Technical Report 85. 7 (June 1985).
-
(1985)
Tandem Technical Report
, vol.85
, Issue.7
-
-
Gray, J.1
-
43
-
-
85118316536
-
What bugs live in the cloud? A study of 3000+ issues in cloud systems
-
Haryadi S. Gunawi, Mingzhe Hao, Tanakorn Leesatapornwongsa, Tiratat Patana-anake, Thanh Do, Jeffry Adityatama, Kurnia J. Eliazar, Agung Laksono, Jeffrey F. Lukman, Vincentius Martin, and Anang D. Satria. 2014. What bugs live in the cloud? A study of 3000+ issues in cloud systems. In Proceedings of the 5th ACM Symposium on Cloud Computing (SoCC'14).
-
(2014)
Proceedings of the 5th ACM Symposium on Cloud Computing (SoCC'14)
-
-
Gunawi, H.S.1
Hao, M.2
Leesatapornwongsa, T.3
Patana-anake, T.4
Do, T.5
Adityatama, J.6
Eliazar, K.J.7
Laksono, A.8
Lukman, J.F.9
Martin, V.10
Satria, A.D.11
-
50
-
-
84939835510
-
-
Fabian Hueske. 2015. Juggling with Bits and Bytes. Retrieved from http://flink.apache.org/news/2015/05/11/Juggling-with-Bits-and-Bytes.html.
-
(2015)
Juggling with Bits and Bytes
-
-
Hueske, F.1
-
51
-
-
85077345110
-
Understanding customer problem troubleshooting from storage system logs
-
Weihang Jiang, Chongfeng Hu, Shankar Pasupathy, Arkady Kanevsky, Zhenmin Li, and Yuanyuan Zhou. 2009. Understanding customer problem troubleshooting from storage system logs. In Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST'09).
-
(2009)
Proceedings of the 7th USENIX Conference on File and Storage Technologies (FAST'09)
-
-
Jiang, W.1
Hu, C.2
Pasupathy, S.3
Kanevsky, A.4
Li, Z.5
Zhou, Y.6
-
53
-
-
84889689671
-
What takes us down?
-
October 2012
-
Stuart Kendrick. 2012. What takes us down? USENIX;login:37, 5(October 2012), 37-45.
-
(2012)
USENIX;login
, vol.37
, Issue.5
, pp. 37-45
-
-
Kendrick, S.1
-
54
-
-
0037253062
-
The vision of autonomic computing
-
January 2003
-
Jeffrey O. Kephart and David M. Chess. 2003. The vision of autonomic computing. IEEE Computer 36, 1(January 2003), 41-50.
-
(2003)
IEEE Computer
, vol.36
, Issue.1
, pp. 41-50
-
-
Kephart, J.O.1
Chess, D.M.2
-
56
-
-
79955668292
-
The state of the art in end-user software engineering
-
April 2011
-
Andrew J. Ko, Robin Abraham, Laura Beckwith, Alan Blackwell, Margaret Burnett, Martin Erwig, Chris Scaffidi, Joseph Lawrance, Henry Lieberman, Brad Myers, Mary Beth Rosson, Gregg Rothermel, Mary Shaw, and Susan Wiedenbeck. 2011. The state of the art in end-user software engineering. ACM Computing Surveys (CSUR) 43, 3 (April 2011).
-
(2011)
ACM Computing Surveys (CSUR)
, vol.43
, pp. 3
-
-
Ko, A.J.1
Abraham, R.2
Beckwith, L.3
Blackwell, A.4
Burnett, M.5
Erwig, M.6
Scaffidi, C.7
Lawrance, J.8
Lieberman, H.9
Myers, B.10
Rosson, M.B.11
Rothermel, G.12
Shaw, M.13
Wiedenbeck, S.14
-
57
-
-
0038674062
-
-
Technical Report, MIT Laboratory for Computer Science
-
Eddie Kohler, Benjie Chen, M. Frans Kaashoek, Robert Morris, and Massimiliano Poletto. 2000. Programming Language Techniques for Modular Router Configurations. Technical Report MIT-LCS-TR-812. MIT Laboratory for Computer Science.
-
(2000)
Programming Language Techniques for Modular Router Configurations
-
-
Kohler, E.1
Chen, B.2
Kaashoek, M.F.3
Morris, R.4
Poletto, M.5
-
63
-
-
84924373206
-
Getting started with configuration management
-
April 2011
-
Cory Lueninghoener. 2011. Getting started with configuration management. USENIX;login:36, 2(April 2011), 12-17.
-
(2011)
USENIX;login
, vol.36
, Issue.2
, pp. 12-17
-
-
Lueninghoener, C.1
-
66
-
-
19944391032
-
Improving user-interface dependability through mitigation of human error
-
July 2005
-
Roy A. Maxion and Robert W. Reeder. 2005. Improving user-interface dependability through mitigation of human error. International Journal of Human-Computer Studies 63, 1-2(July 2005), 25-50.
-
(2005)
International Journal of Human-computer Studies
, vol.63
, Issue.1-2
, pp. 25-50
-
-
Maxion, R.A.1
Reeder, R.W.2
-
69
-
-
0003577356
-
-
Technical Report, University of Wisconsin-Madison, Computer Sciences Department
-
Barton P. Miller, David Koski, Cjin Pheow Lee, Vivekananda Maganty, Ravi Murthy, Ajitkumar Natarajan, and Jeff Steidl. 1995. Fuzz Revisited: A Re-Examination of the Reliability of UNIX Utilities and Services. Technical Report No. 1268. University of Wisconsin-Madison, Computer Sciences Department.
-
(1995)
Fuzz Revisited: A Re-examination of the Reliability of UNIX Utilities and Services
-
-
Miller, B.P.1
Koski, D.2
Lee, C.P.3
Maganty, V.4
Murthy, R.5
Natarajan, A.6
Steidl, J.7
-
71
-
-
0025403275
-
Improving a human-computer dialogue
-
March 1990
-
Rolf Molich and Jakob Nielsen. 1990. Improving a human-computer dialogue. Communications of the ACM 33, 3(March 1990), 338-348.
-
(1990)
Communications of the ACM
, vol.33
, Issue.3
, pp. 338-348
-
-
Molich, R.1
Nielsen, J.2
-
75
-
-
55349083998
-
Declarative infrastructure configuration synthesis and debugging
-
October 2008
-
Sanjai Narain, Gary Levin, Vikram Kaul, and Sharad Malik. 2008. Declarative infrastructure configuration synthesis and debugging. Journal of Network and System Management 16, 3(October 2008), 235-258.
-
(2008)
Journal of Network and System Management
, vol.16
, Issue.3
, pp. 235-258
-
-
Narain, S.1
Levin, G.2
Kaul, V.3
Malik, S.4
-
78
-
-
84976800746
-
Design rules based on analyses of human error
-
April 1983
-
Donald A. Norman. 1983b. Design rules based on analyses of human error. Communications of the ACM 26, 4(April 1983), 254-258.
-
(1983)
Communications of the ACM
, vol.26
, Issue.4
, pp. 254-258
-
-
Norman, D.A.1
-
79
-
-
34748823120
-
Understanding and validating database system administration
-
Fábio Oliveira, Kiran Nagaraja, Rekha Bachwani, Ricardo Bianchini, Richard P. Martin, and Thu D. Nguyen. 2006. Understanding and validating database system administration. In Proceedings of 2006 USENIX Annual Technical Conference (USENIX ATC'06).
-
(2006)
Proceedings of 2006 USENIX Annual Technical Conference (USENIX ATC'06)
-
-
Oliveira, F.1
Nagaraja, K.2
Bachwani, R.3
Bianchini, R.4
Martin, R.P.5
Nguyen, T.D.6
-
85
-
-
0004015896
-
-
Technical Report, University of California, Berkeley
-
David Patterson, Aaron Brown, Pete Broadwell, George Candea, Mike Chen, James Cutler, Patricia Enriquez, Armando Fox, Emre Kiciman, Matthew Merzbacher, David Oppenheimer, Naveen Sastry, William Tetzlaff, Jonathan Traupman, and Noah Treuhaft. 2002. Recovery-Oriented Computing (ROC): Motivation, Definition, Techniques, and Case Studies. Technical Report No. UCB//CSD-02-1175. University of California, Berkeley.
-
(2002)
Recovery-oriented Computing (ROC): Motivation, Definition, Techniques, and Case Studies
-
-
Patterson, D.1
Brown, A.2
Broadwell, P.3
Candea, G.4
Chen, M.5
Cutler, J.6
Enriquez, P.7
Fox, A.8
Kiciman, E.9
Merzbacher, M.10
Oppenheimer, D.11
Sastry, N.12
Tetzlaff, W.13
Traupman, J.14
Treuhaft, N.15
-
89
-
-
84880248539
-
How Hadoop clusters break
-
July 2013
-
Ariel Rabkin and Randy Katz. 2013. How Hadoop clusters break. IEEE Software Magazine 30, 4(July 2013), 88-94.
-
(2013)
IEEE Software Magazine
, vol.30
, Issue.4
, pp. 88-94
-
-
Rabkin, A.1
Katz, R.2
-
91
-
-
0004223940
-
-
Cambridge University Press
-
James Reason. 1990. Human Error. Cambridge University Press.
-
(1990)
Human Error
-
-
Reason, J.1
-
95
-
-
84991654203
-
-
StackOverflow
-
StackOverflow. 2015. 2015 Developer Survey. Retrieved from http://stackoverflow.com/research/developersurvey-2015# profile-education.
-
(2015)
2015 Developer Survey
-
-
-
101
-
-
85076718532
-
Flight data recorder: Monitoring persistent-state interactions to improve systems management
-
Chad Verbowski, Emre Kiciman, Arunvijay Kumar, Brad Daniels, Shan Lu, Juhan Lee, Yi-Min Wang, and Roussi Roussev. 2006a. Flight data recorder: Monitoring persistent-state interactions to improve systems management. In Proceedings of the 7th USENIX Conference on Operating Systems Design and Implementation (OSDI'06).
-
(2006)
Proceedings of the 7th USENIX Conference on Operating Systems Design and Implementation (OSDI'06)
-
-
Verbowski, C.1
Kiciman, E.2
Kumar, A.3
Daniels, B.4
Lu, S.5
Lee, J.6
Wang, Y.-M.7
Roussev, R.8
-
105
-
-
77952114571
-
STRIDER: A black-box, state-based approach to change and configuration management and support
-
Yi-Min Wang, Chad Verbowski, John Dunagan, Yu Chen, Helen J. Wang, Chun Yuan, and Zheng Zhang. 2003. STRIDER: A black-box, state-based approach to change and configuration management and support. In Proceedings of the 17th Large Installation Systems Administration Conference (LISA03).
-
(2003)
Proceedings of the 17th Large Installation Systems Administration Conference (LISA03)
-
-
Wang, Y.-M.1
Verbowski, C.2
Dunagan, J.3
Chen, Y.4
Wang, H.J.5
Yuan, C.6
Zhang, Z.7
-
108
-
-
85206035366
-
-
Wikipedia
-
Wikipedia. 2014. System administrator. Retrieved from http://en. wikipedia.org/wiki/System-administrator.
-
(2014)
System Administrator
-
-
-
112
-
-
84960403168
-
Hey, you have given me too many knobs!-Understanding and dealing with over-designed configuration in system software
-
Tianyin Xu, Long Jin, Xuepeng Fan, Yuanyuan Zhou, Shankar Pasupathy and Rukma Talwadker. 2015. Hey, you have given me too many knobs!-Understanding and dealing with over-designed configuration in system software. In Proceedings of the 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE'15).
-
(2015)
Proceedings of the 10th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE'15)
-
-
Xu, T.1
Jin, L.2
Fan, X.3
Zhou, Y.4
Pasupathy, S.5
Talwadker, R.6
-
113
-
-
84889664388
-
Do not blame users for misconfigurations
-
Tianyin Xu, Jiaqi Zhang, Peng Huang, Jing Zheng, Tianwei Sheng, Ding Yuan, Yuanyuan Zhou, and Shankar Pasupathy. 2013. Do not blame users for misconfigurations. In Proceedings of the 24th Symposium on Operating System Principles (SOSP'13).
-
(2013)
Proceedings of the 24th Symposium on Operating System Principles (SOSP'13)
-
-
Xu, T.1
Zhang, J.2
Huang, P.3
Zheng, J.4
Sheng, T.5
Yuan, D.6
Zhou, Y.7
Pasupathy, S.8
-
115
-
-
82655165298
-
An empirical study on configuration errors in commercial and open source systems
-
Zuoning Yin, Xiao Ma, Jing Zheng, Yuanyuan Zhou, Lakshmi N. Bairavasundaram, and Shankar Pasupathy. 2011. An empirical study on configuration errors in commercial and open source systems. In Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP'11).
-
(2011)
Proceedings of the 23rd ACM Symposium on Operating Systems Principles (SOSP'11)
-
-
Yin, Z.1
Ma, X.2
Zheng, J.3
Zhou, Y.4
Bairavasundaram, L.N.5
Pasupathy, S.6
-
116
-
-
34748888898
-
Automated known problem diagnosis with event traces
-
Chun Yuan, Ni Lao, Ji-Rong Wen, Jiwei Li, Zheng Zhang, Yi-Min Wang, and Wei-Ying Ma. 2006. Automated known problem diagnosis with event traces. In Proceedings of the 1st ACM European Conference in Computer Systems (EuroSys'06).
-
(2006)
Proceedings of the 1st ACM European Conference in Computer Systems (EuroSys'06)
-
-
Yuan, C.1
Lao, N.2
Wen, J.-R.3
Li, J.4
Zhang, Z.5
Wang, Y.-M.6
Ma, W.-Y.7
-
117
-
-
85020616835
-
Simple testing can prevent most critical failures: An analysis of production failures in distributed data-intensive systems
-
Ding Yuan, Yu Luo, Xin Zhuang, Guilherme Rodrigues, Xu Zhao, Yongle Zhang, Pranay U. Jain, and Michael Stumm. 2014. Simple testing can prevent most critical failures: An analysis of production failures in distributed data-intensive systems. In Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation (OSDI'14).
-
(2014)
Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation (OSDI'14)
-
-
Yuan, D.1
Luo, Y.2
Zhuang, X.3
Rodrigues, G.4
Zhao, X.5
Zhang, Y.6
Jain, P.U.7
Stumm, M.8
-
122
-
-
84897776863
-
EnCore: Exploiting system environment and correlation information for misconfiguration detection
-
Jiaqi Zhang, Lakshmi Renganarayana, Xiaolan Zhang, Niyu Ge, Vasanth Bala, Tianyin Xu, and Yuanyuan Zhou. 2014. EnCore: Exploiting system environment and correlation information for misconfiguration detection. In Proceedings of the 19th International Conference on Architecture Support for Programming Languages and Operating Systems (ASPLOS'14).
-
(2014)
Proceedings of the 19th International Conference on Architecture Support for Programming Languages and Operating Systems (ASPLOS'14)
-
-
Zhang, J.1
Renganarayana, L.2
Zhang, X.3
Ge, N.4
Bala, V.5
Xu, T.6
Zhou, Y.7
|