2009 | ||
---|---|---|
79 | Joseph Tucek, Weiwei Xiong, Yuanyuan Zhou: Efficient online validation with delta execution. ASPLOS 2009: 193-204 | |
78 | Soyeon Park, Shan Lu, Yuanyuan Zhou: CTrigger: exposing atomicity violation bugs from their hiding places. ASPLOS 2009: 25-36 | |
77 | Zhe Zhang, Amit Kulkarni, Xiaosong Ma, Yuanyuan Zhou: Memory resource allocation for file system prefetching: from a supply chain management perspective. EuroSys 2009: 75-88 | |
76 | Weihang Jiang, Chongfeng Hu, Shankar Pasupathy, Arkady Kanevsky, Zhenmin Li, Yuanyuan Zhou: Understanding Customer Problem Troubleshooting from Storage System Logs. FAST 2009: 43-56 | |
75 | Yoann Padioleau, Lin Tan, Yuanyuan Zhou: Listening to programmers - Taxonomies and characteristics of comments in operating system code. ICSE 2009: 331-341 | |
74 | Soyeon Park, Yuanyuan Zhou, Weiwei Xiong, Zuoning Yin, Rini Kaushik, Kyu H. Lee, Shan Lu: PRES: probabilistic replay with execution sketching on multiprocessors. SOSP 2009: 177-192 | |
2008 | ||
73 | Rebecca Isaacs, Yuanyuan Zhou: 2008 USENIX Annual Technical Conference, Boston, MA, USA, June 22-27, 2008. Proceedings USENIX Association 2008 | |
72 | Man-Lap Li, Pradeep Ramachandran, Swarup Kumar Sahoo, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou: Understanding the propagation of hard errors to software and implications for resilient system design. ASPLOS 2008: 265-276 | |
71 | Shan Lu, Soyeon Park, Eunsoo Seo, Yuanyuan Zhou: Learning from mistakes: a comprehensive study on real world concurrency bug characteristics. ASPLOS 2008: 329-339 | |
70 | Man-Lap Li, Pradeep Ramachandran, Swarup Kumar Sahoo, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou: Trace-based microarchitecture-level diagnosis of permanent hardware faults. DSN 2008: 22-31 | |
69 | Swarup Kumar Sahoo, Man-Lap Li, Pradeep Ramachandran, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou: Using likely program invariants to detect hardware errors. DSN 2008: 70-79 | |
68 | Weihang Jiang, Chongfeng Hu, Yuanyuan Zhou, Arkady Kanevsky: Are Disks the Dominant Contributor for Storage Failures? A Comprehensive Study of Storage Subsystem Failure Characteristics. FAST 2008: 111-125 | |
67 | Zhe Zhang, Kyuhyung Lee, Xiaosong Ma, Yuanyuan Zhou: PFC: Transparent Optimization of Existing Prefetching Strategies for Multi-Level Storage Systems. ICDCS 2008: 740-751 | |
66 | Michael Jiang, Jing Zhang, Hong Zhao, Yuanyuan Zhou: Maintaining software product lines - an industrial practice. ICSM 2008: 444-447 | |
65 | Samuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou: Designing and Implementing Malicious Hardware. LEET 2008 | |
64 | Ding Yuan, Kyuhyung Lee, Hong Cheng, Gopal Krishna, Zhenmin Li, Xiao Ma, Yuanyuan Zhou, Jiawei Han: CISpan: Comprehensive Incremental Mining Algorithms of Closed Sequential Patterns for Multi-Versional Software Mining. SDM 2008: 84-95 | |
63 | Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou: AutoISES: Automatically Inferring Security Specification and Detecting Violations. USENIX Security Symposium 2008: 379-394 | |
62 | Michael Jiang, Jing Zhang, Hong Zhao, Yuanyuan Zhou: Enhancing Software Product Line Maintenance with Source Code Mining. WASA 2008: 538-547 | |
61 | Weihang Jiang, Chongfeng Hu, Yuanyuan Zhou, Arkady Kanevsky: Are disks the dominant contributor for storage failures - A comprehensive study of storage subsystem failure characteristics. TOS 4(3): (2008) | |
2007 | ||
60 | Shan Lu, Weihang Jiang, Yuanyuan Zhou: A study of interleaving coverage criteria. ESEC/SIGSOFT FSE 2007: 533-536 | |
59 | Shan Lu, Weihang Jiang, Yuanyuan Zhou: A study of interleaving coverage criteria. ESEC/SIGSOFT FSE (Companion) 2007: 533-536 | |
58 | Joseph Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, Dawn Xiaodong Song: Sweeper: a lightweight end-to-end system for defending against fast worms. EuroSys 2007: 115-128 | |
57 | Muralidhar Medidi, Yuanyuan Zhou: Extending Lifetime with Differential Duty Cycles in Wireless Sensor Networks. GLOBECOM 2007: 1033-1037 | |
56 | Pin Zhou, Radu Teodorescu, Yuanyuan Zhou: HARD: Hardware-Assisted Lockset-based Race Detection. HPCA 2007: 121-132 | |
55 | Yuanyuan Zhou, Muralidhar Medidi: Energy-efficient Contention-Resilient Medium Access for Wireless Sensor Networks. ICC 2007: 3178-3183 | |
54 | Yuanyuan Zhou, Muralidhar Medidi: An Energy-Aware Multi-Hop Tree Scatternet for Bluetooth Networks. ICC 2007: 5564-5569 | |
53 | Yuanyuan Zhou, Muralidhar Medidi: Sleep-based Topology Control for Wakeup Scheduling in Wireless Sensor Networks. SECON 2007: 304-313 | |
52 | Soyeon Park, Weihang Jiang, Yuanyuan Zhou, Sarita V. Adve: Managing energy-performance tradeoffs for multithreaded applications on multiprocessor architectures. SIGMETRICS 2007: 169-180 | |
51 | Shan Lu, Soyeon Park, Chongfeng Hu, Xiao Ma, Weihang Jiang, Zhenmin Li, Raluca A. Popa, Yuanyuan Zhou: MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs. SOSP 2007: 103-116 | |
50 | Joseph Tucek, Shan Lu, Chengdu Huang, Spiros Xanthos, Yuanyuan Zhou: Triage: diagnosing production run failures at the user's site. SOSP 2007: 131-144 | |
49 | Lin Tan, Ding Yuan, Gopal Krishna, Yuanyuan Zhou: /*icomment: bugs or bad comments?*/. SOSP 2007: 145-158 | |
48 | Feng Qin, Joseph Tucek, Yuanyuan Zhou, Jagadeesan Sundaresan: Rx: Treating bugs as allergies—a safe method to survive software failures. ACM Trans. Comput. Syst. 25(3): (2007) | |
47 | Shan Lu, Joseph Tucek, Feng Qin, Yuanyuan Zhou: AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants. IEEE Micro 27(1): 26-35 (2007) | |
46 | Yan Zhang, Zhifeng Chen, Yuanyuan Zhou: Efficient Execution of Multiple Queries on Deep Memory Hierarchy. J. Comput. Sci. Technol. 22(2): 273-279 (2007) | |
45 | Xiaodong Li, Ritu Gupta, Sarita V. Adve, Yuanyuan Zhou: Cross-component energy management: Joint adaptation of processor and memory. TACO 4(3): (2007) | |
2006 | ||
44 | Zhenmin Li, Lin Tan, Xuanhui Wang, Shan Lu, Yuanyuan Zhou, Chengxiang Zhai: Have things changed now?: an empirical study of bug characteristics in modern open source software. ASID 2006: 25-33 | |
43 | Shan Lu, Joseph Tucek, Feng Qin, Yuanyuan Zhou: AVIO: detecting atomicity violations via access interleaving invariants. ASPLOS 2006: 37-48 | |
42 | Vivek Pandey, Weihang Jiang, Yuanyuan Zhou, Ricardo Bianchini: DMA-aware memory energy management. HPCA 2006: 133-144 | |
41 | Muralidhar Medidi, Roger A. Slaaen, Yuanyuan Zhou, Christopher J. Mallery, Sirisha Medidi: Scalable Localization in Wireless Sensor Networks. HiPC 2006: 522-533 | |
40 | Muralidhar Medidi, Yuanyuan Zhou: Maintaining an energy-efficient Bluetooth scatternet. IPCCC 2006 | |
39 | Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yuanyuan Zhou, Youfeng Wu: LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks. MICRO 2006: 135-148 | |
38 | Shan Lu, Pin Zhou, Wei Liu, Yuanyuan Zhou, Josep Torrellas: PathExpander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection. MICRO 2006: 38-52 | |
37 | Yan Zhang, Zhifeng Chen, Yuanyuan Zhou: MiniTasking: Improving Cache Performance for Multiple Query Workloads. WAIM 2006: 287-299 | |
36 | Zhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou: CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. IEEE Trans. Software Eng. 32(3): 176-192 (2006) | |
2005 | ||
35 | Vijay Atluri, Pierangela Samarati, William Yurcik, Larry Brumbaugh, Yuanyuan Zhou: Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005 ACM 2005 | |
34 | Zhenmin Li, Yuanyuan Zhou: PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code. ESEC/SIGSOFT FSE 2005: 306-315 | |
33 | Feng Qin, Shan Lu, Yuanyuan Zhou: SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs. HPCA 2005: 291-302 | |
32 | Smruti R. Sarangi, Wei Liu, Yuanyuan Zhou: ReSlice: Selective Re-Execution of Long-Retired Misspeculated Instructions Using Forward Slicing. MICRO 2005: 257-270 | |
31 | Zhifeng Chen, Yan Zhang, Yuanyuan Zhou, Heidi Scott, Berni Schiefer: Empirical evaluation of multi-level buffer cache collaboration for storage systems. SIGMETRICS 2005: 145-156 | |
30 | Qingbo Zhu, Zhifeng Chen, Lin Tan, Yuanyuan Zhou, Kimberly Keeton, John Wilkes: Hibernator: helping disk arrays sleep through the winter. SOSP 2005: 177-190 | |
29 | Feng Qin, Joseph Tucek, Jagadeesan Sundaresan, Yuanyuan Zhou: Rx: treating bugs as allergies - a safe method to survive software failures. SOSP 2005: 235-248 | |
28 | Qingbo Zhu, Yuanyuan Zhou: Power-Aware Storage Cache Management. IEEE Trans. Computers 54(5): 587-602 (2005) | |
27 | Yuanyuan Zhou, Angelos Bilas, Suresh Jagannathan, Dimitrios Xinidis, Cezary Dubnicki, Kai Li: VI-Attached Database Storage. IEEE Trans. Parallel Distrib. Syst. 16(1): 35-50 (2005) | |
26 | Yuanyuan Zhou, Pin Zhou, Feng Qin, Wei Liu, Josep Torrellas: Efficient and flexible architectural support for dynamic monitoring. TACO 2(1): 3-33 (2005) | |
25 | Zhenmin Li, Zhifeng Chen, Yuanyuan Zhou: Mining block correlations to improve storage performance. TOS 1(2): 213-245 (2005) | |
24 | Xiaodong Li, Zhenmin Li, Yuanyuan Zhou, Sarita V. Adve: Performance directed energy management for main memory and disks. TOS 1(3): 346-380 (2005) | |
2004 | ||
23 | Pin Zhou, Vivek Pandey, Jagadeesan Sundaresan, Anand Raghuraman, Yuanyuan Zhou, Sanjeev Kumar: Dynamic tracking of page miss ratio curve for memory management. ASPLOS 2004: 177-188 | |
22 | Xiaodong Li, Zhenmin Li, Francis M. David, Pin Zhou, Yuanyuan Zhou, Sarita V. Adve, Sanjeev Kumar: Performance directed energy management for main memory and disks. ASPLOS 2004: 271-283 | |
21 | Jin Liang, Klara Nahrstedt, Yuanyuan Zhou: Adaptive multi-resource prediction in distributed resource sharing environment. CCGRID 2004: 293-300 | |
20 | Zhenmin Li, Zhifeng Chen, Sudarshan M. Srinivasan, Yuanyuan Zhou: C-Miner: Mining Block Correlations in Storage Systems. FAST 2004: 173-186 | |
19 | Qingbo Zhu, Francis M. David, Christo F. Devaraj, Zhenmin Li, Yuanyuan Zhou, Pei Cao: Reducing Energy Consumption of Disk Storage Using Power-Aware Cache Management. HPCA 2004: 118-129 | |
18 | Qingbo Zhu, Asim Shankar, Yuanyuan Zhou: PB-LRU: a self-tuning power aware storage cache replacement algorithm for conserving disk energy. ICS 2004: 79-88 | |
17 | Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, Josep Torrellas: iWatcher: Efficient Architectural Support for Software Debugging. ISCA 2004: 224-237 | |
16 | Pin Zhou, Wei Liu, Long Fei, Shan Lu, Feng Qin, Yuanyuan Zhou, Samuel P. Midkiff, Josep Torrellas: AccMon: Automatically Detecting Memory-Related Bugs via Program Counter-Based Invariants. MICRO 2004: 269-280 | |
15 | Zhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou: CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code. OSDI 2004: 289-302 | |
14 | Sudarshan M. Srinivasan, Srikanth Kandula, Christopher R. Andrews, Yuanyuan Zhou: Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software Debugging. USENIX Annual Technical Conference, General Track 2004: 29-44 | |
13 | Xiaodong Li, Zhenmin Li, Pin Zhou, Yuanyuan Zhou, Sarita V. Adve, Sanjeev Kumar: Performance-Directed Energy Management for Storage Systems. IEEE Micro 24(6): 38-49 (2004) | |
12 | Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, Josep Torrellas: iWatcher: Simple, General Architectural Support for Software Debugging. IEEE Micro 24(6): 50-56 (2004) | |
11 | Yuanyuan Zhou, Zhifeng Chen, Kai Li: Second-Level Buffer Cache Management. IEEE Trans. Parallel Distrib. Syst. 15(6): 505-519 (2004) | |
2003 | ||
10 | Cristina Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, Kenneth E. Rowe: Log Correlation for Intrusion Detection: A Proof of Concept. ACSAC 2003: 255-265 | |
9 | Zhifeng Chen, Yuanyuan Zhou, Kai Li: Eviction-based Cache Placement for Storage Caches. USENIX Annual Technical Conference, General Track 2003: 269-281 | |
2002 | ||
8 | Yuanyuan Zhou, Kai Li, Angelos Bilas, Suresh Jagannathan, Cezary Dubnicki, James Philbin: Experiences with VI Communication for Database Storage. ISCA 2002: 257- | |
7 | Marianne Winslett, Kevin Chen-Chuan Chang, AnHai Doan, Jiawei Han, ChengXiang Zhai, Yuanyuan Zhou: Database Research at the University of Illinois at Urbana-Champaign. SIGMOD Record 31(3): 97-102 (2002) | |
2001 | ||
6 | Yuanyuan Zhou, James Philbin, Kai Li: The Multi-Queue Replacement Algorithm for Second Level Buffer Caches. USENIX Annual Technical Conference, General Track 2001: 91-104 | |
1999 | ||
5 | Angelos Bilas, Dongming Jiang, Yuanyuan Zhou, Jaswinder Pal Singh: Limits to the Performance of Software Shared Memory: A Layered Approach. HPCA 1999: 193- | |
4 | Yuanyuan Zhou, Limin Wang, Douglas W. Clark, Kai Li: Thread Scheduling for Out-of-core Applications with Memory Server on Multicomputers. IOPADS 1999: 57-67 | |
3 | Yuanyuan Zhou, Peter M. Chen, Kai Li: Fast cluster failover using virtual memory-mapped communication. International Conference on Supercomputing 1999: 373-382 | |
1997 | ||
2 | Yuanyuan Zhou, Liviu Iftode, Jaswinder Pal Singh, Kai Li, Brian R. Toonen, Ioannis Schoinas, Mark D. Hill, David A. Wood: Relaxed Consistency and Coherence Granularity in DSM Systems: A Performance Evaluation. PPOPP 1997: 193-205 | |
1996 | ||
1 | Yuanyuan Zhou, Liviu Iftode, Kai Li: Performance Evaluation of Two Home-Based Lazy Release Consistency Protocols for Shared Virtual Memory Systems. OSDI 1996: 75-88 |