Yuanyuan Zhou

Orcid: 0000-0003-4760-7208

Affiliations:
  • University of California, San Diego, CA, USA
  • University of Illinois at Urbana-Champaign, IL, USA (former)
  • Princeton University, NJ, USA (former)


According to our database1, Yuanyuan Zhou authored at least 99 papers between 1996 and 2024.

Collaborative distances:

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

Online presence:

On csauthors.net:

Bibliography

2024
Effective Bug Detection with Unused Definitions.
Proceedings of the Nineteenth European Conference on Computer Systems, 2024

2023
Multiview: Finding Blind Spots in Access-Deny Issues Diagnosis.
Proceedings of the 32nd USENIX Security Symposium, 2023

Improving Logging to Reduce Permission Over-Granting Mistakes.
Proceedings of the 32nd USENIX Security Symposium, 2023

Protecting Data Integrity of Web Applications with Database Constraints Inferred from Application Code.
Proceedings of the 28th ACM International Conference on Architectural Support for Programming Languages and Operating Systems, 2023

2021
Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model.
Proceedings of the 30th USENIX Security Symposium, 2021

PYLIVE: On-the-Fly Code Change for Python-based Online Services.
Proceedings of the 2021 USENIX Annual Technical Conference, 2021

2020
Introduction to the Special Section on SOSP 2019.
ACM Trans. Storage, 2020

PracExtractor: Extracting Configuration Good Practices from Manuals to Detect Server Misconfigurations.
Proceedings of the 2020 USENIX Annual Technical Conference, 2020

Tuning applications for efficient GPU offloading to in-memory processing.
Proceedings of the ICS '20: 2020 International Conference on Supercomputing, 2020

2019
Towards Continuous Access Control Validation and Forensics.
Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security, 2019

2018
ANEL: robust mobile network programming using a declarative language.
Proceedings of the 5th International Conference on Mobile Software Engineering and Systems, MOBILESoft@ICSE 2018, Gothenburg, Sweden, May 27, 2018

2017
Early Detection of Configuration Errors to Reduce Failure Damage.
Proceedings of the 2017 USENIX Annual Technical Conference, 2017

Log20: Fully Automated Optimal Placement of Log Printing Statements under Specified Overhead Threshold.
Proceedings of the 26th Symposium on Operating Systems Principles, 2017

The Game of Twenty Questions: Do You Know Where to Log?
Proceedings of the 16th Workshop on Hot Topics in Operating Systems, 2017

How Do System Administrators Resolve Access-Denied Issues in the Real World?
Proceedings of the 2017 CHI Conference on Human Factors in Computing Systems, 2017

2016
DefDroid: Towards a More Defensive Mobile OS Against Disruptive App Behavior.
Proceedings of the 14th Annual International Conference on Mobile Systems, 2016

NChecker: saving mobile app developers from network disruptions.
Proceedings of the Eleventh European Conference on Computer Systems, 2016

2015
Systems Approaches to Tackling Configuration Errors: A Survey.
ACM Comput. Surv., 2015

Is achieving security a hopeless quest?
Proceedings of the SOSP History Day 2015, Monterey, California, USA, October 4, 2015, 2015

Hey, you have given me too many knobs!: understanding and dealing with over-designed configuration in system software.
Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering, 2015

FTXen: Making hypervisor resilient to hardware faults on relaxed cores.
Proceedings of the 21st IEEE International Symposium on High Performance Computer Architecture, 2015

ConfValley: a systematic configuration validation framework for cloud services.
Proceedings of the Tenth European Conference on Computer Systems, 2015

2014
Bug characteristics in open source software.
Empir. Softw. Eng., 2014

Performance regression testing target prioritization via performance risk analysis.
Proceedings of the 36th International Conference on Software Engineering, 2014

EnCore: exploiting system environment and correlation information for misconfiguration detection.
Proceedings of the Architectural Support for Programming Languages and Operating Systems, 2014

2013
Do not blame users for misconfigurations.
Proceedings of the ACM SIGOPS 24th Symposium on Operating Systems Principles, 2013

eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones.
Proceedings of the 10th USENIX Symposium on Networked Systems Design and Implementation, 2013

Views and Transactional Storage for Large Graphs.
Proceedings of the Middleware 2013, 2013

2012
Finding Atomicity-Violation Bugs through Unserializable Interleaving Testing.
IEEE Trans. Software Eng., 2012

Detecting Concurrency Bugs from the Perspectives of Synchronization Intentions.
IEEE Trans. Parallel Distributed Syst., 2012

Improving Software Diagnosability via Log Enhancement.
ACM Trans. Comput. Syst., 2012

Be Conservative: Enhancing Failure Diagnosis with Proactive Logging.
Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation, 2012

Characterizing logging practices in open-source software.
Proceedings of the 34th International Conference on Software Engineering, 2012

2011
An empirical study on configuration errors in commercial and open source systems.
Proceedings of the 23rd ACM Symposium on Operating Systems Principles 2011, 2011

How do fixes become bugs?
Proceedings of the SIGSOFT/FSE'11 19th ACM SIGSOFT Symposium on the Foundations of Software Engineering (FSE-19) and ESEC'11: 13th European Software Engineering Conference (ESEC-13), 2011

ATDetector: improving the accuracy of a commercial data race detector by identifying address transfer.
Proceedings of the 44rd Annual IEEE/ACM International Symposium on Microarchitecture, 2011

aComment: mining annotations from comments and code to detect interrupt related concurrency bugs.
Proceedings of the 33rd International Conference on Software Engineering, 2011

2010
Ad Hoc Synchronization Considered Harmful.
Proceedings of the 9th USENIX Symposium on Operating Systems Design and Implementation, 2010

Do I use the wrong definition?: DeFuse: definition-use invariants for detecting concurrency and sequential bugs.
Proceedings of the 25th Annual ACM SIGPLAN Conference on Object-Oriented Programming, 2010

SherLog: error diagnosis by connecting clues from run-time logs.
Proceedings of the 15th International Conference on Architectural Support for Programming Languages and Operating Systems, 2010

2009
Storage System Problem Troubleshooting andSystem Logs.
login Usenix Mag., 2009

PRES: probabilistic replay with execution sketching on multiprocessors.
Proceedings of the 22nd ACM Symposium on Operating Systems Principles 2009, 2009

Listening to programmers - Taxonomies and characteristics of comments in operating system code.
Proceedings of the 31st International Conference on Software Engineering, 2009

Understanding Customer Problem Troubleshooting from Storage System Logs.
Proceedings of the 7th USENIX Conference on File and Storage Technologies, 2009

Memory resource allocation for file system prefetching: from a supply chain management perspective.
Proceedings of the 2009 EuroSys Conference, Nuremberg, Germany, April 1-3, 2009, 2009

Efficient online validation with delta execution.
Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems, 2009

CTrigger: exposing atomicity violation bugs from their hiding places.
Proceedings of the 14th International Conference on Architectural Support for Programming Languages and Operating Systems, 2009

2008
Don't Blame Disks for Every Storage Subsystem Failure.
login Usenix Mag., 2008

Are disks the dominant contributor for storage failures - A comprehensive study of storage subsystem failure characteristics.
ACM Trans. Storage, 2008

Enhancing Software Product Line Maintenance with Source Code Mining.
Proceedings of the Wireless Algorithms, 2008

AutoISES: Automatically Inferring Security Specification and Detecting Violations.
Proceedings of the 17th USENIX Security Symposium, 2008

CISpan: Comprehensive Incremental Mining Algorithms of Closed Sequential Patterns for Multi-Versional Software Mining.
Proceedings of the SIAM International Conference on Data Mining, 2008

Designing and Implementing Malicious Hardware.
Proceedings of the First USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2008

Maintaining software product lines - an industrial practice.
Proceedings of the 24th IEEE International Conference on Software Maintenance (ICSM 2008), September 28, 2008

PFC: Transparent Optimization of Existing Prefetching Strategies for Multi-Level Storage Systems.
Proceedings of the 28th IEEE International Conference on Distributed Computing Systems (ICDCS 2008), 2008

Learning from mistakes: a comprehensive study on real world concurrency bug characteristics.
Proceedings of the 13th International Conference on Architectural Support for Programming Languages and Operating Systems, 2008

2007
Rx: Treating bugs as allergies - a safe method to survive software failures.
ACM Trans. Comput. Syst., 2007

AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants.
IEEE Micro, 2007

Efficient Execution of Multiple Queries on Deep Memory Hierarchy.
J. Comput. Sci. Technol., 2007

Triage: diagnosing production run failures at the user's site.
Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, 2007

/*icomment: bugs or bad comments?*/.
Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, 2007

MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs.
Proceedings of the 21st ACM Symposium on Operating Systems Principles 2007, 2007

A study of interleaving coverage criteria.
Proceedings of the 6th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT International Symposium on Foundations of Software Engineering, 2007

Managing energy-performance tradeoffs for multithreaded applications on multiprocessor architectures.
Proceedings of the 2007 ACM SIGMETRICS International Conference on Measurement and Modeling of Computer Systems, 2007

HotComments: How to Make Program Comments More Useful?
Proceedings of HotOS'07: 11th Workshop on Hot Topics in Operating Systems, 2007

Sweeper: a lightweight end-to-end system for defending against fast worms.
Proceedings of the 2007 EuroSys Conference, Lisbon, Portugal, March 21-23, 2007, 2007

2006
CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code.
IEEE Trans. Software Eng., 2006

MiniTasking: Improving Cache Performance for Multiple Query Workloads.
Proceedings of the Advances in Web-Age Information Management, 2006

PathExpander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection.
Proceedings of the 39th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-39 2006), 2006

DMA-aware memory energy management.
Proceedings of the 12th International Symposium on High-Performance Computer Architecture, 2006

Automatic On-line Failure Diagnosis at the End-User Site.
Proceedings of the Second Workshop on Hot Topics in System Dependability, 2006

Have things changed now?: an empirical study of bug characteristics in modern open source software.
Proceedings of the 1st Workshop on Architectural and System Support for Improving Software Dependability, 2006

2005
VI-Attached Database Storage.
IEEE Trans. Parallel Distributed Syst., 2005

Mining block correlations to improve storage performance.
ACM Trans. Storage, 2005

Power-Aware Storage Cache Management.
IEEE Trans. Computers, 2005

Efficient and flexible architectural support for dynamic monitoring.
ACM Trans. Archit. Code Optim., 2005

Hibernator: helping disk arrays sleep through the winter.
Proceedings of the 20th ACM Symposium on Operating Systems Principles 2005, 2005

Empirical evaluation of multi-level buffer cache collaboration for storage systems.
Proceedings of the International Conference on Measurements and Modeling of Computer Systems, 2005

SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs.
Proceedings of the 11th International Conference on High-Performance Computer Architecture (HPCA-11 2005), 2005

Treating Bugs as Allergies: A Safe Method for Surviving Software Failures.
Proceedings of HotOS'05: 10th Workshop on Hot Topics in Operating Systems, 2005

2004
Second-Level Buffer Cache Management.
IEEE Trans. Parallel Distributed Syst., 2004

iWatcher: Simple, General Architectural Support for Software Debugging.
IEEE Micro, 2004

Performance-Directed Energy Management for Storage Systems.
IEEE Micro, 2004

CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code.
Proceedings of the 6th Symposium on Operating System Design and Implementation (OSDI 2004), 2004

AccMon: Automatically Detecting Memory-Related Bugs via Program Counter-Based Invariants.
Proceedings of the 37th Annual International Symposium on Microarchitecture (MICRO-37 2004), 2004

iWatcher: Efficient Architectural Support for Software Debugging.
Proceedings of the 31st International Symposium on Computer Architecture (ISCA 2004), 2004

PB-LRU: a self-tuning power aware storage cache replacement algorithm for conserving disk energy.
Proceedings of the 18th Annual International Conference on Supercomputing, 2004

Reducing Energy Consumption of Disk Storage Using Power-Aware Cache Management.
Proceedings of the 10th International Conference on High-Performance Computer Architecture (HPCA-10 2004), 2004

C-Miner: Mining Block Correlations in Storage Systems.
Proceedings of the FAST '04 Conference on File and Storage Technologies, March 31, 2004

2003
Eviction-based Cache Placement for Storage Caches.
Proceedings of the General Track: 2003 USENIX Annual Technical Conference, 2003

Log Correlation for Intrusion Detection: A Proof of Concept.
Proceedings of the 19th Annual Computer Security Applications Conference (ACSAC 2003), 2003

2002
Database Research at the University of Illinois at Urbana-Champaign.
SIGMOD Rec., 2002

Experiences with VI Communication for Database Storage.
Proceedings of the 29th International Symposium on Computer Architecture (ISCA 2002), 2002

2001
The Multi-Queue Replacement Algorithm for Second Level Buffer Caches.
Proceedings of the General Track: 2001 USENIX Annual Technical Conference, 2001

1999
Thread Scheduling for Out-of-core Applications with Memory Server on Multicomputers.
Proceedings of the Sixth Workshop on I/O in Parallel and Distributed Systems, 1999

Fast cluster failover using virtual memory-mapped communication.
Proceedings of the 13th international conference on Supercomputing, 1999

Limits to the Performance of Software Shared Memory: A Layered Approach.
Proceedings of the Fifth International Symposium on High-Performance Computer Architecture, 1999

1997
Relaxed Consistency and Coherence Granularity in DSM Systems: A Performance Evaluation.
Proceedings of the Sixth ACM SIGPLAN Symposium on Principles & Practice of Parallel Programming (PPOPP), 1997

1996
Performance Evaluation of Two Home-Based Lazy Release Consistency Protocols for Shared Virtual Memory Systems.
Proceedings of the Second USENIX Symposium on Operating Systems Design and Implementation (OSDI), 1996


  Loading...