Остановите войну!
for scientists:
default search action
Yuanyuan Zhou 0001
- > Home > Persons > Yuanyuan Zhou 0001
Publications
- 2017
- [c70]Tianyin Xu, Xinxin Jin, Peng Huang, Yuanyuan Zhou, Shan Lu, Long Jin, Shankar Pasupathy:
Early Detection of Configuration Errors to Reduce Failure Damage. USENIX Annual Technical Conference 2017 - 2016
- [c67]Tianyin Xu, Xinxin Jin, Peng Huang, Yuanyuan Zhou, Shan Lu, Long Jin, Shankar Pasupathy:
Early Detection of Configuration Errors to Reduce Failure Damage. OSDI 2016: 619-634 - 2012
- [j17]Shan Lu, Soyeon Park, Yuanyuan Zhou:
Detecting Concurrency Bugs from the Perspectives of Synchronization Intentions. IEEE Trans. Parallel Distributed Syst. 23(6): 1060-1072 (2012) - [j16]Shan Lu, Soyeon Park, Yuanyuan Zhou:
Finding Atomicity-Violation Bugs through Unserializable Interleaving Testing. IEEE Trans. Software Eng. 38(4): 844-860 (2012) - 2010
- [c49]Yao Shi, Soyeon Park, Zuoning Yin, Shan Lu, Yuanyuan Zhou, Wenguang Chen, Weimin Zheng:
Do I use the wrong definition?: DeFuse: definition-use invariants for detecting concurrency and sequential bugs. OOPSLA 2010: 160-174 - 2009
- [c47]Soyeon Park, Shan Lu, Yuanyuan Zhou:
CTrigger: exposing atomicity violation bugs from their hiding places. ASPLOS 2009: 25-36 - [c42]Soyeon Park, Yuanyuan Zhou, Weiwei Xiong, Zuoning Yin, Rini Kaushik, Kyu H. Lee, Shan Lu:
PRES: probabilistic replay with execution sketching on multiprocessors. SOSP 2009: 177-192 - 2008
- [c41]Shan Lu, Soyeon Park, Eunsoo Seo, Yuanyuan Zhou:
Learning from mistakes: a comprehensive study on real world concurrency bug characteristics. ASPLOS 2008: 329-339 - 2007
- [j11]Shan Lu, Joseph A. Tucek, Feng Qin, Yuanyuan Zhou:
AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants. IEEE Micro 27(1): 26-35 (2007) - [c33]Joseph A. Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, Dawn Xiaodong Song:
Sweeper: a lightweight end-to-end system for defending against fast worms. EuroSys 2007: 115-128 - [c30]Shan Lu, Weihang Jiang, Yuanyuan Zhou:
A study of interleaving coverage criteria. ESEC/SIGSOFT FSE 2007: 533-536 - [c29]Shan Lu, Soyeon Park, Chongfeng Hu, Xiao Ma, Weihang Jiang, Zhenmin Li, Raluca A. Popa, Yuanyuan Zhou:
MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs. SOSP 2007: 103-116 - [c28]Joseph A. Tucek, Shan Lu, Chengdu Huang, Spiros Xanthos, Yuanyuan Zhou:
Triage: diagnosing production run failures at the user's site. SOSP 2007: 131-144 - 2006
- [j9]Zhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou:
CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. IEEE Trans. Software Eng. 32(3): 176-192 (2006) - [c26]Zhenmin Li, Lin Tan, Xuanhui Wang, Shan Lu, Yuanyuan Zhou, Chengxiang Zhai:
Have things changed now?: an empirical study of bug characteristics in modern open source software. ASID 2006: 25-33 - [c25]Shan Lu, Joseph A. Tucek, Feng Qin, Yuanyuan Zhou:
AVIO: detecting atomicity violations via access interleaving invariants. ASPLOS 2006: 37-48 - [c24]Joseph A. Tucek, Shan Lu, Chengdu Huang, Spiros Xanthos, Yuanyuan Zhou:
Automatic On-line Failure Diagnosis at the End-User Site. HotDep 2006 - [c22]Shan Lu, Pin Zhou, Wei Liu, Yuanyuan Zhou, Josep Torrellas:
PathExpander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection. MICRO 2006: 38-52 - 2005
- [c19]Feng Qin, Shan Lu, Yuanyuan Zhou:
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs. HPCA 2005: 291-302 - 2004
- [c11]Pin Zhou, Wei Liu, Long Fei, Shan Lu, Feng Qin, Yuanyuan Zhou, Samuel P. Midkiff, Josep Torrellas:
AccMon: Automatically Detecting Memory-Related Bugs via Program Counter-Based Invariants. MICRO 2004: 269-280 - [c10]Zhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou:
CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code. OSDI 2004: 289-302
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2024-03-28 20:10 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint