default search action
Yuanyuan Zhou 0001
Yuanyuan (YY) Zhou
Person information
- affiliation: University of California, San Diego, CA, USA
- affiliation (former): University of Illinois at Urbana-Champaign, IL, USA
- affiliation (former): Princeton University, NJ, USA
Other persons with the same name
- Yuanyuan Zhou — disambiguation page
- Yuanyuan Zhou 0002 — Anhui University, School of Computer Science and Technology, MOE Key Laboratory of Intelligent Computing and Signal Processing, Hefei, China
- Yuanyuan Zhou 0003 — Chinese Academy of Sciences, State Key Laboratory of Robotics, Shenyang, China
- Yuanyuan Zhou 0004 — Anhui University of Science and Technology, School of Mechanical Engineering, Huainan, China
- Yuanyuan Zhou 0005 — Capital Normal University, Beijing, China
- Yuanyuan Zhou 0006 — ICTEAM/ELEN/Crypto Group, UCLouvain, Ottignies-Louvain-la-Neuve, Belgium (and 1 more)
- Yuanyuan Zhou 0007 — University of Electronic Science and Technology of China, Chengdu, China
- Yuanyuan Zhou 0008 — Washington State University, Pullman, WA, USA
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2024
- [c87]Li Zhong, Chengcheng Xiang, Haochen Huang, Bingyu Shen, Eric Mugnier, Yuanyuan Zhou:
Effective Bug Detection with Unused Definitions. EuroSys 2024: 720-735 - [i1]Eric Mugnier, Emmanuel Anaya Gonzalez, Ranjit Jhala, Nadia Polikarpova, Yuanyuan Zhou:
Laurel: Generating Dafny Assertions Using Large Language Models. CoRR abs/2405.16792 (2024) - 2023
- [c86]Haochen Huang, Bingyu Shen, Li Zhong, Yuanyuan Zhou:
Protecting Data Integrity of Web Applications with Database Constraints Inferred from Application Code. ASPLOS (2) 2023: 632-645 - [c85]Bingyu Shen, Tianyi Shan, Yuanyuan Zhou:
Improving Logging to Reduce Permission Over-Granting Mistakes. USENIX Security Symposium 2023: 409-426 - [c84]Bingyu Shen, Tianyi Shan, Yuanyuan Zhou:
Multiview: Finding Blind Spots in Access-Deny Issues Diagnosis. USENIX Security Symposium 2023: 7499-7516 - 2021
- [c83]Haochen Huang, Chengcheng Xiang, Li Zhong, Yuanyuan Zhou:
PYLIVE: On-the-Fly Code Change for Python-based Online Services. USENIX ATC 2021: 349-363 - [c82]Bingyu Shen, Lili Wei, Chengcheng Xiang, Yudong Wu, Mingyao Shen, Yuanyuan Zhou, Xinxin Jin:
Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model. USENIX Security Symposium 2021: 751-768 - 2020
- [j24]Remzi H. Arpaci-Dusseau, Yuanyuan (YY) Zhou:
Introduction to the Special Section on SOSP 2019. ACM Trans. Storage 16(2): 8:1 (2020) - [c81]Yudong Wu, Mingyao Shen, Yi-Hui Chen, Yuanyuan Zhou:
Tuning applications for efficient GPU offloading to in-memory processing. ICS 2020: 37:1-37:12 - [c80]Chengcheng Xiang, Haochen Huang, Andrew Yoo, Yuanyuan Zhou, Shankar Pasupathy:
PracExtractor: Extracting Configuration Good Practices from Manuals to Detect Server Misconfigurations. USENIX ATC 2020: 265-280
2010 – 2019
- 2019
- [c79]Chengcheng Xiang, Yudong Wu, Bingyu Shen, Mingyao Shen, Haochen Huang, Tianyin Xu, Yuanyuan Zhou, Cindy Moore, Xinxin Jin, Tianwei Sheng:
Towards Continuous Access Control Validation and Forensics. CCS 2019: 113-129 - 2018
- [c78]Xinxin Jin, William G. Griswold, Yuanyuan Zhou:
ANEL: robust mobile network programming using a declarative language. MOBILESoft@ICSE 2018: 202-213 - 2017
- [c77]Tianyin Xu, Han Min Naing, Le Lu, Yuanyuan Zhou:
How Do System Administrators Resolve Access-Denied Issues in the Real World? CHI 2017: 348-361 - [c76]Xu Zhao, Kirk Rodrigues, Yu Luo, Michael Stumm, Ding Yuan, Yuanyuan Zhou:
The Game of Twenty Questions: Do You Know Where to Log? HotOS 2017: 125-131 - [c75]Xu Zhao, Kirk Rodrigues, Yu Luo, Michael Stumm, Ding Yuan, Yuanyuan Zhou:
Log20: Fully Automated Optimal Placement of Log Printing Statements under Specified Overhead Threshold. SOSP 2017: 565-581 - [c74]Tianyin Xu, Xinxin Jin, Peng Huang, Yuanyuan Zhou, Shan Lu, Long Jin, Shankar Pasupathy:
Early Detection of Configuration Errors to Reduce Failure Damage. USENIX ATC 2017 - 2016
- [c73]Xinxin Jin, Peng Huang, Tianyin Xu, Yuanyuan Zhou:
NChecker: saving mobile app developers from network disruptions. EuroSys 2016: 22:1-22:16 - [c72]Peng Huang, Tianyin Xu, Xinxin Jin, Yuanyuan Zhou:
DefDroid: Towards a More Defensive Mobile OS Against Disruptive App Behavior. MobiSys 2016: 221-234 - [c71]Tianyin Xu, Xinxin Jin, Peng Huang, Yuanyuan Zhou, Shan Lu, Long Jin, Shankar Pasupathy:
Early Detection of Configuration Errors to Reduce Failure Damage. OSDI 2016: 619-634 - 2015
- [j23]Tianyin Xu, Yuanyuan Zhou:
Systems Approaches to Tackling Configuration Errors: A Survey. ACM Comput. Surv. 47(4): 70:1-70:41 (2015) - [j22]Lucas Francisco Wanner, Liangzhen Lai, Abbas Rahimi, Mark Gottscho, Pietro Mercati, Chu-Hsiang Huang, Frederic Sala, Yuvraj Agarwal, Lara Dolecek, Nikil D. Dutt, Puneet Gupta, Rajesh K. Gupta, Ranjit Jhala, Rakesh Kumar, Sorin Lerner, Subhasish Mitra, Alexandru Nicolau, Tajana Simunic Rosing, Mani B. Srivastava, Steven Swanson, Dennis Sylvester, Yuanyuan Zhou:
NSF expedition on variability-aware software: Recent results and contributions. it Inf. Technol. 57(3): 181-198 (2015) - [c70]Peng Huang, William J. Bolosky, Abhishek Singh, Yuanyuan Zhou:
ConfValley: a systematic configuration validation framework for cloud services. EuroSys 2015: 19:1-19:16 - [c69]Xinxin Jin, Soyeon Park, Tianwei Sheng, Rishan Chen, Zhiyong Shan, Yuanyuan Zhou:
FTXen: Making hypervisor resilient to hardware faults on relaxed cores. HPCA 2015: 451-462 - [c68]Tianyin Xu, Long Jin, Xuepeng Fan, Yuanyuan Zhou, Shankar Pasupathy, Rukma Talwadker:
Hey, you have given me too many knobs!: understanding and dealing with over-designed configuration in system software. ESEC/SIGSOFT FSE 2015: 307-319 - [c67]Margo I. Seltzer, Mark Miller, David Mazières, Yuanyuan Zhou:
Is achieving security a hopeless quest? SOSP History Day 2015: 13:1 - 2014
- [j21]Lin Tan, Chen Liu, Zhenmin Li, Xuanhui Wang, Yuanyuan Zhou, ChengXiang Zhai:
Bug characteristics in open source software. Empir. Softw. Eng. 19(6): 1665-1705 (2014) - [c66]Jiaqi Zhang, Lakshminarayanan Renganarayana, Xiaolan Zhang, Niyu Ge, Vasanth Bala, Tianyin Xu, Yuanyuan Zhou:
EnCore: exploiting system environment and correlation information for misconfiguration detection. ASPLOS 2014: 687-700 - [c65]Peng Huang, Xiao Ma, Dongcai Shen, Yuanyuan Zhou:
Performance regression testing target prioritization via performance risk analysis. ICSE 2014: 60-71 - 2013
- [c64]Michael Mihn-Jong Lee, Indrajit Roy, Alvin AuYoung, Vanish Talwar, K. R. Jayaram, Yuanyuan Zhou:
Views and Transactional Storage for Large Graphs. Middleware 2013: 287-306 - [c63]Xiao Ma, Peng Huang, Xinxin Jin, Pei Wang, Soyeon Park, Dongcai Shen, Yuanyuan Zhou, Lawrence K. Saul, Geoffrey M. Voelker:
eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones. NSDI 2013: 57-70 - [c62]Tianyin Xu, Jiaqi Zhang, Peng Huang, Jing Zheng, Tianwei Sheng, Ding Yuan, Yuanyuan Zhou, Shankar Pasupathy:
Do not blame users for misconfigurations. SOSP 2013: 244-259 - [e2]Keith A. Smith, Yuanyuan Zhou:
Proceedings of the 11th USENIX conference on File and Storage Technologies, FAST 2013, San Jose, CA, USA, February 12-15, 2013. USENIX 2013 [contents] - 2012
- [j20]Ding Yuan, Jing Zheng, Soyeon Park, Yuanyuan Zhou, Stefan Savage:
Improving Software Diagnosability via Log Enhancement. ACM Trans. Comput. Syst. 30(1): 4:1-4:28 (2012) - [j19]Shan Lu, Soyeon Park, Yuanyuan Zhou:
Detecting Concurrency Bugs from the Perspectives of Synchronization Intentions. IEEE Trans. Parallel Distributed Syst. 23(6): 1060-1072 (2012) - [j18]Shan Lu, Soyeon Park, Yuanyuan Zhou:
Finding Atomicity-Violation Bugs through Unserializable Interleaving Testing. IEEE Trans. Software Eng. 38(4): 844-860 (2012) - [c61]Ding Yuan, Soyeon Park, Yuanyuan Zhou:
Characterizing logging practices in open-source software. ICSE 2012: 102-112 - [c60]Ding Yuan, Soyeon Park, Peng Huang, Yang Liu, Michael Mihn-Jong Lee, Xiaoming Tang, Yuanyuan Zhou, Stefan Savage:
Be Conservative: Enhancing Failure Diagnosis with Proactive Logging. OSDI 2012: 293-306 - 2011
- [c59]Ding Yuan, Jing Zheng, Soyeon Park, Yuanyuan Zhou, Stefan Savage:
Improving software diagnosability via log enhancement. ASPLOS 2011: 3-14 - [c58]Lin Tan, Yuanyuan Zhou, Yoann Padioleau:
aComment: mining annotations from comments and code to detect interrupt related concurrency bugs. ICSE 2011: 11-20 - [c57]Jiaqi Zhang, Weiwei Xiong, Yang Liu, Soyeon Park, Yuanyuan Zhou, Zhiqiang Ma:
ATDetector: improving the accuracy of a commercial data race detector by identifying address transfer. MICRO 2011: 206-215 - [c56]Zuoning Yin, Ding Yuan, Yuanyuan Zhou, Shankar Pasupathy, Lakshmi N. Bairavasundaram:
How do fixes become bugs? SIGSOFT FSE 2011: 26-36 - [c55]Zuoning Yin, Xiao Ma, Jing Zheng, Yuanyuan Zhou, Lakshmi N. Bairavasundaram, Shankar Pasupathy:
An empirical study on configuration errors in commercial and open source systems. SOSP 2011: 159-172 - 2010
- [c54]Ding Yuan, Haohui Mai, Weiwei Xiong, Lin Tan, Yuanyuan Zhou, Shankar Pasupathy:
SherLog: error diagnosis by connecting clues from run-time logs. ASPLOS 2010: 143-154 - [c53]Yao Shi, Soyeon Park, Zuoning Yin, Shan Lu, Yuanyuan Zhou, Wenguang Chen, Weimin Zheng:
Do I use the wrong definition?: DeFuse: definition-use invariants for detecting concurrency and sequential bugs. OOPSLA 2010: 160-174 - [c52]Weiwei Xiong, Soyeon Park, Jiaqi Zhang, Yuanyuan Zhou, Zhiqiang Ma:
Ad Hoc Synchronization Considered Harmful. OSDI 2010: 163-176
2000 – 2009
- 2009
- [j17]Weihang Jiang, Chongfeng Hu, Shankar Pasupathy, Arkady Kanevsky, Yuanyuan Zhou:
Storage System Problem Troubleshooting andSystem Logs. login Usenix Mag. 34(3) (2009) - [c51]Soyeon Park, Shan Lu, Yuanyuan Zhou:
CTrigger: exposing atomicity violation bugs from their hiding places. ASPLOS 2009: 25-36 - [c50]Joseph A. Tucek, Weiwei Xiong, Yuanyuan Zhou:
Efficient online validation with delta execution. ASPLOS 2009: 193-204 - [c49]Zhe Zhang, Amit Kulkarni, Xiaosong Ma, Yuanyuan Zhou:
Memory resource allocation for file system prefetching: from a supply chain management perspective. EuroSys 2009: 75-88 - [c48]Weihang Jiang, Chongfeng Hu, Shankar Pasupathy, Arkady Kanevsky, Zhenmin Li, Yuanyuan Zhou:
Understanding Customer Problem Troubleshooting from Storage System Logs. FAST 2009: 43-56 - [c47]Yoann Padioleau, Lin Tan, Yuanyuan Zhou:
Listening to programmers - Taxonomies and characteristics of comments in operating system code. ICSE 2009: 331-341 - [c46]Soyeon Park, Yuanyuan Zhou, Weiwei Xiong, Zuoning Yin, Rini Kaushik, Kyu H. Lee, Shan Lu:
PRES: probabilistic replay with execution sketching on multiprocessors. SOSP 2009: 177-192 - 2008
- [j16]Weihang Jiang, Chongfeng Hu, Yuanyuan Zhou, Arkady Kanevsky:
Are disks the dominant contributor for storage failures - A comprehensive study of storage subsystem failure characteristics. ACM Trans. Storage 4(3): 7:1-7:25 (2008) - [j15]Weihang Jiang, Chongfeng Hu, Yuanyuan Zhou, Arkady Kanevsky:
Don't Blame Disks for Every Storage Subsystem Failure. login Usenix Mag. 33(3) (2008) - [c45]Man-Lap Li, Pradeep Ramachandran, Swarup Kumar Sahoo, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou:
Understanding the propagation of hard errors to software and implications for resilient system design. ASPLOS 2008: 265-276 - [c44]Shan Lu, Soyeon Park, Eunsoo Seo, Yuanyuan Zhou:
Learning from mistakes: a comprehensive study on real world concurrency bug characteristics. ASPLOS 2008: 329-339 - [c43]Man-Lap Li, Pradeep Ramachandran, Swarup Kumar Sahoo, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou:
Trace-based microarchitecture-level diagnosis of permanent hardware faults. DSN 2008: 22-31 - [c42]Swarup Kumar Sahoo, Man-Lap Li, Pradeep Ramachandran, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou:
Using likely program invariants to detect hardware errors. DSN 2008: 70-79 - [c41]Weihang Jiang, Chongfeng Hu, Yuanyuan Zhou, Arkady Kanevsky:
Are Disks the Dominant Contributor for Storage Failures? A Comprehensive Study of Storage Subsystem Failure Characteristics. FAST 2008: 111-125 - [c40]Zhe Zhang, Kyuhyung Lee, Xiaosong Ma, Yuanyuan Zhou:
PFC: Transparent Optimization of Existing Prefetching Strategies for Multi-Level Storage Systems. ICDCS 2008: 740-751 - [c39]Michael Jiang, Jing Zhang, Hong Zhao, Yuanyuan Zhou:
Maintaining software product lines - an industrial practice. ICSM 2008: 444-447 - [c38]Samuel T. King, Joseph A. Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou:
Designing and Implementing Malicious Hardware. LEET 2008 - [c37]Ding Yuan, Kyuhyung Lee, Hong Cheng, Gopal Krishna, Zhenmin Li, Xiao Ma, Yuanyuan Zhou, Jiawei Han:
CISpan: Comprehensive Incremental Mining Algorithms of Closed Sequential Patterns for Multi-Versional Software Mining. SDM 2008: 84-95 - [c36]Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou:
AutoISES: Automatically Inferring Security Specification and Detecting Violations. USENIX Security Symposium 2008: 379-394 - [c35]Michael Jiang, Jing Zhang, Hong Zhao, Yuanyuan Zhou:
Enhancing Software Product Line Maintenance with Source Code Mining. WASA 2008: 538-547 - 2007
- [j14]Yan Zhang, Zhifeng Chen, Yuanyuan Zhou:
Efficient Execution of Multiple Queries on Deep Memory Hierarchy. J. Comput. Sci. Technol. 22(2): 273-279 (2007) - [j13]Shan Lu, Joseph A. Tucek, Feng Qin, Yuanyuan Zhou:
AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants. IEEE Micro 27(1): 26-35 (2007) - [j12]Xiaodong Li, Ritu Gupta, Sarita V. Adve, Yuanyuan Zhou:
Cross-component energy management: Joint adaptation of processor and memory. ACM Trans. Archit. Code Optim. 4(3): 14 (2007) - [j11]Feng Qin, Joseph A. Tucek, Yuanyuan Zhou, Jagadeesan Sundaresan:
Rx: Treating bugs as allergies - a safe method to survive software failures. ACM Trans. Comput. Syst. 25(3): 7 (2007) - [c34]Joseph A. Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, Dawn Xiaodong Song:
Sweeper: a lightweight end-to-end system for defending against fast worms. EuroSys 2007: 115-128 - [c33]Lin Tan, Ding Yuan, Yuanyuan Zhou:
HotComments: How to Make Program Comments More Useful? HotOS 2007 - [c32]Soyeon Park, Weihang Jiang, Yuanyuan Zhou, Sarita V. Adve:
Managing energy-performance tradeoffs for multithreaded applications on multiprocessor architectures. SIGMETRICS 2007: 169-180 - [c31]Shan Lu, Weihang Jiang, Yuanyuan Zhou:
A study of interleaving coverage criteria. ESEC/SIGSOFT FSE 2007: 533-536 - [c30]Shan Lu, Soyeon Park, Chongfeng Hu, Xiao Ma, Weihang Jiang, Zhenmin Li, Raluca A. Popa, Yuanyuan Zhou:
MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs. SOSP 2007: 103-116 - [c29]Joseph A. Tucek, Shan Lu, Chengdu Huang, Spiros Xanthos, Yuanyuan Zhou:
Triage: diagnosing production run failures at the user's site. SOSP 2007: 131-144 - [c28]Lin Tan, Ding Yuan, Gopal Krishna, Yuanyuan Zhou:
/*icomment: bugs or bad comments?*/. SOSP 2007: 145-158 - 2006
- [j10]Zhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou:
CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. IEEE Trans. Software Eng. 32(3): 176-192 (2006) - [c27]Zhenmin Li, Lin Tan, Xuanhui Wang, Shan Lu, Yuanyuan Zhou, Chengxiang Zhai:
Have things changed now?: an empirical study of bug characteristics in modern open source software. ASID 2006: 25-33 - [c26]Shan Lu, Joseph A. Tucek, Feng Qin, Yuanyuan Zhou:
AVIO: detecting atomicity violations via access interleaving invariants. ASPLOS 2006: 37-48 - [c25]Joseph A. Tucek, Shan Lu, Chengdu Huang, Spiros Xanthos, Yuanyuan Zhou:
Automatic On-line Failure Diagnosis at the End-User Site. HotDep 2006 - [c24]Vivek Pandey, Weihang Jiang, Yuanyuan Zhou, Ricardo Bianchini:
DMA-aware memory energy management. HPCA 2006: 133-144 - [c23]Shan Lu, Pin Zhou, Wei Liu, Yuanyuan Zhou, Josep Torrellas:
PathExpander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection. MICRO 2006: 38-52 - [c22]Yan Zhang, Zhifeng Chen, Yuanyuan Zhou:
MiniTasking: Improving Cache Performance for Multiple Query Workloads. WAIM 2006: 287-299 - 2005
- [j9]Yuanyuan Zhou, Pin Zhou, Feng Qin, Wei Liu, Josep Torrellas:
Efficient and flexible architectural support for dynamic monitoring. ACM Trans. Archit. Code Optim. 2(1): 3-33 (2005) - [j8]Qingbo Zhu, Yuanyuan Zhou:
Power-Aware Storage Cache Management. IEEE Trans. Computers 54(5): 587-602 (2005) - [j7]Zhenmin Li, Zhifeng Chen, Yuanyuan Zhou:
Mining block correlations to improve storage performance. ACM Trans. Storage 1(2): 213-245 (2005) - [j6]Xiaodong Li, Zhenmin Li, Yuanyuan Zhou, Sarita V. Adve:
Performance directed energy management for main memory and disks. ACM Trans. Storage 1(3): 346-380 (2005) - [j5]Yuanyuan Zhou, Angelos Bilas, Suresh Jagannathan, Dimitrios Xinidis, Cezary Dubnicki, Kai Li:
VI-Attached Database Storage. IEEE Trans. Parallel Distributed Syst. 16(1): 35-50 (2005) - [c21]Feng Qin, Joseph A. Tucek, Yuanyuan Zhou:
Treating Bugs as Allergies: A Safe Method for Surviving Software Failures. HotOS 2005 - [c20]Feng Qin, Shan Lu, Yuanyuan Zhou:
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs. HPCA 2005: 291-302 - [c19]Zhifeng Chen, Yan Zhang, Yuanyuan Zhou, Heidi Scott, Berni Schiefer:
Empirical evaluation of multi-level buffer cache collaboration for storage systems. SIGMETRICS 2005: 145-156 - [c18]Qingbo Zhu, Zhifeng Chen, Lin Tan, Yuanyuan Zhou, Kimberly Keeton, John Wilkes:
Hibernator: helping disk arrays sleep through the winter. SOSP 2005: 177-190 - [c17]Feng Qin, Joseph A. Tucek, Jagadeesan Sundaresan, Yuanyuan Zhou:
Rx: treating bugs as allergies - a safe method to survive software failures. SOSP 2005: 235-248 - [e1]Vijay Atluri, Pierangela Samarati, William Yurcik, Larry Brumbaugh, Yuanyuan Zhou:
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005. ACM 2005, ISBN 1-59593-233-X [contents] - 2004
- [j4]Xiaodong Li, Zhenmin Li, Pin Zhou, Yuanyuan Zhou, Sarita V. Adve, Sanjeev Kumar:
Performance-Directed Energy Management for Storage Systems. IEEE Micro 24(6): 38-49 (2004) - [j3]Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, Josep Torrellas:
iWatcher: Simple, General Architectural Support for Software Debugging. IEEE Micro 24(6): 50-56 (2004) - [j2]Yuanyuan Zhou, Zhifeng Chen, Kai Li:
Second-Level Buffer Cache Management. IEEE Trans. Parallel Distributed Syst. 15(6): 505-519 (2004) - [c16]Xiaodong Li, Zhenmin Li, Francis M. David, Pin Zhou, Yuanyuan Zhou, Sarita V. Adve, Sanjeev Kumar:
Performance directed energy management for main memory and disks. ASPLOS 2004: 271-283 - [c15]Zhenmin Li, Zhifeng Chen, Sudarshan M. Srinivasan, Yuanyuan Zhou:
C-Miner: Mining Block Correlations in Storage Systems. FAST 2004: 173-186 - [c14]Qingbo Zhu, Francis M. David, Christo Frank Devaraj, Zhenmin Li, Yuanyuan Zhou, Pei Cao:
Reducing Energy Consumption of Disk Storage Using Power-Aware Cache Management. HPCA 2004: 118-129 - [c13]Qingbo Zhu, Asim Shankar, Yuanyuan Zhou:
PB-LRU: a self-tuning power aware storage cache replacement algorithm for conserving disk energy. ICS 2004: 79-88 - [c12]Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, Josep Torrellas:
iWatcher: Efficient Architectural Support for Software Debugging. ISCA 2004: 224-237 - [c11]Pin Zhou, Wei Liu, Long Fei, Shan Lu, Feng Qin, Yuanyuan Zhou, Samuel P. Midkiff, Josep Torrellas:
AccMon: Automatically Detecting Memory-Related Bugs via Program Counter-Based Invariants. MICRO 2004: 269-280 - [c10]Zhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou:
CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code. OSDI 2004: 289-302 - 2003
- [c9]Cristina L. Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, Kenneth E. Rowe:
Log Correlation for Intrusion Detection: A Proof of Concept. ACSAC 2003: 255-264 - [c8]Zhifeng Chen, Yuanyuan Zhou, Kai Li:
Eviction-based Cache Placement for Storage Caches. USENIX ATC, General Track 2003: 269-281 - 2002
- [j1]Marianne Winslett, Kevin Chen-Chuan Chang, AnHai Doan, Jiawei Han, ChengXiang Zhai, Yuanyuan Zhou:
Database Research at the University of Illinois at Urbana-Champaign. SIGMOD Rec. 31(3): 97-102 (2002) - [c7]Yuanyuan Zhou, Kai Li, Angelos Bilas, Suresh Jagannathan, Cezary Dubnicki, James Philbin:
Experiences with VI Communication for Database Storage. ISCA 2002: 257-268 - 2001
- [c6]Yuanyuan Zhou, James Philbin, Kai Li:
The Multi-Queue Replacement Algorithm for Second Level Buffer Caches. USENIX ATC, General Track 2001: 91-104
1990 – 1999
- 1999
- [c5]Angelos Bilas, Dongming Jiang, Yuanyuan Zhou, Jaswinder Pal Singh:
Limits to the Performance of Software Shared Memory: A Layered Approach. HPCA 1999: 193-202 - [c4]Yuanyuan Zhou, Peter M. Chen, Kai Li:
Fast cluster failover using virtual memory-mapped communication. International Conference on Supercomputing 1999: 373-382 - [c3]Yuanyuan Zhou, Limin Wang, Douglas W. Clark, Kai Li:
Thread Scheduling for Out-of-core Applications with Memory Server on Multicomputers. IOPADS 1999: 57-67 - 1997
- [c2]Yuanyuan Zhou, Liviu Iftode, Jaswinder Pal Singh, Kai Li, Brian R. Toonen, Ioannis Schoinas, Mark D. Hill, David A. Wood:
Relaxed Consistency and Coherence Granularity in DSM Systems: A Performance Evaluation. PPoPP 1997: 193-205 - 1996
- [c1]Yuanyuan Zhou, Liviu Iftode, Kai Li:
Performance Evaluation of Two Home-Based Lazy Release Consistency Protocols for Shared Virtual Memory Systems. OSDI 1996: 75-88