dblp.uni-trier.dewww.uni-trier.de

Yuanyuan Zhou

List of publications from the DBLP Bibliography Server - FAQ
Coauthor Index - Ask others: ACM DL/Guide - CiteSeer - CSB - Google - MSN - Yahoo

2009
76EEJoseph Tucek, Weiwei Xiong, Yuanyuan Zhou: Efficient online validation with delta execution. ASPLOS 2009: 193-204
75EESoyeon Park, Shan Lu, Yuanyuan Zhou: CTrigger: exposing atomicity violation bugs from their hiding places. ASPLOS 2009: 25-36
74EEWeihang Jiang, Chongfeng Hu, Shankar Pasupathy, Arkady Kanevsky, Zhenmin Li, Yuanyuan Zhou: Understanding Customer Problem Troubleshooting from Storage System Logs. FAST 2009: 43-56
2008
73 Rebecca Isaacs, Yuanyuan Zhou: 2008 USENIX Annual Technical Conference, Boston, MA, USA, June 22-27, 2008. Proceedings USENIX Association 2008
72EEMan-Lap Li, Pradeep Ramachandran, Swarup Kumar Sahoo, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou: Understanding the propagation of hard errors to software and implications for resilient system design. ASPLOS 2008: 265-276
71EEShan Lu, Soyeon Park, Eunsoo Seo, Yuanyuan Zhou: Learning from mistakes: a comprehensive study on real world concurrency bug characteristics. ASPLOS 2008: 329-339
70EEMan-Lap Li, Pradeep Ramachandran, Swarup Kumar Sahoo, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou: Trace-based microarchitecture-level diagnosis of permanent hardware faults. DSN 2008: 22-31
69EESwarup Kumar Sahoo, Man-Lap Li, Pradeep Ramachandran, Sarita V. Adve, Vikram S. Adve, Yuanyuan Zhou: Using likely program invariants to detect hardware errors. DSN 2008: 70-79
68EEWeihang Jiang, Chongfeng Hu, Yuanyuan Zhou, Arkady Kanevsky: Are Disks the Dominant Contributor for Storage Failures? A Comprehensive Study of Storage Subsystem Failure Characteristics. FAST 2008: 111-125
67EEZhe Zhang, Kyuhyung Lee, Xiaosong Ma, Yuanyuan Zhou: PFC: Transparent Optimization of Existing Prefetching Strategies for Multi-Level Storage Systems. ICDCS 2008: 740-751
66EEMichael Jiang, Jing Zhang, Hong Zhao, Yuanyuan Zhou: Maintaining software product lines - an industrial practice. ICSM 2008: 444-447
65EESamuel T. King, Joseph Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou: Designing and Implementing Malicious Hardware. LEET 2008
64EEDing Yuan, Kyuhyung Lee, Hong Cheng, Gopal Krishna, Zhenmin Li, Xiao Ma, Yuanyuan Zhou, Jiawei Han: CISpan: Comprehensive Incremental Mining Algorithms of Closed Sequential Patterns for Multi-Versional Software Mining. SDM 2008: 84-95
63EELin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou: AutoISES: Automatically Inferring Security Specification and Detecting Violations. USENIX Security Symposium 2008: 379-394
62EEMichael Jiang, Jing Zhang, Hong Zhao, Yuanyuan Zhou: Enhancing Software Product Line Maintenance with Source Code Mining. WASA 2008: 538-547
61EEWeihang Jiang, Chongfeng Hu, Yuanyuan Zhou, Arkady Kanevsky: Are disks the dominant contributor for storage failures? A comprehensive study of storage subsystem failure characteristics. TOS 4(3): (2008)
2007
60EEShan Lu, Weihang Jiang, Yuanyuan Zhou: A study of interleaving coverage criteria. ESEC/SIGSOFT FSE 2007: 533-536
59EEShan Lu, Weihang Jiang, Yuanyuan Zhou: A study of interleaving coverage criteria. ESEC/SIGSOFT FSE (Companion) 2007: 533-536
58EEJoseph Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, Dawn Xiaodong Song: Sweeper: a lightweight end-to-end system for defending against fast worms. EuroSys 2007: 115-128
57EEMuralidhar Medidi, Yuanyuan Zhou: Extending Lifetime with Differential Duty Cycles in Wireless Sensor Networks. GLOBECOM 2007: 1033-1037
56EEPin Zhou, Radu Teodorescu, Yuanyuan Zhou: HARD: Hardware-Assisted Lockset-based Race Detection. HPCA 2007: 121-132
55EEYuanyuan Zhou, Muralidhar Medidi: Energy-efficient Contention-Resilient Medium Access for Wireless Sensor Networks. ICC 2007: 3178-3183
54EEYuanyuan Zhou, Muralidhar Medidi: An Energy-Aware Multi-Hop Tree Scatternet for Bluetooth Networks. ICC 2007: 5564-5569
53EEYuanyuan Zhou, Muralidhar Medidi: Sleep-based Topology Control for Wakeup Scheduling in Wireless Sensor Networks. SECON 2007: 304-313
52EESoyeon Park, Weihang Jiang, Yuanyuan Zhou, Sarita V. Adve: Managing energy-performance tradeoffs for multithreaded applications on multiprocessor architectures. SIGMETRICS 2007: 169-180
51EEShan Lu, Soyeon Park, Chongfeng Hu, Xiao Ma, Weihang Jiang, Zhenmin Li, Raluca A. Popa, Yuanyuan Zhou: MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs. SOSP 2007: 103-116
50EEJoseph Tucek, Shan Lu, Chengdu Huang, Spiros Xanthos, Yuanyuan Zhou: Triage: diagnosing production run failures at the user's site. SOSP 2007: 131-144
49EELin Tan, Ding Yuan, Gopal Krishna, Yuanyuan Zhou: /*icomment: bugs or bad comments?*/. SOSP 2007: 145-158
48EEFeng Qin, Joseph Tucek, Yuanyuan Zhou, Jagadeesan Sundaresan: Rx: Treating bugs as allergies—a safe method to survive software failures. ACM Trans. Comput. Syst. 25(3): (2007)
47EEShan Lu, Joseph Tucek, Feng Qin, Yuanyuan Zhou: AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants. IEEE Micro 27(1): 26-35 (2007)
46EEYan Zhang, Zhifeng Chen, Yuanyuan Zhou: Efficient Execution of Multiple Queries on Deep Memory Hierarchy. J. Comput. Sci. Technol. 22(2): 273-279 (2007)
45EEXiaodong Li, Ritu Gupta, Sarita V. Adve, Yuanyuan Zhou: Cross-component energy management: Joint adaptation of processor and memory. TACO 4(3): (2007)
2006
44EEZhenmin Li, Lin Tan, Xuanhui Wang, Shan Lu, Yuanyuan Zhou, Chengxiang Zhai: Have things changed now?: an empirical study of bug characteristics in modern open source software. ASID 2006: 25-33
43EEShan Lu, Joseph Tucek, Feng Qin, Yuanyuan Zhou: AVIO: detecting atomicity violations via access interleaving invariants. ASPLOS 2006: 37-48
42EEVivek Pandey, Weihang Jiang, Yuanyuan Zhou, Ricardo Bianchini: DMA-aware memory energy management. HPCA 2006: 133-144
41EEMuralidhar Medidi, Roger A. Slaaen, Yuanyuan Zhou, Christopher J. Mallery, Sirisha Medidi: Scalable Localization in Wireless Sensor Networks. HiPC 2006: 522-533
40EEMuralidhar Medidi, Yuanyuan Zhou: Maintaining an energy-efficient Bluetooth scatternet. IPCCC 2006
39EEFeng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yuanyuan Zhou, Youfeng Wu: LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks. MICRO 2006: 135-148
38EEShan Lu, Pin Zhou, Wei Liu, Yuanyuan Zhou, Josep Torrellas: PathExpander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection. MICRO 2006: 38-52
37EEYan Zhang, Zhifeng Chen, Yuanyuan Zhou: MiniTasking: Improving Cache Performance for Multiple Query Workloads. WAIM 2006: 287-299
36EEZhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou: CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. IEEE Trans. Software Eng. 32(3): 176-192 (2006)
2005
35 Vijay Atluri, Pierangela Samarati, William Yurcik, Larry Brumbaugh, Yuanyuan Zhou: Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005 ACM 2005
34EEZhenmin Li, Yuanyuan Zhou: PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code. ESEC/SIGSOFT FSE 2005: 306-315
33EEFeng Qin, Shan Lu, Yuanyuan Zhou: SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs. HPCA 2005: 291-302
32EESmruti R. Sarangi, Wei Liu, Yuanyuan Zhou: ReSlice: Selective Re-Execution of Long-Retired Misspeculated Instructions Using Forward Slicing. MICRO 2005: 257-270
31EEZhifeng Chen, Yan Zhang, Yuanyuan Zhou, Heidi Scott, Berni Schiefer: Empirical evaluation of multi-level buffer cache collaboration for storage systems. SIGMETRICS 2005: 145-156
30EEQingbo Zhu, Zhifeng Chen, Lin Tan, Yuanyuan Zhou, Kimberly Keeton, John Wilkes: Hibernator: helping disk arrays sleep through the winter. SOSP 2005: 177-190
29EEFeng Qin, Joseph Tucek, Jagadeesan Sundaresan, Yuanyuan Zhou: Rx: treating bugs as allergies - a safe method to survive software failures. SOSP 2005: 235-248
28EEQingbo Zhu, Yuanyuan Zhou: Power-Aware Storage Cache Management. IEEE Trans. Computers 54(5): 587-602 (2005)
27EEYuanyuan Zhou, Angelos Bilas, Suresh Jagannathan, Dimitrios Xinidis, Cezary Dubnicki, Kai Li: VI-Attached Database Storage. IEEE Trans. Parallel Distrib. Syst. 16(1): 35-50 (2005)
26EEYuanyuan Zhou, Pin Zhou, Feng Qin, Wei Liu, Josep Torrellas: Efficient and flexible architectural support for dynamic monitoring. TACO 2(1): 3-33 (2005)
25EEZhenmin Li, Zhifeng Chen, Yuanyuan Zhou: Mining block correlations to improve storage performance. TOS 1(2): 213-245 (2005)
24EEXiaodong Li, Zhenmin Li, Yuanyuan Zhou, Sarita V. Adve: Performance directed energy management for main memory and disks. TOS 1(3): 346-380 (2005)
2004
23EEPin Zhou, Vivek Pandey, Jagadeesan Sundaresan, Anand Raghuraman, Yuanyuan Zhou, Sanjeev Kumar: Dynamic tracking of page miss ratio curve for memory management. ASPLOS 2004: 177-188
22EEXiaodong Li, Zhenmin Li, Francis M. David, Pin Zhou, Yuanyuan Zhou, Sarita V. Adve, Sanjeev Kumar: Performance directed energy management for main memory and disks. ASPLOS 2004: 271-283
21EEJin Liang, Klara Nahrstedt, Yuanyuan Zhou: Adaptive multi-resource prediction in distributed resource sharing environment. CCGRID 2004: 293-300
20EEZhenmin Li, Zhifeng Chen, Sudarshan M. Srinivasan, Yuanyuan Zhou: C-Miner: Mining Block Correlations in Storage Systems. FAST 2004: 173-186
19EEQingbo Zhu, Francis M. David, Christo F. Devaraj, Zhenmin Li, Yuanyuan Zhou, Pei Cao: Reducing Energy Consumption of Disk Storage Using Power-Aware Cache Management. HPCA 2004: 118-129
18EEQingbo Zhu, Asim Shankar, Yuanyuan Zhou: PB-LRU: a self-tuning power aware storage cache replacement algorithm for conserving disk energy. ICS 2004: 79-88
17EEPin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, Josep Torrellas: iWatcher: Efficient Architectural Support for Software Debugging. ISCA 2004: 224-237
16EEPin Zhou, Wei Liu, Long Fei, Shan Lu, Feng Qin, Yuanyuan Zhou, Samuel P. Midkiff, Josep Torrellas: AccMon: Automatically Detecting Memory-Related Bugs via Program Counter-Based Invariants. MICRO 2004: 269-280
15EEZhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou: CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code. OSDI 2004: 289-302
14EESudarshan M. Srinivasan, Srikanth Kandula, Christopher R. Andrews, Yuanyuan Zhou: Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software Debugging. USENIX Annual Technical Conference, General Track 2004: 29-44
13EEXiaodong Li, Zhenmin Li, Pin Zhou, Yuanyuan Zhou, Sarita V. Adve, Sanjeev Kumar: Performance-Directed Energy Management for Storage Systems. IEEE Micro 24(6): 38-49 (2004)
12EEPin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, Josep Torrellas: iWatcher: Simple, General Architectural Support for Software Debugging. IEEE Micro 24(6): 50-56 (2004)
11EEYuanyuan Zhou, Zhifeng Chen, Kai Li: Second-Level Buffer Cache Management. IEEE Trans. Parallel Distrib. Syst. 15(6): 505-519 (2004)
2003
10EECristina Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, Kenneth E. Rowe: Log Correlation for Intrusion Detection: A Proof of Concept. ACSAC 2003: 255-265
9EEZhifeng Chen, Yuanyuan Zhou, Kai Li: Eviction-based Cache Placement for Storage Caches. USENIX Annual Technical Conference, General Track 2003: 269-281
2002
8EEYuanyuan Zhou, Kai Li, Angelos Bilas, Suresh Jagannathan, Cezary Dubnicki, James Philbin: Experiences with VI Communication for Database Storage. ISCA 2002: 257-
7EEMarianne Winslett, Kevin Chen-Chuan Chang, AnHai Doan, Jiawei Han, ChengXiang Zhai, Yuanyuan Zhou: Database Research at the University of Illinois at Urbana-Champaign. SIGMOD Record 31(3): 97-102 (2002)
2001
6EEYuanyuan Zhou, James Philbin, Kai Li: The Multi-Queue Replacement Algorithm for Second Level Buffer Caches. USENIX Annual Technical Conference, General Track 2001: 91-104
1999
5EEAngelos Bilas, Dongming Jiang, Yuanyuan Zhou, Jaswinder Pal Singh: Limits to the Performance of Software Shared Memory: A Layered Approach. HPCA 1999: 193-
4EEYuanyuan Zhou, Limin Wang, Douglas W. Clark, Kai Li: Thread Scheduling for Out-of-core Applications with Memory Server on Multicomputers. IOPADS 1999: 57-67
3EEYuanyuan Zhou, Peter M. Chen, Kai Li: Fast cluster failover using virtual memory-mapped communication. International Conference on Supercomputing 1999: 373-382
1997
2 Yuanyuan Zhou, Liviu Iftode, Jaswinder Pal Singh, Kai Li, Brian R. Toonen, Ioannis Schoinas, Mark D. Hill, David A. Wood: Relaxed Consistency and Coherence Granularity in DSM Systems: A Performance Evaluation. PPOPP 1997: 193-205
1996
1 Yuanyuan Zhou, Liviu Iftode, Kai Li: Performance Evaluation of Two Home-Based Lazy Release Consistency Protocols for Shared Virtual Memory Systems. OSDI 1996: 75-88

Coauthor Index

1Cristina Abad [10]
2Sarita V. Adve [13] [22] [24] [45] [52] [69] [70] [72]
3Vikram S. Adve [69] [70] [72]
4Christopher R. Andrews [14]
5Vijayalakshmi Atluri (Vijay Atluri) [35]
6Ricardo Bianchini [42]
7Angelos Bilas [5] [8] [27]
8Larry Brumbaugh [35]
9David Brumley [58]
10Pei Cao [19]
11Kevin Chen-Chuan Chang [7]
12Peter M. Chen [3]
13Zhifeng Chen [9] [11] [20] [25] [30] [31] [37] [46]
14Hong Cheng [64]
15Douglas W. Clark [4]
16Anthony Cozzie [65]
17Francis M. David [19] [22]
18Christo F. Devaraj [19]
19AnHai Doan [7]
20Cezary Dubnicki [8] [27]
21Long Fei [16]
22Chris Grier [65]
23Ritu Gupta [45]
24Jiawei Han [7] [64]
25Mark D. Hill [2]
26Chongfeng Hu [51] [61] [68] [74]
27Chengdu Huang [50] [58]
28Liviu Iftode [1] [2]
29Rebecca Isaacs [73]
30Suresh Jagannathan [8] [27]
31Dongming Jiang [5]
32Michael Jiang [62] [66]
33Weihang Jiang [42] [51] [52] [59] [60] [61] [65] [68] [74]
34Srikanth Kandula [14]
35Arkady Kanevsky [61] [68] [74]
36Kimberly Keeton [30]
37Ho-Seop Kim [39]
38Samuel T. King [65]
39Gopal Krishna [49] [64]
40Sanjeev Kumar [13] [22] [23]
41Kyuhyung Lee [64] [67]
42Kai Li [1] [2] [3] [4] [6] [8] [9] [11] [27]
43Man-Lap Li [69] [70] [72]
44Xiaodong Li [13] [22] [24] [45]
45Zhenmin Li [13] [15] [19] [20] [22] [24] [25] [34] [36] [39] [44] [51] [64] [74]
46Jin Liang [21]
47Wei Liu [12] [16] [17] [26] [32] [38]
48Shan Lu [15] [16] [33] [36] [38] [43] [44] [47] [50] [51] [58] [59] [60] [71] [75]
49Xiao Ma [51] [63] [64]
50Xiaosong Ma [67]
51Christopher J. Mallery [41]
52Muralidhar Medidi [40] [41] [53] [54] [55] [57]
53Sirisha Medidi [41]
54Samuel P. Midkiff [16]
55Suvda Myagmar [15] [36]
56Klara Nahrstedt [21]
57James Newsome [58]
58Vivek Pandey [23] [42]
59Soyeon Park [51] [52] [71] [75]
60Shankar Pasupathy [74]
61James Philbin [6] [8]
62Raluca A. Popa [51]
63Feng Qin [12] [16] [17] [26] [29] [33] [39] [43] [47] [48]
64Anand Raghuraman [23]
65Pradeep Ramachandran [69] [70] [72]
66Kenneth E. Rowe [10]
67Swarup Kumar Sahoo [69] [70] [72]
68Pierangela Samarati [35]
69Smruti R. Sarangi [32]
70Berni Schiefer [31]
71Ioannis Schoinas [2]
72Heidi Scott [31]
73Cigdem Sengul [10]
74Eunsoo Seo [71]
75Asim Shankar [18]
76Jaswinder Pal Singh [2] [5]
77Roger A. Slaaen [41]
78Dawn Xiaodong Song [58]
79Sudarshan M. Srinivasan [14] [20]
80Jagadeesan Sundaresan [23] [29] [48]
81Lin Tan [30] [44] [49] [63]
82Jed Taylor [10]
83Radu Teodorescu [56]
84Brian R. Toonen [2]
85Josep Torrellas [12] [16] [17] [26] [38]
86Joseph Tucek [29] [43] [47] [48] [50] [58] [65] [76]
87Cheng Wang [39]
88Limin Wang [4]
89Xuanhui Wang [44]
90John Wilkes [30]
91Marianne Winslett [7]
92David A. Wood [2]
93Youfeng Wu [39]
94Spiros Xanthos [50] [58]
95Dimitrios Xinidis [27]
96Weiwei Xiong [63] [76]
97Ding Yuan [49] [64]
98William Yurcik [10] [35]
99ChengXiang Zhai (Chengxiang Zhai) [7] [44]
100Jing Zhang [62] [66]
101Xiaolan Zhang (Xiaolan (Catherine) Zhang) [63]
102Yan Zhang [31] [37] [46]
103Zhe Zhang [67]
104Hong Zhao [62] [66]
105Pin Zhou [12] [13] [16] [17] [22] [23] [26] [38] [56]
106Qingbo Zhu [18] [19] [28] [30]

Colors in the list of coauthors

Copyright © Sun May 17 03:24:02 2009 by Michael Ley (ley@uni-trier.de)