Yuanyuan Zhou
TitleCited byYear
CP-Miner: Finding copy-paste and related bugs in large-scale software code
Z Li, S Lu, S Myagmar, Y Zhou
IEEE Transactions on software Engineering 32 (3), 176-192, 2006
934*2006
Learning from mistakes: a comprehensive study on real world concurrency bug characteristics
S Lu, S Park, E Seo, Y Zhou
ACM SIGARCH Computer Architecture News 36 (1), 329-339, 2008
8802008
PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code
Z Li, Y Zhou
ACM SIGSOFT Software Engineering Notes 30 (5), 306-315, 2005
4782005
Lift: A low-overhead practical information flow tracking system for detecting security attacks
F Qin, C Wang, Z Li, H Kim, Y Zhou, Y Wu
2006 39th Annual IEEE/ACM International Symposium on Microarchitecture …, 2006
4492006
AVIO: detecting atomicity violations via access interleaving invariants
S Lu, J Tucek, F Qin, Y Zhou
ACM SIGOPS Operating Systems Review 40 (5), 37-48, 2006
4412006
The Multi-Queue Replacement Algorithm for Second Level Buffer Caches.
Y Zhou, J Philbin, K Li
USENIX Annual Technical Conference, General Track, 91-104, 2001
4112001
Rx: treating bugs as allergies---a safe method to survive software failures
F Qin, J Tucek, J Sundaresan, Y Zhou
Acm sigops operating systems review 39 (5), 235-248, 2005
4092005
Hibernator: helping disk arrays sleep through the winter
Q Zhu, Z Chen, L Tan, Y Zhou, K Keeton, J Wilkes
ACM SIGOPS Operating Systems Review 39 (5), 177-190, 2005
3932005
Flashback: A lightweight extension for rollback and deterministic replay for software debugging
SM Srinivasan, S Kandula, CR Andrews, Y Zhou
USENIX Annual Technical Conference, General Track, 29-44, 2004
3472004
Designing and Implementing Malicious Hardware.
ST King, J Tucek, A Cozzie, C Grier, W Jiang, Y Zhou
Leet 8, 1-8, 2008
3292008
CTrigger: exposing atomicity violation bugs from their hiding places
S Park, S Lu, Y Zhou
ACM SIGARCH Computer Architecture News 37 (1), 25-36, 2009
3082009
Performance evaluation of two home-based lazy release consistency protocols for shared virtual memory systems
Y Zhou, L Iftode, K Li
ACM SIGOPS Operating Systems Review 30 (si), 75-88, 1996
2881996
Reducing energy consumption of disk storage using power-aware cache management
Q Zhu, FM David, CF Devaraj, Z Li, Y Zhou, P Cao
10th International Symposium on High Performance Computer Architecture (HPCA …, 2004
2872004
Understanding the propagation of hard errors to software and implications for resilient system design
ML Li, P Ramachandran, SK Sahoo, SV Adve, VS Adve, Y Zhou
ACM SIGARCH Computer Architecture News 36 (1), 265-276, 2008
2742008
PRES: probabilistic replay with execution sketching on multiprocessors
S Park, Y Zhou, W Xiong, Z Yin, R Kaushik, KH Lee, S Lu
Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles …, 2009
2642009
Have things changed now?: an empirical study of bug characteristics in modern open source software
Z Li, L Tan, X Wang, S Lu, Y Zhou, C Zhai
Proceedings of the 1st workshop on Architectural and system support for …, 2006
2622006
Dynamic tracking of page miss ratio curve for memory management
P Zhou, V Pandey, J Sundaresan, A Raghuraman, Y Zhou, S Kumar
ACM SIGOPS Operating Systems Review 38 (5), 177-188, 2004
2572004
C-Miner: Mining Block Correlations in Storage Systems.
Z Li, Z Chen, SM Srinivasan, Y Zhou
FAST 4, 173-186, 2004
2352004
Bugbench: Benchmarks for evaluating bug detection tools
S Lu, Z Li, F Qin, L Tan, P Zhou, Y Zhou
Workshop on the evaluation of software defect detection tools 5, 2005
2232005
SherLog: error diagnosis by connecting clues from run-time logs
D Yuan, H Mai, W Xiong, L Tan, Y Zhou, S Pasupathy
ACM SIGARCH computer architecture news 38 (1), 143-154, 2010
2222010
The system can't perform the operation now. Try again later.
Articles 1–20