The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Yuanyuan Zhou: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Cristina Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, Kenneth E. Rowe
    Log Correlation for Intrusion Detection: A Proof of Concept. [Citation Graph (0, 0)][DBLP]
    ACSAC, 2003, pp:255-265 [Conf]
  2. Xiaodong Li, Zhenmin Li, Francis M. David, Pin Zhou, Yuanyuan Zhou, Sarita V. Adve, Sanjeev Kumar
    Performance directed energy management for main memory and disks. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 2004, pp:271-283 [Conf]
  3. Pin Zhou, Vivek Pandey, Jagadeesan Sundaresan, Anand Raghuraman, Yuanyuan Zhou, Sanjeev Kumar
    Dynamic tracking of page miss ratio curve for memory management. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 2004, pp:177-188 [Conf]
  4. Zhenmin Li, Lin Tan, Xuanhui Wang, Shan Lu, Yuanyuan Zhou, ChengXiang Zhai
    Have things changed now?: an empirical study of bug characteristics in modern open source software. [Citation Graph (0, 0)][DBLP]
    ASID, 2006, pp:25-33 [Conf]
  5. Shan Lu, Joseph Tucek, Feng Qin, Yuanyuan Zhou
    AVIO: detecting atomicity violations via access interleaving invariants. [Citation Graph (0, 0)][DBLP]
    ASPLOS, 2006, pp:37-48 [Conf]
  6. Jin Liang, Klara Nahrstedt, Yuanyuan Zhou
    Adaptive multi-resource prediction in distributed resource sharing environment. [Citation Graph (0, 0)][DBLP]
    CCGRID, 2004, pp:293-300 [Conf]
  7. Zhenmin Li, Zhifeng Chen, Sudarshan M. Srinivasan, Yuanyuan Zhou
    C-Miner: Mining Block Correlations in Storage Systems. [Citation Graph (0, 0)][DBLP]
    FAST, 2004, pp:173-186 [Conf]
  8. Muralidhar Medidi, Roger A. Slaaen, Yuanyuan Zhou, Christopher J. Mallery, Sirisha Medidi
    Scalable Localization in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP]
    HiPC, 2006, pp:522-533 [Conf]
  9. Angelos Bilas, Dongming Jiang, Yuanyuan Zhou, Jaswinder Pal Singh
    Limits to the Performance of Software Shared Memory: A Layered Approach. [Citation Graph (0, 0)][DBLP]
    HPCA, 1999, pp:193-0 [Conf]
  10. Feng Qin, Shan Lu, Yuanyuan Zhou
    SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs. [Citation Graph (0, 0)][DBLP]
    HPCA, 2005, pp:291-302 [Conf]
  11. Qingbo Zhu, Francis M. David, Christo F. Devaraj, Zhenmin Li, Yuanyuan Zhou, Pei Cao
    Reducing Energy Consumption of Disk Storage Using Power-Aware Cache Management. [Citation Graph (0, 0)][DBLP]
    HPCA, 2004, pp:118-129 [Conf]
  12. Yuanyuan Zhou, Peter M. Chen, Kai Li
    Fast cluster failover using virtual memory-mapped communication. [Citation Graph (0, 0)][DBLP]
    International Conference on Supercomputing, 1999, pp:373-382 [Conf]
  13. Qingbo Zhu, Asim Shankar, Yuanyuan Zhou
    PB-LRU: a self-tuning power aware storage cache replacement algorithm for conserving disk energy. [Citation Graph (0, 0)][DBLP]
    ICS, 2004, pp:79-88 [Conf]
  14. Yuanyuan Zhou, Limin Wang, Douglas W. Clark, Kai Li
    Thread Scheduling for Out-of-core Applications with Memory Server on Multicomputers. [Citation Graph (0, 0)][DBLP]
    IOPADS, 1999, pp:57-67 [Conf]
  15. Yuanyuan Zhou, Kai Li, Angelos Bilas, Suresh Jagannathan, Cezary Dubnicki, James Philbin
    Experiences with VI Communication for Database Storage. [Citation Graph (0, 0)][DBLP]
    ISCA, 2002, pp:257-0 [Conf]
  16. Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, Josep Torrellas
    iWatcher: Efficient Architectural Support for Software Debugging. [Citation Graph (0, 0)][DBLP]
    ISCA, 2004, pp:224-237 [Conf]
  17. Smruti R. Sarangi, Wei Liu, Yuanyuan Zhou
    ReSlice: Selective Re-Execution of Long-Retired Misspeculated Instructions Using Forward Slicing. [Citation Graph (0, 0)][DBLP]
    MICRO, 2005, pp:257-270 [Conf]
  18. Pin Zhou, Wei Liu, Long Fei, Shan Lu, Feng Qin, Yuanyuan Zhou, Samuel P. Midkiff, Josep Torrellas
    AccMon: Automatically Detecting Memory-Related Bugs via Program Counter-Based Invariants. [Citation Graph (0, 0)][DBLP]
    MICRO, 2004, pp:269-280 [Conf]
  19. Shan Lu, Pin Zhou, Wei Liu, Yuanyuan Zhou, Josep Torrellas
    PathExpander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection. [Citation Graph (0, 0)][DBLP]
    MICRO, 2006, pp:38-52 [Conf]
  20. Feng Qin, Cheng Wang, Zhenmin Li, Ho-Seop Kim, Yuanyuan Zhou, Youfeng Wu
    LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks. [Citation Graph (0, 0)][DBLP]
    MICRO, 2006, pp:135-148 [Conf]
  21. Zhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou
    CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code. [Citation Graph (0, 0)][DBLP]
    OSDI, 2004, pp:289-302 [Conf]
  22. Yuanyuan Zhou, Liviu Iftode, Kai Li
    Performance Evaluation of Two Home-Based Lazy Release Consistency Protocols for Shared Virtual Memory Systems. [Citation Graph (0, 0)][DBLP]
    OSDI, 1996, pp:75-88 [Conf]
  23. Yuanyuan Zhou, Liviu Iftode, Jaswinder Pal Singh, Kai Li, Brian R. Toonen, Ioannis Schoinas, Mark D. Hill, David A. Wood
    Relaxed Consistency and Coherence Granularity in DSM Systems: A Performance Evaluation. [Citation Graph (0, 0)][DBLP]
    PPOPP, 1997, pp:193-205 [Conf]
  24. Zhifeng Chen, Yan Zhang, Yuanyuan Zhou, Heidi Scott, Berni Schiefer
    Empirical evaluation of multi-level buffer cache collaboration for storage systems. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2005, pp:145-156 [Conf]
  25. Zhenmin Li, Yuanyuan Zhou
    PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code. [Citation Graph (0, 0)][DBLP]
    ESEC/SIGSOFT FSE, 2005, pp:306-315 [Conf]
  26. Feng Qin, Joseph Tucek, Jagadeesan Sundaresan, Yuanyuan Zhou
    Rx: treating bugs as allergies - a safe method to survive software failures. [Citation Graph (0, 0)][DBLP]
    SOSP, 2005, pp:235-248 [Conf]
  27. Qingbo Zhu, Zhifeng Chen, Lin Tan, Yuanyuan Zhou, Kimberly Keeton, John Wilkes
    Hibernator: helping disk arrays sleep through the winter. [Citation Graph (0, 0)][DBLP]
    SOSP, 2005, pp:177-190 [Conf]
  28. Zhifeng Chen, Yuanyuan Zhou, Kai Li
    Eviction-based Cache Placement for Storage Caches. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2003, pp:269-281 [Conf]
  29. Sudarshan M. Srinivasan, Srikanth Kandula, Christopher R. Andrews, Yuanyuan Zhou
    Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software Debugging. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2004, pp:29-44 [Conf]
  30. Yuanyuan Zhou, James Philbin, Kai Li
    The Multi-Queue Replacement Algorithm for Second Level Buffer Caches. [Citation Graph (0, 0)][DBLP]
    USENIX Annual Technical Conference, General Track, 2001, pp:91-104 [Conf]
  31. Yan Zhang, Zhifeng Chen, Yuanyuan Zhou
    MiniTasking: Improving Cache Performance for Multiple Query Workloads. [Citation Graph (0, 0)][DBLP]
    WAIM, 2006, pp:287-299 [Conf]
  32. Xiaodong Li, Zhenmin Li, Pin Zhou, Yuanyuan Zhou, Sarita V. Adve, Sanjeev Kumar
    Performance-Directed Energy Management for Storage Systems. [Citation Graph (0, 0)][DBLP]
    IEEE Micro, 2004, v:24, n:6, pp:38-49 [Journal]
  33. Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, Josep Torrellas
    iWatcher: Simple, General Architectural Support for Software Debugging. [Citation Graph (0, 0)][DBLP]
    IEEE Micro, 2004, v:24, n:6, pp:50-56 [Journal]
  34. Marianne Winslett, Kevin Chen-Chuan Chang, AnHai Doan, Jiawei Han, ChengXiang Zhai, Yuanyuan Zhou
    Database Research at the University of Illinois at Urbana-Champaign. [Citation Graph (0, 0)][DBLP]
    SIGMOD Record, 2002, v:31, n:3, pp:97-102 [Journal]
  35. Yuanyuan Zhou, Pin Zhou, Feng Qin, Wei Liu, Josep Torrellas
    Efficient and flexible architectural support for dynamic monitoring. [Citation Graph (0, 0)][DBLP]
    TACO, 2005, v:2, n:1, pp:3-33 [Journal]
  36. Qingbo Zhu, Yuanyuan Zhou
    Power-Aware Storage Cache Management. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Computers, 2005, v:54, n:5, pp:587-602 [Journal]
  37. Zhenmin Li, Zhifeng Chen, Yuanyuan Zhou
    Mining block correlations to improve storage performance. [Citation Graph (0, 0)][DBLP]
    TOS, 2005, v:1, n:2, pp:213-245 [Journal]
  38. Xiaodong Li, Zhenmin Li, Yuanyuan Zhou, Sarita V. Adve
    Performance directed energy management for main memory and disks. [Citation Graph (0, 0)][DBLP]
    TOS, 2005, v:1, n:3, pp:346-380 [Journal]
  39. Yuanyuan Zhou, Angelos Bilas, Suresh Jagannathan, Dimitrios Xinidis, Cezary Dubnicki, Kai Li
    VI-Attached Database Storage. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2005, v:16, n:1, pp:35-50 [Journal]
  40. Yuanyuan Zhou, Zhifeng Chen, Kai Li
    Second-Level Buffer Cache Management. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Parallel Distrib. Syst., 2004, v:15, n:6, pp:505-519 [Journal]
  41. Zhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou
    CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. [Citation Graph (0, 0)][DBLP]
    IEEE Trans. Software Eng., 2006, v:32, n:3, pp:176-192 [Journal]
  42. Soyeon Park, Weihang Jiang, Yuanyuan Zhou, Sarita V. Adve
    Managing energy-performance tradeoffs for multithreaded applications on multiprocessor architectures. [Citation Graph (0, 0)][DBLP]
    SIGMETRICS, 2007, pp:169-180 [Conf]
  43. Shan Lu, Weihang Jiang, Yuanyuan Zhou
    A study of interleaving coverage criteria. [Citation Graph (0, 0)][DBLP]
    ESEC/SIGSOFT FSE, 2007, pp:533-536 [Conf]
  44. Shan Lu, Soyeon Park, Chongfeng Hu, Xiao Ma, Weihang Jiang, Zhenmin Li, Raluca A. Popa, Yuanyuan Zhou
    MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs. [Citation Graph (0, 0)][DBLP]
    SOSP, 2007, pp:103-116 [Conf]
  45. Lin Tan, Ding Yuan, Gopal Krishna, Yuanyuan Zhou
    /*icomment: bugs or bad comments?*/. [Citation Graph (0, 0)][DBLP]
    SOSP, 2007, pp:145-158 [Conf]
  46. Joseph Tucek, Shan Lu, Chengdu Huang, Spiros Xanthos, Yuanyuan Zhou
    Triage: diagnosing production run failures at the user's site. [Citation Graph (0, 0)][DBLP]
    SOSP, 2007, pp:131-144 [Conf]
  47. Joseph Tucek, James Newsome, Shan Lu, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, Dawn Xiaodong Song
    Sweeper: a lightweight end-to-end system for defending against fast worms. [Citation Graph (0, 0)][DBLP]
    EuroSys, 2007, pp:115-128 [Conf]
  48. Yan Zhang, Zhifeng Chen, Yuanyuan Zhou
    Efficient Execution of Multiple Queries on Deep Memory Hierarchy. [Citation Graph (0, 0)][DBLP]
    J. Comput. Sci. Technol., 2007, v:22, n:2, pp:273-279 [Journal]
  49. Shan Lu, Joseph Tucek, Feng Qin, Yuanyuan Zhou
    AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants. [Citation Graph (0, 0)][DBLP]
    IEEE Micro, 2007, v:27, n:1, pp:26-35 [Journal]
  50. Xiaodong Li, Ritu Gupta, Sarita V. Adve, Yuanyuan Zhou
    Cross-component energy management: Joint adaptation of processor and memory. [Citation Graph (0, 0)][DBLP]
    TACO, 2007, v:4, n:3, pp:- [Journal]
  51. Feng Qin, Joseph Tucek, Yuanyuan Zhou, Jagadeesan Sundaresan
    Rx: Treating bugs as allergies—a safe method to survive software failures. [Citation Graph (0, 0)][DBLP]
    ACM Trans. Comput. Syst., 2007, v:25, n:3, pp:- [Journal]

  52. Understanding the propagation of hard errors to software and implications for resilient system design. [Citation Graph (, )][DBLP]


  53. Learning from mistakes: a comprehensive study on real world concurrency bug characteristics. [Citation Graph (, )][DBLP]


  54. Efficient online validation with delta execution. [Citation Graph (, )][DBLP]


  55. CTrigger: exposing atomicity violation bugs from their hiding places. [Citation Graph (, )][DBLP]


  56. SherLog: error diagnosis by connecting clues from run-time logs. [Citation Graph (, )][DBLP]


  57. Using likely program invariants to detect hardware errors. [Citation Graph (, )][DBLP]


  58. Trace-based microarchitecture-level diagnosis of permanent hardware faults. [Citation Graph (, )][DBLP]


  59. Are Disks the Dominant Contributor for Storage Failures? A Comprehensive Study of Storage Subsystem Failure Characteristics. [Citation Graph (, )][DBLP]


  60. Understanding Customer Problem Troubleshooting from Storage System Logs. [Citation Graph (, )][DBLP]


  61. HotComments: How to Make Program Comments More Useful? [Citation Graph (, )][DBLP]


  62. Treating Bugs as Allergies: A Safe Method for Surviving Software Failures. [Citation Graph (, )][DBLP]


  63. HARD: Hardware-Assisted Lockset-based Race Detection. [Citation Graph (, )][DBLP]


  64. DMA-aware memory energy management. [Citation Graph (, )][DBLP]


  65. Energy-efficient Contention-Resilient Medium Access for Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  66. An Energy-Aware Multi-Hop Tree Scatternet for Bluetooth Networks. [Citation Graph (, )][DBLP]


  67. PFC: Transparent Optimization of Existing Prefetching Strategies for Multi-Level Storage Systems. [Citation Graph (, )][DBLP]


  68. Listening to programmers - Taxonomies and characteristics of comments in operating system code. [Citation Graph (, )][DBLP]


  69. Maintaining software product lines - an industrial practice. [Citation Graph (, )][DBLP]


  70. Designing and Implementing Malicious Hardware. [Citation Graph (, )][DBLP]


  71. CISpan: Comprehensive Incremental Mining Algorithms of Closed Sequential Patterns for Multi-Versional Software Mining. [Citation Graph (, )][DBLP]


  72. A study of interleaving coverage criteria. [Citation Graph (, )][DBLP]


  73. PRES: probabilistic replay with execution sketching on multiprocessors. [Citation Graph (, )][DBLP]


  74. AutoISES: Automatically Inferring Security Specification and Detecting Violations. [Citation Graph (, )][DBLP]


  75. Enhancing Software Product Line Maintenance with Source Code Mining. [Citation Graph (, )][DBLP]


  76. Memory resource allocation for file system prefetching: from a supply chain management perspective. [Citation Graph (, )][DBLP]


  77. Maintaining an energy-efficient Bluetooth scatternet. [Citation Graph (, )][DBLP]


  78. Extending Lifetime with Differential Duty Cycles in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


  79. Sleep-based Topology Control for Wakeup Scheduling in Wireless Sensor Networks. [Citation Graph (, )][DBLP]


Search in 0.004secs, Finished in 0.610secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002