Search the dblp DataBase
Yuanyuan Zhou :
[Publications ]
[Author Rank by year ]
[Co-authors ]
[Prefers ]
[Cites ]
[Cited by ]
Publications of Author
Cristina Abad , Jed Taylor , Cigdem Sengul , William Yurcik , Yuanyuan Zhou , Kenneth E. Rowe Log Correlation for Intrusion Detection: A Proof of Concept. [Citation Graph (0, 0)][DBLP ] ACSAC, 2003, pp:255-265 [Conf ] Xiaodong Li , Zhenmin Li , Francis M. David , Pin Zhou , Yuanyuan Zhou , Sarita V. Adve , Sanjeev Kumar Performance directed energy management for main memory and disks. [Citation Graph (0, 0)][DBLP ] ASPLOS, 2004, pp:271-283 [Conf ] Pin Zhou , Vivek Pandey , Jagadeesan Sundaresan , Anand Raghuraman , Yuanyuan Zhou , Sanjeev Kumar Dynamic tracking of page miss ratio curve for memory management. [Citation Graph (0, 0)][DBLP ] ASPLOS, 2004, pp:177-188 [Conf ] Zhenmin Li , Lin Tan , Xuanhui Wang , Shan Lu , Yuanyuan Zhou , ChengXiang Zhai Have things changed now?: an empirical study of bug characteristics in modern open source software. [Citation Graph (0, 0)][DBLP ] ASID, 2006, pp:25-33 [Conf ] Shan Lu , Joseph Tucek , Feng Qin , Yuanyuan Zhou AVIO: detecting atomicity violations via access interleaving invariants. [Citation Graph (0, 0)][DBLP ] ASPLOS, 2006, pp:37-48 [Conf ] Jin Liang , Klara Nahrstedt , Yuanyuan Zhou Adaptive multi-resource prediction in distributed resource sharing environment. [Citation Graph (0, 0)][DBLP ] CCGRID, 2004, pp:293-300 [Conf ] Zhenmin Li , Zhifeng Chen , Sudarshan M. Srinivasan , Yuanyuan Zhou C-Miner: Mining Block Correlations in Storage Systems. [Citation Graph (0, 0)][DBLP ] FAST, 2004, pp:173-186 [Conf ] Muralidhar Medidi , Roger A. Slaaen , Yuanyuan Zhou , Christopher J. Mallery , Sirisha Medidi Scalable Localization in Wireless Sensor Networks. [Citation Graph (0, 0)][DBLP ] HiPC, 2006, pp:522-533 [Conf ] Angelos Bilas , Dongming Jiang , Yuanyuan Zhou , Jaswinder Pal Singh Limits to the Performance of Software Shared Memory: A Layered Approach. [Citation Graph (0, 0)][DBLP ] HPCA, 1999, pp:193-0 [Conf ] Feng Qin , Shan Lu , Yuanyuan Zhou SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs. [Citation Graph (0, 0)][DBLP ] HPCA, 2005, pp:291-302 [Conf ] Qingbo Zhu , Francis M. David , Christo F. Devaraj , Zhenmin Li , Yuanyuan Zhou , Pei Cao Reducing Energy Consumption of Disk Storage Using Power-Aware Cache Management. [Citation Graph (0, 0)][DBLP ] HPCA, 2004, pp:118-129 [Conf ] Yuanyuan Zhou , Peter M. Chen , Kai Li Fast cluster failover using virtual memory-mapped communication. [Citation Graph (0, 0)][DBLP ] International Conference on Supercomputing, 1999, pp:373-382 [Conf ] Qingbo Zhu , Asim Shankar , Yuanyuan Zhou PB-LRU: a self-tuning power aware storage cache replacement algorithm for conserving disk energy. [Citation Graph (0, 0)][DBLP ] ICS, 2004, pp:79-88 [Conf ] Yuanyuan Zhou , Limin Wang , Douglas W. Clark , Kai Li Thread Scheduling for Out-of-core Applications with Memory Server on Multicomputers. [Citation Graph (0, 0)][DBLP ] IOPADS, 1999, pp:57-67 [Conf ] Yuanyuan Zhou , Kai Li , Angelos Bilas , Suresh Jagannathan , Cezary Dubnicki , James Philbin Experiences with VI Communication for Database Storage. [Citation Graph (0, 0)][DBLP ] ISCA, 2002, pp:257-0 [Conf ] Pin Zhou , Feng Qin , Wei Liu , Yuanyuan Zhou , Josep Torrellas iWatcher: Efficient Architectural Support for Software Debugging. [Citation Graph (0, 0)][DBLP ] ISCA, 2004, pp:224-237 [Conf ] Smruti R. Sarangi , Wei Liu , Yuanyuan Zhou ReSlice: Selective Re-Execution of Long-Retired Misspeculated Instructions Using Forward Slicing. [Citation Graph (0, 0)][DBLP ] MICRO, 2005, pp:257-270 [Conf ] Pin Zhou , Wei Liu , Long Fei , Shan Lu , Feng Qin , Yuanyuan Zhou , Samuel P. Midkiff , Josep Torrellas AccMon: Automatically Detecting Memory-Related Bugs via Program Counter-Based Invariants. [Citation Graph (0, 0)][DBLP ] MICRO, 2004, pp:269-280 [Conf ] Shan Lu , Pin Zhou , Wei Liu , Yuanyuan Zhou , Josep Torrellas PathExpander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection. [Citation Graph (0, 0)][DBLP ] MICRO, 2006, pp:38-52 [Conf ] Feng Qin , Cheng Wang , Zhenmin Li , Ho-Seop Kim , Yuanyuan Zhou , Youfeng Wu LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks. [Citation Graph (0, 0)][DBLP ] MICRO, 2006, pp:135-148 [Conf ] Zhenmin Li , Shan Lu , Suvda Myagmar , Yuanyuan Zhou CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code. [Citation Graph (0, 0)][DBLP ] OSDI, 2004, pp:289-302 [Conf ] Yuanyuan Zhou , Liviu Iftode , Kai Li Performance Evaluation of Two Home-Based Lazy Release Consistency Protocols for Shared Virtual Memory Systems. [Citation Graph (0, 0)][DBLP ] OSDI, 1996, pp:75-88 [Conf ] Yuanyuan Zhou , Liviu Iftode , Jaswinder Pal Singh , Kai Li , Brian R. Toonen , Ioannis Schoinas , Mark D. Hill , David A. Wood Relaxed Consistency and Coherence Granularity in DSM Systems: A Performance Evaluation. [Citation Graph (0, 0)][DBLP ] PPOPP, 1997, pp:193-205 [Conf ] Zhifeng Chen , Yan Zhang , Yuanyuan Zhou , Heidi Scott , Berni Schiefer Empirical evaluation of multi-level buffer cache collaboration for storage systems. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 2005, pp:145-156 [Conf ] Zhenmin Li , Yuanyuan Zhou PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code. [Citation Graph (0, 0)][DBLP ] ESEC/SIGSOFT FSE, 2005, pp:306-315 [Conf ] Feng Qin , Joseph Tucek , Jagadeesan Sundaresan , Yuanyuan Zhou Rx: treating bugs as allergies - a safe method to survive software failures. [Citation Graph (0, 0)][DBLP ] SOSP, 2005, pp:235-248 [Conf ] Qingbo Zhu , Zhifeng Chen , Lin Tan , Yuanyuan Zhou , Kimberly Keeton , John Wilkes Hibernator: helping disk arrays sleep through the winter. [Citation Graph (0, 0)][DBLP ] SOSP, 2005, pp:177-190 [Conf ] Zhifeng Chen , Yuanyuan Zhou , Kai Li Eviction-based Cache Placement for Storage Caches. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, General Track, 2003, pp:269-281 [Conf ] Sudarshan M. Srinivasan , Srikanth Kandula , Christopher R. Andrews , Yuanyuan Zhou Flashback: A Lightweight Extension for Rollback and Deterministic Replay for Software Debugging. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, General Track, 2004, pp:29-44 [Conf ] Yuanyuan Zhou , James Philbin , Kai Li The Multi-Queue Replacement Algorithm for Second Level Buffer Caches. [Citation Graph (0, 0)][DBLP ] USENIX Annual Technical Conference, General Track, 2001, pp:91-104 [Conf ] Yan Zhang , Zhifeng Chen , Yuanyuan Zhou MiniTasking: Improving Cache Performance for Multiple Query Workloads. [Citation Graph (0, 0)][DBLP ] WAIM, 2006, pp:287-299 [Conf ] Xiaodong Li , Zhenmin Li , Pin Zhou , Yuanyuan Zhou , Sarita V. Adve , Sanjeev Kumar Performance-Directed Energy Management for Storage Systems. [Citation Graph (0, 0)][DBLP ] IEEE Micro, 2004, v:24, n:6, pp:38-49 [Journal ] Pin Zhou , Feng Qin , Wei Liu , Yuanyuan Zhou , Josep Torrellas iWatcher: Simple, General Architectural Support for Software Debugging. [Citation Graph (0, 0)][DBLP ] IEEE Micro, 2004, v:24, n:6, pp:50-56 [Journal ] Marianne Winslett , Kevin Chen-Chuan Chang , AnHai Doan , Jiawei Han , ChengXiang Zhai , Yuanyuan Zhou Database Research at the University of Illinois at Urbana-Champaign. [Citation Graph (0, 0)][DBLP ] SIGMOD Record, 2002, v:31, n:3, pp:97-102 [Journal ] Yuanyuan Zhou , Pin Zhou , Feng Qin , Wei Liu , Josep Torrellas Efficient and flexible architectural support for dynamic monitoring. [Citation Graph (0, 0)][DBLP ] TACO, 2005, v:2, n:1, pp:3-33 [Journal ] Qingbo Zhu , Yuanyuan Zhou Power-Aware Storage Cache Management. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Computers, 2005, v:54, n:5, pp:587-602 [Journal ] Zhenmin Li , Zhifeng Chen , Yuanyuan Zhou Mining block correlations to improve storage performance. [Citation Graph (0, 0)][DBLP ] TOS, 2005, v:1, n:2, pp:213-245 [Journal ] Xiaodong Li , Zhenmin Li , Yuanyuan Zhou , Sarita V. Adve Performance directed energy management for main memory and disks. [Citation Graph (0, 0)][DBLP ] TOS, 2005, v:1, n:3, pp:346-380 [Journal ] Yuanyuan Zhou , Angelos Bilas , Suresh Jagannathan , Dimitrios Xinidis , Cezary Dubnicki , Kai Li VI-Attached Database Storage. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2005, v:16, n:1, pp:35-50 [Journal ] Yuanyuan Zhou , Zhifeng Chen , Kai Li Second-Level Buffer Cache Management. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Parallel Distrib. Syst., 2004, v:15, n:6, pp:505-519 [Journal ] Zhenmin Li , Shan Lu , Suvda Myagmar , Yuanyuan Zhou CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. [Citation Graph (0, 0)][DBLP ] IEEE Trans. Software Eng., 2006, v:32, n:3, pp:176-192 [Journal ] Soyeon Park , Weihang Jiang , Yuanyuan Zhou , Sarita V. Adve Managing energy-performance tradeoffs for multithreaded applications on multiprocessor architectures. [Citation Graph (0, 0)][DBLP ] SIGMETRICS, 2007, pp:169-180 [Conf ] Shan Lu , Weihang Jiang , Yuanyuan Zhou A study of interleaving coverage criteria. [Citation Graph (0, 0)][DBLP ] ESEC/SIGSOFT FSE, 2007, pp:533-536 [Conf ] Shan Lu , Soyeon Park , Chongfeng Hu , Xiao Ma , Weihang Jiang , Zhenmin Li , Raluca A. Popa , Yuanyuan Zhou MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs. [Citation Graph (0, 0)][DBLP ] SOSP, 2007, pp:103-116 [Conf ] Lin Tan , Ding Yuan , Gopal Krishna , Yuanyuan Zhou /*icomment: bugs or bad comments?*/. [Citation Graph (0, 0)][DBLP ] SOSP, 2007, pp:145-158 [Conf ] Joseph Tucek , Shan Lu , Chengdu Huang , Spiros Xanthos , Yuanyuan Zhou Triage: diagnosing production run failures at the user's site. [Citation Graph (0, 0)][DBLP ] SOSP, 2007, pp:131-144 [Conf ] Joseph Tucek , James Newsome , Shan Lu , Chengdu Huang , Spiros Xanthos , David Brumley , Yuanyuan Zhou , Dawn Xiaodong Song Sweeper: a lightweight end-to-end system for defending against fast worms. [Citation Graph (0, 0)][DBLP ] EuroSys, 2007, pp:115-128 [Conf ] Yan Zhang , Zhifeng Chen , Yuanyuan Zhou Efficient Execution of Multiple Queries on Deep Memory Hierarchy. [Citation Graph (0, 0)][DBLP ] J. Comput. Sci. Technol., 2007, v:22, n:2, pp:273-279 [Journal ] Shan Lu , Joseph Tucek , Feng Qin , Yuanyuan Zhou AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants. [Citation Graph (0, 0)][DBLP ] IEEE Micro, 2007, v:27, n:1, pp:26-35 [Journal ] Xiaodong Li , Ritu Gupta , Sarita V. Adve , Yuanyuan Zhou Cross-component energy management: Joint adaptation of processor and memory. [Citation Graph (0, 0)][DBLP ] TACO, 2007, v:4, n:3, pp:- [Journal ] Feng Qin , Joseph Tucek , Yuanyuan Zhou , Jagadeesan Sundaresan Rx: Treating bugs as allergies—a safe method to survive software failures. [Citation Graph (0, 0)][DBLP ] ACM Trans. Comput. Syst., 2007, v:25, n:3, pp:- [Journal ] Understanding the propagation of hard errors to software and implications for resilient system design. [Citation Graph (, )][DBLP ] Learning from mistakes: a comprehensive study on real world concurrency bug characteristics. [Citation Graph (, )][DBLP ] Efficient online validation with delta execution. [Citation Graph (, )][DBLP ] CTrigger: exposing atomicity violation bugs from their hiding places. [Citation Graph (, )][DBLP ] SherLog: error diagnosis by connecting clues from run-time logs. [Citation Graph (, )][DBLP ] Using likely program invariants to detect hardware errors. [Citation Graph (, )][DBLP ] Trace-based microarchitecture-level diagnosis of permanent hardware faults. [Citation Graph (, )][DBLP ] Are Disks the Dominant Contributor for Storage Failures? A Comprehensive Study of Storage Subsystem Failure Characteristics. [Citation Graph (, )][DBLP ] Understanding Customer Problem Troubleshooting from Storage System Logs. [Citation Graph (, )][DBLP ] HotComments: How to Make Program Comments More Useful? [Citation Graph (, )][DBLP ] Treating Bugs as Allergies: A Safe Method for Surviving Software Failures. [Citation Graph (, )][DBLP ] HARD: Hardware-Assisted Lockset-based Race Detection. [Citation Graph (, )][DBLP ] DMA-aware memory energy management. [Citation Graph (, )][DBLP ] Energy-efficient Contention-Resilient Medium Access for Wireless Sensor Networks. [Citation Graph (, )][DBLP ] An Energy-Aware Multi-Hop Tree Scatternet for Bluetooth Networks. [Citation Graph (, )][DBLP ] PFC: Transparent Optimization of Existing Prefetching Strategies for Multi-Level Storage Systems. [Citation Graph (, )][DBLP ] Listening to programmers - Taxonomies and characteristics of comments in operating system code. [Citation Graph (, )][DBLP ] Maintaining software product lines - an industrial practice. [Citation Graph (, )][DBLP ] Designing and Implementing Malicious Hardware. [Citation Graph (, )][DBLP ] CISpan: Comprehensive Incremental Mining Algorithms of Closed Sequential Patterns for Multi-Versional Software Mining. [Citation Graph (, )][DBLP ] A study of interleaving coverage criteria. [Citation Graph (, )][DBLP ] PRES: probabilistic replay with execution sketching on multiprocessors. [Citation Graph (, )][DBLP ] AutoISES: Automatically Inferring Security Specification and Detecting Violations. [Citation Graph (, )][DBLP ] Enhancing Software Product Line Maintenance with Source Code Mining. [Citation Graph (, )][DBLP ] Memory resource allocation for file system prefetching: from a supply chain management perspective. [Citation Graph (, )][DBLP ] Maintaining an energy-efficient Bluetooth scatternet. [Citation Graph (, )][DBLP ] Extending Lifetime with Differential Duty Cycles in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Sleep-based Topology Control for Wakeup Scheduling in Wireless Sensor Networks. [Citation Graph (, )][DBLP ] Search in 0.028secs, Finished in 0.030secs