Search For:

Displaying 1-7 out of 7 total
How Hadoop Clusters Break
Found in: IEEE Software
By Ariel Rabkin,Randy Howard Katz
Issue Date:July 2013
pp. 88-94
This article describes an examination of a sample of several hundred support tickets for the Hadoop ecosystem, a widely used group of big data storage and processing systems; a taxonomy of errors and how they are addressed by supporters; and the misconfigu...
Precomputing possible configuration error diagnoses
Found in: Automated Software Engineering, International Conference on
By Ariel Rabkin,Randy Katz
Issue Date:November 2011
pp. 193-202
Complex software packages, particularly systems software, often require substantial customization before being used. Small mistakes in configuration can lead to hard-todiagnose error messages. We demonstrate how to build a map from each program point to th...
Using clouds for MapReduce measurement assignments
Found in: ACM Transactions on Computing Education (TOCE)
By Ariel Rabkin, Charles Reiss, David Patterson, Randy Katz
Issue Date:January 2013
pp. 1-18
We describe our experiences teaching MapReduce in a large undergraduate lecture course using public cloud services and the standard Hadoop API. Using the standard API, students directly experienced the quality of industrial big-data tools. Using the cloud,...
How not to survey developers and repositories: experiences analyzing language adoption
Found in: Proceedings of the ACM 4th annual workshop on Evaluation and usability of programming languages and tools (PLATEAU '12)
By Ariel Rabkin, Leo A. Meyerovich
Issue Date:October 2012
pp. 7-16
We present cross-sectional analyses of programming language use and reflect upon our experience in doing so. In particular, we directly analyze groups of 1,500-13,000 developers by using questionnaires and 260,000 developers indirectly so by mining 210,000...
Static extraction of program configuration options
Found in: Proceeding of the 33rd international conference on Software engineering (ICSE '11)
By Ariel Rabkin, Randy Katz
Issue Date:May 2011
pp. 131-140
Many programs use a key-value model for configuration options. We examined how this model is used in seven open source Java projects totaling over a million lines of code. We present a static analysis that extracts a list of configuration options for a pro...
A view of cloud computing
Found in: Communications of the ACM
By Andy Konwinski, Anthony D. Joseph, Ariel Rabkin, Armando Fox, David Patterson, Gunho Lee, Ion Stoica, Matei Zaharia, Michael Armbrust, Randy Katz, Rean Griffith
Issue Date:April 2010
pp. 50-58
Clearing the clouds away from the true potential and obstacles posed by this computing capability.
Personal knowledge questions for fallback authentication: security questions in the era of Facebook
Found in: Proceedings of the 4th symposium on Usable privacy and security (SOUPS '08)
By Ariel Rabkin
Issue Date:July 2008
pp. 1-30
Security questions (or challenge questions) are commonly used to authenticate users who have lost their passwords. We examined the password retrieval mechanisms for a number of personal banking websites, and found that many of them rely in part on security...