Search For:

Displaying 1-50 out of 60 total
PFC: Transparent Optimization of Existing Prefetching Strategies for Multi-Level Storage Systems
Found in: Distributed Computing Systems, International Conference on
By Zhe Zhang, Kyuhyung Lee, Xiaosong Ma, Yuanyuan Zhou
Issue Date:June 2008
pp. 740-751
The multi-level storage architecture has been widely adopted in servers and data centers. However, while prefetching has been shown as a crucial technique to exploit the sequentiality in accesses common for such systems and hide the increasing relative cos...
 
HARD: Hardware-Assisted Lockset-based Race Detection
Found in: High-Performance Computer Architecture, International Symposium on
By Pin Zhou, Radu Teodorescu, Yuanyuan Zhou
Issue Date:February 2007
pp. 121-132
The emergence of multicore architectures will lead to an increase in the use of multithreaded applications that are prone to synchronization bugs, such as data races. Software solutions for detecting data races generally incur large overheads. Hardware sup...
 
PathExpander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection
Found in: Microarchitecture, IEEE/ACM International Symposium on
By Shan Lu, Pin Zhou, Wei Liu, Yuanyuan Zhou, Josep Torrellas
Issue Date:December 2006
pp. 38-52
Dynamic software bug detection tools are commonly used because they leverage run-time information. However, they suffer from a fundamental limitation, the Path Coverage Problem: they detect bugs only in taken paths but not in non-taken paths. In other word...
 
AccMon: Automatically Detecting Memory-Related Bugs via Program Counter-Based Invariants
Found in: Microarchitecture, IEEE/ACM International Symposium on
By Pin Zhou, Wei Liu, Long Fei, Shan Lu, Feng Qin, Yuanyuan Zhou, Samuel Midkiff, Josep Torrellas
Issue Date:December 2004
pp. 269-280
This paper makes two contributions to architectural support for software debugging. First, it proposes a novel statistics-based, on-the-fly bug detection method called PC-based invariant detection. The idea is based on the observation that, in most program...
 
Performance-Directed Energy Management for Storage Systems
Found in: IEEE Micro
By Xiaodong Li, Zhenmin Li, Pin Zhou, Yuanyuan Zhou, Sarita V. Adve, Sanjeev Kumar
Issue Date:November 2004
pp. 38-49
Many algorithms use thresholds to control a memory or disk's power mode, which can degrade performance past an acceptable limit and require painstaking parameter tuning. These drawbacks make them impractical for many real systems. Performance directed algo...
 
iWatcher: Simple, General Architectural Support for Software Debugging
Found in: IEEE Micro
By Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, Josep Torrellas
Issue Date:November 2004
pp. 50-56
iWatcher lets programmers associate specified functions to
 
iWatcher: Efficient Architectural Support for Software Debugging
Found in: Computer Architecture, International Symposium on
By Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, Josep Torrellas
Issue Date:June 2004
pp. 224
Recent impressive performance improvements in computer architecture have not led to significant gains in ease of debugging. Software debugging often relies on inserting run-time software checks. In many cases, however, it is hard to find the root cause of ...
 
Understanding the Data Traffic of Uncore in Westmere NUMA Architecture
Found in: 2014 22nd Euromicro International Conference on Parallel, Distributed and Network-Based Processing (PDP)
By Qiuming Luo, Chang Kong, Yuanyuan Zhou, Guoqiang Liu, Chenjian Liu
Issue Date:February 2014
pp. 392-399
Non-Uniform Memory Access (NUMA) has become the main stream architecture of modern servers. In processors, Uncore part plays a very important role, especially in NUMA systems, because it is used to connect Cores, Last Level Caches (LLC), on-chip multiple M...
 
SPA-based Security Evaluation of RSA Implementation in Internet Banking USB Token
Found in: Instrumentation, Measurement, Computer, Communication and Control, International Conference on
By Yuanyuan Zhou,Shize Guo
Issue Date:October 2011
pp. 499-503
Almost all the commercial banks in China use USB Token with RSA-coprocessor tamper-resistant crypto-device to ensure the security of Internet Banking transactions. To evaluate the security of such Tokens objectively, finished practical SPA (Simple Power An...
 
Detecting Concurrency Bugs from the Perspectives of Synchronization Intentions
Found in: IEEE Transactions on Parallel and Distributed Systems
By Shan Lu,Soyeon Park,Yuanyuan Zhou
Issue Date:June 2012
pp. 1060-1072
Concurrency bugs are among the most difficult to detect and diagnose of all software bugs. This paper combats concurrency bugs from the perspective of programmers' synchronization intentions. We first study the root causes of 74 real-world concurrency bugs...
 
Finding Atomicity-Violation Bugs through Unserializable Interleaving Testing
Found in: IEEE Transactions on Software Engineering
By Shan Lu,Soyeon Park,Yuanyuan Zhou
Issue Date:July 2012
pp. 844-860
Multicore hardware is making concurrent programs pervasive. Unfortunately, concurrent programs are prone to bugs. Among different types of concurrency bugs, atomicity violations are common and important. How to test the interleaving space and expose atomic...
 
Smartphone Evolution and Reuse: Establishing a More Sustainable Model
Found in: Parallel Processing Workshops, International Conference on
By Xun Li, Pablo J. Ortiz, Jeffrey Browne, Diana Franklin, John Y. Oliver, Roland Geyer, Yuanyuan Zhou, Frederic T. Chong
Issue Date:September 2010
pp. 476-484
The dark side of Moore's Law is our society's insatiable need to constantly upgrade our computing devices. The high cost in manufacturing energy, materials and disposal is more worrisome the increasing number of smartphones. Repurposing smartphones for edu...
 
A case for smartphone reuse to augment elementary school education
Found in: International Conference on Green Computing
By Xun Li, Pablo J. Ortiz, Jeffrey Browne, Diana Franklin, John Y. Oliver, Roland Geyer, Yuanyuan Zhou, Frederic T. Chong
Issue Date:August 2010
pp. 459-466
The rapid growth of information technology has led to substantial economic and societal benefits. Unfortunately, rapid improvements in technology has also led to an unsustainable “disposable” model in which devices are replaced in a matter of months. This ...
 
Listening to programmers
Found in: Software Engineering, International Conference on
By Yoann Padioleau, Lin Tan, Yuanyuan Zhou
Issue Date:May 2009
pp. 331-341
Innovations from multiple directions have been proposed to improve software reliability. Unfortunately, many of the innovations are not fully exploited by programmers. To bridge the gap, this paper proposes a new approach to “listen” to thousands of progra...
 
AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants
Found in: IEEE Micro
By Shan Lu, Joseph Tucek, Feng Qin, Yuanyuan Zhou
Issue Date:January 2007
pp. 26-35
This article proposes an innovative concurrent-program invariant that captures programmers' atomicity assumptions. It describes a tool with two implementations, one in software and the other using hardware support, that can automatically extract such invar...
 
LIFT: A Low-Overhead Practical Information Flow Tracking System for Detecting Security Attacks
Found in: Microarchitecture, IEEE/ACM International Symposium on
By Feng Qin, Cheng Wang, Zhenmin Li, Ho-seop Kim, Yuanyuan Zhou, Youfeng Wu
Issue Date:December 2006
pp. 135-148
<p>Computer security is severely threatened by software vulnerabilities. Prior work shows that information flow tracking (also referred to as taint analysis) is a promising technique to detect a wide range of security attacks. However, current inform...
 
CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code
Found in: IEEE Transactions on Software Engineering
By Zhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou
Issue Date:March 2006
pp. 176-192
Recent studies have shown that large software suites contain significant amounts of replicated code. It is assumed that some of this replication is due to copy-and-paste activity and that a significant proportion of bugs in operating systems are due to cop...
 
ReSlice: Selective Re-Execution of Long-Retired Misspeculated Instructions Using Forward Slicing
Found in: Microarchitecture, IEEE/ACM International Symposium on
By Smruti R. Sarangi, Wei Liu, Josep Torrellas, Yuanyuan Zhou
Issue Date:November 2005
pp. 257-270
<p>As more data value speculation mechanisms are being proposed to speed-up processors, there is growing pressure on the critical processor structures that must buffer the state of the speculative instructions. A scalable solution is to checkpoint th...
 
Power-Aware Storage Cache Management
Found in: IEEE Transactions on Computers
By Qingbo Zhu, Yuanyuan Zhou
Issue Date:May 2005
pp. 587-602
Reducing energy consumption is an important issue for data centers. Among the various components of a data center, storage is one of the biggest energy consumers. Previous studies have shown that the average idle period for a server disk in a data center i...
 
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs
Found in: High-Performance Computer Architecture, International Symposium on
By Feng Qin, Shan Lu, Yuanyuan Zhou
Issue Date:February 2005
pp. 291-302
Memory leaks and memory corruption are two major forms of software bugs that severely threaten system availability and security. According to the US-CERT Vulnerability Notes Database, 68% of all reported vulnerabilities in 2003 were caused by memory leaks ...
 
VI-Attached Database Storage
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yuanyuan Zhou, Angelos Bilas, Suresh Jagannathan, Dimitrios Xinidis, Cezary Dubnicki, Kai Li
Issue Date:January 2005
pp. 35-50
<p><b>Abstract</b>—This article presents a VI-attached database storage architecture to improve database transaction rates. More specifically, we examine how VI-based interconnects can be used to improve I/O path performance between a dat...
 
Second-Level Buffer Cache Management
Found in: IEEE Transactions on Parallel and Distributed Systems
By Yuanyuan Zhou, Zhifeng Chen, Kai Li
Issue Date:June 2004
pp. 505-519
<p><b>Abstract</b>—Buffer caches are commonly used in servers to reduce the number of slow disk accesses or network messages. These buffer caches form a multilevel buffer cache hierarchy. In such a hierarchy, second-level buffer caches ha...
 
Reducing Energy Consumption of Disk Storage Using Power-Aware Cache Management
Found in: High-Performance Computer Architecture, International Symposium on
By Qingbo Zhu, Francis M. David, Christo F. Devaraj, Zhenmin Li, Yuanyuan Zhou, Pei Cao
Issue Date:February 2004
pp. 118
<p>Reducing energy consumption is an important issue for data centers. Among the various components of a data center, storage is one of the biggest consumers of energy. Previous studies have shown that the average idle period for a server disk in a d...
 
Log Correlation for Intrusion Detection: A Proof of Concept
Found in: Computer Security Applications Conference, Annual
By Cristina Abad, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, Ken Rowe
Issue Date:December 2003
pp. 255
Intrusion detection is an important part of networked-systems security protection. Although commercial products exist, finding intrusions has proven to be a difficult task with limitations under current techniques. Therefore, improved techniques are needed...
 
Limits to the Performance of Software Shared Memory: A Layered Approach
Found in: High-Performance Computer Architecture, International Symposium on
By Angelos Bilas, Dongming Jiang, Yuanyuan Zhou, Jaswinder Pal Singh
Issue Date:January 1999
pp. 193
Much research has been done in fast communication on clusters and in protocols for supporting software shared memory across them. However, the end performance of applications that were written for the more proven hardware--coherent shared memory is still n...
 
Are disks the dominant contributor for storage failures?: A comprehensive study of storage subsystem failure characteristics
Found in: ACM Transactions on Storage (TOS)
By Arkady Kanevsky, Chongfeng Hu, Chongfeng Hu, Weihang Jiang, Weihang Jiang, Yuanyuan Zhou, Yuanyuan Zhou
Issue Date:November 2008
pp. 1-25
Building reliable storage systems becomes increasingly challenging as the complexity of modern storage systems continues to grow. Understanding storage failure characteristics is crucially important for designing and building a reliable storage system. Whi...
     
Adaptive multi-resource prediction in distributed resource sharing environment
Found in: Cluster Computing and the Grid, IEEE International Symposium on
By Jin Liang, K. Nahrstedt, Yuanyuan Zhou
Issue Date:April 2004
pp. 293-300
Resource prediction can greatly assist resource selection and scheduling in a distributed resource sharing environment such as a computational Grid. Existing resource prediction models are either based on the auto-correlation of a single resource or based ...
 
Experiences with VI Communication for Database Storage
Found in: Computer Architecture, International Symposium on
By Yuanyuan Zhou, Kai Li, Angelos Bilas, Suresh Jagannathan, Cezary Dubnicki, James F. Philbin
Issue Date:May 2002
pp. 0257
This paper examines how VI--based interconnects can be used to improve I/O path performance between a database server and the storage subsystem. We design and implement a software layer, DSA, thatis layered between the application and VI. DSA takes advanta...
 
Efficient and flexible architectural support for dynamic monitoring
Found in: ACM Transactions on Architecture and Code Optimization (TACO)
By Feng Qin, Josep Torrellas, Pin Zhou, Wei Liu, Yuanyuan Zhou
Issue Date:March 2005
pp. 3-33
Recent impressive performance improvements in computer architecture have not led to significant gains in the case of debugging. Software debugging often relies on inserting run-time software checks. In many cases, however, it is hard to find the root cause...
     
Performance directed energy management for main memory and disks
Found in: Proceedings of the 11th international conference on Architectural support for programming languages and operating systems (ASPLOS-XI)
By Francis David, Pin Zhou, Sanjeev Kumar, Sarita Adve, Xiaodong Li, Yuanyuan Zhou, Zhenmin Li
Issue Date:October 2004
pp. 97-105
Much research has been conducted on energy management for memory and disks. Most studies use control algorithms that dynamically transition devices to low power modes after they are idle for a certain threshold period of time. The control algorithms used i...
     
Dynamic tracking of page miss ratio curve for memory management
Found in: Proceedings of the 11th international conference on Architectural support for programming languages and operating systems (ASPLOS-XI)
By Anand Raghuraman, Jagadeesan Sundaresan, Pin Zhou, Sanjeev Kumar, Vivek Pandey, Yuanyuan Zhou
Issue Date:October 2004
pp. 97-105
Memory can be efficiently utilized if the dynamic memory demands of applications can be determined and analyzed at run-time. The page miss ratio curve(MRC), i.e. page miss rate vs. memory size curve, is a good performance-directed metric to serve this purp...
     
EnCore: exploiting system environment and correlation information for misconfiguration detection
Found in: Proceedings of the 19th international conference on Architectural support for programming languages and operating systems (ASPLOS '14)
By Jiaqi Zhang, Lakshminarayanan Renganarayana, Niyu Ge, Tianyin Xu, Vasanth Bala, Xiaolan Zhang, Yuanyuan Zhou
Issue Date:March 2014
pp. 687-700
As software systems become more complex and configurable, failures due to misconfigurations are becoming a critical problem. Such failures often have serious functionality, security and financial consequences. Further, diagnosis and remediation for such fa...
     
Do not blame users for misconfigurations
Found in: Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles (SOSP '13)
By Ding Yuan, Jiaqi Zhang, Jing Zheng, Peng Huang, Shankar Pasupathy, Tianwei Sheng, Tianyin Xu, Yuanyuan Zhou
Issue Date:November 2013
pp. 244-259
Similar to software bugs, configuration errors are also one of the major causes of today's system failures. Many configuration issues manifest themselves in ways similar to software bugs such as crashes, hangs, silent failures. It leaves users clueless and...
     
An in-depth study of LTE: effect of network protocol and application behavior on performance
Found in: Proceedings of the ACM SIGCOMM 2013 conference on SIGCOMM (SIGCOMM '13)
By Feng Qian, Junxian Huang, Oliver Spatscheck, Qiang Xu, Subhabrata Sen, Yihua Guo, Yuanyuan Zhou, Z. Morley Mao
Issue Date:August 2013
pp. 363-374
With lower latency and higher bandwidth than its predecessor 3G networks, the latest cellular technology 4G LTE has been attracting many new users. However, the interactions among applications, network transport protocol, and the radio layer still remain u...
     
Improving Software Diagnosability via Log Enhancement
Found in: ACM Transactions on Computer Systems (TOCS)
By Jing Zheng, Stefan Savage, Ding Yuan, Soyeon Park, Yuanyuan Zhou
Issue Date:February 2012
pp. 1-28
Diagnosing software failures in the field is notoriously difficult, in part due to the fundamental complexity of troubleshooting any complex software system, but further exacerbated by the paucity of information that is typically available in the productio...
     
ATDetector: improving the accuracy of a commercial data race detector by identifying address transfer
Found in: Proceedings of the 44th Annual IEEE/ACM International Symposium on Microarchitecture (MICRO-44 '11)
By Weiwei Xiong, Zhiqiang Ma, Jiaqi Zhang, Soyeon Park, Yang Liu, Yuanyuan Zhou
Issue Date:December 2011
pp. 206-215
In order to take advantage of multi-core hardware, more and more applications are becoming multi-threaded. Unfortunately concurrent programs are prone to bugs, such as data races. Recently much work has been devoted to detecting data races in multi-threade...
     
aComment: mining annotations from comments and code to detect interrupt related concurrency bugs
Found in: Proceeding of the 33rd international conference on Software engineering (ICSE '11)
By Lin Tan, Yoann Padioleau, Yuanyuan Zhou
Issue Date:May 2011
pp. 11-20
Concurrency bugs in an operating system (OS) are detrimental as they can cause the OS to fail and affect all applications running on top of the OS. Detecting OS concurrency bugs is challenging due to the complexity of the OS synchronization, particularly w...
     
Connecting technology with real-world problems - from copy-paste detection to detecting known bugs: (keynote abstract)
Found in: Proceeding of the 8th working conference on Mining software repositories (MSR '11)
By Yuanyuan Zhou
Issue Date:May 2011
pp. 2-2
In my talk, I will share with you our experience in applying and deploying our source code mining technology in industry. In particular, the most valuable lesson we have learned is that sometimes there is a bigger problem in the real world that can really ...
     
Do I use the wrong definition?: DeFuse: definition-use invariants for detecting concurrency and sequential bugs
Found in: Proceedings of the ACM international conference on Object oriented programming systems languages and applications (OOPSLA '10)
By Shan Lu, Soyeon Park, Weimin Zheng, Wenguang Chen, Yao Shi, Yuanyuan Zhou, Zuoning Yin
Issue Date:October 2010
pp. 160-174
Software bugs, such as concurrency, memory and semantic bugs, can significantly affect system reliability. Although much effort has been made to address this problem, there are still many bugs that cannot be detected, especially concurrency bugs due to the...
     
SherLog: error diagnosis by connecting clues from run-time logs
Found in: Proceedings of the fifteenth edition of ASPLOS on Architectural support for programming languages and operating systems (ASPLOS '10)
By Ding Yuan, Haohui Mai, Lin Tan, Shankar Pasupathy, Weiwei Xiong, Yuanyuan Zhou
Issue Date:March 2010
pp. 222-230
Computer systems often fail due to many factors such as software bugs or administrator errors. Diagnosing such production run failures is an important but challenging task since it is difficult to reproduce them in house due to various reasons: (1) unavail...
     
PRES: probabilistic replay with execution sketching on multiprocessors
Found in: Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles (SOSP '09)
By Kyu H. Lee, Rini Kaushik, Shan Lu, Soyeon Park, Weiwei Xiong, Yuanyuan Zhou, Zuoning Yin
Issue Date:October 2009
pp. 177-192
Bug reproduction is critically important for diagnosing a production-run failure. Unfortunately, reproducing a concurrency bug on multi-processors (e.g., multi-core) is challenging. Previous techniques either incur large overhead or require new non-trivial...
     
Memory resource allocation for file system prefetching: from a supply chain management perspective
Found in: Proceedings of the fourth ACM european conference on Computer systems (EuroSys '09)
By Amit Kulkarni, Xiaosong Ma, Yuanyuan Zhou, Zhe Zhang
Issue Date:April 2009
pp. 29-32
As an important technique to hide disk I/O latency, prefetching has been widely studied, and dynamic adaptive prefetching techniques have been deployed in diverse storage environments. However, two issues are not well addressed by previous research: (1) ho...
     
Efficient online validation with delta execution
Found in: Proceeding of the 14th international conference on Architectural support for programming languages and operating systems (ASPLOS '09)
By Joseph Tucek, Weiwei Xiong, Yuanyuan Zhou
Issue Date:March 2009
pp. 23-27
Software systems are constantly changing. Patches to fix bugs and patches to add features are all too common. Every change risks breaking a previously working system. Hence administrators loathe change, and are willing to delay even critical security patch...
     
CTrigger: exposing atomicity violation bugs from their hiding places
Found in: Proceeding of the 14th international conference on Architectural support for programming languages and operating systems (ASPLOS '09)
By Shan Lu, Soyeon Park, Yuanyuan Zhou
Issue Date:March 2009
pp. 23-27
Multicore hardware is making concurrent programs pervasive. Unfortunately, concurrent programs are prone to bugs. Among different types of concurrency bugs, atomicity violation bugs are common and important. Existing techniques to detect atomicity violatio...
     
Learning from mistakes: a comprehensive study on real world concurrency bug characteristics
Found in: Proceedings of the 13th international conference on Architectural support for programming languages and operating systems (ASPLOS XIII)
By Eunsoo Seo, Shan Lu, Soyeon Park, Yuanyuan Zhou
Issue Date:March 2008
pp. 1-1
The reality of multi-core hardware has made concurrent programs pervasive. Unfortunately, writing correct concurrent programs is difficult. Addressing this challenge requires advances in multiple directions, including concurrency bug detection, concurrent ...
     
Understanding the propagation of hard errors to software and implications for resilient system design
Found in: Proceedings of the 13th international conference on Architectural support for programming languages and operating systems (ASPLOS XIII)
By Man-Lap Li, Pradeep Ramachandran, Sarita V. Adve, Swarup Kumar Sahoo, Vikram S. Adve, Yuanyuan Zhou
Issue Date:March 2008
pp. 1-1
With continued CMOS scaling, future shipped hardware will be increasingly vulnerable to in-the-field faults. To be broadly deployable, the hardware reliability solution must incur low overheads, precluding use of expensive redundancy. We explore a cooperat...
     
A study of interleaving coverage criteria
Found in: Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering (ESEC-FSE '07)
By Shan Lu, Weihang Jiang, Yuanyuan Zhou
Issue Date:September 2007
pp. 533-536
Concurrency bugs are becoming increasingly important due to the prevalence of concurrent programs. A fundamental problem of concurrent program bug detection and testing is that the interleaving space is too large to be thoroughly explored. Practical yet ef...
     
Cross-component energy management: Joint adaptation of processor and memory
Found in: ACM Transactions on Architecture and Code Optimization (TACO)
By Ritu Gupta, Sarita V. Adve, Xiaodong Li, Yuanyuan Zhou
Issue Date:September 2007
pp. 14-es
Researchers have proposed the use of adaptation to reduce the energy consumption of different hardware components, such as the processor, memory, disk, and display for general-purpose applications. Previous algorithms to control these adaptations, however,...
     
Rx: Treating bugs as allergies---a safe method to survive software failures
Found in: ACM Transactions on Computer Systems (TOCS)
By Feng Qin, Jagadeesan Sundaresan, Joseph Tucek, Yuanyuan Zhou
Issue Date:August 2007
pp. 7-es
Many applications demand availability. Unfortunately, software failures greatly reduce system availability. Prior work on surviving software failures suffers from one or more of the following limitations: required application restructuring, inability to ad...
     
Managing energy-performance tradeoffs for multithreaded applications on multiprocessor architectures
Found in: Proceedings of the 2007 ACM SIGMETRICS international conference on Measurement and modeling of computer systems (SIGMETRICS '07)
By Sarita Adve, Soyeon Park, Weihang Jiang, Yuanyuan Zhou
Issue Date:June 2007
pp. 169-180
In modern computers, non-performance metrics such as energy consumption have become increasingly important, requiring tradeoff with performance. A recent work has proposed performance-guaranteed energy management, but it is designed specifically for sequen...
     
 1  2 Next >>