{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T13:47:04Z","timestamp":1772113624088,"version":"3.50.1"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,9]]},"DOI":"10.1109\/icsm.2015.7332463","type":"proceedings-article","created":{"date-parts":[[2015,11,23]],"date-time":"2015-11-23T22:44:11Z","timestamp":1448318651000},"page":"171-180","source":"Crossref","is-referenced-by-count":21,"title":["Practical and accurate pinpointing of configuration errors using static analysis"],"prefix":"10.1109","author":[{"given":"Zhen","family":"Dong","sequence":"first","affiliation":[]},{"given":"Artur","family":"Andrzejak","sequence":"additional","affiliation":[]},{"given":"Kun","family":"Shao","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.63"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043572"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522727"},{"key":"ref31","first-page":"6","article-title":"Configuration debugging as search: Finding the needle in the haystack","author":"whitaker","year":"2004","journal-title":"Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation - Volume 6 OSDI'04"},{"key":"ref30","first-page":"439","article-title":"Program slicing","author":"weiser","year":"1981","journal-title":"Proceedings of the 5th International Conference on Software Engineering ICSE &#x2018;81"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606577"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541983"},{"key":"ref35","first-page":"28","article-title":"Context-based online configuration-error detection","author":"yuan","year":"2011","journal-title":"Proceedings of the 2011 USENIX Conference on USENIX Annual Technical Conference USENIXATC'll"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1735970.1736038"},{"key":"ref10","year":"0","journal-title":"HBase"},{"key":"ref11","author":"chord","year":"0"},{"key":"ref12","author":"johnson","year":"2010","journal-title":"More Details on Today's Outage | Facebook"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630084"},{"key":"ref14","first-page":"8:1","article-title":"Snitch: Interactive decision trees for troubleshooting misconfigurations","author":"mickens","year":"2007","journal-title":"Proceedings of the 2Nd USENIX Workshop on Tackling Computer Systems Problems with Machine Learning Techniques SYSML'07"},{"key":"ref15","first-page":"159","article-title":"Strider: A black-box, state-based approach to change and configuration management and support","author":"min wang","year":"2003","journal-title":"Usenix LISA"},{"key":"ref16","first-page":"5","article-title":"Understanding And Dealing With Operator Mistakes In Internet Services","author":"nagaraja","year":"2004","journal-title":"Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation- Volume 6 OSDI&#x2019; 04"},{"key":"ref17","first-page":"1","author":"oppenheimer","year":"2003","journal-title":"Proceedings of the 4th Conference on USENIX Symposium on Internet Technologies and Systems - Volume 4 USITS'03"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100053"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.73"},{"key":"ref28","year":"0","journal-title":"WALA"},{"key":"ref4","year":"0","journal-title":"CLOC"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/APNOMS.2012.6356072"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1718918.1718973"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2013.6688897"},{"key":"ref29","first-page":"245","article-title":"Automatic misconfiguration troubleshooting with peerpressure","author":"wang","year":"2004","journal-title":"OSDI"},{"key":"ref5","first-page":"23","article-title":"Automatic software fault diagnosis by exploiting application signatures","author":"ding","year":"2008","journal-title":"Proceedings of the 22Nd Conference on Large Installation System Administration Conference LISA'08"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/263698.264352"},{"key":"ref7","author":"gray","year":"1985","journal-title":"Why do computers stop and what can be done about it"},{"key":"ref2","first-page":"1","article-title":"Automating configuration troubleshooting with dynamic information flow analysis","author":"attariyan","year":"2010","journal-title":"Proceedings of the 9th USENIX Conference on Operating Systems Design and Implementation OSDI&#x2019; 10"},{"key":"ref9","year":"0","journal-title":"Hadoop"},{"key":"ref1","first-page":"281","article-title":"Using causality to diagnose configuration bugs","author":"attariyan","year":"2008","journal-title":"USENIX 2008 Annual Technical Conference on Annual Technical Conference ATC'08"},{"key":"ref20","year":"0","journal-title":"Randoop"},{"key":"ref22","year":"0","journal-title":"Stack Overflow"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463280"},{"key":"ref24","first-page":"17","article-title":"Automatically generating predicates and solutions for configuration troubleshooting","author":"su","year":"2009","journal-title":"Proceedings of the 2009 Conference on USENIX Annual Technical Conference USENIX'09"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294284"},{"key":"ref26","author":"team","year":"2011","journal-title":"Summary of the Amazon EC2 and Amazon RDS Service Disruption in the US East Region"},{"key":"ref25","author":"sverdlik","year":"2012","journal-title":"Microsoft 10 things you can do to improve your data centers"}],"event":{"name":"2015 IEEE International Conference on Software Maintenance and Evolution (ICSME)","location":"Bremen, Germany","start":{"date-parts":[[2015,9,29]]},"end":{"date-parts":[[2015,10,1]]}},"container-title":["2015 IEEE International Conference on Software Maintenance and Evolution (ICSME)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7321954\/7332440\/07332463.pdf?arnumber=7332463","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T21:38:33Z","timestamp":1490391513000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7332463\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,9]]},"references-count":38,"URL":"https:\/\/doi.org\/10.1109\/icsm.2015.7332463","relation":{},"subject":[],"published":{"date-parts":[[2015,9]]}}}