{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:28:12Z","timestamp":1750746492364,"version":"3.37.3"},"reference-count":27,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["61690203","61532007"],"award-info":[{"award-number":["61690203","61532007"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"name":"National 973 Program of China","award":["2014CB340703"],"award-info":[{"award-number":["2014CB340703"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/tr.2018.2834419","type":"journal-article","created":{"date-parts":[[2018,6,15]],"date-time":"2018-06-15T19:22:40Z","timestamp":1529090560000},"page":"832-846","source":"Crossref","is-referenced-by-count":8,"title":["Do You Really Know How to Configure Your Software? Configuration Constraints in Source Code May Help"],"prefix":"10.1109","volume":"67","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6125-3330","authenticated-orcid":false,"given":"Xiangke","family":"Liao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6199-5123","authenticated-orcid":false,"given":"Shulin","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Shanshan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Zhouyang","family":"Jia","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9800-6886","authenticated-orcid":false,"given":"Xiaodong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Haochen","family":"He","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227206"},{"year":"2017","key":"ref11"},{"year":"2017","key":"ref12"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786852"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522727"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985812"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541983"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2791577"},{"key":"ref18","first-page":"88","article-title":"Conftest:\n Generating comprehensive misconfiguration for system reaction ability evaluation","author":"li","year":"0","journal-title":"Proc Int Conf Eval Assessment Softw Eng"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C.2016.35"},{"key":"ref4","first-page":"61","article-title":"Understanding and dealing with operator mistakes in internet\n services","author":"nagaraja","year":"0","journal-title":"Proc Symp Oper Syst Des Implementation"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3084226.3084276"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.73"},{"article-title":"Summary of the amazon EC2 and amazon RDS service disruption in the\n us east region. amazon web services","year":"2011","author":"team","key":"ref6"},{"key":"ref5","first-page":"165","article-title":"Why\n do internet services fail, and what can be done about it","author":"oppenheimer","year":"0","journal-title":"Proc Usenix Symp Internet Technology and Systems"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2013.6688897"},{"key":"ref7","first-page":"619","article-title":"Early detection of configuration errors to reduce failure\n damage","author":"xu","year":"0","journal-title":"Proc USENIX Symp Operat Syst Des Implement"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.2200\/S00193ED1V01Y200905CAC006"},{"key":"ref9","first-page":"1?8","article-title":"Snitch:\n Interactive decision trees for troubleshooting misconfigurations","author":"mickens","year":"0","journal-title":"Proc Usenix Workshop Tackling Comput Syst Problems Mach Learn Tech"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043572"},{"year":"2017","key":"ref20"},{"year":"2017","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884841"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630084"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2014.17"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606577"},{"key":"ref25","first-page":"12","article-title":"Proactive detection of inadequate diagnostic messages for software configuration errors","author":"zhang","year":"0","journal-title":"Proc Int'l Symp on Softw Testing and Analysis"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/8452065\/08386697.pdf?arnumber=8386697","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T13:56:34Z","timestamp":1643205394000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8386697\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":27,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tr.2018.2834419","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"type":"print","value":"0018-9529"},{"type":"electronic","value":"1558-1721"}],"subject":[],"published":{"date-parts":[[2018,9]]}}}