{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:46:32Z","timestamp":1772163992655,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,4,1]],"date-time":"2008-04-01T00:00:00Z","timestamp":1207008000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,4]]},"DOI":"10.1145\/1352592.1352612","type":"proceedings-article","created":{"date-parts":[[2008,4,1]],"date-time":"2008-04-01T12:11:28Z","timestamp":1207051888000},"page":"177-190","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Hang analysis"],"prefix":"10.1145","author":[{"given":"Xi","family":"Wang","sequence":"first","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Zhenyu","family":"Guo","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia, Beijing, China"}]},{"given":"Xuezheng","family":"Liu","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia, Beijing, China"}]},{"given":"Zhilei","family":"Xu","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Haoxiang","family":"Lin","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia, Beijing, China"}]},{"given":"Xiaoge","family":"Wang","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Zheng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2008,4]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Phoenix compiler framework. http:\/\/research.microsoft.com\/phoenix\/.  Phoenix compiler framework. http:\/\/research.microsoft.com\/phoenix\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945454"},{"key":"e_1_3_2_1_3_1","volume-title":"Workshop on Hot Topics in Operating Systems (HotOS XI)","author":"Anderson Z.","year":"2007","unstructured":"Z. Anderson , E. Brewer , J. Condit , R. Ennals , D. Gay , M. Harren , G. C. Necula , and F. Zhou . Beyond bug-finding: Sound program analysis for Linux . In Workshop on Hot Topics in Operating Systems (HotOS XI) , 2007 . Z. Anderson, E. Brewer, J. Condit, R. Ennals, D. Gay, M. Harren, G. C. Necula, and F. Zhou. Beyond bug-finding: Sound program analysis for Linux. In Workshop on Hot Topics in Operating Systems (HotOS XI), 2007."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217943"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503274"},{"key":"e_1_3_2_1_6_1","volume-title":"USENIX Symposium on Operating Systems Design and Implementation (OSDI'04)","author":"Barham P.","year":"2004","unstructured":"P. Barham , A. Donnelly , R. Isaacs , and R. Mortier . Using Magpie for request extraction and workload modelling . In USENIX Symposium on Operating Systems Design and Implementation (OSDI'04) , 2004 . P. Barham, A. Donnelly, R. Isaacs, and R. Mortier. Using Magpie for request extraction and workload modelling. In USENIX Symposium on Operating Systems Design and Implementation (OSDI'04), 2004."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1361442.1361446"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1986.1676819"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273001"},{"key":"e_1_3_2_1_10_1","volume-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI'04)","author":"Chen M. Y.","year":"2004","unstructured":"M. Y. Chen , A. Accardi , E. K1c1man, J. Lloyd , D. Patterson , A. Fox , and E. Brewer . Path-based failure and evolution management . In USENIX Symposium on Networked Systems Design and Implementation (NSDI'04) , 2004 . M. Y. Chen, A. Accardi, E. K1c1man, J. Lloyd, D. Patterson, A. Fox, and E. Brewer. Path-based failure and evolution management. In USENIX Symposium on Networked Systems Design and Implementation (NSDI'04), 2004."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134029"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250771"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512538"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250784"},{"key":"e_1_3_2_1_15_1","volume-title":"USENIX Annual Technical Conference (USENIX'04)","author":"Elmeleegy K.","year":"2004","unstructured":"K. Elmeleegy , A. Chanda , A. L. Cox , and W. Zwaenepoel . Lazy asynchronous I\/O for event-driven servers . In USENIX Annual Technical Conference (USENIX'04) , 2004 . K. Elmeleegy, A. Chanda, A. L. Cox, and W. Zwaenepoel. Lazy asynchronous I\/O for event-driven servers. In USENIX Annual Technical Conference (USENIX'04), 2004."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/339331.339420"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945468"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502041"},{"key":"e_1_3_2_1_19_1","volume-title":"ISOC Network and Distributed System Security Symposium (NDSS'08)","author":"Godefroid P.","year":"2008","unstructured":"P. Godefroid , M. Y. Levin , and D. Molnar . Automated whitebox fuzz testing . In ISOC Network and Distributed System Security Symposium (NDSS'08) , 2008 . P. Godefroid, M. Y. Levin, and D. Molnar. Automated whitebox fuzz testing. In ISOC Network and Distributed System Security Symposium (NDSS'08), 2008."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134319"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512539"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503279"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1251535.1251537"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065167.1065169"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2004.1293079"},{"key":"e_1_3_2_1_28_1","volume-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI'08)","author":"Liu X.","year":"2008","unstructured":"X. Liu , Z. Guo , X. Wang , F. Chen , X. Lian , J. Tang , M. Wu , and Z. Zhang . D3S: Debugging deployed distributed systems . In USENIX Symposium on Networked Systems Design and Implementation (NSDI'08) , 2008 . X. Liu, Z. Guo, X. Wang, F. Chen, X. Lian, J. Tang, M. Wu, and Z. Zhang. D3S: Debugging deployed distributed systems. In USENIX Symposium on Networked Systems Design and Implementation (NSDI'08), 2008."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1007\/11575467_11"},{"key":"e_1_3_2_1_30_1","unstructured":"G. Maffeo and P. Sliwowicz. Win32 I\/O cancellation support in Windows Vista. http:\/\/msdn2.microsoft.com\/en-us\/library\/aa480216.aspx 2005.  G. Maffeo and P. Sliwowicz. Win32 I\/O cancellation support in Windows Vista. http:\/\/msdn2.microsoft.com\/en-us\/library\/aa480216.aspx 2005."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094840"},{"key":"e_1_3_2_1_32_1","volume-title":"USENIX Annual Technical Conference (USENIX'99)","author":"Pai V. S.","year":"1999","unstructured":"V. S. Pai , P. Druschely , and W. Zwaenepoely . Flash: An efficient and portable Web server . In USENIX Annual Technical Conference (USENIX'99) , 1999 . V. S. Pai, P. Druschely, and W. Zwaenepoely. Flash: An efficient and portable Web server. In USENIX Annual Technical Conference (USENIX'99), 1999."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273021"},{"key":"e_1_3_2_1_34_1","volume-title":"Applications of Logic Databases","author":"Reps T.","year":"1994","unstructured":"T. Reps . Demand interprocedural program analysis using logic databases. In R. Ramakrishnan, editor, Applications of Logic Databases . Kluwer Academic Publishers , 1994 . T. Reps. Demand interprocedural program analysis using logic databases. In R. Ramakrishnan, editor, Applications of Logic Databases. Kluwer Academic Publishers, 1994."},{"key":"e_1_3_2_1_35_1","volume-title":"USENIX Security Symposium (Security'01)","author":"Shankar U.","year":"2001","unstructured":"U. Shankar , K. Talwar , J. S. Foster , and D. Wagner . Detecting format-string vulnerabilities with type qualifiers . In USENIX Security Symposium (Security'01) , 2001 . U. Shankar, K. Talwar, J. S. Foster, and D. Wagner. Detecting format-string vulnerabilities with type qualifiers. In USENIX Security Symposium (Security'01), 2001."},{"key":"e_1_3_2_1_36_1","volume-title":"Principles of Database and Knowledge-Base Systems","author":"Ullman J. D.","year":"1989","unstructured":"J. D. Ullman . Principles of Database and Knowledge-Base Systems , volume II . Computer Science Press , 1989 . J. D. Ullman. Principles of Database and Knowledge-Base Systems, volume II. Computer Science Press, 1989."},{"key":"e_1_3_2_1_37_1","volume-title":"USENIX Symposium on Operating Systems Design and Implementation (OSDI'04)","author":"Wang H. J.","year":"2004","unstructured":"H. J. Wang , J. C. Platt , Y. Chen , R. Zhang , and Y.-M. Wang . Automatic misconfiguration troubleshooting with PeerPressure . In USENIX Symposium on Operating Systems Design and Implementation (OSDI'04) , 2004 . H. J. Wang, J. C. Platt, Y. Chen, R. Zhang, and Y.-M. Wang. Automatic misconfiguration troubleshooting with PeerPressure. In USENIX Symposium on Operating Systems Design and Implementation (OSDI'04), 2004."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250739"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996859"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/11531142_26"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040334"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217972"},{"key":"e_1_3_2_1_44_1","volume-title":"USENIX Annual Technical Conference (USENIX'03)","author":"Zeldovich N.","year":"2003","unstructured":"N. Zeldovich , A. Yip , F. Dabek , R. T. Morris , D. Mazi\u00e9resy , and M. F. Kaashoek . Multiprocessor support for event-driven programs . In USENIX Annual Technical Conference (USENIX'03) , 2003 . N. Zeldovich, A. Yip, F. Dabek, R. T. Morris, D. Mazi\u00e9resy, and M. F. Kaashoek. Multiprocessor support for event-driven programs. In USENIX Annual Technical Conference (USENIX'03), 2003."},{"key":"e_1_3_2_1_45_1","volume-title":"USENIX Symposium on Operating System Design and Implementation (OSDI'06)","author":"Zhou F.","year":"2006","unstructured":"F. Zhou , J. Condit , Z. Anderson , I. Bagrak , R. Ennals , M. Harren , G. Necula , and E. Brewer . SafeDrive: Safe and recoverable extensions using language-based techniques . In USENIX Symposium on Operating System Design and Implementation (OSDI'06) , 2006 . F. Zhou, J. Condit, Z. Anderson, I. Bagrak, R. Ennals, M. Harren, G. Necula, and E. Brewer. SafeDrive: Safe and recoverable extensions using language-based techniques. In USENIX Symposium on Operating System Design and Implementation (OSDI'06), 2006."}],"event":{"name":"Eurosys '08: Eurosys 2008 Conference","location":"Glasgow Scotland UK","acronym":"Eurosys '08","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","ACM Association for Computing Machinery"]},"container-title":["Proceedings of the 3rd ACM SIGOPS\/EuroSys European Conference on Computer Systems 2008"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1352592.1352612","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1352592.1352612","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:56:19Z","timestamp":1750240579000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1352592.1352612"}},"subtitle":["fighting responsiveness bugs"],"short-title":[],"issued":{"date-parts":[[2008,4]]},"references-count":42,"alternative-id":["10.1145\/1352592.1352612","10.1145\/1352592"],"URL":"https:\/\/doi.org\/10.1145\/1352592.1352612","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1357010.1352612","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2008,4]]},"assertion":[{"value":"2008-04-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}