{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:34:22Z","timestamp":1750307662695,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,9,15]],"date-time":"2008-09-15T00:00:00Z","timestamp":1221436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CCF-0448413CNS-0615045CCF-0621472"],"award-info":[{"award-number":["CCF-0448413CNS-0615045CCF-0621472"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CCF-0448413CNS-0615045CCF-0621472"],"award-info":[{"award-number":["CCF-0448413CNS-0615045CCF-0621472"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,9,15]]},"DOI":"10.1145\/1529974.1529987","type":"proceedings-article","created":{"date-parts":[[2009,4,21]],"date-time":"2009-04-21T14:17:17Z","timestamp":1240323437000},"page":"1-5","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Configuration-space performance anomaly depiction"],"prefix":"10.1145","author":[{"given":"Christopher","family":"Stewart","sequence":"first","affiliation":[{"name":"University of Rochester"}]},{"given":"Kai","family":"Shen","sequence":"additional","affiliation":[{"name":"University of Rochester"}]},{"given":"Arun","family":"Iyengar","sequence":"additional","affiliation":[{"name":"IBM Watson Research Center"}]},{"given":"Jian","family":"Yin","sequence":"additional","affiliation":[{"name":"IBM Watson Research Center"}]}],"member":"320","published-online":{"date-parts":[[2008,9,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945454"},{"key":"e_1_3_2_1_2_1","first-page":"309","volume-title":"Path-Based Failure and Evolution Management. In USENIX Symp. on Networked Systems Design and Implementation","author":"Chen M.","year":"2004","unstructured":"M. Chen , A. Accardi , E. Kiciman , J. Lloyd , D. Patterson , A. Fox , and E. Brewer . Path-Based Failure and Evolution Management. In USENIX Symp. on Networked Systems Design and Implementation , pages 309 -- 322 , San Francisco, CA , Mar. 2004 . M. Chen, A. Accardi, E. Kiciman, J. Lloyd, D. Patterson, A. Fox, and E. Brewer. Path-Based Failure and Evolution Management. In USENIX Symp. on Networked Systems Design and Implementation, pages 309--322, San Francisco, CA, Mar. 2004."},{"key":"e_1_3_2_1_3_1","first-page":"231","volume-title":"USENIX Symp. on Operating Systems Design and Implementation","author":"Cohen I.","year":"2004","unstructured":"I. Cohen , J. Chase , M. Goldszmidt , T. Kelly , and J. Symons . Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control . In USENIX Symp. on Operating Systems Design and Implementation , pages 231 -- 244 , San Francisco, CA , Dec. 2004 . I. Cohen, J. Chase, M. Goldszmidt, T. Kelly, and J. Symons. Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control. In USENIX Symp. on Operating Systems Design and Implementation, pages 231--244, San Francisco, CA, Dec. 2004."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/71.774912"},{"key":"e_1_3_2_1_5_1","volume-title":"USENIX Symp. on Internet Technologies and Systems","author":"Doyle R.","year":"2003","unstructured":"R. Doyle , J. Chase , O. Asad , W. Jin , and A. Vahdat . Model-based Resource Provisioning in a Web Service Utility . In USENIX Symp. on Internet Technologies and Systems , Seattle, WA , Mar. 2003 . R. Doyle, J. Chase, O. Asad, W. Jin, and A. Vahdat. Model-based Resource Provisioning in a Web Service Utility. In USENIX Symp. on Internet Technologies and Systems, Seattle, WA, Mar. 2003."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502041"},{"key":"e_1_3_2_1_7_1","first-page":"187","volume-title":"The Coign Automatic Distributed Partitioning System. In USENIX Symp. on Operating Systems Design and Implementation","author":"Hunt G. C.","year":"1999","unstructured":"G. C. Hunt and M. L. Scott . The Coign Automatic Distributed Partitioning System. In USENIX Symp. on Operating Systems Design and Implementation , pages 187 -- 200 , New Orleans, LA , Feb. 1999 . G. C. Hunt and M. L. Scott. The Coign Automatic Distributed Partitioning System. In USENIX Symp. on Operating Systems Design and Implementation, pages 187--200, New Orleans, LA, Feb. 1999."},{"key":"e_1_3_2_1_8_1","unstructured":"IBM Autonomic Computing. http:\/\/www.research.ibm.com\/autonomic\/.  IBM Autonomic Computing. http:\/\/www.research.ibm.com\/autonomic\/."},{"key":"e_1_3_2_1_9_1","unstructured":"The JBoss J2EE Application Server. http:\/\/www.jboss.com.  The JBoss J2EE Application Server. http:\/\/www.jboss.com."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/279227.279229"},{"key":"e_1_3_2_1_11_1","first-page":"289","volume-title":"CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code. In USENIX Symp. on Operating Systems Design and Implementation","author":"Li Z.","year":"2004","unstructured":"Z. Li , S. Lu , S. Myagmar , and Y. Zhou . CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code. In USENIX Symp. on Operating Systems Design and Implementation , pages 289 -- 302 , San Francisco, CA , Dec. 2004 . Z. Li, S. Lu, S. Myagmar, and Y. Zhou. CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code. In USENIX Symp. on Operating Systems Design and Implementation, pages 289--302, San Francisco, CA, Dec. 2004."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022643204877"},{"key":"e_1_3_2_1_13_1","first-page":"91","volume-title":"Chain Replication for Supporting High Throughput and Availability. In USENIX Symp. on Operating Systems Design and Implementation","author":"Renesse R.","year":"2004","unstructured":"R. Renesse and F. Schneider . Chain Replication for Supporting High Throughput and Availability. In USENIX Symp. on Operating Systems Design and Implementation , pages 91 -- 104 , San Francisco, CA , Dec. 2004 . R. Renesse and F. Schneider. Chain Replication for Supporting High Throughput and Availability. In USENIX Symp. on Operating Systems Design and Implementation, pages 91--104, San Francisco, CA, Dec. 2004."},{"key":"e_1_3_2_1_14_1","volume-title":"Pip: Detecting the Unexpected in Distributed Systems. In USENIX Symp. on Networked Systems Design and Implementation","author":"Reynolds P.","year":"2006","unstructured":"P. Reynolds , C. Killian , J. Wiener , J. Mogul , M. Shah , and A. Vahdat . Pip: Detecting the Unexpected in Distributed Systems. In USENIX Symp. on Networked Systems Design and Implementation , San Jose, CA , May 2006 . P. Reynolds, C. Killian, J. Wiener, J. Mogul, M. Shah, and A. Vahdat. Pip: Detecting the Unexpected in Distributed Systems. In USENIX Symp. on Networked Systems Design and Implementation, San Jose, CA, May 2006."},{"key":"e_1_3_2_1_15_1","unstructured":"RUBiS: Rice University Bidding System. http:\/\/rubis.objectweb.org.  RUBiS: Rice University Bidding System. http:\/\/rubis.objectweb.org."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/98163.98167"},{"key":"e_1_3_2_1_17_1","first-page":"309","volume-title":"USENIX Conf. on File and Storage Technologies","author":"Shen K.","year":"2005","unstructured":"K. Shen , M. Zhong , and C. Li . I\/O System Performance Debugging Using Model-driven Anomaly Characterization . In USENIX Conf. on File and Storage Technologies , pages 309 -- 322 , San Francisco, CA , Dec. 2005 . K. Shen, M. Zhong, and C. Li. I\/O System Performance Debugging Using Model-driven Anomaly Characterization. In USENIX Conf. on File and Storage Technologies, pages 309--322, San Francisco, CA, Dec. 2005."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273002"},{"key":"e_1_3_2_1_19_1","volume-title":"USENIX Annual Technical Conf.","author":"Stewart C.","year":"2008","unstructured":"C. Stewart , T. Kelly , A. Zhang , and K. Shen . A Dollar from 15 Cents: Cross-Platform Management for Internet Services . In USENIX Annual Technical Conf. , Boston, MA , June 2008 . C. Stewart, T. Kelly, A. Zhang, and K. Shen. A Dollar from 15 Cents: Cross-Platform Management for Internet Services. In USENIX Annual Technical Conf., Boston, MA, June 2008."},{"key":"e_1_3_2_1_20_1","first-page":"71","volume-title":"Performance Modeling and System Management for Multi-component Online Services. In USENIX Symp. on Networked Systems Design and Implementation","author":"Stewart C.","year":"2005","unstructured":"C. Stewart and K. Shen . Performance Modeling and System Management for Multi-component Online Services. In USENIX Symp. on Networked Systems Design and Implementation , pages 71 -- 84 , Boston, MA , May 2005 . C. Stewart and K. Shen. Performance Modeling and System Management for Multi-component Online Services. In USENIX Symp. on Networked Systems Design and Implementation, pages 71--84, Boston, MA, May 2005."},{"key":"e_1_3_2_1_21_1","volume-title":"Comprehensive Depiction of Configuration-dependent Performance Anomalies in Distributed Server Systems. In Second Workshop on Hot Topics in System Dependability","author":"Stewart C.","year":"2006","unstructured":"C. Stewart , M. Zhong , K. Shen , and T. O'Neill . Comprehensive Depiction of Configuration-dependent Performance Anomalies in Distributed Server Systems. In Second Workshop on Hot Topics in System Dependability , Seattle, WA , Nov. 2006 . C. Stewart, M. Zhong, K. Shen, and T. O'Neill. Comprehensive Depiction of Configuration-dependent Performance Anomalies in Distributed Server Systems. In Second Workshop on Hot Topics in System Dependability, Seattle, WA, Nov. 2006."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375457.1375486"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064212.1064252"}],"event":{"name":"LADIS '08: Conference on Large Scale Distributed Systems and Middleware","sponsor":["IBMR IBM Research"],"location":"Yorktown Heights New York USA","acronym":"LADIS '08"},"container-title":["Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1529974.1529987","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1529974.1529987","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:29:30Z","timestamp":1750253370000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1529974.1529987"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9,15]]},"references-count":23,"alternative-id":["10.1145\/1529974.1529987","10.1145\/1529974"],"URL":"https:\/\/doi.org\/10.1145\/1529974.1529987","relation":{},"subject":[],"published":{"date-parts":[[2008,9,15]]},"assertion":[{"value":"2008-09-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}