{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,5]],"date-time":"2025-10-05T04:15:03Z","timestamp":1759637703917,"version":"3.41.0"},"reference-count":20,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2010,1,27]],"date-time":"2010-01-27T00:00:00Z","timestamp":1264550400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGOPS Oper. Syst. Rev."],"published-print":{"date-parts":[[2010,1,27]]},"abstract":"<jats:p>Cloud9 aims to reduce the resource-intensive and laborintensive nature of high-quality software testing. First, Cloud9 parallelizes symbolic execution (an effective, but still poorly scalable test automation technique) to large shared-nothing clusters. To our knowledge, Cloud9 is the first symbolic execution engine that scales to large clusters of machines, thus enabling thorough automated testing of real software in conveniently short amounts of time. Preliminary results indicate one to two orders of magnitude speedup over a state-of-the-art symbolic execution engine. Second, Cloud9 is an on-demand software testing service: it runs on compute clouds, like Amazon EC2, and scales its use of resources over a wide dynamic range, proportionally with the testing task at hand.<\/jats:p>","DOI":"10.1145\/1713254.1713257","type":"journal-article","created":{"date-parts":[[2010,2,2]],"date-time":"2010-02-02T13:33:51Z","timestamp":1265117631000},"page":"5-10","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":121,"title":["Cloud9"],"prefix":"10.1145","volume":"43","author":[{"given":"Liviu","family":"Ciortea","sequence":"first","affiliation":[{"name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne (EPFL), Switzerland"}]},{"given":"Cristian","family":"Zamfir","sequence":"additional","affiliation":[{"name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne (EPFL), Switzerland"}]},{"given":"Stefan","family":"Bucur","sequence":"additional","affiliation":[{"name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne (EPFL), Switzerland"}]},{"given":"Vitaly","family":"Chipounov","sequence":"additional","affiliation":[{"name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne (EPFL), Switzerland"}]},{"given":"George","family":"Candea","sequence":"additional","affiliation":[{"name":"\u00c9cole Polytechnique F\u00e9d\u00e9rale de Lausanne (EPFL), Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2010,1,27]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Amazon EC2. http:\/\/aws.amazon.com\/ec2.  Amazon EC2. http:\/\/aws.amazon.com\/ec2."},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1770532.1770550"},{"volume-title":"Intl. SPIN Workshop","year":"2001","author":"Barnat J.","key":"e_1_2_1_3_1"},{"volume-title":"Symp. on Operating Systems Design and Implementation","year":"2008","author":"Cadar C.","key":"e_1_2_1_4_1"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180445"},{"volume-title":"Workshop on Hot Topics in Dependable Systems","year":"2009","author":"Chipounov V.","key":"e_1_2_1_6_1"},{"key":"e_1_2_1_7_1","unstructured":"Eucalyptus software. http:\/\/open.eucalyptus.com\/.  Eucalyptus software. http:\/\/open.eucalyptus.com\/."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1047659.1040315"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263717"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.9"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"volume-title":"Intl. Workshop on Parallel and Distributed Methods in Verification","year":"2004","author":"Kumar R.","key":"e_1_2_1_13_1"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.41"},{"key":"e_1_2_1_16_1","unstructured":"S. McConnell. Code Complete chapter 3. Microsoft Press 2004.  S. McConnell. Code Complete chapter 3. Microsoft Press 2004."},{"volume-title":"http:\/\/www.redhat.com\/security\/updates\/classification\/","year":"2005","key":"e_1_2_1_17_1"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321746"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.5555\/647766.736020"},{"key":"e_1_2_1_20_1","unstructured":"Underwriters Labs. http:\/\/www.ul.com.  Underwriters Labs. http:\/\/www.ul.com."}],"container-title":["ACM SIGOPS Operating Systems Review"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1713254.1713257","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1713254.1713257","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:41:35Z","timestamp":1750250495000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1713254.1713257"}},"subtitle":["a software testing service"],"short-title":[],"issued":{"date-parts":[[2010,1,27]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2010,1,27]]}},"alternative-id":["10.1145\/1713254.1713257"],"URL":"https:\/\/doi.org\/10.1145\/1713254.1713257","relation":{},"ISSN":["0163-5980"],"issn-type":[{"type":"print","value":"0163-5980"}],"subject":[],"published":{"date-parts":[[2010,1,27]]},"assertion":[{"value":"2010-01-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}