{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T16:12:08Z","timestamp":1774627928141,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":42,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,10,23]],"date-time":"2011-10-23T00:00:00Z","timestamp":1319328000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0720743CCF-0325603CNS-0615372CNS-03478541017784"],"award-info":[{"award-number":["CNS-0720743CCF-0325603CNS-0615372CNS-03478541017784"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CNS-0720743CCF-0325603CNS-0615372CNS-03478541017784"],"award-info":[{"award-number":["CNS-0720743CCF-0325603CNS-0615372CNS-03478541017784"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,10,23]]},"DOI":"10.1145\/2043556.2043572","type":"proceedings-article","created":{"date-parts":[[2011,10,25]],"date-time":"2011-10-25T12:23:06Z","timestamp":1319545386000},"page":"159-172","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":189,"title":["An empirical study on configuration errors in commercial and open source systems"],"prefix":"10.1145","author":[{"given":"Zuoning","family":"Yin","sequence":"first","affiliation":[{"name":"Univ. of Illinois at Urbana-Champaign"}]},{"given":"Xiao","family":"Ma","sequence":"additional","affiliation":[{"name":"Univ. of Illinois at Urbana-Champaign"}]},{"given":"Jing","family":"Zheng","sequence":"additional","affiliation":[{"name":"Univ. of California, San Diego"}]},{"given":"Yuanyuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Univ. of California, San Diego"}]},{"given":"Lakshmi N.","family":"Bairavasundaram","sequence":"additional","affiliation":[{"name":"NetApp, Inc."}]},{"given":"Shankar","family":"Pasupathy","sequence":"additional","affiliation":[{"name":"NetApp, Inc."}]}],"member":"320","published-online":{"date-parts":[[2011,10,23]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"LISA","author":"Anderson P.","year":"2003","unstructured":"P. Anderson , P. Goldsack , and J. Paterson . SmartFrog meets LCFG Autonomous Reconfiguration with Central Policy Control . In LISA , August 2003 . P. Anderson, P. Goldsack, and J. Paterson. SmartFrog meets LCFG Autonomous Reconfiguration with Central Policy Control. In LISA, August 2003."},{"key":"e_1_3_2_1_2_1","volume-title":"USENIX","author":"Attariyan M.","year":"2008","unstructured":"M. Attariyan and J. Flinn . Using causality to diagnose configuration bugs . In USENIX , June 2008 . M. Attariyan and J. Flinn. Using causality to diagnose configuration bugs. In USENIX, June 2008."},{"key":"e_1_3_2_1_3_1","volume-title":"OSDI","author":"Attariyan M.","year":"2010","unstructured":"M. Attariyan and J. Flinn . Automating configuration troubleshooting with dynamic information flow analysis . In OSDI , October 2010 . M. Attariyan and J. Flinn. Automating configuration troubleshooting with dynamic information flow analysis. In OSDI, October 2010."},{"key":"e_1_3_2_1_4_1","volume-title":"USENIX","author":"Brown A. B.","year":"2003","unstructured":"A. B. Brown and D. A. Patterson . Undo for Operators: Building an Undoable E-mail Store . In USENIX , June 2003 . A. B. Brown and D. A. Patterson. Undo for Operators: Building an Undoable E-mail Store. In USENIX, June 2003."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502042"},{"key":"e_1_3_2_1_6_1","unstructured":"CircleID. Misconfiguration brings down entire se domain in sweden. www.circleid.com\/posts\/misconfiguration_brings_down_entire_se_domain_in_sweden\/.  CircleID. Misconfiguration brings down entire se domain in sweden. www.circleid.com\/posts\/misconfiguration_brings_down_entire_se_domain_in_sweden\/."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294283"},{"key":"e_1_3_2_1_8_1","unstructured":"Debian. The Debian GNU\/Linux FAQ Chapter 8: The Debian Package Management Tools. http:\/\/www.debian.org\/doc\/FAQ\/ch-pkgtools.en.html.  Debian. The Debian GNU\/Linux FAQ Chapter 8: The Debian Package Management Tools. http:\/\/www.debian.org\/doc\/FAQ\/ch-pkgtools.en.html."},{"key":"e_1_3_2_1_9_1","volume-title":"NSDI","author":"Feamster N.","year":"2005","unstructured":"N. Feamster and H. Balakrishnan . Detecting BGP configuration faults with static analysis . In NSDI , May 2005 . N. Feamster and H. Balakrishnan. Detecting BGP configuration faults with static analysis. In NSDI, May 2005."},{"key":"e_1_3_2_1_10_1","volume-title":"Statistics","author":"Freedman D.","year":"1997","unstructured":"D. Freedman , R. Pisani , and R. Purves . Statistics , 3 rd Edition. W. W. Norton & Company ., 1997 . D. Freedman, R. Pisani, and R. Purves. Statistics, 3rd Edition. W. W. Norton & Company., 1997.","edition":"3"},{"key":"e_1_3_2_1_11_1","volume-title":"Symp. on Reliability in Distributed Software and Database Systems","author":"Gray J.","year":"1986","unstructured":"J. Gray . Why do computers stop and what can be done about it ? In Symp. on Reliability in Distributed Software and Database Systems , 1986 . J. Gray. Why do computers stop and what can be done about it? In Symp. on Reliability in Distributed Software and Database Systems, 1986."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250747"},{"key":"e_1_3_2_1_13_1","unstructured":"Hewlett-Packard. HP Storage Essentials SRM Software Suite. http:\/\/h18000.www1.hp.com\/products\/quickspecs\/12191_na\/12191_na.pdf.  Hewlett-Packard. HP Storage Essentials SRM Software Suite. http:\/\/h18000.www1.hp.com\/products\/quickspecs\/12191_na\/12191_na.pdf."},{"key":"e_1_3_2_1_14_1","unstructured":"IBM Corp. IBM Tivoli Software. http:\/\/www-01.ibm.com\/software\/tivoli\/.  IBM Corp. IBM Tivoli Software. http:\/\/www-01.ibm.com\/software\/tivoli\/."},{"key":"e_1_3_2_1_15_1","unstructured":"R. Johnson. More details on today's outage. http:\/\/www.facebook.com\/notes\/facebook-engineering\/more-details-on-todays-outage\/431441338919.  R. Johnson. More details on today's outage. http:\/\/www.facebook.com\/notes\/facebook-engineering\/more-details-on-todays-outage\/431441338919."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630084"},{"key":"e_1_3_2_1_18_1","volume-title":"OSDI","author":"Kushman N.","year":"2010","unstructured":"N. Kushman and D. Katabi . Enabling Configuration-Independent Automation by Non-Expert Users . In OSDI , October 2010 . N. Kushman and D. Katabi. Enabling Configuration-Independent Automation by Non-Expert Users. In OSDI, October 2010."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346323"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijhcs.2005.04.009"},{"key":"e_1_3_2_1_21_1","volume-title":"Microsoft Baseline Security Analyzer","author":"Microsoft Corp.","year":"2008","unstructured":"Microsoft Corp. Microsoft Baseline Security Analyzer . 2008 . http:\/\/www.microsoft.com\/technet\/security\/tools\/MBSAHome.mspx. Microsoft Corp. Microsoft Baseline Security Analyzer. 2008. http:\/\/www.microsoft.com\/technet\/security\/tools\/MBSAHome.mspx."},{"key":"e_1_3_2_1_22_1","volume-title":"Quality and Reliability Engineering International, 11(5)","author":"Murphy B.","year":"1995","unstructured":"B. Murphy and T. Gent . Measuring system and software reliability using an automated data collection process . In Quality and Reliability Engineering International, 11(5) , 1995 . B. Murphy and T. Gent. Measuring system and software reliability using an automated data collection process. In Quality and Reliability Engineering International, 11(5), 1995."},{"key":"e_1_3_2_1_23_1","volume-title":"Understanding and Dealing with Operator Mistakes in Internet Services. In OSDI'04","author":"Nagaraja K.","year":"2004","unstructured":"K. Nagaraja , F. Oliveira , R. Bianchini , R. P. Martin , and T. D. Nguyen . Understanding and Dealing with Operator Mistakes in Internet Services. In OSDI'04 , October 2004 . K. Nagaraja, F. Oliveira, R. Bianchini, R. P. Martin, and T. D. Nguyen. Understanding and Dealing with Operator Mistakes in Internet Services. In OSDI'04, October 2004."},{"key":"e_1_3_2_1_24_1","unstructured":"NetApp Inc. Proactive Health Management with AutoSupport. http:\/\/media.netapp.com\/documents\/wp-7027.pdf.  NetApp Inc. Proactive Health Management with AutoSupport. http:\/\/media.netapp.com\/documents\/wp-7027.pdf."},{"key":"e_1_3_2_1_25_1","unstructured":"NetApp Inc. Protection Manager. http:\/\/www.netapp.com\/us\/products\/management-software\/protection.html.  NetApp Inc. Protection Manager. http:\/\/www.netapp.com\/us\/products\/management-software\/protection.html."},{"key":"e_1_3_2_1_26_1","unstructured":"NetApp Inc. Provisioning Manager. http:\/\/www.netapp.com\/us\/products\/management-software\/provisioning.html.  NetApp Inc. Provisioning Manager. http:\/\/www.netapp.com\/us\/products\/management-software\/provisioning.html."},{"key":"e_1_3_2_1_27_1","volume-title":"Understanding and Validating Database System Administration. In USENIX'06","author":"Oliveira F.","year":"2006","unstructured":"F. Oliveira , K. Nagaraja , R. Bachwani , R. Bianchini , R. P. Martin , and T. D. Nguyen . Understanding and Validating Database System Administration. In USENIX'06 , 2006 . F. Oliveira, K. Nagaraja, R. Bachwani, R. Bianchini, R. P. Martin, and T. D. Nguyen. Understanding and Validating Database System Administration. In USENIX'06, 2006."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755924"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251460.1251461"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985812"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555228.1555269"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806864"},{"key":"e_1_3_2_1_34_1","unstructured":"RPM. Rpm package manager (rpm). http:\/\/rpm.org\/.  RPM. Rpm package manager (rpm). http:\/\/rpm.org\/."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294284"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1991.146625"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/FTCS.1992.243586"},{"key":"e_1_3_2_1_38_1","volume-title":"Wang. Automatic Misconfiguration Troubleshooting with PeerPressure. In OSDI'04","author":"Wang H. J.","year":"2004","unstructured":"H. J. Wang , J. C. Platt , Y. Chen , R. Zhang , and Y.- M. Wang. Automatic Misconfiguration Troubleshooting with PeerPressure. In OSDI'04 , October 2004 . H. J. Wang, J. C. Platt, Y. Chen, R. Zhang, and Y.-M. Wang. Automatic Misconfiguration Troubleshooting with PeerPressure. In OSDI'04, October 2004."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455770.1455802"},{"key":"e_1_3_2_1_40_1","volume-title":"LISA'03","author":"Wang Y.-M.","year":"2003","unstructured":"Y.-M. Wang , C. Verbowski , J. Dunagan , Y. Chen , H. J. Wang , C. Yuan , and Z. Zhang . STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support . In LISA'03 , October 2003 . Y.-M. Wang, C. Verbowski, J. Dunagan, Y. Chen, H. J. Wang, C. Yuan, and Z. Zhang. STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. In LISA'03, October 2003."},{"key":"e_1_3_2_1_41_1","volume-title":"OSDI","author":"Whitaker A.","year":"2004","unstructured":"A. Whitaker , R. S. Cox , and S. D. Gribble . Configuration Debugging as Search: Finding the Needle in the Haystack . In OSDI , October 2004 . A. Whitaker, R. S. Cox, and S. D. Gribble. Configuration Debugging as Search: Finding the Needle in the Haystack. In OSDI, October 2004."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217972"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950369"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273020"}],"event":{"name":"SOSP '11: ACM SIGOPS 23nd Symposium on Operating Systems Principles","location":"Cascais Portugal","acronym":"SOSP '11","sponsor":["INESC Systems and Computer Engineering Institute","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043556.2043572","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2043556.2043572","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:54:18Z","timestamp":1750240458000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2043556.2043572"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,10,23]]},"references-count":42,"alternative-id":["10.1145\/2043556.2043572","10.1145\/2043556"],"URL":"https:\/\/doi.org\/10.1145\/2043556.2043572","relation":{},"subject":[],"published":{"date-parts":[[2011,10,23]]},"assertion":[{"value":"2011-10-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}