{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:44:44Z","timestamp":1773193484949,"version":"3.50.1"},"reference-count":72,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2012,11,1]],"date-time":"2012-11-01T00:00:00Z","timestamp":1351728000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Comput. Syst."],"published-print":{"date-parts":[[2012,11]]},"abstract":"<jats:p>Fay is a flexible platform for the efficient collection, processing, and analysis of software execution traces. Fay provides dynamic tracing through use of runtime instrumentation and distributed aggregation within machines and across clusters. At the lowest level, Fay can be safely extended with new tracing primitives, including even untrusted, fully optimized machine code, and Fay can be applied to running user-mode or kernel-mode software without compromising system stability. At the highest level, Fay provides a unified, declarative means of specifying what events to trace, as well as the aggregation, processing, and analysis of those events.<\/jats:p>\n          <jats:p>We have implemented the Fay tracing platform for Windows and integrated it with two powerful, expressive systems for distributed programming. Our implementation is easy to use, can be applied to unmodified production systems, and provides primitives that allow the overhead of tracing to be greatly reduced, compared to previous dynamic tracing platforms. To show the generality of Fay tracing, we reimplement, in experiments, a range of tracing strategies and several custom mechanisms from existing tracing frameworks.<\/jats:p>\n          <jats:p>Fay shows that modern techniques for high-level querying and data-parallel processing of disagreggated data streams are well suited to comprehensive monitoring of software execution in distributed systems. Revisiting a lesson from the late 1960s [Deutsch and Grant 1971], Fay also demonstrates the efficiency and extensibility benefits of using safe, statically verified machine code as the basis for low-level execution tracing. Finally, Fay establishes that, by automatically deriving optimized query plans and code for safe extensions, the expressiveness and performance of high-level tracing queries can equal or even surpass that of specialized monitoring tools.<\/jats:p>","DOI":"10.1145\/2382553.2382555","type":"journal-article","created":{"date-parts":[[2012,12,4]],"date-time":"2012-12-04T20:10:57Z","timestamp":1354651857000},"page":"1-35","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":28,"title":["Fay"],"prefix":"10.1145","volume":"30","author":[{"given":"\u00dalfar","family":"Erlingsson","sequence":"first","affiliation":[{"name":"Microsoft Research"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marcus","family":"Peinado","sequence":"additional","affiliation":[{"name":"Microsoft Research"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Simon","family":"Peter","sequence":"additional","affiliation":[{"name":"Microsoft Research"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mihai","family":"Budiu","sequence":"additional","affiliation":[{"name":"Microsoft Research"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gloria","family":"Mainar-Ruiz","sequence":"additional","affiliation":[{"name":"Microsoft Research"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2012,11]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993540"},{"key":"e_1_2_1_2_1","unstructured":"Apache. Hadoop project. http:\/\/hadoop.apache.org\/. Apache . Hadoop project. http:\/\/hadoop.apache.org\/."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1176617.1176673"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1066157.1066160"},{"key":"e_1_2_1_5_1","volume-title":"Proceedings of the Conference on Operating System Design and Implementation (OSDI).","author":"Barham P.","unstructured":"Barham , P. , Donnelly , A. , Isaacs , R. , and Mortier , R . 2004. Using Magpie for request extraction and workload modelling . In Proceedings of the Conference on Operating System Design and Implementation (OSDI). Barham, P., Donnelly, A., Isaacs, R., and Mortier, R. 2004. Using Magpie for request extraction and workload modelling. In Proceedings of the Conference on Operating System Design and Implementation (OSDI)."},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the 5th Workshop on Hot Topics in Operating Systems (HotOS-V).","author":"Bershad B. N.","unstructured":"Bershad , B. N. , Savage , S. , Pardyak , P. , Becker , D. , Fiuczynski , M. , and Sirer , E. G . 1995. Protection is a software issue . In Proceedings of the 5th Workshop on Hot Topics in Operating Systems (HotOS-V). Bershad, B. N., Savage, S., Pardyak, P., Becker, D., Fiuczynski, M., and Sirer, E. G. 1995. Protection is a software issue. In Proceedings of the 5th Workshop on Hot Topics in Operating Systems (HotOS-V)."},{"key":"e_1_2_1_7_1","volume-title":"Proceedings of the Conference on Operating System Design and Implementation (OSDI).","author":"Bhatia S.","unstructured":"Bhatia , S. , Kumar , A. , Fiuczynski , M. E. , and Peterson , L . 2008. Lightweight, high-resolution monitoring for troubleshooting production systems . In Proceedings of the Conference on Operating System Design and Implementation (OSDI). Bhatia, S., Kumar, A., Fiuczynski, M. E., and Peterson, L. 2008. Lightweight, high-resolution monitoring for troubleshooting production systems. In Proceedings of the Conference on Operating System Design and Implementation (OSDI)."},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254810.1254830"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379236"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1117389.1117401"},{"key":"e_1_2_1_11_1","volume-title":"Proceedings of the USENIX Annual Technical Conference.","author":"Cantrill B. M.","unstructured":"Cantrill , B. M. , Shapiro , M. W. , and Leventhal , A. H . 2004. Dynamic instrumentation of production systems . In Proceedings of the USENIX Annual Technical Conference. Cantrill, B. M., Shapiro, M. W., and Leventhal, A. H. 2004. Dynamic instrumentation of production systems. In Proceedings of the USENIX Annual Technical Conference."},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460422"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806638"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629175.1629198"},{"key":"e_1_2_1_15_1","volume-title":"Proceedings of the IFIP Congress 71","author":"Deutsch P.","unstructured":"Deutsch , P. and Grant , C. A . 1971. A flexible measurement tool for software systems . In Proceedings of the IFIP Congress 71 . Deutsch, P. and Grant, C. A. 1971. A flexible measurement tool for software systems. In Proceedings of the IFIP Congress 71."},{"key":"e_1_2_1_16_1","unstructured":"Eclipse. Callgraph plug-in. http:\/\/wiki.eclipse.org\/Linux_Tools_Project\/Callgraph\/User_Guide. Eclipse . Callgraph plug-in. http:\/\/wiki.eclipse.org\/Linux_Tools_Project\/Callgraph\/User_Guide."},{"key":"e_1_2_1_17_1","unstructured":"Eigler F. C. 2010. Systemtap tutorial. http:\/\/sourceware.org\/systemtap\/tutorial\/. Eigler F. C. 2010. Systemtap tutorial. http:\/\/sourceware.org\/systemtap\/tutorial\/."},{"key":"e_1_2_1_18_1","volume-title":"Proceedings of the Conference on Operating System Design and Implementation (OSDI).","author":"Erlingsson","unstructured":"Erlingsson , \u00da., Abadi , M. , Vrable , M. , Budiu , M. , and Necula , G. C . 2006a. XFI: Software guards for system address spaces . In Proceedings of the Conference on Operating System Design and Implementation (OSDI). Erlingsson, \u00da., Abadi, M., Vrable, M., Budiu, M., and Necula, G. C. 2006a. XFI: Software guards for system address spaces. In Proceedings of the Conference on Operating System Design and Implementation (OSDI)."},{"key":"e_1_2_1_19_1","volume-title":"Proceedings of the Workshop on Distributed Data and Structures.","author":"Erlingsson","year":"2006","unstructured":"Erlingsson , \u00da., Manasse , M. , and McSherry , F. 2006 b. A cool and practical alternative to traditional hash tables . In Proceedings of the Workshop on Distributed Data and Structures. Erlingsson, \u00da., Manasse, M., and McSherry, F. 2006b. A cool and practical alternative to traditional hash tables. In Proceedings of the Workshop on Distributed Data and Structures."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273023"},{"key":"e_1_2_1_21_1","unstructured":"flume. Flume: Open source log collection system. http:\/\/github.com\/cloudera\/flume. flume. Flume: Open source log collection system. http:\/\/github.com\/cloudera\/flume."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-003-0111-3"},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629586"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094841"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170066"},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the USENIX Windows NT Symposium.","author":"Hunt G.","unstructured":"Hunt , G. and Brubacher , D . 1998. Detours: Binary interception of Win32 functions . In Proceedings of the USENIX Windows NT Symposium. Hunt, G. and Brubacher, D. 1998. Detours: Binary interception of Win32 functions. In Proceedings of the USENIX Windows NT Symposium."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273005"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-007-0036-3"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781148"},{"key":"e_1_2_1_30_1","unstructured":"Marguerie F. Eichert S. and Wooley J. 2008. LINQ in Action. Manning Publications Co. Marguerie F. Eichert S. and Wooley J. 2008. LINQ in Action . Manning Publications Co."},{"key":"e_1_2_1_31_1","volume-title":"Fmeter: Extracting indexable low-level system signatures by counting kernel function calls. Tech. rep.","author":"Marian T.","year":"2011","unstructured":"Marian , T. , Sagar , A. , Chen , T. , and Weatherspoon , H . 2011 . Fmeter: Extracting indexable low-level system signatures by counting kernel function calls. Tech. rep. , Cornell University , Computing and Information Science. http:\/\/hdl.handle.net\/1813\/23568. Marian, T., Sagar, A., Chen, T., and Weatherspoon, H. 2011. Fmeter: Extracting indexable low-level system signatures by counting kernel function calls. Tech. rep., Cornell University, Computing and Information Science. http:\/\/hdl.handle.net\/1813\/23568."},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1094811.1094840"},{"key":"e_1_2_1_33_1","article-title":"The Ganglia distributed monitoring system: Design, implementation and experience. Int","author":"Massie M. L.","year":"2003","unstructured":"Massie , M. L. , Chun , B. N. , and Culler , D. E. 2003 . The Ganglia distributed monitoring system: Design, implementation and experience. Int . J. Parall. Comput. 30. Massie, M. L., Chun, B. N., and Culler, D. E. 2003. The Ganglia distributed monitoring system: Design, implementation and experience. Int. J. Parall. Comput. 30.","journal-title":"J. Parall. Comput. 30."},{"key":"e_1_2_1_34_1","unstructured":"McSherry F. Yu Y. Budiu M. Isard M. and Fetterly D. 2011. Scaling Up Machine Learning. Cambridge Univ. Press. McSherry F. Yu Y. Budiu M. Isard M. and Fetterly D. 2011. Scaling Up Machine Learning . Cambridge Univ. Press."},{"key":"e_1_2_1_35_1","unstructured":"Microsoft Corp. Determine which queries are holding locks. MSDN. http:\/\/msdn.microsoft.com\/en-us\/library\/bb677357.aspx. Microsoft Corp. Determine which queries are holding locks. MSDN. http:\/\/msdn.microsoft.com\/en-us\/library\/bb677357.aspx."},{"key":"e_1_2_1_36_1","unstructured":"Microsoft Corp. 2003. Introduction to hotpatching. Microsoft TechNet. Microsoft Corp. 2003. Introduction to hotpatching. Microsoft TechNet ."},{"key":"e_1_2_1_37_1","unstructured":"Microsoft Corp. 2006. Kernel patch protection: Frequently asked questions. Windows Hardware Developer Central. http:\/\/www.microsoft.com\/whdc\/driver\/kernel\/64bitpatch_FAQ.mspx. Microsoft Corp. 2006. Kernel patch protection: Frequently asked questions. Windows Hardware Developer Central . http:\/\/www.microsoft.com\/whdc\/driver\/kernel\/64bitpatch_FAQ.mspx."},{"key":"e_1_2_1_38_1","unstructured":"Microsoft Corp. 2010. WDK and developer tools. Windows Hardware Developer Central. http:\/\/www.microsoft.com\/whdc\/DevTools\/default.mspx. Microsoft Corp. 2010. WDK and developer tools. Windows Hardware Developer Central . http:\/\/www.microsoft.com\/whdc\/DevTools\/default.mspx."},{"key":"e_1_2_1_39_1","volume-title":"Diagnosing and resolving latch contention on SQL Server","author":"Microsoft Corp. 2011a.","unstructured":"Microsoft Corp. 2011a. Diagnosing and resolving latch contention on SQL Server . Microsoft Download Center . http:\/\/www.microsoft.com\/en-us\/download\/details.aspx?displaylang=en&id=&percnt;&percnt;26665. Microsoft Corp. 2011a. Diagnosing and resolving latch contention on SQL Server. Microsoft Download Center. http:\/\/www.microsoft.com\/en-us\/download\/details.aspx?displaylang=en&id=&percnt;&percnt;26665."},{"key":"e_1_2_1_40_1","unstructured":"Microsoft Corp. 2011b. Introducing SQL Server extended events. MSDN. http:\/\/msdn.microsoft.com\/en-us\/library\/bb630354.aspx. Microsoft Corp. 2011b. Introducing SQL Server extended events. MSDN. http:\/\/msdn.microsoft.com\/en-us\/library\/bb630354.aspx."},{"key":"e_1_2_1_41_1","unstructured":"Microsoft Corp. 2011c. Use the Microsoft Symbol Server to obtain debug symbol files. http:\/\/support.microsoft.com\/kb\/311503. Microsoft Corp. 2011c. Use the Microsoft Symbol Server to obtain debug symbol files. http:\/\/support.microsoft.com\/kb\/311503."},{"key":"e_1_2_1_42_1","unstructured":"Microsoft Corp. 2012. Microsoft StreamInsight. MSDN. http:\/\/msdn.microsoft.com\/en-us\/library\/ee362541.aspx. Microsoft Corp. 2012. Microsoft StreamInsight. MSDN. http:\/\/msdn.microsoft.com\/en-us\/library\/ee362541.aspx."},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268954"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263712"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_2_1_46_1","volume-title":"Programming the Microsoft Windows Driver Model","author":"Oney W.","unstructured":"Oney , W. 2002. Programming the Microsoft Windows Driver Model . Microsoft Press . Oney, W. 2002. Programming the Microsoft Windows Driver Model. Microsoft Press."},{"key":"e_1_2_1_47_1","unstructured":"Park I. and Buch R. 2007. Improve debugging and performance tuning with ETW. MSDN Magazine. Park I. and Buch R. 2007. Improve debugging and performance tuning with ETW. MSDN Magazine ."},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2009.12"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1352592.1352614"},{"key":"e_1_2_1_50_1","unstructured":"Pietrek M. 1997. A crash course on the depths of Win32 structured exception handling. Microsoft Syst. J. Pietrek M. 1997. A crash course on the depths of Win32 structured exception handling. Microsoft Syst. J ."},{"key":"e_1_2_1_51_1","volume-title":"Proceedings of the Ottawa Linux Symposium.","author":"Prasad V.","unstructured":"Prasad , V. , Cohen , W. , Eigler , F. C. , Hunt , M. , Keniston , J. , and Chen , B . 2005. Locating system problems using dynamic instrumentation . In Proceedings of the Ottawa Linux Symposium. Prasad, V., Cohen, W., Eigler, F. C., Hunt, M., Keniston, J., and Chen, B. 2005. Locating system problems using dynamic instrumentation. In Proceedings of the Ottawa Linux Symposium."},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2010.68"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/237090.237175"},{"key":"e_1_2_1_54_1","unstructured":"Rostedt S. 2009. Debugging the kernel using Ftrace. lwn.net. Rostedt S. 2009. Debugging the kernel using Ftrace. lwn.net."},{"key":"e_1_2_1_55_1","unstructured":"Russinovich M. E. Solomon D. A. and Ionescu A. 2009. Microsoft Windows Internals. Microsoft Press. Russinovich M. E. Solomon D. A. and Ionescu A. 2009. Microsoft Windows Internals . Microsoft Press."},{"key":"e_1_2_1_56_1","unstructured":"Sigelman B. H. Barroso L. A. Burrows M. Stephenson P. Plakal M. Beaver D. Jaspan S. and Shanbhag C. 2010. Dapper a large-scale distributed systems tracing infrastructure. Tech. rep. 2010-1 Google Inc. Sigelman B. H. Barroso L. A. Burrows M. Stephenson P. Plakal M. Beaver D. Jaspan S. and Shanbhag C. 2010. Dapper a large-scale distributed systems tracing infrastructure. Tech. rep. 2010-1 Google Inc."},{"key":"e_1_2_1_57_1","volume-title":"Proceedings of the Annual ACM\/IEEE International Symposium on Microarchitecture (MICRO).","author":"Skadron K.","unstructured":"Skadron , K. , Ahuja , P. S. , Martonosi , M. , and Clark , D. W . 1998. Improving prediction for procedure returns with return-address-stack repair mechanisms . In Proceedings of the Annual ACM\/IEEE International Symposium on Microarchitecture (MICRO). Skadron, K., Ahuja, P. S., Martonosi, M., and Clark, D. W. 1998. Improving prediction for procedure returns with return-address-stack repair mechanisms. In Proceedings of the Annual ACM\/IEEE International Symposium on Microarchitecture (MICRO)."},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/4434.708254"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644038.1644053"},{"key":"e_1_2_1_60_1","volume-title":"Vulcan: Binary transformation in a distributed environment. Tech. rep. MSR-TR-2001-50, Microsoft Research.","author":"Srivastava A.","year":"2001","unstructured":"Srivastava , A. , Edwards , A. , and Vo , H . 2001 . Vulcan: Binary transformation in a distributed environment. Tech. rep. MSR-TR-2001-50, Microsoft Research. Srivastava, A., Edwards, A., and Vo, H. 2001. Vulcan: Binary transformation in a distributed environment. Tech. rep. MSR-TR-2001-50, Microsoft Research."},{"key":"e_1_2_1_61_1","unstructured":"Stanek W. 2009. Windows PowerShell(TM) 2.0 Administrator\u2019s Pocket Consultant. Microsoft Press. Stanek W. 2009. Windows PowerShell(TM) 2.0 Administrator\u2019s Pocket Consultant . Microsoft Press."},{"key":"e_1_2_1_62_1","unstructured":"Strosaker M. Sample real-world use of systemtap. http:\/\/zombieprocess.wordpress.com\/2008\/01\/03\/sample-real-world-use-of-systemtap\/. Strosaker M. Sample real-world use of systemtap. http:\/\/zombieprocess.wordpress.com\/2008\/01\/03\/sample-real-world-use-of-systemtap\/."},{"key":"e_1_2_1_63_1","unstructured":"SystemTap. Examples. http:\/\/sourceware.org\/systemtap\/examples\/. SystemTap . Examples. http:\/\/sourceware.org\/systemtap\/examples\/."},{"key":"e_1_2_1_64_1","unstructured":"SystemTap. 2006. Bug 2725: function(\u201c*\u201d) probes sometimes crash & burn. http:\/\/sources.redhat.com\/bugzilla\/show_bug.cgi?id=2725. SystemTap . 2006. Bug 2725: function(\u201c*\u201d) probes sometimes crash & burn. http:\/\/sources.redhat.com\/bugzilla\/show_bug.cgi?id=2725."},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/90.650142"},{"key":"e_1_2_1_66_1","volume-title":"Proceedings of the Conference on Operating System Design and Implementation (OSDI).","author":"Verbowski C.","unstructured":"Verbowski , C. , Kiciman , E. , Kumar , A. , Daniels , B. , Lu , S. , Lee , J. , Wang , Y.-M. , and Roussev , R . 2006. Flight data recorder: Monitoring persistent-state interactions to improve systems management . In Proceedings of the Conference on Operating System Design and Implementation (OSDI). Verbowski, C., Kiciman, E., Kumar, A., Daniels, B., Lu, S., Lee, J., Wang, Y.-M., and Roussev, R. 2006. Flight data recorder: Monitoring persistent-state interactions to improve systems management. In Proceedings of the Conference on Operating System Design and Implementation (OSDI)."},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/168619.168635"},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1048935.1050154"},{"key":"e_1_2_1_69_1","unstructured":"Woodard D. B. and Goldszmidt M. 2009. Model-based clustering for online crisis identification in distributed computing. Tech. rep. TR-2009-131 MSR. Woodard D. B. and Goldszmidt M. 2009. Model-based clustering for online crisis identification in distributed computing. Tech. rep. TR-2009-131 MSR."},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629175.1629203"},{"key":"e_1_2_1_71_1","volume-title":"Proceedings of the Conference on Operating System Design and Implementation (OSDI).","author":"Yu Y.","unstructured":"Yu , Y. , Isard , M. , Fetterly , D. , Budiu , M. , Erlingsson , \u00da., Kumar , P. G. , and Currey , J . 2008. DryadLINQ: A system for general-purpose distributed data-parallel computing using a high-level language . In Proceedings of the Conference on Operating System Design and Implementation (OSDI). Yu, Y., Isard, M., Fetterly, D., Budiu, M., Erlingsson, \u00da., Kumar, P. G., and Currey, J. 2008. DryadLINQ: A system for general-purpose distributed data-parallel computing using a high-level language. In Proceedings of the Conference on Operating System Design and Implementation (OSDI)."},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629600"}],"container-title":["ACM Transactions on Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2382553.2382555","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2382553.2382555","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T09:34:38Z","timestamp":1750239278000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2382553.2382555"}},"subtitle":["Extensible Distributed Tracing from Kernels to Clusters"],"short-title":[],"issued":{"date-parts":[[2012,11]]},"references-count":72,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2012,11]]}},"alternative-id":["10.1145\/2382553.2382555"],"URL":"https:\/\/doi.org\/10.1145\/2382553.2382555","relation":{},"ISSN":["0734-2071","1557-7333"],"issn-type":[{"value":"0734-2071","type":"print"},{"value":"1557-7333","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,11]]},"assertion":[{"value":"2012-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2012-08-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2012-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}