{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T18:56:29Z","timestamp":1769885789741,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,11,3]],"date-time":"2013-11-03T00:00:00Z","timestamp":1383436800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NetApp Faculty Award"},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1017784, CNS-1321006"],"award-info":[{"award-number":["CNS-1017784, CNS-1321006"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,11,3]]},"DOI":"10.1145\/2517349.2522727","type":"proceedings-article","created":{"date-parts":[[2013,10,8]],"date-time":"2013-10-08T13:27:04Z","timestamp":1381238824000},"page":"244-259","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":135,"title":["Do not blame users for misconfigurations"],"prefix":"10.1145","author":[{"given":"Tianyin","family":"Xu","sequence":"first","affiliation":[{"name":"University of California, San Diego"}]},{"given":"Jiaqi","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of California, San Diego"}]},{"given":"Peng","family":"Huang","sequence":"additional","affiliation":[{"name":"University of California, San Diego"}]},{"given":"Jing","family":"Zheng","sequence":"additional","affiliation":[{"name":"University of California, San Diego"}]},{"given":"Tianwei","family":"Sheng","sequence":"additional","affiliation":[{"name":"University of California, San Diego"}]},{"given":"Ding","family":"Yuan","sequence":"additional","affiliation":[{"name":"University of Toronto"}]},{"given":"Yuanyuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of California, San Diego"}]},{"given":"Shankar","family":"Pasupathy","sequence":"additional","affiliation":[{"name":"NetApp, Inc."}]}],"member":"320","published-online":{"date-parts":[[2013,11,3]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"Proceedings of the 6th USENIX Symposium on Networked System Design and Implementation (NSDI'09)","author":"Aggarwal B.","year":"2009","unstructured":"B. Aggarwal , R. Bhagwan , T. Das , S. Eswaran , V. N. Padmanabhan , and G. M. Voelker . NetPrints: Diagnosing Home Network Misconfigurations Using Shared Knowledge . In Proceedings of the 6th USENIX Symposium on Networked System Design and Implementation (NSDI'09) , April 2009 . B. Aggarwal, R. Bhagwan, T. Das, S. Eswaran, V. N. Padmanabhan, and G. M. Voelker. NetPrints: Diagnosing Home Network Misconfigurations Using Shared Knowledge. In Proceedings of the 6th USENIX Symposium on Networked System Design and Implementation (NSDI'09), April 2009."},{"key":"e_1_3_2_2_2_1","unstructured":"Amazon Web Services Team. Summary of the Amazon EC2 and Amazon RDS Service Disruption in the US East Region. http:\/\/aws.amazon.com\/message\/65648 2011.  Amazon Web Services Team. Summary of the Amazon EC2 and Amazon RDS Service Disruption in the US East Region. http:\/\/aws.amazon.com\/message\/65648 2011."},{"key":"e_1_3_2_2_3_1","volume-title":"Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI'12)","author":"Attariyan M.","year":"2012","unstructured":"M. Attariyan , M. Chow , and J. Flinn . X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software . In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI'12) , October 2012 . M. Attariyan, M. Chow, and J. Flinn. X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software. In Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI'12), October 2012."},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1404014.1404037"},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1924943.1924960"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/1643608"},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851190"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687767"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502041"},{"key":"e_1_3_2_2_11_1","volume-title":"Proceedings of the 2nd USENIX Symposium on Networked System Design and Implementation (NSDI'05)","author":"Feamster N.","year":"2005","unstructured":"N. Feamster and H. Balakrishnan . Detecting BGP Configuration Faults with Static Analysis . In Proceedings of the 2nd USENIX Symposium on Networked System Design and Implementation (NSDI'05) , May 2005 . N. Feamster and H. Balakrishnan. Detecting BGP Configuration Faults with Static Analysis. In Proceedings of the 2nd USENIX Symposium on Networked System Design and Implementation (NSDI'05), May 2005."},{"key":"e_1_3_2_2_13_1","unstructured":"R. Johnson. More Details on Today's Outage. http:\/\/www.facebook.com\/note.php?note_id=431441338919 2010.  R. Johnson. More Details on Today's Outage. http:\/\/www.facebook.com\/note.php?note_id=431441338919 2010."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630084"},{"key":"e_1_3_2_2_16_1","volume-title":"October","author":"Kendrick S.","year":"2012","unstructured":"S. Kendrick . What Takes Us Down? USENIX;login:, 37(5):37--45 , October 2012 . S. Kendrick. What Takes Us Down? USENIX;login:, 37(5):37--45, October 2012."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1924943.1924959"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/633025.633027"},{"key":"e_1_3_2_2_20_1","volume-title":"Principles and Guidelines in Software User Interface Design","author":"Mayhew D. J.","year":"1991","unstructured":"D. J. Mayhew . Principles and Guidelines in Software User Interface Design . Prentice Hall , October 1991 . D. J. Mayhew. Principles and Guidelines in Software User Interface Design. Prentice Hall, October 1991."},{"key":"e_1_3_2_2_21_1","volume-title":"Proceedings of the 2nd USENIX Workshop on Tackling Computer Systems Problems with Machine Learning Techniques (SYSML'07)","author":"Mickens J.","year":"2007","unstructured":"J. Mickens , M. Szummer , and D. Narayanan . Snitch: Interactive Decision Trees for Troubleshooting Misconfigurations . In Proceedings of the 2nd USENIX Workshop on Tackling Computer Systems Problems with Machine Learning Techniques (SYSML'07) , 2007 . J. Mickens, M. Szummer, and D. Narayanan. Snitch: Interactive Decision Trees for Troubleshooting Misconfigurations. In Proceedings of the 2nd USENIX Workshop on Tackling Computer Systems Problems with Machine Learning Techniques (SYSML'07), 2007."},{"key":"e_1_3_2_2_22_1","volume-title":"Proceedings of the 6th USENIX Conference on Operating Systems Design and Implementation (OSDI'04)","author":"Nagaraja K.","year":"2004","unstructured":"K. Nagaraja , F. Oliveira , R. Bianchini , R. P. Martin , and T. D. Nguyen . Understanding and Dealing with Operator Mistakes in Internet Services . In Proceedings of the 6th USENIX Conference on Operating Systems Design and Implementation (OSDI'04) , December 2004 . K. Nagaraja, F. Oliveira, R. Bianchini, R. P. Martin, and T. D. Nguyen. Understanding and Dealing with Operator Mistakes in Internet Services. In Proceedings of the 6th USENIX Conference on Operating Systems Design and Implementation (OSDI'04), December 2004."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2163.358092"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251460.1251461"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100053"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985812"},{"issue":"4","key":"e_1_3_2_2_27_1","first-page":"88","volume":"30","author":"Rabkin A.","year":"2013","unstructured":"A. Rabkin and R. Katz . How Hadoop Clusters Break. IEEE Software , 30 ( 4 ): 88 -- 94 , July 2013 . A. Rabkin and R. Katz. How Hadoop Clusters Break. IEEE Software, 30(4):88--94, July 2013.","journal-title":"How Hadoop Clusters Break. IEEE Software"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950382"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250748"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294284"},{"key":"e_1_3_2_2_31_1","unstructured":"Y. Sverdlik. Microsoft: Misconfigured Network Device Led to Azure Outage. http:\/\/www.datacenterdynamics.com\/focus\/archive\/2012\/07\/microsoft-misconfigured-network-device-led-azure-outage 2012.  Y. Sverdlik. Microsoft: Misconfigured Network Device Led to Azure Outage. http:\/\/www.datacenterdynamics.com\/focus\/archive\/2012\/07\/microsoft-misconfigured-network-device-led-azure-outage 2012."},{"key":"e_1_3_2_2_32_1","volume-title":"Wang. Automatic Misconfiguration Troubleshooting with PeerPressure. In Proceedings of the 6th USENIX Conference on Operating Systems Design and Implementation (OSDI'04)","author":"Wang H. J.","year":"2004","unstructured":"H. J. Wang , J. C. Platt , Y. Chen , R. Zhang , and Y.- M. Wang. Automatic Misconfiguration Troubleshooting with PeerPressure. In Proceedings of the 6th USENIX Conference on Operating Systems Design and Implementation (OSDI'04) , December 2004 . H. J. Wang, J. C. Platt, Y. Chen, R. Zhang, and Y.-M. Wang. Automatic Misconfiguration Troubleshooting with PeerPressure. In Proceedings of the 6th USENIX Conference on Operating Systems Design and Implementation (OSDI'04), December 2004."},{"key":"e_1_3_2_2_33_1","volume-title":"Proceedings of the 17th Large Installation Systems Administration Conference (LISA'03)","author":"Wang Y.-M.","year":"2003","unstructured":"Y.-M. Wang , C. Verbowski , J. Dunagan , Y. Chen , H. J. Wang , C. Yuan , and Z. Zhang . STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support . In Proceedings of the 17th Large Installation Systems Administration Conference (LISA'03) , October 2003 . Y.-M. Wang, C. Verbowski, J. Dunagan, Y. Chen, H. J. Wang, C. Yuan, and Z. Zhang. STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. In Proceedings of the 17th Large Installation Systems Administration Conference (LISA'03), October 2003."},{"key":"e_1_3_2_2_34_1","volume-title":"Proceedings of the 6th USENIX Conference on Operating Systems Design and Implementation (OSDI'04)","author":"Whitaker A.","year":"2004","unstructured":"A. Whitaker , R. S. Cox , and S. D. Gribble . Configuration Debugging as Search: Finding the Needle in the Haystack . In Proceedings of the 6th USENIX Conference on Operating Systems Design and Implementation (OSDI'04) , December 2004 . A. Whitaker, R. S. Cox, and S. D. Gribble. Configuration Debugging as Search: Finding the Needle in the Haystack. In Proceedings of the 6th USENIX Conference on Operating Systems Design and Implementation (OSDI'04), December 2004."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337231"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043572"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1217935.1217972"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002181.2002209"},{"key":"e_1_3_2_2_39_1","volume-title":"A Guide to Systematic Debugging","author":"Zeller A.","year":"2009","unstructured":"A. Zeller . Why Programs Fail : A Guide to Systematic Debugging ( 2 nd Edition). Morgan Kaufmann Publishers , June 2009 . A. Zeller. Why Programs Fail: A Guide to Systematic Debugging (2nd Edition). Morgan Kaufmann Publishers, June 2009.","edition":"2"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486830"}],"event":{"name":"SOSP '13: ACM SIGOPS 24th Symposium on Operating Systems Principles","location":"Farminton Pennsylvania","acronym":"SOSP '13","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the Twenty-Fourth ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517349.2522727","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2517349.2522727","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:53Z","timestamp":1750231733000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2517349.2522727"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11,3]]},"references-count":37,"alternative-id":["10.1145\/2517349.2522727","10.1145\/2517349"],"URL":"https:\/\/doi.org\/10.1145\/2517349.2522727","relation":{},"subject":[],"published":{"date-parts":[[2013,11,3]]},"assertion":[{"value":"2013-11-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}