{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,15]],"date-time":"2026-04-15T19:26:49Z","timestamp":1776281209188,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,30]],"date-time":"2015-08-30T00:00:00Z","timestamp":1440892800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,30]]},"DOI":"10.1145\/2786805.2786852","type":"proceedings-article","created":{"date-parts":[[2015,8,26]],"date-time":"2015-08-26T16:48:13Z","timestamp":1440607693000},"page":"307-319","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":136,"title":["Hey, you have given me too many knobs!: understanding and dealing with over-designed configuration in system software"],"prefix":"10.1145","author":[{"given":"Tianyin","family":"Xu","sequence":"first","affiliation":[{"name":"University of California at San Diego, USA"}]},{"given":"Long","family":"Jin","sequence":"additional","affiliation":[{"name":"University of California at San Diego, USA"}]},{"given":"Xuepeng","family":"Fan","sequence":"additional","affiliation":[{"name":"University of California at San Diego, USA \/ Huazhong University of Science and Technology, China"}]},{"given":"Yuanyuan","family":"Zhou","sequence":"additional","affiliation":[{"name":"University of California at San Diego, USA"}]},{"given":"Shankar","family":"Pasupathy","sequence":"additional","affiliation":[{"name":"NetApp, USA"}]},{"given":"Rukma","family":"Talwadker","sequence":"additional","affiliation":[{"name":"NetApp, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,8,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apache HTTP Server Version 2.4 Documentation. http:\/\/ httpd.apache.org\/docs\/2.4\/.  Apache HTTP Server Version 2.4 Documentation. http:\/\/ httpd.apache.org\/docs\/2.4\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Apache HTTP Server Version 2.4 Documentation (LogLevel Directive). http:\/\/httpd.apache.org\/docs\/2.4\/mod\/ core.html#loglevel.  Apache HTTP Server Version 2.4 Documentation (LogLevel Directive). http:\/\/httpd.apache.org\/docs\/2.4\/mod\/ core.html#loglevel."},{"key":"e_1_3_2_1_3_1","unstructured":"Cloudera Manager. http:\/\/www.cloudera.com\/ content\/cloudera\/en\/products-and-services\/ cloudera-enterprise\/cloudera-manager.html.  Cloudera Manager. http:\/\/www.cloudera.com\/ content\/cloudera\/en\/products-and-services\/ cloudera-enterprise\/cloudera-manager.html."},{"key":"e_1_3_2_1_4_1","unstructured":"Cox: A configuration navigation tool and library for a thousand of knobs. https:\/\/github.com\/tianyin\/cox.  Cox: A configuration navigation tool and library for a thousand of knobs. https:\/\/github.com\/tianyin\/cox."},{"key":"e_1_3_2_1_5_1","unstructured":"Database Administrators. http:\/\/dba.stackexchange. com\/.  Database Administrators. http:\/\/dba.stackexchange. com\/."},{"key":"e_1_3_2_1_6_1","unstructured":"MySQL 5.6 Reference Manual (Online Version). http:\/\/ dev.mysql.com\/doc\/refman\/5.6\/en\/index.html.  MySQL 5.6 Reference Manual (Online Version). http:\/\/ dev.mysql.com\/doc\/refman\/5.6\/en\/index.html."},{"key":"e_1_3_2_1_7_1","unstructured":"MySQL 5.6 Reference Manual (PDF Version). http:\/\/ downloads.mysql.com\/docs\/refman-5.6-en.pdf.  MySQL 5.6 Reference Manual (PDF Version). http:\/\/ downloads.mysql.com\/docs\/refman-5.6-en.pdf."},{"key":"e_1_3_2_1_8_1","unstructured":"Pro Webmasters. http:\/\/webmasters.stackexchange. com\/.  Pro Webmasters. http:\/\/webmasters.stackexchange. com\/."},{"key":"e_1_3_2_1_9_1","unstructured":"ServerFault. http:\/\/serverfault.com\/.  ServerFault. http:\/\/serverfault.com\/."},{"key":"e_1_3_2_1_10_1","unstructured":"StackOverflow. http:\/\/stackoverflow.com\/.  StackOverflow. http:\/\/stackoverflow.com\/."},{"key":"e_1_3_2_1_11_1","unstructured":"The Apache Lucene Project. https:\/\/lucene.apache. org\/.  The Apache Lucene Project. https:\/\/lucene.apache. org\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/645371.651326"},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201912)","author":"Attariyan M.","year":"2012"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/1924943.1924960"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1031607.1031672"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-031-01722-3","volume-title":"The Datacenter as a Computer: An Introduction to the Design of Warehouse-scale Machines","author":"Barroso L. A.","year":"2009"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502045"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.14778\/1687627.1687767"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001450"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670979.2670986"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1234772.1234774"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818819"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2327020"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2011.31"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110147.2110164"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"D. Jin M. B. Cohen X. Qu and B. Robinson. PrefFinder: Getting the Right Preference in Configurable Software Systems (Supplementary Data). http:\/\/cse.unl.edu\/ ~myra\/artifacts\/PrefFinder_2014\/.  D. Jin M. B. Cohen X. Qu and B. Robinson. PrefFinder: Getting the Right Preference in Configurable Software Systems (Supplementary Data). http:\/\/cse.unl.edu\/ ~myra\/artifacts\/PrefFinder_2014\/.","DOI":"10.1145\/2642937.2643009"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2643009"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591191"},{"key":"e_1_3_2_1_29_1","volume-title":"Inc.","author":"Kandogan E.","year":"2005"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630084"},{"key":"e_1_3_2_1_31_1","unstructured":"S. Kendrick. What Takes Us Down? USENIX ;login: 37(5):37\u201345 October 2012.  S. Kendrick. What Takes Us Down? USENIX ;login: 37(5):37\u201345 October 2012."},{"key":"e_1_3_2_1_32_1","volume-title":"Wang. Discovering Correctness Constraints for Self-Management of System Configuration. In Proceedings of the 1st International Conference on Autonomic Computing (ICAC\u201904)","author":"Kiciman E.","year":"2004"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491459"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 23rd International Conference on Software Engineering (ICSE\u201901)","author":"Larsson M.","year":"2001"},{"key":"e_1_3_2_1_35_1","unstructured":"L. Y. Liang. Linkedin.com inaccessible on Thursday because of server misconfiguration. 2013. http:\/\/www. straitstimes.com\/breaking-news\/singapore\/ story\/linkedincom-inaccessible-thursdaybecause-server-misconfiguration-2013.  L. Y. Liang. Linkedin.com inaccessible on Thursday because of server misconfiguration. 2013. http:\/\/www. straitstimes.com\/breaking-news\/singapore\/ story\/linkedincom-inaccessible-thursdaybecause-server-misconfiguration-2013."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491432"},{"key":"e_1_3_2_1_37_1","volume-title":"Proceedings of the 10th International Workshop on Satisfiability Modulo Theories (SMT\u201912)","author":"Michel R.","year":"2012"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/219717.219748"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568283"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251460.1251461"},{"key":"e_1_3_2_1_41_1","volume-title":"Normal Accidents: Living with High-Risk Technologies","author":"Perrow C.","year":"1984"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2011.9"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390641"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100053"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985812"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.73"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555228.1555269"},{"key":"e_1_3_2_1_48_1","volume-title":"October","author":"Reason J.","year":"1990"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806864"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2008.46"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693104"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486853"},{"key":"e_1_3_2_1_53_1","volume-title":"How Much is a Google Top Spot Worth?","author":"Watch Search Engine","year":"2010"},{"key":"e_1_3_2_1_54_1","unstructured":"Search Engine Watch. 53% of Organic Search Clicks Go to First Link. 2012. http:\/\/searchenginewatch.com\/ article\/2050861\/How-Much-is-a-Google-Top-Spot-Worth.  Search Engine Watch. 53% of Organic Search Clicks Go to First Link. 2012. http:\/\/searchenginewatch.com\/ article\/2050861\/How-Much-is-a-Google-Top-Spot-Worth."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337329"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.55"},{"key":"e_1_3_2_1_57_1","unstructured":"J. Spool. Do users change their settings? 2011. http:\/\/www. uie.com\/brainsparks\/2011\/09\/14\/do-userschange-their-settings\/.  J. Spool. Do users change their settings? 2011. http:\/\/www. uie.com\/brainsparks\/2011\/09\/14\/do-userschange-their-settings\/."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2009.26"},{"key":"e_1_3_2_1_59_1","unstructured":"Y. Sverdlik. Microsoft: Misconfigured Network Device Led to Azure Outage. http:\/\/www.datacenterdynamics. com\/focus\/archive\/2012\/07\/microsoftmisconfigured-network-device-led-azure-outage 2012.  Y. Sverdlik. Microsoft: Misconfigured Network Device Led to Azure Outage. http:\/\/www.datacenterdynamics. com\/focus\/archive\/2012\/07\/microsoftmisconfigured-network-device-led-azure-outage 2012."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2013.12.003"},{"key":"e_1_3_2_1_61_1","unstructured":"The Association of Support Professionals. Technical Support Cost Ratios. http:\/\/www.asponline.com\/tscr.pdf 2000.  The Association of Support Professionals. Technical Support Cost Ratios. http:\/\/www.asponline.com\/tscr.pdf 2000."},{"key":"e_1_3_2_1_62_1","volume-title":"Modernization: Clearing a Pathway to Success","author":"The Standish Group","year":"2010"},{"key":"e_1_3_2_1_63_1","volume-title":"The Cloud Crash Reveals Your Importance","author":"Thomas K.","year":"2002"},{"key":"e_1_3_2_1_64_1","volume-title":"Proceedings of the 22nd Large Installation System Administration Conference (LISA\u201908)","author":"Velasquez N. F.","year":"2008"},{"key":"e_1_3_2_1_65_1","volume-title":"Wang. Automatic Misconfiguration Troubleshooting with PeerPressure. In Proceedings of the 6th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201904)","author":"Wang H. J.","year":"2004"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491420"},{"key":"e_1_3_2_1_67_1","volume-title":"Proceedings of the 17th Large Installation Systems Administration Conference (LISA\u201903)","author":"Wang Y.-M.","year":"2003"},{"key":"e_1_3_2_1_68_1","unstructured":"M. Welsh. What I Wish Systems Researchers Would Work On. 2013. http:\/\/matt-welsh.blogspot.com\/2013\/ 05\/what-i-wish-systems-researchers-would.html.  M. Welsh. What I Wish Systems Researchers Would Work On. 2013. http:\/\/matt-welsh.blogspot.com\/2013\/ 05\/what-i-wish-systems-researchers-would.html."},{"key":"e_1_3_2_1_69_1","volume-title":"Proceedings of the 6th USENIX Conference on Operating Systems Design and Implementation (OSDI\u201904)","author":"Whitaker A.","year":"2004"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337231"},{"key":"e_1_3_2_1_71_1","article-title":"Range Fixes: Interactive Error Resolution for Software Configuration","author":"Xiong Y.","year":"2014","journal-title":"IEEE Transactions on Software Engineering (TSE)"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522727"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2791577"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.8"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043572"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337236"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002181.2002209"},{"key":"e_1_3_2_1_78_1","volume-title":"Why Programs Fail: A Guide to Systematic Debugging","author":"Zeller A.","year":"2009","edition":"2"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541983"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486830"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568251"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272996.1273020"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958746.1958786"}],"event":{"name":"ESEC\/FSE'15: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Bergamo Italy","acronym":"ESEC\/FSE'15","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2786805.2786852","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2786805.2786852","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:16:21Z","timestamp":1750227381000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2786805.2786852"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,30]]},"references-count":83,"alternative-id":["10.1145\/2786805.2786852","10.1145\/2786805"],"URL":"https:\/\/doi.org\/10.1145\/2786805.2786852","relation":{},"subject":[],"published":{"date-parts":[[2015,8,30]]},"assertion":[{"value":"2015-08-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}