{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T08:38:54Z","timestamp":1770280734971,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,9,24]],"date-time":"2017-09-24T00:00:00Z","timestamp":1506211200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000070","name":"National Institute of Biomedical Imaging and Bioengineering","doi-asserted-by":"publisher","award":["U54EB020404"],"award-info":[{"award-number":["U54EB020404"]}],"id":[{"id":"10.13039\/100000070","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1460325,12394018, IIS-1302698, CNS-1351047"],"award-info":[{"award-number":["1460325,12394018, IIS-1302698, CNS-1351047"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,9,24]]},"DOI":"10.1145\/3127479.3131624","type":"proceedings-article","created":{"date-parts":[[2017,9,27]],"date-time":"2017-09-27T12:34:00Z","timestamp":1506515640000},"page":"520-534","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":22,"title":["Automated debugging in data-intensive scalable computing"],"prefix":"10.1145","author":[{"given":"Muhammad Ali","family":"Gulzar","sequence":"first","affiliation":[{"name":"University of California"}]},{"given":"Matteo","family":"Interlandi","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Xueyuan","family":"Han","sequence":"additional","affiliation":[{"name":"Harvard University"}]},{"given":"Mingda","family":"Li","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Tyson","family":"Condie","sequence":"additional","affiliation":[{"name":"University of California"}]},{"given":"Miryung","family":"Kim","sequence":"additional","affiliation":[{"name":"University of California"}]}],"member":"320","published-online":{"date-parts":[[2017,9,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Hadoop. http:\/\/hadoop.apache.org\/.  Hadoop. http:\/\/hadoop.apache.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Spark. https:\/\/spark.apache.org\/.  Spark. https:\/\/spark.apache.org\/."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/93542.93576"},{"key":"e_1_3_2_1_4_1","first-page":"12","volume-title":"School of Electrical and Computer Engineering","author":"Ahmad F.","year":"2012","unstructured":"F. Ahmad , S. Lee , M. Thottethodi , and T. Vijaykumar . Puma: Purdue mapreduce benchmarks suite. Technical report , School of Electrical and Computer Engineering , Purdue University , 2012 . TRECE- 12 - 11 . F. Ahmad, S. Lee, M. Thottethodi, and T. Vijaykumar. Puma: Purdue mapreduce benchmarks suite. Technical report, School of Electrical and Computer Engineering, Purdue University, 2012. TRECE-12-11."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2806416.2806429"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1739041.1739078"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497516"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831713"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1096-908X(199803\/04)10:2<111::AID-SMR167>3.0.CO;2-8"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2934872.2934910"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566211"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.14778\/2994509.2994530"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536258.2536262"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572301"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062522"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-002-0083-8"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-011-0253-7"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2983930"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3058737"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884813"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101948"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376716"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2012.118"},{"key":"e_1_3_2_1_26_1","volume-title":"In Proc. Conference on Innovative Data Systems Research (CIDR)","author":"Ikeda R.","year":"2011","unstructured":"R. Ikeda , H. Park , and J. Widom . Provenance for generalized map and reduce workflows . In In Proc. Conference on Innovative Data Systems Research (CIDR) , 2011 . R. Ikeda, H. Park, and J. Widom. Provenance for generalized map and reduce workflows. In In Proc. Conference on Innovative Data Systems Research (CIDR), 2011."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2013.6544882"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.14778\/2850583.2850595"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2015.7113269"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987550.2987565"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581397"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2747646"},{"key":"e_1_3_2_1_33_1","volume-title":"DTIC Document","author":"Leek T. R.","year":"2007","unstructured":"T. R. Leek , G. Z. Baker , R. E. Brown , M. A. Zhivich , and R. Lippmann . Coverage maximization using dynamic taint tracing. Technical report , DTIC Document , 2007 . T. R. Leek, G. Z. Baker, R. E. Brown, M. A. Zhivich, and R. Lippmann. Coverage maximization using dynamic taint tracing. Technical report, DTIC Document, 2007."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2402"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10619-014-7145-y"},{"key":"e_1_3_2_1_36_1","first-page":"17","volume-title":"Proceedings of the 4th annual Symposium on Cloud Computing","author":"Logothetis D.","unstructured":"D. Logothetis , S. De , and K. Yocum . Scalable lineage capture for debugging disc analytics . In Proceedings of the 4th annual Symposium on Cloud Computing , page 17 . ACM, 2013. D. Logothetis, S. De, and K. Yocum. Scalable lineage capture for debugging disc analytics. In Proceedings of the 4th annual Symposium on Cloud Computing, page 17. ACM, 2013."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2004.17"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14778\/1880172.1880176"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134307"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522738"},{"key":"e_1_3_2_1_41_1","volume-title":"In In Proceedings of the 12th Network and Distributed Systems Security Symposium. Citeseer","author":"Newsome J.","year":"2005","unstructured":"J. Newsome and D. Song . Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software . In In In Proceedings of the 12th Network and Distributed Systems Security Symposium. Citeseer , 2005 . J. Newsome and D. Song. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In In In Proceedings of the 12th Network and Distributed Systems Security Symposium. Citeseer, 2005."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2588578"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2010.5452045"},{"key":"e_1_3_2_1_44_1","volume-title":"Volume II: The New Technologies","author":"Ullman J. D.","year":"1990","unstructured":"J. D. Ullman . Principles of Database and Knowledge-Base Systems : Volume II: The New Technologies . W. H. Freeman & Co. , New York, NY, USA , 1990 . J. D. Ullman. Principles of Database and Knowledge-Base Systems: Volume II: The New Technologies. W. H. Freeman & Co., New York, NY, USA, 1990."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2588555.2610494"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2750549"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/800078.802557"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536354.2536356"},{"key":"e_1_3_2_1_49_1","first-page":"2","volume-title":"Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, NSDI'12","author":"Zaharia M.","year":"2012","unstructured":"M. Zaharia , M. Chowdhury , T. Das , A. Dave , J. Ma , M. McCauley , M. J. Franklin , S. Shenker , and I. Stoica . Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing . In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, NSDI'12 , pages 2 -- 2 , Berkeley, CA, USA , 2012 . USENIX Association. M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. J. Franklin, S. Shenker, and I. Stoica. Resilient distributed datasets: A fault-tolerant abstraction for in-memory cluster computing. In Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation, NSDI'12, pages 2--2, Berkeley, CA, USA, 2012. USENIX Association."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587053"},{"issue":"2","key":"e_1_3_2_1_51_1","first-page":"183","article-title":"Simplifying and isolating failure-inducing input. Software Engineering","volume":"28","author":"Zeller A.","year":"2002","unstructured":"A. Zeller and R. Hildebrandt . Simplifying and isolating failure-inducing input. Software Engineering , IEEE Transactions on , 28 ( 2 ): 183 -- 200 , 2002 . A. Zeller and R. Hildebrandt. Simplifying and isolating failure-inducing input. Software Engineering, IEEE Transactions on, 28(2):183--200, 2002.","journal-title":"IEEE Transactions on"}],"event":{"name":"SoCC '17: ACM Symposium on Cloud Computing","location":"Santa Clara California","acronym":"SoCC '17","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 2017 Symposium on Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3127479.3131624","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3127479.3131624","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3127479.3131624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:29Z","timestamp":1750217429000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3127479.3131624"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,9,24]]},"references-count":51,"alternative-id":["10.1145\/3127479.3131624","10.1145\/3127479"],"URL":"https:\/\/doi.org\/10.1145\/3127479.3131624","relation":{},"subject":[],"published":{"date-parts":[[2017,9,24]]},"assertion":[{"value":"2017-09-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}