{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,20]],"date-time":"2025-07-20T03:49:50Z","timestamp":1752983390365,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":70,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,6,8]],"date-time":"2019-06-08T00:00:00Z","timestamp":1559952000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1837120,CNS-1764039,1563956,1514256,IIS-1546543"],"award-info":[{"award-number":["CCF-1837120,CNS-1764039,1563956,1514256,IIS-1546543"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,6,8]]},"DOI":"10.1145\/3314221.3314620","type":"proceedings-article","created":{"date-parts":[[2019,6,7]],"date-time":"2019-06-07T21:02:18Z","timestamp":1559941338000},"page":"994-1009","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["DFix: automatically fixing timing bugs in distributed systems"],"prefix":"10.1145","author":[{"given":"Guangpu","family":"Li","sequence":"first","affiliation":[{"name":"University of Chicago, USA"}]},{"given":"Haopeng","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Chicago, USA"}]},{"given":"Xianglan","family":"Chen","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, China"}]},{"given":"Haryadi S.","family":"Gunawi","sequence":"additional","affiliation":[{"name":"University of Chicago, USA"}]},{"given":"Shan","family":"Lu","sequence":"additional","affiliation":[{"name":"University of Chicago, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,6,8]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2013. ZooKeeper 1653. https:\/\/issues.apache.org\/jira\/browse\/ ZOOKEEPER-1653 . (2013). Accessed: 2013-11-26.  2013. ZooKeeper 1653. https:\/\/issues.apache.org\/jira\/browse\/ ZOOKEEPER-1653 . (2013). Accessed: 2013-11-26."},{"key":"e_1_3_2_2_2_1","unstructured":"2017. HBase 10090. https:\/\/issues.apache.org\/jira\/browse\/ HBASE-10090 . (2017). Accessed: 2017-09-16.  2017. HBase 10090. https:\/\/issues.apache.org\/jira\/browse\/ HBASE-10090 . (2017). Accessed: 2017-09-16."},{"key":"e_1_3_2_2_3_1","unstructured":"2017. MapReduce 4637. https:\/\/issues.apache.org\/jira\/browse\/ MAPREDUCE-4637 . (2017). Accessed: 2017-09-16.  2017. MapReduce 4637. https:\/\/issues.apache.org\/jira\/browse\/ MAPREDUCE-4637 . (2017). Accessed: 2017-09-16."},{"key":"e_1_3_2_2_4_1","unstructured":"2017. ZooKeeper. https:\/\/zookeeper.apache.org\/ . (2017). Accessed: 2017-09-16.  2017. ZooKeeper. https:\/\/zookeeper.apache.org\/ . (2017). Accessed: 2017-09-16."},{"key":"e_1_3_2_2_5_1","unstructured":"2017. ZooKeeper 1270. https:\/\/issues.apache.org\/jira\/browse\/ ZOOKEEPER-1270 . (2017). Accessed: 2017-09-16.  2017. ZooKeeper 1270. https:\/\/issues.apache.org\/jira\/browse\/ ZOOKEEPER-1270 . (2017). Accessed: 2017-09-16."},{"key":"e_1_3_2_2_6_1","unstructured":"2018. Btrfs Rollback. https:\/\/ramsdenj.com\/2016\/04\/05\/ using-btrfs-for-easy-backup-and-rollback.html . (2018). Accessed: 2018-04-30.  2018. Btrfs Rollback. https:\/\/ramsdenj.com\/2016\/04\/05\/ using-btrfs-for-easy-backup-and-rollback.html . (2018). Accessed: 2018-04-30."},{"key":"e_1_3_2_2_7_1","unstructured":"2018. Google Protocol Buffer. https:\/\/developers.google.com\/ protocol-buffers\/docs\/reference\/overview . (2018). Accessed: 2018-05-01.  2018. Google Protocol Buffer. https:\/\/developers.google.com\/ protocol-buffers\/docs\/reference\/overview . (2018). Accessed: 2018-05-01."},{"key":"e_1_3_2_2_8_1","unstructured":"2018. Hadoop AsyncDispatcher. https:\/\/hadoop.apache.org\/docs\/r2.4. 1\/api\/org\/apache\/hadoop\/yarn\/event\/AsyncDispatcher.html . (2018). Accessed: 2018-05-01.  2018. Hadoop AsyncDispatcher. https:\/\/hadoop.apache.org\/docs\/r2.4. 1\/api\/org\/apache\/hadoop\/yarn\/event\/AsyncDispatcher.html . (2018). Accessed: 2018-05-01."},{"key":"e_1_3_2_2_9_1","unstructured":"2018. Hadoop VersionProto. https:\/\/blog.woopi.org\/wordpress\/ files\/hadoop-2.6.0-javadoc\/org\/apache\/hadoop\/yarn\/proto\/ YarnServerCommonProtos.VersionProto.html . (2018). Accessed: 2018-05-01.  2018. Hadoop VersionProto. https:\/\/blog.woopi.org\/wordpress\/ files\/hadoop-2.6.0-javadoc\/org\/apache\/hadoop\/yarn\/proto\/ YarnServerCommonProtos.VersionProto.html . (2018). Accessed: 2018-05-01."},{"key":"e_1_3_2_2_10_1","unstructured":"2018. HBase ProtoBase. http:\/\/www.grepcode.com\/file\/repository. cloudera.com\/content\/repositories\/releases\/org.apache.hadoop\/ hadoop-yarn-common\/2.3.0-cdh5.1.4\/org\/apache\/hadoop\/yarn\/api\/ records\/impl\/pb\/ProtoBase.java?av=h . (2018). Accessed: 2018-05-01.  2018. HBase ProtoBase. http:\/\/www.grepcode.com\/file\/repository. cloudera.com\/content\/repositories\/releases\/org.apache.hadoop\/ hadoop-yarn-common\/2.3.0-cdh5.1.4\/org\/apache\/hadoop\/yarn\/api\/ records\/impl\/pb\/ProtoBase.java?av=h . (2018). Accessed: 2018-05-01."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.34"},{"key":"e_1_3_2_2_12_1","volume-title":"Ullman","author":"Aho Alfred V.","year":"2006","unstructured":"Alfred V. Aho , Monica S. Lam , Ravi Sethi , and Jeffrey D . Ullman . 2006 . Compilers : Principles, Techniques, and Tools (2Nd Edition). AddisonWesley Longman Publishing Co. , Inc., Boston, MA, USA. Alfred V. Aho, Monica S. Lam, Ravi Sethi, and Jeffrey D. Ullman. 2006. Compilers: Principles, Techniques, and Tools (2Nd Edition). AddisonWesley Longman Publishing Co., Inc., Boston, MA, USA."},{"volume-title":"Protocol-Aware Recovery for Consensus-Based Storage. In 16th USENIX Conference on File and Storage Technologies (FAST 18)","author":"Alagappan Ramnatthan","key":"e_1_3_2_2_13_1","unstructured":"Ramnatthan Alagappan , Aishwarya Ganesan , Eric Lee , Aws Albarghouthi , Vijay Chidambaram , Andrea C. Arpaci-Dusseau , and Remzi H . Arpaci-Dusseau. 2018 . Protocol-Aware Recovery for Consensus-Based Storage. In 16th USENIX Conference on File and Storage Technologies (FAST 18) . USENIX Association, Oakland, CA, 15\u015b32. https: \/\/www.usenix.org\/conference\/fast18\/presentation\/alagappan Ramnatthan Alagappan, Aishwarya Ganesan, Eric Lee, Aws Albarghouthi, Vijay Chidambaram, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. 2018. Protocol-Aware Recovery for Consensus-Based Storage. In 16th USENIX Conference on File and Storage Technologies (FAST 18). USENIX Association, Oakland, CA, 15\u015b32. https: \/\/www.usenix.org\/conference\/fast18\/presentation\/alagappan"},{"key":"e_1_3_2_2_14_1","volume-title":"Correlated Crash Vulnerabilities. In 12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016","author":"Alagappan Ramnatthan","year":"2016","unstructured":"Ramnatthan Alagappan , Aishwarya Ganesan , Yuvraj Patel , Thanumalayan Sankaranarayana Pillai , Andrea C. Arpaci-Dusseau , and Remzi H . Arpaci-Dusseau. 2016 . Correlated Crash Vulnerabilities. In 12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016 , Savannah, GA, USA , November 2-4, 2016 . 151\u015b 167. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/ presentation\/alagappan Ramnatthan Alagappan, Aishwarya Ganesan, Yuvraj Patel, Thanumalayan Sankaranarayana Pillai, Andrea C. Arpaci-Dusseau, and Remzi H. Arpaci-Dusseau. 2016. Correlated Crash Vulnerabilities. In 12th USENIX Symposium on Operating Systems Design and Implementation, OSDI 2016, Savannah, GA, USA, November 2-4, 2016. 151\u015b 167. https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/ presentation\/alagappan"},{"key":"e_1_3_2_2_15_1","volume-title":"Checking for Race Conditions in File Accesses. Computing Systems 2, 2","author":"Bishop Matt","year":"1996","unstructured":"Matt Bishop and Michael Dilger . 1996. Checking for Race Conditions in File Accesses. Computing Systems 2, 2 ( 1996 ), 131\u015b152. http:\/\/www. usenix.org\/publications\/compsystems\/1996\/spr_bishop.pdf Matt Bishop and Michael Dilger. 1996. Checking for Race Conditions in File Accesses. Computing Systems 2, 2 (1996), 131\u015b152. http:\/\/www. usenix.org\/publications\/compsystems\/1996\/spr_bishop.pdf"},{"key":"e_1_3_2_2_16_1","volume-title":"Proceedings of the 14th USENIX Security Symposium","author":"Borisov Nikita","year":"2005","unstructured":"Nikita Borisov and Robert Johnson . 2005 . Fixing Races for Fun and Profit: How to Abuse atime . In Proceedings of the 14th USENIX Security Symposium , Baltimore, MD, USA, July 31 - August 5, 2005. https: \/\/www.usenix.org\/conference\/14th-usenix-security-symposium\/ fixing-races-fun-and-profit-how-abuse-atime Nikita Borisov and Robert Johnson. 2005. Fixing Races for Fun and Profit: How to Abuse atime. In Proceedings of the 14th USENIX Security Symposium, Baltimore, MD, USA, July 31 - August 5, 2005. https: \/\/www.usenix.org\/conference\/14th-usenix-security-symposium\/ fixing-races-fun-and-profit-how-abuse-atime"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3009837.3009895"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985811"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/214451.214456"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1365815.1365816"},{"key":"e_1_3_2_2_21_1","unstructured":"Michael Chow David Meisner Jason Flinn Daniel Peek and Thomas F Wenisch. 2014. The Mystery Machine: End-to-end Performance Analysis of Large-scale Internet Services.. In OSDI. 217\u015b231.   Michael Chow David Meisner Jason Flinn Daniel Peek and Thomas F Wenisch. 2014. The Mystery Machine: End-to-end Performance Analysis of Large-scale Internet Services.. In OSDI. 217\u015b231."},{"key":"e_1_3_2_2_22_1","volume-title":"Claire Le Goues, and Celso Gon\u00e7alves CamiloJunior","author":"de Souza Eduardo Faria","year":"2018","unstructured":"Eduardo Faria de Souza , Claire Le Goues, and Celso Gon\u00e7alves CamiloJunior . 2018 . A Novel Fitness Function for Automated Program Repair Based on Source Code Checkpoints . (2018). Eduardo Faria de Souza, Claire Le Goues, and Celso Gon\u00e7alves CamiloJunior. 2018. A Novel Fitness Function for Automated Program Repair Based on Source Code Checkpoints. (2018)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294281"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499370.2462184"},{"key":"e_1_3_2_2_26_1","unstructured":"Dennis Michael Geels Gautam Altekar Scott Shenker and Ion Stoica. 2006. Replay debugging for distributed applications. (2006).  Dennis Michael Geels Gautam Altekar Scott Shenker and Ion Stoica. 2006. Replay debugging for distributed applications. (2006)."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132753"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945450"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/573304"},{"volume-title":"Proceedings of the ACM Symposium on Cloud Computing (SOCC).","author":"Gunawi Haryadi S.","key":"e_1_3_2_2_31_1","unstructured":"Haryadi S. Gunawi , Mingzhe Hao , Tanakorn Leesatapornwongsa , Tiratat Patana-anake, Thanh Do , Jeffry Adityatama , Kurnia J. Eliazar , Agung Laksono , Jeffrey F. Lukman , Vincentius Martin , and Anang D. Satria . 2014. What Bugs Live in the Cloud? A Study of 3000+ Issues in Cloud Systems . In Proceedings of the ACM Symposium on Cloud Computing (SOCC). Haryadi S. Gunawi, Mingzhe Hao, Tanakorn Leesatapornwongsa, Tiratat Patana-anake, Thanh Do, Jeffry Adityatama, Kurnia J. Eliazar, Agung Laksono, Jeffrey F. Lukman, Vincentius Martin, and Anang D. Satria. 2014. What Bugs Live in the Cloud? A Study of 3000+ Issues in Cloud Systems. In Proceedings of the ACM Symposium on Cloud Computing (SOCC)."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043582"},{"key":"e_1_3_2_2_33_1","volume-title":"Failure Recovery: When the Cure Is Worse Than the Disease. In 14th Workshop on Hot Topics in Operating Systems, HotOS XIV, Santa Ana Pueblo","author":"Guo Zhenyu","year":"2013","unstructured":"Zhenyu Guo , Sean McDirmid , Mao Yang , Li Zhuang , Pu Zhang , Yingwei Luo , Tom Bergan , Madan Musuvathi , Zheng Zhang , and Lidong Zhou . 2013 . Failure Recovery: When the Cure Is Worse Than the Disease. In 14th Workshop on Hot Topics in Operating Systems, HotOS XIV, Santa Ana Pueblo , New Mexico, USA , May 13-15, 2013. https:\/\/www.usenix.org\/conference\/hotos13\/session\/guo Zhenyu Guo, Sean McDirmid, Mao Yang, Li Zhuang, Pu Zhang, Yingwei Luo, Tom Bergan, Madan Musuvathi, Zheng Zhang, and Lidong Zhou. 2013. Failure Recovery: When the Cure Is Worse Than the Disease. In 14th Workshop on Hot Topics in Operating Systems, HotOS XIV, Santa Ana Pueblo, New Mexico, USA, May 13-15, 2013. https:\/\/www.usenix.org\/conference\/hotos13\/session\/guo"},{"key":"e_1_3_2_2_34_1","volume-title":"2Nd Edition","author":"Harris Tim","unstructured":"Tim Harris , James Larus , and Ravi Rajwar . 2010. Transactional Memory , 2Nd Edition ( 2 nd ed.). Morgan and Claypool Publishers . Tim Harris, James Larus, and Ravi Rajwar. 2010. Transactional Memory, 2Nd Edition (2nd ed.). Morgan and Claypool Publishers.","edition":"2"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815428"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462167"},{"key":"e_1_3_2_2_37_1","unstructured":"IBM. 2017. Main Page - WalaWiki. http:\/\/wala.sourceforge.net\/wiki\/ index.php\/Main_Page . (2017).  IBM. 2017. Main Page - WalaWiki. http:\/\/wala.sourceforge.net\/wiki\/ index.php\/Main_Page . (2017)."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993316.1993544"},{"key":"e_1_3_2_2_39_1","first-page":"236","article-title":"Automated Concurrency-Bug Fixing","volume":"12","author":"Jin Guoliang","year":"2012","unstructured":"Guoliang Jin , Wei Zhang , Dongdong Deng , Ben Liblit , and Shan Lu . 2012 . Automated Concurrency-Bug Fixing .. In OSDI , Vol. 12. 221\u015b 236 . Guoliang Jin, Wei Zhang, Dongdong Deng, Ben Liblit, and Shan Lu. 2012. Automated Concurrency-Bug Fixing.. In OSDI, Vol. 12. 221\u015b236.","journal-title":"OSDI"},{"key":"e_1_3_2_2_40_1","volume-title":"Deadlock Immunity: Enabling Systems To Defend Against Deadlocks. In OSDI.","author":"Jula Horatiu","year":"2008","unstructured":"Horatiu Jula , Daniel Tralamazza , Cristian Zamfir , and George Candea . 2008 . Deadlock Immunity: Enabling Systems To Defend Against Deadlocks. In OSDI. Horatiu Jula, Daniel Tralamazza, Cristian Zamfir, and George Candea. 2008. Deadlock Immunity: Enabling Systems To Defend Against Deadlocks. In OSDI."},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213870"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2189750.2150997"},{"key":"e_1_3_2_2_43_1","unstructured":"Charles Killian James W Anderson Ranjit Jhala and Amin Vahdat. 2007. Life death and the critical transition: Finding liveness bugs in systems code. NSDI.   Charles Killian James W Anderson Ranjit Jhala and Amin Vahdat. 2007. Life death and the critical transition: Finding liveness bugs in systems code. NSDI."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"crossref","unstructured":"Claire Le Goues Michael Dewey-Vogt Stephanie Forrest and Westley Weimer. 2012. A Systematic Study of Automated Program Repair: Fixing 55 out of 105 Bugs for $8 Each. In ICSE.   Claire Le Goues Michael Dewey-Vogt Stephanie Forrest and Westley Weimer. 2012. A Systematic Study of Automated Program Repair: Fixing 55 out of 105 Bugs for $8 Each. In ICSE.","DOI":"10.1109\/ICSE.2012.6227211"},{"key":"e_1_3_2_2_45_1","volume-title":"SAMC: Semantic-Aware Model Checking for Fast Discovery of Deep Bugs in Cloud Systems.. In OSDI. 399\u015b414.","author":"Leesatapornwongsa Tanakorn","year":"2014","unstructured":"Tanakorn Leesatapornwongsa , Mingzhe Hao , Pallavi Joshi , Jeffrey F Lukman , and Haryadi S Gunawi . 2014 . SAMC: Semantic-Aware Model Checking for Fast Discovery of Deep Bugs in Cloud Systems.. In OSDI. 399\u015b414. Tanakorn Leesatapornwongsa, Mingzhe Hao, Pallavi Joshi, Jeffrey F Lukman, and Haryadi S Gunawi. 2014. SAMC: Semantic-Aware Model Checking for Fast Discovery of Deep Bugs in Cloud Systems.. In OSDI. 399\u015b414."},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872374"},{"key":"e_1_3_2_2_47_1","volume-title":"Proc. of USENIX Symposium on Networked Systems Design &amp; Implementation (NSDI).","author":"Lin Haoxiang","year":"2009","unstructured":"Haoxiang Lin , Mao Yang , Fan Long , Lintao Zhang , and Lidong Zhou . 2009 . MODIST: Transparent model checking of unmodified distributed systems . In Proc. of USENIX Symposium on Networked Systems Design &amp; Implementation (NSDI). Haoxiang Lin, Mao Yang, Fan Long, Lintao Zhang, and Lidong Zhou. 2009. MODIST: Transparent model checking of unmodified distributed systems. In Proc. of USENIX Symposium on Networked Systems Design &amp; Implementation (NSDI)."},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037735"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177161"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635881"},{"key":"e_1_3_2_2_51_1","unstructured":"Xuezheng Liu Wei Lin Aimin Pan and Zheng Zhang. 2007. WiDS checker: Combating bugs in distributed systems. (2007).  Xuezheng Liu Wei Lin Aimin Pan and Zheng Zhang. 2007. WiDS checker: Combating bugs in distributed systems. (2007)."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398857.2384626"},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451121"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815415"},{"key":"e_1_3_2_2_55_1","unstructured":"IHS Markit. 2016. Businesses Losing $700 Billion a Year to IT Downtime Says IHS. http:\/\/news.ihsmarkit.com\/press-release\/technology\/ businesses-losing-700-billion-year-it-downtime-says-ihs . (2016).  IHS Markit. 2016. Businesses Losing $700 Billion a Year to IT Downtime Says IHS. http:\/\/news.ihsmarkit.com\/press-release\/technology\/ businesses-losing-700-billion-year-it-downtime-says-ihs . (2016)."},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522738"},{"key":"e_1_3_2_2_57_1","unstructured":"Edmund B Nightingale Jeremy Elson Jinliang Fan Owen S Hofmann Jon Howell and Yutaka Suzue. 2012. Flat Datacenter Storage.. In OSDI. 1\u015b15.   Edmund B Nightingale Jeremy Elson Jinliang Fan Owen S Hofmann Jon Howell and Yutaka Suzue. 2012. Flat Datacenter Storage.. In OSDI. 1\u015b15."},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095809.1095833"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337257"},{"key":"e_1_3_2_2_61_1","volume-title":"Realizing the Fault-Tolerance Promise of Cloud Storage Using Locks with Intent. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Setty Srinath","year":"2016","unstructured":"Srinath Setty , Chunzhi Su , Jacob R. Lorch , Lidong Zhou , Hao Chen , Parveen Patel , and Jinglei Ren . 2016 . Realizing the Fault-Tolerance Promise of Cloud Storage Using Locks with Intent. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16) . USENIX Association, Savannah, GA, 501\u015b516. https:\/\/www.usenix. org\/conference\/osdi16\/technical-sessions\/presentation\/setty Srinath Setty, Chunzhi Su, Jacob R. Lorch, Lidong Zhou, Hao Chen, Parveen Patel, and Jinglei Ren. 2016. Realizing the Fault-Tolerance Promise of Cloud Storage Using Locks with Intent. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). USENIX Association, Savannah, GA, 501\u015b516. https:\/\/www.usenix. org\/conference\/osdi16\/technical-sessions\/presentation\/setty"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508284.1508250"},{"key":"e_1_3_2_2_63_1","unstructured":"Jiri Simsa Randy Bryant and Garth A Gibson. 2010. dBug: Systematic Evaluation of Distributed Systems.. In SSV.   Jiri Simsa Randy Bryant and Garth A Gibson. 2010. dBug: Systematic Evaluation of Distributed Systems.. In SSV."},{"key":"e_1_3_2_2_64_1","volume-title":"Software Engineering: (Update)","author":"Sommerville Ian","unstructured":"Ian Sommerville . 2006. Software Engineering: (Update) ( 8 th Edition). Addison-Wesley Longman Publishing Co., Inc. , Boston, MA, USA . Ian Sommerville. 2006. Software Engineering: (Update) (8th Edition). Addison-Wesley Longman Publishing Co., Inc., Boston, MA, USA.","edition":"8"},{"key":"e_1_3_2_2_65_1","volume-title":"New Strategies for Selecting Reuse Candidates on Automated Program Repair. In Computer Software and Applications Conference (COMPSAC)","volume":"2","author":"Tanikado Akito","year":"2017","unstructured":"Akito Tanikado , Haruki Yokoyama , Masahiro Yamamoto , Soichi Sumi , Yoshiki Higo , and Shinji Kusumoto . 2017 . New Strategies for Selecting Reuse Candidates on Automated Program Repair. In Computer Software and Applications Conference (COMPSAC) , 2017 IEEE 41st Annual , Vol. 2 . IEEE, 266\u015b267. Akito Tanikado, Haruki Yokoyama, Masahiro Yamamoto, Soichi Sumi, Yoshiki Higo, and Shinji Kusumoto. 2017. New Strategies for Selecting Reuse Candidates on Automated Program Repair. In Computer Software and Applications Conference (COMPSAC), 2017 IEEE 41st Annual, Vol. 2. IEEE, 266\u015b267."},{"key":"e_1_3_2_2_66_1","unstructured":"Theregister. 2017. AWS\u2019s S3 outage was so bad Amazon couldn\u2019t get into its own dashboard to warn the world. https:\/\/www.theregister.co. uk\/2017\/03\/01\/aws_s3_outage\/ . (2017).  Theregister. 2017. AWS\u2019s S3 outage was so bad Amazon couldn\u2019t get into its own dashboard to warn the world. https:\/\/www.theregister.co. uk\/2017\/03\/01\/aws_s3_outage\/ . (2017)."},{"key":"e_1_3_2_2_67_1","unstructured":"Yin Wang Terence Kelly Manjunath Kudlur Stephane Lafortune and Scott Mahlk. 2008. Gadara: dynamic deadlock avoidance for multthreaded programs. In OSDI.   Yin Wang Terence Kelly Manjunath Kudlur Stephane Lafortune and Scott Mahlk. 2008. Gadara: dynamic deadlock avoidance for multthreaded programs. In OSDI."},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2813885.2737958"},{"key":"e_1_3_2_2_69_1","unstructured":"Yang Wu Ang Chen Andreas Haeberlen Wenchao Zhou and Boon Thau Loo. 2017. Automated Bug Removal for Software-Defined Networks.. In NSDI. 719\u015b733.   Yang Wu Ang Chen Andreas Haeberlen Wenchao Zhou and Boon Thau Loo. 2017. Automated Bug Removal for Software-Defined Networks.. In NSDI. 719\u015b733."},{"key":"e_1_3_2_2_70_1","volume-title":"Xu Zhao, Yongle Zhang, Pranay Jain, and Michael Stumm.","author":"Yuan Ding","year":"2014","unstructured":"Ding Yuan , Yu Luo , Xin Zhuang , Guilherme Renna Rodrigues , Xu Zhao, Yongle Zhang, Pranay Jain, and Michael Stumm. 2014 . Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-intensive Systems. In OSDI. Ding Yuan, Yu Luo, Xin Zhuang, Guilherme Renna Rodrigues, Xu Zhao, Yongle Zhang, Pranay Jain, and Michael Stumm. 2014. Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-intensive Systems. In OSDI."},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132768"}],"event":{"name":"PLDI '19: 40th ACM SIGPLAN Conference on Programming Language Design and Implementation","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Phoenix AZ USA","acronym":"PLDI '19"},"container-title":["Proceedings of the 40th ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314221.3314620","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314221.3314620","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3314221.3314620","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:22Z","timestamp":1750204402000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3314221.3314620"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,6,8]]},"references-count":70,"alternative-id":["10.1145\/3314221.3314620","10.1145\/3314221"],"URL":"https:\/\/doi.org\/10.1145\/3314221.3314620","relation":{},"subject":[],"published":{"date-parts":[[2019,6,8]]},"assertion":[{"value":"2019-06-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}