{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T17:43:53Z","timestamp":1772041433049,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,27]],"date-time":"2019-10-27T00:00:00Z","timestamp":1572134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,27]]},"DOI":"10.1145\/3341301.3359650","type":"proceedings-article","created":{"date-parts":[[2019,10,21]],"date-time":"2019-10-21T13:34:22Z","timestamp":1571664862000},"page":"131-146","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":27,"title":["The inflection point hypothesis"],"prefix":"10.1145","author":[{"given":"Yongle","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Toronto"}]},{"given":"Kirk","family":"Rodrigues","sequence":"additional","affiliation":[{"name":"University of Toronto"}]},{"given":"Yu","family":"Luo","sequence":"additional","affiliation":[{"name":"University of Toronto"}]},{"given":"Michael","family":"Stumm","sequence":"additional","affiliation":[{"name":"University of Toronto"}]},{"given":"Ding","family":"Yuan","sequence":"additional","affiliation":[{"name":"University of Toronto"}]}],"member":"320","published-online":{"date-parts":[[2019,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Proceedings of the 1990 Conference on Programming Language Design and Implementation (PLDI '90)","author":"Agrawal Hiralal","unstructured":"Hiralal Agrawal and Joseph R. Horgan . 1990. Dynamic Program Slicing . In Proceedings of the 1990 Conference on Programming Language Design and Implementation (PLDI '90) . ACM, 246--256. Hiralal Agrawal and Joseph R. Horgan. 1990. Dynamic Program Slicing. In Proceedings of the 1990 Conference on Programming Language Design and Implementation (PLDI '90). ACM, 246--256."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629594"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541973"},{"key":"e_1_3_2_1_4_1","volume-title":"Proceedings of the 10th Conference on Operating Systems Design and Implementation (OSDI '12)","author":"Attariyan Mona","year":"2012","unstructured":"Mona Attariyan , Michael Chow , and Jason Flinn . 2012 . X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software . In Proceedings of the 10th Conference on Operating Systems Design and Implementation (OSDI '12) . USENIX, 307--320. Mona Attariyan, Michael Chow, and Jason Flinn. 2012. X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software. In Proceedings of the 10th Conference on Operating Systems Design and Implementation (OSDI '12). USENIX, 307--320."},{"key":"e_1_3_2_1_5_1","volume-title":"Proceedings of the 6th Conference on Operating Systems Design and Implementation (OSDI '04)","author":"Barham Paul","year":"2004","unstructured":"Paul Barham , Austin Donnelly , Rebecca Isaacs , and Richard Mortier . 2004 . Using Magpie for Request Extraction and Workload Modelling . In Proceedings of the 6th Conference on Operating Systems Design and Implementation (OSDI '04) . USENIX, 259--272. Paul Barham, Austin Donnelly, Rebecca Isaacs, and Richard Mortier. 2004. Using Magpie for Request Extraction and Workload Modelling. In Proceedings of the 6th Conference on Operating Systems Design and Implementation (OSDI '04). USENIX, 259--272."},{"key":"e_1_3_2_1_6_1","volume-title":"Sigelman and Luiz Andr\u00e9 Barroso and Mike Burrows and Pat Stephenson and Manoj Plakal and Donald Beaver and Saul Jaspan and Chandan Shanbhag","author":"Benjamin","year":"2010","unstructured":"Benjamin H. Sigelman and Luiz Andr\u00e9 Barroso and Mike Burrows and Pat Stephenson and Manoj Plakal and Donald Beaver and Saul Jaspan and Chandan Shanbhag . 2010 . Dapper, a Large-Scale Distributed Systems Tracing Infrastructure. Technical Report. Google Incorporated . https:\/\/research.google.com\/archive\/papers\/dapper-2010-1.pdf Benjamin H. Sigelman and Luiz Andr\u00e9 Barroso and Mike Burrows and Pat Stephenson and Manoj Plakal and Donald Beaver and Saul Jaspan and Chandan Shanbhag. 2010. Dapper, a Large-Scale Distributed Systems Tracing Infrastructure. Technical Report. Google Incorporated. https:\/\/research.google.com\/archive\/papers\/dapper-2010-1.pdf"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1337691.1338380"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 26th International Conference on Software Engineering (ICSE '04)","author":"Brun Yuriy","unstructured":"Yuriy Brun and Michael D. Ernst . 2004. Finding Latent Code Errors via Machine Learning over Program Executions . In Proceedings of the 26th International Conference on Software Engineering (ICSE '04) . IEEE Computer Society, 480--490. Yuriy Brun and Michael D. Ernst. 2004. Finding Latent Code Errors via Machine Learning over Program Executions. In Proceedings of the 26th International Conference on Software Engineering (ICSE '04). IEEE Computer Society, 480--490."},{"key":"e_1_3_2_1_9_1","volume-title":"Proceedings of the 8th Conference on Operating Systems Design and Implementation (OSDI '08)","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , Dawson R Engler , 2008 . KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs . In Proceedings of the 8th Conference on Operating Systems Design and Implementation (OSDI '08) . USENIX, 209--224. Cristian Cadar, Daniel Dunbar, Dawson R Engler, et al. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs. In Proceedings of the 8th Conference on Operating Systems Design and Implementation (OSDI '08). USENIX, 209--224."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062522"},{"key":"e_1_3_2_1_11_1","unstructured":"Oracle Corporation. 2018. Java\u2122 Virtual Machine Tool Interface (JVM TI). http:\/\/docs.oracle.com\/javase\/7\/docs\/technotes\/guides\/jvmti\/.  Oracle Corporation. 2018. Java \u2122 Virtual Machine Tool Interface (JVM TI). http:\/\/docs.oracle.com\/javase\/7\/docs\/technotes\/guides\/jvmti\/."},{"key":"e_1_3_2_1_12_1","volume-title":"Proceedings of the 24th Symposium on Operating Systems Principles (SOSP '13)","author":"Cui Heming","unstructured":"Heming Cui , Jiri Simsa , Yi-Hong Lin , Hao Li , Ben Blum , Xinan Xu , Junfeng Yang , Garth A. Gibson , and Randal E. Bryant . 2013. Parrot: A Practical Runtime for Deterministic, Stable, and Reliable Threads . In Proceedings of the 24th Symposium on Operating Systems Principles (SOSP '13) . ACM, 388--405. Heming Cui, Jiri Simsa, Yi-Hong Lin, Hao Li, Ben Blum, Xinan Xu, Junfeng Yang, Garth A. Gibson, and Randal E. Bryant. 2013. Parrot: A Practical Runtime for Deterministic, Stable, and Reliable Threads. In Proceedings of the 24th Symposium on Operating Systems Principles (SOSP '13). ACM, 388--405."},{"key":"e_1_3_2_1_13_1","volume-title":"Proceedings of the 12th Conference on Operating Systems Design and Implementation (OSDI '18)","author":"Cui Weidong","year":"2018","unstructured":"Weidong Cui , Xinyang Ge , Baris Kasikci , Ben Niu , Upamanyu Sharma , Ruoyu Wang , and Insu Yun . 2018 . REPT: Reverse Debugging of Failures in Deployed Software . In Proceedings of the 12th Conference on Operating Systems Design and Implementation (OSDI '18) . USENIX, 17--32. Weidong Cui, Xinyang Ge, Baris Kasikci, Ben Niu, Upamanyu Sharma, Ruoyu Wang, and Insu Yun. 2018. REPT: Reverse Debugging of Failures in Deployed Software. In Proceedings of the 12th Conference on Operating Systems Design and Implementation (OSDI '18). USENIX, 17--32."},{"key":"e_1_3_2_1_14_1","volume-title":"Eidetic Systems. In Proceedings of the 11th Conference on Operating Systems Design and Implementation (OSDI '14)","author":"Devecsery David","unstructured":"David Devecsery , Michael Chow , Xianzheng Dou , Jason Flinn , and Peter M. Chen . 2014 . Eidetic Systems. In Proceedings of the 11th Conference on Operating Systems Design and Implementation (OSDI '14) . USENIX, 525--540. David Devecsery, Michael Chow, Xianzheng Dou, Jason Flinn, and Peter M. Chen. 2014. Eidetic Systems. In Proceedings of the 11th Conference on Operating Systems Design and Implementation (OSDI '14). USENIX, 525--540."},{"key":"e_1_3_2_1_15_1","volume-title":"Proceedings of the 5th Conference on Operating Systems Design and implementation (OSDI '02)","author":"Dunlap George W.","unstructured":"George W. Dunlap , Samuel T. King , Sukru Cinar , Murtaza A. Basrai , and Peter M. Chen . 2002. ReVirt: Enabling Intrusion Analysis Through Virtual-machine Logging and Replay . In Proceedings of the 5th Conference on Operating Systems Design and implementation (OSDI '02) . USENIX, 211--224. George W. Dunlap, Samuel T. King, Sukru Cinar, Murtaza A. Basrai, and Peter M. Chen. 2002. ReVirt: Enabling Intrusion Analysis Through Virtual-machine Logging and Replay. In Proceedings of the 5th Conference on Operating Systems Design and implementation (OSDI '02). USENIX, 211--224."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302467"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 4th Conference on Networked Systems Design and Implementation (NSDI '07)","author":"Fonseca Rodrigo","year":"2007","unstructured":"Rodrigo Fonseca , George Porter , Randy H. Katz , Scott Shenker , and Ion Stoica . 2007 . X-Trace: A Pervasive Network Tracing Framework . In Proceedings of the 4th Conference on Networked Systems Design and Implementation (NSDI '07) . USENIX, 271--284. Rodrigo Fonseca, George Porter, Randy H. Katz, Scott Shenker, and Ion Stoica. 2007. X-Trace: A Pervasive Network Tracing Framework. In Proceedings of the 4th Conference on Networked Systems Design and Implementation (NSDI '07). USENIX, 271--284."},{"key":"e_1_3_2_1_18_1","unstructured":"Apache Software Foundation. 2017. Apache Thrift. https:\/\/thrift.apache.org\/lib\/  Apache Software Foundation. 2017. Apache Thrift. https:\/\/thrift.apache.org\/lib\/"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/11688839_7"},{"key":"e_1_3_2_1_20_1","unstructured":"Xiaoqiao He. 2019. NameNode RepicationMonitor Failure Diagnosis (Chinese). https:\/\/hexiaoqiao.github.io\/blog\/2016\/09\/13\/namenode-repicationmonitor-exception-trace\/  Xiaoqiao He. 2019. NameNode RepicationMonitor Failure Diagnosis (Chinese). https:\/\/hexiaoqiao.github.io\/blog\/2016\/09\/13\/namenode-repicationmonitor-exception-trace\/"},{"key":"e_1_3_2_1_21_1","unstructured":"Xiaoqiao He. 2019. NameNode RepicationMonitor Failure Diagnosis (English Translation). https:\/\/bit.ly\/2UA9q5v  Xiaoqiao He. 2019. NameNode RepicationMonitor Failure Diagnosis (English Translation). https:\/\/bit.ly\/2UA9q5v"},{"key":"e_1_3_2_1_22_1","unstructured":"Xiaoqiao He. 2019. ReplicationMonitor Thread Could Stuck for Long Time Due to the Race Between Replication and Delete of Same File in a Large Cluster. https:\/\/issues.apache.org\/jira\/browse\/HDFS-10453  Xiaoqiao He. 2019. ReplicationMonitor Thread Could Stuck for Long Time Due to the Race Between Replication and Delete of Same File in a Large Cluster. https:\/\/issues.apache.org\/jira\/browse\/HDFS-10453"},{"key":"e_1_3_2_1_23_1","unstructured":"Google Incorporated. 2019. Protocol Buffers. https:\/\/developers.google.com\/protocol-buffers\/  Google Incorporated. 2019. Protocol Buffers. https:\/\/developers.google.com\/protocol-buffers\/"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 20th Conference on Automated Software Engineering (ASE '05)","author":"James","unstructured":"James A. Jones and Mary Jean Harrold. 2005. Empirical Evaluation of the Tarantula Automatic Fault-localization Technique . In Proceedings of the 20th Conference on Automated Software Engineering (ASE '05) . ACM, 273--282. James A. Jones and Mary Jean Harrold. 2005. Empirical Evaluation of the Tarantula Automatic Fault-localization Technique. In Proceedings of the 20th Conference on Automated Software Engineering (ASE '05). ACM, 273--282."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815412"},{"key":"e_1_3_2_1_26_1","volume-title":"Challenges. In Proceedings of the 25th International Conference on Fault-tolerant Computing (FTCS '95)","author":"Laprie Jean-Claude","year":"1995","unstructured":"Jean-Claude Laprie . 1995 . Dependable Computing: Concepts, Limits , Challenges. In Proceedings of the 25th International Conference on Fault-tolerant Computing (FTCS '95) . IEEE Computer Society, 42--54. Jean-Claude Laprie. 1995. Dependable Computing: Concepts, Limits, Challenges. In Proceedings of the 25th International Conference on Fault-tolerant Computing (FTCS '95). IEEE Computer Society, 42--54."},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 2005 Conference on Programming Language Design and Implementation (PLDI '05)","author":"Liblit Ben","unstructured":"Ben Liblit , Mayur Naik , Alice X. Zheng , Alex Aiken , and Michael I. Jordan . 2005. Scalable Statistical Bug Isolation . In Proceedings of the 2005 Conference on Programming Language Design and Implementation (PLDI '05) . ACM, 15--26. Ben Liblit, Mayur Naik, Alice X. Zheng, Alex Aiken, and Michael I. Jordan. 2005. Scalable Statistical Bug Isolation. In Proceedings of the 2005 Conference on Programming Language Design and Implementation (PLDI '05). ACM, 15--26."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1109\/TSE.2006.105","article-title":"Statistical Debugging: A Hypothesis Testing-based Approach","volume":"32","author":"Liu Chao","year":"2006","unstructured":"Chao Liu , Long Fei , Xifeng Yan , Jiawei Han , and Samuel P. Midkiff . 2006 . Statistical Debugging: A Hypothesis Testing-based Approach . IEEE Transactions on Software Engineering 32 , 10 (Oct. 2006), 831--848. Chao Liu, Long Fei, Xifeng Yan, Jiawei Han, and Samuel P. Midkiff. 2006. Statistical Debugging: A Hypothesis Testing-based Approach. IEEE Transactions on Software Engineering 32, 10 (Oct. 2006), 831--848.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 23rd Symposium on Operating Systems Principles (SOSP '11)","author":"Liu Tongping","unstructured":"Tongping Liu , Charlie Curtsinger , and Emery D. Berger . 2011. DTHREADS: Efficient Deterministic Multithreading . In Proceedings of the 23rd Symposium on Operating Systems Principles (SOSP '11) . ACM, 327--336. Tongping Liu, Charlie Curtsinger, and Emery D. Berger. 2011. DTHREADS: Efficient Deterministic Multithreading. In Proceedings of the 23rd Symposium on Operating Systems Principles (SOSP '11). ACM, 327--336."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815415"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029907"},{"key":"e_1_3_2_1_32_1","unstructured":"Steve McConnell. 2004. Code Complete. Pearson Education.  Steve McConnell. 2004. Code Complete. Pearson Education."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2228298.2228334"},{"key":"e_1_3_2_1_34_1","volume-title":"Chord: Java Bytecode Analysis. https:\/\/bitbucket.org\/psl-lab\/jchord\/.","author":"Naik Mayur","year":"2015","unstructured":"Mayur Naik . 2015 . Chord: Java Bytecode Analysis. https:\/\/bitbucket.org\/psl-lab\/jchord\/. Mayur Naik. 2015. Chord: Java Bytecode Analysis. https:\/\/bitbucket.org\/psl-lab\/jchord\/."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2005.16"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629593"},{"key":"e_1_3_2_1_37_1","unstructured":"Google Cloud Platform. 2016. Google App Engine Incident 16008. https:\/\/status.cloud.google.com\/incident\/appengine\/16008  Google Cloud Platform. 2016. Google App Engine Incident 16008. https:\/\/status.cloud.google.com\/incident\/appengine\/16008"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451131"},{"key":"e_1_3_2_1_39_1","unstructured":"Amazon Web Services. 2011. Summary of the Amazon EC2 and Amazon RDS Service Disruption in the US East Region. https:\/\/aws.amazon.com\/message\/65648\/  Amazon Web Services. 2011. Summary of the Amazon EC2 and Amazon RDS Service Disruption in the US East Region. https:\/\/aws.amazon.com\/message\/65648\/"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993744.1993757"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/EMRTS.2000.854015"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294275"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950370"},{"key":"e_1_3_2_1_45_1","volume-title":"Program Slicing. In Proceedings of the 5th International Conference on Software Engineering (ICSE '81)","author":"Weiser Mark","year":"1981","unstructured":"Mark Weiser . 1981 . Program Slicing. In Proceedings of the 5th International Conference on Software Engineering (ICSE '81) . IEEE Press, 439--449. Mark Weiser. 1981. Program Slicing. In Proceedings of the 5th International Conference on Software Engineering (ICSE '81). IEEE Press, 439--449."},{"key":"e_1_3_2_1_46_1","unstructured":"Bill Willson. 2014. Root Cause. http:\/\/www.bill-wilson.net\/root-cause-analysis\/rca-wiki\/root-cause  Bill Willson. 2014. Root Cause. http:\/\/www.bill-wilson.net\/root-cause-analysis\/rca-wiki\/root-cause"},{"key":"e_1_3_2_1_47_1","volume-title":"Anderson","author":"Wilson Paul F.","year":"1993","unstructured":"Paul F. Wilson , Larry D. Dell , and Gaylord F . Anderson . 1993 . Root Cause Analysis: A Tool for Total Quality Management. ASQ Quality Press . Paul F. Wilson, Larry D. Dell, and Gaylord F. Anderson. 1993. Root Cause Analysis: A Tool for Total Quality Management. ASQ Quality Press."},{"key":"e_1_3_2_1_48_1","volume-title":"Proceedings of the 22nd Symposium on Operating Systems Principles (SOSP '09)","author":"Xu Wei","unstructured":"Wei Xu , Ling Huang , Armando Fox , David Patterson , and Michael I. Jordan . 2009. Detecting Large-scale System Problems by Mining Console Logs . In Proceedings of the 22nd Symposium on Operating Systems Principles (SOSP '09) . ACM, 117--132. Wei Xu, Ling Huang, Armando Fox, David Patterson, and Michael I. Jordan. 2009. Detecting Large-scale System Problems by Mining Console Logs. In Proceedings of the 22nd Symposium on Operating Systems Principles (SOSP '09). ACM, 117--132."},{"key":"e_1_3_2_1_49_1","volume-title":"Proceedings of the 11th Conference on Operating Systems Design and Implementation (OSDI '14)","author":"Yuan Ding","year":"2014","unstructured":"Ding Yuan , Yu Luo , Xin Zhuang , Guilherme Rodrigues , Xu Zhao , Yongle Zhang , Pranay U. Jain , and Michael Stumm . 2014 . Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-intensive Systems . In Proceedings of the 11th Conference on Operating Systems Design and Implementation (OSDI '14) . USENIX, 249--265. Ding Yuan, Yu Luo, Xin Zhuang, Guilherme Rodrigues, Xu Zhao, Yongle Zhang, Pranay U. Jain, and Michael Stumm. 2014. Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-intensive Systems. In Proceedings of the 11th Conference on Operating Systems Design and Implementation (OSDI '14). USENIX, 249--265."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736038"},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the 13th Workshop on Hot Topics in Operating Systems (HotOS XIII). USENIX, Article 18","author":"Zamfir Cristian","year":"2011","unstructured":"Cristian Zamfir , Gautam Altekar , George Candea , and Ion Stoica . 2011 . Debug Determinism: The Sweet Spot for Replay-based Debugging . In Proceedings of the 13th Workshop on Hot Topics in Operating Systems (HotOS XIII). USENIX, Article 18 , 5 pages. Cristian Zamfir, Gautam Altekar, George Candea, and Ion Stoica. 2011. Debug Determinism: The Sweet Spot for Replay-based Debugging. In Proceedings of the 13th Workshop on Hot Topics in Operating Systems (HotOS XIII). USENIX, Article 18, 5 pages."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755946"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48166-4_16"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587053"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132768"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.5555\/3026877.3026924"},{"key":"e_1_3_2_1_58_1","volume-title":"Proceedings of the 11th Conference on Operating Systems Design and Implementation (OSDI '14)","author":"Zhao Xu","year":"2014","unstructured":"Xu Zhao , Yongle Zhang , David Lion , Muhammad Faizan Ullah , Yu Luo , Ding Yuan , and Michael Stumm . 2014 . Lprof: A Non-intrusive Request Flow Profiler for Distributed Systems . In Proceedings of the 11th Conference on Operating Systems Design and Implementation (OSDI '14) . USENIX, 629--644. Xu Zhao, Yongle Zhang, David Lion, Muhammad Faizan Ullah, Yu Luo, Ding Yuan, and Michael Stumm. 2014. Lprof: A Non-intrusive Request Flow Profiler for Distributed Systems. In Proceedings of the 11th Conference on Operating Systems Design and Implementation (OSDI '14). USENIX, 629--644."}],"event":{"name":"SOSP '19: ACM SIGOPS 27th Symposium on Operating Systems Principles","location":"Huntsville Ontario Canada","acronym":"SOSP '19","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems","USENIX Assoc USENIX Assoc"]},"container-title":["Proceedings of the 27th ACM Symposium on Operating Systems Principles"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341301.3359650","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3341301.3359650","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:12:56Z","timestamp":1750201976000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3341301.3359650"}},"subtitle":["a principled debugging approach for locating the root cause of a failure"],"short-title":[],"issued":{"date-parts":[[2019,10,27]]},"references-count":57,"alternative-id":["10.1145\/3341301.3359650","10.1145\/3341301"],"URL":"https:\/\/doi.org\/10.1145\/3341301.3359650","relation":{},"subject":[],"published":{"date-parts":[[2019,10,27]]},"assertion":[{"value":"2019-10-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}