{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T12:34:13Z","timestamp":1770294853961,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,11,1]],"date-time":"2021-11-01T00:00:00Z","timestamp":1635724800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000899","name":"Intel Foundation","doi-asserted-by":"publisher","award":["CAPA"],"award-info":[{"award-number":["CAPA"]}],"id":[{"id":"10.13039\/100000899","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-2106420, CCF-2106404, CNS-2106838, CHS-1956322, CCF-1764077, CCF-1723773"],"award-info":[{"award-number":["CCF-2106420, CCF-2106404, CNS-2106838, CHS-1956322, CCF-1764077, CCF-1723773"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"publisher","award":["N00014-18-1-2037"],"award-info":[{"award-number":["N00014-18-1-2037"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,11]]},"DOI":"10.1145\/3472883.3487016","type":"proceedings-article","created":{"date-parts":[[2021,10,27]],"date-time":"2021-10-27T10:48:16Z","timestamp":1635331696000},"page":"359-372","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["OptDebug"],"prefix":"10.1145","author":[{"given":"Muhammad Ali","family":"Gulzar","sequence":"first","affiliation":[{"name":"Virginia Tech"}]},{"given":"Miryung","family":"Kim","sequence":"additional","affiliation":[{"name":"University of California, Los Angeles"}]}],"member":"320","published-online":{"date-parts":[[2021,11]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2021. Apache Spark. https:\/\/spark.apache.org\/.  2021. Apache Spark. https:\/\/spark.apache.org\/."},{"key":"e_1_3_2_2_2_1","unstructured":"2021. Hadoop. http:\/\/hadoop.apache.org\/.  2021. Hadoop. http:\/\/hadoop.apache.org\/."},{"key":"e_1_3_2_2_3_1","unstructured":"2021. Intel HiBench. https:\/\/github.com\/Intel-bigdata\/HiBench.  2021. Intel HiBench. https:\/\/github.com\/Intel-bigdata\/HiBench."},{"key":"e_1_3_2_2_4_1","unstructured":"2021. JaCoCo. https:\/\/jacoco.github.io\/.  2021. JaCoCo. https:\/\/jacoco.github.io\/."},{"key":"e_1_3_2_2_5_1","unstructured":"2021. Kaggle Datasets. https:\/\/www.kaggle.com.  2021. Kaggle Datasets. https:\/\/www.kaggle.com."},{"key":"e_1_3_2_2_6_1","unstructured":"2021. Pig Mix Benchmark. https:\/\/cwiki.apache.org\/confluence\/display\/pig\/PigMix\/.  2021. Pig Mix Benchmark. https:\/\/cwiki.apache.org\/confluence\/display\/pig\/PigMix\/."},{"key":"e_1_3_2_2_7_1","unstructured":"2021. TPC. http:\/\/tpc.org\/default5.asp\/.  2021. TPC. http:\/\/tpc.org\/default5.asp\/."},{"key":"e_1_3_2_2_8_1","volume-title":"Proceedings of the 2009 IEEE\/ACM International Conference on Automated Software Engineering (ASE '09)","author":"Abreu Rui","year":"2009","unstructured":"Rui Abreu , Peter Zoeteweij , and Arjan J. C . van Gemund. 2009. Spectrum-Based Multiple Fault Localization . In Proceedings of the 2009 IEEE\/ACM International Conference on Automated Software Engineering (ASE '09) . IEEE Computer Society, USA, 88--99. https:\/\/doi.org\/10.1109\/ASE. 2009 .25 10.1109\/ASE.2009.25 Rui Abreu, Peter Zoeteweij, and Arjan J. C. van Gemund. 2009. Spectrum-Based Multiple Fault Localization. In Proceedings of the 2009 IEEE\/ACM International Conference on Automated Software Engineering (ASE '09). IEEE Computer Society, USA, 88--99. https:\/\/doi.org\/10.1109\/ASE.2009.25"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.06.035"},{"key":"e_1_3_2_2_10_1","volume-title":"Proceedings of the ACM SIGPLAN 1990 Conference on Programming Language Design and Implementation","author":"Agrawal Hiralal","unstructured":"Hiralal Agrawal and Joseph R. Horgan . 1990. Dynamic Program Slicing . In Proceedings of the ACM SIGPLAN 1990 Conference on Programming Language Design and Implementation ( White Plains, New York, USA) (PLDI '90). ACM, New York, NY, USA, 246--256. https:\/\/doi.org\/10.1145\/93542.93576 10.1145\/93542.93576 Hiralal Agrawal and Joseph R. Horgan. 1990. Dynamic Program Slicing. In Proceedings of the ACM SIGPLAN 1990 Conference on Programming Language Design and Implementation (White Plains, New York, USA) (PLDI '90). ACM, New York, NY, USA, 246--256. https:\/\/doi.org\/10.1145\/93542.93576"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1739041.1739078"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497516"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376715"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.14778\/2994509.2994530"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572301"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357223.3362738"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-002-0083-8"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3127479.3131624"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884813"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338953"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264586"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101948"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376716"},{"key":"e_1_3_2_2_26_1","volume-title":"In Proc. Conference on Innovative Data Systems Research (CIDR).","author":"Ikeda Robert","year":"2011","unstructured":"Robert Ikeda , Hyunjung Park , and Jennifer Widom . 2011 . Provenance for generalized map and reduce workflows . In In Proc. Conference on Innovative Data Systems Research (CIDR). Robert Ikeda, Hyunjung Park, and Jennifer Widom. 2011. Provenance for generalized map and reduce workflows. In In Proc. Conference on Innovative Data Systems Research (CIDR)."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-017-0474-5"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.14778\/2850583.2850595"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581397"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.14778\/3377369.3377381"},{"key":"e_1_3_2_2_31_1","volume-title":"Michael A Zhivich, and RP Lippmann.","author":"Leek Timothy Robert","year":"2007","unstructured":"Timothy Robert Leek , Graham Z Baker , Ruben Edward Brown , Michael A Zhivich, and RP Lippmann. 2007 . Coverage maximization using dynamic taint tracing. Technical Report. DTIC Document . Timothy Robert Leek, Graham Z Baker, Ruben Edward Brown, Michael A Zhivich, and RP Lippmann. 2007. Coverage maximization using dynamic taint tracing. Technical Report. DTIC Document."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523619"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2004.17"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.14778\/3236187.3236204"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000791.2000795"},{"key":"e_1_3_2_2_36_1","volume-title":"In In Proceedings of the 12th Network and Distributed Systems Security Symposium. Citeseer.","author":"Newsome James","year":"2005","unstructured":"James Newsome and Dawn Song . 2005 . Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software . In In In Proceedings of the 12th Network and Distributed Systems Security Symposium. Citeseer. James Newsome and Dawn Song. 2005. Dynamic taint analysis: Automatic detection, analysis, and signature generation of exploit attacks on commodity software. In In In Proceedings of the 12th Network and Distributed Systems Security Symposium. Citeseer."},{"key":"e_1_3_2_2_37_1","volume-title":"Evaluating and Improving Fault Localization. In 2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE). 609--620","author":"Pearson Spencer","year":"2017","unstructured":"Spencer Pearson , Jos\u00e9 Campos , Ren\u00e9 Just , Gordon Fraser , Rui Abreu , Michael D. Ernst , Deric Pang , and Benjamin Keller . 2017 . Evaluating and Improving Fault Localization. In 2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE). 609--620 . https:\/\/doi.org\/10.1109\/ICSE.2017.62 10.1109\/ICSE.2017.62 Spencer Pearson, Jos\u00e9 Campos, Ren\u00e9 Just, Gordon Fraser, Rui Abreu, Michael D. Ernst, Deric Pang, and Benjamin Keller. 2017. Evaluating and Improving Fault Localization. In 2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE). 609--620. https:\/\/doi.org\/10.1109\/ICSE.2017.62"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.14778\/3199517.3199522"},{"key":"e_1_3_2_2_39_1","volume-title":"10th Conference on Innovative Data Systems Research, CIDR 2020, Amsterdam, The Netherlands, January 12-15, 2020, Online Proceedings. www.cidrdb.org. http:\/\/cidrdb.org\/cidr2020\/papers\/p35-rezig-cidr20","author":"Rezig El Kindi","year":"2020","unstructured":"El Kindi Rezig , Lei Cao , Giovanni Simonini , Maxime Schoemans , Samuel Madden , Nan Tang , Mourad Ouzzani , and Michael Stonebraker . 2020 . Dagger: A Data (not code) Debugger . In 10th Conference on Innovative Data Systems Research, CIDR 2020, Amsterdam, The Netherlands, January 12-15, 2020, Online Proceedings. www.cidrdb.org. http:\/\/cidrdb.org\/cidr2020\/papers\/p35-rezig-cidr20 .pdf El Kindi Rezig, Lei Cao, Giovanni Simonini, Maxime Schoemans, Samuel Madden, Nan Tang, Mourad Ouzzani, and Michael Stonebraker. 2020. Dagger: A Data (not code) Debugger. In 10th Conference on Innovative Data Systems Research, CIDR 2020, Amsterdam, The Netherlands, January 12-15, 2020, Online Proceedings. www.cidrdb.org. http:\/\/cidrdb.org\/cidr2020\/papers\/p35-rezig-cidr20.pdf"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419111.3421292"},{"key":"e_1_3_2_2_41_1","volume-title":"Program Slicing. In Proceedings of the 5th International Conference on Software Engineering","author":"Weiser Mark","year":"1981","unstructured":"Mark Weiser . 1981 . Program Slicing. In Proceedings of the 5th International Conference on Software Engineering ( San Diego, California, USA) (ICSE '81). IEEE Press, Piscataway, NJ, USA, 439--449. http:\/\/dl.acm.org\/citation.cfm?id=800078.802557 Mark Weiser. 1981. Program Slicing. In Proceedings of the 5th International Conference on Software Engineering (San Diego, California, USA) (ICSE '81). IEEE Press, Piscataway, NJ, USA, 439--449. http:\/\/dl.acm.org\/citation.cfm?id=800078.802557"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2521368"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536354.2536356"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416641"}],"event":{"name":"SoCC '21: ACM Symposium on Cloud Computing","location":"Seattle WA USA","acronym":"SoCC '21","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the ACM Symposium on Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472883.3487016","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/abs\/10.1145\/3472883.3487016","content-type":"text\/html","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3472883.3487016","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3472883.3487016","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:11:57Z","timestamp":1750191117000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3472883.3487016"}},"subtitle":["Fault-Inducing Operation Isolation for Dataflow Applications"],"short-title":[],"issued":{"date-parts":[[2021,11]]},"references-count":44,"alternative-id":["10.1145\/3472883.3487016","10.1145\/3472883"],"URL":"https:\/\/doi.org\/10.1145\/3472883.3487016","relation":{},"subject":[],"published":{"date-parts":[[2021,11]]},"assertion":[{"value":"2021-11-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}