Discovering correctness constraints for self-management of system configuration
暂无分享,去创建一个
[1] Archana Ganapathi,et al. Why Do Internet Services Fail, and What Can Be Done About It? , 2002, USENIX Symposium on Internet Technologies and Systems.
[2] Helen J. Wang,et al. Strider: a black-box, state-based approach to change and configuration management and support , 2003, Sci. Comput. Program..
[3] Evi Nemeth,et al. DNS measurements at a root server , 2001, GLOBECOM'01. IEEE Global Telecommunications Conference (Cat. No.01CH37270).
[4] Anil K. Jain,et al. Algorithms for Clustering Data , 1988 .
[5] Eric A. Brewer,et al. Using Runtime Paths for Macroanalysis , 2003, HotOS.
[6] Dawson R. Engler,et al. Bugs as deviant behavior: a general approach to inferring errors in systems code , 2001, SOSP.
[7] Martin Rinard,et al. Automatic detection and repair of errors in data structures , 2003, OOPSLA 2003.
[8] Ratul Mahajan,et al. Understanding BGP misconfiguration , 2002, SIGCOMM 2002.
[9] Archana Ganapathi,et al. Why PCs are fragile and what we can do about it: a study of Windows registry problems , 2004, International Conference on Dependable Systems and Networks, 2004.