Zeno: Diagnosing Performance Problems with Temporal Provenance
暂无分享,去创建一个
Yang Wu | Ang Chen | Linh T. X. Phan | L. T. Phan | Ang Chen | Yang Wu
[1] Andreas Haeberlen,et al. Diagnosing missing events in distributed systems with negative provenance , 2015, SIGCOMM 2015.
[2] Randy H. Katz,et al. X-Trace: A Pervasive Network Tracing Framework , 2007, NSDI.
[3] Andreas Haeberlen,et al. Distributed Time-aware Provenance , 2012, Proc. VLDB Endow..
[4] Jean-Yves Le Boudec,et al. Network Calculus: A Theory of Deterministic Queuing Systems for the Internet , 2001 .
[5] Hans L. Bodlaender,et al. Polynomial Algorithms for Graph Isomorphism and Chromatic Index on Partial k-Trees , 1988, J. Algorithms.
[6] M. Thomas. Queueing Systems. Volume 1: Theory (Leonard Kleinrock) , 1976 .
[7] Alan L. Cox,et al. Whodunit: transactional profiling for multi-tier applications , 2007, EuroSys '07.
[8] Xiao Zhang,et al. CPI2: CPU performance isolation for shared compute clusters , 2013, EuroSys '13.
[9] Thomas F. Wenisch,et al. The Mystery Machine: End-to-end Performance Analysis of Large-scale Internet Services , 2014, OSDI.
[10] Myungjin Lee,et al. Simplifying Datacenter Network Debugging with PathDump , 2016, OSDI.
[11] Marcos K. Aguilera,et al. Performance debugging for distributed systems of black boxes , 2003, SOSP '03.
[12] William E. Johnston,et al. The NetLogger methodology for high performance distributed systems performance analysis , 1998, Proceedings. The Seventh International Symposium on High Performance Distributed Computing (Cat. No.98TB100244).
[13] Paramvir Bahl,et al. Detailed diagnosis in enterprise networks , 2009, SIGCOMM '09.
[14] Andreas Haeberlen,et al. TAP: Time-aware Provenance for Distributed Systems , 2011, TaPP.
[15] Eric A. Brewer,et al. Pinpoint: problem determination in large, dynamic Internet services , 2002, Proceedings International Conference on Dependable Systems and Networks.
[16] V. Vianu,et al. Edinburgh Why and Where: A Characterization of Data Provenance , 2017 .
[17] David A. Patterson,et al. Path-Based Failure and Evolution Management , 2004, NSDI.
[18] Andreas Haeberlen,et al. The Good, the Bad, and the Differences: Better Network Diagnostics with Differential Provenance , 2016, SIGCOMM.
[19] Shashi Shekhar,et al. QUIRE: Lightweight Provenance for Smart Phone Operating Systems , 2011, USENIX Security Symposium.
[20] Eric Koskinen,et al. BorderPatrol: isolating events for black-box tracing , 2008, Eurosys '08.
[21] Yu Luo,et al. lprof: A Non-intrusive Request Flow Profiler for Distributed Systems , 2014, OSDI.
[22] Andreas Haeberlen,et al. Secure network provenance , 2011, SOSP.
[23] Mona Attariyan,et al. X-ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software , 2012, OSDI.
[24] Gregory R. Ganger,et al. Diagnosing Performance Changes by Comparing Request Flows , 2011, NSDI.
[25] Thomas Moyer,et al. Trustworthy Whole-System Provenance for the Linux Kernel , 2015, USENIX Security Symposium.
[26] Andreas Haeberlen,et al. Detecting Covert Timing Channels with Time-Deterministic Replay , 2014, OSDI.
[27] Myungjin Lee,et al. Distributed Network Monitoring and Debugging with SwitchPointer , 2018, NSDI.
[28] Amin Vahdat,et al. Pip: Detecting the Unexpected in Distributed Systems , 2006, NSDI.
[29] Ashish Gehani,et al. SPADE: Support for Provenance Auditing in Distributed Environments , 2012, Middleware.
[30] Alex C. Snoeren,et al. Passive Realtime Datacenter Fault Detection and Localization , 2017, NSDI.
[31] B.P. Miller. DPM: A Measurement System for Distributed Programs , 1988, IEEE Trans. Computers.
[32] Andreas Haeberlen,et al. Automated Bug Removal for Software-Defined Networks , 2017, NSDI.
[33] Ricardo Bianchini,et al. DeepDive: Transparently Identifying and Managing Performance Interference in Virtualized Environments , 2013, USENIX Annual Technical Conference.
[34] Jakob Engblom,et al. The worst-case execution-time problem—overview of methods and survey of tools , 2008, TECS.
[35] Stephen A. Edwards,et al. The Case for the Precision Timed (PRET) Machine , 2007, 2007 44th ACM/IEEE Design Automation Conference.
[36] Andreas Haeberlen,et al. Fault Tolerance and the Five-Second Rule , 2015, HotOS.
[37] Kaushik Veeraraghavan,et al. Canopy: An End-to-End Performance Tracing And Analysis System , 2017, SOSP.
[38] Bryan Cantrill,et al. Dynamic Instrumentation of Production Systems , 2004, USENIX Annual Technical Conference, General Track.
[39] Richard Mortier,et al. Using Magpie for Request Extraction and Workload Modelling , 2004, OSDI.
[40] Jennifer Neville,et al. Structured Comparative Analysis of Systems Logs to Diagnose Performance Problems , 2012, NSDI.
[41] Boon Thau Loo,et al. Secure time-aware provenance for distributed systems , 2012 .
[42] Margo I. Seltzer,et al. Provenance-Aware Storage Systems , 2006, USENIX ATC, General Track.
[43] Paramvir Bahl,et al. Towards highly reliable enterprise network services via inference of multi-level dependencies , 2007, SIGCOMM.
[44] Barton P. Miller,et al. Critical path analysis for the execution of parallel and distributed programs , 1988, [1988] Proceedings. The 8th International Conference on Distributed.
[45] Leslie Lamport,et al. Time, clocks, and the ordering of events in a distributed system , 1978, CACM.
[46] Ken Yocum,et al. Scalable lineage capture for debugging DISC analytics , 2013, SoCC.
[47] Marianne Winslett,et al. The Case of the Fake Picasso: Preventing History Forgery with Secure Provenance , 2009, FAST.