@article{qiu_zhao_shao_jin_2021, title={Understanding and Detecting Server-Side Request Races in Web Applications}, DOI={10.1145/3468264.3468594}, journal={PROCEEDINGS OF THE 29TH ACM JOINT MEETING ON EUROPEAN SOFTWARE ENGINEERING CONFERENCE AND SYMPOSIUM ON THE FOUNDATIONS OF SOFTWARE ENGINEERING (ESEC/FSE '21)}, author={Qiu, Zhengyi and Zhao, Qi and Shao, Shudi and Jin, Guoliang}, year={2021} } @article{wang_yu_qiu_jin_mueller_2020, title={BarrierFinder: recognizing ad hoc barriers}, ISBN={1573-7616}, DOI={10.1007/s10664-020-09862-3}, journal={EMPIRICAL SOFTWARE ENGINEERING}, author={Wang, Tao and Yu, Xiao and Qiu, Zhengyi and Jin, Guoliang and Mueller, Frank}, year={2020} } @article{shao_qiu_yu_yang_jin_xie_wu_2020, series={Proceedings-IEEE International Conference on Software Maintenance}, title={Database-Access Performance Antipatterns in Database-Backed Web Applications}, ISBN={1063-6773}, DOI={10.1109/ICSME46990.2020.00016}, journal={2020 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2020)}, author={Shao, Shudi and Qiu, Zhengyi and Yu, Xiao and Yang, Wei and Jin, Guoliang and Xie, Tao and Wu, Xintao}, year={2020}, pages={58–69}, collection={Proceedings-IEEE International Conference on Software Maintenance} } @article{wang_yu_qiu_jin_mueller_2019, series={Proceedings-IEEE International Conference on Software Maintenance}, title={BARRIERFINDER: Recognizing Ad Hoc Barriers}, ISBN={1063-6773}, DOI={10.1109/ICSME.2019.00049}, journal={2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2019)}, author={Wang, Tao and Yu, Xiao and Qiu, Zhengyi and Jin, Guoliang and Mueller, Frank}, year={2019}, pages={323–327}, collection={Proceedings-IEEE International Conference on Software Maintenance} } @article{zhao_qiu_jin_2019, title={Semantics-Aware Scheduling Policies for Synchronization Determinism}, ISBN={978-1-4503-6225-2}, DOI={10.1145/3293883.3295731}, journal={PROCEEDINGS OF THE 24TH SYMPOSIUM ON PRINCIPLES AND PRACTICE OF PARALLEL PROGRAMMING (PPOPP '19)}, author={Zhao, Qi and Qiu, Zhengyi and Jin, Guoliang}, year={2019}, pages={242–256} } @inproceedings{yu_jin_2018, title={Dataflow Tunneling}, ISBN={0}, DOI={10.1145/3180155.3180171}, booktitle={PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE)}, author={Yu, Xiao and Jin, Guoliang}, year={2018}, pages={586–597} } @article{yu_joshi_xu_jin_zhang_jiang_2016, title={CloudSeer: Workflow monitoring of cloud infrastructures via interleaved logs}, volume={51}, DOI={10.1145/2954679.2872407}, number={4}, journal={ACM SIGPLAN Notices}, author={Yu, X. and Joshi, P. and Xu, J. W. and Jin, G. L. and Zhang, H. and Jiang, G. F.}, year={2016}, pages={489–502} } @inproceedings{yu_joshi_xu_jin_zhang_jiang_2016, title={CloudSeer: Workflow monitoring of cloud infrastructures via interleaved logs}, volume={50}, number={2}, booktitle={Operating Systems Review}, author={Yu, X. and Joshi, P. and Xu, J. W. and Jin, G. L. and Zhang, H. and Jiang, G. F.}, year={2016}, pages={489–502} } @inproceedings{dean_wang_gu_enck_jin_2015, title={Automatic server hang bug diagnosis: Feasible reality or pipe dream?}, DOI={10.1109/icac.2015.52}, booktitle={2015 IEEE International Conference on Autonomic Computing}, author={Dean, D. J. and Wang, P. P. and Gu, X. H. and Enck, W. and Jin, G. L.}, year={2015}, pages={127–132} } @article{deng_jin_de kruijf_li_liblit_lu_qi_ren_sankaralingam_song_et al._2015, title={Fixing, preventing, and recovering from concurrency bugs}, volume={58}, ISSN={1674-733X 1869-1919}, url={http://dx.doi.org/10.1007/S11432-015-5315-9}, DOI={10.1007/S11432-015-5315-9}, number={5}, journal={Science China Information Sciences}, publisher={Springer Science and Business Media LLC}, author={Deng, DongDong and Jin, GuoLiang and de Kruijf, Marc and Li, Ang and Liblit, Ben and Lu, Shan and Qi, ShanXiang and Ren, JingLei and Sankaralingam, Karthikeyan and Song, LinHai and et al.}, year={2015}, month={Apr}, pages={1–18} } @inproceedings{gu_jin_song_zhu_lu_2015, title={What change history tells us about thread synchronization}, DOI={10.1145/2786805.2786815}, booktitle={2015 10th Joint Meeting of the European Software Engineering Conference and the ACM Sigsoft Symposium on the Foundations of Software Engineering (ESEC/FSE 2015) Proceedings}, author={Gu, R. and Jin, G. L. and Song, L. H. and Zhu, L. J. and Lu, S.}, year={2015}, pages={426–438} } @inbook{harris_jin_lu_jha_2013, title={Validating Library Usage Interactively}, ISBN={9783642397981 9783642397998}, ISSN={0302-9743 1611-3349}, url={http://dx.doi.org/10.1007/978-3-642-39799-8_56}, DOI={10.1007/978-3-642-39799-8_56}, booktitle={Computer Aided Verification}, publisher={Springer Berlin Heidelberg}, author={Harris, William R. and Jin, Guoliang and Lu, Shan and Jha, Somesh}, year={2013}, pages={796–812} }