2020 journal article

BarrierFinder: recognizing ad hoc barriers

EMPIRICAL SOFTWARE ENGINEERING, 25(6), 4676–4706.

By: T. Wang n, X. Yu n, Z. Qiu n, G. Jin n & F. Mueller n

author keywords: Ad hoc synchronizations; Barriers; Program slicing; Symbolic execution; Temporal invariants
Source: Web Of Science
Added: September 21, 2020

2020 article

Database-Access Performance Antipatterns in Database-Backed Web Applications

2020 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2020), pp. 58–69.

By: S. Shao n, Z. Qiu n, X. Yu n, W. Yang, G. Jin n, T. Xie*, X. Wu*

author keywords: performance antipatterns; performance bugs; database-backed web applications; characteristic study
TL;DR: This study collects database-access performance bugs from web applications that access databases through language-provided SQL interfaces, which have been largely ignored by recent work, to check how extensively the known antipatterns can cover these bugs. (via Semantic Scholar)
Source: Web Of Science
Added: March 1, 2021

2019 article

BARRIERFINDER: Recognizing Ad Hoc Barriers

2019 IEEE INTERNATIONAL CONFERENCE ON SOFTWARE MAINTENANCE AND EVOLUTION (ICSME 2019), pp. 323–327.

By: T. Wang n, X. Yu n, Z. Qiu n, G. Jin n & F. Mueller n

author keywords: ad hoc synchronization; barrier; symbolic execution; interprocedural program slicing; Cloud9; LLVM
TL;DR: A framework to automatically identify complex ad hoc synchronizations in full and infer their synchronization relationships and a tool called BarrierFinder, which features various techniques, including program slicing and bounded symbolic execution, to efficiently explore the interleaving space of ad hoc synchronizations within multi-threaded programs and collect execution traces. (via Semantic Scholar)
Source: Web Of Science
Added: April 14, 2020

2018 article

Dataflow Tunneling

PROCEEDINGS 2018 IEEE/ACM 40TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE), pp. 586–597.

By: X. Yu n & G. Jin n

author keywords: web applications; request-based applications; web frameworks; inter-request analysis; tracing
TL;DR: This paper designs an approach called dataflow tunneling to capture inter-request data dependencies from concrete application executions and produce data-dependency specifications, and envision that this approach can provide key information to enable future inter- request analysis techniques. (via Semantic Scholar)
Source: Web Of Science
Added: January 21, 2019

2016 article

CloudSeer: Workflow Monitoring of Cloud Infrastructures via Interleaved Logs

Yu, X., Joshi, P., Xu, J., Jin, G., Zhang, H., & Jiang, G. (2016, April). ACM SIGPLAN NOTICES, Vol. 51, pp. 489–502.

By: X. Yu n, P. Joshi*, J. Xu*, G. Jin n, H. Zhang* & G. Jiang*

author keywords: Cloud Infrastructures; Distributed Systems; Log Analysis; Workflow Monitoring
UN Sustainable Development Goal Categories
9. Industry, Innovation and Infrastructure (OpenAlex)
Source: Web Of Science
Added: August 6, 2018

2016 conference paper

CloudSeer: Workflow monitoring of cloud infrastructures via interleaved logs

Operating Systems Review, 50(2), 489–502.

By: X. Yu, P. Joshi, J. Xu, G. Jin, H. Zhang & G. Jiang

Source: NC State University Libraries
Added: August 6, 2018

Citation Index includes data from a number of different sources. If you have questions about the sources of data in the Citation Index or need a set of data which is free to re-distribute, please contact us.

Certain data included herein are derived from the Web of Science© and InCites© (2024) of Clarivate Analytics. All rights reserved. You may not copy or re-distribute this material in whole or in part without the prior written consent of Clarivate Analytics.