


Остановите войну!
for scientists:


default search action
Yuanyuan Zhou 0001
Yuanyuan (YY) Zhou
Person information

- affiliation: University of California, San Diego, CA, USA
- affiliation (former): University of Illinois at Urbana-Champaign, IL, USA
- affiliation (former): Princeton University, NJ, USA
Other persons with the same name
- Yuanyuan Zhou — disambiguation page
- Yuanyuan Zhou 0002
— Anhui University, School of Computer Science and Technology, MOE Key Laboratory of Intelligent Computing and Signal Processing, Hefei, China
- Yuanyuan Zhou 0003
— Chinese Academy of Sciences, State Key Laboratory of Robotics, Shenyang, China
- Yuanyuan Zhou 0004
— Anhui University of Science and Technology, School of Mechanical Engineering, Huainan, China
- Yuanyuan Zhou 0005
— Capital Normal University, Beijing, China
- Yuanyuan Zhou 0006
— ICTEAM/ELEN/Crypto Group, UCLouvain, Ottignies-Louvain-la-Neuve, Belgium (and 1 more)
- Yuanyuan Zhou 0007
— University of Electronic Science and Technology of China, Chengdu, China
- Yuanyuan Zhou 0008 — Washington State University, Pullman, WA, USA
Refine list

refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
showing all ?? records
2020 – today
- 2023
- [c82]Haochen Huang, Bingyu Shen, Li Zhong, Yuanyuan Zhou:
Protecting Data Integrity of Web Applications with Database Constraints Inferred from Application Code. ASPLOS (2) 2023: 632-645 - [c81]Bingyu Shen, Tianyi Shan, Yuanyuan Zhou:
Improving Logging to Reduce Permission Over-Granting Mistakes. USENIX Security Symposium 2023: 409-426 - [c80]Bingyu Shen, Tianyi Shan, Yuanyuan Zhou:
Multiview: Finding Blind Spots in Access-Deny Issues Diagnosis. USENIX Security Symposium 2023: 7499-7516 - 2021
- [c79]Haochen Huang, Chengcheng Xiang, Li Zhong, Yuanyuan Zhou:
PYLIVE: On-the-Fly Code Change for Python-based Online Services. USENIX Annual Technical Conference 2021: 349-363 - [c78]Bingyu Shen, Lili Wei, Chengcheng Xiang, Yudong Wu, Mingyao Shen, Yuanyuan Zhou, Xinxin Jin:
Can Systems Explain Permissions Better? Understanding Users' Misperceptions under Smartphone Runtime Permission Model. USENIX Security Symposium 2021: 751-768 - 2020
- [j21]Remzi H. Arpaci-Dusseau, Yuanyuan (YY) Zhou:
Introduction to the Special Section on SOSP 2019. ACM Trans. Storage 16(2): 8:1 (2020) - [c77]Yudong Wu, Mingyao Shen, Yi-Hui Chen, Yuanyuan Zhou:
Tuning applications for efficient GPU offloading to in-memory processing. ICS 2020: 37:1-37:12 - [c76]Chengcheng Xiang, Haochen Huang, Andrew Yoo, Yuanyuan Zhou, Shankar Pasupathy:
PracExtractor: Extracting Configuration Good Practices from Manuals to Detect Server Misconfigurations. USENIX Annual Technical Conference 2020: 265-280
2010 – 2019
- 2019
- [c75]Chengcheng Xiang
, Yudong Wu, Bingyu Shen
, Mingyao Shen, Haochen Huang, Tianyin Xu, Yuanyuan Zhou, Cindy Moore, Xinxin Jin, Tianwei Sheng:
Towards Continuous Access Control Validation and Forensics. CCS 2019: 113-129 - 2018
- [c74]Xinxin Jin, William G. Griswold, Yuanyuan Zhou:
ANEL: robust mobile network programming using a declarative language. MOBILESoft@ICSE 2018: 202-213 - 2017
- [c73]Tianyin Xu, Han Min Naing, Le Lu, Yuanyuan Zhou:
How Do System Administrators Resolve Access-Denied Issues in the Real World? CHI 2017: 348-361 - [c72]Xu Zhao, Kirk Rodrigues, Yu Luo, Michael Stumm
, Ding Yuan, Yuanyuan Zhou:
The Game of Twenty Questions: Do You Know Where to Log? HotOS 2017: 125-131 - [c71]Xu Zhao, Kirk Rodrigues, Yu Luo, Michael Stumm
, Ding Yuan, Yuanyuan Zhou:
Log20: Fully Automated Optimal Placement of Log Printing Statements under Specified Overhead Threshold. SOSP 2017: 565-581 - [c70]Tianyin Xu, Xinxin Jin, Peng Huang, Yuanyuan Zhou, Shan Lu, Long Jin, Shankar Pasupathy:
Early Detection of Configuration Errors to Reduce Failure Damage. USENIX Annual Technical Conference 2017 - 2016
- [c69]Xinxin Jin, Peng Huang
, Tianyin Xu, Yuanyuan Zhou:
NChecker: saving mobile app developers from network disruptions. EuroSys 2016: 22:1-22:16 - [c68]Peng Huang
, Tianyin Xu, Xinxin Jin, Yuanyuan Zhou:
DefDroid: Towards a More Defensive Mobile OS Against Disruptive App Behavior. MobiSys 2016: 221-234 - [c67]Tianyin Xu, Xinxin Jin, Peng Huang, Yuanyuan Zhou, Shan Lu, Long Jin, Shankar Pasupathy:
Early Detection of Configuration Errors to Reduce Failure Damage. OSDI 2016: 619-634 - 2015
- [j20]Tianyin Xu, Yuanyuan Zhou:
Systems Approaches to Tackling Configuration Errors: A Survey. ACM Comput. Surv. 47(4): 70:1-70:41 (2015) - [c66]Peng Huang
, William J. Bolosky, Abhishek Singh, Yuanyuan Zhou:
ConfValley: a systematic configuration validation framework for cloud services. EuroSys 2015: 19:1-19:16 - [c65]Xinxin Jin, Soyeon Park, Tianwei Sheng, Rishan Chen, Zhiyong Shan, Yuanyuan Zhou:
FTXen: Making hypervisor resilient to hardware faults on relaxed cores. HPCA 2015: 451-462 - [c64]Tianyin Xu, Long Jin, Xuepeng Fan, Yuanyuan Zhou, Shankar Pasupathy, Rukma Talwadker:
Hey, you have given me too many knobs!: understanding and dealing with over-designed configuration in system software. ESEC/SIGSOFT FSE 2015: 307-319 - [c63]Margo I. Seltzer, Mark Miller, David Mazières, Yuanyuan Zhou:
Is achieving security a hopeless quest? SOSP History Day 2015: 13:1 - 2014
- [j19]Lin Tan, Chen Liu, Zhenmin Li, Xuanhui Wang, Yuanyuan Zhou, ChengXiang Zhai:
Bug characteristics in open source software. Empir. Softw. Eng. 19(6): 1665-1705 (2014) - [c62]Jiaqi Zhang, Lakshminarayanan Renganarayana, Xiaolan Zhang, Niyu Ge, Vasanth Bala, Tianyin Xu, Yuanyuan Zhou:
EnCore: exploiting system environment and correlation information for misconfiguration detection. ASPLOS 2014: 687-700 - [c61]Peng Huang
, Xiao Ma, Dongcai Shen, Yuanyuan Zhou:
Performance regression testing target prioritization via performance risk analysis. ICSE 2014: 60-71 - 2013
- [c60]Michael Mihn-Jong Lee, Indrajit Roy, Alvin AuYoung, Vanish Talwar, K. R. Jayaram, Yuanyuan Zhou:
Views and Transactional Storage for Large Graphs. Middleware 2013: 287-306 - [c59]Xiao Ma, Peng Huang, Xinxin Jin, Pei Wang, Soyeon Park, Dongcai Shen, Yuanyuan Zhou, Lawrence K. Saul, Geoffrey M. Voelker:
eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones. NSDI 2013: 57-70 - [c58]Tianyin Xu, Jiaqi Zhang, Peng Huang
, Jing Zheng, Tianwei Sheng, Ding Yuan, Yuanyuan Zhou, Shankar Pasupathy:
Do not blame users for misconfigurations. SOSP 2013: 244-259 - [e2]Keith A. Smith, Yuanyuan Zhou:
Proceedings of the 11th USENIX conference on File and Storage Technologies, FAST 2013, San Jose, CA, USA, February 12-15, 2013. USENIX 2013 [contents] - 2012
- [j18]Ding Yuan, Jing Zheng, Soyeon Park, Yuanyuan Zhou, Stefan Savage:
Improving Software Diagnosability via Log Enhancement. ACM Trans. Comput. Syst. 30(1): 4:1-4:28 (2012) - [j17]Shan Lu
, Soyeon Park, Yuanyuan Zhou:
Detecting Concurrency Bugs from the Perspectives of Synchronization Intentions. IEEE Trans. Parallel Distributed Syst. 23(6): 1060-1072 (2012) - [j16]Shan Lu
, Soyeon Park, Yuanyuan Zhou:
Finding Atomicity-Violation Bugs through Unserializable Interleaving Testing. IEEE Trans. Software Eng. 38(4): 844-860 (2012) - [c57]Ding Yuan, Soyeon Park, Yuanyuan Zhou:
Characterizing logging practices in open-source software. ICSE 2012: 102-112 - [c56]Ding Yuan, Soyeon Park, Peng Huang, Yang Liu, Michael Mihn-Jong Lee, Xiaoming Tang, Yuanyuan Zhou, Stefan Savage:
Be Conservative: Enhancing Failure Diagnosis with Proactive Logging. OSDI 2012: 293-306 - 2011
- [c55]Ding Yuan, Jing Zheng, Soyeon Park, Yuanyuan Zhou, Stefan Savage:
Improving software diagnosability via log enhancement. ASPLOS 2011: 3-14 - [c54]Lin Tan, Yuanyuan Zhou, Yoann Padioleau:
aComment: mining annotations from comments and code to detect interrupt related concurrency bugs. ICSE 2011: 11-20 - [c53]Jiaqi Zhang, Weiwei Xiong, Yang Liu, Soyeon Park, Yuanyuan Zhou, Zhiqiang Ma:
ATDetector: improving the accuracy of a commercial data race detector by identifying address transfer. MICRO 2011: 206-215 - [c52]Zuoning Yin, Ding Yuan, Yuanyuan Zhou, Shankar Pasupathy, Lakshmi N. Bairavasundaram:
How do fixes become bugs? SIGSOFT FSE 2011: 26-36 - [c51]Zuoning Yin, Xiao Ma, Jing Zheng, Yuanyuan Zhou, Lakshmi N. Bairavasundaram, Shankar Pasupathy:
An empirical study on configuration errors in commercial and open source systems. SOSP 2011: 159-172 - 2010
- [c50]Ding Yuan, Haohui Mai, Weiwei Xiong, Lin Tan, Yuanyuan Zhou, Shankar Pasupathy:
SherLog: error diagnosis by connecting clues from run-time logs. ASPLOS 2010: 143-154 - [c49]Yao Shi, Soyeon Park, Zuoning Yin, Shan Lu
, Yuanyuan Zhou, Wenguang Chen, Weimin Zheng:
Do I use the wrong definition?: DeFuse: definition-use invariants for detecting concurrency and sequential bugs. OOPSLA 2010: 160-174 - [c48]Weiwei Xiong, Soyeon Park, Jiaqi Zhang, Yuanyuan Zhou, Zhiqiang Ma:
Ad Hoc Synchronization Considered Harmful. OSDI 2010: 163-176
2000 – 2009
- 2009
- [j15]Weihang Jiang, Chongfeng Hu, Shankar Pasupathy, Arkady Kanevsky, Yuanyuan Zhou:
Storage System Problem Troubleshooting andSystem Logs. login Usenix Mag. 34(3) (2009) - [c47]Soyeon Park, Shan Lu
, Yuanyuan Zhou:
CTrigger: exposing atomicity violation bugs from their hiding places. ASPLOS 2009: 25-36 - [c46]Joseph A. Tucek, Weiwei Xiong, Yuanyuan Zhou:
Efficient online validation with delta execution. ASPLOS 2009: 193-204 - [c45]Zhe Zhang, Amit Kulkarni, Xiaosong Ma, Yuanyuan Zhou:
Memory resource allocation for file system prefetching: from a supply chain management perspective. EuroSys 2009: 75-88 - [c44]Weihang Jiang, Chongfeng Hu, Shankar Pasupathy, Arkady Kanevsky, Zhenmin Li, Yuanyuan Zhou:
Understanding Customer Problem Troubleshooting from Storage System Logs. FAST 2009: 43-56 - [c43]Yoann Padioleau, Lin Tan, Yuanyuan Zhou:
Listening to programmers - Taxonomies and characteristics of comments in operating system code. ICSE 2009: 331-341 - [c42]Soyeon Park, Yuanyuan Zhou, Weiwei Xiong, Zuoning Yin, Rini Kaushik, Kyu H. Lee, Shan Lu
:
PRES: probabilistic replay with execution sketching on multiprocessors. SOSP 2009: 177-192 - 2008
- [j14]Weihang Jiang, Chongfeng Hu, Yuanyuan Zhou, Arkady Kanevsky:
Are disks the dominant contributor for storage failures - A comprehensive study of storage subsystem failure characteristics. ACM Trans. Storage 4(3): 7:1-7:25 (2008) - [j13]Weihang Jiang, Chongfeng Hu, Yuanyuan Zhou, Arkady Kanevsky:
Don't Blame Disks for Every Storage Subsystem Failure. login Usenix Mag. 33(3) (2008) - [c41]Shan Lu
, Soyeon Park, Eunsoo Seo, Yuanyuan Zhou:
Learning from mistakes: a comprehensive study on real world concurrency bug characteristics. ASPLOS 2008: 329-339 - [c40]Weihang Jiang, Chongfeng Hu, Yuanyuan Zhou, Arkady Kanevsky:
Are Disks the Dominant Contributor for Storage Failures? A Comprehensive Study of Storage Subsystem Failure Characteristics. FAST 2008: 111-125 - [c39]Zhe Zhang, Kyuhyung Lee, Xiaosong Ma, Yuanyuan Zhou:
PFC: Transparent Optimization of Existing Prefetching Strategies for Multi-Level Storage Systems. ICDCS 2008: 740-751 - [c38]Michael Jiang, Jing Zhang, Hong Zhao, Yuanyuan Zhou:
Maintaining software product lines - an industrial practice. ICSM 2008: 444-447 - [c37]Samuel T. King, Joseph A. Tucek, Anthony Cozzie, Chris Grier, Weihang Jiang, Yuanyuan Zhou:
Designing and Implementing Malicious Hardware. LEET 2008 - [c36]Ding Yuan, Kyuhyung Lee, Hong Cheng, Gopal Krishna, Zhenmin Li, Xiao Ma, Yuanyuan Zhou, Jiawei Han:
CISpan: Comprehensive Incremental Mining Algorithms of Closed Sequential Patterns for Multi-Versional Software Mining. SDM 2008: 84-95 - [c35]Lin Tan, Xiaolan Zhang, Xiao Ma, Weiwei Xiong, Yuanyuan Zhou:
AutoISES: Automatically Inferring Security Specification and Detecting Violations. USENIX Security Symposium 2008: 379-394 - [c34]Michael Jiang, Jing Zhang, Hong Zhao, Yuanyuan Zhou:
Enhancing Software Product Line Maintenance with Source Code Mining. WASA 2008: 538-547 - 2007
- [j12]Yan Zhang, Zhifeng Chen, Yuanyuan Zhou:
Efficient Execution of Multiple Queries on Deep Memory Hierarchy. J. Comput. Sci. Technol. 22(2): 273-279 (2007) - [j11]Shan Lu
, Joseph A. Tucek, Feng Qin, Yuanyuan Zhou:
AVIO: Detecting Atomicity Violations via Access-Interleaving Invariants. IEEE Micro 27(1): 26-35 (2007) - [j10]Feng Qin, Joseph A. Tucek, Yuanyuan Zhou, Jagadeesan Sundaresan:
Rx: Treating bugs as allergies - a safe method to survive software failures. ACM Trans. Comput. Syst. 25(3): 7 (2007) - [c33]Joseph A. Tucek, James Newsome, Shan Lu
, Chengdu Huang, Spiros Xanthos, David Brumley, Yuanyuan Zhou, Dawn Xiaodong Song:
Sweeper: a lightweight end-to-end system for defending against fast worms. EuroSys 2007: 115-128 - [c32]Lin Tan, Ding Yuan, Yuanyuan Zhou:
HotComments: How to Make Program Comments More Useful? HotOS 2007 - [c31]Soyeon Park, Weihang Jiang, Yuanyuan Zhou, Sarita V. Adve:
Managing energy-performance tradeoffs for multithreaded applications on multiprocessor architectures. SIGMETRICS 2007: 169-180 - [c30]Shan Lu
, Weihang Jiang, Yuanyuan Zhou:
A study of interleaving coverage criteria. ESEC/SIGSOFT FSE 2007: 533-536 - [c29]Shan Lu
, Soyeon Park, Chongfeng Hu, Xiao Ma, Weihang Jiang, Zhenmin Li, Raluca A. Popa, Yuanyuan Zhou:
MUVI: automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs. SOSP 2007: 103-116 - [c28]Joseph A. Tucek, Shan Lu
, Chengdu Huang, Spiros Xanthos, Yuanyuan Zhou:
Triage: diagnosing production run failures at the user's site. SOSP 2007: 131-144 - [c27]Lin Tan, Ding Yuan, Gopal Krishna, Yuanyuan Zhou:
/*icomment: bugs or bad comments?*/. SOSP 2007: 145-158 - 2006
- [j9]Zhenmin Li, Shan Lu
, Suvda Myagmar, Yuanyuan Zhou:
CP-Miner: Finding Copy-Paste and Related Bugs in Large-Scale Software Code. IEEE Trans. Software Eng. 32(3): 176-192 (2006) - [c26]Zhenmin Li, Lin Tan, Xuanhui Wang, Shan Lu
, Yuanyuan Zhou, Chengxiang Zhai:
Have things changed now?: an empirical study of bug characteristics in modern open source software. ASID 2006: 25-33 - [c25]Shan Lu
, Joseph A. Tucek, Feng Qin, Yuanyuan Zhou:
AVIO: detecting atomicity violations via access interleaving invariants. ASPLOS 2006: 37-48 - [c24]Joseph A. Tucek, Shan Lu, Chengdu Huang, Spiros Xanthos, Yuanyuan Zhou:
Automatic On-line Failure Diagnosis at the End-User Site. HotDep 2006 - [c23]Vivek Pandey, Weihang Jiang, Yuanyuan Zhou, Ricardo Bianchini:
DMA-aware memory energy management. HPCA 2006: 133-144 - [c22]Shan Lu
, Pin Zhou, Wei Liu, Yuanyuan Zhou, Josep Torrellas:
PathExpander: Architectural Support for Increasing the Path Coverage of Dynamic Bug Detection. MICRO 2006: 38-52 - [c21]Yan Zhang, Zhifeng Chen, Yuanyuan Zhou:
MiniTasking: Improving Cache Performance for Multiple Query Workloads. WAIM 2006: 287-299 - 2005
- [j8]Yuanyuan Zhou, Pin Zhou, Feng Qin, Wei Liu, Josep Torrellas:
Efficient and flexible architectural support for dynamic monitoring. ACM Trans. Archit. Code Optim. 2(1): 3-33 (2005) - [j7]Qingbo Zhu, Yuanyuan Zhou:
Power-Aware Storage Cache Management. IEEE Trans. Computers 54(5): 587-602 (2005) - [j6]Zhenmin Li, Zhifeng Chen, Yuanyuan Zhou:
Mining block correlations to improve storage performance. ACM Trans. Storage 1(2): 213-245 (2005) - [j5]Yuanyuan Zhou, Angelos Bilas
, Suresh Jagannathan, Dimitrios Xinidis, Cezary Dubnicki, Kai Li:
VI-Attached Database Storage. IEEE Trans. Parallel Distributed Syst. 16(1): 35-50 (2005) - [c20]Feng Qin, Joseph A. Tucek, Yuanyuan Zhou:
Treating Bugs as Allergies: A Safe Method for Surviving Software Failures. HotOS 2005 - [c19]Feng Qin, Shan Lu
, Yuanyuan Zhou:
SafeMem: Exploiting ECC-Memory for Detecting Memory Leaks and Memory Corruption During Production Runs. HPCA 2005: 291-302 - [c18]Zhifeng Chen, Yan Zhang, Yuanyuan Zhou, Heidi Scott, Berni Schiefer:
Empirical evaluation of multi-level buffer cache collaboration for storage systems. SIGMETRICS 2005: 145-156 - [c17]Qingbo Zhu, Zhifeng Chen, Lin Tan, Yuanyuan Zhou, Kimberly Keeton
, John Wilkes:
Hibernator: helping disk arrays sleep through the winter. SOSP 2005: 177-190 - [c16]Feng Qin, Joseph A. Tucek, Jagadeesan Sundaresan, Yuanyuan Zhou:
Rx: treating bugs as allergies - a safe method to survive software failures. SOSP 2005: 235-248 - [e1]Vijay Atluri, Pierangela Samarati, William Yurcik, Larry Brumbaugh, Yuanyuan Zhou:
Proceedings of the 2005 ACM Workshop On Storage Security And Survivability, StorageSS 2005, Fairfax, VA, USA, November 11, 2005. ACM 2005, ISBN 1-59593-233-X [contents] - 2004
- [j4]Xiaodong Li, Zhenmin Li, Pin Zhou, Yuanyuan Zhou, Sarita V. Adve, Sanjeev Kumar:
Performance-Directed Energy Management for Storage Systems. IEEE Micro 24(6): 38-49 (2004) - [j3]Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, Josep Torrellas:
iWatcher: Simple, General Architectural Support for Software Debugging. IEEE Micro 24(6): 50-56 (2004) - [j2]Yuanyuan Zhou, Zhifeng Chen, Kai Li:
Second-Level Buffer Cache Management. IEEE Trans. Parallel Distributed Syst. 15(6): 505-519 (2004) - [c15]Zhenmin Li, Zhifeng Chen, Sudarshan M. Srinivasan, Yuanyuan Zhou:
C-Miner: Mining Block Correlations in Storage Systems. FAST 2004: 173-186 - [c14]Qingbo Zhu, Francis M. David, Christo Frank Devaraj, Zhenmin Li, Yuanyuan Zhou, Pei Cao:
Reducing Energy Consumption of Disk Storage Using Power-Aware Cache Management. HPCA 2004: 118-129 - [c13]Qingbo Zhu, Asim Shankar, Yuanyuan Zhou:
PB-LRU: a self-tuning power aware storage cache replacement algorithm for conserving disk energy. ICS 2004: 79-88 - [c12]Pin Zhou, Feng Qin, Wei Liu, Yuanyuan Zhou, Josep Torrellas:
iWatcher: Efficient Architectural Support for Software Debugging. ISCA 2004: 224-237 - [c11]Pin Zhou, Wei Liu, Long Fei, Shan Lu
, Feng Qin, Yuanyuan Zhou, Samuel P. Midkiff, Josep Torrellas:
AccMon: Automatically Detecting Memory-Related Bugs via Program Counter-Based Invariants. MICRO 2004: 269-280 - [c10]Zhenmin Li, Shan Lu, Suvda Myagmar, Yuanyuan Zhou:
CP-Miner: A Tool for Finding Copy-paste and Related Bugs in Operating System Code. OSDI 2004: 289-302 - 2003
- [c9]Cristina L. Abad
, Jed Taylor, Cigdem Sengul, William Yurcik, Yuanyuan Zhou, Kenneth E. Rowe:
Log Correlation for Intrusion Detection: A Proof of Concept. ACSAC 2003: 255-264 - [c8]Zhifeng Chen, Yuanyuan Zhou, Kai Li:
Eviction-based Cache Placement for Storage Caches. USENIX Annual Technical Conference, General Track 2003: 269-281 - 2002
- [j1]Marianne Winslett, Kevin Chen-Chuan Chang, AnHai Doan, Jiawei Han, ChengXiang Zhai, Yuanyuan Zhou:
Database Research at the University of Illinois at Urbana-Champaign. SIGMOD Rec. 31(3): 97-102 (2002) - [c7]Yuanyuan Zhou, Kai Li, Angelos Bilas
, Suresh Jagannathan, Cezary Dubnicki, James Philbin:
Experiences with VI Communication for Database Storage. ISCA 2002: 257-268 - 2001
- [c6]Yuanyuan Zhou, James Philbin, Kai Li:
The Multi-Queue Replacement Algorithm for Second Level Buffer Caches. USENIX Annual Technical Conference, General Track 2001: 91-104
1990 – 1999
- 1999
- [c5]Angelos Bilas
, Dongming Jiang, Yuanyuan Zhou, Jaswinder Pal Singh:
Limits to the Performance of Software Shared Memory: A Layered Approach. HPCA 1999: 193-202 - [c4]Yuanyuan Zhou, Peter M. Chen, Kai Li:
Fast cluster failover using virtual memory-mapped communication. International Conference on Supercomputing 1999: 373-382 - [c3]Yuanyuan Zhou, Limin Wang, Douglas W. Clark, Kai Li:
Thread Scheduling for Out-of-core Applications with Memory Server on Multicomputers. IOPADS 1999: 57-67 - 1997
- [c2]Yuanyuan Zhou, Liviu Iftode, Jaswinder Pal Singh, Kai Li, Brian R. Toonen, Ioannis Schoinas, Mark D. Hill, David A. Wood:
Relaxed Consistency and Coherence Granularity in DSM Systems: A Performance Evaluation. PPoPP 1997: 193-205 - 1996
- [c1]Yuanyuan Zhou, Liviu Iftode, Kai Li:
Performance Evaluation of Two Home-Based Lazy Release Consistency Protocols for Shared Virtual Memory Systems. OSDI 1996: 75-88