{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T15:21:50Z","timestamp":1730215310166,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,6]]},"DOI":"10.1109\/dsn.2014.51","type":"proceedings-article","created":{"date-parts":[[2014,9,29]],"date-time":"2014-09-29T21:38:58Z","timestamp":1412026738000},"page":"479-490","source":"Crossref","is-referenced-by-count":6,"title":["Ocasta: Clustering Configuration Settings for Error Recovery"],"prefix":"10.1109","author":[{"given":"Zhen","family":"Huang","sequence":"first","affiliation":[]},{"given":"David","family":"Lie","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"doi-asserted-by":"publisher","key":"19","DOI":"10.1145\/1294261.1294284"},{"doi-asserted-by":"publisher","key":"17","DOI":"10.1109\/ICSE.2013.6606577"},{"key":"18","first-page":"1","article-title":"Enabling configuration-independent automation by non-expert users","author":"kushman","year":"2010","journal-title":"Proceedings of the 2nd Symposium on Operating Systems Design and Implementation"},{"doi-asserted-by":"publisher","key":"15","DOI":"10.1145\/1272998.1273020"},{"doi-asserted-by":"publisher","key":"16","DOI":"10.1109\/ASE.2011.6100053"},{"doi-asserted-by":"publisher","key":"13","DOI":"10.1093\/bioinformatics\/bth078"},{"key":"14","first-page":"36","article-title":"Context-based online configuration-error detection","author":"yuan","year":"2011","journal-title":"Proceedings of the 2011 Annual Usenix Technical Conference"},{"year":"2012","journal-title":"Redis","key":"11"},{"key":"12","article-title":"Detours: Binary interception of win32 functions","author":"hunt","year":"1999","journal-title":"Proceedings of the 3rd USENIX Windows NT Symposium"},{"key":"21","article-title":"Toward quantifying system manageability","author":"candea","year":"2008","journal-title":"Proceedings of the 4th Workshop on Hot Topics in Systems Dependability"},{"doi-asserted-by":"publisher","key":"20","DOI":"10.1109\/DSN.2008.4630084"},{"key":"22","first-page":"1","article-title":"Debugging operating systems with time-traveling virtual machines","author":"king","year":"2005","journal-title":"Proceedings of the 2005 Annual USENIX Technical Conference"},{"doi-asserted-by":"publisher","key":"23","DOI":"10.1145\/1095810.1095826"},{"key":"24","first-page":"1","article-title":"Intrusion recovery using selective re-execution","author":"kim","year":"2010","journal-title":"Proceedings of the 2nd Symposium on Operating Systems Design and Implementation"},{"doi-asserted-by":"publisher","key":"25","DOI":"10.1145\/1095810.1095833"},{"doi-asserted-by":"publisher","key":"26","DOI":"10.1109\/ICSE.1991.130626"},{"key":"27","first-page":"246","article-title":"Identifying objects using cluster and concept analysis","volume":"1999","author":"van deursen","year":"0","journal-title":"Software Engineering 1999 Proceedings of the 1999 International Conference on"},{"key":"28","first-page":"150","article-title":"Information-theoretic software clustering, \" software engineering","volume":"31","author":"andritsos","year":"2005","journal-title":"IEEE Transactions on"},{"doi-asserted-by":"publisher","key":"29","DOI":"10.1109\/ICSE.2001.919107"},{"key":"3","first-page":"245","article-title":"Automatic misconfiguration troubleshooting with peerpressure","author":"wang","year":"2004","journal-title":"Proceedings of the 6th Symposium on Operating Systems Design and Implementation"},{"key":"2","first-page":"77","article-title":"Configuration debugging as search: Finding the needle in the haystack","author":"whitaker","year":"2004","journal-title":"Proceedings of the 6th Symposium on Operating Systems Design and Implementation"},{"doi-asserted-by":"publisher","key":"10","DOI":"10.1145\/1294261.1294272"},{"key":"1","first-page":"561","article-title":"Why pcs are fragile and what we can do about it: A study of windows registry problems in dependable systems and networks","author":"ganapathi","year":"2004","journal-title":"2004 International Conference on"},{"doi-asserted-by":"publisher","key":"30","DOI":"10.1145\/2393596.2393629"},{"doi-asserted-by":"publisher","key":"7","DOI":"10.1145\/2043556.2043572"},{"key":"6","first-page":"1","article-title":"Automating configuration troubleshooting with dynamic information flow analysis","author":"attariyan","year":"2010","journal-title":"Proceedings of the 2nd Symposium on Operating Systems Design and Implementation"},{"key":"32","first-page":"759","article-title":"Hierarchical clustering for software architecture recovery, \" software engineerin g","volume":"33","author":"maqbool","year":"2007","journal-title":"IEEE Transactions on"},{"key":"5","first-page":"28","article-title":"Discovering correctness constraints for self-management of system configuration","author":"kycyman","year":"2004","journal-title":"Proceedings of the 1st International Conference on Autonomic Computing"},{"doi-asserted-by":"publisher","key":"31","DOI":"10.1109\/WCRE.1999.806964"},{"key":"4","first-page":"159","article-title":"Strider: A black-box, statebased approach to change and configuration management and support","author":"wang","year":"2003","journal-title":"Proceedings of the 17th Large Installation System Administrator Conference"},{"key":"9","article-title":"Repair from a chair: Computer repair as an untrusted cloud service","author":"ingram","year":"2011","journal-title":"Proc Workshop Hot Topics in Operating Systems"},{"year":"2005","author":"tan","journal-title":"Introduction to Data Mining","key":"8"}],"event":{"name":"2014 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks (DSN)","start":{"date-parts":[[2014,6,23]]},"location":"Atlanta, GA, USA","end":{"date-parts":[[2014,6,26]]}},"container-title":["2014 44th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6900116\/6903544\/06903604.pdf?arnumber=6903604","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:36:07Z","timestamp":1602689767000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6903604"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,6]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/dsn.2014.51","relation":{},"subject":[],"published":{"date-parts":[[2014,6]]}}}