Browse College of Engineering by Contributor "Zhou, Yuanyuan"

  • Tucek, Joseph (2012-02-06)
    The high complexity of modern software, and our pervasive reliance on that software, has made the problems of software reliability increasingly important. Yet despite advances in software engineering practice, pre-release ...

    application/pdf

    application/pdfPDF (916kB)
  • Zhou, Pin (2006)
    We also present an incremental checking framework, called iChecker, that leverages iWatcher to provide an iChecker library for efficient, incremental, run-time consistency checks of mutable data structures in C programs. ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Lenharth, Andrew D. (2011-01-14)
    Gracefully recovering from software and hardware faults is important to ensuring highly reliable and available systems. Operating systems have privileged access to all aspects of system operation, thus a fault related ...

    application/pdf

    application/pdfPDF (1MB)
  • Yin, Zuoning (2012-05-22)
    With the advance of technology, current systems are becoming much more powerful in computation, much faster in data transfer and much more abundant in data storage. However, what have been left behind are the system ...

    application/pdf

    application/pdfPDF (910kB)
  • Ma, Xiao (2013-02-03)
    The past few years have witnessed an evolutionary change in the smartphone ecosystem. Smartphones have gone from closed platforms containing only pre-installed applications to open platforms hosting a variety of third-party ...

    application/pdf

    application/pdfPDF (1MB)
  • Yuan, Ding (2013-02-03)
    As software is growing in size and complexity, accompanied by vendors’ increased time-to-market pressure, it has become increasingly difficult to deliver bulletproof software. Consequently, software systems still fail in ...

    application/pdf

    application/pdfPDF (4MB)
  • Tan, Lin (2009)
    Lastly, we proposed and implemented aComment to detect operating system concurrency bugs and handle the complex interaction between interrupts and lock. Specifically, we designed a new type of interrupt related annotations, ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Chen, Zhifeng (2005)
    To address the memory access bottleneck, this dissertation proposes Hanuman, which reformats data dynamically in the database buffer. By adapting data layouts to the changing workload, Hanuman improves the data spatial ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Zhu, Qingbo (2007)
    Our simulation results using both file system and online transaction processing (OLTP) traces show that our system can provide up to 65% energy savings while still meeting the response-time performance requirements (6.5-26 ...

    application/pdf

    application/pdfPDF (3MB)Restricted to U of Illinois
  • Montesinos Ortego, Pablo (2009-08-06)
    With the arrival of multicore chips as the commodity architecture for a wide range of platforms, there is a growing pressure to make parallel programming the norm. Unfortunately, most current programmers find parallel ...

    application/pdf

    application/pdfPDF (811kB)
  • Qin, Feng (2006)
    In summary, it can effectively improve software dependability during production runs by addressing software bugs at multiple levels with support from the hardware, OS, and runtime.

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois
  • Xiong, Weiwei (2013-08-22)
    Synchronization takes an important role in multi-threaded programs. Due to the non-deterministic nature of concurrency, it is always difficult for developers to make synchronizations correct. As a consequence, concurrent ...

    application/pdf

    application/pdfPDF (1MB)
  • Duan, Yue Lu (2015-01-21)
    Fences are instructions that programmers or compilers insert in the code to prevent the compiler or the hardware from reordering memory accesses [20, 43]. Fences can be expensive because all of the accesses before the fence ...

    application/pdf

    application/pdfPDF (499kB)
  • Jiang, Weihang (2009)
    Nowadays, over 90% new information produced are stored on hard disk drives. The explosion of data is making storage system a strategic investment priority in the enterprise world. The revenue created by storage system ...

    application/pdf

    application/pdfPDF (1MB)Restricted to U of Illinois
  • Lu, Shan (2008)
    The third main contribution is along the lines of exploring concurrent programs' interleaving space and exposing concurrency bugs. This thesis presents a hierarchy of interleaving coverage criteria. This hierarchy includes ...

    application/pdf

    application/pdfPDF (10MB)Restricted to U of Illinois
  • Li, Zhenmin (2006)
    Copy-pasted code is very common in large software, but it is prone to introducing bugs. CP-Miner uses frequent sequence mining to efficiently identify copy-pasted code in large software, and detects copy-paste related bugs. ...

    application/pdf

    application/pdfPDF (4MB)Restricted to U of Illinois