Feng Qin
Cited by
Cited by
Lift: A low-overhead practical information flow tracking system for detecting security attacks
F Qin, C Wang, Z Li, H Kim, Y Zhou, Y Wu
2006 39th Annual IEEE/ACM International Symposium on Microarchitecture …, 2006
AVIO: detecting atomicity violations via access interleaving invariants
S Lu, J Tucek, F Qin, Y Zhou
ACM SIGOPS Operating Systems Review 40 (5), 37-48, 2006
Rx: treating bugs as allergies---a safe method to survive software failures
F Qin, J Tucek, J Sundaresan, Y Zhou
Proceedings of the twentieth ACM symposium on Operating systems principles …, 2005
Bugbench: Benchmarks for evaluating bug detection tools
S Lu, Z Li, F Qin, L Tan, P Zhou, Y Zhou
Workshop on the evaluation of software defect detection tools 5, 2005
Designing High Performance Enterprise Wi-Fi Networks.
R Murty, J Padhye, R Chandra, A Wolman, B Zill
NSDI 8, 73-88, 2008
SafeMem: Exploiting ECC-memory for detecting memory leaks and memory corruption during production runs
F Qin, S Lu, Y Zhou
11th International Symposium on High-Performance Computer Architecture, 291-302, 2005
iWatcher: Efficient architectural support for software debugging
P Zhou, F Qin, W Liu, Y Zhou, J Torrellas
Proceedings. 31st Annual International Symposium on Computer Architecture …, 2004
AccMon: Automatically detecting memory-related bugs via program counter-based invariants
P Zhou, W Liu, L Fei, S Lu, F Qin, Y Zhou, S Midkiff, J Torrellas
Proceedings of the 37th annual IEEE/ACM International Symposium on …, 2004
Understanding the robustness of SSDs under power fault
M Zheng, J Tucek, F Qin, M Lillibridge
11th {USENIX} Conference on File and Storage Technologies ({FAST} 13), 271-284, 2013
LeakChaser: helping programmers narrow down causes of memory leaks
G Xu, MD Bond, F Qin, A Rountev
Proceedings of the 32nd ACM SIGPLAN conference on Programming language …, 2011
The magazine archive includes every article published in Communications of the ACM for over the past 50 years.
PJ Denning
Communications of the ACM 55 (12), 33-35, 2012
Rx: Treating bugs as allergies—a safe method to survive software failures
F Qin, J Tucek, Y Zhou, J Sundaresan
ACM Transactions on Computer Systems (TOCS) 25 (3), 7, 2007
Torturing databases for fun and profit
M Zheng, J Tucek, D Huang, F Qin, M Lillibridge, ES Yang, BW Zhao, ...
11th {USENIX} Symposium on Operating Systems Design and Implementation …, 2014
DMTracker: Finding bugs in large-scale parallel programs by detecting anomaly in data movements
Q Gao, F Qin, DK Panda
Proceedings of the 2007 ACM/IEEE conference on Supercomputing, 15, 2007
GRace: a low-overhead mechanism for detecting data races in GPU programs
M Zheng, VT Ravi, F Qin, G Agrawal
ACM SIGPLAN Notices 46 (8), 135-146, 2011
2ndStrike: toward manifesting hidden concurrency typestate bugs
Q Gao, W Zhang, Z Chen, M Zheng, F Qin
Proceedings of the sixteenth international conference on Architectural …, 2011
Efficient checkpointing of java software using context-sensitive capture and replay
G Xu, A Rountev, Y Tang, F Qin
Proceedings of the the 6th joint meeting of the European software …, 2007
Flowchecker: Detecting bugs in mpi libraries via message flow checking
Z Chen, Q Gao, W Zhang, F Qin
SC'10: Proceedings of the 2010 ACM/IEEE International Conference for High …, 2010
LeakSurvivor: towards safely tolerating memory leaks for garbage-collected languages
Y Tang, Q Gao, F Qin
USENIX 2008 Annual Technical Conference on Annual Technical Conference, 307-320, 2008
Automatic model generation from documentation for Java API functions
J Zhai, J Huang, S Ma, X Zhang, L Tan, J Zhao, F Qin
2016 IEEE/ACM 38th International Conference on Software Engineering (ICSE …, 2016
The system can't perform the operation now. Try again later.
Articles 1–20