default search action
Peng Huang 0005
Person information
- affiliation: University of Michigan, Ann Arbor, USA
- affiliation (former): Johns Hopkins University, Baltimore, MD, USA
- affiliation (PhD 2016): University of California, San Diego, CA, USA
Other persons with the same name
- Peng Huang — disambiguation page
- Peng Huang 0001 — University of Surrey, UK
- Peng Huang 0002 — Tongji University, State Key Laboratory of Disaster Reduction in Civil Engineering, Shanghai, China
- Peng Huang 0003 — University of Maryland, Robert H. Smith School of Business, College Park, MD, USA (and 1 more)
- Peng Huang 0004 — Peking University, Institute of Microelectronics, Beijing, China
Other persons with a similar name
- Chien-Peng Huang
- Chih-Peng Huang
- Jen-Peng Huang
- Jen-peng Huang
- Peng-Chang Huang
- Peng-Cheng Huang
- Peng-Hao Huang
- Peng-Wei Huang — National Cheng Kung University, Tainan City, Taiwan
- Peng-Yu Huang
- Huang Peng
SPARQL queries
Refine list
refinements active!
zoomed in on ?? of ?? records
view refined list in
export refined list as
2020 – today
- 2024
- [c32]Haoze Wu, Jia Pan, Peng Huang:
Efficient Exposure of Partial Failure Bugs in Distributed Systems with Inferred Abstract States. NSDI 2024 - [c31]Jia Pan, Haoze Wu, Tanakorn Leesatapornwongsa, Suman Nath, Peng Huang:
Efficient Reproduction of Fault-Induced Failures in Distributed Systems with Feedback-Driven Fault Injection. SOSP 2024: 46-62 - 2023
- [j4]Yiming Zhang, Huiba Li, Shengyun Liu, Peng Huang:
Hybrid Block Storage for Efficient Cloud Volume Service. ACM Trans. Storage 19(4): 35:1-35:25 (2023) - [c30]Lingmei Weng, Yigong Hu, Peng Huang, Jason Nieh, Junfeng Yang:
Effective Performance Issue Diagnosis with Value-Assisted Cost Profiling. EuroSys 2023: 1-17 - [c29]Yiming Qiu, Patrick Tser Jern Kon, Jiarong Xing, Yibo Huang, Hongyi Liu, Xinyu Wang, Peng Huang, Mosharaf Chowdhury, Ang Chen:
Simplifying Cloud Management with Cloudless Computing. HotNets 2023: 95-101 - [c28]Yigong Hu, Gongqi Huang, Peng Huang:
Pushing Performance Isolation Boundaries into Application with pBox. SOSP 2023: 247-263 - 2022
- [c27]Chang Lou, Yuzhuo Jing, Peng Huang:
Demystifying and Checking Silent Semantic Violations in Large Distributed Systems. OSDI 2022: 91-107 - [c26]Chang Lou, Cong Chen, Peng Huang, Yingnong Dang, Si Qin, Xinsheng Yang, Xukun Li, Qingwei Lin, Murali Chintalapati:
RESIN: A Holistic Service for Dealing with Memory Leaks in Production Cloud Infrastructure. OSDI 2022: 109-125 - [c25]Yuzhuo Jing, Peng Huang:
Operating System Support for Safe and Efficient Auxiliary Execution. OSDI 2022: 633-648 - [c24]Erfan Sharafzadeh, Alireza Sanaee, Peng Huang, Gianni Antichi, Soudeh Ghorbani:
Understanding Microquanta Process Scheduling for Cloud Applications. UCC 2022: 279-284 - 2021
- [j3]Rui Zhang, Calvin Deutschbein, Peng Huang, Cynthia Sturton:
End-to-End Automated Exploit Generation for Processor Security Validation. IEEE Des. Test 38(3): 22-30 (2021) - [c23]Lingmei Weng, Peng Huang, Jason Nieh, Junfeng Yang:
Argus: Debugging Performance Issues in Modern Desktop Applications with Annotated Causal Tracing. USENIX ATC 2021: 193-207 - 2020
- [c22]Ze Li, Qian Cheng, Ken Hsieh, Yingnong Dang, Peng Huang, Pankaj Singh, Xinsheng Yang, Qingwei Lin, Youjiang Wu, Sebastien Levy, Murali Chintalapati:
Gandalf: An Intelligent, End-To-End Analytics Service for Safe Deployment in Large-Scale Cloud Infrastructure. NSDI 2020: 389-402 - [c21]Chang Lou, Peng Huang, Scott Smith:
Understanding, Detecting and Localizing Partial Failures in Large System Software. NSDI 2020: 559-574 - [c20]Yigong Hu, Gongqi Huang, Peng Huang:
Automated Reasoning and Detection of Specious Configuration in Large Systems with Symbolic Execution. OSDI 2020: 719-734 - [c19]Sebastien Levy, Randolph Yao, Youjiang Wu, Yingnong Dang, Peng Huang, Zheng Mu, Pu Zhao, Tarun Ramani, Naga K. Govindaraju, Xukun Li, Qingwei Lin, Gil Lapid Shafriri, Murali Chintalapati:
Predictive and Adaptive Failure Mitigation to Avert Production Cloud VM Interruptions. OSDI 2020: 1155-1170 - [i1]Yigong Hu, Gongqi Huang, Peng Huang:
Automated Reasoning and Detection of Specious Configuration in Large Systems with Symbolic Execution. CoRR abs/2010.06356 (2020)
2010 – 2019
- 2019
- [c18]Yigong Hu, Suyi Liu, Peng Huang:
A Case for Lease-Based, Utilitarian Resource Management on Mobile Devices. ASPLOS 2019: 301-315 - [c17]Huiba Li, Yiming Zhang, Dongsheng Li, Zhiming Zhang, Shengyun Liu, Peng Huang, Zheng Qin, Kai Chen, Yongqiang Xiong:
URSA: Hybrid Block Storage for Cloud-Scale Virtual Disks. EuroSys 2019: 15:1-15:17 - [c16]Chang Lou, Peng Huang, Scott Smith:
Comprehensive and Efficient Runtime Checking in System Software through Watchdogs. HotOS 2019: 51-57 - [c15]Yingnong Dang, Qingwei Lin, Peng Huang:
AIOps: real-world challenges and research innovations. ICSE (Companion Volume) 2019: 4-5 - 2018
- [c14]Rui Zhang, Calvin Deutschbein, Peng Huang, Cynthia Sturton:
End-to-End Automated Exploit Generation for Validating the Security of Processor Designs. MICRO 2018: 815-827 - [c13]Peng Huang, Chuanxiong Guo, Jacob R. Lorch, Lidong Zhou, Yingnong Dang:
Capturing and Enhancing In Situ System Observability for Failure Detection. OSDI 2018: 1-16 - [c12]Gennady Pekhimenko, Chuanxiong Guo, Myeongjae Jeon, Peng Huang, Lidong Zhou:
TerseCades: Efficient Data Compression in Stream Processing. USENIX ATC 2018: 307-320 - 2017
- [c11]Peng Huang, Chuanxiong Guo, Lidong Zhou, Jacob R. Lorch, Yingnong Dang, Murali Chintalapati, Randolph Yao:
Gray Failure: The Achilles' Heel of Cloud-Scale Systems. HotOS 2017: 150-155 - [c10]Tianyin Xu, Xinxin Jin, Peng Huang, Yuanyuan Zhou, Shan Lu, Long Jin, Shankar Pasupathy:
Early Detection of Configuration Errors to Reduce Failure Damage. USENIX ATC 2017 - 2016
- [b1]Peng Huang:
Toward Understanding and Dealing with Failures in Cloud-Scale Systems. University of California, San Diego, USA, 2016 - [c9]Xinxin Jin, Peng Huang, Tianyin Xu, Yuanyuan Zhou:
NChecker: saving mobile app developers from network disruptions. EuroSys 2016: 22:1-22:16 - [c8]Peng Huang, Tianyin Xu, Xinxin Jin, Yuanyuan Zhou:
DefDroid: Towards a More Defensive Mobile OS Against Disruptive App Behavior. MobiSys 2016: 221-234 - [c7]Tianyin Xu, Xinxin Jin, Peng Huang, Yuanyuan Zhou, Shan Lu, Long Jin, Shankar Pasupathy:
Early Detection of Configuration Errors to Reduce Failure Damage. OSDI 2016: 619-634 - 2015
- [c6]Peng Huang, William J. Bolosky, Abhishek Singh, Yuanyuan Zhou:
ConfValley: a systematic configuration validation framework for cloud services. EuroSys 2015: 19:1-19:16 - 2014
- [c5]Peng Huang, Xiao Ma, Dongcai Shen, Yuanyuan Zhou:
Performance regression testing target prioritization via performance risk analysis. ICSE 2014: 60-71 - 2013
- [j2]Jing Jiang, Christo Wilson, Xiao Wang, Wenpeng Sha, Peng Huang, Yafei Dai, Ben Y. Zhao:
Understanding latent interactions in online social networks. ACM Trans. Web 7(4): 18:1-18:39 (2013) - [c4]Xiao Ma, Peng Huang, Xinxin Jin, Pei Wang, Soyeon Park, Dongcai Shen, Yuanyuan Zhou, Lawrence K. Saul, Geoffrey M. Voelker:
eDoctor: Automatically Diagnosing Abnormal Battery Drain Issues on Smartphones. NSDI 2013: 57-70 - [c3]Tianyin Xu, Jiaqi Zhang, Peng Huang, Jing Zheng, Tianwei Sheng, Ding Yuan, Yuanyuan Zhou, Shankar Pasupathy:
Do not blame users for misconfigurations. SOSP 2013: 244-259 - 2012
- [c2]Ding Yuan, Soyeon Park, Peng Huang, Yang Liu, Michael Mihn-Jong Lee, Xiaoming Tang, Yuanyuan Zhou, Stefan Savage:
Be Conservative: Enhancing Failure Diagnosis with Proactive Logging. OSDI 2012: 293-306 - 2010
- [j1]Jing Jiang, Yongjun Li, Qinyuan Feng, Peng Huang, Yafei Dai:
A multiple user sharing behaviors based approach for fake file detection in P2P environments. Sci. China Inf. Sci. 53(11): 2169-2184 (2010) - [c1]Jing Jiang, Christo Wilson, Xiao Wang, Peng Huang, Wenpeng Sha, Yafei Dai, Ben Y. Zhao:
Understanding latent interactions in online social networks. Internet Measurement Conference 2010: 369-382
Coauthor Index
manage site settings
To protect your privacy, all features that rely on external API calls from your browser are turned off by default. You need to opt-in for them to become active. All settings here will be stored as cookies with your web browser. For more information see our F.A.Q.
Unpaywalled article links
Add open access links from to the list of external document links (if available).
Privacy notice: By enabling the option above, your browser will contact the API of unpaywall.org to load hyperlinks to open access articles. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Unpaywall privacy policy.
Archived links via Wayback Machine
For web page which are no longer available, try to retrieve content from the of the Internet Archive (if available).
Privacy notice: By enabling the option above, your browser will contact the API of archive.org to check for archived content of web pages that are no longer available. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Internet Archive privacy policy.
Reference lists
Add a list of references from , , and to record detail pages.
load references from crossref.org and opencitations.net
Privacy notice: By enabling the option above, your browser will contact the APIs of crossref.org, opencitations.net, and semanticscholar.org to load article reference information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the Crossref privacy policy and the OpenCitations privacy policy, as well as the AI2 Privacy Policy covering Semantic Scholar.
Citation data
Add a list of citing articles from and to record detail pages.
load citations from opencitations.net
Privacy notice: By enabling the option above, your browser will contact the API of opencitations.net and semanticscholar.org to load citation information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the OpenCitations privacy policy as well as the AI2 Privacy Policy covering Semantic Scholar.
OpenAlex data
Load additional information about publications from .
Privacy notice: By enabling the option above, your browser will contact the API of openalex.org to load additional information. Although we do not have any reason to believe that your call will be tracked, we do not have any control over how the remote server uses your data. So please proceed with care and consider checking the information given by OpenAlex.
last updated on 2025-01-24 17:16 CET by the dblp team
all metadata released as open data under CC0 1.0 license
see also: Terms of Use | Privacy Policy | Imprint