Coverity scan:2014 open source report[EB/OL].[2017-02-19].http://go.coverity.com/rs/157-LQW-289/images/2014-Coverity-Scan-Report.pdf.
[2]
Barroso L A, Clidaras J, Hlzle U, et al.The datacenter as a computer:An introduction to the design of warehouse-scale machines [M].Synthesis Lectures on Computer Architecture.Williston:Morgan & Claypool Publishers,2009.
[3]
Rabkin A, Katz R H. How hadoop clusters break [J].IEEE Software,2013,30(4):88-94.
[4]
Chen Wei,Huang Xiang,Qiao Xiao-qiang,et al.Research on software misconfiguration troubleshooting [J].Journal of Software,2015,26(6):1285-1305.(in Chinese)
[5]
Li Fu-liang,Yang Jia-hai,Wu Jian-ping,et al.Research on internet automatic configuration [J].Journal of Software,2014,25(1):118-134.(in Chinese)
[6]
Xu Tian-yin,Zhang Jia-qi,Huang Peng,et al.Do not blame users for misconfigurations [C]∥Proc of the 24th ACM Symposium on Operating Systems Principles,2013:244-259.
[7]
Zhang Jia-qi, Renganarayana L,Zhang Xiao-lan,et al.EnCore:Exploiting system environment and correlation information for misconfiguration detection [J].ACM Sigplan Notices,2014,49(4):687-700.