{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T04:11:28Z","timestamp":1746072688045,"version":"3.40.4"},"publisher-location":"Cham","reference-count":58,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783031908996","type":"print"},{"value":"9783031909009","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,5,1]],"date-time":"2025-05-01T00:00:00Z","timestamp":1746057600000},"content-version":"vor","delay-in-days":120,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"abstract":"<jats:title>Abstract<\/jats:title>\n          <jats:p>In a service system, operations engineers generally deploy numerous monitoring mechanisms in system components to detect anomalies caused by system faults and generate alerts, also known as alarms, that record the phenomenon of anomalies. Due to the topological relationships between system components, a system fault in a system component may affect other components and result in various local anomalies and generate multiple alerts across different components. Therefore, to facilitate troubleshooting, alerts of the same system fault are usually correlated into one group, called alert incident. However, although there are existing approaches that can automatically correlate alerts for operations engineers, analyzing alert incidents still rely on manual work. In this paper, we propose an approach, VOCE (Virtual On-Call Engineer). Using the emerging capabilities of a large language model, VOCE can automatically comprehend the anomaly information described by alerts and emulate the process of operations engineers analyzing an alert incident. Extensive experiments conducted on real alert incidents and two popular large language models demonstrate the effectiveness and efficiency of VOCE in automatically analyzing alert incidents.<\/jats:p>","DOI":"10.1007\/978-3-031-90900-9_4","type":"book-chapter","created":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:44:06Z","timestamp":1745988246000},"page":"65-88","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["VOCE: A Virtual On-Call Engineer for Automated Alert Incident Analysis Using a Large Language Model"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9883-6356","authenticated-orcid":false,"given":"Jia","family":"Chen","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0000-6136-982X","authenticated-orcid":false,"given":"Xiaolei","family":"Chen","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0007-7413-6735","authenticated-orcid":false,"given":"Jie","family":"Shi","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8136-9621","authenticated-orcid":false,"given":"Peng","family":"Wang","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0264-788X","authenticated-orcid":false,"given":"Wei","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,5,1]]},"reference":[{"key":"4_CR1","unstructured":"Achiam, J., Adler, S., Agarwal, S., Ahmad, L., Akkaya, I., Aleman, F.L., Almeida, D., Altenschmidt, J., Altman, S., Anadkat, S., et\u00a0al.: Gpt-4 technical report. arXiv preprint arXiv:2303.08774 (2023)"},{"key":"4_CR2","doi-asserted-by":"crossref","unstructured":"Agrawal, A., Karlupia, R., Gupta, R.: Logan: A distributed online log parser. In: IEEE 35th International Conference on Data Engineering (ICDE). pp. 1946\u20131951. IEEE (2019)","DOI":"10.1109\/ICDE.2019.00211"},{"key":"4_CR3","doi-asserted-by":"crossref","unstructured":"Ahmed, T., Ghosh, S., Bansal, C., Zimmermann, T., Zhang, X., Rajmohan, S.: Recommending root-cause and mitigation steps for cloud incidents using large language models. In: Proceedings of the 45th International Conference on Software Engineering. p. 1737-1749. ICSE \u201923, IEEE Press (2023)","DOI":"10.1109\/ICSE48619.2023.00149"},{"key":"4_CR4","unstructured":"Brown, T.B., Mann, B., Ryder, N., Subbiah, M., Kaplan, J., Dhariwal, P., Neelakantan, A., Shyam, P., Sastry, G., Askell, A., Agarwal, S., Herbert-Voss, A., Krueger, G., Henighan, T., Child, R., Ramesh, A., Ziegler, D.M., Wu, J., Winter, C., Hesse, C., Chen, M., Sigler, E., Litwin, M., Gray, S., Chess, B., Clark, J., Berner, C., McCandlish, S., Radford, A., Sutskever, I., Amodei, D.: Language models are few-shot learners. In: Proceedings of the 34th International Conference on Neural Information Processing Systems. NIPS\u201920, Curran Associates Inc., Red Hook, NY, USA (2020)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Chen, J., Wang, P., Wang, W.: Online summarizing alerts through semantic and behavior information. In: 2022 IEEE\/ACM 44th International Conference on Software Engineering (ICSE). pp. 1646\u20131657 (2022)","DOI":"10.1145\/3510003.3510055"},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Chen, J., He, X., Lin, Q., Xu, Y., Zhang, H., Hao, D., Gao, F., Xu, Z., Dang, Y., Zhang, D.: An empirical investigation of incident triage for online service systems. In: IEEE\/ACM 41st International Conference on Software Engineering: Software Engineering in Practice. pp. 111\u2013120. IEEE (2019)","DOI":"10.1109\/ICSE-SEIP.2019.00020"},{"key":"4_CR7","unstructured":"Chen, X., Lin, M., Sch\u00e4rli, N., Zhou, D.: Teaching large language models to self-debug (2023)"},{"key":"4_CR8","doi-asserted-by":"crossref","unstructured":"Chen, X., Deng, L., Huang, F., Zhang, C., Zhang, Z., Zhao, Y., Zheng, K.: Daemon: Unsupervised anomaly detection and interpretation for multivariate time series. In: 2021 IEEE 37th International Conference on Data Engineering (ICDE). pp. 2225\u20132230 (2021)","DOI":"10.1109\/ICDE51399.2021.00228"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Chen, Y., Zhang, C., Dong, Z., Yang, D., Peng, X., Ou, J., Yang, H., Wu, Z., Qu, X., Li, W.: Dynamic graph neural networks-based alert link prediction for online service systems. In: 2023 38th IEEE\/ACM International Conference on Automated Software Engineering (ASE). pp. 79\u201390 (2023)","DOI":"10.1109\/ASE56229.2023.00177"},{"key":"4_CR10","doi-asserted-by":"crossref","unstructured":"Chen, Y., Yang, X., Dong, H., He, X., Zhang, H., Lin, Q., Chen, J., Zhao, P., Kang, Y., Gao, F., Xu, Z., Zhang, D.: Identifying linked incidents in large-scale online service systems. In: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. p. 304-314. ESEC\/FSE 2020, Association for Computing Machinery, New York, NY, USA (2020)","DOI":"10.1145\/3368089.3409768"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Chen, Y., Yang, X., Lin, Q., Zhang, H., Gao, F., Xu, Z., Dang, Y., Zhang, D., Dong, H., Xu, Y., Li, H., Kang, Y.: Outage prediction and diagnosis for cloud service systems. In: The World Wide Web Conference. p. 2659-2665. ACM, New York, NY, USA (2019)","DOI":"10.1145\/3308558.3313501"},{"key":"4_CR12","doi-asserted-by":"crossref","unstructured":"Chen, Z., Liu, J., Su, Y., Zhang, H., Wen, X., Ling, X., Yang, Y., Lyu, M.R.: Graph-based incident aggregation for large-scale online service systems. In: 2021 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE). pp. 430\u2013442 (2021)","DOI":"10.1109\/ASE51524.2021.9678746"},{"key":"4_CR13","doi-asserted-by":"crossref","unstructured":"Du, M., Li, F.: Spell: Streaming parsing of system event logs. In: 2016 IEEE 16th International Conference on Data Mining (ICDM). pp. 859\u2013864 (2016)","DOI":"10.1109\/ICDM.2016.0103"},{"key":"4_CR14","doi-asserted-by":"crossref","unstructured":"Du, M., Li, F., Zheng, G., Srikumar, V.: Deeplog: Anomaly detection and diagnosis from system logs through deep learning. In: Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security. pp. 1285\u20131298. ACM (2017)","DOI":"10.1145\/3133956.3134015"},{"key":"4_CR15","doi-asserted-by":"crossref","unstructured":"Evans, T.S., Chen, B.: Linking the network centrality measures closeness and degree. Communications Physics 5(1), \u00a0172 (2022)","DOI":"10.1038\/s42005-022-00949-5"},{"key":"4_CR16","doi-asserted-by":"crossref","unstructured":"Freeman, L.C.: A set of measures of centrality based on betweenness. Sociometry pp. 35\u201341 (1977)","DOI":"10.2307\/3033543"},{"key":"4_CR17","doi-asserted-by":"crossref","unstructured":"Freeman, L.C.: Centrality in social networks conceptual clarification. Social Networks 1(3), 215\u2013239 (1978)","DOI":"10.1016\/0378-8733(78)90021-7"},{"key":"4_CR18","unstructured":"Gao, L., Madaan, A., Zhou, S., Alon, U., Liu, P., Yang, Y., Callan, J., Neubig, G.: PAL: Program-aided language models. In: Krause, A., Brunskill, E., Cho, K., Engelhardt, B., Sabato, S., Scarlett, J. (eds.) Proceedings of the 40th International Conference on Machine Learning. Proceedings of Machine Learning Research, vol.\u00a0202, pp. 10764\u201310799. PMLR (23\u201329 Jul 2023)"},{"key":"4_CR19","doi-asserted-by":"crossref","unstructured":"Han, S., Wu, Q., Zhang, H., Qin, B., Hu, J., Shi, X., Liu, L., Yin, X.: Log-based anomaly detection with robust feature extraction and online learning. IEEE Transactions on Information Forensics and Security 16, 2300\u20132311 (2021)","DOI":"10.1109\/TIFS.2021.3053371"},{"key":"4_CR20","doi-asserted-by":"crossref","unstructured":"He, P., Zhu, J., Zheng, Z., Lyu, M.R.: Drain: An online log parsing approach with fixed depth tree. In: 2017 IEEE International Conference on Web Services (ICWS). pp. 33\u201340. IEEE (2017)","DOI":"10.1109\/ICWS.2017.13"},{"key":"4_CR21","doi-asserted-by":"crossref","unstructured":"Hundman, K., Constantinou, V., Laporte, C., Colwell, I., Soderstrom, T.: Detecting spacecraft anomalies using lstms and nonparametric dynamic thresholding. In: Proceedings of the 24th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. p. 387-395. Association for Computing Machinery, New York, NY, USA (2018)","DOI":"10.1145\/3219819.3219845"},{"key":"4_CR22","unstructured":"Inc., M.: Bing (2024), https:\/\/www.bing.com"},{"key":"4_CR23","unstructured":"Inc., O.: Chatgpt (2024), https:\/\/openai.com\/chatgpt"},{"key":"4_CR24","unstructured":"Inc., O.: Gpt-4o (2024), https:\/\/openai.com\/index\/hello-gpt-4o"},{"key":"4_CR25","doi-asserted-by":"crossref","unstructured":"Kang, S., Yoon, J., Yoo, S.: Large language models are few-shot testers: Exploring llm-based general bug reproduction. In: Proceedings of the 45th International Conference on Software Engineering. p. 2312-2323. ICSE \u201923, IEEE Press (2023)","DOI":"10.1109\/ICSE48619.2023.00194"},{"key":"4_CR26","unstructured":"Kojima, T., Gu, S.S., Reid, M., Matsuo, Y., Iwasawa, Y.: Large language models are zero-shot reasoners. In: Koyejo, S., Mohamed, S., Agarwal, A., Belgrave, D., Cho, K., Oh, A. (eds.) Advances in Neural Information Processing Systems. vol.\u00a035, pp. 22199\u201322213. Curran Associates, Inc. (2022)"},{"key":"4_CR27","doi-asserted-by":"crossref","unstructured":"Le, V.H., Zhang, H.: Log parsing with prompt-based few-shot learning. In: 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE). pp. 2438\u20132449 (2023)","DOI":"10.1109\/ICSE48619.2023.00204"},{"key":"4_CR28","unstructured":"Lewis, P., Perez, E., Piktus, A., Petroni, F., Karpukhin, V., Goyal, N., K\u00fcttler, H., Lewis, M., Yih, W.t., Rockt\u00e4schel, T., Riedel, S., Kiela, D.: Retrieval-augmented generation for knowledge-intensive nlp tasks. In: Proceedings of the 34th International Conference on Neural Information Processing Systems. NIPS \u201920, Curran Associates Inc., Red Hook, NY, USA (2020)"},{"key":"4_CR29","doi-asserted-by":"crossref","unstructured":"Lin, D., Raghu, R., Ramamurthy, V., Yu, J., Radhakrishnan, R., Fernandez, J.: Unveiling clusters of events for alert and incident management in large-scale enterprise it. In: Proceedings of the 20th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. p. 1630-1639. ACM, New York, NY, USA (2014)","DOI":"10.1145\/2623330.2623360"},{"key":"4_CR30","doi-asserted-by":"crossref","unstructured":"Lin, Q., Zhang, H., Lou, J.G., Zhang, Y., Chen, X.: Log clustering based problem identification for online service systems. In: Proceedings of the 38th International Conference on Software Engineering Companion. p. 102-111. ACM, New York, NY, USA (2016)","DOI":"10.1145\/2889160.2889232"},{"key":"4_CR31","doi-asserted-by":"crossref","unstructured":"Liu, P., Xu, H., Ouyang, Q., Jiao, R., Chen, Z., Zhang, S., Yang, J., Mo, L., Zeng, J., Xue, W., Pei, D.: Unsupervised detection of microservice trace anomalies through service-level deep bayesian networks. In: IEEE 31st International Symposium on Software Reliability Engineering (ISSRE). pp. 48\u201358. IEEE (2020)","DOI":"10.1109\/ISSRE5003.2020.00014"},{"key":"4_CR32","doi-asserted-by":"crossref","unstructured":"Meng, W., Liu, Y., Zhu, Y., Zhang, S., Pei, D., Liu, Y., Chen, Y., Zhang, R., Tao, S., Sun, P., Zhou, R.: Loganomaly: Unsupervised detection of sequential and quantitative anomalies in unstructured logs. In: Proceedings of the 28th International Joint Conference on Artificial Intelligence. pp. 4739\u20134745. IJCAI Organization (7 2019)","DOI":"10.24963\/ijcai.2019\/658"},{"key":"4_CR33","doi-asserted-by":"crossref","unstructured":"Nedelkoski, S., Cardoso, J., Kao, O.: Anomaly detection and classification using distributed tracing and deep learning. In: 19th IEEE\/ACM International Symposium on Cluster, Cloud and Grid Computing (CCGRID). pp. 241\u2013250. IEEE (2019)","DOI":"10.1109\/CCGRID.2019.00038"},{"key":"4_CR34","doi-asserted-by":"crossref","unstructured":"Negre, C.F., Morzan, U.N., Hendrickson, H.P., Pal, R., Lisi, G.P., Loria, J.P., Rivalta, I., Ho, J., Batista, V.S.: Eigenvector centrality for characterization of protein allosteric pathways. Proceedings of the National Academy of Sciences 115(52), E12201\u2013E12208 (2018)","DOI":"10.1073\/pnas.1810452115"},{"key":"4_CR35","unstructured":"Ouyang, L., Wu, J., Jiang, X., Almeida, D., Wainwright, C.L., Mishkin, P., Zhang, C., Agarwal, S., Slama, K., Ray, A., Schulman, J., Hilton, J., Kelton, F., Miller, L., Simens, M., Askell, A., Welinder, P., Christiano, P., Leike, J., Lowe, R.: Training language models to follow instructions with human feedback (2022)"},{"key":"4_CR36","unstructured":"Rae, J.W., Borgeaud, S., Cai, T., Millican, K., Hoffmann, J., Song, F., Aslanides, J., Henderson, S., Ring, R., Young, S., Rutherford, E., Hennigan, T., Menick, J., Cassirer, A., Powell, R., van\u00a0den Driessche, G., Hendricks, L.A., Rauh, M., Huang, P.S., Glaese, A., Welbl, J., Dathathri, S., Huang, S., Uesato, J., Mellor, J., Higgins, I., Creswell, A., McAleese, N., Wu, A., Elsen, E., Jayakumar, S., Buchatskaya, E., Budden, D., Sutherland, E., Simonyan, K., Paganini, M., Sifre, L., Martens, L., Li, X.L., Kuncoro, A., Nematzadeh, A., Gribovskaya, E., Donato, D., Lazaridou, A., Mensch, A., Lespiau, J.B., Tsimpoukelli, M., Grigorev, N., Fritz, D., Sottiaux, T., Pajarskas, M., Pohlen, T., Gong, Z., Toyama, D., de\u00a0Masson\u00a0d\u2019Autume, C., Li, Y., Terzi, T., Mikulik, V., Babuschkin, I., Clark, A., de\u00a0Las\u00a0Casas, D., Guy, A., Jones, C., Bradbury, J., Johnson, M., Hechtman, B., Weidinger, L., Gabriel, I., Isaac, W., Lockhart, E., Osindero, S., Rimell, L., Dyer, C., Vinyals, O., Ayoub, K., Stanway, J., Bennett, L., Hassabis, D., Kavukcuoglu, K., Irving, G.: Scaling language models: Methods, analysis & insights from training gopher (2021)"},{"key":"4_CR37","doi-asserted-by":"crossref","unstructured":"Ren, H., Xu, B., Wang, Y., Yi, C., Huang, C., Kou, X., Xing, T., Yang, M., Tong, J., Zhang, Q.: Time-series anomaly detection service at microsoft. In: Proceedings of the 25th ACM SIGKDD International Conference on Knowledge Discovery & Data Mining. p. 3009-3017. Association for Computing Machinery, New York, NY, USA (2019)","DOI":"10.1145\/3292500.3330680"},{"key":"4_CR38","unstructured":"Rozi\u00e8re, B., Gehring, J., Gloeckle, F., Sootla, S., Gat, I., Tan, X.E., Adi, Y., Liu, J., Remez, T., Rapin, J., Kozhevnikov, A., Evtimov, I., Bitton, J., Bhatt, M., Ferrer, C.C., Grattafiori, A., Xiong, W., D\u00e9fossez, A., Copet, J., Azhar, F., Touvron, H., Martin, L., Usunier, N., Scialom, T., Synnaeve, G.: Code llama: Open foundation models for code (2023)"},{"key":"4_CR39","unstructured":"Sanh, V., Webson, A., Raffel, C., Bach, S.H., Sutawika, L., Alyafeai, Z., Chaffin, A., Stiegler, A., Scao, T.L., Raja, A., Dey, M., Bari, M.S., Xu, C., Thakker, U., Sharma, S.S., Szczechla, E., Kim, T., Chhablani, G., Nayak, N., Datta, D., Chang, J., Jiang, M.T.J., Wang, H., Manica, M., Shen, S., Yong, Z.X., Pandey, H., Bawden, R., Wang, T., Neeraj, T., Rozen, J., Sharma, A., Santilli, A., Fevry, T., Fries, J.A., Teehan, R., Bers, T., Biderman, S., Gao, L., Wolf, T., Rush, A.M.: Multitask prompted training enables zero-shot task generalization (2021)"},{"key":"4_CR40","unstructured":"Shinn, N., Cassano, F., Labash, B., Gopinath, A., Narasimhan, K., Yao, S.: Reflexion: Language agents with verbal reinforcement learning (2023)"},{"key":"4_CR41","unstructured":"Tang, L., Li, T., Pinel, F., Shwartz, L., Grabarnik, G.: Optimizing system monitoring configurations for non-actionable alerts. In: 2012 IEEE Network Operations and Management Symposium. pp. 34\u201342 (2012)"},{"key":"4_CR42","unstructured":"Taori, R., Gulrajani, I., Zhang, T., Dubois, Y., Li, X., Guestrin, C., Liang, P., Hashimoto, T.B.: Stanford alpaca: An instruction-following llama model. https:\/\/github.com\/tatsu-lab\/stanford_alpaca (2023)"},{"key":"4_CR43","unstructured":"Touvron, H., Lavril, T., Izacard, G., Martinet, X., Lachaux, M.A., Lacroix, T., Rozi\u00e8re, B., Goyal, N., Hambro, E., Azhar, F., Rodriguez, A., Joulin, A., Grave, E., Lample, G.: Llama: Open and efficient foundation language models (2023)"},{"key":"4_CR44","unstructured":"Touvron, H., Martin, L., Stone, K., Albert, P., Almahairi, A., Babaei, Y., Bashlykov, N., Batra, S., Bhargava, P., Bhosale, S., Bikel, D., Blecher, L., Ferrer, C.C., Chen, M., Cucurull, G., Esiobu, D., Fernandes, J., Fu, J., Fu, W., Fuller, B., Gao, C., Goswami, V., Goyal, N., Hartshorn, A., Hosseini, S., Hou, R., Inan, H., Kardas, M., Kerkez, V., Khabsa, M., Kloumann, I., Korenev, A., Koura, P.S., Lachaux, M.A., Lavril, T., Lee, J., Liskovich, D., Lu, Y., Mao, Y., Martinet, X., Mihaylov, T., Mishra, P., Molybog, I., Nie, Y., Poulton, A., Reizenstein, J., Rungta, R., Saladi, K., Schelten, A., Silva, R., Smith, E.M., Subramanian, R., Tan, X.E., Tang, B., Taylor, R., Williams, A., Kuan, J.X., Xu, P., Yan, Z., Zarov, I., Zhang, Y., Fan, A., Kambadur, M., Narang, S., Rodriguez, A., Stojnic, R., Edunov, S., Scialom, T.: Llama 2: Open foundation and fine-tuned chat models (2023)"},{"key":"4_CR45","doi-asserted-by":"crossref","unstructured":"Wang, X., Zhang, X., Li, L., He, S., Zhang, H., Liu, Y., Zheng, L., Kang, Y., Lin, Q., Dang, Y., Rajmohan, S., Zhang, D.: Spine: A scalable log parser with feedback guidance. In: Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. p. 1198-1208. ESEC\/FSE 2022, Association for Computing Machinery, New York, NY, USA (2022)","DOI":"10.1145\/3540250.3549176"},{"key":"4_CR46","unstructured":"Wei, J., Bosma, M., Zhao, V.Y., Guu, K., Yu, A.W., Lester, B., Du, N., Dai, A.M., Le, Q.V.: Finetuned language models are zero-shot learners (2021)"},{"key":"4_CR47","unstructured":"Wei, J., Tay, Y., Bommasani, R., Raffel, C., Zoph, B., Borgeaud, S., Yogatama, D., Bosma, M., Zhou, D., Metzler, D., Chi, E.H., Hashimoto, T., Vinyals, O., Liang, P., Dean, J., Fedus, W.: Emergent abilities of large language models (2022)"},{"key":"4_CR48","unstructured":"Wei, J., Wang, X., Schuurmans, D., Bosma, M., ichter, b., Xia, F., Chi, E., Le, Q.V., Zhou, D.: Chain-of-thought prompting elicits reasoning in large language models. In: Koyejo, S., Mohamed, S., Agarwal, A., Belgrave, D., Cho, K., Oh, A. (eds.) Advances in Neural Information Processing Systems. vol.\u00a035, pp. 24824\u201324837. Curran Associates, Inc. (2022)"},{"key":"4_CR49","doi-asserted-by":"crossref","unstructured":"Yang, L., Chen, J., Wang, Z., Wang, W., Jiang, J., Dong, X., Zhang, W.: Plelog: Semi-supervised log-based anomaly detection via probabilistic label estimation. In: 2021 IEEE\/ACM 43rd International Conference on Software Engineering: Companion Proceedings (ICSE-Companion). pp. 230\u2013231 (2021)","DOI":"10.1109\/ICSE-Companion52605.2021.00106"},{"key":"4_CR50","unstructured":"Yao, S., Yu, D., Zhao, J., Shafran, I., Griffiths, T.L., Cao, Y., Narasimhan, K.: Tree of thoughts: Deliberate problem solving with large language models (2023)"},{"key":"4_CR51","doi-asserted-by":"crossref","unstructured":"Zhang, X., Xu, Y., Lin, Q., Qiao, B., Zhang, H., Dang, Y., Xie, C., Yang, X., Cheng, Q., Li, Z., Chen, J., He, X., Yao, R., Lou, J.G., Chintalapati, M., Shen, F., Zhang, D.: Robust log-based anomaly detection on unstable log data. In: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. p. 807-817. ACM, New York, NY, USA (2019)","DOI":"10.1145\/3338906.3338931"},{"key":"4_CR52","doi-asserted-by":"crossref","unstructured":"Zhao, N., Chen, J., Peng, X., Wang, H., Wu, X., Zhang, Y., Chen, Z., Zheng, X., Nie, X., Wang, G., Wu, Y., Zhou, F., Zhang, W., Sui, K., Pei, D.: Understanding and handling alert storm for online service systems. In: Proceedings of the ACM\/IEEE 42nd International Conference on Software Engineering: Software Engineering in Practice. p. 162-171. ACM, New York, NY, USA (2020)","DOI":"10.1145\/3377813.3381363"},{"key":"4_CR53","doi-asserted-by":"crossref","unstructured":"Zhao, N., Chen, J., Wang, Z., Peng, X., Wang, G., Wu, Y., Zhou, F., Feng, Z., Nie, X., Zhang, W., Sui, K., Pei, D.: Real-time incident prediction for online service systems. In: Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. p. 315-326. ACM, New York, NY, USA (2020)","DOI":"10.1145\/3368089.3409672"},{"key":"4_CR54","doi-asserted-by":"crossref","unstructured":"Zhao, N., Jin, P., Wang, L., Yang, X., Liu, R., Zhang, W., Sui, K., Pei, D.: Automatically and adaptively identifying severe alerts for online service systems. In: IEEE Conference on Computer Communications. pp. 2420\u20132429. IEEE (2020)","DOI":"10.1109\/INFOCOM41043.2020.9155219"},{"key":"4_CR55","unstructured":"Zhao, W.X., Zhou, K., Li, J., Tang, T., Wang, X., Hou, Y., Min, Y., Zhang, B., Zhang, J., Dong, Z., Du, Y., Yang, C., Chen, Y., Chen, Z., Jiang, J., Ren, R., Li, Y., Tang, X., Liu, Z., Liu, P., Nie, J.Y., Wen, J.R.: A survey of large language models (2023)"},{"key":"4_CR56","unstructured":"Zheng, L., Chiang, W.L., Sheng, Y., Zhuang, S., Wu, Z., Zhuang, Y., Lin, Z., Li, Z., Li, D., Xing, E.P., Zhang, H., Gonzalez, J.E., Stoica, I.: Judging llm-as-a-judge with mt-bench and chatbot arena (2023)"},{"key":"4_CR57","doi-asserted-by":"crossref","unstructured":"Zhou, B., Liu, S., Hooi, B., Cheng, X., Ye, J.: Beatgan: Anomalous rhythm detection using adversarially generated time series. In: Proceedings of the Twenty-Eighth International Joint Conference on Artificial Intelligence, IJCAI-19. pp. 4433\u20134439. International Joint Conferences on Artificial Intelligence Organization (7 2019)","DOI":"10.24963\/ijcai.2019\/616"},{"key":"4_CR58","doi-asserted-by":"crossref","unstructured":"Zhou, X., Peng, X., Xie, T., Sun, J., Ji, C., Liu, D., Xiang, Q., He, C.: Latent error prediction and fault localization for microservice applications by learning from system trace logs. In: Proceedings of the 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. p. 683-694. ACM, New York, NY, USA (2019)","DOI":"10.1145\/3338906.3338961"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-90900-9_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T04:45:15Z","timestamp":1745988315000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-90900-9_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9783031908996","9783031909009"],"references-count":58,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-90900-9_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"1 May 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FASE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Fundamental Approaches to Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hamilton, ON","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Canada","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 May 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8 May 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"28","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fase2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/etaps.org\/2025\/conferences\/fase\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}