{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:12:12Z","timestamp":1773375132097,"version":"3.50.1"},"reference-count":37,"publisher":"Springer Science and Business Media LLC","issue":"12","license":[{"start":{"date-parts":[[2012,12,1]],"date-time":"2012-12-01T00:00:00Z","timestamp":1354320000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2012,12]]},"DOI":"10.1007\/s11432-012-4747-8","type":"journal-article","created":{"date-parts":[[2012,12,28]],"date-time":"2012-12-28T07:46:59Z","timestamp":1356680819000},"page":"2757-2773","source":"Crossref","is-referenced-by-count":13,"title":["Localizing root causes of performance anomalies in cloud computing systems by analyzing request trace logs"],"prefix":"10.1007","volume":"55","author":[{"given":"HaiBo","family":"Mi","sequence":"first","affiliation":[]},{"given":"HuaiMin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"YangFan","family":"Zhou","sequence":"additional","affiliation":[]},{"given":"Michael R.","family":"Lyu","sequence":"additional","affiliation":[]},{"given":"Hua","family":"Cai","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2012,12,29]]},"reference":[{"key":"4747_CR1","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1016\/j.future.2011.08.005","volume":"29","author":"X. Lu","year":"2013","unstructured":"Lu X, Wang H, Wang J, et al. Internet-based virtual computing environment: beyond the data center as a computer. Futur Gener Comp Syst, 2013, 29: 309\u2013322","journal-title":"Futur Gener Comp Syst"},{"key":"4747_CR2","doi-asserted-by":"crossref","unstructured":"Han S, Dang Y, Ge S, et al. Performance debugging in the large via mining millions of stack traces. In: Proceedings of the 34th International Conference on Software Engineering, Zurich, 2012. 176\u2013186","DOI":"10.1109\/ICSE.2012.6227198"},{"key":"4747_CR3","unstructured":"Chilimbi T, Liblit B, Mehra K, et al. Holmes: Effective statistical debugging via efficient path profiling. In: 31st IEEE International Conference on Software Engineering, Vancouver, 2009. 34\u201344"},{"key":"4747_CR4","doi-asserted-by":"crossref","first-page":"17","DOI":"10.1145\/1882291.1882297","volume-title":"Proceedings of the Eighteenth ACM SIGSOFT International Symposium on Foundations of Software Engineering","author":"C. Killian","year":"2010","unstructured":"Killian C, Nagaraj K, Pervez S, et al. Finding latent performance bugs in systems implementations. In: Proceedings of the Eighteenth ACM SIGSOFT International Symposium on Foundations of Software Engineering. New York: ACM, 2010. 17\u201326"},{"key":"4747_CR5","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1109\/TPDS.2009.52","volume":"21","author":"Z. Lan","year":"2010","unstructured":"Lan Z, Zheng Z, Li Y. Toward automated anomaly identification in large-scale systems. IEEE Trans Parallel Distrib Syst, 2010, 21: 174\u2013187","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"4747_CR6","doi-asserted-by":"crossref","unstructured":"Malik H, Adams B, Hassan A. Pinpointing the subsystems responsible for the performance deviations in a load test. In: Proceedings of 21st IEEE International Symposium on Software Reliability Engineering, San Jose, 2010. 201\u2013210","DOI":"10.1109\/ISSRE.2010.43"},{"key":"4747_CR7","unstructured":"Reynolds P, Killian C, Wiener J, et al. Pip: Detecting the unexpected in distributed systems. In: Symposium on Networked Systems Design and Implementation, San Jose, 2006, 115\u2013128"},{"key":"4747_CR8","first-page":"43","volume-title":"Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation","author":"R. Sambasivan","year":"2011","unstructured":"Sambasivan R, Zheng A, De Rosa M, et al. Diagnosing performance changes by comparing request flows. In: Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation. Berkeley: USENIX Association, 2011. 43\u201356"},{"key":"4747_CR9","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1145\/2254064.2254075","volume-title":"The 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation","author":"G. Jin","year":"2012","unstructured":"Jin G, Song L, Shi X, et al. Understanding and detecting real-world performance bugs. In: The 33rd ACM SIGPLAN Conference on Programming Language Design and Implementation. New York: ACM, 2012. 77\u201388"},{"key":"4747_CR10","doi-asserted-by":"crossref","first-page":"253","DOI":"10.1145\/1384529.1375486","volume":"36","author":"E. Thereska","year":"2008","unstructured":"Thereska E, Ganger G. Ironmodel: Robust performance models in the wild. ACM SIGMETRICS Perform Eval Rev, 2008, 36: 253\u2013264","journal-title":"ACM SIGMETRICS Perform Eval Rev"},{"key":"4747_CR11","doi-asserted-by":"crossref","unstructured":"Mi H B, Wang H M, Yin G, et al. Performance problems diagnosis in cloud computing systems via analyzing request trace logs. In: The 13th International Conference on Network Operations and Management Symposium (NOMS), Maui, 2012. 893\u2013899","DOI":"10.1109\/NOMS.2012.6212005"},{"key":"4747_CR12","volume-title":"Principal Component Analysis","author":"I. Jolliffe","year":"2002","unstructured":"Jolliffe I. Principal Component Analysis, 2nd ed. New York: Springer, 2002","edition":"2nd ed"},{"key":"4747_CR13","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1214\/09-SS051","volume":"4","author":"M. Fay","year":"2010","unstructured":"Fay M, Proschan M. Wilcoxon-Mann-Whitney or t-test on assumptions for hypothesis tests and multiple interpretations of decision rules. Stat Surv, 2010, 4: 1\u201339","journal-title":"Stat Surv"},{"key":"4747_CR14","first-page":"268","volume-title":"Proceedings of the 16th European Conference on Machine Learning","author":"P. Melville","year":"2005","unstructured":"Melville P, Yang S, Saar-Tsechansky M, et al. Active learning for probability estimation using jensen-shannon divergence. In: Proceedings of the 16th European Conference on Machine Learning. Berlin\/Heidelberg: Springer-Verlag, 2005. 268\u2013279"},{"key":"4747_CR15","unstructured":"Sigelman B, Barroso L, Burrows M, et al. Dapper, a large-scale distributed systems tracing infrastructure. Technical Report dapper-2010-1, Google, 2010"},{"key":"4747_CR16","unstructured":"Park I, Buch R. Event tracing-improve debugging and performance tuning with ETW. MSDN Mag, 2007. 81\u201392"},{"key":"4747_CR17","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1145\/1140103.1140280","volume":"34","author":"E. Thereska","year":"2006","unstructured":"Thereska E, Salmon B, Strunk J, et al. Stardust: tracking activity in a distributed storage system. ACM SIGMETRICS Perform Eval Rev, 2006, 34: 3\u201314","journal-title":"ACM SIGMETRICS Perform Eval Rev"},{"key":"4747_CR18","first-page":"1","volume":"99","author":"B. Sang","year":"2010","unstructured":"Sang B, Zhan J, Lu G, et al. Precise, scalable, and online request tracing for multi-tier services of black boxes. IEEE Trans Parallel Distrib Syst, 2010, 99: 1\u201316","journal-title":"IEEE Trans Parallel Distrib Syst"},{"key":"4747_CR19","first-page":"19","volume-title":"Proceedings of the 2009 Conference on USENIX Annual Technical Conference","author":"B. Tak","year":"2009","unstructured":"Tak B, Tang C, Zhang C, et al. Vpath: precise discovery of request processing paths from black-box observations of thread and network activities. In: Proceedings of the 2009 Conference on USENIX Annual Technical Conference. Berkeley: USENIX Association, 2009. 19\u201332"},{"key":"4747_CR20","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1145\/1357010.1352613","volume":"42","author":"E. Koskinen","year":"2008","unstructured":"Koskinen E, Jannotti J. Borderpatrol: isolating events for black-box tracing. ACM SIGOPS Operat Syst Rev, 2008, 42: 191\u2013203","journal-title":"ACM SIGOPS Operat Syst Rev"},{"key":"4747_CR21","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1145\/1135777.1135830","volume-title":"Proceedings of the 15th International Conference on World Wide Web","author":"P. Reynolds","year":"2006","unstructured":"Reynolds P, Wiener J, Mogul J, et al. Wap5: black-box performance debugging for wide-area systems. In: Proceedings of the 15th International Conference on World Wide Web. New York: ACM, 2006. 347\u2013356"},{"key":"4747_CR22","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1145\/1165389.945454","volume":"37","author":"M. Aguilera","year":"2003","unstructured":"Aguilera M, Mogul J, Wiener J, et al. Performance debugging for distributed systems of black boxes. ACM SIGOPS Operat Syst Rev, 2003, 37: 74\u201389","journal-title":"ACM SIGOPS Operat Syst Rev"},{"key":"4747_CR23","unstructured":"Chen M, Kiciman E, Fratkin E, et al. Pinpoint: Problem determination in large, dynamic internet services. In: Proceedings of 32nd IEEE International Conference on Dependable Systems and Networks, Bethesda, 2002. 595\u2013604"},{"key":"4747_CR24","first-page":"23","volume-title":"Proceedings of the 1st Conference on Symposium on Networked Systems Design and Implementation, Vol. 1","author":"M. Chen","year":"2004","unstructured":"Chen M, Accardi A, Kiciman E, et al. Path-based faliure and evolution management. In: Proceedings of the 1st Conference on Symposium on Networked Systems Design and Implementation, Vol. 1. Berkeley: USENIX Association, 2004. 23\u201336"},{"key":"4747_CR25","first-page":"259","volume-title":"Proceedings of the 6th Conference on Symposium on Opearting Systems Design and Implementation","author":"P. Barham","year":"2004","unstructured":"Barham P, Donnelly A, Isaacs R, et al. Using Magpie for request extraction and workload modelling. In: Proceedings of the 6th Conference on Symposium on Opearting Systems Design and Implementation. Berkeley: USENIX Association, 2004. 259\u2013272"},{"key":"4747_CR26","first-page":"20","volume-title":"Proceedings of the 4th USENIX Conference on Networked Systems Design and Implementation","author":"R. Fonseca","year":"2007","unstructured":"Fonseca R, Porter G, Katz R, et al. X-trace: A pervasive network tracing framework. In: Proceedings of the 4th USENIX Conference on Networked Systems Design and Implementation. Berkeley: USENIX Association, 2007. 20\u201333"},{"key":"4747_CR27","unstructured":"Mi H, Wang H, Yin G, et al. Magnifier: Online detection of performance problems in large-scale cloud computing systems. In: Proceedings of 8th IEEE International Conference on Services Computing, Washington DC, 2011. 418\u2013425"},{"key":"4747_CR28","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1145\/1998582.1998605","volume-title":"Proceedings of the 8th ACM International Conference on Autonomic Computing","author":"C. Wang","year":"2011","unstructured":"Wang C, Schwan K, Talwar V, et al. A flexible architecture integrating monitoring and analytics for managing largescale data centers. In: Proceedings of the 8th ACM International Conference on Autonomic Computing. New York: ACM, 2011. 141\u2013150"},{"key":"4747_CR29","doi-asserted-by":"crossref","unstructured":"Wang C, Viswanathan K, Choudur L, et al. Statistical techniques for online anomaly detection in data centers. In: Proceedings of the 12th IFIP\/IEEE International Symposium on Integrated Network Management, Dublin, 2011. 385\u2013392","DOI":"10.1109\/INM.2011.5990537"},{"key":"4747_CR30","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1145\/1755913.1755926","volume-title":"Proceedings of the 5th European Conference on Computer Systems","author":"P. Bodik","year":"2010","unstructured":"Bodik P, Goldszmidt M, Fox A, et al. Fingerprinting the datacenter: automated classification of performance crises. In: Proceedings of the 5th European Conference on Computer Systems. New York: ACM, 2010. 111\u2013124"},{"key":"4747_CR31","doi-asserted-by":"crossref","unstructured":"Wang C, Talwar V, Schwan K, et al. Online detection of utility cloud anomalies using metric distributions. In: Proceedings of the IEEE Network Operations and Management Symposium, Osaka, 2010. 96\u2013103","DOI":"10.1109\/NOMS.2010.5488443"},{"key":"4747_CR32","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1145\/1030194.1015492","volume":"34","author":"A. Lakhina","year":"2004","unstructured":"Lakhina A, Crovella M, Diot C. Diagnosing network-wide traffic anomalies. ACM SIGCOMM Comput Commun Rev, 2004, 34: 219\u2013230","journal-title":"ACM SIGCOMM Comput Commun Rev"},{"key":"4747_CR33","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/1629575.1629587","volume-title":"Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles","author":"W. Xu","year":"2009","unstructured":"Xu W, Huang L, Fox A, et al. Detecting large-scale system problems by mining console logs. In: Proceedings of the ACM SIGOPS 22nd Symposium on Operating Systems Principles. New York: ACM, 2009. 117\u2013132"},{"key":"4747_CR34","doi-asserted-by":"crossref","unstructured":"Oliner A, Aiken A. Online detection of multi-component interactions in production systems. In: 41st IEEE\/IFIP International Conference on Dependable Systems & Networks (DSN), Hong Kong, 2011. 49\u201360","DOI":"10.1109\/DSN.2011.5958206"},{"key":"4747_CR35","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1145\/1269899.1254895","volume":"35","author":"H. Ringberg","year":"2007","unstructured":"Ringberg H, Soule A, Rexford J, et al. Sensitivity of PCA for traffic anomaly detection. ACM SIGMETRICS Perform Eval Rev, 2007, 35: 109\u2013120","journal-title":"ACM SIGMETRICS Perform Eval Rev"},{"key":"4747_CR36","doi-asserted-by":"crossref","first-page":"67","DOI":"10.1002\/(SICI)1099-095X(199901\/02)10:1<67::AID-ENV336>3.0.CO;2-0","volume":"10","author":"J. King","year":"1999","unstructured":"King J, Jackson D. Variable selection in large environmental data sets using principal components analysis. Environmetrics, 1999, 10: 67\u201377","journal-title":"Environmetrics"},{"key":"4747_CR37","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/1165389.945450","volume":"37","author":"S. Ghemawat","year":"2003","unstructured":"Ghemawat S, Gobioff H, Leung S. The Google file system. ACM SIGOPS Operat Syst Rev, 2003, 37: 29\u201343","journal-title":"ACM SIGOPS Operat Syst Rev"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-012-4747-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-012-4747-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-012-4747-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,29]],"date-time":"2025-04-29T15:17:48Z","timestamp":1745939868000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-012-4747-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,12]]},"references-count":37,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2012,12]]}},"alternative-id":["4747"],"URL":"https:\/\/doi.org\/10.1007\/s11432-012-4747-8","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2012,12]]}}}