{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T15:43:41Z","timestamp":1772120621789,"version":"3.50.1"},"reference-count":21,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010,6]]},"DOI":"10.1109\/dsn.2010.5544921","type":"proceedings-article","created":{"date-parts":[[2010,8,10]],"date-time":"2010-08-10T20:44:07Z","timestamp":1281473047000},"page":"191-200","source":"Crossref","is-referenced-by-count":45,"title":["Using correlated surprise to infer shared influence"],"prefix":"10.1109","author":[{"given":"Adam J.","family":"Oliner","sequence":"first","affiliation":[]},{"given":"Ashutosh V.","family":"Kulkarni","sequence":"additional","affiliation":[]},{"given":"Alex","family":"Aiken","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095821"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1080173.1080178"},{"key":"ref12","first-page":"57","article-title":"IP fault localization via risk modeling","author":"kompella","year":"2005","journal-title":"NSDI"},{"key":"ref13","first-page":"340","article-title":"The Kullback-Leibler distance","volume":"41","author":"kullback","year":"1987","journal-title":"The American Statistician"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/rob.20258"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2008.132"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2007.103"},{"key":"ref17","article-title":"Pip: Detecting the unexpected in distributed systems","author":"reynolds","year":"2006","journal-title":"NSDI"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135830"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2004.1317650"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/200912.200913"},{"key":"ref3","article-title":"Using Magpie for request extraction and workload modelling","author":"barham","year":"2004","journal-title":"OSDI"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/INM.2001.918054"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.3990\/2.9"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2002.1029005"},{"key":"ref7","article-title":"Path-based failure and evolution management","author":"chen","year":"2004","journal-title":"NSDI"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1282380.1282383"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945454"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SCAC.1995.523649"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1926.10502161"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/rob.20147"}],"event":{"name":"Networks (DSN)","location":"Chicago, IL, USA","start":{"date-parts":[[2010,6,28]]},"end":{"date-parts":[[2010,7,1]]}},"container-title":["2010 IEEE\/IFIP International Conference on Dependable Systems &amp; Networks (DSN)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5532324\/5544245\/05544921.pdf?arnumber=5544921","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,18]],"date-time":"2017-03-18T22:19:27Z","timestamp":1489875567000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5544921\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,6]]},"references-count":21,"URL":"https:\/\/doi.org\/10.1109\/dsn.2010.5544921","relation":{},"subject":[],"published":{"date-parts":[[2010,6]]}}}