{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:45:05Z","timestamp":1772163905268,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":33,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,4,18]]},"DOI":"10.1145\/1217935.1217972","type":"proceedings-article","created":{"date-parts":[[2007,4,5]],"date-time":"2007-04-05T15:41:00Z","timestamp":1175787660000},"page":"375-388","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":66,"title":["Automated known problem diagnosis with event traces"],"prefix":"10.1145","author":[{"given":"Chun","family":"Yuan","sequence":"first","affiliation":[{"name":"Microsoft Research Asia, Sigma Center, Beijing, China"}]},{"given":"Ni","family":"Lao","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"given":"Ji-Rong","family":"Wen","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia, Sigma Center, Beijing, China"}]},{"given":"Jiwei","family":"Li","sequence":"additional","affiliation":[{"name":"University of Science and Technology of China, Anhui, China"}]},{"given":"Zheng","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia, Sigma Center, Beijing, China"}]},{"given":"Yi-Min","family":"Wang","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA"}]},{"given":"Wei-Ying","family":"Ma","sequence":"additional","affiliation":[{"name":"Microsoft Research Asia, Sigma Center, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2006,4,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945454"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1754701.1754705"},{"key":"e_1_3_2_1_3_1","unstructured":"AutoMate. http:\/\/www.unisyn.com\/automate\/  AutoMate. http:\/\/www.unisyn.com\/automate\/"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/604131.604140"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1267724.1267748"},{"key":"e_1_3_2_1_6_1","volume-title":"Using Magpie for Request Extraction and Workload Modelling. 6th Symposium on Operating System Design and Implementation (OSDI)","author":"Barham P.","year":"2004","unstructured":"P. Barham , A. Donnelly , R. Isaacs , and R. Mortier . Using Magpie for Request Extraction and Workload Modelling. 6th Symposium on Operating System Design and Implementation (OSDI) , December , 2004 P. Barham, A. Donnelly, R. Isaacs, and R. Mortier. Using Magpie for Request Extraction and Workload Modelling. 6th Symposium on Operating System Design and Implementation (OSDI), December, 2004"},{"key":"e_1_3_2_1_7_1","volume-title":"Magpie: Online Modelling and Performance-aware Systems. 9th Workshop on Hot Topics in Operating Systems","author":"Barham P.","year":"2003","unstructured":"P. Barham , R. Isaacs , R. Mortier , and D. Narayanan . Magpie: Online Modelling and Performance-aware Systems. 9th Workshop on Hot Topics in Operating Systems , 2003 P. Barham, R. Isaacs, R. Mortier, and D. Narayanan. Magpie: Online Modelling and Performance-aware Systems. 9th Workshop on Hot Topics in Operating Systems, 2003"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the Third Annual Symposium on Document Analysis and Information Retrieval","author":"Cavnar W. B.","year":"1994","unstructured":"W. B. Cavnar and J. M. Trenkle . N-gram Based Text Categorization , Proceedings of the Third Annual Symposium on Document Analysis and Information Retrieval , April 1994 W. B. Cavnar and J. M. Trenkle. N-gram Based Text Categorization, Proceedings of the Third Annual Symposium on Document Analysis and Information Retrieval, April 1994"},{"key":"e_1_3_2_1_9_1","volume-title":"LIBSVM: a library for support vector machines","author":"Chang C.-C.","year":"2002","unstructured":"C.-C. Chang and C.-J. Lin . LIBSVM: a library for support vector machines . September 2002 . Available at http:\/\/www.csie.ntu.edu.tw\/~cjlin\/papers\/libsvm.pdf C.-C. Chang and C.-J. Lin. LIBSVM: a library for support vector machines. September 2002. Available at http:\/\/www.csie.ntu.edu.tw\/~cjlin\/papers\/libsvm.pdf"},{"key":"e_1_3_2_1_10_1","volume-title":"Path-based Failure and Evolution Management. USENIX\/ACM Symposium on Networked Systems Design and Implementation","author":"Chen M.","year":"2004","unstructured":"M. Chen , A. Accardi , E. Kiciman , A. Fox , D. Patterson , and E. Brewer . Path-based Failure and Evolution Management. USENIX\/ACM Symposium on Networked Systems Design and Implementation , San Francisco, CA , March 2004 M. Chen, A. Accardi, E. Kiciman, A. Fox, D. Patterson, and E. Brewer. Path-based Failure and Evolution Management. USENIX\/ACM Symposium on Networked Systems Design and Implementation, San Francisco, CA, March 2004"},{"key":"e_1_3_2_1_11_1","volume-title":"Dynamic Systems. International Conference on Dependable Systems and Networks, IPDS track","author":"Chen M.","year":"2002","unstructured":"M. Chen , E. Kiciman , E. Fratkin , A. Fox , and E. Brewer . Pinpoint: Problem Determination in Large , Dynamic Systems. International Conference on Dependable Systems and Networks, IPDS track , Washington, DC , June 2002 M. Chen, E. Kiciman, E. Fratkin, A. Fox, and E. Brewer. Pinpoint: Problem Determination in Large, Dynamic Systems. International Conference on Dependable Systems and Networks, IPDS track, Washington, DC, June 2002"},{"key":"e_1_3_2_1_12_1","volume-title":"6th Symposium on Operating Systems Design and Implementation (OSDI '04)","author":"Cohen I.","year":"2004","unstructured":"I. Cohen , J. Chase , M. Goldszmidt , T. Kelly , and J. Symons . Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control . 6th Symposium on Operating Systems Design and Implementation (OSDI '04) , December 2004 I. Cohen, J. Chase, M. Goldszmidt, T. Kelly, and J. Symons. Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control. 6th Symposium on Operating Systems Design and Implementation (OSDI '04), December 2004"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095821"},{"key":"e_1_3_2_1_14_1","first-page":"572","volume-title":"Error-correcting output codes: a general method for improving multiclass inductive learning programs, in the proceedings of AAAI-91","author":"Dietterich T. G.","year":"1991","unstructured":"T. G. Dietterich and G. Bakiri . Error-correcting output codes: a general method for improving multiclass inductive learning programs, in the proceedings of AAAI-91 , pages 572 -- 577 . AAAI press\/MIT press , 1991 T. G. Dietterich and G. Bakiri. Error-correcting output codes: a general method for improving multiclass inductive learning programs, in the proceedings of AAAI-91, pages 572--577. AAAI press\/MIT press, 1991"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511574931","volume-title":"Algorithms on Strings, Trees and Sequences: Computer Science and Computational Biology","author":"Gusfield D.","year":"1997","unstructured":"D. Gusfield . Algorithms on Strings, Trees and Sequences: Computer Science and Computational Biology . Cambridge University Press , January 1997 D. Gusfield. Algorithms on Strings, Trees and Sequences: Computer Science and Computational Biology. Cambridge University Press, January 1997"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1298081.1298084"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2003.1160055"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the Seventh USENIX Security Symposium","author":"Lee W.","year":"1998","unstructured":"W. Lee and S. Stolfo . Data Mining Approaches for Intrusion Detection . In Proceedings of the Seventh USENIX Security Symposium , San Antonio, TX , January 1998 W. Lee and S. Stolfo. Data Mining Approaches for Intrusion Detection. In Proceedings of the Seventh USENIX Security Symposium, San Antonio, TX, January 1998"},{"key":"e_1_3_2_1_19_1","article-title":"The VTrace Tool: Building a System Tracer for Windows NT and Windows 2000","author":"Lorch J. R.","year":"2000","unstructured":"J. R. Lorch and A. J. Smith . The VTrace Tool: Building a System Tracer for Windows NT and Windows 2000 . MSDN Magazine , October 2000 J. R. Lorch and A. J. Smith. The VTrace Tool: Building a System Tracer for Windows NT and Windows 2000. MSDN Magazine, October 2000","journal-title":"MSDN Magazine"},{"key":"e_1_3_2_1_20_1","volume-title":"9th Workshop on Hot Topics in Operating Systems (HotOS IX)","author":"Redstone J. A.","year":"2003","unstructured":"J. A. Redstone , M. M. Swift , and B. N. Bershad . Using Computers to Diagnose Computer Problems . 9th Workshop on Hot Topics in Operating Systems (HotOS IX) , Lihue, Hawaii , May 2003 J. A. Redstone, M. M. Swift, and B. N. Bershad. Using Computers to Diagnose Computer Problems. 9th Workshop on Hot Topics in Operating Systems (HotOS IX), Lihue, Hawaii, May 2003"},{"key":"e_1_3_2_1_21_1","volume-title":"Fault Localization with Nearest Neighbor Queries. ASE 2003","author":"Renieris M.","unstructured":"M. Renieris and S. Reiss . Fault Localization with Nearest Neighbor Queries. ASE 2003 M. Renieris and S. Reiss. Fault Localization with Nearest Neighbor Queries. ASE 2003"},{"key":"e_1_3_2_1_22_1","author":"Russinovich M.","year":"1997","unstructured":"M. Russinovich and B. Cogswell . Windows NT System Call Hooking. Dr. Dobb's Journal , January 1997 M. Russinovich and B. Cogswell. Windows NT System Call Hooking. Dr. Dobb's Journal, January 1997","journal-title":"Windows NT System Call Hooking. Dr. Dobb's Journal"},{"key":"e_1_3_2_1_23_1","volume-title":"Inside Microsoft Windows","author":"Solomon D. A.","year":"2000","unstructured":"D. A. Solomon and M. E. Russinovich . Inside Microsoft Windows 2000 , 3 rd Edition. Microsoft Press , September 2000 D. A. Solomon and M. E. Russinovich. Inside Microsoft Windows 2000, 3rd Edition. Microsoft Press, September 2000","edition":"3"},{"key":"e_1_3_2_1_24_1","first-page":"2","article-title":"A Survey of Fault Localization Techniques in Computer Networks. Science of Computer Programming","volume":"53","author":"Steinder M.","year":"2004","unstructured":"M. Steinder and A. S. Sethi . A Survey of Fault Localization Techniques in Computer Networks. Science of Computer Programming , Special Edition on Topics in System Administration Vol. 53 , 2 ( Nov. 2004 ), pp. 165--194 M. Steinder and A. S. Sethi. A Survey of Fault Localization Techniques in Computer Networks. Science of Computer Programming, Special Edition on Topics in System Administration Vol. 53, 2 (Nov. 2004), pp. 165--194","journal-title":"Special Edition on Topics in System Administration"},{"key":"e_1_3_2_1_25_1","unstructured":"Strace for NT. http:\/\/www.bindview.com\/Services\/RAZOR\/Utilities\/Windows\/strace_readme.cfm  Strace for NT. http:\/\/www.bindview.com\/Services\/RAZOR\/Utilities\/Windows\/strace_readme.cfm"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.1979.4766902"},{"key":"e_1_3_2_1_27_1","first-page":"831","volume-title":"Advances in Neural Information Processing Systems 3","author":"Vapnik V.","year":"1992","unstructured":"V. Vapnik . Principles of risk minimization for learning theory . In D. S. Lippman, J. E. Moody, and D. S. Touretzky, editors, Advances in Neural Information Processing Systems 3 , pp. 831 -- 838 . Morgan Kaufmann , 1992 V. Vapnik. Principles of risk minimization for learning theory. In D. S. Lippman, J. E. Moody, and D. S. Touretzky, editors, Advances in Neural Information Processing Systems 3, pp. 831--838. Morgan Kaufmann, 1992"},{"key":"e_1_3_2_1_28_1","first-page":"159","volume-title":"Proc. Usenix LISA","author":"Wang Y.-M.","year":"2003","unstructured":"Y.-M. Wang , C. Verbowski , J. Dunagan , Y. Chen , H. J. Wang , C. Yuan , and Z. Zhang . STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support . Proc. Usenix LISA , pp. 159 -- 172 , Oct. 2003 Y.-M. Wang, C. Verbowski, J. Dunagan, Y. Chen, H. J. Wang, C. Yuan, and Z. Zhang. STRIDER: A Black-box, State-based Approach to Change and Configuration Management and Support. Proc. Usenix LISA, pp. 159--172, Oct. 2003"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/SECPRI.1999.766910"},{"key":"e_1_3_2_1_30_1","volume-title":"6th Symposium on Operating System Design and Implementation (OSDI)","author":"Whitaker A.","year":"2004","unstructured":"A. Whitaker , R. S. Cox , and S. D. Gribble . Configuration Debugging as Search: Finding the Needle in the Haystack . 6th Symposium on Operating System Design and Implementation (OSDI) , December , 2004 A. Whitaker, R. S. Cox, and S. D. Gribble. Configuration Debugging as Search: Finding the Needle in the Haystack. 6th Symposium on Operating System Design and Implementation (OSDI), December, 2004"},{"key":"e_1_3_2_1_31_1","unstructured":"Windows XP System Restore. http:\/\/msdn.microsoft.com\/library\/default.asp?url=\/library\/enus\/dnwxp\/html\/windowsxpsystemrestore.asp  Windows XP System Restore. http:\/\/msdn.microsoft.com\/library\/default.asp?url=\/library\/enus\/dnwxp\/html\/windowsxpsystemrestore.asp"},{"key":"e_1_3_2_1_32_1","unstructured":"WPP Software Tracing. http:\/\/www.microsoft.com\/whdc\/devtools\/tools\/EventTracing. mspx  WPP Software Tracing. http:\/\/www.microsoft.com\/whdc\/devtools\/tools\/EventTracing. mspx"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/35.492975"}],"event":{"name":"EUROSYS06: Eurosys 2006 Conference","location":"Leuven Belgium","acronym":"EUROSYS06","sponsor":["SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 1st ACM SIGOPS\/EuroSys European Conference on Computer Systems 2006"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1217935.1217972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T07:29:05Z","timestamp":1693812545000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1217935.1217972"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,4,18]]},"references-count":33,"alternative-id":["10.1145\/1217935.1217972","10.1145\/1217935"],"URL":"https:\/\/doi.org\/10.1145\/1217935.1217972","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1218063.1217972","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2006,4,18]]},"assertion":[{"value":"2006-04-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}