{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T01:45:20Z","timestamp":1775094320804,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,6,17]],"date-time":"2013-06-17T00:00:00Z","timestamp":1371427200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,6,17]]},"DOI":"10.1145\/2465529.2465753","type":"proceedings-article","created":{"date-parts":[[2013,6,18]],"date-time":"2013-06-18T08:36:08Z","timestamp":1371544568000},"page":"93-104","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":38,"title":["Root cause detection in a service-oriented architecture"],"prefix":"10.1145","author":[{"given":"Myunghwan","family":"Kim","sequence":"first","affiliation":[{"name":"Stanford University, Stanford, USA"}]},{"given":"Roshan","family":"Sumbaly","sequence":"additional","affiliation":[{"name":"LinkedIn Corporation, Mountain View, USA"}]},{"given":"Sam","family":"Shah","sequence":"additional","affiliation":[{"name":"LinkedIn Corporation, Mountain View, USA"}]}],"member":"320","published-online":{"date-parts":[[2013,6,17]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"SysML","author":"Ahmed T.","year":"2007","unstructured":"T. Ahmed , B. Oreshkin , and M. Coates . Machine Learning Approaches to Network Anomaly Detection . In SysML , 2007 . T. Ahmed, B. Oreshkin, and M. Coates. Machine Learning Approaches to Network Anomaly Detection. In SysML, 2007."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISM.2010.28"},{"key":"e_1_3_2_1_3_1","volume-title":"Detection of Abrupt Changes - Theory and Application","author":"Basseville M.","year":"1993","unstructured":"M. Basseville and I. V. Nikiforov . Detection of Abrupt Changes - Theory and Application . Prentice-Hall , 1993 . M. Basseville and I. V. Nikiforov. Detection of Abrupt Changes - Theory and Application. Prentice-Hall, 1993."},{"issue":"2","key":"e_1_3_2_1_4_1","first-page":"523","volume":"42","author":"Bouloutas A. T.","year":"1994","unstructured":"A. T. Bouloutas , S. Calo , and A. Finkel . Alarm Correlation and Fault Identification in Communication Networks. TCOM , 42 ( 2-4 ): 523 -- 533 , 1994 . A. T. Bouloutas, S. Calo, and A. Finkel. Alarm Correlation and Fault Identification in Communication Networks. TCOM, 42(2-4):523--533, 1994.","journal-title":"Alarm Correlation and Fault Identification in Communication Networks. TCOM"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1541880.1541882"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1011315125608"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/1078026.1078407"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629087.1629089"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1774088.1774434"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1214\/009053604000000067"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2009.56"},{"key":"e_1_3_2_1_12_1","volume-title":"Sensing and Decision-making in Random Search. PNAS, 109(30):12070--12074","author":"Hein A. M.","year":"2012","unstructured":"A. M. Hein and S. A. Mckinley . Sensing and Decision-making in Random Search. PNAS, 109(30):12070--12074 , 2012 . A. M. Hein and S. A. Mckinley. Sensing and Decision-making in Random Search. PNAS, 109(30):12070--12074, 2012."},{"key":"e_1_3_2_1_13_1","volume-title":"ICML","author":"Jalali A.","year":"2012","unstructured":"A. Jalali and S. Sanghavi . Learning the Dependence Graph of Time Series with Latent Factors . In ICML , 2012 . A. Jalali and S. Sanghavi. Learning the Dependence Graph of Time Series with Latent Factors. In ICML, 2012."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775191"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2010.5691319"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020408.2020557"},{"key":"e_1_3_2_1_17_1","volume-title":"Principal Component Analysis","author":"Jolliffe I. T.","year":"2002","unstructured":"I. T. Jolliffe . Principal Component Analysis . Springer , second edition, Oct. 2002 . I. T. Jolliffe. Principal Component Analysis. Springer, second edition, Oct. 2002."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1460412.1460423"},{"key":"e_1_3_2_1_19_1","volume-title":"NetDB","author":"Kreps J.","year":"2011","unstructured":"J. Kreps , N. Narkhede , and J. Rao . Kafka: A Distributed Messaging System for Log Processing . In NetDB , 2011 . J. Kreps, N. Narkhede, and J. Rao. Kafka: A Distributed Messaging System for Log Processing. In NetDB, 2011."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/956863.956972"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1639562.1639596"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079309"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2009.15"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-007-0044-3"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1754414.1754419"},{"key":"e_1_3_2_1_27_1","volume-title":"A Survey of Fault Localization Techniques in Computer Networks. Science of Computer Programming, 53(2):165--194","author":"Steinder M.","year":"2004","unstructured":"M. Steinder and A. S. Sethi . A Survey of Fault Localization Techniques in Computer Networks. Science of Computer Programming, 53(2):165--194 , 2004 . M. Steinder and A. S. Sethi. A Survey of Fault Localization Techniques in Computer Networks. Science of Computer Programming, 53(2):165--194, 2004."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2283516.2283647"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.2517-6161.1996.tb02080.x"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1038\/44831"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1998582.1998605"},{"key":"e_1_3_2_1_32_1","volume-title":"Middleware","author":"Wang C.","year":"2012","unstructured":"C. Wang , I. A. Rayan , G. Eisenhauer , K. Schwan , V. Talwar , M. Wolf , and C. Huneycutt . VScope: Middleware for Troubleshooting Time-Sensitive Data Center Applications . In Middleware , 2012 . C. Wang, I. A. Rayan, G. Eisenhauer, K. Schwan, V. Talwar, M. Wolf, and C. Huneycutt. VScope: Middleware for Troubleshooting Time-Sensitive Data Center Applications. In Middleware, 2012."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/998669.998911"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2011.52"},{"key":"e_1_3_2_1_35_1","volume-title":"NIPS","author":"Xu H.","year":"2010","unstructured":"H. Xu , C. Caramais , and S. Sanghavi . Robust PCA via Outlier Pursuit . In NIPS , 2010 . H. Xu, C. Caramais, and S. Sanghavi. Robust PCA via Outlier Pursuit. In NIPS, 2010."},{"key":"e_1_3_2_1_36_1","volume-title":"Argus: End-to-end Service Anomaly Detection and Localization from an ISP's Point of View","author":"Yan H.","year":"2012","unstructured":"H. Yan , A. Flavel , Z. Ge , A. Gerber , D. Massey , C. Papadopoulos , H. Shah , and J. Yates . Argus: End-to-end Service Anomaly Detection and Localization from an ISP's Point of View . 2012 . H. Yan, A. Flavel, Z. Ge, A. Gerber, D. Massey, C. Papadopoulos, H. Shah, and J. Yates. Argus: End-to-end Service Anomaly Detection and Localization from an ISP's Point of View. 2012."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.5555\/2215493.2336517"},{"issue":"2","key":"e_1_3_2_1_38_1","first-page":"173","volume":"87","author":"Zhang Z.-Q.","year":"2005","unstructured":"Z.-Q. Zhang , C.-G. Wu , B.-K. Zhang , T. Xia , and A.-F. Li. SDG Multiple Fault Diagnosis by Real-time Inverse Inference. 87 ( 2 ): 173 -- 189 , 2005 . Z.-Q. Zhang, C.-G. Wu, B.-K. Zhang, T. Xia, and A.-F. Li. SDG Multiple Fault Diagnosis by Real-time Inverse Inference. 87(2):173--189, 2005.","journal-title":"Real-time Inverse Inference."}],"event":{"name":"SIGMETRICS '13: ACM SIGMETRICS \/ International Conference on Measurement and Modeling of Computer Systems","location":"Pittsburgh PA USA","acronym":"SIGMETRICS '13","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation"]},"container-title":["Proceedings of the ACM SIGMETRICS\/international conference on Measurement and modeling of computer systems"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2465529.2465753","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2465529.2465753","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:16Z","timestamp":1750221556000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2465529.2465753"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,6,17]]},"references-count":37,"alternative-id":["10.1145\/2465529.2465753","10.1145\/2465529"],"URL":"https:\/\/doi.org\/10.1145\/2465529.2465753","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2494232.2465753","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2013,6,17]]},"assertion":[{"value":"2013-06-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}