{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,30]],"date-time":"2025-10-30T01:57:45Z","timestamp":1761789465050,"version":"3.41.0"},"reference-count":76,"publisher":"Association for Computing Machinery (ACM)","issue":"1","license":[{"start":{"date-parts":[[2018,4,3]],"date-time":"2018-04-03T00:00:00Z","timestamp":1522713600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["AF-1408784","CCF-1337215 (XPS-CLCCA)","SHF-1527610","CCF-1149252 (CAREER)"],"award-info":[{"award-number":["AF-1408784","CCF-1337215 (XPS-CLCCA)","SHF-1527610","CCF-1149252 (CAREER)"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["Proc. ACM Meas. Anal. Comput. Syst."],"published-print":{"date-parts":[[2018,4,3]]},"abstract":"<jats:p>Stragglers are exceptionally slow tasks within a job that delay its completion. Stragglers, which are uncommon within a single job, are pervasive in datacenters with many jobs. A large body of research has focused on mitigating datacenter stragglers, but relatively little research has focused on systematically and rigorously identifying their root causes. We present Hound, a statistical machine learning framework that infers the causes of stragglers from traces of datacenter-scale jobs. Hound is designed to achieve several objectives: datacenter-scale diagnosis, interpretable models, unbiased inference, and computational efficiency. We demonstrate Hound's capabilities for a production trace from Google's warehouse-scale datacenters and two Spark traces from Amazon EC2 clusters.<\/jats:p>","DOI":"10.1145\/3179420","type":"journal-article","created":{"date-parts":[[2018,4,4]],"date-time":"2018-04-04T12:11:45Z","timestamp":1522843905000},"page":"1-36","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["Hound"],"prefix":"10.1145","volume":"2","author":[{"given":"Pengfei","family":"Zheng","sequence":"first","affiliation":[{"name":"Duke University, Durham, NC, USA"}]},{"given":"Benjamin C.","family":"Lee","sequence":"additional","affiliation":[{"name":"Duke University, Durham, NC, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,4,3]]},"reference":[{"key":"e_1_2_1_1_1","volume-title":"Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation (NSDI '13)","author":"Ananthanarayanan Ganesh","year":"2013","unstructured":"Ganesh Ananthanarayanan , Ali Ghodsi , Scott Shenker , and Ion Stoica . 2013 . Effective Straggler Mitigation: Attack of the Clones . In Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation (NSDI '13) . 185--198. http:\/\/dl.acm.org\/citation.cfm?id=2482626.2482645 Ganesh Ananthanarayanan, Ali Ghodsi, Scott Shenker, and Ion Stoica. 2013. Effective Straggler Mitigation: Attack of the Clones. In Proceedings of the 10th USENIX Conference on Networked Systems Design and Implementation (NSDI '13). 185--198. http:\/\/dl.acm.org\/citation.cfm?id=2482626.2482645"},{"key":"e_1_2_1_2_1","volume-title":"9th USENIX Symposium on Operating Systems Design and Implementation (OSDI '10)","volume":"10","author":"Ananthanarayanan Ganesh","year":"2010","unstructured":"Ganesh Ananthanarayanan , Srikanth Kandula , Albert G Greenberg , Ion Stoica , Yi Lu , Bikas Saha , and Edward Harris . 2010 . Reining in the Outliers in Map-Reduce Clusters using Mantri . In 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI '10) , Vol. 10 . 24. Ganesh Ananthanarayanan, Srikanth Kandula, Albert G Greenberg, Ion Stoica, Yi Lu, Bikas Saha, and Edward Harris. 2010. Reining in the Outliers in Map-Reduce Clusters using Mantri. In 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI '10), Vol. 10. 24."},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/268998.266637"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2742797"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1214\/aos\/1176345528"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2534169.2486025"},{"key":"e_1_2_1_7_1","doi-asserted-by":"crossref","unstructured":"Elias Bareinboim and Judea Pearl. 2011. Controlling Selection Bias in Causal Inference. In AAAI.   Elias Bareinboim and Judea Pearl. 2011. Controlling Selection Bias in Causal Inference. In AAAI.","DOI":"10.1609\/aaai.v25i1.8056"},{"key":"e_1_2_1_8_1","volume-title":"6th USENIX Symposium on Operating Systems Design and Implementation","volume":"4","author":"Barham Paul","year":"2004","unstructured":"Paul Barham , Austin Donnelly , Rebecca Isaacs , and Richard Mortier . 2004 . Using Magpie for Request Extraction and Workload Modelling .. In 6th USENIX Symposium on Operating Systems Design and Implementation , Vol. 4 . 18--18. Paul Barham, Austin Donnelly, Rebecca Isaacs, and Richard Mortier. 2004. Using Magpie for Request Extraction and Workload Modelling.. In 6th USENIX Symposium on Operating Systems Design and Implementation, Vol. 4. 18--18."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2133806.2133826"},{"key":"e_1_2_1_10_1","volume-title":"Proceedings of the Third Conference on Tackling Computer Systems Problems with Machine Learning Techniques. USENIX Association","author":"Bod\u00edk Peter","year":"2008","unstructured":"Peter Bod\u00edk , Moises Goldszmidt , and Armando Fox . 2008 . HiLighter: Automatically Building Robust Signatures of Performance Behavior for Small- and Large-scale Systems . In Proceedings of the Third Conference on Tackling Computer Systems Problems with Machine Learning Techniques. USENIX Association , Berkeley, CA, USA, 3--3. Peter Bod\u00edk, Moises Goldszmidt, and Armando Fox. 2008. HiLighter: Automatically Building Robust Signatures of Performance Behavior for Small- and Large-scale Systems. In Proceedings of the Third Conference on Tackling Computer Systems Problems with Machine Learning Techniques. USENIX Association, Berkeley, CA, USA, 3--3."},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755926"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2342763.2342781"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1018054314350"},{"key":"e_1_2_1_14_1","volume-title":"Graphical condition for identification in recursive SEM. arXiv preprint: 1206.6821","author":"Brito Carlos","year":"2012","unstructured":"Carlos Brito and Judea Pearl . 2012. Graphical condition for identification in recursive SEM. arXiv preprint: 1206.6821 ( 2012 ). Carlos Brito and Judea Pearl. 2012. Graphical condition for identification in recursive SEM. arXiv preprint: 1206.6821 (2012)."},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/170088.170160"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/647883.738238"},{"key":"e_1_2_1_17_1","volume-title":"11th USENIX Symposium on Operating Systems Design and Implementation (OSDI '14)","author":"Chow Michael","year":"2014","unstructured":"Michael Chow , David Meisner , Jason Flinn , Daniel Peek , and Thomas F Wenisch . 2014 . The mystery machine: End-to-end performance analysis of large-scale internet services . In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI '14) . 217--231. Michael Chow, David Meisner, Jason Flinn, Daniel Peek, and Thomas F Wenisch. 2014. The mystery machine: End-to-end performance analysis of large-scale internet services. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI '14). 217--231."},{"volume-title":"6th USENIX Symposium on Operating Systems Design and Implementation (OSDI '04)","author":"Cohen Ira","key":"e_1_2_1_18_1","unstructured":"Ira Cohen , Moises Goldszmidt , Terence Kelly , Julie Symons , and Jeffrey S. Chase . 2004. Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control . In 6th USENIX Symposium on Operating Systems Design and Implementation (OSDI '04) . 16--16. http:\/\/dl.acm.org\/citation.cfm?id=1251254.1251270 Ira Cohen, Moises Goldszmidt, Terence Kelly, Julie Symons, and Jeffrey S. Chase. 2004. Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control. In 6th USENIX Symposium on Operating Systems Design and Implementation (OSDI '04). 16--16. http:\/\/dl.acm.org\/citation.cfm?id=1251254.1251270"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095821"},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(90)90060-D"},{"volume-title":"Proceedings of the 2014 USENIX Conference on USENIX Annual Technical Conference (USENIX ATC'14). USENIX Association","author":"Cui Henggang","key":"e_1_2_1_21_1","unstructured":"Henggang Cui , James Cipar , Qirong Ho , Jin Kyu Kim , Seunghak Lee , Abhimanu Kumar , Jinliang Wei , Wei Dai , Gregory R. Ganger , Phillip B. Gibbons , Garth A. Gibson , and Eric P. Xing . 2014. Exploiting Bounded Staleness to Speed Up Big Data Analytics . In Proceedings of the 2014 USENIX Conference on USENIX Annual Technical Conference (USENIX ATC'14). USENIX Association , Berkeley, CA, USA, 37--48. http:\/\/dl.acm.org\/citation.cfm?id=2643634.2643639 Henggang Cui, James Cipar, Qirong Ho, Jin Kyu Kim, Seunghak Lee, Abhimanu Kumar, Jinliang Wei, Wei Dai, Gregory R. Ganger, Phillip B. Gibbons, Garth A. Gibson, and Eric P. Xing. 2014. Exploiting Bounded Staleness to Speed Up Big Data Analytics. In Proceedings of the 2014 USENIX Conference on USENIX Annual Technical Conference (USENIX ATC'14). USENIX Association, Berkeley, CA, USA, 37--48. http:\/\/dl.acm.org\/citation.cfm?id=2643634.2643639"},{"key":"e_1_2_1_22_1","volume-title":"Asuka Nakata, and Andr\u00e9 Fujita.","author":"de Siqueira Santos Suzana","year":"2013","unstructured":"Suzana de Siqueira Santos , Daniel Yasumasa Takahashi , Asuka Nakata, and Andr\u00e9 Fujita. 2013 . A comparative study of statistical methods used to identify dependencies between gene expression signals. Briefings in bioinformatics (2013), 051. Suzana de Siqueira Santos, Daniel Yasumasa Takahashi, Asuka Nakata, and Andr\u00e9 Fujita. 2013. A comparative study of statistical methods used to identify dependencies between gene expression signals. Briefings in bioinformatics (2013), 051."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408794"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1600-0587.2012.07348.x"},{"key":"e_1_2_1_26_1","volume-title":"Proceedings of the 4th USENIX conference on Networked systems design & implementation. USENIX Association, 20--32","author":"Fonseca Rodrigo","year":"2007","unstructured":"Rodrigo Fonseca , George Porter , Randy H. Katz , Scott Shenker , and Ion Stoica . 2007 . X-trace: A pervasive network tracing framework . In Proceedings of the 4th USENIX conference on Networked systems design & implementation. USENIX Association, 20--32 . Rodrigo Fonseca, George Porter, Randy H. Katz, Scott Shenker, and Ion Stoica. 2007. X-trace: A pervasive network tracing framework. In Proceedings of the 4th USENIX conference on Networked systems design & implementation. USENIX Association, 20--32."},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1006\/jcss.1997.1504"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945450"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/800230.806987"},{"key":"e_1_2_1_30_1","volume-title":"Blei","author":"Hoffman Matthew","year":"2010","unstructured":"Matthew Hoffman , Francis R. Bach , and David M . Blei . 2010 . Online Learning for Latent Dirichlet Allocation. In Advances in Neural Information Processing Systems 23, J. D. Lafferty, C. K. I. Williams, J. Shawe-Taylor, R. S. Zemel, and A. Culotta (Eds.). Curran Associates, Inc ., 856--864. Matthew Hoffman, Francis R. Bach, and David M. Blei. 2010. Online Learning for Latent Dirichlet Allocation. In Advances in Neural Information Processing Systems 23, J. D. Lafferty, C. K. I. Williams, J. Shawe-Taylor, R. S. Zemel, and A. Culotta (Eds.). Curran Associates, Inc., 856--864."},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807140"},{"key":"e_1_2_1_32_1","volume-title":"5th International Open Cirrus Summit.","author":"Kwon YongChul","year":"2011","unstructured":"YongChul Kwon , Magdalena Balazinska , Bill Howe , and Jerome Rolia . 2011 . A Study of Skew in MapReduce Applications. In The 5th International Open Cirrus Summit. YongChul Kwon, Magdalena Balazinska, Bill Howe, and Jerome Rolia. 2011. A Study of Skew in MapReduce Applications. In The 5th International Open Cirrus Summit."},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2213836.2213840"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670979.2670988"},{"key":"e_1_2_1_35_1","unstructured":"David Lopez-Paz Philipp Hennig and Bernhard Sch\u00f6lkopf. 2013. The randomized dependence coefficient. In Advances in neural information processing systems. 1--9.   David Lopez-Paz Philipp Hennig and Bernhard Sch\u00f6lkopf. 2013. The randomized dependence coefficient. In Advances in neural information processing systems. 1--9."},{"key":"e_1_2_1_36_1","volume-title":"Lunceford and Marie Davidian","author":"Jared","year":"2004","unstructured":"Jared K. Lunceford and Marie Davidian . 2004 . Stratification and weighting via the propensity score in estimation of causal treatment effects: a comparative study. Statistics in medicine 23, 19 (2004), 2937--2960. Jared K. Lunceford and Marie Davidian. 2004. Stratification and weighting via the propensity score in estimation of causal treatment effects: a comparative study. Statistics in medicine 23, 19 (2004), 2937--2960."},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815400.2815415"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1592568.1592596"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1080\/00036840110058482"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1654-1103.2004.tb02263.x"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/2228298.2228334"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/11430919_45"},{"volume-title":"An Introduction to Copulas","author":"Nelsen Roger B.","key":"e_1_2_1_43_1","unstructured":"Roger B. Nelsen . 2007. An Introduction to Copulas . Springer Science & Business Media . Roger B. Nelsen. 2007. An Introduction to Copulas. Springer Science & Business Media."},{"key":"e_1_2_1_44_1","volume-title":"Algorithms and Complexity Results for Exact Bayesian Structure Learning. In UAI","author":"Ordyniak Sebastian","year":"2010","unstructured":"Sebastian Ordyniak and Stefan Szeider . 2010 . Algorithms and Complexity Results for Exact Bayesian Structure Learning. In UAI 2010. Sebastian Ordyniak and Stefan Szeider. 2010. Algorithms and Complexity Results for Exact Bayesian Structure Learning. In UAI 2010."},{"key":"e_1_2_1_45_1","first-page":"1049","article-title":"The making of tpc-ds","volume":"32","author":"Othayoth Raghunath","year":"2006","unstructured":"Raghunath Othayoth and Meikel Poess . 2006 . The making of tpc-ds . In PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES , Vol. 32. 1049 . Raghunath Othayoth and Meikel Poess. 2006. The making of tpc-ds. In PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES, Vol. 32. 1049.","journal-title":"PROCEEDINGS OF THE INTERNATIONAL CONFERENCE ON VERY LARGE DATA BASES"},{"key":"e_1_2_1_46_1","volume-title":"Making Sense of Performance in Data Analytics Frameworks. In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15)","author":"Ousterhout Kay","year":"2015","unstructured":"Kay Ousterhout , Ryan Rasti , Sylvia Ratnasamy , Scott Shenker , and Byung-Gon Chun . 2015 . Making Sense of Performance in Data Analytics Frameworks. In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15) . USENIX Association, 293--307. Kay Ousterhout, Ryan Rasti, Sylvia Ratnasamy, Scott Shenker, and Byung-Gon Chun. 2015. Making Sense of Performance in Data Analytics Frameworks. In 12th USENIX Symposium on Networked Systems Design and Implementation (NSDI 15). USENIX Association, 293--307."},{"key":"e_1_2_1_47_1","volume-title":"Copula-based Kernel Dependency Measures. In ICML '12","author":"P\u00f3czos Barnab\u00e1s","year":"2012","unstructured":"Barnab\u00e1s P\u00f3czos , Zoubin Ghahramani , and Jeff G Schneider . 2012 . Copula-based Kernel Dependency Measures. In ICML '12 . 775--782. Barnab\u00e1s P\u00f3czos, Zoubin Ghahramani, and Jeff G Schneider. 2012. Copula-based Kernel Dependency Measures. In ICML '12. 775--782."},{"key":"e_1_2_1_48_1","volume-title":"Resistant fits for some commonly used logistic models with medical applications. Biometrics","author":"Pregibon Daryl","year":"1982","unstructured":"Daryl Pregibon . 1982. Resistant fits for some commonly used logistic models with medical applications. Biometrics ( 1982 ), 485--498. Daryl Pregibon. 1982. Resistant fits for some commonly used logistic models with medical applications. Biometrics (1982), 485--498."},{"key":"e_1_2_1_50_1","volume-title":"Network Operations and Management Symposium (NOMS)","author":"Reiss Charles","year":"2012","unstructured":"Charles Reiss , John Wilkes , and Joseph L. Hellerstein . 2012. Obfuscatory obscanturism: making workload traces of commercially-sensitive systems safe to release . In Network Operations and Management Symposium (NOMS) , 2012 IEEE. IEEE, 1279--1286. Charles Reiss, John Wilkes, and Joseph L. Hellerstein. 2012. Obfuscatory obscanturism: making workload traces of commercially-sensitive systems safe to release. In Network Operations and Management Symposium (NOMS), 2012 IEEE. IEEE, 1279--1286."},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2010.68"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2785956.2787481"},{"key":"e_1_2_1_53_1","volume-title":"On measures of dependence. Acta mathematica hungarica 10, 3--4","author":"R\u00e9nyi Alfr\u00e9d","year":"1959","unstructured":"Alfr\u00e9d R\u00e9nyi . 1959. On measures of dependence. Acta mathematica hungarica 10, 3--4 ( 1959 ), 441--451. Alfr\u00e9d R\u00e9nyi. 1959. On measures of dependence. Acta mathematica hungarica 10, 3--4 (1959), 441--451."},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNN.2005.853423"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/70.1.41"},{"volume-title":"Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (NSDI'11)","author":"Sambasivan Raja R.","key":"e_1_2_1_56_1","unstructured":"Raja R. Sambasivan , Alice X. Zheng , Michael De Rosa , Elie Krevat , Spencer Whitman , Michael Stroucken , William Wang , Lianghong Xu , and Gregory R. Ganger . 2011. Diagnosing Performance Changes by Comparing Request Flows . In Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (NSDI'11) . USENIX Association, Berkeley, CA, USA, 43--56. Raja R. Sambasivan, Alice X. Zheng, Michael De Rosa, Elie Krevat, Spencer Whitman, Michael Stroucken, William Wang, Lianghong Xu, and Gregory R. Ganger. 2011. Diagnosing Performance Changes by Comparing Request Flows. In Proceedings of the 8th USENIX Conference on Networked Systems Design and Implementation (NSDI'11). USENIX Association, Berkeley, CA, USA, 43--56."},{"key":"e_1_2_1_57_1","unstructured":"C. Shannon and W. Weaver. 1949. The mathematical theory of communication. University of Illinois Press.  C. Shannon and W. Weaver. 1949. The mathematical theory of communication. University of Illinois Press."},{"key":"e_1_2_1_58_1","volume-title":"Mike Burrows, Pat Stephenson, Manoj Plakal, Donald Beaver, Saul Jaspan, and Chandan Shanbhag.","author":"Sigelman Benjamin H.","year":"2010","unstructured":"Benjamin H. Sigelman , Luiz Andr\u00e9 Barroso , Mike Burrows, Pat Stephenson, Manoj Plakal, Donald Beaver, Saul Jaspan, and Chandan Shanbhag. 2010 . Dapper, a Large-Scale Distributed Systems Tracing Infrastructure . (2010). Benjamin H. Sigelman, Luiz Andr\u00e9 Barroso, Mike Burrows, Pat Stephenson, Manoj Plakal, Donald Beaver, Saul Jaspan, and Chandan Shanbhag. 2010. Dapper, a Large-Scale Distributed Systems Tracing Infrastructure. (2010)."},{"key":"e_1_2_1_59_1","volume-title":"UAI","author":"Steck Harald","year":"2008","unstructured":"Harald Steck . 2008 . Learning the Bayesian Network Structure: Dirichlet Prior versus Data . In UAI 2008. Harald Steck. 2008. Learning the Bayesian Network Structure: Dirichlet Prior versus Data. In UAI 2008."},{"volume-title":"A fast decision tree learning algorithm","author":"Su Jiang","key":"e_1_2_1_60_1","unstructured":"Jiang Su and Harry Zhang . 2006. A fast decision tree learning algorithm . In UAI. AAAI Press , 500--505. Jiang Su and Harry Zhang. 2006. A fast decision tree learning algorithm. In UAI. AAAI Press, 500--505."},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/1402946.1402971"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1811099.1811041"},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/1384529.1375486"},{"key":"e_1_2_1_64_1","doi-asserted-by":"crossref","unstructured":"Robert Tibshirani. 1996. Regression shrinkage and selection via the lasso. Journal of the Royal Statistical Society. (1996) 267--288.  Robert Tibshirani. 1996. Regression shrinkage and selection via the lasso. Journal of the Royal Statistical Society. (1996) 267--288.","DOI":"10.1111\/j.2517-6161.1996.tb02080.x"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-012-9366-7"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2014.6835958"},{"key":"e_1_2_1_67_1","volume-title":"Individual comparisons by ranking methods. Biometrics bulletin 1, 6","author":"Wilcoxon Frank","year":"1945","unstructured":"Frank Wilcoxon . 1945. Individual comparisons by ranking methods. Biometrics bulletin 1, 6 ( 1945 ), 80--83. Frank Wilcoxon. 1945. Individual comparisons by ranking methods. Biometrics bulletin 1, 6 (1945), 80--83."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/4235.585893"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2670979.2671005"},{"key":"e_1_2_1_71_1","first-page":"1","article-title":"Multi-Task Learning for Straggler Avoiding Predictive Job Scheduling","volume":"17","author":"Yadwadkar Neeraja J.","year":"2016","unstructured":"Neeraja J. Yadwadkar , Bharath Hariharan , Joseph E. Gonzalez , and Randy Katz . 2016 . Multi-Task Learning for Straggler Avoiding Predictive Job Scheduling . Journal of Machine Learning Research 17 , 106 (2016), 1 -- 37 . Neeraja J. Yadwadkar, Bharath Hariharan, Joseph E. Gonzalez, and Randy Katz. 2016. Multi-Task Learning for Straggler Avoiding Predictive Job Scheduling. Journal of Machine Learning Research 17, 106 (2016), 1--37.","journal-title":"Journal of Machine Learning Research"},{"key":"e_1_2_1_72_1","volume-title":"8th USENIX Symposium on Operating Systems Design and Implementation (OSDI '08)","author":"Zaharia Matei","year":"2008","unstructured":"Matei Zaharia , Andy Konwinski , Anthony D. Joseph , Randy Katz , and Ion Stoica . 2008 . Improving MapReduce Perfor- mance in Heterogeneous Environments . In 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI '08) . 29--42. http:\/\/dl.acm.org\/citation.cfm?id=1855741.1855744 Matei Zaharia, Andy Konwinski, Anthony D. Joseph, Randy Katz, and Ion Stoica. 2008. Improving MapReduce Perfor- mance in Heterogeneous Environments. In 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI '08). 29--42. http:\/\/dl.acm.org\/citation.cfm?id=1855741.1855744"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2005.44"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465388"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.2016.47"},{"key":"e_1_2_1_76_1","volume-title":"11th USENIX Symposium on Operating Systems Design and Implementation. 629--644","author":"Zhao Xu","year":"2014","unstructured":"Xu Zhao , Yongle Zhang , David Lion , Muhammad Faizan Ullah , Yu Luo , Ding Yuan , and Michael Stumm . 2014 . lprof: A non-intrusive request flow profiler for distributed systems . In 11th USENIX Symposium on Operating Systems Design and Implementation. 629--644 . Xu Zhao, Yongle Zhang, David Lion, Muhammad Faizan Ullah, Yu Luo, Ding Yuan, and Michael Stumm. 2014. lprof: A non-intrusive request flow profiler for distributed systems. In 11th USENIX Symposium on Operating Systems Design and Implementation. 629--644."},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1111\/j.1467-9868.2005.00503.x"}],"container-title":["Proceedings of the ACM on Measurement and Analysis of Computing Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3179420","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3179420","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3179420","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:18Z","timestamp":1750208898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3179420"}},"subtitle":["Causal Learning for Datacenter-scale Straggler Diagnosis"],"short-title":[],"issued":{"date-parts":[[2018,4,3]]},"references-count":76,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2018,4,3]]}},"alternative-id":["10.1145\/3179420"],"URL":"https:\/\/doi.org\/10.1145\/3179420","relation":{},"ISSN":["2476-1249"],"issn-type":[{"type":"electronic","value":"2476-1249"}],"subject":[],"published":{"date-parts":[[2018,4,3]]},"assertion":[{"value":"2018-04-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}