{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T12:53:42Z","timestamp":1773147222589,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416624","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:39:02Z","timestamp":1611790742000},"page":"373-384","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":29,"title":["How incidental are the incidents?"],"prefix":"10.1145","author":[{"given":"Junjie","family":"Chen","sequence":"first","affiliation":[{"name":"Tianjin University, Tianjin, China"}]},{"given":"Shu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft Research, Beijing, China"}]},{"given":"Xiaoting","family":"He","sequence":"additional","affiliation":[{"name":"Microsoft Research, Beijing, China"}]},{"given":"Qingwei","family":"Lin","sequence":"additional","affiliation":[{"name":"Microsoft Research, Beijing, China"}]},{"given":"Hongyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"The University of Newcastle, Callaghan, Australia"}]},{"given":"Dan","family":"Hao","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"given":"Yu","family":"Kang","sequence":"additional","affiliation":[{"name":"Microsoft Research, Beijing, China"}]},{"given":"Feng","family":"Gao","sequence":"additional","affiliation":[{"name":"Microsoft Azure"}]},{"given":"Zhangwei","family":"Xu","sequence":"additional","affiliation":[{"name":"Microsoft Azure"}]},{"given":"Yingnong","family":"Dang","sequence":"additional","affiliation":[{"name":"Microsoft Azure"}]},{"given":"Dongmei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft Research, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Accessed: 2019. MXNet. https:\/\/mxnet.incubator.apache.org\/"},{"key":"e_1_3_2_1_2_1","unstructured":"Accessed: 2019. news. https:\/\/www.businessinsider.com\/amazon-prime-day-website-issues-cost-it-millions-in-lost-sales-2018-7"},{"key":"e_1_3_2_1_3_1","unstructured":"Accessed: 2019. scikit-learn. http:\/\/scikit-learn.org\/stable\/"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.1005"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000791.2000794"},{"key":"e_1_3_2_1_6_1","volume-title":"Neural Machine Translation by Jointly Learning to Align and Translate. international conference on learning representations","author":"Bahdanau Dzmitry","year":"2015","unstructured":"Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2015. Neural Machine Translation by Jointly Learning to Align and Translate. international conference on learning representations (2015)."},{"key":"e_1_3_2_1_7_1","volume-title":"Representation learning: A review and new perspectives","author":"Bengio Yoshua","year":"2013","unstructured":"Yoshua Bengio, Aaron Courville, and Pascal Vincent. 2013. Representation learning: A review and new perspectives. IEEE transactions on pattern analysis and machine intelligence 35, 8 (2013), 1798--1828."},{"key":"e_1_3_2_1_8_1","first-page":"548","article-title":"Survey of text mining","volume":"45","author":"Berry Michael W","year":"2004","unstructured":"Michael W Berry and Malu Castellanos. 2004. Survey of text mining. Computing Reviews 45, 9 (2004), 548.","journal-title":"Computing Reviews"},{"key":"e_1_3_2_1_9_1","first-page":"993","article-title":"Latent dirichlet allocation","author":"Blei David M","year":"2003","unstructured":"David M Blei, Andrew Y Ng, and Michael I Jordan. 2003. Latent dirichlet allocation. Journal of machine Learning research 3, Jan (2003), 993--1022.","journal-title":"Journal of machine Learning research 3"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00020"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00042"},{"key":"e_1_3_2_1_12_1","volume-title":"Identifying Linked Incidents in Large-scale Online Service Systems. In The 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering.","author":"Chen Yujun","year":"2020","unstructured":"Yujun Chen, Xian Yang, Hang Dong, Xiaoting He, Hongyu Zhang, Qingwei Lin, Junjie Chen, Pu Zhao, Yu Kang, Feng Gao, Zhangwei Xu, and Dongmei Zhang. 2020. Identifying Linked Incidents in Large-scale Online Service Systems. In The 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. to appear."},{"key":"e_1_3_2_1_13_1","first-page":"2671","article-title":"Ranking the best instances","author":"Cl\u00e9men\u00e7on St\u00e9phan","year":"2007","unstructured":"St\u00e9phan Cl\u00e9men\u00e7on and Nicolas Vayatis. 2007. Ranking the best instances. Journal of Machine Learning Research 8, Dec (2007), 2671--2699.","journal-title":"Journal of Machine Learning Research 8"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2981345.2981385"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/VISSOF.2007.4290709"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2008.28"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2005.10.010"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882471.1882479"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2018436.2018477"},{"key":"e_1_3_2_1_21_1","volume-title":"Symposium on reliability in distributed software and database systems","author":"Gray Jim","year":"1986","unstructured":"Jim Gray. 1986. Why do computers stop and what can be done about it?. In Symposium on reliability in distributed software and database systems. Los Angeles, CA, USA, 3--12."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806871"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958824.1958887"},{"key":"e_1_3_2_1_24_1","volume-title":"Principles of data mining. Drug safety 30, 7","author":"Hand David J","year":"2007","unstructured":"David J Hand. 2007. Principles of data mining. Drug safety 30, 7 (2007), 621--622."},{"key":"e_1_3_2_1_25_1","volume-title":"Digital Design and Computer Architecture","author":"Harris David","unstructured":"David Harris and Sarah Harris. 2012. Digital Design and Computer Architecture, Second Edition (2nd ed.). Morgan Kaufmann Publishers Inc.","edition":"2"},{"key":"e_1_3_2_1_26_1","volume-title":"The 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Industry track. to appear.","author":"Jiang Jiajun","unstructured":"Jiajun Jiang, Weihai Lu, Junjie Chen, Qingwei Lin, Pu Zhao, Yu Kang, Hongyu Zhang, Yingfei Xiong, Feng Gao, Zhangwei Xu, Yingnong Dang, and Dongmei Zhang. 2020. How to Mitigate the Incident? An Effective Troubleshooting Guide Recommendation Technique for Online Service Systems. In The 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Industry track. to appear."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1052"},{"key":"e_1_3_2_1_28_1","volume-title":"Compressing text classification models. arXiv preprint arXiv:1612.03651","author":"Joulin Armand","year":"2016","unstructured":"Armand Joulin, Edouard Grave, Piotr Bojanowski, Matthijs Douze, H\u00e9rve J\u00e9gou, and Tomas Mikolov. 2016. FastText.zip: Compressing text classification models. arXiv preprint arXiv:1612.03651 (2016)."},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 2018 World Wide Web Conference on World Wide Web, WWW 2018.","author":"Xian Yujun","year":"2019","unstructured":"Yujun Chen; Xian Yang; Qingwei Lin; Hongyu Zhang; Feng Gao; Zhangwei Xu; Yingnong Dang; Dongmei Zhang; Hang Dong; Yong Xu; Hao Li; Yu Kang;. 2019. Outage Prediction and Diagnosis for Cloud Service Systems. In Proceedings of the 2018 World Wide Web Conference on World Wide Web, WWW 2018. to appear."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1137983.1138027"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463284"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181309.1181314"},{"key":"e_1_3_2_1_34_1","volume-title":"Identifying Recurrent and Unknown Performance Issues. In IEEE International Conference on Data Mining.","author":"Lim Meng Hui","year":"2015","unstructured":"Meng Hui Lim, Jian Guang Lou, Hongyu Zhang, Fu Qiang, Andrew Teoh, Qingwei Lin, Justin Ding, and Dongmei Zhang. 2015. Identifying Recurrent and Unknown Performance Issues. In IEEE International Conference on Data Mining."},{"key":"e_1_3_2_1_35_1","volume-title":"Software analytics for incident management of online services: an experience report. automated software engineering","author":"Lou Jianguang","year":"2013","unstructured":"Jianguang Lou, Qingwei Lin, Rui Ding, Qiang Fu, Dongmei Zhang, and Tao Xie. 2013. Software analytics for incident management of online services: an experience report. automated software engineering (2013), 475--485."},{"key":"e_1_3_2_1_36_1","volume-title":"Experience report on applying software analytics in incident management of online service. automated software engineering 24, 4","author":"Lou Jianguang","year":"2017","unstructured":"Jianguang Lou, Qingwei Lin, Rui Ding, Qiang Fu, Dongmei Zhang, and Tao Xie. 2017. Experience report on applying software analytics in incident management of online service. automated software engineering 24, 4 (2017), 905--941."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2008.4658083"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/567793.567795"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1117\/1.2819119"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"crossref","unstructured":"Stephen Robertson Hugo Zaragoza et al. 2009. The probabilistic relevance framework: BM25 and beyond. Foundations and Trends\u00ae in Information Retrieval 3 4 (2009) 333--389.","DOI":"10.1561\/1500000019"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2009.4"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.31"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9331-y"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807161"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS49710.2020.00026"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.2307\/3001968"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.40"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2012.144"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043572"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70771"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.02.034"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"e_1_3_2_1_54_1","volume-title":"Understanding and Handling Alert Storm for Online Service Systems. In The 42nd International Conference on Software Engineering, SEIP track.","author":"Zhao Nengwen","year":"2020","unstructured":"Nengwen Zhao, Junjie Chen, Xiao Peng, Honglin Wang, Xinya Wu, Yuanzong Zhang, Zikai Chen, Xiangzhong Zheng, Xiaohui Nie, Gang Wang, Yong Wu, Fang Zhou, Wenchi Zhang, Kaixin Sui, and Dan Pei. 2020. Understanding and Handling Alert Storm for Online Service Systems. In The 42nd International Conference on Software Engineering, SEIP track. to appear."},{"key":"e_1_3_2_1_55_1","volume-title":"Real-time Incident Prediction for Online Service Systems. In The 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering.","author":"Zhao Nengwen","year":"2020","unstructured":"Nengwen Zhao, Junjie Chen, Zhou Wang, Xiao Peng, Gang Wang, Yong Wu, Fang Zhou, Zhen Feng, Xiaohui Nie, Wenchi Zhang, Kaixin Sui, and Dan Pei. 2020. Real-time Incident Prediction for Online Service Systems. In The 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. to appear."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.130"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337226"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia","acronym":"ASE '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416624","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416624","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:38Z","timestamp":1750197698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416624"}},"subtitle":["characterizing and prioritizing incidents for large-scale online service systems"],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":56,"alternative-id":["10.1145\/3324884.3416624","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416624","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}