{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T15:33:46Z","timestamp":1776785626531,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":56,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T00:00:00Z","timestamp":1604793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Beijing National Research Center for Information Science and Technology (BNRist) key projects"},{"name":"National Key R&D Program of China","award":["2019YFB1802504"],"award-info":[{"award-number":["2019YFB1802504"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,8]]},"DOI":"10.1145\/3368089.3409672","type":"proceedings-article","created":{"date-parts":[[2020,11,10]],"date-time":"2020-11-10T21:09:10Z","timestamp":1605042550000},"page":"315-326","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":43,"title":["Real-time incident prediction for online service systems"],"prefix":"10.1145","author":[{"given":"Nengwen","family":"Zhao","sequence":"first","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Junjie","family":"Chen","sequence":"additional","affiliation":[{"name":"Tianjin University, China"}]},{"given":"Zhou","family":"Wang","sequence":"additional","affiliation":[{"name":"BizSeer, China \/ Beijing University of Posts and Telecommunications, China"}]},{"given":"Xiao","family":"Peng","sequence":"additional","affiliation":[{"name":"EverBright Bank, China"}]},{"given":"Gang","family":"Wang","sequence":"additional","affiliation":[{"name":"EverBright Bank, China"}]},{"given":"Yong","family":"Wu","sequence":"additional","affiliation":[{"name":"EverBright Bank, China"}]},{"given":"Fang","family":"Zhou","sequence":"additional","affiliation":[{"name":"EverBright Bank, China"}]},{"given":"Zhen","family":"Feng","sequence":"additional","affiliation":[{"name":"EverBright Bank, China"}]},{"given":"Xiaohui","family":"Nie","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Wenchi","family":"Zhang","sequence":"additional","affiliation":[{"name":"BizSeer, China"}]},{"given":"Kaixin","family":"Sui","sequence":"additional","affiliation":[{"name":"BizSeer, China"}]},{"given":"Dan","family":"Pei","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]}],"member":"320","published-online":{"date-parts":[[2020,11,8]]},"reference":[{"key":"e_1_3_2_2_1_1","volume-title":"https:\/\/www.statista.com\/statistics\/753938\/worldwide-enterprise-serverhourly-downtime-cost\/. [Online","author":"Average","year":"2020"},{"key":"e_1_3_2_2_2_1","volume-title":"https:\/\/en.wikipedia.org\/wiki\/Incident_management_(ITSM). [Online","author":"Management Incident","year":"2020"},{"key":"e_1_3_2_2_3_1","volume-title":"https:\/\/keras.io\/. [Online","year":"2020"},{"key":"e_1_3_2_2_4_1","volume-title":"https:\/\/numpy.org\/. [Online","year":"2020"},{"key":"e_1_3_2_2_5_1","volume-title":"https:\/\/pandas.pydata.org\/. [Online","year":"2020"},{"key":"e_1_3_2_2_6_1","unstructured":"scikit-learn. https:\/\/scikit-learn.org\/.  scikit-learn. https:\/\/scikit-learn.org\/."},{"key":"e_1_3_2_2_7_1","volume-title":"https:\/\/xgboost.readthedocs.io\/. [Online","year":"2020"},{"key":"e_1_3_2_2_8_1","volume-title":"Mining text data","author":"Aggarwal Charu C"},{"key":"e_1_3_2_2_9_1","unstructured":"Christopher M Bishop. 2006. Pattern recognition and machine learning. springer.  Christopher M Bishop. 2006. Pattern recognition and machine learning. springer."},{"key":"e_1_3_2_2_10_1","article-title":"Latent dirichlet allocation","author":"Blei David M","year":"2003","journal-title":"Journal of machine Learning research 3"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"crossref","unstructured":"Marc-Andr\u00e9 Carbonneau Veronika Cheplygina Eric Granger and Ghyslain Gagnon. 2018. Multiple instance learning: A survey of problem characteristics and applications. Pattern Recognition 77 ( 2018 ) 329-353.  Marc-Andr\u00e9 Carbonneau Veronika Cheplygina Eric Granger and Ghyslain Gagnon. 2018. Multiple instance learning: A survey of problem characteristics and applications. Pattern Recognition 77 ( 2018 ) 329-353.","DOI":"10.1016\/j.patcog.2017.10.009"},{"key":"e_1_3_2_2_12_1","volume-title":"Bag-level aggregation for multiple-instance active learning in instance classification problems","author":"Carbonneau Marc-Andr\u00e9","year":"2018"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"crossref","unstructured":"Nitesh V Chawla Kevin W Bowyer Lawrence O Hall and W Philip Kegelmeyer. 2002. SMOTE: synthetic minority over-sampling technique. Journal of artificial intelligence research 16 ( 2002 ) 321-357.  Nitesh V Chawla Kevin W Bowyer Lawrence O Hall and W Philip Kegelmeyer. 2002. SMOTE: synthetic minority over-sampling technique. Journal of artificial intelligence research 16 ( 2002 ) 321-357.","DOI":"10.1613\/jair.953"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00020"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00042"},{"key":"e_1_3_2_2_16_1","volume-title":"Characterizing and Prioritizing Incidents for LargeScale Online Service Systems. In The 35th IEEE\/ACM International Conference on Automated Software Engineering.","author":"Chen Junjie","year":"2020"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939785"},{"key":"e_1_3_2_2_18_1","volume-title":"Outage Prediction and Diagnosis for Cloud Service Systems. In The World Wide Web Conference. ACM, 2659-2665","author":"Chen Yujun","year":"2019"},{"key":"e_1_3_2_2_19_1","unstructured":"Rui Ding Hucheng Zhou Jian-Guang Lou Hongyu Zhang Qingwei Lin Qiang Fu Dongmei Zhang and Tao Xie. 2015. Log2: A cost-aware logging mechanism for performance diagnosis. In 2015 {USENIX} Annual Technical Conference ({ USENIX} {ATC} 15). 139-150.  Rui Ding Hucheng Zhou Jian-Guang Lou Hongyu Zhang Qingwei Lin Qiang Fu Dongmei Zhang and Tao Xie. 2015. Log2: A cost-aware logging mechanism for performance diagnosis. In 2015 {USENIX} Annual Technical Conference ({ USENIX} {ATC} 15). 139-150."},{"key":"e_1_3_2_2_20_1","article-title":"Minimum spanning trees and single linkage cluster analysis","volume":"18","author":"Gower John C","year":"1969","journal-title":"Journal of the Royal Statistical Society : Series C (Applied Statistics)"},{"key":"e_1_3_2_2_21_1","volume-title":"Data mining: concepts and techniques","author":"Han Jiawei"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Jiawei Han Jian Pei and Yiwen Yin. 2000. Mining frequent patterns without candidate generation. ACM sigmod record 29 2 ( 2000 ) 1-12.  Jiawei Han Jian Pei and Yiwen Yin. 2000. Mining frequent patterns without candidate generation. ACM sigmod record 29 2 ( 2000 ) 1-12.","DOI":"10.1145\/335191.335372"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"crossref","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation 9 8 ( 1997 ) 1735-1780.  Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation 9 8 ( 1997 ) 1735-1780.","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"crossref","unstructured":"Guofei Jiang Haifeng Chen Kenji Yoshihira and Akhilesh Saxena. 2011. Ranking the importance of alerts for problem determination in large computer systems. Cluster Computing 14 3 ( 2011 ) 213-227.  Guofei Jiang Haifeng Chen Kenji Yoshihira and Akhilesh Saxena. 2011. Ranking the importance of alerts for problem determination in large computer systems. Cluster Computing 14 3 ( 2011 ) 213-227.","DOI":"10.1007\/s10586-010-0120-0"},{"key":"e_1_3_2_2_25_1","volume-title":"The 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Industry track. to appear.","author":"Jiang Jiajun"},{"key":"e_1_3_2_2_26_1","unstructured":"Armand Joulin Edouard Grave Piotr Bojanowski Matthijs Douze H\u00e9rve J\u00e9gou and Tomas Mikolov. 2016. FastText.zip: Compressing text classification models. arXiv preprint arXiv:1612.03651 ( 2016 ).  Armand Joulin Edouard Grave Piotr Bojanowski Matthijs Douze H\u00e9rve J\u00e9gou and Tomas Mikolov. 2016. FastText.zip: Compressing text classification models. arXiv preprint arXiv:1612.03651 ( 2016 )."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"crossref","unstructured":"Yoon Kim. 2014. Convolutional neural networks for sentence classification. arXiv preprint arXiv:1408.5882 ( 2014 ).  Yoon Kim. 2014. Convolutional neural networks for sentence classification. arXiv preprint arXiv:1408.5882 ( 2014 ).","DOI":"10.3115\/v1\/D14-1181"},{"key":"e_1_3_2_2_28_1","first-page":"161","volume-title":"Proceedings of the Internet Measurement Conference","author":"Li Zhijing","year":"2018"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623360"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236060"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00085"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693105"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"crossref","unstructured":"Jian-Guang Lou Qingwei Lin Rui Ding Qiang Fu Dongmei Zhang and Tao Xie. 2017. Experience report on applying software analytics in incident management of online service. Automated Software Engineering 24 4 ( 2017 ) 905-941.  Jian-Guang Lou Qingwei Lin Rui Ding Qiang Fu Dongmei Zhang and Tao Xie. 2017. Experience report on applying software analytics in incident management of online service. Automated Software Engineering 24 4 ( 2017 ) 905-941.","DOI":"10.1007\/s10515-017-0218-1"},{"key":"e_1_3_2_2_34_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jef Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111-3119.  Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jef Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111-3119."},{"key":"e_1_3_2_2_35_1","volume-title":"Cyberspace Safety and Security","author":"Mirheidari Seyed Ali"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1052"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3304079.3310288"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939778"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2684822.2685324"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"crossref","unstructured":"Felix Salfner Maren Lenk and Miroslaw Malek. 2010. A survey of online failure prediction methods. ACM Computing Surveys (CSUR) 42 3 ( 2010 ) 1-42.  Felix Salfner Maren Lenk and Miroslaw Malek. 2010. A survey of online failure prediction methods. ACM Computing Surveys (CSUR) 42 3 ( 2010 ) 1-42.","DOI":"10.1145\/1670679.1670680"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2015.7218516"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623340"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2017.2648298"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS49710.2020.00026"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"crossref","unstructured":"Gerhard Widmer and Miroslav Kubat. 1996. Learning in the presence of concept drift and hidden contexts. Machine learning 23 1 ( 1996 ) 69-101.  Gerhard Widmer and Miroslav Kubat. 1996. Learning in the presence of concept drift and hidden contexts. Machine learning 23 1 ( 1996 ) 69-101.","DOI":"10.1007\/BF00116900"},{"key":"e_1_3_2_2_46_1","unstructured":"Haowen Xu Wenxiao Chen Nengwen Zhao Zeyan Li Jiahao Bu Zhihan Li and et.al. 2018. Unsupervised Anomaly Detection via Variational Auto-Encoder for Seasonal KPIs in Web Applications. In WWW.  Haowen Xu Wenxiao Chen Nengwen Zhao Zeyan Li Jiahao Bu Zhihan Li and et.al. 2018. Unsupervised Anomaly Detection via Variational Auto-Encoder for Seasonal KPIs in Web Applications. In WWW."},{"key":"e_1_3_2_2_47_1","volume-title":"Lightweight and Adaptive Service API Performance Monitoring in Highly Dynamic Cloud Environment. In 2017 IEEE International Conference on Services Computing (SCC). IEEE, 35-43","author":"Xu Jingmin","year":"2017"},{"key":"e_1_3_2_2_48_1","unstructured":"Yong Xu Kaixin Sui Randolph Yao Hongyu Zhang Qingwei Lin Yingnong Dang Peng Li Keceng Jiang Wenchi Zhang Jian-Guang Lou etal 2018. Improving service availability of cloud systems by predicting disk error. In 2018 {USENIX} Annual Technical Conference ({USENIX} {ATC} 18). 481-494.  Yong Xu Kaixin Sui Randolph Yao Hongyu Zhang Qingwei Lin Yingnong Dang Peng Li Keceng Jiang Wenchi Zhang Jian-Guang Lou et al. 2018. Improving service availability of cloud systems by predicting disk error. In 2018 {USENIX} Annual Technical Conference ({USENIX} {ATC} 18). 481-494."},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigData.2016.7840733"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219617.3219643"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"e_1_3_2_2_52_1","volume-title":"Understanding and Handling Alert Storm for Online Service Systems. In 2020 IEEE\/ACM 41st International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). ACM.","author":"Zhao Nengwen"},{"key":"e_1_3_2_2_53_1","volume-title":"Automatically and Adaptively Identifying Severe Alerts for Online Service Systems. In IEEE INFOCOM 2020-IEEE Conference on Computer Communications. IEEE, 2420-2429","author":"Zhao Nengwen","year":"2020"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2919327"},{"key":"e_1_3_2_2_55_1","first-page":"683","article-title":"Latent error prediction and fault localization for microservice applications by learning from system trace logs","author":"Zhou Xiang","year":"2019","journal-title":"ESEC\/FSE. ACM"},{"key":"e_1_3_2_2_56_1","volume-title":"Fault analysis and debugging of microservice systems: Industrial survey, benchmark system, and empirical study","author":"Zhou Xiang","year":"2018"}],"event":{"name":"ESEC\/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Virtual Event USA","acronym":"ESEC\/FSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409672","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409672","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:44:39Z","timestamp":1750203879000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409672"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,8]]},"references-count":56,"alternative-id":["10.1145\/3368089.3409672","10.1145\/3368089"],"URL":"https:\/\/doi.org\/10.1145\/3368089.3409672","relation":{},"subject":[],"published":{"date-parts":[[2020,11,8]]},"assertion":[{"value":"2020-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}