{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T03:22:49Z","timestamp":1774495369470,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":48,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T00:00:00Z","timestamp":1604793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,8]]},"DOI":"10.1145\/3368089.3409741","type":"proceedings-article","created":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T06:03:52Z","timestamp":1604815432000},"page":"292-303","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":32,"title":["Efficient incident identification from multi-dimensional issue reports via meta-heuristic search"],"prefix":"10.1145","author":[{"given":"Jiazhen","family":"Gu","sequence":"first","affiliation":[{"name":"Fudan University, China"}]},{"given":"Chuan","family":"Luo","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Si","family":"Qin","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Bo","family":"Qiao","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Qingwei","family":"Lin","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Hongyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Newcastle, Australia"}]},{"given":"Ze","family":"Li","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"given":"Yingnong","family":"Dang","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"given":"Shaowei","family":"Cai","sequence":"additional","affiliation":[{"name":"Institute of Software at Chinese Academy of Sciences, China"}]},{"given":"Wei","family":"Wu","sequence":"additional","affiliation":[{"name":"University of Technology Sydney, Australia"}]},{"given":"Yangfan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Fudan University, China"}]},{"given":"Murali","family":"Chintalapati","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"given":"Dongmei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]}],"member":"320","published-online":{"date-parts":[[2020,11,8]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2013.04.001"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10115-016-0987-z"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377813.3381353"},{"key":"e_1_3_2_2_4_1","volume-title":"Proceedings of the 24th International Joint Conference on Artificial Intelligence, IJCAI 2015. AAAI Press, 747-753","author":"Cai Shaowei","year":"2015","unstructured":"Shaowei Cai . 2015 . Balance between Complexity and Quality: Local Search for Minimum Vertex Cover in Massive Graphs . In Proceedings of the 24th International Joint Conference on Artificial Intelligence, IJCAI 2015. AAAI Press, 747-753 . http:\/\/ijcai.org\/Abstract\/15\/111 Shaowei Cai. 2015. Balance between Complexity and Quality: Local Search for Minimum Vertex Cover in Massive Graphs. In Proceedings of the 24th International Joint Conference on Artificial Intelligence, IJCAI 2015. AAAI Press, 747-753. http:\/\/ijcai.org\/Abstract\/15\/111"},{"key":"e_1_3_2_2_5_1","volume-title":"Branch and bound algorithms-principles and examples. Department of Computer Science","author":"Clausen Jens","unstructured":"Jens Clausen . 1999. Branch and bound algorithms-principles and examples. Department of Computer Science , University of Copenhagen ( 1999 ), 1-30. Jens Clausen. 1999. Branch and bound algorithms-principles and examples. Department of Computer Science, University of Copenhagen ( 1999 ), 1-30."},{"key":"e_1_3_2_2_6_1","volume-title":"Combinatorial Optimization","author":"Cook William J.","unstructured":"William J. Cook , William H. Cunningham , William R. Pulleyblank , and Alexander Schrijver . 1997. Combinatorial Optimization . Wiley . William J. Cook, William H. Cunningham, William R. Pulleyblank, and Alexander Schrijver. 1997. Combinatorial Optimization. Wiley."},{"key":"e_1_3_2_2_7_1","volume-title":"Thomas","author":"Cover Thomas M.","year":"2006","unstructured":"Thomas M. Cover and Joy A . Thomas . 2006 . Elements of information theory (2. ed.). Wiley . http:\/\/www.elementsofinformationtheory.com\/ Thomas M. Cover and Joy A. Thomas. 2006. Elements of information theory (2. ed.). Wiley. http:\/\/www.elementsofinformationtheory.com\/"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.14778\/2735479.2735481"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3023-4"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180218"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00040"},{"key":"e_1_3_2_2_13_1","unstructured":"Google. 2019. Google Cloud. https:\/\/cloud.google.com\/  Google. 2019. Google Cloud. https:\/\/cloud.google.com\/"},{"key":"e_1_3_2_2_14_1","volume-title":"Data Mining: Concepts and Techniques","author":"Han Jiawei","year":"2011","unstructured":"Jiawei Han , Micheline Kamber , and Jian Pei . 2011 . Data Mining: Concepts and Techniques , 3 rd edition. Morgan Kaufmann . http:\/\/hanj.cs.illinois.edu\/bk3\/ Jiawei Han, Micheline Kamber, and Jian Pei. 2011. Data Mining: Concepts and Techniques, 3rd edition. Morgan Kaufmann. http:\/\/hanj.cs.illinois.edu\/bk3\/","edition":"3"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.29"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236083"},{"key":"e_1_3_2_2_17_1","volume-title":"Hoos and Thomas St\u00fctzle","author":"Holger","year":"2004","unstructured":"Holger H. Hoos and Thomas St\u00fctzle . 2004 . Stochastic Local Search: Foundations & Applications. Elsevier \/ Morgan Kaufmann . Holger H. Hoos and Thomas St\u00fctzle. 2004. Stochastic Local Search: Foundations & Applications. Elsevier \/ Morgan Kaufmann."},{"key":"e_1_3_2_2_18_1","first-page":"9","volume-title":"Proceedings of NZCSRSC","volume":"4","author":"Huang Anna","year":"2008","unstructured":"Anna Huang . 2008 . Similarity measures for text document clustering . In Proceedings of NZCSRSC 2008, Vol. 4 . 9 - 56 . Anna Huang. 2008. Similarity measures for text document clustering. In Proceedings of NZCSRSC 2008, Vol. 4. 9-56."},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TBDATA.2017.2711039"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.2861"},{"key":"e_1_3_2_2_21_1","unstructured":"Amazon Web Services Inc. 2019. Amazon Compute Service Level Agreement. https:\/\/aws.amazon.com\/compute\/sla\/  Amazon Web Services Inc. 2019. Amazon Compute Service Level Agreement. https:\/\/aws.amazon.com\/compute\/sla\/"},{"key":"e_1_3_2_2_22_1","unstructured":"Amazon Web Services Inc. 2019. Amazon Web Service. https:\/\/aws.amazon.com\/  Amazon Web Services Inc. 2019. Amazon Web Service. https:\/\/aws.amazon.com\/"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2783258.2788611"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1038\/234034a0"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS.2018.8624168"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.96"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.61"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884795"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889232"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2815675.2815679"},{"key":"e_1_3_2_2_31_1","unstructured":"Michael R Lyu etal 1996. Handbook of software reliability engineering. Vol. 222. IEEE computer society press CA.  Michael R Lyu et al. 1996. Handbook of software reliability engineering. Vol. 222. IEEE computer society press CA."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00013"},{"key":"e_1_3_2_2_33_1","unstructured":"Oded Maimon and Lior Rokach (Eds.). 2010. Data Mining and Knowledge Discovery Handbook 2nd ed. Springer. http:\/\/www.springerlink.com\/content\/978-0-387-09822-7  Oded Maimon and Lior Rokach (Eds.). 2010. Data Mining and Knowledge Discovery Handbook 2nd ed. Springer. http:\/\/www.springerlink.com\/content\/978-0-387-09822-7"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-35854-1"},{"key":"e_1_3_2_2_35_1","unstructured":"Microsoft. 2019. Microsoft Azure. https:\/\/azure.microsoft.com\/  Microsoft. 2019. Microsoft Azure. https:\/\/azure.microsoft.com\/"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41528-4_11"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022643204877"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01580669"},{"key":"e_1_3_2_2_39_1","volume-title":"Proceedings of the 10th National Conference on Artificial Intelligence, William R. Swartout (Ed.). AAAI Press \/ The MIT Press, 440-446","author":"Selman Bart","year":"1992","unstructured":"Bart Selman , Hector J. Levesque , and David G. Mitchell . 1992. A New Method for Solving Hard Satisfiability Problems . In Proceedings of the 10th National Conference on Artificial Intelligence, William R. Swartout (Ed.). AAAI Press \/ The MIT Press, 440-446 . http:\/\/www.aaai.org\/Library\/AAAI\/ 1992 \/aaai92-068.php Bart Selman, Hector J. Levesque, and David G. Mitchell. 1992. A New Method for Solving Hard Satisfiability Problems. In Proceedings of the 10th National Conference on Artificial Intelligence, William R. Swartout (Ed.). AAAI Press \/ The MIT Press, 440-446. http:\/\/www.aaai.org\/Library\/AAAI\/ 1992 \/aaai92-068.php"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/584091.584093"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3220083"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2018.2804764"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884818"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.5205"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3182516"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3185996"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2007.892759"},{"key":"e_1_3_2_2_48_1","volume-title":"Proceedings of the 2019 USENIX Annual Technical Conference, USENIX ATC 2019, Dahlia Malkhi and Dan Tsafrir (Eds.). USENIX Association, 1063-1076","author":"Zhang Xu","year":"2019","unstructured":"Xu Zhang , Qingwei Lin , Yong Xu , Si Qin , Hongyu Zhang , Bo Qiao , Yingnong Dang , Xinsheng Yang , Qian Cheng , Murali Chintalapati , Youjiang Wu , Ken Hsieh , Kaixin Sui , Xin Meng , Yaohai Xu , Wenchi Zhang , Furao Shen , and Dongmei Zhang . 2019 . Cross-dataset Time Series Anomaly Detection for Cloud Systems . In Proceedings of the 2019 USENIX Annual Technical Conference, USENIX ATC 2019, Dahlia Malkhi and Dan Tsafrir (Eds.). USENIX Association, 1063-1076 . https:\/\/www.usenix.org\/conference\/atc19\/presentation\/zhang-xu Xu Zhang, Qingwei Lin, Yong Xu, Si Qin, Hongyu Zhang, Bo Qiao, Yingnong Dang, Xinsheng Yang, Qian Cheng, Murali Chintalapati, Youjiang Wu, Ken Hsieh, Kaixin Sui, Xin Meng, Yaohai Xu, Wenchi Zhang, Furao Shen, and Dongmei Zhang. 2019. Cross-dataset Time Series Anomaly Detection for Cloud Systems. In Proceedings of the 2019 USENIX Annual Technical Conference, USENIX ATC 2019, Dahlia Malkhi and Dan Tsafrir (Eds.). USENIX Association, 1063-1076. https:\/\/www.usenix.org\/conference\/atc19\/presentation\/zhang-xu"}],"event":{"name":"ESEC\/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Virtual Event USA","acronym":"ESEC\/FSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409741","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409741","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:57Z","timestamp":1750197717000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409741"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,8]]},"references-count":48,"alternative-id":["10.1145\/3368089.3409741","10.1145\/3368089"],"URL":"https:\/\/doi.org\/10.1145\/3368089.3409741","relation":{},"subject":[],"published":{"date-parts":[[2020,11,8]]},"assertion":[{"value":"2020-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}