{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T14:45:22Z","timestamp":1773153922522,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T00:00:00Z","timestamp":1604793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,8]]},"DOI":"10.1145\/3368089.3409768","type":"proceedings-article","created":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T06:03:47Z","timestamp":1604815427000},"page":"304-314","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["Identifying linked incidents in large-scale online service systems"],"prefix":"10.1145","author":[{"given":"Yujun","family":"Chen","sequence":"first","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Xian","family":"Yang","sequence":"additional","affiliation":[{"name":"Hong Kong Baptist University, China"}]},{"given":"Hang","family":"Dong","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Xiaoting","family":"He","sequence":"additional","affiliation":[{"name":"Chinese Academy of Sciences, China"}]},{"given":"Hongyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Newcastle, Australia"}]},{"given":"Qingwei","family":"Lin","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Junjie","family":"Chen","sequence":"additional","affiliation":[{"name":"Tianjin University, China"}]},{"given":"Pu","family":"Zhao","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Yu","family":"Kang","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Feng","family":"Gao","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"given":"Zhangwei","family":"Xu","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"given":"Dongmei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]}],"member":"320","published-online":{"date-parts":[[2020,11,8]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"crossref","unstructured":"Pragya Agarwal and Arun Prakash Agrawal. 2014. Fault-localization techniques for software systems: A literature review. ACM SIGSOFT Software Engineering Notes 39 5 ( 2014 ) 1-8.  Pragya Agarwal and Arun Prakash Agrawal. 2014. Fault-localization techniques for software systems: A literature review. ACM SIGSOFT Software Engineering Notes 39 5 ( 2014 ) 1-8.","DOI":"10.1145\/2659118.2659125"},{"key":"e_1_3_2_2_2_1","first-page":"307","volume-title":"OSDI","volume":"12","author":"Attariyan Mona","year":"2012","unstructured":"Mona Attariyan , Michael Chow , and Jason Flinn . 2012 . X-ray: Automating RootCause Diagnosis of Performance Anomalies in Production Software .. In OSDI , Vol. 12 . 307 - 320 . Mona Attariyan, Michael Chow, and Jason Flinn. 2012. X-ray: Automating RootCause Diagnosis of Performance Anomalies in Production Software.. In OSDI, Vol. 12. 307-320."},{"key":"e_1_3_2_2_3_1","volume-title":"Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings. ACM, 193-194","author":"Budhiraja Amar","year":"2018","unstructured":"Amar Budhiraja , Kartik Dutta , Raghu Reddy , and Manish Shrivastava . 2018 . DWEN: deep word embedding network for duplicate bug report detection in software repositories . In Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings. ACM, 193-194 . Amar Budhiraja, Kartik Dutta, Raghu Reddy, and Manish Shrivastava. 2018. DWEN: deep word embedding network for duplicate bug report detection in software repositories. In Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings. ACM, 193-194."},{"key":"e_1_3_2_2_4_1","volume-title":"Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings. ACM, 165-166","author":"Budhiraja Amar","year":"2018","unstructured":"Amar Budhiraja , Raghu Reddy , and Manish Shrivastava . 2018 . LWE: LDA refined word embeddings for duplicate bug report detection . In Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings. ACM, 165-166 . Amar Budhiraja, Raghu Reddy, and Manish Shrivastava. 2018. LWE: LDA refined word embeddings for duplicate bug report detection. In Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings. ACM, 165-166."},{"key":"e_1_3_2_2_5_1","volume-title":"A survey of fault diagnosis and fault-tolerant techniques\u00e2\u0102\u0164-Part II: Fault diagnosis with knowledge-based and hybrid\/active approaches","author":"Cecati Carlo","year":"2015","unstructured":"Carlo Cecati . 2015. A survey of fault diagnosis and fault-tolerant techniques\u00e2\u0102\u0164-Part II: Fault diagnosis with knowledge-based and hybrid\/active approaches . IEEE Transactions on Industrial Electronics ( 2015 ). Carlo Cecati. 2015. A survey of fault diagnosis and fault-tolerant techniques\u00e2\u0102\u0164-Part II: Fault diagnosis with knowledge-based and hybrid\/active approaches. IEEE Transactions on Industrial Electronics ( 2015 )."},{"key":"e_1_3_2_2_6_1","volume-title":"IT Ravindra Narkhede, IT Vijay Mungara, IT Guillermo Rueda, and IT Asoka Diggs.","author":"Chandramouly Ajay","year":"2013","unstructured":"Ajay Chandramouly , Big Data Domain Owner , IT Ravindra Narkhede, IT Vijay Mungara, IT Guillermo Rueda, and IT Asoka Diggs. 2013 . Reducing Client Incidents through Big Data Predictive Analytics. Intel IT Big Data Predictive Analytics ,(December) ( 2013 ). Ajay Chandramouly, Big Data Domain Owner, IT Ravindra Narkhede, IT Vijay Mungara, IT Guillermo Rueda, and IT Asoka Diggs. 2013. Reducing Client Incidents through Big Data Predictive Analytics. Intel IT Big Data Predictive Analytics,(December) ( 2013 )."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00020"},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00042"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"crossref","unstructured":"Junjie Chen Wenxiang Hu Dan Hao Yingfei Xiong Hongyu Zhang and Lu Zhang. 2019. Static duplicate bug-report identification for compilers. SCIENTIA SINICA Informationis 49 10 ( 2019 ) 1283-1298.  Junjie Chen Wenxiang Hu Dan Hao Yingfei Xiong Hongyu Zhang and Lu Zhang. 2019. Static duplicate bug-report identification for compilers. SCIENTIA SINICA Informationis 49 10 ( 2019 ) 1283-1298.","DOI":"10.1360\/N112019-00001"},{"key":"e_1_3_2_2_10_1","volume-title":"Characterizing and Prioritizing Incidents for LargeScale Online Service Systems. In The 35th IEEE\/ACM International Conference on Automated Software Engineering.","author":"Chen Junjie","year":"2020","unstructured":"Junjie Chen , Shu Zhang , Xiaoting He , Qingwei Lin , Hongyu Zhang , Dan Hao , Yu Kang , Feng Gao , Zhangwei Xu , Yingnong Dang , and Dongmei Zhang . 2020 . How Incidental are the Incidents? Characterizing and Prioritizing Incidents for LargeScale Online Service Systems. In The 35th IEEE\/ACM International Conference on Automated Software Engineering. to appear. Junjie Chen, Shu Zhang, Xiaoting He, Qingwei Lin, Hongyu Zhang, Dan Hao, Yu Kang, Feng Gao, Zhangwei Xu, Yingnong Dang, and Dongmei Zhang. 2020. How Incidental are the Incidents? Characterizing and Prioritizing Incidents for LargeScale Online Service Systems. In The 35th IEEE\/ACM International Conference on Automated Software Engineering. to appear."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.69"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCDC.2013.6561817"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TIE.2015.2417501"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939754"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9387-3"},{"key":"e_1_3_2_2_16_1","volume-title":"The 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Industry track. to appear.","author":"Jiang Jiajun","unstructured":"Jiajun Jiang , Weihai Lu , Junjie Chen , Qingwei Lin , Pu Zhao , Yu Kang , Hongyu Zhang , Yingfei Xiong , Feng Gao , Zhangwei Xu , Yingnong Dang , and Dongmei Zhang . 2020. How to Mitigate the Incident? An Efective Troubleshooting Guide Recommendation Technique for Online Service Systems . In The 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Industry track. to appear. Jiajun Jiang, Weihai Lu, Junjie Chen, Qingwei Lin, Pu Zhao, Yu Kang, Hongyu Zhang, Yingfei Xiong, Feng Gao, Zhangwei Xu, Yingnong Dang, and Dongmei Zhang. 2020. How to Mitigate the Incident? An Efective Troubleshooting Guide Recommendation Technique for Online Service Systems. In The 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, Industry track. to appear."},{"key":"e_1_3_2_2_17_1","volume-title":"Felicita Di Giandomenico, and Priya Narasimhan","author":"Kavulya Soila P","year":"2012","unstructured":"Soila P Kavulya , Kaustubh Joshi , Felicita Di Giandomenico, and Priya Narasimhan . 2012 . Failure diagnosis of complex systems. In Resilience assessment and evaluation of computing systems. Springer , 239-261. Soila P Kavulya, Kaustubh Joshi, Felicita Di Giandomenico, and Priya Narasimhan. 2012. Failure diagnosis of complex systems. In Resilience assessment and evaluation of computing systems. Springer, 239-261."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"crossref","unstructured":"Yoon Kim. 2014. Convolutional Neural Networks for Sentence Classification. In EMNLP.  Yoon Kim. 2014. Convolutional Neural Networks for Sentence Classification. In EMNLP.","DOI":"10.3115\/v1\/D14-1181"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597090"},{"key":"e_1_3_2_2_20_1","volume-title":"ICML deep learning workshop","author":"Koch Gregory","unstructured":"Gregory Koch , Richard Zemel , and Ruslan Salakhutdinov . 2015. Siamese neural networks for one-shot image recognition . In ICML deep learning workshop , Vol. 2 . Lille . Gregory Koch, Richard Zemel, and Ruslan Salakhutdinov. 2015. Siamese neural networks for one-shot image recognition. In ICML deep learning workshop, Vol. 2. Lille."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624028"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"crossref","unstructured":"Ma \u0142gorzata Steinder and Adarshpal S Sethi. 2004. A survey of fault localization techniques in computer networks. Science of computer programming 53 2 ( 2004 ) 165-194.  Ma \u0142gorzata Steinder and Adarshpal S Sethi. 2004. A survey of fault localization techniques in computer networks. Science of computer programming 53 2 ( 2004 ) 165-194.","DOI":"10.1016\/j.scico.2004.01.010"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693105"},{"key":"e_1_3_2_2_24_1","article-title":"Visualizing data using t-SNE","author":"van der Maaten Laurens","year":"2008","unstructured":"Laurens van der Maaten and Geofrey Hinton . 2008 . Visualizing data using t-SNE . Journal of machine learning research 9 , Nov ( 2008 ), 2579-2605. Laurens van der Maaten and Geofrey Hinton. 2008. Visualizing data using t-SNE. Journal of machine learning research 9, Nov ( 2008 ), 2579-2605.","journal-title":"Journal of machine learning research 9"},{"key":"e_1_3_2_2_25_1","unstructured":"Tomas Mikolov Edouard Grave Piotr Bojanowski Christian Puhrsch and Armand Joulin. 2017. Advances in pre-training distributed word representations. arXiv preprint arXiv:1712.09405 ( 2017 ).  Tomas Mikolov Edouard Grave Piotr Bojanowski Christian Puhrsch and Armand Joulin. 2017. Advances in pre-training distributed word representations. arXiv preprint arXiv:1712.09405 ( 2017 )."},{"key":"e_1_3_2_2_26_1","unstructured":"Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jef Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111-3119.  Tomas Mikolov Ilya Sutskever Kai Chen Greg S Corrado and Jef Dean. 2013. Distributed representations of words and phrases and their compositionality. In Advances in neural information processing systems. 3111-3119."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351687"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2755005"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.32"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1049\/ic:20040481"},{"key":"e_1_3_2_2_31_1","volume-title":"Annie Ibrahim Rana, and Giovani Estrada","author":"Sol\u00e9 Marc","year":"2017","unstructured":"Marc Sol\u00e9 , Victor Munt\u00e9s-Mulero , Annie Ibrahim Rana, and Giovani Estrada . 2017 . Survey on models and techniques for root-cause analysis. arXiv preprint arXiv:1701.08546 ( 2017 ). Marc Sol\u00e9, Victor Munt\u00e9s-Mulero, Annie Ibrahim Rana, and Giovani Estrada. 2017. Survey on models and techniques for root-cause analysis. arXiv preprint arXiv:1701.08546 ( 2017 )."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100061"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806811"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368151"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2521368"},{"key":"e_1_3_2_2_36_1","first-page":"719","article-title":"Automated Bug Removal for Software-Defined Networks","author":"Wu Yang","year":"2017","unstructured":"Yang Wu , Ang Chen , Andreas Haeberlen , Wenchao Zhou , and Boon Thau Loo . 2017 . Automated Bug Removal for Software-Defined Networks .. In NSDI. 719 - 733 . Yang Wu, Ang Chen, Andreas Haeberlen, Wenchao Zhou, and Boon Thau Loo. 2017. Automated Bug Removal for Software-Defined Networks.. In NSDI. 719-733.","journal-title":"NSDI."},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970357"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.33"},{"key":"e_1_3_2_2_39_1","first-page":"27","article-title":"Defect Prediction Based on the Characteristics of Multilayer Structure of Software Network. In 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C)","author":"Yang Yiwen","year":"2018","unstructured":"Yiwen Yang , Jun Ai , and Fei Wang . 2018 . Defect Prediction Based on the Characteristics of Multilayer Structure of Software Network. In 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C) . IEEE , 27 - 34 . Yiwen Yang, Jun Ai, and Fei Wang. 2018. Defect Prediction Based on the Characteristics of Multilayer Structure of Software Network. In 2018 IEEE International Conference on Software Quality, Reliability and Security Companion (QRS-C). IEEE, 27-34.","journal-title":"IEEE"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2479232"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2396761.2396869"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2007.19"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368161"}],"event":{"name":"ESEC\/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Virtual Event USA","acronym":"ESEC\/FSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409768","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3409768","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:58Z","timestamp":1750197718000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3409768"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,8]]},"references-count":43,"alternative-id":["10.1145\/3368089.3409768","10.1145\/3368089"],"URL":"https:\/\/doi.org\/10.1145\/3368089.3409768","relation":{},"subject":[],"published":{"date-parts":[[2020,11,8]]},"assertion":[{"value":"2020-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}