{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,10]],"date-time":"2026-03-10T12:53:42Z","timestamp":1773147222544,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":54,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T00:00:00Z","timestamp":1604793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,8]]},"DOI":"10.1145\/3368089.3417054","type":"proceedings-article","created":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T06:11:54Z","timestamp":1606371114000},"page":"1410-1420","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":42,"title":["How to mitigate the incident? an effective troubleshooting guide recommendation technique for online service systems"],"prefix":"10.1145","author":[{"given":"Jiajun","family":"Jiang","sequence":"first","affiliation":[{"name":"Tianjin University, China"}]},{"given":"Weihai","family":"Lu","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"given":"Junjie","family":"Chen","sequence":"additional","affiliation":[{"name":"Tianjin University, China"}]},{"given":"Qingwei","family":"Lin","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Pu","family":"Zhao","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Yu","family":"Kang","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Hongyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Newcastle, Australia"}]},{"given":"Yingfei","family":"Xiong","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"given":"Feng","family":"Gao","sequence":"additional","affiliation":[{"name":"Microsoft Azure, USA"}]},{"given":"Zhangwei","family":"Xu","sequence":"additional","affiliation":[{"name":"Microsoft Azure, USA"}]},{"given":"Yingnong","family":"Dang","sequence":"additional","affiliation":[{"name":"Microsoft Azure, USA"}]},{"given":"Dongmei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]}],"member":"320","published-online":{"date-parts":[[2020,11,8]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2016. Cost of Data Center Outages. https:\/\/www.vertiv.com\/globalassets\/ documents\/reports\/2016-cost-of-data-center-outages-11-11_51190_1.pdf.  2016. Cost of Data Center Outages. https:\/\/www.vertiv.com\/globalassets\/ documents\/reports\/2016-cost-of-data-center-outages-11-11_51190_1.pdf."},{"key":"e_1_3_2_2_2_1","unstructured":"2018. Amazon's one hour of downtime on Prime Day may have cost it up to $100 million in lost sales. https:\/\/www.businessinsider. com\/amazon-prime-daywebsite-issues-cost-it-millions-in-lost-sales-2018-7.  2018. Amazon's one hour of downtime on Prime Day may have cost it up to $100 million in lost sales. https:\/\/www.businessinsider. com\/amazon-prime-daywebsite-issues-cost-it-millions-in-lost-sales-2018-7."},{"key":"e_1_3_2_2_3_1","unstructured":"2019. ANNOY library. https:\/\/github.com\/spotify\/annoy. Accessed: 2019-09-01.  2019. ANNOY library. https:\/\/github.com\/spotify\/annoy. Accessed: 2019-09-01."},{"key":"e_1_3_2_2_4_1","unstructured":"Aug. 2008. Amazon's S3 cloud service turns into a puf of smoke. InformationWeek.  Aug. 2008. Amazon's S3 cloud service turns into a puf of smoke. InformationWeek."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4573(02)00021-3."},{"key":"e_1_3_2_2_6_1","volume-title":"ICLR","author":"Bahdanau Dzmitry","unstructured":"Dzmitry Bahdanau , Kyunghyun Cho , and Yoshua Bengio . 2015. Neural Machine Translation by Jointly Learning to Align and Translate . In ICLR . http:\/\/arxiv.org\/ abs\/1409.0473. Dzmitry Bahdanau, Kyunghyun Cho, and Yoshua Bengio. 2015. Neural Machine Translation by Jointly Learning to Align and Translate. In ICLR. http:\/\/arxiv.org\/ abs\/1409.0473."},{"key":"e_1_3_2_2_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.279181."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00020"},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00042"},{"key":"e_1_3_2_2_10_1","volume-title":"Characterizing and Prioritizing Incidents for LargeScale Online Service Systems. In The 35th IEEE\/ACM International Conference on Automated Software Engineering.","author":"Chen Junjie","year":"2020","unstructured":"Junjie Chen , Shu Zhang , Xiaoting He , Qingwei Lin , Hongyu Zhang , Dan Hao , Yu Kang , Feng Gao , Zhangwei Xu , Yingnong Dang , and Dongmei Zhang . 2020 . How Incidental are the Incidents? Characterizing and Prioritizing Incidents for LargeScale Online Service Systems. In The 35th IEEE\/ACM International Conference on Automated Software Engineering. to appear. Junjie Chen, Shu Zhang, Xiaoting He, Qingwei Lin, Hongyu Zhang, Dan Hao, Yu Kang, Feng Gao, Zhangwei Xu, Yingnong Dang, and Dongmei Zhang. 2020. How Incidental are the Incidents? Characterizing and Prioritizing Incidents for LargeScale Online Service Systems. In The 35th IEEE\/ACM International Conference on Automated Software Engineering. to appear."},{"key":"e_1_3_2_2_11_1","volume-title":"Chase","author":"Cohen Ira","year":"2004","unstructured":"Ira Cohen , Moises Goldszmidt , Terence Kelly , Julie Symons , and Jefrey S . Chase . 2004 . Correlating Instrumentation Data to System States : A Building Block for Automated Diagnosis and Control. In OSDI. USENIX Association , 16-16. Ira Cohen, Moises Goldszmidt, Terence Kelly, Julie Symons, and Jefrey S. Chase. 2004. Correlating Instrumentation Data to System States: A Building Block for Automated Diagnosis and Control. In OSDI. USENIX Association, 16-16."},{"key":"e_1_3_2_2_12_1","unstructured":"Ronan Collobert Jason Weston L\u00e9on Bottou Michael Karlen Koray Kavukcuoglu and Pavel Kuksa. 2011. Natural Language Processing (Almost) from Scratch. J. Mach. Learn. Res. (Nov. 2011 ) 2493-2537.  Ronan Collobert Jason Weston L\u00e9on Bottou Michael Karlen Koray Kavukcuoglu and Pavel Kuksa. 2011. Natural Language Processing (Almost) from Scratch. J. Mach. Learn. Res. (Nov. 2011 ) 2493-2537."},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1374376.1374452."},{"key":"e_1_3_2_2_14_1","volume-title":"BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. CoRR ( 2018 ). https:\/\/arxiv.org\/abs\/","author":"Devlin Jacob","year":"2018","unstructured":"Jacob Devlin , Ming-Wei Chang , Kenton Lee , and Kristina Toutanova . 2018 . BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. CoRR ( 2018 ). https:\/\/arxiv.org\/abs\/ 1810.04805. Jacob Devlin, Ming-Wei Chang, Kenton Lee, and Kristina Toutanova. 2018. BERT: Pre-training of Deep Bidirectional Transformers for Language Understanding. CoRR ( 2018 ). https:\/\/arxiv.org\/abs\/ 1810.04805."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2008.28."},{"key":"e_1_3_2_2_16_1","unstructured":"Minwei Feng Bing Xiang Michael R. Glass Lidan Wang and Bowen Zhou. 2015. Applying Deep Learning to Answer Selection: A Study and An Open Task. CoRR abs\/1508.01585 ( 2015 ). http:\/\/arxiv.org\/abs\/1508.01585.  Minwei Feng Bing Xiang Michael R. Glass Lidan Wang and Bowen Zhou. 2015. Applying Deep Learning to Answer Selection: A Study and An Open Task. CoRR abs\/1508.01585 ( 2015 ). http:\/\/arxiv.org\/abs\/1508.01585."},{"key":"e_1_3_2_2_17_1","volume-title":"Devise: A deep visual-semantic embedding model. In Advances in neural information processing systems. 2121-2129.","author":"Frome Andrea","year":"2013","unstructured":"Andrea Frome , Greg S Corrado , Jon Shlens , Samy Bengio , Jef Dean , Marc'Aurelio Ranzato , and Tomas Mikolov . 2013 . Devise: A deep visual-semantic embedding model. In Advances in neural information processing systems. 2121-2129. Andrea Frome, Greg S Corrado, Jon Shlens, Samy Bengio, Jef Dean, Marc'Aurelio Ranzato, and Tomas Mikolov. 2013. Devise: A deep visual-semantic embedding model. In Advances in neural information processing systems. 2121-2129."},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/SWAN.2015.7070481."},{"key":"e_1_3_2_2_19_1","volume-title":"2013 IEEE International Conference on Acoustics, Speech and Signal Processing ( 2013 ), 6645-6649","author":"Graves Alex","unstructured":"Alex Graves , Abdel rahman Mohamed , and Geofrey E. Hinton . 2013. Speech recognition with deep recurrent neural networks . 2013 IEEE International Conference on Acoustics, Speech and Signal Processing ( 2013 ), 6645-6649 . Alex Graves, Abdel rahman Mohamed, and Geofrey E. Hinton. 2013. Speech recognition with deep recurrent neural networks. 2013 IEEE International Conference on Acoustics, Speech and Signal Processing ( 2013 ), 6645-6649."},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2005.1556215."},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180167."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735."},{"key":"e_1_3_2_2_23_1","unstructured":"J. Nicholas Hoover. Aug. 16 2008. Outages Force Cloud Computing Users To Rethink Tactics. InformationWeek. https:\/\/www.informationweek.com\/cloud\/ software-as-a-service\/outages-force-cloud-computing-users-to-rethinktactics\/d\/d-id\/1071014.  J. Nicholas Hoover. Aug. 16 2008. Outages Force Cloud Computing Users To Rethink Tactics. InformationWeek. https:\/\/www.informationweek.com\/cloud\/ software-as-a-service\/outages-force-cloud-computing-users-to-rethinktactics\/d\/d-id\/1071014."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2014.17."},{"key":"e_1_3_2_2_25_1","first-page":"124","article-title":"Which Packages Would be Afected by This Bug Report?","author":"Huang Q.","year":"2017","unstructured":"Q. Huang , D. Lo , X. Xia , Q. Wang , and S. Li . 2017 . Which Packages Would be Afected by This Bug Report? . In ISSRE. 124 - 135 . Q. Huang, D. Lo, X. Xia, Q. Wang, and S. Li. 2017. Which Packages Would be Afected by This Bug Report?. In ISSRE. 124-135.","journal-title":"ISSRE."},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630070."},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/CESI.2016.012."},{"key":"e_1_3_2_2_28_1","first-page":"3128","article-title":"Deep visual-semantic alignments for generating image descriptions","author":"Karpathy Andrej","year":"2015","unstructured":"Andrej Karpathy and Li Fei-Fei . 2015 . Deep visual-semantic alignments for generating image descriptions . In CVPR. 3128 - 3137 . Andrej Karpathy and Li Fei-Fei. 2015. Deep visual-semantic alignments for generating image descriptions. In CVPR. 3128-3137.","journal-title":"CVPR."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2015.53."},{"key":"e_1_3_2_2_30_1","unstructured":"Yoon Kim. 2014. Convolutional Neural Networks for Sentence Classification. CoRR ( 2014 ). arXiv: 1408.5882 https:\/\/arxiv.org\/abs\/1408.5882.  Yoon Kim. 2014. Convolutional Neural Networks for Sentence Classification. CoRR ( 2014 ). arXiv: 1408.5882 https:\/\/arxiv.org\/abs\/1408.5882."},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3065386."},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950341."},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2014.96."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693105."},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-017-0218-1."},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.42."},{"key":"e_1_3_2_2_37_1","first-page":"3","article-title":"Recurrent neural network based language model","volume":"2","author":"Mikolov Tomas","year":"2010","unstructured":"Tomas Mikolov , Martin Karafi\u00e1t , Lukas Burget , Jan Cernock y`, and Sanjeev Khudanpur . 2010 . Recurrent neural network based language model .. In Interspeech , Vol. 2. 3 . Tomas Mikolov, Martin Karafi\u00e1t, Lukas Burget, Jan Cernock y`, and Sanjeev Khudanpur. 2010. Recurrent neural network based language model.. In Interspeech, Vol. 2. 3.","journal-title":"Interspeech"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139058452.002."},{"key":"e_1_3_2_2_39_1","unstructured":"Juan Enrique Ramos. 2003. Using TF-IDF to Determine Word Relevance in Document Queries.  Juan Enrique Ramos. 2003. Using TF-IDF to Determine Word Relevance in Document Queries."},{"key":"e_1_3_2_2_40_1","volume-title":"A Survey of Deep Active Learning. arXiv","author":"Ren Pengzhen","year":"2009","unstructured":"Pengzhen Ren , Yun Xiao , Xiaojun Chang , Po-Yao Huang , Zhihui Li , Xiaojiang Chen , and Xin Wang . 2020. A Survey of Deep Active Learning. arXiv : 2009 . 00236 [cs.LG] Pengzhen Ren, Yun Xiao, Xiaojun Chang, Po-Yao Huang, Zhihui Li, Xiaojiang Chen, and Xin Wang. 2020. A Survey of Deep Active Learning. arXiv: 2009. 00236 [cs.LG]"},{"key":"e_1_3_2_2_41_1","volume-title":"A Survey of Active Learning for Text Classification using Deep Neural Networks. arXiv","author":"Schr\u00f6der Christopher","year":"2008","unstructured":"Christopher Schr\u00f6der and Andreas Niekler . 2020. A Survey of Active Learning for Text Classification using Deep Neural Networks. arXiv : 2008 . 07267 [cs.CL] Christopher Schr\u00f6der and Andreas Niekler. 2020. A Survey of Active Learning for Text Classification using Deep Neural Networks. arXiv: 2008. 07267 [cs.CL]"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/78.650093."},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2017.07.007."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2012.48."},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2019.00046"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/2886521.2886647"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330865"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2013.94."},{"key":"e_1_3_2_2_49_1","volume-title":"Wallace","author":"Zhang Ye","year":"2015","unstructured":"Ye Zhang and Byron C . Wallace . 2015 . A Sensitivity Analysis of (and Practitioners' Guide to) Convolutional Neural Networks for Sentence Classification. CoRR ( 2015 ). arXiv: 1510.03820 https:\/\/arxiv.org\/abs\/1510.03820. Ye Zhang and Byron C. Wallace. 2015. A Sensitivity Analysis of (and Practitioners' Guide to) Convolutional Neural Networks for Sentence Classification. CoRR ( 2015 ). arXiv: 1510.03820 https:\/\/arxiv.org\/abs\/1510.03820."},{"key":"e_1_3_2_2_50_1","volume-title":"Understanding and Handling Alert Storm for Online Service Systems. In The 42nd International Conference on Software Engineering, SEIP track.","author":"Zhao Nengwen","year":"2020","unstructured":"Nengwen Zhao , Junjie Chen , Xiao Peng , Honglin Wang , Xinya Wu , Yuanzong Zhang , Zikai Chen , Xiangzhong Zheng , Xiaohui Nie , Gang Wang , Yong Wu , Fang Zhou , Wenchi Zhang , Kaixin Sui , and Dan Pei . 2020 . Understanding and Handling Alert Storm for Online Service Systems. In The 42nd International Conference on Software Engineering, SEIP track. to appear. Nengwen Zhao, Junjie Chen, Xiao Peng, Honglin Wang, Xinya Wu, Yuanzong Zhang, Zikai Chen, Xiangzhong Zheng, Xiaohui Nie, Gang Wang, Yong Wu, Fang Zhou, Wenchi Zhang, Kaixin Sui, and Dan Pei. 2020. Understanding and Handling Alert Storm for Online Service Systems. In The 42nd International Conference on Software Engineering, SEIP track. to appear."},{"key":"e_1_3_2_2_51_1","volume-title":"Real-time Incident Prediction for Online Service Systems. In The 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering.","author":"Zhao Nengwen","year":"2020","unstructured":"Nengwen Zhao , Junjie Chen , Zhou Wang , Xiao Peng , Gang Wang , Yong Wu , Fang Zhou , Zhen Feng , Xiaohui Nie , Wenchi Zhang , Kaixin Sui , and Dan Pei . 2020 . Real-time Incident Prediction for Online Service Systems. In The 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. to appear. Nengwen Zhao, Junjie Chen, Zhou Wang, Xiao Peng, Gang Wang, Yong Wu, Fang Zhou, Zhen Feng, Xiaohui Nie, Wenchi Zhang, Kaixin Sui, and Dan Pei. 2020. Real-time Incident Prediction for Online Service Systems. In The 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. to appear."},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227210."},{"key":"e_1_3_2_2_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2919823."},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3194991."}],"event":{"name":"ESEC\/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Virtual Event USA","acronym":"ESEC\/FSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3417054","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3417054","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:58Z","timestamp":1750197718000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3417054"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,8]]},"references-count":54,"alternative-id":["10.1145\/3368089.3417054","10.1145\/3368089"],"URL":"https:\/\/doi.org\/10.1145\/3368089.3417054","relation":{},"subject":[],"published":{"date-parts":[[2020,11,8]]},"assertion":[{"value":"2020-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}