{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T11:59:34Z","timestamp":1775822374180,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,11,8]],"date-time":"2020-11-08T00:00:00Z","timestamp":1604793600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,11,8]]},"DOI":"10.1145\/3368089.3417055","type":"proceedings-article","created":{"date-parts":[[2020,12,11]],"date-time":"2020-12-11T00:45:01Z","timestamp":1607647501000},"page":"1487-1497","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":77,"title":["Towards intelligent incident management: why we need it and how we make it"],"prefix":"10.1145","author":[{"given":"Zhuangbin","family":"Chen","sequence":"first","affiliation":[{"name":"Chinese University of Hong Kong, China"}]},{"given":"Yu","family":"Kang","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Liqun","family":"Li","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Xu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Hongyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Newcastle, Australia"}]},{"given":"Hui","family":"Xu","sequence":"additional","affiliation":[{"name":"Fudan University, China"}]},{"given":"Yangfan","family":"Zhou","sequence":"additional","affiliation":[{"name":"Fudan University, China"}]},{"given":"Li","family":"Yang","sequence":"additional","affiliation":[{"name":"Microsoft Azure, USA"}]},{"given":"Jeffrey","family":"Sun","sequence":"additional","affiliation":[{"name":"Microsoft Azure, USA"}]},{"given":"Zhangwei","family":"Xu","sequence":"additional","affiliation":[{"name":"Microsoft Azure, USA"}]},{"given":"Yingnong","family":"Dang","sequence":"additional","affiliation":[{"name":"Microsoft Azure, USA"}]},{"given":"Feng","family":"Gao","sequence":"additional","affiliation":[{"name":"Microsoft Azure, USA"}]},{"given":"Pu","family":"Zhao","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Bo","family":"Qiao","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Qingwei","family":"Lin","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Dongmei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Michael R.","family":"Lyu","sequence":"additional","affiliation":[{"name":"Chinese University of Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2020,11,8]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"Victor Bahl Paul Barham Richard Black Ranveer Chandra Moises Goldszmidt Rebecca Isaacs Srikanth Kandula Lun Li John MacCormick Dave Maltz etal 2006. Discovering dependencies for network management. ( 2006 ).  Victor Bahl Paul Barham Richard Black Ranveer Chandra Moises Goldszmidt Rebecca Isaacs Srikanth Kandula Lun Li John MacCormick Dave Maltz et al. 2006. Discovering dependencies for network management. ( 2006 )."},{"key":"e_1_3_2_2_2_1","volume-title":"Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 18-18","author":"Barham Paul","year":"2004","unstructured":"Paul Barham , Austin Donnelly , Rebecca Isaacs , and Richard Mortier . 2004 . Using Magpie for request extraction and workload modelling . In Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 18-18 . Paul Barham, Austin Donnelly, Rebecca Isaacs, and Richard Mortier. 2004. Using Magpie for request extraction and workload modelling. In Proceedings of the 6th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 18-18."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2008.45"},{"key":"e_1_3_2_2_4_1","unstructured":"Aaron Brown Gautam Kar and Alexander Keller. 2001. An active approach to characterizing dynamic dependencies for problem determination in a distributed environment. In Proceedings of the 2001 IEEE\/IFIP International Symposium on Integrated Network Management. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No. 01EX470 ). IEEE 377-390.  Aaron Brown Gautam Kar and Alexander Keller. 2001. An active approach to characterizing dynamic dependencies for problem determination in a distributed environment. In Proceedings of the 2001 IEEE\/IFIP International Symposium on Integrated Network Management. Integrated Network Management VII. Integrated Management Strategies for the New Millennium (Cat. No. 01EX470 ). IEEE 377-390."},{"key":"e_1_3_2_2_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00020"},{"key":"e_1_3_2_2_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00042"},{"key":"e_1_3_2_2_7_1","volume-title":"Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 117-130","author":"Chen Xu","year":"2008","unstructured":"Xu Chen , Ming Zhang , Zhuoqing Morley Mao , and Paramvir Bahl . 2008 . Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions . In Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 117-130 . Xu Chen, Ming Zhang, Zhuoqing Morley Mao, and Paramvir Bahl. 2008. Automating Network Application Dependency Discovery: Experiences, Limitations, and New Solutions. In Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 117-130."},{"key":"e_1_3_2_2_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3308558.3313501"},{"key":"e_1_3_2_2_9_1","volume-title":"Path-based failure and evolution management","author":"Michael Chen Yen-Yang","unstructured":"Yen-Yang Michael Chen , Anthony J Accardi , Emre Kiciman , David A Patterson , Armando Fox , and Eric A Brewer . 2004. Path-based failure and evolution management . University of California , Berkeley. Yen-Yang Michael Chen, Anthony J Accardi, Emre Kiciman, David A Patterson, Armando Fox, and Eric A Brewer. 2004. Path-based failure and evolution management. University of California, Berkeley."},{"key":"e_1_3_2_2_10_1","unstructured":"Zhuangbin Chen Yu Kang Feng Gao Li Yang Jefrey Sun Zhangwei Xu Pu Zhao Bo Qiao Liqun Li Xu Zhang etal 2020. AIOps Innovations of Incident Management for Cloud Services. ( 2020 ).  Zhuangbin Chen Yu Kang Feng Gao Li Yang Jefrey Sun Zhangwei Xu Pu Zhao Bo Qiao Liqun Li Xu Zhang et al. 2020. AIOps Innovations of Incident Management for Cloud Services. ( 2020 )."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.69"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00023"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2014.39"},{"key":"e_1_3_2_2_14_1","volume-title":"Proceedings of the 29th International Conference on Machine Learning (ICML). 923-930","author":"Fedorova Valentina","year":"2012","unstructured":"Valentina Fedorova , Alex Gammerman , Ilia Nouretdinov , and Vladimir Vovk . 2012 . Plug-in martingales for testing exchangeability on-line . In Proceedings of the 29th International Conference on Machine Learning (ICML). 923-930 . Valentina Fedorova, Alex Gammerman, Ilia Nouretdinov, and Vladimir Vovk. 2012. Plug-in martingales for testing exchangeability on-line. In Proceedings of the 29th International Conference on Machine Learning (ICML). 923-930."},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.60"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987550.2987583"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238193"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236083"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"},{"key":"e_1_3_2_2_20_1","volume-title":"A martingale framework for detecting changes in data streams by testing exchangeability","author":"Ho Shen-Shyang","year":"2010","unstructured":"Shen-Shyang Ho and Harry Wechsler . 2010. A martingale framework for detecting changes in data streams by testing exchangeability . IEEE transactions on pattern analysis and machine intelligence 32, 12 ( 2010 ), 2113-2127. Shen-Shyang Ho and Harry Wechsler. 2010. A martingale framework for detecting changes in data streams by testing exchangeability. IEEE transactions on pattern analysis and machine intelligence 32, 12 ( 2010 ), 2113-2127."},{"key":"e_1_3_2_2_21_1","volume-title":"Proceedings of the 25th International Symposium on Software Reliability Engineering (ISSRE). IEEE, 122-132","author":"Hu Hao","year":"2014","unstructured":"Hao Hu , Hongyu Zhang , Jifeng Xuan , and Weigang Sun . 2014 . Efective bug triage based on historical bug-fix information . In Proceedings of the 25th International Symposium on Software Reliability Engineering (ISSRE). IEEE, 122-132 . Hao Hu, Hongyu Zhang, Jifeng Xuan, and Weigang Sun. 2014. Efective bug triage based on historical bug-fix information. In Proceedings of the 25th International Symposium on Software Reliability Engineering (ISSRE). IEEE, 122-132."},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102980.3103005"},{"key":"e_1_3_2_2_23_1","unstructured":"Moogsoft Inc. 2019. Everything You Need to Know About AIOps. https:\/\/www. moogsoft.com\/resources\/aiops\/guide\/everything-aiops\/.  Moogsoft Inc. 2019. Everything You Need to Know About AIOps. https:\/\/www. moogsoft.com\/resources\/aiops\/guide\/everything-aiops\/."},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/P17-1052"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/D14-1181"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3117776"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236060"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884795"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889232"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1740390.1740411"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693105"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/UCC.2014.128"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338963"},{"key":"e_1_3_2_2_34_1","volume-title":"Proceedings of the 2018 USENIX Annual Technical Conference (USENIX ATC). 481-494","author":"Xu Yong","year":"2018","unstructured":"Yong Xu , Kaixin Sui , Randolph Yao , Hongyu Zhang , Qingwei Lin , Yingnong Dang , Peng Li , Keceng Jiang , Wenchi Zhang , Jian-Guang Lou , 2018 . Improving service availability of cloud systems by predicting disk error . In Proceedings of the 2018 USENIX Annual Technical Conference (USENIX ATC). 481-494 . Yong Xu, Kaixin Sui, Randolph Yao, Hongyu Zhang, Qingwei Lin, Yingnong Dang, Peng Li, Keceng Jiang, Wenchi Zhang, Jian-Guang Lou, et al. 2018. Improving service availability of cloud systems by predicting disk error. In Proceedings of the 2018 USENIX Annual Technical Conference (USENIX ATC). 481-494."},{"key":"e_1_3_2_2_35_1","article-title":"Cloudscout: A non-intrusive approach to service dependency discovery","volume":"28","author":"Yin Jianwei","year":"2016","unstructured":"Jianwei Yin , Xinkui Zhao , Yan Tang , Chen Zhi , Zuoning Chen , and Zhaohui Wu . 2016 . Cloudscout: A non-intrusive approach to service dependency discovery . IEEE Transactions on Parallel and Distributed Systems 28 , 5 ( 2016 ), 1271-1284. Jianwei Yin, Xinkui Zhao, Yan Tang, Chen Zhi, Zuoning Chen, and Zhaohui Wu. 2016. Cloudscout: A non-intrusive approach to service dependency discovery. IEEE Transactions on Parallel and Distributed Systems 28, 5 ( 2016 ), 1271-1284.","journal-title":"IEEE Transactions on Parallel and Distributed Systems"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606654"},{"key":"e_1_3_2_2_37_1","volume-title":"Proceedings of the 2019 USENIX Annual Technical Conference (USENIX ATC). 1063-1076","author":"Zhang Xu","year":"2019","unstructured":"Xu Zhang , Qingwei Lin , Yong Xu , Si Qin , Hongyu Zhang , Bo Qiao , Yingnong Dang , Xinsheng Yang , Qian Cheng , Murali Chintalapati , 2019 . Cross-dataset time series anomaly detection for cloud systems . In Proceedings of the 2019 USENIX Annual Technical Conference (USENIX ATC). 1063-1076 . Xu Zhang, Qingwei Lin, Yong Xu, Si Qin, Hongyu Zhang, Bo Qiao, Yingnong Dang, Xinsheng Yang, Qian Cheng, Murali Chintalapati, et al. 2019. Cross-dataset time series anomaly detection for cloud systems. In Proceedings of the 2019 USENIX Annual Technical Conference (USENIX ATC). 1063-1076."},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00041"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.130"}],"event":{"name":"ESEC\/FSE '20: 28th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Virtual Event USA","acronym":"ESEC\/FSE '20","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3417055","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3368089.3417055","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:58Z","timestamp":1750197718000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3368089.3417055"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,11,8]]},"references-count":40,"alternative-id":["10.1145\/3368089.3417055","10.1145\/3368089"],"URL":"https:\/\/doi.org\/10.1145\/3368089.3417055","relation":{},"subject":[],"published":{"date-parts":[[2020,11,8]]},"assertion":[{"value":"2020-11-08","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}