{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,9]],"date-time":"2025-12-09T08:25:07Z","timestamp":1765268707633,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T00:00:00Z","timestamp":1596067200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"NSF","award":["CNS1834263"],"award-info":[{"award-number":["CNS1834263"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,7,30]]},"DOI":"10.1145\/3387514.3405867","type":"proceedings-article","created":{"date-parts":[[2020,7,30]],"date-time":"2020-07-30T22:35:31Z","timestamp":1596148531000},"page":"253-269","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Scouts"],"prefix":"10.1145","author":[{"given":"Jiaqi","family":"Gao","sequence":"first","affiliation":[{"name":"Harvard University"}]},{"given":"Nofel","family":"Yaseen","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Robert","family":"MacDavid","sequence":"additional","affiliation":[{"name":"Princeton University"}]},{"given":"Felipe Vieira","family":"Frujeri","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Vincent","family":"Liu","sequence":"additional","affiliation":[{"name":"University of Pennsylvania"}]},{"given":"Ricardo","family":"Bianchini","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]},{"given":"Ramaswamy","family":"Aditya","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Xiaohang","family":"Wang","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Henry","family":"Lee","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"David","family":"Maltz","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Minlan","family":"Yu","sequence":"additional","affiliation":[{"name":"Harvard University"}]},{"given":"Behnaz","family":"Arzani","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]}],"member":"320","published-online":{"date-parts":[[2020,7,30]]},"reference":[{"unstructured":"Adaboost. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.ensemble.AdaBoostClassifier.html.  Adaboost. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.ensemble.AdaBoostClassifier.html.","key":"e_1_3_2_2_1_1"},{"unstructured":"Azure cloud incidents. https:\/\/azure.microsoft.com\/en-us\/status\/history\/.  Azure cloud incidents. https:\/\/azure.microsoft.com\/en-us\/status\/history\/.","key":"e_1_3_2_2_2_1"},{"unstructured":"Canary analysis: Lessons learned and best practicies from google and waze. https:\/\/cloud.google.com\/blog\/products\/devops-sre\/canary-analysis-lessons-learned-and-best-practices-from-google-and-waze.  Canary analysis: Lessons learned and best practicies from google and waze. https:\/\/cloud.google.com\/blog\/products\/devops-sre\/canary-analysis-lessons-learned-and-best-practices-from-google-and-waze.","key":"e_1_3_2_2_3_1"},{"unstructured":"The curse of dimensionality in classification. https:\/\/www.visiondummy.com\/2014\/04\/curse-dimensionality-affect-classification\/.  The curse of dimensionality in classification. https:\/\/www.visiondummy.com\/2014\/04\/curse-dimensionality-affect-classification\/.","key":"e_1_3_2_2_4_1"},{"unstructured":"Gaussian Naive Bayes. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.naive_bayes.GaussianNB.html.  Gaussian Naive Bayes. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.naive_bayes.GaussianNB.html.","key":"e_1_3_2_2_5_1"},{"unstructured":"General data protection regulation. https:\/\/ec.europa.eu\/info\/law\/law-topic\/data-protection_en.  General data protection regulation. https:\/\/ec.europa.eu\/info\/law\/law-topic\/data-protection_en.","key":"e_1_3_2_2_6_1"},{"unstructured":"Google cloud incidents. https:\/\/status.cloud.google.com\/summary.  Google cloud incidents. https:\/\/status.cloud.google.com\/summary.","key":"e_1_3_2_2_7_1"},{"unstructured":"K nearest neighbors. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.neighbors.KNeighborsClassifier.html#sklearn.neighbors.KNeighborsClassifier.  K nearest neighbors. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.neighbors.KNeighborsClassifier.html#sklearn.neighbors.KNeighborsClassifier.","key":"e_1_3_2_2_8_1"},{"unstructured":"Neural Networks. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.neural_network.MLPClassifier.html.  Neural Networks. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.neural_network.MLPClassifier.html.","key":"e_1_3_2_2_9_1"},{"unstructured":"Quadratic Discriminant Analysis. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.discriminant_analysis.QuadraticDiscriminantAnalysis.html.  Quadratic Discriminant Analysis. https:\/\/scikit-learn.org\/stable\/modules\/generated\/sklearn.discriminant_analysis.QuadraticDiscriminantAnalysis.html.","key":"e_1_3_2_2_10_1"},{"key":"e_1_3_2_2_11_1","first-page":"349","volume-title":"NSDI","volume":"9","author":"Agarwal B.","year":"2009","unstructured":"Agarwal , B. , Bhagwan , R. , Das , T. , Eswaran , S. , Padmanabhan , V. N. , and Voelker , G. M . Netprints: Diagnosing home network misconfigurations using shared knowledge . In NSDI ( 2009 ), vol. 9 , pp. 349 -- 364 . Agarwal, B., Bhagwan, R., Das, T., Eswaran, S., Padmanabhan, V. N., and Voelker, G. M. Netprints: Diagnosing home network misconfigurations using shared knowledge. In NSDI (2009), vol. 9, pp. 349--364."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_12_1","DOI":"10.1145\/3341301.3359664"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_13_1","DOI":"10.1145\/1134285.1134336"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_14_1","DOI":"10.1145\/3123878.3131979"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_15_1","DOI":"10.1145\/2934872.2934884"},{"key":"e_1_3_2_2_16_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Arzani B.","year":"2020","unstructured":"Arzani , B. , Ciraci , S. , Saroiu , S. , Wolman , A. , Stokes , J. , Outhred , G. , and Diwu , L . Madeye: Scalable and privacy-preserving compromise detection in the cloud . In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) ( 2020 ), USENIX Association. Arzani, B., Ciraci, S., Saroiu, S., Wolman, A., Stokes, J., Outhred, G., and Diwu, L. Madeye: Scalable and privacy-preserving compromise detection in the cloud. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) (2020), USENIX Association."},{"key":"e_1_3_2_2_17_1","first-page":"13","volume-title":"ACM SIGCOMM Computer Communication Review","author":"Bahl P.","year":"2007","unstructured":"Bahl , P. , Chandra , R. , Greenberg , A. , Kandula , S. , Maltz , D. A. , and Zhang , M . Towards highly reliable enterprise network services via inference of multilevel dependencies . In ACM SIGCOMM Computer Communication Review ( 2007 ), vol. 37 , ACM , pp. 13 -- 24 . Bahl, P., Chandra, R., Greenberg, A., Kandula, S., Maltz, D. A., and Zhang, M. Towards highly reliable enterprise network services via inference of multilevel dependencies. In ACM SIGCOMM Computer Communication Review (2007), vol. 37, ACM, pp. 13--24."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_18_1","DOI":"10.1109\/CNS.2015.7346821"},{"key":"e_1_3_2_2_19_1","first-page":"15","article-title":"A first look at problems in the cloud","volume":"10","author":"Benson T.","year":"2010","unstructured":"Benson , T. , Sahu , S. , Akella , A. , and Shaikh , A . A first look at problems in the cloud . HotCloud 10 ( 2010 ), 15 . Benson, T., Sahu, S., Akella, A., and Shaikh, A. A first look at problems in the cloud. HotCloud 10 (2010), 15.","journal-title":"HotCloud"},{"key":"e_1_3_2_2_20_1","volume-title":"Simple network management protocol (snmp). Tech. rep","author":"Case J. D.","year":"1990","unstructured":"Case , J. D. , Fedor , M. , Schoffstall , M. L. , and Davin , J . Simple network management protocol (snmp). Tech. rep ., 1990 . Case, J. D., Fedor, M., Schoffstall, M. L., and Davin, J. Simple network management protocol (snmp). Tech. rep., 1990."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_21_1","DOI":"10.1109\/ICSE-SEIP.2019.00020"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_22_1","DOI":"10.1109\/ICAC.2004.1301345"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_23_1","DOI":"10.1145\/3132747.3132772"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_24_1","DOI":"10.1145\/3180465.3180467"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_25_1","DOI":"10.1145\/2716281.2836109"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_26_1","DOI":"10.1109\/TIT.2006.885460"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_27_1","DOI":"10.1016\/j.peva.2005.07.022"},{"key":"e_1_3_2_2_28_1","volume-title":"The syslog protocol. Tech. rep","author":"Gerhards R.","year":"2009","unstructured":"Gerhards , R. The syslog protocol. Tech. rep ., 2009 . Gerhards, R. The syslog protocol. Tech. rep., 2009."},{"key":"e_1_3_2_2_29_1","volume-title":"Rinc: Real-time inference-based network diagnosis in the cloud","author":"Ghasemi M.","year":"2015","unstructured":"Ghasemi , M. , Benson , T. , and Rexford , J . Rinc: Real-time inference-based network diagnosis in the cloud . Princeton University ( 2015 ). Ghasemi, M., Benson, T., and Rexford, J. Rinc: Real-time inference-based network diagnosis in the cloud. Princeton University (2015)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_30_1","DOI":"10.1145\/2433140.2433146"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_31_1","DOI":"10.1145\/2018436.2018477"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_32_1","DOI":"10.1007\/978-3-540-31865-1_25"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_33_1","DOI":"10.1145\/2934872.2934891"},{"key":"e_1_3_2_2_34_1","first-page":"139","volume-title":"B., Chen, H., et al. Pingmesh: A large-scale system for data center network latency measurement and analysis. In ACM SIGCOMM Computer Communication Review","author":"Guo C.","year":"2015","unstructured":"Guo , C. , Yuan , L. , Xiang , D. , Dang , Y. , Huang , R. , Maltz , D. , Liu , Z. , Wang , v., Pang , B., Chen, H., et al. Pingmesh: A large-scale system for data center network latency measurement and analysis. In ACM SIGCOMM Computer Communication Review ( 2015 ), vol. 45 , ACM , pp. 139 -- 152 . Guo, C., Yuan, L., Xiang, D., Dang, Y., Huang, R., Maltz, D., Liu, Z., Wang, v., Pang, B., Chen, H., et al. Pingmesh: A large-scale system for data center network latency measurement and analysis. In ACM SIGCOMM Computer Communication Review (2015), vol. 45, ACM, pp. 139--152."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_35_1","DOI":"10.1145\/1958824.1958887"},{"key":"e_1_3_2_2_36_1","first-page":"21","volume-title":"Workshop on Automatic Machine Learning","author":"Guyon I.","year":"2016","unstructured":"Guyon , I. , Chaabane , I. , Escalante , H. J. , Escalera , S. , Jajetic , D. , Lloyd , J. R. , Maci\u00e0 , N. , Ray , B. , Romaszko , L. , Sebag , M. , Abrief review of the chalearn automl challenge: any-time any-dataset learning without human intervention . In Workshop on Automatic Machine Learning ( 2016 ), pp. 21 -- 30 . Guyon, I., Chaabane, I., Escalante, H. J., Escalera, S., Jajetic, D., Lloyd, J. R., Maci\u00e0, N., Ray, B., Romaszko, L., Sebag, M., et al. Abrief review of the chalearn automl challenge: any-time any-dataset learning without human intervention. In Workshop on Automatic Machine Learning (2016), pp. 21--30."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_37_1","DOI":"10.1145\/2491185.2491197"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_38_1","DOI":"10.1145\/2623330.2623365"},{"key":"e_1_3_2_2_39_1","volume-title":"Finding bugs is easy. Acm sigplan notices 39, 12","author":"Hovemeyer D.","year":"2004","unstructured":"Hovemeyer , D. , and Pugh , W . Finding bugs is easy. Acm sigplan notices 39, 12 ( 2004 ), 92--106. Hovemeyer, D., and Pugh, W. Finding bugs is easy. Acm sigplan notices 39, 12 (2004), 92--106."},{"key":"e_1_3_2_2_40_1","volume-title":"Proc. of the Int'l Conf. on Artificial Intelligence","author":"Japkowicz N.","year":"2000","unstructured":"Japkowicz , N. The class imbalance problem: Significance and strategies . In Proc. of the Int'l Conf. on Artificial Intelligence ( 2000 ). Japkowicz, N. The class imbalance problem: Significance and strategies. In Proc. of the Int'l Conf. on Artificial Intelligence (2000)."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_41_1","DOI":"10.1145\/1595696.1595715"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_42_1","DOI":"10.1145\/1080173.1080178"},{"key":"e_1_3_2_2_43_1","first-page":"219","volume-title":"NSDI","volume":"10","author":"Katz-Bassett E.","year":"2010","unstructured":"Katz-Bassett , E. , Madhyastha , H. v. , Adhikari , V. K. , Scott , C. , Sherry , J. , Van Wesep , P. , Anderson , T. E. , and Krishnamurthy , A . Reverse traceroute . In NSDI ( 2010 ), vol. 10 , pp. 219 -- 234 . Katz-Bassett, E., Madhyastha, H. v., Adhikari, V. K., Scott, C., Sherry, J., Van Wesep, P., Anderson, T. E., and Krishnamurthy, A. Reverse traceroute. In NSDI (2010), vol. 10, pp. 219--234."},{"doi-asserted-by":"crossref","unstructured":"Kim Y. Huang J. and Emery S. Garbage in garbage out: data collection quality assessment and reporting standards for social media data use in health research infodemiology and digital disease detection. Journal of medical Internet research 18 2 (2016) e41.  Kim Y. Huang J. and Emery S. Garbage in garbage out: data collection quality assessment and reporting standards for social media data use in health research infodemiology and digital disease detection. Journal of medical Internet research 18 2 (2016) e41.","key":"e_1_3_2_2_44_1","DOI":"10.2196\/jmir.4738"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_45_1","DOI":"10.5555\/1251203.1251208"},{"key":"e_1_3_2_2_46_1","volume-title":"K. Auto-weka 2.0: Automatic model selection and hyperparameter optimization in weka. The Journal of Machine Learning Research 18, 1","author":"Kotthoff L.","year":"2017","unstructured":"Kotthoff , L. , Thornton , C. , Hoos , H. H. , Hutter , f., and Leyton-Brown , K. Auto-weka 2.0: Automatic model selection and hyperparameter optimization in weka. The Journal of Machine Learning Research 18, 1 ( 2017 ), 826--830. Kotthoff, L., Thornton, C., Hoos, H. H., Hutter, f., and Leyton-Brown, K. Auto-weka 2.0: Automatic model selection and hyperparameter optimization in weka. The Journal of Machine Learning Research 18, 1 (2017), 826--830."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_47_1","DOI":"10.1007\/11553595_6"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_48_1","DOI":"10.1145\/2663716.2663723"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_49_1","DOI":"10.1145\/1165389.945456"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_50_1","DOI":"10.1007\/978-3-540-79232-1_16"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_51_1","DOI":"10.1080\/01621459.2013.849605"},{"key":"e_1_3_2_2_52_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Mogul J.","year":"2020","unstructured":"Mogul , J. , Goricanec , D. , Pool , M. , Shaikh , a., Koley , B. , and Zhao , X . Experiences with modeling network topologies at multiple levels of abstraction . In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) ( 2020 ). Mogul, J., Goricanec, D., Pool, M., Shaikh, a., Koley, B., and Zhao, X. Experiences with modeling network topologies at multiple levels of abstraction. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20) (2020)."},{"key":"e_1_3_2_2_53_1","first-page":"255","volume-title":"USENIX Annual Technical Conference","author":"Mysore R. N.","year":"2014","unstructured":"Mysore , R. N. , Mahajan , R. , Vahdat , A. , and Varghese , G . Gestalt: Fast, unified fault localization for networked systems . In USENIX Annual Technical Conference ( 2014 ), pp. 255 -- 267 . Mysore, R. N., Mahajan, R., Vahdat, A., and Varghese, G. Gestalt: Fast, unified fault localization for networked systems. In USENIX Annual Technical Conference (2014), pp. 255--267."},{"key":"e_1_3_2_2_54_1","volume-title":"Tutorial on maximum likelihood estimation. Journal of mathematical Psychology 47, 1","author":"Myung I.J.","year":"2003","unstructured":"Myung , I.J. Tutorial on maximum likelihood estimation. Journal of mathematical Psychology 47, 1 ( 2003 ), 90--100. Myung, I.J. Tutorial on maximum likelihood estimation. Journal of mathematical Psychology 47, 1 (2003), 90--100."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_55_1","DOI":"10.1109\/NOMS.2016.7502809"},{"key":"e_1_3_2_2_56_1","first-page":"151","volume-title":"Automated Machine Learning","author":"Oison R. S.","year":"2019","unstructured":"Oison , R. S. , and Moore , J. H . Tpot: A tree-based pipeline optimization tool for automating machine learning . In Automated Machine Learning . Springer , 2019 , pp. 151 -- 160 . Oison, R. S., and Moore, J. H. Tpot: A tree-based pipeline optimization tool for automating machine learning. In Automated Machine Learning. Springer, 2019, pp. 151--160."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_57_1","DOI":"10.1109\/IRI.2013.6642461"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_58_1","DOI":"10.1145\/2494232.2465749"},{"key":"e_1_3_2_2_59_1","first-page":"595","volume-title":"NSDI","author":"Roy A.","year":"2017","unstructured":"Roy , A. , Zeng , H. , Bagga , J. , and Snoeren , A. C . Passive realtime datacenter fault detection and localization . In NSDI ( 2017 ), pp. 595 -- 612 . Roy, A., Zeng, H., Bagga, J., and Snoeren, A. C. Passive realtime datacenter fault detection and localization. In NSDI (2017), pp. 595--612."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_60_1","DOI":"10.1109\/ASE.2013.6693093"},{"key":"e_1_3_2_2_61_1","volume-title":"Datacenter scale evaluation of the impact of temperature on hard disk drive failures. ACM Transactions on Storage (TOS) 9, 2","author":"Sankar S.","year":"2013","unstructured":"Sankar , S. , Shaw , M. , Vaid , K. , and Gurumurthi , S . Datacenter scale evaluation of the impact of temperature on hard disk drive failures. ACM Transactions on Storage (TOS) 9, 2 ( 2013 ), 6. Sankar, S., Shaw, M., Vaid, K., and Gurumurthi, S. Datacenter scale evaluation of the impact of temperature on hard disk drive failures. ACM Transactions on Storage (TOS) 9, 2 (2013), 6."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_62_1","DOI":"10.1145\/2740070.2626304"},{"key":"e_1_3_2_2_63_1","first-page":"233","volume-title":"OSDI","author":"Tammana P.","year":"2016","unstructured":"Tammana , P. , Agarwal , R. , and Lee , M . Simplifying datacenter network debugging with pathdump . In OSDI ( 2016 ), pp. 233 -- 248 . Tammana, P., Agarwal, R., and Lee, M. Simplifying datacenter network debugging with pathdump. In OSDI (2016), pp. 233--248."},{"key":"e_1_3_2_2_64_1","volume-title":"16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)","author":"Tan C.","year":"2019","unstructured":"Tan , C. , Jin , Z. , Guo , C. , Zhang , T. , Wu , H. , Deng , K. , Bi , D. , and Xiang , D . Netbouncer: Active device and link failure localization in data center networks . In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) ( 2019 ). Tan, C., Jin, Z., Guo, C., Zhang, T., Wu, H., Deng, K., Bi, D., and Xiang, D. Netbouncer: Active device and link failure localization in data center networks. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) (2019)."},{"key":"e_1_3_2_2_65_1","volume-title":"A perspective view and survey of meta-learning. Artificial intelligence review 18, 2","author":"Vilalta R.","year":"2002","unstructured":"Vilalta , R. , and Drissi , Y . A perspective view and survey of meta-learning. Artificial intelligence review 18, 2 ( 2002 ), 77--95. Vilalta, R., and Drissi, Y. A perspective view and survey of meta-learning. Artificial intelligence review 18, 2 (2002), 77--95."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_66_1","DOI":"10.1109\/TDSC.2015.2457918"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_67_1","DOI":"10.1109\/UCC.2011.42"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_68_1","DOI":"10.1145\/2486001.2486020"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_69_1","DOI":"10.1145\/2523616.2523621"},{"key":"e_1_3_2_2_70_1","volume-title":"16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19)","author":"Yu D.","year":"2019","unstructured":"Yu , D. , Zhu , Y. , Arzani , B. , Fonseca , R. , Zhang , T. , Deng , K. , and Yuan , L . dshark: A general, easy to program and scalable framework for analyzing innetwork packet traces . In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) ( 2019 ). Yu, D., Zhu, Y., Arzani, B., Fonseca, R., Zhang, T., Deng, K., and Yuan, L. dshark: A general, easy to program and scalable framework for analyzing innetwork packet traces. In 16th USENIX Symposium on Networked Systems Design and Implementation (NSDI 19) (2019)."},{"key":"e_1_3_2_2_71_1","first-page":"5","volume-title":"NSDI","volume":"11","author":"Yu M.","year":"2011","unstructured":"Yu , M. , Greenberg , A. G. , Maltz , D. A. , Rexford , J. , Yuan , L. , Kandula , S. , and Kim , C . Profiling network performance for multi-tier data center applications . In NSDI ( 2011 ), vol. 11 , pp. 5 -- 5 . Yu, M., Greenberg, A. G., Maltz, D. A., Rexford, J., Yuan, L., Kandula, S., and Kim, C. Profiling network performance for multi-tier data center applications. In NSDI (2011), vol. 11, pp. 5--5."},{"key":"e_1_3_2_2_72_1","first-page":"10","article-title":"Spark: Cluster computing with working sets","volume":"10","author":"Zaharia M.","year":"2010","unstructured":"Zaharia , M. , Chowdhury , M. , Franklin , M. J. , Shenker , S. , and Stoica , I . Spark: Cluster computing with working sets . HotCloud 10 , 10 - 10 ( 2010 ), 95. Zaharia, M., Chowdhury, M., Franklin, M. J., Shenker, S., and Stoica, I. Spark: Cluster computing with working sets. HotCloud 10, 10-10 (2010), 95.","journal-title":"HotCloud"},{"key":"e_1_3_2_2_73_1","volume-title":"15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18)","author":"Zhang Q.","year":"2018","unstructured":"Zhang , Q. , Yu , G. , Guo , C. , Dang , Y. , Swanson , N. , Yang , X. , Yao , R. , Chintalapati , M. , Krishnamurthy , A. , and Anderson , T . Deepview: Virtual disk failure diagnosis and pattern detection for azure . In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18) ( 2018 ), USENIX Association. Zhang, Q., Yu, G., Guo, C., Dang, Y., Swanson, N., Yang, X., Yao, R., Chintalapati, M., Krishnamurthy, A., and Anderson, T. Deepview: Virtual disk failure diagnosis and pattern detection for azure. In 15th USENIX Symposium on Networked Systems Design and Implementation (NSDI 18) (2018), USENIX Association."},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_74_1","DOI":"10.1145\/1592568.1592600"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_75_1","DOI":"10.1145\/1159913.1159939"},{"doi-asserted-by":"publisher","key":"e_1_3_2_2_76_1","DOI":"10.1145\/2829988.2787483"}],"event":{"sponsor":["SIGCOMM ACM Special Interest Group on Data Communication"],"acronym":"SIGCOMM '20","name":"SIGCOMM '20: Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication","location":"Virtual Event USA"},"container-title":["Proceedings of the Annual conference of the ACM Special Interest Group on Data Communication on the applications, technologies, architectures, and protocols for computer communication"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387514.3405867","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387514.3405867","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387514.3405867","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:41:36Z","timestamp":1750200096000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387514.3405867"}},"subtitle":["Improving the Diagnosis Process Through Domain-customized Incident Routing"],"short-title":[],"issued":{"date-parts":[[2020,7,30]]},"references-count":76,"alternative-id":["10.1145\/3387514.3405867","10.1145\/3387514"],"URL":"https:\/\/doi.org\/10.1145\/3387514.3405867","relation":{},"subject":[],"published":{"date-parts":[[2020,7,30]]},"assertion":[{"value":"2020-07-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}