{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,3]],"date-time":"2026-04-03T01:26:39Z","timestamp":1775179599178,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,4,19]],"date-time":"2021-04-19T00:00:00Z","timestamp":1618790400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,4,19]]},"DOI":"10.1145\/3442381.3449905","type":"proceedings-article","created":{"date-parts":[[2021,6,3]],"date-time":"2021-06-03T19:02:07Z","timestamp":1622746927000},"page":"3087-3098","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":112,"title":["MicroRank: End-to-End Latency Issue Localization with Extended Spectrum Analysis in Microservice Environments"],"prefix":"10.1145","author":[{"given":"Guangba","family":"Yu","sequence":"first","affiliation":[{"name":"Sun Yat-Sen University, China"}]},{"given":"Pengfei","family":"Chen","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Hongyang","family":"Chen","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Zijie","family":"Guan","sequence":"additional","affiliation":[{"name":"Tencent, China"}]},{"given":"Zicheng","family":"Huang","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Linxiao","family":"Jing","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]},{"given":"Tianjun","family":"Weng","sequence":"additional","affiliation":[{"name":"Sun Yat-Sen University, China"}]},{"given":"Xinmeng","family":"Sun","sequence":"additional","affiliation":[{"name":"Sun Yat-Sen University, China"}]},{"given":"Xiaoyun","family":"Li","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, China"}]}],"member":"320","published-online":{"date-parts":[[2021,6,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/1308173.1308264"},{"key":"e_1_3_2_1_2_1","volume-title":"6th Symposium on Operating System Design and Implementation. USENIX Association, 259\u2013272","author":"Barham Paul","year":"2004","unstructured":"Paul Barham , Austin Donnelly , Rebecca Isaacs , and Richard Mortier . 2004 . Using magpie for request extraction and workload modelling . In 6th Symposium on Operating System Design and Implementation. USENIX Association, 259\u2013272 . Paul Barham, Austin Donnelly, Rebecca Isaacs, and Richard Mortier. 2004. Using magpie for request extraction and workload modelling. In 6th Symposium on Operating System Design and Implementation. USENIX Association, 259\u2013272."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2331576.2331586"},{"key":"e_1_3_2_1_4_1","volume-title":"1st Symposium on Networked Systems Design and Implementation. USENIX, 309\u2013322","author":"Chen Y.","year":"2004","unstructured":"Mike\u00a0 Y. Chen , Anthony\u00a0 J. Accardi , Emre Kiciman , David\u00a0 A. Patterson , Armando Fox , and Eric\u00a0 A. Brewer . 2004 . Path-based failure and evolution management . In 1st Symposium on Networked Systems Design and Implementation. USENIX, 309\u2013322 . Mike\u00a0Y. Chen, Anthony\u00a0J. Accardi, Emre Kiciman, David\u00a0A. Patterson, Armando Fox, and Eric\u00a0A. Brewer. 2004. Path-based failure and evolution management. In 1st Symposium on Networked Systems Design and Implementation. USENIX, 309\u2013322."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM.2014.6848128"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2567390"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of the 4th USENIX conference on Networked systems design & implementation. 20\u201320","author":"Fonseca Rodrigo","year":"2007","unstructured":"Rodrigo Fonseca , George Porter , Randy\u00a0 H Katz , Scott Shenker , and Ion Stoica . 2007 . X-trace: A pervasive network tracing framework . In Proceedings of the 4th USENIX conference on Networked systems design & implementation. 20\u201320 . Rodrigo Fonseca, George Porter, Randy\u00a0H Katz, Scott Shenker, and Ion Stoica. 2007. X-trace: A pervasive network tracing framework. In Proceedings of the 4th USENIX conference on Networked systems design & implementation. 20\u201320."},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 24th International Conference on Architectural Support for Programming Languages and Operating Systems. 3\u201318","author":"Gan Yu","unstructured":"Yu Gan , Yanqi Zhang , and Dailun\u00a0Cheng et al.2019. An open-Source benchmark suite for microservices and their hardware-software implications for cloud & edge systems . In Proceedings of the 24th International Conference on Architectural Support for Programming Languages and Operating Systems. 3\u201318 . Yu Gan, Yanqi Zhang, and Dailun\u00a0Cheng et al.2019. An open-Source benchmark suite for microservices and their hardware-software implications for cloud & edge systems. In Proceedings of the 24th International Conference on Architectural Support for Programming Languages and Operating Systems. 3\u201318."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3038912.3052649"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/775152.775191"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00054"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00054"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581397"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132749"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1594977.1592597"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931051"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ifacol.2015.09.146"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342280.3342288"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03596-9_1"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCPS.2016.7479069"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/CDC.2017.8264527"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380111"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1657755.1657756"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000791.2000795"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2013.26"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 39th International Conference on Software Engineering. IEEE \/ ACM, 609\u2013620","author":"Pearson Spencer","unstructured":"Spencer Pearson and Jos\u00e9\u00a0Campos etc.2017. Evaluating and improving fault localization . In Proceedings of the 39th International Conference on Software Engineering. IEEE \/ ACM, 609\u2013620 . Spencer Pearson and Jos\u00e9\u00a0Campos etc.2017. Evaluating and improving fault localization. In Proceedings of the 39th International Conference on Software Engineering. IEEE \/ ACM, 609\u2013620."},{"key":"e_1_3_2_1_28_1","volume-title":"Jeffrey\u00a0C Mogul, Mehul\u00a0A Shah, and Amin Vahdat.","author":"Reynolds Patrick","year":"2006","unstructured":"Patrick Reynolds , Charles\u00a0Edwin Killian , Janet\u00a0L Wiener , Jeffrey\u00a0C Mogul, Mehul\u00a0A Shah, and Amin Vahdat. 2006 . Pip: detecting the unexpected in distributed systems.. In NSDI, Vol .\u00a06. 9\u20139. Patrick Reynolds, Charles\u00a0Edwin Killian, Janet\u00a0L Wiener, Jeffrey\u00a0C Mogul, Mehul\u00a0A Shah, and Amin Vahdat. 2006. Pip: detecting the unexpected in distributed systems.. In NSDI, Vol.\u00a06. 9\u20139."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.5555\/1972457.1972463"},{"key":"e_1_3_2_1_30_1","volume-title":"The World Wide Web Conference. ACM, 3215\u20133222","author":"Shan Huasong","unstructured":"Huasong Shan and Yuan\u00a0Chen etc.2019. Diagnosis : unsupervised and real-time Diagnosis of small-window long-tail latency in large-scale microservice platforms . In The World Wide Web Conference. ACM, 3215\u20133222 . Huasong Shan and Yuan\u00a0Chen etc.2019. Diagnosis: unsupervised and real-time Diagnosis of small-window long-tail latency in large-scale microservice platforms. In The World Wide Web Conference. ACM, 3215\u20133222."},{"key":"e_1_3_2_1_31_1","unstructured":"Yuri Shkuro. 2019. Mastring Distributed Tracing. Packt.  Yuri Shkuro. 2019. Mastring Distributed Tracing. Packt."},{"key":"e_1_3_2_1_32_1","unstructured":"Benjamin\u00a0H Sigelman and et\u00a0al. Barroso. 2010. Dapper a large-scale distributed systems tracing infrastructure. (2010).  Benjamin\u00a0H Sigelman and et\u00a0al. Barroso. 2010. Dapper a large-scale distributed systems tracing infrastructure. (2010)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/3135974.3135977"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2018.00076"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2008.65"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/DNSR.2004.1344743"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2019.00023"},{"key":"e_1_3_2_1_38_1","volume-title":"Microscaler: cost-effective scaling for microservice applications in the cloud with an online learning Approach","author":"Yu Guangba","year":"2020","unstructured":"Guangba Yu , Pengfei Chen , and Zibin Zheng . 2020. Microscaler: cost-effective scaling for microservice applications in the cloud with an online learning Approach . IEEE Transactions on Cloud Computing( 2020 ). https:\/\/doi.org\/10.1109\/TCC.2020.2985352 Guangba Yu, Pengfei Chen, and Zibin Zheng. 2020. Microscaler: cost-effective scaling for microservice applications in the cloud with an online learning Approach. IEEE Transactions on Cloud Computing(2020). https:\/\/doi.org\/10.1109\/TCC.2020.2985352"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092731"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of the ACM Symposium on Cloud Computing. ACM, 149\u2013161","author":"Zhou Hao","unstructured":"Hao Zhou and Ming\u00a0Chen etc.2018. Overload control for scaling WeChat microservices . In Proceedings of the ACM Symposium on Cloud Computing. ACM, 149\u2013161 . Hao Zhou and Ming\u00a0Chen etc.2018. Overload control for scaling WeChat microservices. In Proceedings of the ACM Symposium on Cloud Computing. ACM, 149\u2013161."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338961"}],"event":{"name":"WWW '21: The Web Conference 2021","location":"Ljubljana Slovenia","acronym":"WWW '21","sponsor":["SIGWEB ACM Special Interest Group on Hypertext, Hypermedia, and Web"]},"container-title":["Proceedings of the Web Conference 2021"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442381.3449905","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3442381.3449905","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:31Z","timestamp":1750195471000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3442381.3449905"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,19]]},"references-count":40,"alternative-id":["10.1145\/3442381.3449905","10.1145\/3442381"],"URL":"https:\/\/doi.org\/10.1145\/3442381.3449905","relation":{},"subject":[],"published":{"date-parts":[[2021,4,19]]},"assertion":[{"value":"2021-06-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}