{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,19]],"date-time":"2026-03-19T14:43:33Z","timestamp":1773931413111,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":83,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,8,18]],"date-time":"2021-08-18T00:00:00Z","timestamp":1629244800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2019YFE0105500"],"award-info":[{"award-number":["2019YFE0105500"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"name":"State Key Program of National Natural Science of China","award":["62072264"],"award-info":[{"award-number":["62072264"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,8,20]]},"DOI":"10.1145\/3468264.3468543","type":"proceedings-article","created":{"date-parts":[[2021,8,19]],"date-time":"2021-08-19T01:44:18Z","timestamp":1629337458000},"page":"527-539","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":76,"title":["Identifying bad software changes via multimodal anomaly detection for online service systems"],"prefix":"10.1145","author":[{"given":"Nengwen","family":"Zhao","sequence":"first","affiliation":[{"name":"Tsinghua University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3056-9962","authenticated-orcid":false,"given":"Junjie","family":"Chen","sequence":"additional","affiliation":[{"name":"Tianjin University, China"}]},{"given":"Zhaoyang","family":"Yu","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]},{"given":"Honglin","family":"Wang","sequence":"additional","affiliation":[{"name":"BizSeer, China"}]},{"given":"Jiesong","family":"Li","sequence":"additional","affiliation":[{"name":"China Guangfa Bank, China"}]},{"given":"Bin","family":"Qiu","sequence":"additional","affiliation":[{"name":"China Guangfa Bank, China"}]},{"given":"Hongyu","family":"Xu","sequence":"additional","affiliation":[{"name":"China Guangfa Bank, China"}]},{"given":"Wenchi","family":"Zhang","sequence":"additional","affiliation":[{"name":"BizSeer, China"}]},{"given":"Kaixin","family":"Sui","sequence":"additional","affiliation":[{"name":"BizSeer, China"}]},{"given":"Dan","family":"Pei","sequence":"additional","affiliation":[{"name":"Tsinghua University, China"}]}],"member":"320","published-online":{"date-parts":[[2021,8,18]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"https:\/\/en.wikipedia.org\/wiki\/68-95-99.7_rule [Online","year":"2021","unstructured":"3-sigma rule. https:\/\/en.wikipedia.org\/wiki\/68-95-99.7_rule [Online ; accessed 10- Feb- 2021 ]. 3-sigma rule. https:\/\/en.wikipedia.org\/wiki\/68-95-99.7_rule [Online; accessed 10-Feb-2021]."},{"key":"e_1_3_2_1_2_1","volume-title":"https:\/\/grafana.com\/ [Online","year":"2021","unstructured":"Grafana. https:\/\/grafana.com\/ [Online ; accessed 10- Feb- 2021 ]. Grafana. https:\/\/grafana.com\/ [Online; accessed 10-Feb-2021]."},{"key":"e_1_3_2_1_3_1","volume-title":"https:\/\/www.elastic.co\/kibana [Online","year":"2021","unstructured":"Kibana. https:\/\/www.elastic.co\/kibana [Online ; accessed 10- Feb- 2021 ]. Kibana. https:\/\/www.elastic.co\/kibana [Online; accessed 10-Feb-2021]."},{"key":"e_1_3_2_1_4_1","volume-title":"Site Reliability Engineering: How Google Runs Production Systems. \" O\u2019Reilly Media","author":"Beyer Betsy","unstructured":"Betsy Beyer , Chris Jones , Jennifer Petoff , and Niall Richard Murphy . 2016. Site Reliability Engineering: How Google Runs Production Systems. \" O\u2019Reilly Media , Inc .\". Betsy Beyer, Chris Jones, Jennifer Petoff, and Niall Richard Murphy. 2016. Site Reliability Engineering: How Google Runs Production Systems. \" O\u2019Reilly Media, Inc.\"."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3379597.3387447"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00020"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00042"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3394112"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416624"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409768"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417055"},{"key":"e_1_3_2_1_12_1","unstructured":"Google Cloud. [n.d.]. https:\/\/status.cloud.google.com\/summary  Google Cloud. [n.d.]. https:\/\/status.cloud.google.com\/summary"},{"key":"e_1_3_2_1_13_1","volume-title":"https:\/\/www.datadoghq.com\/ [Online","year":"2021","unstructured":"Datadog. [n.d.]. https:\/\/www.datadoghq.com\/ [Online ; accessed 10- Feb- 2021 ]. Datadog. [n.d.]. https:\/\/www.datadoghq.com\/ [Online; accessed 10-Feb-2021]."},{"key":"e_1_3_2_1_14_1","unstructured":"Finale Doshi-Velez and Been Kim. 2017. Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608.  Finale Doshi-Velez and Been Kim. 2017. Towards a rigorous science of interpretable machine learning. arXiv preprint arXiv:1702.08608."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3319535.3363226"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_2_1_17_1","volume-title":"https:\/\/www.dynatrace.com\/ [Online","year":"2021","unstructured":"Dynatrace. [n.d.]. https:\/\/www.dynatrace.com\/ [Online ; accessed 10- Feb- 2021 ]. Dynatrace. [n.d.]. https:\/\/www.dynatrace.com\/ [Online; accessed 10-Feb-2021]."},{"key":"e_1_3_2_1_18_1","volume-title":"https:\/\/github.com\/alibaba\/eCommerceSearchBench [Online","year":"2021","unstructured":"E-commerce. [n.d.]. https:\/\/github.com\/alibaba\/eCommerceSearchBench [Online ; accessed 10- Feb- 2021 ]. E-commerce. [n.d.]. https:\/\/github.com\/alibaba\/eCommerceSearchBench [Online; accessed 10-Feb-2021]."},{"key":"e_1_3_2_1_19_1","volume-title":"https:\/\/github.com\/elastic\/elasticsearch [Online","year":"2021","unstructured":"Elasticsearch. [n.d.]. https:\/\/github.com\/elastic\/elasticsearch [Online ; accessed 10- Feb- 2021 ]. Elasticsearch. [n.d.]. https:\/\/github.com\/elastic\/elasticsearch [Online; accessed 10-Feb-2021]."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.60"},{"key":"e_1_3_2_1_21_1","unstructured":"Wanling Gao Fei Tang Lei Wang Jianfeng Zhan Chunxin Lan Chunjie Luo Yunyou Huang Chen Zheng Jiahui Dai and Zheng Cao. 2019. AIBench: an industry standard internet service AI benchmark suite. arXiv preprint arXiv:1908.08998.  Wanling Gao Fei Tang Lei Wang Jianfeng Zhan Chunxin Lan Chunjie Luo Yunyou Huang Chen Zheng Jiahui Dai and Zheng Cao. 2019. AIBench: an industry standard internet service AI benchmark suite. arXiv preprint arXiv:1908.08998."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion52605.2021.00062"},{"key":"e_1_3_2_1_23_1","volume-title":"Deep learning","author":"Goodfellow Ian","unstructured":"Ian Goodfellow , Yoshua Bengio , and Aaron Courville . 2016. Deep learning . MIT press . Ian Goodfellow, Yoshua Bengio, and Aaron Courville. 2016. Deep learning. MIT press."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2987550.2987583"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Scott Heidbrink Kathryn N Rodhouse and Daniel M Dunlavy. 2020. Multimodal Deep Learning for Flaw Detection in Software Programs. arXiv preprint arXiv:2009.04549.  Scott Heidbrink Kathryn N Rodhouse and Daniel M Dunlavy. 2020. Multimodal Deep Learning for Flaw Detection in Software Programs. arXiv preprint arXiv:2009.04549.","DOI":"10.2172\/1660805"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/AITest.2019.00-12"},{"key":"e_1_3_2_1_30_1","volume-title":"Long short-term memory. Neural computation, 9, 8","author":"Hochreiter Sepp","year":"1997","unstructured":"Sepp Hochreiter and J\u00fcrgen Schmidhuber . 1997. Long short-term memory. Neural computation, 9, 8 ( 1997 ), 1735\u20131780. Sepp Hochreiter and J\u00fcrgen Schmidhuber. 1997. Long short-term memory. Neural computation, 9, 8 (1997), 1735\u20131780."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3337821.3337857"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"e_1_3_2_1_33_1","volume-title":"https:\/\/github.com\/influxdata\/influxdb [Online","author":"DB.","year":"2021","unstructured":"Influx DB. [n.d.]. https:\/\/github.com\/influxdata\/influxdb [Online ; accessed 10- Feb- 2021 ]. InfluxDB. [n.d.]. https:\/\/github.com\/influxdata\/influxdb [Online; accessed 10-Feb-2021]."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00024"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417054"},{"key":"e_1_3_2_1_36_1","volume-title":"https:\/\/kubernetes.io\/ [Online","year":"2021","unstructured":"Kubernetes. [n.d.]. https:\/\/kubernetes.io\/ [Online ; accessed 10- Feb- 2021 ]. Kubernetes. [n.d.]. https:\/\/kubernetes.io\/ [Online; accessed 10-Feb-2021]."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","unstructured":"Steffen Lehnert. 2011. A review of software change impact analysis. Univ.-Bibliothek.  Steffen Lehnert. 2011. A review of software change impact analysis. Univ.-Bibliothek.","DOI":"10.1145\/2024445.2024454"},{"key":"e_1_3_2_1_38_1","volume-title":"14th $USENIX$ Symposium on Operating Systems Design and Implementation ($OSDI$ 20). 1155\u20131170.","author":"Levy Sebastien","unstructured":"Sebastien Levy , Randolph Yao , Youjiang Wu , Yingnong Dang , Peng Huang , Zheng Mu , Pu Zhao , Tarun Ramani , Naga Govindaraju , and Xukun Li. 2020. Predictive and Adaptive Failure Mitigation to Avert Production Cloud $VM$ Interruptions . In 14th $USENIX$ Symposium on Operating Systems Design and Implementation ($OSDI$ 20). 1155\u20131170. Sebastien Levy, Randolph Yao, Youjiang Wu, Yingnong Dang, Peng Huang, Zheng Mu, Pu Zhao, Tarun Ramani, Naga Govindaraju, and Xukun Li. 2020. Predictive and Adaptive Failure Mitigation to Avert Production Cloud $VM$ Interruptions. In 14th $USENIX$ Symposium on Operating Systems Design and Implementation ($OSDI$ 20). 1155\u20131170."},{"key":"e_1_3_2_1_39_1","unstructured":"Ze Li Qian Cheng Ken Hsieh Yingnong Dang Peng Huang Pankaj Singh Xinsheng Yang Qingwei Lin Youjiang Wu and Sebastien Levy. 2020. Gandalf: An Intelligent End-To-End Analytics Service for Safe Deployment in Large-Scale Cloud Infrastructure. In 17th $USENIX$ Symposium on Networked Systems Design and Implementation ($NSDI$ 20). 389\u2013402.  Ze Li Qian Cheng Ken Hsieh Yingnong Dang Peng Huang Pankaj Singh Xinsheng Yang Qingwei Lin Youjiang Wu and Sebastien Levy. 2020. Gandalf: An Intelligent End-To-End Analytics Service for Safe Deployment in Large-Scale Cloud Infrastructure. In 17th $USENIX$ Symposium on Networked Systems Design and Implementation ($NSDI$ 20). 389\u2013402."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236060"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889232"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00014"},{"key":"e_1_3_2_1_43_1","volume-title":"https:\/\/github.com\/elastic\/logstash [Online","year":"2021","unstructured":"LogStash. [n.d.]. https:\/\/github.com\/elastic\/logstash [Online ; accessed 10- Feb- 2021 ]. LogStash. [n.d.]. https:\/\/github.com\/elastic\/logstash [Online; accessed 10-Feb-2021]."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.14778\/3389133.3389136"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00013"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079309"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851219"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931054"},{"key":"e_1_3_2_1_49_1","volume-title":"Rex: Preventing bugs and misconfiguration in large services using correlated change analysis. In 17th $USENIX$ Symposium on Networked Systems Design and Implementation ($NSDI$ 20). 435\u2013448.","author":"Mehta Sonu","year":"2020","unstructured":"Sonu Mehta , Ranjita Bhagwan , Rahul Kumar , Chetan Bansal , Chandra Maddila , B Ashok , Sumit Asthana , Christian Bird , and Aditya Kumar . 2020 . Rex: Preventing bugs and misconfiguration in large services using correlated change analysis. In 17th $USENIX$ Symposium on Networked Systems Design and Implementation ($NSDI$ 20). 435\u2013448. Sonu Mehta, Ranjita Bhagwan, Rahul Kumar, Chetan Bansal, Chandra Maddila, B Ashok, Sumit Asthana, Christian Bird, and Aditya Kumar. 2020. Rex: Preventing bugs and misconfiguration in large services using correlated change analysis. In 17th $USENIX$ Symposium on Networked Systems Design and Implementation ($NSDI$ 20). 435\u2013448."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"crossref","unstructured":"Weibin Meng Ying Liu Yichen Zhu Shenglin Zhang Dan Pei Yuqing Liu Yihao Chen Ruizhi Zhang Shimin Tao and Pei Sun. 2019. LogAnomaly: Unsupervised Detection of Sequential and Quantitative Anomalies in Unstructured Logs.. In IJCAI. 4739\u20134745.  Weibin Meng Ying Liu Yichen Zhu Shenglin Zhang Dan Pei Yuqing Liu Yihao Chen Ruizhi Zhang Shimin Tao and Pei Sun. 2019. LogAnomaly: Unsupervised Detection of Sequential and Quantitative Anomalies in Unstructured Logs.. In IJCAI. 4739\u20134745.","DOI":"10.24963\/ijcai.2019\/658"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2939672.2939712"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2019.00038"},{"key":"e_1_3_2_1_53_1","unstructured":"Jiquan Ngiam Aditya Khosla Mingyu Kim Juhan Nam Honglak Lee and Andrew Y Ng. 2011. Multimodal deep learning. In ICML.  Jiquan Ngiam Aditya Khosla Mingyu Kim Juhan Nam Honglak Lee and Andrew Y Ng. 2011. Multimodal deep learning. In ICML."},{"key":"e_1_3_2_1_54_1","volume-title":"https:\/\/numpy.org\/ [Online","author":"Py.","year":"2021","unstructured":"Num Py. [n.d.]. https:\/\/numpy.org\/ [Online ; accessed 10- Feb- 2021 ]. NumPy. [n.d.]. https:\/\/numpy.org\/ [Online; accessed 10-Feb-2021]."},{"key":"e_1_3_2_1_55_1","volume-title":"https:\/\/pandas.pydata.org\/ [Online","year":"2021","unstructured":"pandas. [n.d.]. https:\/\/pandas.pydata.org\/ [Online ; accessed 10- Feb- 2021 ]. pandas. [n.d.]. https:\/\/pandas.pydata.org\/ [Online; accessed 10-Feb-2021]."},{"key":"e_1_3_2_1_56_1","volume-title":"Lumos: A Library for Diagnosing Metric Regressions in Web-Scale Applications. arXiv preprint arXiv:2006.12793.","author":"Pool Jamie","year":"2020","unstructured":"Jamie Pool , Ebrahim Beyrami , Vishak Gopal , Ashkan Aazami , Jayant Gupchup , Jeff Rowland , Binlong Li , Pritesh Kanani , Ross Cutler , and Johannes Gehrke . 2020 . Lumos: A Library for Diagnosing Metric Regressions in Web-Scale Applications. arXiv preprint arXiv:2006.12793. Jamie Pool, Ebrahim Beyrami, Vishak Gopal, Ashkan Aazami, Jayant Gupchup, Jeff Rowland, Binlong Li, Pritesh Kanani, Ross Cutler, and Johannes Gehrke. 2020. Lumos: A Library for Diagnosing Metric Regressions in Web-Scale Applications. arXiv preprint arXiv:2006.12793."},{"key":"e_1_3_2_1_57_1","volume-title":"https:\/\/prometheus.io\/ [Online","year":"2021","unstructured":"Prometheus. [n.d.]. https:\/\/prometheus.io\/ [Online ; accessed 10- Feb- 2021 ]. Prometheus. [n.d.]. https:\/\/prometheus.io\/ [Online; accessed 10-Feb-2021]."},{"key":"e_1_3_2_1_58_1","volume-title":"https:\/\/pytorch.org\/ [Online","year":"2021","unstructured":"PyTorch. [n.d.]. https:\/\/pytorch.org\/ [Online ; accessed 10- Feb- 2021 ]. PyTorch. [n.d.]. https:\/\/pytorch.org\/ [Online; accessed 10-Feb-2021]."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2017.2738401"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330680"},{"key":"e_1_3_2_1_61_1","unstructured":"scikit learn. [n.d.]. https:\/\/scikit-learn.org\/  scikit learn. [n.d.]. https:\/\/scikit-learn.org\/"},{"key":"e_1_3_2_1_62_1","volume-title":"https:\/\/github.com\/FSEwork\/SCWarn [Online","year":"2021","unstructured":"SCWarn. [n.d.]. https:\/\/github.com\/FSEwork\/SCWarn [Online ; accessed 24- Feb- 2021 ]. SCWarn. [n.d.]. https:\/\/github.com\/FSEwork\/SCWarn [Online; accessed 24-Feb-2021]."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380353"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330672"},{"key":"e_1_3_2_1_65_1","volume-title":"https:\/\/github.com\/FudanSELab\/train-ticket\/ [Online","year":"2021","unstructured":"Train-Ticket. [n.d.]. https:\/\/github.com\/FudanSELab\/train-ticket\/ [Online ; accessed 10- Feb- 2021 ]. Train-Ticket. [n.d.]. https:\/\/github.com\/FudanSELab\/train-ticket\/ [Online; accessed 10-Feb-2021]."},{"key":"e_1_3_2_1_66_1","first-page":"101","article-title":"A critique and improvement of the CL common language effect size statistics of McGraw and Wong","volume":"25","author":"Vargha Andr\u00e1s","year":"2000","unstructured":"Andr\u00e1s Vargha and Harold D Delaney . 2000 . A critique and improvement of the CL common language effect size statistics of McGraw and Wong . Journal of Educational and Behavioral Statistics , 25 , 2 (2000), 101 \u2013 132 . Andr\u00e1s Vargha and Harold D Delaney. 2000. A critique and improvement of the CL common language effect size statistics of McGraw and Wong. Journal of Educational and Behavioral Statistics, 25, 2 (2000), 101\u2013132.","journal-title":"Journal of Educational and Behavioral Statistics"},{"key":"e_1_3_2_1_67_1","volume-title":"Understanding interobserver agreement: the kappa statistic. Fam med, 37, 5","author":"Viera Anthony J","year":"2005","unstructured":"Anthony J Viera and Joanne M Garrett . 2005. Understanding interobserver agreement: the kappa statistic. Fam med, 37, 5 ( 2005 ), 360\u2013363. Anthony J Viera and Joanne M Garrett. 2005. Understanding interobserver agreement: the kappa statistic. Fam med, 37, 5 (2005), 360\u2013363."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2020.3022028"},{"key":"e_1_3_2_1_69_1","volume-title":"Breakthroughs in statistics","author":"Wilcoxon Frank","unstructured":"Frank Wilcoxon . 1992. Individual comparisons by ranking methods . In Breakthroughs in statistics . Springer , 196\u2013202. Frank Wilcoxon. 1992. Individual comparisons by ranking methods. In Breakthroughs in statistics. Springer, 196\u2013202."},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3185996"},{"key":"e_1_3_2_1_71_1","unstructured":"Yong Xu Kaixin Sui Randolph Yao Hongyu Zhang Qingwei Lin Yingnong Dang Peng Li Keceng Jiang Wenchi Zhang and Jian-Guang Lou. 2018. Improving service availability of cloud systems by predicting disk error. In 2018 $USENIX$ Annual Technical Conference ($USENIX$$ATC$ 18). 481\u2013494.  Yong Xu Kaixin Sui Randolph Yao Hongyu Zhang Qingwei Lin Yingnong Dang Peng Li Keceng Jiang Wenchi Zhang and Jian-Guang Lou. 2018. Improving service availability of cloud systems by predicting disk error. In 2018 $USENIX$ Annual Technical Conference ($USENIX$$ATC$ 18). 481\u2013494."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFCOM.2012.6195694"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00130"},{"key":"e_1_3_2_1_74_1","volume-title":"17th $USENIX$ Symposium on Networked Systems Design and Implementation ($NSDI$ 20). 575\u2013589.","author":"Zhai Ennan","unstructured":"Ennan Zhai , Ang Chen , Ruzica Piskac , Mahesh Balakrishnan , Bingchuan Tian , Bo Song , and Haoliang Zhang . 2020. Check before You Change: Preventing Correlated Failures in Service Updates . In 17th $USENIX$ Symposium on Networked Systems Design and Implementation ($NSDI$ 20). 575\u2013589. Ennan Zhai, Ang Chen, Ruzica Piskac, Mahesh Balakrishnan, Bingchuan Tian, Bo Song, and Haoliang Zhang. 2020. Check before You Change: Preventing Correlated Failures in Service Updates. In 17th $USENIX$ Symposium on Networked Systems Design and Implementation ($NSDI$ 20). 575\u2013589."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238187"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/3179405"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2716281.2836087"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3409672"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155219"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2019.2919327"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2887384"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00021"}],"event":{"name":"ESEC\/FSE '21: 29th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Athens Greece","acronym":"ESEC\/FSE '21","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468264.3468543","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3468264.3468543","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T21:24:50Z","timestamp":1750195490000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3468264.3468543"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,8,18]]},"references-count":83,"alternative-id":["10.1145\/3468264.3468543","10.1145\/3468264"],"URL":"https:\/\/doi.org\/10.1145\/3468264.3468543","relation":{},"subject":[],"published":{"date-parts":[[2021,8,18]]},"assertion":[{"value":"2021-08-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}