{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:12:21Z","timestamp":1773375141654,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,21]],"date-time":"2022-05-21T00:00:00Z","timestamp":1653091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Research Grants Council of the Hong Kong Special Administrative Region","award":["CUHK 14210920"],"award-info":[{"award-number":["CUHK 14210920"]}]},{"name":"Australian Research Council (ARC) Discovery Projects","award":["DP200102940 and DP220103044"],"award-info":[{"award-number":["DP200102940 and DP220103044"]}]},{"name":"Guangdong Key Research Program","award":["No. 2020B010165002"],"award-info":[{"award-number":["No. 2020B010165002"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,21]]},"DOI":"10.1145\/3510003.3510085","type":"proceedings-article","created":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T22:42:59Z","timestamp":1657060979000},"page":"61-72","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["Adaptive performance anomaly detection for online service systems via pattern sketching"],"prefix":"10.1145","author":[{"given":"Zhuangbin","family":"Chen","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, China"}]},{"given":"Jinyang","family":"Liu","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, China"}]},{"given":"Yuxin","family":"Su","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Zhuhai, China"}]},{"given":"Hongyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"The University of Newcastle, NSW, Australia"}]},{"given":"Xiao","family":"Ling","sequence":"additional","affiliation":[{"name":"Huawei Cloud BU, Beijing, China"}]},{"given":"Yongqiang","family":"Yang","sequence":"additional","affiliation":[{"name":"Huawei Cloud BU, Beijing, China"}]},{"given":"Michael R.","family":"Lyu","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Hong Kong, China"}]}],"member":"320","published-online":{"date-parts":[[2022,7,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Retrieved","year":"2021","unstructured":"2018. KPI Anomaly Detection Competition. Retrieved April, 2021 from http:\/\/iops.ai\/competition_detail\/?competition_id=5&flag=1"},{"key":"e_1_3_2_1_2_1","volume-title":"Retrieved","year":"2021","unstructured":"2018. KPI Anomaly Detection Dataset. Retrieved April, 2021 from http:\/\/iops.ai\/dataset_detail\/?id=10"},{"key":"e_1_3_2_1_3_1","volume-title":"Convex optimization","author":"Boyd Stephen","unstructured":"Stephen Boyd, Stephen P Boyd, and Lieven Vandenberghe. 2004. Convex optimization. Cambridge university press."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.110432"},{"key":"e_1_3_2_1_5_1","volume-title":"Discrete time representation of continuous time ARMA processes. Econometric Theory","author":"Chambers Marcus J","year":"2012","unstructured":"Marcus J Chambers and Michael A Thornton. 2012. Discrete time representation of continuous time ARMA processes. Econometric Theory (2012), 219--238."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417055"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-Companion.2019.00023"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381796"},{"key":"e_1_3_2_1_9_1","unstructured":"Apache Flink. 2011. [Online]. https:\/\/flink.apache.org\/."},{"key":"e_1_3_2_1_10_1","volume-title":"Clustering by passing messages between data points. science 315, 5814","author":"Frey Brendan J","year":"2007","unstructured":"Brendan J Frey and Delbert Dueck. 2007. Clustering by passing messages between data points. science 315, 5814 (2007), 972--976."},{"key":"e_1_3_2_1_11_1","volume-title":"A survey on concept drift adaptation. ACM computing surveys (CSUR) 46, 4","author":"Gama Jo\u00e3o","year":"2014","unstructured":"Jo\u00e3o Gama, Indr\u0117 \u017dliobait\u0117, Albert Bifet, Mykola Pechenizkiy, and Abdelhamid Bouchachia. 2014. A survey on concept drift adaptation. ACM computing surveys (CSUR) 46, 4 (2014), 1--37."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS47774.2020.00044"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236083"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3102980.3103005"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3219819.3219845"},{"key":"e_1_3_2_1_16_1","unstructured":"Apache Kafka. 2011. [Online]. https:\/\/kafka.apache.org\/."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236060"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889232"},{"key":"e_1_3_2_1_19_1","volume-title":"Kai Ming Ting, and Zhi-Hua Zhou","author":"Liu Fei Tony","year":"2008","unstructured":"Fei Tony Liu, Kai Ming Ting, and Zhi-Hua Zhou. 2008. Isolation forest. In 2008 eighth ieee international conference on data mining. IEEE, 413--422."},{"key":"e_1_3_2_1_20_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Lou Chang","year":"2020","unstructured":"Chang Lou, Peng Huang, and Scott Smith. 2020. Understanding, detecting and localizing partial failures in large system software. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). 559--574."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693105"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.14778\/3389133.3389136"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM51629.2021.00151"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDMW.2015.62"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/LRA.2018.2801475"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10994-015-5521-0"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201224"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972832.74"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330680"},{"key":"e_1_3_2_1_30_1","volume-title":"Retrieved","year":"2015","unstructured":"Yahoo! Research. 2015. A Benchmark Dataset for Time Series Anomaly Detection. Retrieved August, 2021 from https:\/\/yahooresearch.tumblr.com\/post\/114590420346\/a-benchmark-dataset-for-time-series-anomaly"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3097983.3098144"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3292500.3330672"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2018.2875989"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3178876.3185996"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1473147.1473152"},{"key":"e_1_3_2_1_36_1","volume-title":"2016 IEEE 16th international conference on data mining (ICDM). IEEE, 1317--1322","author":"Michael Yeh Chin-Chia","year":"2016","unstructured":"Chin-Chia Michael Yeh, Yan Zhu, Liudmila Ulanova, Nurjahan Begum, Yifei Ding, Hoang Anh Dau, Diego Furtado Silva, Abdullah Mueen, and Eamonn Keogh. 2016. Matrix profile I: all pairs similarity joins for time series: a unifying view that includes motifs, discords and shapelets. In 2016 IEEE 16th international conference on data mining (ICDM). IEEE, 1317--1322."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3440757","article-title":"Predicting Performance Anomalies in Software Systems at Run-time","volume":"30","author":"Zhao Guoliang","year":"2021","unstructured":"Guoliang Zhao, Safwat Hassan, Ying Zou, Derek Truong, and Toby Corbin. 2021. Predicting Performance Anomalies in Software Systems at Run-time. ACM Transactions on Software Engineering and Methodology (TOSEM) 30, 3 (2021), 1--33.","journal-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2018.00099"},{"key":"e_1_3_2_1_39_1","volume-title":"International Conference on Learning Representations.","author":"Zong Bo","year":"2018","unstructured":"Bo Zong, Qi Song, Martin Renqiang Min, Wei Cheng, Cristian Lumezanu, Daeki Cho, and Haifeng Chen. 2018. Deep autoencoding gaussian mixture model for unsupervised anomaly detection. In International Conference on Learning Representations."}],"event":{"name":"ICSE '22: 44th International Conference on Software Engineering","location":"Pittsburgh Pennsylvania","acronym":"ICSE '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 44th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510085","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510003.3510085","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:23Z","timestamp":1750183823000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510085"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,21]]},"references-count":39,"alternative-id":["10.1145\/3510003.3510085","10.1145\/3510003"],"URL":"https:\/\/doi.org\/10.1145\/3510003.3510085","relation":{},"subject":[],"published":{"date-parts":[[2022,5,21]]},"assertion":[{"value":"2022-07-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}