{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:12:20Z","timestamp":1773375140992,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,21]],"date-time":"2022-05-21T00:00:00Z","timestamp":1653091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"DOI":"10.13039\/100009226","name":"National Security Agency","doi-asserted-by":"publisher","award":["H98230-17-D-0080"],"award-info":[{"award-number":["H98230-17-D-0080"]}],"id":[{"id":"10.13039\/100009226","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CNS1513942, CNS1149445"],"award-info":[{"award-number":["CNS1513942, CNS1149445"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,21]]},"DOI":"10.1145\/3510003.3510110","type":"proceedings-article","created":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T22:42:59Z","timestamp":1657060979000},"page":"1669-1680","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["PerfSig"],"prefix":"10.1145","author":[{"given":"Jingzhu","family":"He","sequence":"first","affiliation":[{"name":"ShanghaiTech University, Shanghai, China"}]},{"given":"Yuhang","family":"Lin","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Xiaohui","family":"Gu","sequence":"additional","affiliation":[{"name":"North Carolina State University"}]},{"given":"Chin-Chia Michael","family":"Yeh","sequence":"additional","affiliation":[{"name":"Visa Research"}]},{"given":"Zhongfang","family":"Zhuang","sequence":"additional","affiliation":[{"name":"Visa Research"}]}],"member":"320","published-online":{"date-parts":[[2022,7,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2016. Hadoop-11252. https:\/\/issues.apache.org\/jira\/browse\/HADOOP-11252."},{"key":"e_1_3_2_1_2_1","unstructured":"2018. Bugzilla. https:\/\/www.bugzilla.org."},{"key":"e_1_3_2_1_3_1","unstructured":"2018. Java Information Dynamics Toolkit (JIDT). https:\/\/github.com\/jlizier\/jidt."},{"key":"e_1_3_2_1_4_1","unstructured":"2020. AWS outage. https:\/\/www.techrepublic.com\/article\/amazon-reveals-reason-for-last-weeks-major-aws-outage\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2021. Apache JIRA. https:\/\/issues.apache.org\/jira."},{"key":"e_1_3_2_1_6_1","unstructured":"2021. Docker. https:\/\/www.docker.com\/."},{"key":"e_1_3_2_1_7_1","unstructured":"2021. HTrace. http:\/\/htrace.incubator.apache.org\/."},{"key":"e_1_3_2_1_8_1","unstructured":"2021. Twitter. https:\/\/twitter.com."},{"key":"e_1_3_2_1_9_1","unstructured":"2021. Zipkin. https:\/\/zipkin.io\/."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00031"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10827-010-0231-x"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.3390\/e15010113"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1281192.1281203"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2499368.2451128"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568246"},{"key":"e_1_3_2_1_16_1","volume-title":"Latent dirichlet allocation. the Journal of machine Learning research 3","author":"Blei David M","year":"2003","unstructured":"David M Blei, Andrew Y Ng, and Michael I Jordan. 2003. Latent dirichlet allocation. the Journal of machine Learning research 3 (2003), 993--1022."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190525"},{"key":"e_1_3_2_1_18_1","volume-title":"11th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 217--231","author":"Chow Michael","year":"2014","unstructured":"Michael Chow, David Meisner, Jason Flinn, Daniel Peek, and Thomas F Wenisch. 2014. The mystery machine: End-to-end performance analysis of large-scale internet services. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 217--231."},{"key":"e_1_3_2_1_19_1","unstructured":"I. Cohen M. Goldszmidt T. Kelly J. Symons and J. S. Chase. 2004. Correlating instrumentation data to system states: A building block for automated diagnosis and control. In OSDI."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095809.1095821"},{"key":"e_1_3_2_1_21_1","volume-title":"13th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 17--32","author":"Cui Weidong","year":"2018","unstructured":"Weidong Cui, Xinyang Ge, Baris Kasikci, Ben Niu, Upamanyu Sharma, Ruoyu Wang, and Insu Yun. 2018. REPT: Reverse debugging of failures in deployed software. In 13th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 17--32."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3267809.3267844"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Daniel J Dean Hiep Nguyen Xiaohui Gu Hui Zhang Junghwan Rhee Nipun Arora and Geoff Jiang. 2014. PerfScope: Practical Online Server Performance Bug Inference in Production Cloud Computing Infrastructures. In SOCC.","DOI":"10.1145\/2670979.2670987"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2015.2444392"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/9781119945710.ch22"},{"key":"e_1_3_2_1_27_1","unstructured":"Isabelle Guyon et al. 2008. Practical feature selection: from correlation to causality. Mining massive data sets for security: advances in data mining search social networks and text mining and their applications to security (2008) 27--43."},{"key":"e_1_3_2_1_28_1","volume-title":"proceedings of the 17th international conference on data engineering. Citeseer, 215--224","author":"Han Jiawei","year":"2001","unstructured":"Jiawei Han, Jian Pei, Behzad Mortazavi-Asl, Helen Pinto, Qiming Chen, Umeshwar Dayal, and Meichun Hsu. 2001. Prefixspan: Mining sequential patterns efficiently by prefix-projected pattern growth. In proceedings of the 17th international conference on data engineering. Citeseer, 215--224."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416531"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2018.00010"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419111.3421288"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1964858.1964870"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2345156.2254075"},{"key":"e_1_3_2_1_34_1","volume-title":"A statistical interpretation of term specificity and its application in retrieval. Journal of documentation","author":"Jones Karen Sparck","year":"1972","unstructured":"Karen Sparck Jones. 1972. A statistical interpretation of term specificity and its application in retrieval. Journal of documentation (1972)."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9518-0"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/5.58325"},{"key":"e_1_3_2_1_37_1","volume-title":"5th Online World Conference on Soft Computing in Industrial Applications (WSC5)","volume":"1","author":"Koppen Mario","year":"2000","unstructured":"Mario Koppen. 2000. The curse of dimensionality. In 5th Online World Conference on Soft Computing in Industrial Applications (WSC5), Vol. 1. 4--8."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00066"},{"key":"e_1_3_2_1_39_1","volume-title":"International conference on machine learning. PMLR, 1188--1196","author":"Le Quoc","year":"2014","unstructured":"Quoc Le and Tomas Mikolov. 2014. Distributed representations of sentences and documents. In International conference on machine learning. PMLR, 1188--1196."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-018-9595-8"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568229"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.3389\/frobt.2014.00011"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835804.1835883"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.2200\/S00707ED1V01Y201602DMK012"},{"key":"e_1_3_2_1_45_1","volume-title":"Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient estimation of word representations in vector space. arXiv preprint arXiv:1301.3781 (2013)."},{"key":"e_1_3_2_1_46_1","volume-title":"Scikit-learn: Machine learning in Python. the Journal of machine Learning research 12","author":"Pedregosa Fabian","year":"2011","unstructured":"Fabian Pedregosa, Ga\u00ebl Varoquaux, Alexandre Gramfort, Vincent Michel, Bertrand Thirion, Olivier Grisel, Mathieu Blondel, Peter Prettenhofer, Ron Weiss, Vincent Dubourg, et al. 2011. Scikit-learn: Machine learning in Python. the Journal of machine Learning research 12 (2011), 2825--2830."},{"key":"e_1_3_2_1_47_1","volume-title":"Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks. ELRA, Valletta, Malta, 45--50","author":"\u0158eh\u016f\u0159ek Radim","year":"2010","unstructured":"Radim \u0158eh\u016f\u0159ek and Petr Sojka. 2010. Software Framework for Topic Modelling with Large Corpora. In Proceedings of the LREC 2010 Workshop on New Challenges for NLP Frameworks. ELRA, Valletta, Malta, 45--50. http:\/\/is.muni.cz\/publication\/884893\/en."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00056"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3068335"},{"key":"e_1_3_2_1_50_1","volume-title":"Neural granger causality for nonlinear time series. arXiv preprint arXiv:1802.05842","author":"Tank Alex","year":"2018","unstructured":"Alex Tank, Ian Covert, Nicholas Foti, Ali Shojaie, and Emily Fox. 2018. Neural granger causality for nonlinear time series. arXiv preprint arXiv:1802.05842 (2018)."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3357223.3362727"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10827-010-0262-3"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/1357010.1352612"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180194"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00130"},{"key":"e_1_3_2_1_56_1","volume-title":"2016 IEEE 16th international conference on data mining (ICDM). Ieee, 1317--1322","author":"Michael Yeh Chin-Chia","year":"2016","unstructured":"Chin-Chia Michael Yeh, Yan Zhu, Liudmila Ulanova, Nurjahan Begum, Yifei Ding, Hoang Anh Dau, Diego Furtado Silva, Abdullah Mueen, and EamonnKeogh. 2016. Matrix profile I: all pairs similarity joins for time series: a unifying view that includes motifs, discords and shapelets. In 2016 IEEE 16th international conference on data mining (ICDM). Ieee, 1317--1322."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980024.2872407"},{"key":"e_1_3_2_1_58_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 603--618","author":"Zhao Xu","year":"2016","unstructured":"Xu Zhao, Kirk Rodrigues, Yu Luo, Ding Yuan, and Michael Stumm. 2016. Nonintrusive performance profiling for entire software stacks based on the flow reconstruction principle. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 603--618."},{"key":"e_1_3_2_1_59_1","volume-title":"11th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 629--644","author":"Zhao Xu","year":"2014","unstructured":"Xu Zhao, Yongle Zhang, David Lion, Muhammad Faizan Ullah, Yu Luo, Ding Yuan, and Michael Stumm. 2014. lprof: A non-intrusive request flow profiler for distributed systems. In 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI). 629--644."}],"event":{"name":"ICSE '22: 44th International Conference on Software Engineering","location":"Pittsburgh Pennsylvania","acronym":"ICSE '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 44th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510110","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510003.3510110","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510003.3510110","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:23Z","timestamp":1750183823000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510110"}},"subtitle":["extracting performance bug signatures via multi-modality causal analysis"],"short-title":[],"issued":{"date-parts":[[2022,5,21]]},"references-count":59,"alternative-id":["10.1145\/3510003.3510110","10.1145\/3510003"],"URL":"https:\/\/doi.org\/10.1145\/3510003.3510110","relation":{},"subject":[],"published":{"date-parts":[[2022,5,21]]},"assertion":[{"value":"2022-07-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}