{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T02:37:42Z","timestamp":1774579062248,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":90,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the Key-Area Research and Development Program of Guangdong Province","award":["No. 2020B010165002"],"award-info":[{"award-number":["No. 2020B010165002"]}]},{"name":"the Guangdong Basic and Applied Basic Research Foundation","award":["No. 2023B1515020054"],"award-info":[{"award-number":["No. 2023B1515020054"]}]},{"name":"the Natural Science Foundation of China","award":["No. 62272495"],"award-info":[{"award-number":["No. 62272495"]}]},{"name":"the Tencent Rhino-Bird Joint Research Program","award":[""],"award-info":[{"award-number":[""]}]},{"name":"the Fundamental Research Funds for the Central Universities, Sun Yat-sen University","award":["No. 22qntd1004"],"award-info":[{"award-number":["No. 22qntd1004"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616300","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"566-578","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":9,"title":["DiagConfig: Configuration Diagnosis of Performance Violations in Configurable Software Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-9554-2626","authenticated-orcid":false,"given":"Zhiming","family":"Chen","sequence":"first","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0972-6900","authenticated-orcid":false,"given":"Pengfei","family":"Chen","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6179-9790","authenticated-orcid":false,"given":"Peipei","family":"Wang","sequence":"additional","affiliation":[{"name":"ByteDance US Infrastructure System Lab, Seattle, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6195-9088","authenticated-orcid":false,"given":"Guangba","family":"Yu","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7963-082X","authenticated-orcid":false,"given":"Zilong","family":"He","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6269-4251","authenticated-orcid":false,"given":"Genting","family":"Mai","sequence":"additional","affiliation":[{"name":"Sun Yat-sen University, Guangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/VISSOFT.2019.00009"},{"key":"e_1_3_2_2_2_1","volume-title":"2016 USENIX Annual Technical Conference (USENIX ATC 16)","author":"Amvrosiadis George","year":"2016","unstructured":"George Amvrosiadis and Medha Bhadkamkar. 2016. Getting back up: Understanding how enterprise data backups fail. In 2016 USENIX Annual Technical Conference (USENIX ATC 16). 479\u2013492."},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265925"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2666356.2594299"},{"key":"e_1_3_2_2_5_1","volume-title":"X-Ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software. In 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12)","author":"Attariyan Mona","year":"2012","unstructured":"Mona Attariyan, Michael Chow, and Jason Flinn. 2012. X-Ray: Automating Root-Cause Diagnosis of Performance Anomalies in Production Software. In 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI 12). 307\u2013320."},{"key":"e_1_3_2_2_6_1","volume-title":"9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10)","author":"Attariyan Mona","year":"2010","unstructured":"Mona Attariyan and Jason Flinn. 2010. Automating configuration troubleshooting with dynamic information flow analysis. In 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10)."},{"key":"e_1_3_2_2_7_1","volume-title":"Proceedings of the 21st annual international ACM SIGIR conference on Research and development in information retrieval. 96\u2013103","author":"Douglas Baker L","year":"1998","unstructured":"L Douglas Baker and Andrew Kachites McCallum. 1998. Distributional clustering of words for text classification. In Proceedings of the 21st annual international ACM SIGIR conference on Research and development in information retrieval. 96\u2013103."},{"key":"e_1_3_2_2_8_1","volume-title":"Random forests. Machine learning, 45, 1","author":"Breiman Leo","year":"2001","unstructured":"Leo Breiman. 2001. Random forests. Machine learning, 45, 1 (2001), 5\u201332."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1718918.1718973"},{"key":"e_1_3_2_2_10_1","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence. 26","author":"Caragea Cornelia","year":"2012","unstructured":"Cornelia Caragea, Adrian Silvescu, and Prasenjit Mitra. 2012. Combining hashing and abstraction in sparse high dimensional feature spaces. In Proceedings of the AAAI Conference on Artificial Intelligence. 26, 3\u20139."},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106285"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/BigDataCongress.2015.64"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468555"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","unstructured":"Zhiming Chen Pengfei Chen Peipei Wang Guangba Yu and et al.. 2023. Reproduction Package for Article \u2019DiagConfig: Configuration Diagnosis of Performance Violations in Configurable Software Systems\u2019. https:\/\/doi.org\/10.5281\/zenodo.8279414 10.5281\/zenodo.8279414","DOI":"10.5281\/zenodo.8279414"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3460319.3464810"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3183481"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807152"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.37"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1952682.1952686"},{"key":"e_1_3_2_2_20_1","volume-title":"JPROFILER: The AWARD-WINNING ALL-IN-ONE JAVA PROFILER. https:\/\/www.ej-technologies.com\/products\/jprofiler\/overview.html","year":"2019","unstructured":"ej technologies. 2019. JPROFILER: The AWARD-WINNING ALL-IN-ONE JAVA PROFILER. https:\/\/www.ej-technologies.com\/products\/jprofiler\/overview.html"},{"key":"e_1_3_2_2_21_1","unstructured":"Jon Haddad et al.. 2023. tlp-stress: A workload centric stress tool and framework. https:\/\/github.com\/thelastpickle\/tlp-stress Accessed May 13 2023"},{"key":"e_1_3_2_2_22_1","unstructured":"Jonathan Shook et al.. 2023. NoSQLBench: The Open Source Pluggable NoSQL Benchmarking Suite. https:\/\/github.com\/nosqlbench\/nosqlbench"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"e_1_3_2_2_24_1","volume-title":"Google Cloud Storage Incident #19002. https:\/\/status.cloud.google.com\/incident\/storage\/19002 Accessed","year":"2020","unstructured":"Google. 2019. Google Cloud Storage Incident #19002. https:\/\/status.cloud.google.com\/incident\/storage\/19002 Accessed March 13, 2020"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/872726.806987"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693089"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2019.00080"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2961111.2962602"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510094"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2228360.2228409"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2741948.2741963"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3492321.3519575"},{"key":"e_1_3_2_2_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115661"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236074"},{"key":"e_1_3_2_2_35_1","volume-title":"Update about the October 4th outage. https:\/\/engineering.fb.com\/2021\/10\/04\/networking-traffic\/outage\/","author":"Janardhan Santosh","unstructured":"Santosh Janardhan. 2021. Update about the October 4th outage. https:\/\/engineering.fb.com\/2021\/10\/04\/networking-traffic\/outage\/"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591191"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2345156.2254075"},{"key":"e_1_3_2_2_38_1","volume-title":"VisualVM: All-in-One Java Troubleshooting Tool. https:\/\/visualvm.github.io\/index.html Accessed","author":"Jiri Sedlacek Tomas Hurka","year":"2022","unstructured":"Tomas Hurka Jiri Sedlacek. 2019. VisualVM: All-in-One Java Troubleshooting Tool. https:\/\/visualvm.github.io\/index.html Accessed April 6, 2022"},{"key":"e_1_3_2_2_39_1","volume-title":"Google and Apple Hit by Unusual Outages. https:\/\/www.wsj.com\/articles\/facebook-and-instagram-suffer-lengthy-outages-11552539752 Accessed","author":"Journal Wall Street","year":"2019","unstructured":"Wall Street Journal. 2019. Facebook, Google and Apple Hit by Unusual Outages. https:\/\/www.wsj.com\/articles\/facebook-and-instagram-suffer-lengthy-outages-11552539752 Accessed March 14, 2019"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.2987024"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2008.4630084"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-018-0662-9"},{"key":"e_1_3_2_2_43_1","volume-title":"9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10)","author":"Kushman Nate","year":"2010","unstructured":"Nate Kushman and Dina Katabi. 2010. Enabling Configuration-Independent Automation by Non-Expert Users. In 9th USENIX Symposium on Operating Systems Design and Implementation (OSDI 10)."},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3342195.3387520"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2643001"},{"key":"e_1_3_2_2_46_1","unstructured":"Mahoney Matt Collet Yann Ondrus Jan Mori Yuta Muravyov Ilya Burns Neal Giesen Fabian Duda Jarek and Grebnov Ilya. 2019. Kanzi: a lossless data compressor implemented in Java. https:\/\/github.com\/flanglet\/kanzi"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884793"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2007.35"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00176"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-017-0225-2"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2870895"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"e_1_3_2_2_53_1","unstructured":"Apache Cassandra Official. 2023. Cassandra Stress Benchmark. https:\/\/cassandra.apache.org\/doc\/4.0\/cassandra\/tools\/cassandra_stress.html"},{"key":"e_1_3_2_2_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106273"},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001445"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.5555\/1953048.2078195"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100053"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985812"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/MM.2010.68"},{"key":"e_1_3_2_2_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092716"},{"key":"e_1_3_2_2_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786845"},{"key":"e_1_3_2_2_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227196"},{"key":"e_1_3_2_2_63_1","doi-asserted-by":"publisher","DOI":"10.1109\/SPLC.2011.20"},{"key":"e_1_3_2_2_64_1","volume-title":"Agglomerative information bottleneck. Advances in neural information processing systems, 12","author":"Slonim Noam","year":"1999","unstructured":"Noam Slonim and Naftali Tishby. 1999. Agglomerative information bottleneck. Advances in neural information processing systems, 12 (1999)."},{"key":"e_1_3_2_2_65_1","volume-title":"USENIX Symposium on Operating Systems Design and Implementation.","author":"Sun Xudong","year":"2020","unstructured":"Xudong Sun, Runxiang Cheng, Jianyan Chen, Elaine Ang, Owolabi Legunsen, and Tianyin Xu. 2020. Testing configuration changes in context to prevent production failures. In USENIX Symposium on Operating Systems Design and Implementation."},{"key":"e_1_3_2_2_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jfds.2015.07.002"},{"key":"e_1_3_2_2_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1925805.1925818"},{"key":"e_1_3_2_2_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064029"},{"key":"e_1_3_2_2_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2188286.2188326"},{"key":"e_1_3_2_2_70_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-020-00273-8"},{"key":"e_1_3_2_2_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00100"},{"key":"e_1_3_2_2_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510043"},{"key":"e_1_3_2_2_73_1","unstructured":"JC Wang and CF Jeff Wu. 1995. A hidden projection property of Plackett-Burman and related designs. Statistica Sinica 235\u2013250."},{"key":"e_1_3_2_2_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/3296957.3173206"},{"key":"e_1_3_2_2_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00099"},{"key":"e_1_3_2_2_76_1","volume-title":"2017 USENIX Annual Technical Conference (USENIX ATC 17)","author":"Wei Xingda","year":"2017","unstructured":"Xingda Wei, Sijie Shen, Rong Chen, and Haibo Chen. 2017. Replication-driven live reconfiguration for fast distributed transaction processing. In 2017 USENIX Annual Technical Conference (USENIX ATC 17). 335\u2013347."},{"key":"e_1_3_2_2_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542523"},{"key":"e_1_3_2_2_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806616"},{"key":"e_1_3_2_2_79_1","volume-title":"12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16)","author":"Xu Tianyin","year":"2016","unstructured":"Tianyin Xu, Xinxin Jin, Peng Huang, Yuanyuan Zhou, Shan Lu, Long Jin, and Shankar Pasupathy. 2016. Early detection of configuration errors to reduce failure damage. In 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). 619\u2013634."},{"key":"e_1_3_2_2_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522727"},{"key":"e_1_3_2_2_81_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227199"},{"key":"e_1_3_2_2_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2013.9"},{"key":"e_1_3_2_2_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183519.3183536"},{"key":"e_1_3_2_2_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043572"},{"key":"e_1_3_2_2_85_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9578-1"},{"key":"e_1_3_2_2_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3173187"},{"key":"e_1_3_2_2_87_1","doi-asserted-by":"publisher","DOI":"10.5555\/2002181.2002209"},{"key":"e_1_3_2_2_88_1","volume-title":"my program worked. Today, it does not. Why? ACM SIGSOFT Software engineering notes, 24, 6","author":"Zeller Andreas","year":"1999","unstructured":"Andreas Zeller. 1999. Yesterday, my program worked. Today, it does not. Why? ACM SIGSOFT Software engineering notes, 24, 6 (1999), 253\u2013267."},{"key":"e_1_3_2_2_89_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485517"},{"key":"e_1_3_2_2_90_1","doi-asserted-by":"publisher","DOI":"10.1145\/3127479.3128605"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"San Francisco CA USA","acronym":"ESEC\/FSE '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616300","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616300","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:04Z","timestamp":1750178164000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616300"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":90,"alternative-id":["10.1145\/3611643.3616300","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616300","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}