{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,25]],"date-time":"2025-10-25T18:46:36Z","timestamp":1761417996983,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,10,27]],"date-time":"2024-10-27T00:00:00Z","timestamp":1729987200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,10,27]]},"DOI":"10.1145\/3691620.3694984","type":"proceedings-article","created":{"date-parts":[[2024,10,18]],"date-time":"2024-10-18T15:39:19Z","timestamp":1729265959000},"page":"27-39","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["SLIM: a Scalable and Interpretable Light-weight Fault Localization Algorithm for Imbalanced Data in Microservice"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-3542-2164","authenticated-orcid":false,"given":"Rui","family":"Ren","sequence":"first","affiliation":[{"name":"DAMO Academy, Alibaba Group Hangzhou, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-5231-5452","authenticated-orcid":false,"given":"Jingbang","family":"Yang","sequence":"additional","affiliation":[{"name":"DAMO Academy, Alibaba Group Hangzhou, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-9558-7163","authenticated-orcid":false,"given":"Linxiao","family":"Yang","sequence":"additional","affiliation":[{"name":"DAMO Academy, Alibaba Group Hangzhou, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6183-2295","authenticated-orcid":false,"given":"Xinyue","family":"Gu","sequence":"additional","affiliation":[{"name":"DAMO Academy, Alibaba Group Hangzhou, Hangzhou, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-5835-7259","authenticated-orcid":false,"given":"Liang","family":"Sun","sequence":"additional","affiliation":[{"name":"DAMO Academy, Alibaba Group Hangzhou, Hangzhou, China"}]}],"member":"320","published-online":{"date-parts":[[2024,10,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2023. Dataset A and B. https:\/\/github.com\/NetManAIOps\/DejaVu."},{"key":"e_1_3_2_1_2_1","unstructured":"2023. Dataset C. https:\/\/github.com\/NetManAIOps\/TraceRCA."},{"key":"e_1_3_2_1_3_1","unstructured":"2023. Elasticsearch. https:\/\/www.elastic.co\/."},{"key":"e_1_3_2_1_4_1","unstructured":"2023. High-quality ubiquitous and portable telemetry to enable effective observability. https:\/\/opentelemetry.io\/."},{"key":"e_1_3_2_1_5_1","unstructured":"2023. Jaeger: open source end-to-end distributed tracing. https:\/\/www.jaegertracing.io\/."},{"key":"e_1_3_2_1_6_1","unstructured":"2023. Microsoft Doc. https:\/\/learn.microsoft.com\/en-us\/azure\/architecture\/guide\/architecture-styles\/microservices."},{"key":"e_1_3_2_1_7_1","unstructured":"2023. Prometheus. https:\/\/prometheus.io\/."},{"key":"e_1_3_2_1_8_1","volume-title":"Recommending Root-Cause and Mitigation Steps for Cloud Incidents using Large Language Models. arXiv preprint arXiv:2301.03797","author":"Ahmed Toufique","year":"2023","unstructured":"Toufique Ahmed, Supriyo Ghosh, Chetan Bansal, Thomas Zimmermann, Xuchao Zhang, and Saravan Rajmohan. 2023. Recommending Root-Cause and Mitigation Steps for Cloud Incidents using Large Language Models. arXiv preprint arXiv:2301.03797 (2023)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Francis Bach et al. 2013. Learning with submodular functions: A convex optimization perspective. Foundations and Trends\u00ae in Machine Learning 6 2--3 (2013) 145--373.","DOI":"10.1561\/2200000039"},{"key":"e_1_3_2_1_10_1","unstructured":"Betsy Beyer Chris Jones Jennifer Petoff and Niall Richard Murphy. 2016. Site Reliability Engineering: How Google Runs Production Systems. http:\/\/landing.google.com\/sre\/book.html"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.110432"},{"key":"e_1_3_2_1_12_1","volume-title":"SMOTE: synthetic minority over-sampling technique. Journal of artificial intelligence research 16","author":"Chawla Nitesh V","year":"2002","unstructured":"Nitesh V Chawla, Kevin W Bowyer, Lawrence O Hall, and W Philip Kegelmeyer. 2002. SMOTE: synthetic minority over-sampling technique. Journal of artificial intelligence research 16 (2002)."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.953"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00020"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00042"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00104"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/3091622.3091637"},{"key":"e_1_3_2_1_18_1","unstructured":"Sanjeeb Dash Oktay Gunluk and Dennis Wei. 2018. Boolean Decision Rules via Column Generation. In Advances in Neural Information Processing Systems."},{"key":"e_1_3_2_1_19_1","volume-title":"Sage: Using Unsupervised Learning for Scalable Performance Debugging in Microservices. arXiv preprint arXiv:2101.00267","author":"Gan Yu","year":"2021","unstructured":"Yu Gan, Mingyu Liang, et al. 2021. Sage: Using Unsupervised Learning for Scalable Performance Debugging in Microservices. arXiv preprint arXiv:2101.00267 (2021)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304013"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3297858.3304004"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3603269.3604877"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 36th ICML","volume":"97","author":"Harshaw Chris","year":"2019","unstructured":"Chris Harshaw, Moran Feldman, Justin Ward, and Amin Karbasi. 2019. Submodular Maximization beyond Non-negativity: Guarantees, Fast Algorithms, and Applications. In Proceedings of the 36th ICML, Vol. 97. PMLR, 2634--2643."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"e_1_3_2_1_25_1","volume-title":"A tutorial on MM algorithms. The American Statistician 58","author":"Hunter David R","year":"2004","unstructured":"David R Hunter and Kenneth Lange. 2004. A tutorial on MM algorithms. The American Statistician 58 (2004)."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2011.5995589"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00069"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1186\/s40537-019-0192-5"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.neucom.2019.06.100"},{"key":"e_1_3_2_1_30_1","volume-title":"Eadro: An End-to-End Troubleshooting Framework for Microservices on Multisource Data. arXiv preprint arXiv:2302.05092","author":"Lee Cheryl","year":"2023","unstructured":"Cheryl Lee, Tianyi Yang, Zhuangbin Chen, Yuxin Su, and Michael R Lyu. 2023. Eadro: An End-to-End Troubleshooting Framework for Microservices on Multisource Data. arXiv preprint arXiv:2302.05092 (2023)."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1137\/090750020"},{"key":"e_1_3_2_1_32_1","volume-title":"30th USENIX Security Symposium (USENIX Security 21)","author":"Li Xing","year":"2021","unstructured":"Xing Li, Yan Chen, Zhiqiang Lin, Xiao Wang, and Jim Hao Chen. 2021. Automatic policy generation for {Inter-Service} access control of microservices. In 30th USENIX Security Symposium (USENIX Security 21). 3971--3988."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS52092.2021.9521340"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549092"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889232"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00043"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468580"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3366423.3380111"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.14778\/3389133.3389136"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/CIDM.2011.5949434"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2079296.2079309"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.110464"},{"key":"e_1_3_2_1_43_1","volume-title":"Interrater reliability: the kappa statistic. Biochemia medica 22, 3","author":"McHugh Mary L","year":"2012","unstructured":"Mary L McHugh. 2012. Interrater reliability: the kappa statistic. Biochemia medica 22, 3 (2012), 276--282."},{"key":"e_1_3_2_1_44_1","volume-title":"17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20)","author":"Mehta Sonu","year":"2020","unstructured":"Sonu Mehta and Ranjita Bhagwan. 2020. Rex: Preventing bugs and misconfiguration in large services using correlated change analysis. In 17th USENIX Symposium on Networked Systems Design and Implementation (NSDI 20). 435--448."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF01588971"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/IISWC.2018.8573515"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/CloudIntelligence52565.2021.00015"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510073"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468543"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2887384"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338961"}],"event":{"name":"ASE '24: 39th IEEE\/ACM International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Sacramento CA USA","acronym":"ASE '24"},"container-title":["Proceedings of the 39th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3694984","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3691620.3694984","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T00:04:06Z","timestamp":1750291446000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3691620.3694984"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,10,27]]},"references-count":51,"alternative-id":["10.1145\/3691620.3694984","10.1145\/3691620"],"URL":"https:\/\/doi.org\/10.1145\/3691620.3694984","relation":{},"subject":[],"published":{"date-parts":[[2024,10,27]]},"assertion":[{"value":"2024-10-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}