{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,2]],"date-time":"2025-08-02T19:02:06Z","timestamp":1754161326486,"version":"3.41.2"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","funder":[{"name":"IBM Center for Advanced Studies","award":["1046"],"award-info":[{"award-number":["1046"]}]},{"name":"NSERC","award":["RGPIN-2022-03886"],"award-info":[{"award-number":["RGPIN-2022-03886"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,23]]},"DOI":"10.1145\/3696630.3728588","type":"proceedings-article","created":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T19:09:27Z","timestamp":1753729767000},"page":"1094-1098","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["CloudHeatMap: Heatmap-Based Monitoring for Large-Scale Cloud Systems"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0004-8247-4759","authenticated-orcid":false,"given":"Sarah","family":"Sohana","sequence":"first","affiliation":[{"name":"Rogers Communications Canada Inc., Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8883-7061","authenticated-orcid":false,"given":"William","family":"Pourmajidi","sequence":"additional","affiliation":[{"name":"Toronto Metropolitan University, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6572-6326","authenticated-orcid":false,"given":"John","family":"Steinbacher","sequence":"additional","affiliation":[{"name":"IBM Canada Lab, Toronto, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7747-9043","authenticated-orcid":false,"given":"Andriy","family":"Miranskyy","sequence":"additional","affiliation":[{"name":"Toronto Metropolitan University, Toronto, Canada"}]}],"member":"320","published-online":{"date-parts":[[2025,7,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. IBM Cloud Code Engine. https:\/\/www.ibm.com\/products\/code-engine"},{"key":"e_1_3_2_1_2_1","unstructured":"[n. d.]. IBM Cloud Functions. Available at https:\/\/www.ibm.com\/cloud\/functions."},{"key":"e_1_3_2_1_3_1","unstructured":"[n. d.]. Introduction to Dash. Available at https:\/\/dash.plotly.com\/introduction."},{"key":"e_1_3_2_1_4_1","unstructured":"[n. d.]. OpenTracing Overview. Available at https:\/\/opentracing.io\/docs\/overview\/."},{"key":"e_1_3_2_1_5_1","unstructured":"[n. d.]. Plotly Open Source Graphing Libraries. Available at https:\/\/plotly.com\/graphing-libraries\/."},{"key":"e_1_3_2_1_6_1","unstructured":"[n. d.]. Traces | OpenTelemetry. https:\/\/opentelemetry.io\/docs\/concepts\/signals\/traces\/."},{"key":"e_1_3_2_1_7_1","unstructured":"[n. d.]. What is IBM Cloud Object Storage? Available at https:\/\/cloud.ibm.com\/docs\/cloud-object-storage?topic=cloud-object-storage-about-cloud-object-storage."},{"key":"e_1_3_2_1_8_1","unstructured":"[n. d.]. What is the IBM Cloud platform? Available at https:\/\/cloud.ibm.com\/docs\/overview?topic=overview-whatis-platform."},{"key":"e_1_3_2_1_9_1","unstructured":"[n. d.]. Zipkin. Available at https:\/\/zipkin.io\/."},{"volume-title":"Annunciator Sequences and Specifications. Reaffirmed","year":"2004","key":"e_1_3_2_1_10_1","unstructured":"1979. Annunciator Sequences and Specifications. Reaffirmed in 2004."},{"key":"e_1_3_2_1_11_1","unstructured":"Shaun Anderson. 2022. How fast should a website load in 2022? Available at https:\/\/www.hobo-web.co.uk\/your-website-design-should-load-in-4-seconds\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","first-page":"20","DOI":"10.4018\/IJSSCI.2017010102","article-title":"Cognitive visual analytics of multi-dimensional cloud system monitoring data","volume":"9","author":"Baciu George","year":"2017","unstructured":"George Baciu, Yungzhe Wang, and Chenhui Li. 2017. Cognitive visual analytics of multi-dimensional cloud system monitoring data. International Journal of Software Science and Computational Intelligence (IJSSCI) 9, 1 (2017), 20\u201334.","journal-title":"International Journal of Software Science and Computational Intelligence (IJSSCI)"},{"volume-title":"Proceedings of the Eleventh ACM Symposium on Operating Systems Principles","author":"Birman K.","key":"e_1_3_2_1_13_1","unstructured":"K. Birman and T. Joseph. 1987. Exploiting virtual synchrony in distributed systems. In Proceedings of the Eleventh ACM Symposium on Operating Systems Principles (Austin, Texas, USA) (SOSP '87). Association for Computing Machinery, 123\u2013138. 10.1145\/41457.37515"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2019.2940009"},{"volume-title":"Site Reliability Engineering: How Google Runs Production Systems","author":"Ewaschuk Rob","key":"e_1_3_2_1_15_1","unstructured":"Rob Ewaschuk. 2016. Monitoring Distributed Systems. In Site Reliability Engineering: How Google Runs Production Systems, Betsy Beyer (Ed.). O'Reilly Media, Incorporated, Chapter 6. https:\/\/sre.google\/sre-book\/monitoring-distributed-systems\/"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 10th IEEE\/ACM International Workshop on Software Engineering for Systems-of-Systems and Software Ecosystems. 13\u201320","author":"Hrusto Adha","year":"2022","unstructured":"Adha Hrusto, Emelie Engstr\u00f6m, and Per Runeson. 2022. Optimization of anomaly detection in a microservice system through continuous feedback from development. In Proceedings of the 10th IEEE\/ACM International Workshop on Software Engineering for Systems-of-Systems and Software Ecosystems. 13\u201320."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","first-page":"107241","DOI":"10.1016\/j.infsof.2023.107241","article-title":"Towards optimization of anomaly detection in DevOps","volume":"160","author":"Hrusto Adha","year":"2023","unstructured":"Adha Hrusto, Emelie Engstr\u00f6m, and Per Runeson. 2023. Towards optimization of anomaly detection in DevOps. Information and Software Technology 160 (2023), 107241.","journal-title":"Information and Software Technology"},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 46th International Conference on Software Engineering: Software Engineering in Practice. 47\u201357","author":"Hrusto Adha","year":"2024","unstructured":"Adha Hrusto, Per Runeson, and Magnus C Ohlsson. 2024. Autonomous monitors for detecting failures early and reporting interpretable alerts in cloud operations. In Proceedings of the 46th International Conference on Software Engineering: Software Engineering in Practice. 47\u201357."},{"key":"e_1_3_2_1_19_1","volume-title":"Anomaly Detection in Cloud Components. In IEEE 13th International Conference on Cloud Computing (CLOUD). 1\u20133. 10","author":"Islam Mohammad Saiful","year":"2020","unstructured":"Mohammad Saiful Islam and Andriy Miranskyy. 2020. Anomaly Detection in Cloud Components. In IEEE 13th International Conference on Cloud Computing (CLOUD). 1\u20133. 10.1109\/CLOUD49709.2020.00008"},{"key":"e_1_3_2_1_20_1","volume-title":"Proceedings of the 2021 IEEE\/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). 150\u2013159","author":"Islam Mohammad S.","year":"2021","unstructured":"Mohammad S. Islam, William Pourmajidi, Lei Zhang, John Steinbacher, Tony Erwin, and Andriy Miranskyy. 2021. Anomaly Detection in a Large-Scale Cloud Platform. In Proceedings of the 2021 IEEE\/ACM 43rd International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP). 150\u2013159. 10.1109\/ICSE-SEIP52600.2021.00024"},{"key":"e_1_3_2_1_21_1","volume-title":"William Pourmajidi, Janakan Sivaloganathan, John Steinbacher, and Andriy Miranskyy.","author":"Islam Mohammad Saiful","year":"2024","unstructured":"Mohammad Saiful Islam, Mohamed Sami Rakha, William Pourmajidi, Janakan Sivaloganathan, John Steinbacher, and Andriy Miranskyy. 2024. Anomaly Detection in Large-Scale Cloud Systems: An Industry Case and Dataset. arXiv preprint arXiv:2411.09047 (2024). To appear in Proceedings of ICSE SEIP 2025."},{"key":"e_1_3_2_1_22_1","volume-title":"Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data. 2617\u20132622","author":"Milo Tova","year":"2020","unstructured":"Tova Milo and Amit Somech. 2020. Automating Exploratory Data Analysis via Machine Learning: An Overview. In Proceedings of the 2020 ACM SIGMOD International Conference on Management of Data. 2617\u20132622. 10.1145\/3318464.3383126"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","first-page":"52","DOI":"10.1109\/MS.2016.33","article-title":"Operational-log analysis for big data systems: Challenges and solutions","volume":"33","author":"Miranskyy Andriy","year":"2016","unstructured":"Andriy Miranskyy, Abdelwahab Hamou-Lhadj, Enzo Cialini, and Alf Larsson. 2016. Operational-log analysis for big data systems: Challenges and solutions. IEEE Software 33, 2 (2016), 52\u201359.","journal-title":"IEEE Software"},{"key":"e_1_3_2_1_24_1","volume-title":"Operational profiles in software-reliability engineering","author":"Musa John D.","year":"1993","unstructured":"John D. Musa. 1993. Operational profiles in software-reliability engineering. IEEE software 10, 2 (1993), 14\u201332."},{"key":"e_1_3_2_1_25_1","volume-title":"Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering. 344\u2013353","author":"Pourmajidi William","year":"2019","unstructured":"William Pourmajidi, Andriy Miranskyy, John Steinbacher, Tony Erwin, and David Godwin. 2019. Dogfooding: Using ibm cloud services to monitor ibm cloud infrastructure. In Proceedings of the 29th Annual International Conference on Computer Science and Software Engineering. 344\u2013353."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 27th Annual International Conference on Computer Science and Software Engineering. 259\u2013265","author":"Pourmajidi William","year":"2017","unstructured":"William Pourmajidi, John Steinbacher, Tony Erwin, and Andriy Miranskyy. 2017. On Challenges of Cloud Monitoring. In Proceedings of the 27th Annual International Conference on Computer Science and Software Engineering. 259\u2013265."},{"volume-title":"Knowledge Management in the Development of Data-Intensive Systems","author":"Pourmajidi William","key":"e_1_3_2_1_27_1","unstructured":"William Pourmajidi, Lei Zhang, Andriy Miranskyy, John Steinbacher, David Godwin, and Tony Erwin. 2021. The Challenging Landscape of Cloud Monitoring. In Knowledge Management in the Development of Data-Intensive Systems. CRC Press, 157\u2013189."},{"key":"e_1_3_2_1_28_1","volume-title":"Proceedings of the 14th International Workshop on Adaptive and Reflective Middleware. 1\u20136.","author":"Schoonjans Arnaud","year":"2015","unstructured":"Arnaud Schoonjans, Dimitri Van Landuyt, Bert Lagaisse, and Wouter Joosen. 2015. On the suitability of black-box performance monitoring for sla-driven cloud provisioning scenarios. In Proceedings of the 14th International Workshop on Adaptive and Reflective Middleware. 1\u20136."},{"key":"e_1_3_2_1_29_1","unstructured":"Sarah Sohana. 2022. Heatmap Visualization for Monitoring Health of a Large-scale Cloud System. M.Sc. Thesis. Ryerson University Toronto Canada. Available at: https:\/\/rshare.library.torontomu.ca\/articles\/thesis\/Heatmap_Visualization_for_Monitoring_Health_of_a_Large-scale_Cloud_System\/26052514?file=47103691."},{"key":"e_1_3_2_1_30_1","unstructured":"Sarah Sohana. 2025. CloudHeatMap demo. https:\/\/cs.torontomu.ca\/~avm\/cloudheatmap_video.html"},{"key":"e_1_3_2_1_31_1","unstructured":"Sarah Sohana William Pourmajidi John Steinbacher and Andriy Miranskyy. 2025. CloudHeatMap source code. https:\/\/github.com\/sohanasarah\/CloudHeatMap"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1198\/tas.2009.0033"},{"volume-title":"Experimentation in software engineering","author":"Wohlin Claes","key":"e_1_3_2_1_33_1","unstructured":"Claes Wohlin, Per Runeson, Martin H\u00f6st, Magnus C Ohlsson, Bj\u00f6rn Regnell, and Anders Wessl\u00e9n. 2012. Experimentation in software engineering. Springer Science & Business Media."},{"volume-title":"Case study research: Design and methods (5 ed.)","author":"Yin Robert K","key":"e_1_3_2_1_34_1","unstructured":"Robert K Yin. 2009. Case study research: Design and methods (5 ed.). Sage."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TNSM.2024.3353772"}],"event":{"name":"FSE Companion '25: 33rd ACM International Conference on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Clarion Hotel Trondheim Trondheim Norway","acronym":"FSE Companion '25"},"container-title":["Proceedings of the 33rd ACM International Conference on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3696630.3728588","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,28]],"date-time":"2025-07-28T19:18:24Z","timestamp":1753730304000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3696630.3728588"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,23]]},"references-count":35,"alternative-id":["10.1145\/3696630.3728588","10.1145\/3696630"],"URL":"https:\/\/doi.org\/10.1145\/3696630.3728588","relation":{},"subject":[],"published":{"date-parts":[[2025,6,23]]},"assertion":[{"value":"2025-07-28","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}