{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T02:59:06Z","timestamp":1769741946654,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":76,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,11,20]],"date-time":"2024-11-20T00:00:00Z","timestamp":1732060800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nc\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,11,20]]},"DOI":"10.1145\/3698038.3698534","type":"proceedings-article","created":{"date-parts":[[2024,11,14]],"date-time":"2024-11-14T06:32:43Z","timestamp":1731565963000},"page":"361-379","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Deoxys: A Causal Inference Engine for Unhealthy Node Mitigation in Large-scale Cloud Infrastructure"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1304-6839","authenticated-orcid":false,"given":"Chaoyun","family":"Zhang","sequence":"first","affiliation":[{"name":"Microsoft, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0005-9511-1428","authenticated-orcid":false,"given":"Randolph","family":"Yao","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8698-1860","authenticated-orcid":false,"given":"Si","family":"Qin","sequence":"additional","affiliation":[{"name":"Microsoft, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4789-0170","authenticated-orcid":false,"given":"Ze","family":"Li","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-8745-6271","authenticated-orcid":false,"given":"Shekhar","family":"Agrawal","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"ORCID":"https:\/\/orcid.org\/0009-0004-0225-2102","authenticated-orcid":false,"given":"Binit R.","family":"Mishra","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9913-0117","authenticated-orcid":false,"given":"Tri","family":"Tran","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6303-1731","authenticated-orcid":false,"given":"Minghua","family":"Ma","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-2559-2383","authenticated-orcid":false,"given":"Qingwei","family":"Lin","sequence":"additional","affiliation":[{"name":"Microsoft, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0006-2712-1111","authenticated-orcid":false,"given":"Murali","family":"Chintalapati","sequence":"additional","affiliation":[{"name":"Microsoft, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9230-2799","authenticated-orcid":false,"given":"Dongmei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft, China"}]}],"member":"320","published-online":{"date-parts":[[2024,11,20]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Cloud Outages: Causes Consequences Prevention Recovery. https:\/\/www.informationweek.com\/cloud\/cloud-outages-causes-consequences-prevention-recovery. Accessed: 2023-04-26."},{"key":"e_1_3_2_1_2_1","volume-title":"20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23)","author":"Agarwal Anup","year":"2023","unstructured":"Anup Agarwal, Shadi Noghabi, \u00cd\u00f1igo Goiri, Srinivasan Seshan, and Anirudh Badam. 2023. Unlocking unallocated cloud capacity for long, uninterruptible workloads. In 20th USENIX Symposium on Networked Systems Design and Implementation (NSDI 23). 457--478."},{"key":"e_1_3_2_1_3_1","volume-title":"Machine learning methods for estimating heterogeneous causal effects. stat 1050, 5","author":"Athey Susan","year":"2015","unstructured":"Susan Athey and Guido W Imbens. 2015. Machine learning methods for estimating heterogeneous causal effects. stat 1050, 5 (2015), 1--26."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Susan Athey Julie Tibshirani and Stefan Wager. 2019. Generalized random forests. (2019).","DOI":"10.1214\/18-AOS1709"},{"key":"e_1_3_2_1_5_1","unstructured":"Keith Battocchi Eleanor Dillon Maggie Hei Greg Lewis Paul Oka Miruna Oprescu and Vasilis Syrgkanis. 2019. EconML: A Python Package for ML-Based Heterogeneous Treatment Effects Estimation. https:\/\/github.com\/py-why\/EconML. Version 0.x."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jet.2004.03.008"},{"key":"e_1_3_2_1_7_1","volume-title":"Random forests. Machine learning 45","author":"Breiman Leo","year":"2001","unstructured":"Leo Breiman. 2001. Random forests. Machine learning 45 (2001), 5--32."},{"key":"e_1_3_2_1_8_1","volume-title":"Statistics for high-dimensional data: methods, theory and applications","author":"B\u00fchlmann Peter","unstructured":"Peter B\u00fchlmann and Sara Van De Geer. 2011. Statistics for high-dimensional data: methods, theory and applications. Springer Science & Business Media."},{"key":"e_1_3_2_1_9_1","volume-title":"Microreboot-a technique for cheap recovery. arXiv preprint cs\/0406005","author":"Candea George","year":"2004","unstructured":"George Candea, Shinichi Kawamoto, Yuichi Fujiki, Greg Friedman, and Armando Fox. 2004. Microreboot-a technique for cheap recovery. arXiv preprint cs\/0406005 (2004)."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3419111.3421300"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3522672"},{"key":"e_1_3_2_1_12_1","unstructured":"Tianqi Chen Tong He Michael Benesty Vadim Khotilovich Yuan Tang Hyunsu Cho Kailong Chen Rory Mitchell Ignacio Cano Tianyi Zhou et al. 2015. Xgboost: extreme gradient boosting. R package version 0.4-2 1 4 (2015) 1--4."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Yinfang Chen Huaibing Xie Minghua Ma Yu Kang Xin Gao Liu Shi Yunjie Cao Xuedong Gao Hao Fan Ming Wen et al. 2023. Empowering Practical Root Cause Analysis by Large Language Models for Cloud Incidents. arXiv preprint arXiv:2305.15778 (2023).","DOI":"10.1145\/3627703.3629553"},{"key":"e_1_3_2_1_14_1","volume-title":"ImDiffusion: Imputed Diffusion Models for Multivariate Time Series Anomaly Detection. arXiv preprint arXiv:2307.00754","author":"Chen Yuhang","year":"2023","unstructured":"Yuhang Chen, Chaoyun Zhang, Minghua Ma, Yudong Liu, Ruomeng Ding, Bowen Li, Shilin He, Saravan Rajmohan, Qingwei Lin, and Dongmei Zhang. 2023. ImDiffusion: Imputed Diffusion Models for Multivariate Time Series Anomaly Detection. arXiv preprint arXiv:2307.00754 (2023)."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Victor Chernozhukov Denis Chetverikov Mert Demirer Esther Duflo Christian Hansen Whitney Newey and James Robins. 2018. Double\/debiased machine learning for treatment and structural parameters.","DOI":"10.3386\/w23564"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2016.2531104"},{"key":"e_1_3_2_1_17_1","volume-title":"Bootstrap confidence intervals. Statistical science 11, 3","author":"DiCiccio Thomas J","year":"1996","unstructured":"Thomas J DiCiccio and Bradley Efron. 1996. Bootstrap confidence intervals. Statistical science 11, 3 (1996), 189--228."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3611643.3613864"},{"key":"e_1_3_2_1_19_1","volume-title":"Everything of thoughts: Defying the law of penrose triangle for thought generation. arXiv preprint arXiv:2311.04254","author":"Ding Ruomeng","year":"2023","unstructured":"Ruomeng Ding, Chaoyun Zhang, Lu Wang, Yong Xu, Minghua Ma, Wei Zhang, Si Qin, Saravan Rajmohan, Qingwei Lin, and Dongmei Zhang. 2023. Everything of thoughts: Defying the law of penrose triangle for thought generation. arXiv preprint arXiv:2311.04254 (2023)."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGC.2012.22"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2017.4041358"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2496(88)90011-9"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2014.24"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.4834"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/3615353"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3559757"},{"key":"e_1_3_2_1_27_1","volume-title":"13th { USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 18). 1--16.","author":"Huang Peng","unstructured":"Peng Huang, Chuanxiong Guo, Jacob R Lorch, Lidong Zhou, and Yingnong Dang. 2018. Capturing and enhancing in situ system observability for failure detection. In 13th { USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 18). 1--16."},{"key":"e_1_3_2_1_28_1","volume-title":"Xpert: Empowering incident management with query recommendations via large language models. arXiv preprint arXiv:2312.11988","author":"Jiang Yuxuan","year":"2023","unstructured":"Yuxuan Jiang, Chaoyun Zhang, Shilin He, Zhihao Yang, Minghua Ma, Si Qin, Yu Kang, Yingnong Dang, Saravan Rajmohan, Qingwei Lin, et al. 2023. Xpert: Empowering incident management with query recommendations via large language models. arXiv preprint arXiv:2312.11988 (2023)."},{"key":"e_1_3_2_1_29_1","volume-title":"Invited commentary: propensity scores. American journal of epidemiology 150, 4","author":"Joffe Marshall M","year":"1999","unstructured":"Marshall M Joffe and Paul R Rosenbaum. 1999. Invited commentary: propensity scores. American journal of epidemiology 150, 4 (1999), 327--333."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i13.17438"},{"key":"e_1_3_2_1_31_1","volume-title":"Causal machine learning: A survey and open problems. arXiv preprint arXiv:2206.15475","author":"Kaddour Jean","year":"2022","unstructured":"Jean Kaddour, Aengus Lynch, Qi Liu, Matt J Kusner, and Ricardo Silva. 2022. Causal machine learning: A survey and open problems. arXiv preprint arXiv:2206.15475 (2022)."},{"key":"e_1_3_2_1_32_1","volume-title":"Semiparametric doubly robust targeted double machine learning: a review. arXiv preprint arXiv:2203.06469","author":"Kennedy Edward H","year":"2022","unstructured":"Edward H Kennedy. 2022. Semiparametric doubly robust targeted double machine learning: a review. arXiv preprint arXiv:2203.06469 (2022)."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1073\/pnas.1804597116"},{"key":"e_1_3_2_1_34_1","volume-title":"Proceedings of the 14th USENIX Conference on Operating Systems Design and Implementation. 1155--1170","author":"Levy Sebastien","year":"2020","unstructured":"Sebastien Levy, Randolph Yao, Youjiang Wu, Yingnong Dang, Peng Huang, Zheng Mu, Pu Zhao, Tarun Ramani, Naga Govindaraju, Xukun Li, et al. 2020. Predictive and adaptive failure mitigation to avert production cloud VM interruptions. In Proceedings of the 14th USENIX Conference on Operating Systems Design and Implementation. 1155--1170."},{"key":"e_1_3_2_1_35_1","volume-title":"arXiv preprint arXiv:2002.07285","author":"Lewis Greg","year":"2020","unstructured":"Greg Lewis and Vasilis Syrgkanis. 2020. Double\/debiased machine learning for dynamic treatment effects via g-estimation. arXiv preprint arXiv:2002.07285 (2020)."},{"key":"e_1_3_2_1_36_1","first-page":"22695","article-title":"Double\/debiased machine learning for dynamic treatment effects","volume":"34","author":"Lewis Greg","year":"2021","unstructured":"Greg Lewis and Vasilis Syrgkanis. 2021. Double\/debiased machine learning for dynamic treatment effects. Advances in Neural Information Processing Systems 34 (2021), 22695--22707.","journal-title":"Advances in Neural Information Processing Systems"},{"key":"e_1_3_2_1_37_1","first-page":"389","article-title":"Gandalf: An Intelligent, End-To-End Analytics Service for Safe Deployment in Large-Scale Cloud Infrastructure","volume":"20","author":"Li Ze","year":"2020","unstructured":"Ze Li, Qian Cheng, Ken Hsieh, Yingnong Dang, Peng Huang, Pankaj Singh, Xinsheng Yang, Qingwei Lin, Youjiang Wu, Sebastien Levy, et al. 2020. Gandalf: An Intelligent, End-To-End Analytics Service for Safe Deployment in Large-Scale Cloud Infrastructure.. In NSDI, Vol. 20. 389--402.","journal-title":"NSDI"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236060"},{"key":"e_1_3_2_1_39_1","volume-title":"Large Language Models can Deliver Accurate and Interpretable Time Series Anomaly Detection. arXiv preprint arXiv:2405.15370","author":"Liu Jun","year":"2024","unstructured":"Jun Liu, Chaoyun Zhang, Jiaxu Qian, Minghua Ma, Si Qin, Chetan Bansal, Qingwei Lin, Saravan Rajmohan, and Dongmei Zhang. 2024. Large Language Models can Deliver Accurate and Interpretable Time Series Anomaly Detection. arXiv preprint arXiv:2405.15370 (2024)."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539176"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3558946"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.14778\/3389133.3389136"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"crossref","unstructured":"Marloes H Maathuis and Diego Colombo. 2015. A generalized backdoor criterion. (2015).","DOI":"10.1214\/14-AOS1295"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2019.2936353"},{"key":"e_1_3_2_1_45_1","volume-title":"Counterfactuals and causal inference","author":"Morgan Stephen L","unstructured":"Stephen L Morgan and Christopher Winship. 2015. Counterfactuals and causal inference. Cambridge University Press."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2015.11.014"},{"key":"e_1_3_2_1_47_1","volume-title":"Optimal asymptotic tests of composite hypotheses. Probability and statsitics","author":"Neyman Jerzy","year":"1959","unstructured":"Jerzy Neyman. 1959. Optimal asymptotic tests of composite hypotheses. Probability and statsitics (1959), 213--234."},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/asaa076"},{"key":"e_1_3_2_1_49_1","volume-title":"Uplift Modeling for preventing student dropout in higher education. Decision support systems 134","author":"Olaya Diego","year":"2020","unstructured":"Diego Olaya, Jonathan V\u00e1squez, Sebasti\u00e1n Maldonado, Jaime Miranda, and Wouter Verbeke. 2020. Uplift Modeling for preventing student dropout in higher education. Decision support systems 134 (2020), 113320."},{"key":"e_1_3_2_1_50_1","volume-title":"International Conference on Machine Learning. PMLR, 4932--4941","author":"Oprescu Miruna","year":"2019","unstructured":"Miruna Oprescu, Vasilis Syrgkanis, and Zhiwei Steven Wu. 2019. Orthogonal random forest for causal inference. In International Conference on Machine Learning. PMLR, 4932--4941."},{"key":"e_1_3_2_1_51_1","unstructured":"David Patterson Aaron Brown Pete Broadwell George Candea Mike Chen James Cutler Patricia Enriquez Armando Fox Emre Kiciman Matthew Merzbacher et al. 2002. Recovery-oriented computing (ROC): Motivation definition techniques and case studies. Technical Report. Citeseer."},{"key":"e_1_3_2_1_52_1","unstructured":"Judea Pearl. 2009. Causality. Cambridge university press."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1038\/s42256-020-0197-y"},{"key":"e_1_3_2_1_54_1","volume-title":"Matching using estimated propensity scores: relating theory to practice. Biometrics","author":"Rubin Donald B","year":"1996","unstructured":"Donald B Rubin and Neal Thomas. 1996. Matching using estimated propensity scores: relating theory to practice. Biometrics (1996), 249--264."},{"key":"e_1_3_2_1_55_1","volume-title":"A survey of decision tree classifier methodology","author":"Rasoul Safavian S","year":"1991","unstructured":"S Rasoul Safavian and David Landgrebe. 1991. A survey of decision tree classifier methodology. IEEE transactions on systems, man, and cybernetics 21, 3 (1991), 660--674."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1098\/rsos.220638"},{"key":"e_1_3_2_1_57_1","volume-title":"International conference on machine learning. PMLR, 3076--3085","author":"Shalit Uri","year":"2017","unstructured":"Uri Shalit, Fredrik D Johansson, and David Sontag. 2017. Estimating individual treatment effect: generalization bounds and algorithms. In International conference on machine learning. PMLR, 3076--3085."},{"key":"e_1_3_2_1_58_1","volume-title":"DoWhy: An End-to-End Library for Causal Inference. arXiv preprint arXiv:2011.04216","author":"Sharma Amit","year":"2020","unstructured":"Amit Sharma and Emre Kiciman. 2020. DoWhy: An End-to-End Library for Causal Inference. arXiv preprint arXiv:2011.04216 (2020)."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/3464994.3464996"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Aleksandrs Slivkins et al. 2019. Introduction to multi-armed bandits. Foundations and Trends\u00ae in Machine Learning 12 1--2 (2019) 1--286.","DOI":"10.1561\/2200000068"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/3501297"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1807128.1807161"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.2017.1319839"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1080\/00031305.1982.10482778"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3580305.3599934"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539127"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3447548.3467249"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05981-0_16"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1609\/aaai.v35i12.17296"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/3372224.3419195"},{"key":"e_1_3_2_1_71_1","volume-title":"UFO: A UI-Focused Agent for Windows OS Interaction. arXiv preprint arXiv:2402.07939","author":"Zhang Chaoyun","year":"2024","unstructured":"Chaoyun Zhang, Liqun Li, Shilin He, Xu Zhang, Bo Qiao, Si Qin, Minghua Ma, Yu Kang, Qingwei Lin, Saravan Rajmohan, Dongmei Zhang, and Qi Zhang. 2024. UFO: A UI-Focused Agent for Windows OS Interaction. arXiv preprint arXiv:2402.07939 (2024)."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMST.2019.2904897"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/3511808.3557070"},{"key":"e_1_3_2_1_74_1","volume-title":"Deepview: Virtual disk failure diagnosis and pattern detection for azure. In 15th { USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 18). 519--532.","author":"Zhang Qiao","year":"2018","unstructured":"Qiao Zhang, Guo Yu, Chuanxiong Guo, Yingnong Dang, Nick Swanson, Xinsheng Yang, Randolph Yao, Murali Chintalapati, Arvind Krishnamurthy, and Thomas Anderson. 2018. Deepview: Virtual disk failure diagnosis and pattern detection for azure. In 15th { USENIX} Symposium on Networked Systems Design and Implementation ({NSDI} 18). 519--532."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3466818","article-title":"A unified survey of treatment effect heterogeneity modelling and uplift modelling","volume":"54","author":"Zhang Weijia","year":"2021","unstructured":"Weijia Zhang, Jiuyong Li, and Lin Liu. 2021. A unified survey of treatment effect heterogeneity modelling and uplift modelling. ACM Computing Surveys (CSUR) 54, 8 (2021), 1--36.","journal-title":"ACM Computing Surveys (CSUR)"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSAA.2019.00057"}],"event":{"name":"SoCC '24: ACM Symposium on Cloud Computing","location":"Redmond WA USA","acronym":"SoCC '24","sponsor":["SIGMOD ACM Special Interest Group on Management of Data","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the ACM Symposium on Cloud Computing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3698038.3698534","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3698038.3698534","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T18:57:40Z","timestamp":1755889060000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3698038.3698534"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,11,20]]},"references-count":76,"alternative-id":["10.1145\/3698038.3698534","10.1145\/3698038"],"URL":"https:\/\/doi.org\/10.1145\/3698038.3698534","relation":{},"subject":[],"published":{"date-parts":[[2024,11,20]]},"assertion":[{"value":"2024-11-20","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}