{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T05:23:17Z","timestamp":1770441797568,"version":"3.49.0"},"reference-count":77,"publisher":"Association for Computing Machinery (ACM)","issue":"12","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Proc. VLDB Endow."],"published-print":{"date-parts":[[2015,8]]},"abstract":"<jats:p>\n            We introduce ConfSeer, an automated system that detects potential configuration issues or deviations from identified best practices by leveraging a knowledge base (KB) of technical solutions. The intuition is that these KB articles describe the configuration problems and their fixes so if the system can\n            <jats:italic>accurately<\/jats:italic>\n            understand them, it can\n            <jats:italic>automatically<\/jats:italic>\n            pinpoint both the errors and their resolution. Unfortunately, finding an accurate match is difficult because (a) the KB articles are written in natural language text, and (b) configuration files typically contain a large number of parameters with a high value range. Thus, expert-driven manual troubleshooting is not scalable.\n          <\/jats:p>\n          <jats:p>\n            While there are several state-of-the-art techniques proposed for individual tasks such as keyword matching, concept determination and entity resolution, none offer a practical\n            <jats:italic>end-to-end<\/jats:italic>\n            solution to detect problems in machine configurations. In this paper, we describe our experiences building ConfSeer using a novel combinations of ideas from natural language processing, information retrieval and interactive learning. ConfSeer powers the recommendation engine behind Microsoft Operations Management Suite that proposes fixes for software configuration errors. The system has been running in production for about a year to proactively find misconfigurations on tens of thousands of servers. Our evaluation of ConfSeer against an expert-defined rule-based commercial system, an expert survey and web search engines shows that it achieves 80%-97.5% accuracy and incurs low runtime overheads.\n          <\/jats:p>","DOI":"10.14778\/2824032.2824079","type":"journal-article","created":{"date-parts":[[2015,9,16]],"date-time":"2015-09-16T12:18:17Z","timestamp":1442405897000},"page":"1828-1839","source":"Crossref","is-referenced-by-count":16,"title":["ConfSeer"],"prefix":"10.14778","volume":"8","author":[{"given":"Rahul","family":"Potharaju","sequence":"first","affiliation":[{"name":"Microsoft"}]},{"given":"Joseph","family":"Chan","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Luhui","family":"Hu","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Cristina","family":"Nita-Rotaru","sequence":"additional","affiliation":[{"name":"Purdue University"}]},{"given":"Mingshi","family":"Wang","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Liyuan","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft"}]},{"given":"Navendu","family":"Jain","sequence":"additional","affiliation":[{"name":"Microsoft Research"}]}],"member":"320","published-online":{"date-parts":[[2015,8]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"Apple Knowledge Base. http:\/\/kbase.info.apple.com\/.  Apple Knowledge Base. http:\/\/kbase.info.apple.com\/."},{"key":"e_1_2_1_2_1","unstructured":"Desk.com. http:\/\/desk.com.  Desk.com. http:\/\/desk.com."},{"key":"e_1_2_1_3_1","unstructured":"EMC Powerlink. http:\/\/powerlink.emc.com.  EMC Powerlink. http:\/\/powerlink.emc.com."},{"key":"e_1_2_1_4_1","unstructured":"Google Knowledge Base. http:\/\/goo.gl\/6wN6oB.  Google Knowledge Base. http:\/\/goo.gl\/6wN6oB."},{"key":"e_1_2_1_5_1","unstructured":"How to query the Microsoft Knowledge Base. http:\/\/support.microsoft.com\/kb\/242450.  How to query the Microsoft Knowledge Base. http:\/\/support.microsoft.com\/kb\/242450."},{"key":"e_1_2_1_6_1","unstructured":"IBM Software Knowledge Base. http:\/\/goo.gl\/fY0cDQ.  IBM Software Knowledge Base. http:\/\/goo.gl\/fY0cDQ."},{"key":"e_1_2_1_7_1","unstructured":"Microsoft Operations Management Suite. http:\/\/www.microsoft.com\/en-us\/server-cloud\/operations-management-suite\/.  Microsoft Operations Management Suite. http:\/\/www.microsoft.com\/en-us\/server-cloud\/operations-management-suite\/."},{"key":"e_1_2_1_8_1","unstructured":"Microsoft Support. http:\/\/support.microsoft.com\/.  Microsoft Support. http:\/\/support.microsoft.com\/."},{"key":"e_1_2_1_9_1","unstructured":"Oracle Support. http:\/\/support.oracle.com.  Oracle Support. http:\/\/support.oracle.com."},{"key":"e_1_2_1_10_1","unstructured":"StackOverflow. http:\/\/stackoverflow.com.  StackOverflow. http:\/\/stackoverflow.com."},{"key":"e_1_2_1_11_1","unstructured":"SysSieve. http:\/\/research.microsoft.com\/en-us\/um\/people\/navendu\/syssieve\/.  SysSieve. http:\/\/research.microsoft.com\/en-us\/um\/people\/navendu\/syssieve\/."},{"key":"e_1_2_1_12_1","unstructured":"VMWare KB - Knowledge Base Articles for all VMWare Products. http:\/\/kb.vmware.com.  VMWare KB - Knowledge Base Articles for all VMWare Products. http:\/\/kb.vmware.com."},{"key":"e_1_2_1_13_1","volume-title":"NSDI","author":"Agarwal B.","year":"2009"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.14778\/2556549.2556567"},{"key":"e_1_2_1_15_1","volume-title":"OSDI","author":"Attariyan M.","year":"2012"},{"key":"e_1_2_1_16_1","volume-title":"OSDI","author":"Attariyan M.","year":"2010"},{"key":"e_1_2_1_17_1","volume-title":"Springer","author":"Auer S.","year":"2007"},{"key":"e_1_2_1_18_1","volume-title":"IEEE ICSE","author":"Bounimova E.","year":"2013"},{"key":"e_1_2_1_19_1","volume-title":"OSDI","author":"Cadar C.","year":"2008"},{"key":"e_1_2_1_20_1","volume-title":"AAAI","author":"Carlson A.","year":"2010"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1851182.1851190"},{"key":"e_1_2_1_22_1","volume-title":"CoNEXT, 2010","author":"Chen X.","year":"1921"},{"key":"e_1_2_1_23_1","volume-title":"NLPVLC.","author":"Church K.","year":"1999"},{"key":"e_1_2_1_24_1","doi-asserted-by":"crossref","unstructured":"D. Crockford. The application\/json media type for javascript object notation (json). https:\/\/goo.gl\/SM1kDa 2006.  D. Crockford. The application\/json media type for javascript object notation (json). https:\/\/goo.gl\/SM1kDa 2006.","DOI":"10.17487\/rfc4627"},{"key":"e_1_2_1_25_1","volume-title":"IEEE ARES","author":"Dai H.","year":"2010"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536258.2536271"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.14778\/2556549.2556562"},{"key":"e_1_2_1_28_1","volume-title":"VLDB Endowment","author":"Duan S.","year":"2009"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988687"},{"key":"e_1_2_1_30_1","volume-title":"WDSM. ACM, 2011","author":"Fang Y.","year":"1935"},{"key":"e_1_2_1_31_1","volume-title":"NSDI","author":"Feamster N.","year":"2005"},{"key":"e_1_2_1_32_1","volume-title":"EACL. Citeseer","author":"Giuliano C.","year":"2006"},{"key":"e_1_2_1_33_1","volume-title":"ICET. IEEE","author":"Haq M. U.","year":"2012"},{"key":"e_1_2_1_34_1","volume-title":"The Tolly Group","author":"Kapoor A.","year":"2000"},{"key":"e_1_2_1_35_1","volume-title":"DSN","author":"Keller L.","year":"2008"},{"key":"e_1_2_1_36_1","volume-title":"AMS","author":"Kiefer J.","year":"1953"},{"key":"e_1_2_1_37_1","first-page":"1137","volume-title":"IJCAI","volume":"14","author":"Kohavi R.","year":"1995"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.14778\/1920841.1920904"},{"key":"e_1_2_1_39_1","volume-title":"JMLR","author":"Langford J.","year":"2009"},{"key":"e_1_2_1_40_1","volume-title":"Inc.","author":"Lenat D. B.","year":"1989"},{"key":"e_1_2_1_41_1","volume-title":"Proceedings of the VLDB Endowment, 2010","author":"Limaye G.","year":"1920"},{"key":"e_1_2_1_42_1","volume-title":"ATC","author":"Lou J.-G.","year":"2010"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.3115\/1119176.1119206"},{"key":"e_1_2_1_44_1","unstructured":"Microsoft. Microsoft Developer Network. http:\/\/msdn.microsoft.com\/.  Microsoft. Microsoft Developer Network. http:\/\/msdn.microsoft.com\/."},{"key":"e_1_2_1_45_1","unstructured":"Microsoft. Windows Error Reporting. http:\/\/goo.gl\/Tma5G3.  Microsoft. Windows Error Reporting. http:\/\/goo.gl\/Tma5G3."},{"key":"e_1_2_1_46_1","volume-title":"Communications of the ACM, 1995","author":"Miller G. A.","year":"1971"},{"key":"e_1_2_1_47_1","unstructured":"J. C. Perez. Google outages blamed on sign-in system. http:\/\/goo.gl\/PScp6m.  J. C. Perez. Google outages blamed on sign-in system. http:\/\/goo.gl\/PScp6m."},{"key":"e_1_2_1_48_1","unstructured":"M. F. Porter. Snowball: A language for stemming algorithms 2001.  M. F. Porter. Snowball: A language for stemming algorithms 2001."},{"key":"e_1_2_1_49_1","volume-title":"NSDI","author":"Potharaju R.","year":"2013"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100053"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1555228.1555269"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536258.2536264"},{"key":"e_1_2_1_53_1","volume-title":"Proceedings of the VLDB Endowment, 2011","author":"Rastogi V.","year":"1938"},{"key":"e_1_2_1_54_1","unstructured":"G. Salton and M. J. McGill. Introduction to modern information retrieval McGraw-Hill Inc. 1986.   G. Salton and M. J. McGill. Introduction to modern information retrieval McGraw-Hill Inc. 1986."},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.14778\/2536258.2536259"},{"key":"e_1_2_1_56_1","unstructured":"F. Smadja. Retrieving collocations from text: Xtract. CL 1993.   F. Smadja. Retrieving collocations from text: Xtract. CL 1993."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1323293.1294284"},{"key":"e_1_2_1_58_1","volume-title":"VLDB, 2011","author":"Suchanek F. M.","year":"2078"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242667"},{"key":"e_1_2_1_60_1","unstructured":"The Guardian. Choose customer service without the call center. http:\/\/goo.gl\/8sUj7D.  The Guardian. Choose customer service without the call center. http:\/\/goo.gl\/8sUj7D."},{"key":"e_1_2_1_61_1","volume-title":"OSDI","author":"Wang H. J.","year":"2004"},{"key":"e_1_2_1_62_1","volume-title":"SCP","author":"Wang Y.-M.","year":"2004"},{"key":"e_1_2_1_63_1","volume-title":"ICML","author":"Weinberger K.","year":"2009"},{"key":"e_1_2_1_64_1","volume-title":"OSDI","author":"Whitaker A.","year":"2004"},{"key":"e_1_2_1_65_1","unstructured":"A. Wilhelm. Microsoft: Azure went down in Western Europe due to misconfigured network device. http:\/\/goo.gl\/USVRlC.  A. Wilhelm. Microsoft: Azure went down in Western Europe due to misconfigured network device. http:\/\/goo.gl\/USVRlC."},{"key":"e_1_2_1_66_1","volume-title":"SIGMOD. ACM","author":"Wu W.","year":"2012"},{"key":"e_1_2_1_67_1","volume-title":"ICSE","author":"Xiong Y.","year":"2012"},{"key":"e_1_2_1_68_1","volume-title":"In ACM SOSP","author":"Xu T.","year":"2013"},{"key":"e_1_2_1_69_1","volume-title":"SOSP. ACM","author":"Xu W.","year":"2009"},{"key":"e_1_2_1_70_1","volume-title":"SysML","author":"Xu W.","year":"2008"},{"key":"e_1_2_1_71_1","volume-title":"CL, 2001. 10","author":"Yamamoto M.","year":"2010"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-014-0374-x"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/2043556.2043572"},{"key":"e_1_2_1_74_1","volume-title":"SIGOPS OSR, 2006","author":"Yuan C.","year":"1806"},{"key":"e_1_2_1_75_1","volume-title":"ATC","author":"Yuan D.","year":"2011"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2541940.2541983"},{"key":"e_1_2_1_77_1","volume-title":"ICSE","author":"Zhang S.","year":"2013"}],"container-title":["Proceedings of the VLDB Endowment"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.14778\/2824032.2824079","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,28]],"date-time":"2022-12-28T10:08:18Z","timestamp":1672222098000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.14778\/2824032.2824079"}},"subtitle":["leveraging customer support knowledge bases for automated misconfiguration detection"],"short-title":[],"issued":{"date-parts":[[2015,8]]},"references-count":77,"journal-issue":{"issue":"12","published-print":{"date-parts":[[2015,8]]}},"alternative-id":["10.14778\/2824032.2824079"],"URL":"https:\/\/doi.org\/10.14778\/2824032.2824079","relation":{},"ISSN":["2150-8097"],"issn-type":[{"value":"2150-8097","type":"print"}],"subject":[],"published":{"date-parts":[[2015,8]]}}}