{"id":"https://openalex.org/W2946651629","doi":"https://doi.org/10.1109/pccc.2018.8711092","title":"FacGraph: Frequent Anomaly Correlation Graph Mining for Root Cause Diagnose in Micro-Service Architecture","display_name":"FacGraph: Frequent Anomaly Correlation Graph Mining for Root Cause Diagnose in Micro-Service Architecture","publication_year":2018,"publication_date":"2018-11-01","ids":{"openalex":"https://openalex.org/W2946651629","doi":"https://doi.org/10.1109/pccc.2018.8711092","mag":"2946651629"},"language":"en","primary_location":{"id":"doi:10.1109/pccc.2018.8711092","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pccc.2018.8711092","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5046222525","display_name":"Weilan Lin","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":true,"raw_author_name":"Weilan Lin","raw_affiliation_strings":["School of Software and Microelectronics, Peking University"],"affiliations":[{"raw_affiliation_string":"School of Software and Microelectronics, Peking University","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5100762316","display_name":"Meng Ma","orcid":"https://orcid.org/0000-0002-1963-2513"},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Meng Ma","raw_affiliation_strings":["National Engineering Research Center for Software Engineering, Peking University"],"affiliations":[{"raw_affiliation_string":"National Engineering Research Center for Software Engineering, Peking University","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5088387880","display_name":"Disheng Pan","orcid":null},"institutions":[{"id":"https://openalex.org/I20231570","display_name":"Peking University","ror":"https://ror.org/02v51f717","country_code":"CN","type":"education","lineage":["https://openalex.org/I20231570"]}],"countries":["CN"],"is_corresponding":false,"raw_author_name":"Disheng Pan","raw_affiliation_strings":["School of Electronic and Computer Engineering, Peking University Shenzhen Graduate School"],"affiliations":[{"raw_affiliation_string":"School of Electronic and Computer Engineering, Peking University Shenzhen Graduate School","institution_ids":["https://openalex.org/I20231570"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5100338689","display_name":"Ping Wang","orcid":"https://orcid.org/0000-0002-8854-2079"},"institutions":[{"id":"https://openalex.org/I4210092262","display_name":"Ministry of Education","ror":"https://ror.org/00dh5gw98","country_code":"RO","type":"funder","lineage":["https://openalex.org/I2799732796","https://openalex.org/I4210092262"]}],"countries":["RO"],"is_corresponding":false,"raw_author_name":"Ping Wang","raw_affiliation_strings":["Ministry of Education, Key Laboratory of High Confidence Software Technologies (PKU)"],"affiliations":[{"raw_affiliation_string":"Ministry of Education, Key Laboratory of High Confidence Software Technologies (PKU)","institution_ids":["https://openalex.org/I4210092262"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5046222525"],"corresponding_institution_ids":["https://openalex.org/I20231570"],"apc_list":null,"apc_paid":null,"fwci":0.9227,"has_fulltext":false,"cited_by_count":24,"citation_normalized_percentile":{"value":0.79116497,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"8"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10400","display_name":"Network Security and Intrusion Detection","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10538","display_name":"Data Mining Algorithms and Applications","score":0.9945999979972839,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/root-cause-analysis","display_name":"Root cause analysis","score":0.7679659128189087},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7257572412490845},{"id":"https://openalex.org/keywords/root-cause","display_name":"Root cause","score":0.6480092406272888},{"id":"https://openalex.org/keywords/leverage","display_name":"Leverage (statistics)","score":0.574327826499939},{"id":"https://openalex.org/keywords/anomaly-detection","display_name":"Anomaly detection","score":0.5658517479896545},{"id":"https://openalex.org/keywords/ibm","display_name":"IBM","score":0.5219630599021912},{"id":"https://openalex.org/keywords/cloud-computing","display_name":"Cloud computing","score":0.5214245319366455},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.5155777335166931},{"id":"https://openalex.org/keywords/architecture","display_name":"Architecture","score":0.4992401599884033},{"id":"https://openalex.org/keywords/novelty","display_name":"Novelty","score":0.49475330114364624},{"id":"https://openalex.org/keywords/identification","display_name":"Identification (biology)","score":0.4928426742553711},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.4861697554588318},{"id":"https://openalex.org/keywords/anomaly","display_name":"Anomaly (physics)","score":0.4522562026977539},{"id":"https://openalex.org/keywords/root","display_name":"Root (linguistics)","score":0.4305153489112854},{"id":"https://openalex.org/keywords/artificial-intelligence","display_name":"Artificial intelligence","score":0.3239324986934662},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.24938547611236572},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.14094287157058716},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.12465617060661316},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.08660855889320374}],"concepts":[{"id":"https://openalex.org/C130963320","wikidata":"https://www.wikidata.org/wiki/Q1401207","display_name":"Root cause analysis","level":2,"score":0.7679659128189087},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7257572412490845},{"id":"https://openalex.org/C84945661","wikidata":"https://www.wikidata.org/wiki/Q7366567","display_name":"Root cause","level":2,"score":0.6480092406272888},{"id":"https://openalex.org/C153083717","wikidata":"https://www.wikidata.org/wiki/Q6535263","display_name":"Leverage (statistics)","level":2,"score":0.574327826499939},{"id":"https://openalex.org/C739882","wikidata":"https://www.wikidata.org/wiki/Q3560506","display_name":"Anomaly detection","level":2,"score":0.5658517479896545},{"id":"https://openalex.org/C70388272","wikidata":"https://www.wikidata.org/wiki/Q5968558","display_name":"IBM","level":2,"score":0.5219630599021912},{"id":"https://openalex.org/C79974875","wikidata":"https://www.wikidata.org/wiki/Q483639","display_name":"Cloud computing","level":2,"score":0.5214245319366455},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.5155777335166931},{"id":"https://openalex.org/C123657996","wikidata":"https://www.wikidata.org/wiki/Q12271","display_name":"Architecture","level":2,"score":0.4992401599884033},{"id":"https://openalex.org/C2778738651","wikidata":"https://www.wikidata.org/wiki/Q16546687","display_name":"Novelty","level":2,"score":0.49475330114364624},{"id":"https://openalex.org/C116834253","wikidata":"https://www.wikidata.org/wiki/Q2039217","display_name":"Identification (biology)","level":2,"score":0.4928426742553711},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.4861697554588318},{"id":"https://openalex.org/C12997251","wikidata":"https://www.wikidata.org/wiki/Q567560","display_name":"Anomaly (physics)","level":2,"score":0.4522562026977539},{"id":"https://openalex.org/C171078966","wikidata":"https://www.wikidata.org/wiki/Q111029","display_name":"Root (linguistics)","level":2,"score":0.4305153489112854},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3239324986934662},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.24938547611236572},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.14094287157058716},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.12465617060661316},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.08660855889320374},{"id":"https://openalex.org/C171250308","wikidata":"https://www.wikidata.org/wiki/Q11468","display_name":"Nanotechnology","level":1,"score":0.0},{"id":"https://openalex.org/C27206212","wikidata":"https://www.wikidata.org/wiki/Q34178","display_name":"Theology","level":1,"score":0.0},{"id":"https://openalex.org/C121332964","wikidata":"https://www.wikidata.org/wiki/Q413","display_name":"Physics","level":0,"score":0.0},{"id":"https://openalex.org/C192562407","wikidata":"https://www.wikidata.org/wiki/Q228736","display_name":"Materials science","level":0,"score":0.0},{"id":"https://openalex.org/C41895202","wikidata":"https://www.wikidata.org/wiki/Q8162","display_name":"Linguistics","level":1,"score":0.0},{"id":"https://openalex.org/C26873012","wikidata":"https://www.wikidata.org/wiki/Q214781","display_name":"Condensed matter physics","level":1,"score":0.0},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C153349607","wikidata":"https://www.wikidata.org/wiki/Q36649","display_name":"Visual arts","level":1,"score":0.0},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C142362112","wikidata":"https://www.wikidata.org/wiki/Q735","display_name":"Art","level":0,"score":0.0},{"id":"https://openalex.org/C59822182","wikidata":"https://www.wikidata.org/wiki/Q441","display_name":"Botany","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/pccc.2018.8711092","is_oa":false,"landing_page_url":"https://doi.org/10.1109/pccc.2018.8711092","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 37th International Performance Computing and Communications Conference (IPCCC)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.5899999737739563,"display_name":"Industry, innovation and infrastructure","id":"https://metadata.un.org/sdg/9"}],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":32,"referenced_works":["https://openalex.org/W191500313","https://openalex.org/W216907029","https://openalex.org/W1500436346","https://openalex.org/W1610680536","https://openalex.org/W1641749581","https://openalex.org/W1972980389","https://openalex.org/W1985147554","https://openalex.org/W1985644065","https://openalex.org/W1995603189","https://openalex.org/W2073865925","https://openalex.org/W2089554624","https://openalex.org/W2089686701","https://openalex.org/W2104050994","https://openalex.org/W2108150886","https://openalex.org/W2110893883","https://openalex.org/W2118349699","https://openalex.org/W2136593687","https://openalex.org/W2151953639","https://openalex.org/W2161415693","https://openalex.org/W2162832213","https://openalex.org/W2170726034","https://openalex.org/W2322013807","https://openalex.org/W2508465325","https://openalex.org/W2750225748","https://openalex.org/W2821372324","https://openalex.org/W2914775513","https://openalex.org/W2951121243","https://openalex.org/W3006026125","https://openalex.org/W4252403066","https://openalex.org/W4302423442","https://openalex.org/W6636404519","https://openalex.org/W6685146747"],"related_works":["https://openalex.org/W2030594396","https://openalex.org/W2535098331","https://openalex.org/W2202104725","https://openalex.org/W4255366506","https://openalex.org/W2056250485","https://openalex.org/W4280640835","https://openalex.org/W2885334669","https://openalex.org/W2111856191","https://openalex.org/W4230518569","https://openalex.org/W4230900947"],"abstract_inverted_index":{"Micro-service":[0],"architecture":[1,44],"is":[2,27],"a":[3,52,82,120,153],"promising":[4],"paradigm":[5],"to":[6,31,46,93,106,125],"develop,":[7],"deploy":[8],"and":[9,14,29,33,58,151],"maintain":[10],"applications":[11,20],"using":[12],"independent":[13],"autonomous":[15],"cloud":[16],"services.":[17,97],"Nowadays,":[18],"increasingly":[19],"are":[21],"embracing":[22],"this":[23],"model.":[24],"However,":[25],"it":[26],"difficult":[28],"time-consuming":[30],"diagnose":[32],"identify":[34],"the":[35,108,111],"actual":[36],"root":[37,59,95,157],"cause":[38,60,96,158],"when":[39,160],"anomalies":[40],"occurs":[41],"in":[42,62,67,77,135,148],"micro-service":[43,63],"due":[45],"various":[47],"factors.":[48],"This":[49],"paper":[50],"introduces":[51],"novel":[53],"framework":[54,134],"for":[55],"anomaly":[56,88,162],"investigation":[57],"identification":[61,155],"architecture.":[64],"The":[65],"novelty":[66],"our":[68,78,133],"work":[69],"lies":[70],"on:":[71],"(1)":[72],"Different":[73],"from":[74],"existing":[75],"solutions,":[76],"framework,":[79],"we":[80],"propose":[81],"frequent":[83,112],"pattern":[84],"mining":[85,114],"algorithm":[86],"on":[87],"correlation":[89],"graph,":[90],"named":[91],"FacGraph,":[92],"discover":[94],"(2)":[98],"We":[99,117,131],"leverage":[100],"breadth":[101],"first":[102],"ordered":[103],"string":[104],"(BFOS)":[105],"reduce":[107],"time-consumption":[109],"of":[110,123,156],"graph":[113],"(FSM)":[115],"(3)":[116],"further":[118],"develop":[119],"distributed":[121],"version":[122],"FacGraph":[124,144],"improve":[126],"its":[127],"paralleled":[128],"computing":[129],"efficiency.":[130],"evaluate":[132],"real":[136],"production":[137],"environment":[138],"IBM":[139],"Bluemix.":[140],"Result":[141],"demonstrate":[142],"that":[143],"outperforms":[145],"other":[146],"methods":[147],"diagnosis":[149],"accuracy":[150],"offers":[152],"fast":[154],"service":[159],"an":[161],"occurs.":[163]},"counts_by_year":[{"year":2026,"cited_by_count":1},{"year":2025,"cited_by_count":4},{"year":2024,"cited_by_count":6},{"year":2023,"cited_by_count":3},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":1},{"year":2020,"cited_by_count":4}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
