Export Citations
Save this search
Please login to be able to save your searches and receive alerts for new content matching your search criteria.
- research-articleAugust 2024
Pre-trained KPI Anomaly Detection Model Through Disentangled Transformer
- Zhaoyang Yu,
- Changhua Pei,
- Xin Wang,
- Minghua Ma,
- Chetan Bansal,
- Saravan Rajmohan,
- Qingwei Lin,
- Dongmei Zhang,
- Xidao Wen,
- Jianhui Li,
- Gaogang Xie,
- Dan Pei
KDD '24: Proceedings of the 30th ACM SIGKDD Conference on Knowledge Discovery and Data MiningPages 6190–6201https://doi.org/10.1145/3637528.3671522In large-scale online service systems, numerous Key Performance Indicators (KPIs), such as service response time and error rate, are gathered in a time-series format. KPI Anomaly Detection (KAD) is a critical data mining problem due to its widespread ...
- research-articleMay 2024
Supervised Fine-Tuning for Unsupervised KPI Anomaly Detection for Mobile Web Systems
WWW '24: Proceedings of the ACM Web Conference 2024Pages 2859–2869https://doi.org/10.1145/3589334.3645392With the rapid development of cellular networks, wireless base stations (WBSes) have become crucial infrastructure for mobile web systems. To ensure service quality, operators constantly monitor the operation status of WBSes and deploy anomaly detection ...
- ArticleAugust 2022
Mining Fluctuation Propagation Graph Among Time Series with Active Learning
- Mingjie Li,
- Minghua Ma,
- Xiaohui Nie,
- Kanglin Yin,
- Li Cao,
- Xidao Wen,
- Zhiyun Yuan,
- Duogang Wu,
- Guoying Li,
- Wei Liu,
- Xin Yang,
- Dan Pei
Database and Expert Systems ApplicationsPages 220–233https://doi.org/10.1007/978-3-031-12423-5_17AbstractFaults are inevitable in a complex online service system. Compared with the textual incident records, the knowledge graph provides an abstract and formal representation for the empirical knowledge of how fluctuations, especially faults, propagate. ...
- research-articleAugust 2021
An empirical investigation of practical log anomaly detection for online service systems
- Nengwen Zhao,
- Honglin Wang,
- Zeyan Li,
- Xiao Peng,
- Gang Wang,
- Zhu Pan,
- Yong Wu,
- Zhen Feng,
- Xidao Wen,
- Wenchi Zhang,
- Kaixin Sui,
- Dan Pei
ESEC/FSE 2021: Proceedings of the 29th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software EngineeringPages 1404–1415https://doi.org/10.1145/3468264.3473933Log data is an essential and valuable resource of online service systems, which records detailed information of system running status and user behavior. Log anomaly detection is vital for service reliability engineering, which has been extensively ...
- research-articleAugust 2021
Multivariate Time Series Anomaly Detection and Interpretation using Hierarchical Inter-Metric and Temporal Embedding
KDD '21: Proceedings of the 27th ACM SIGKDD Conference on Knowledge Discovery & Data MiningPages 3220–3230https://doi.org/10.1145/3447548.3467075Anomaly detection is a crucial task for monitoring various status (i.e., metrics) of entities (e.g., manufacturing systems and Internet services), which are often characterized by multivariate time series (MTS). In practice, it's important to precisely ...
- research-articleApril 2020
Micro- and macro-level churn analysis of large-scale mobile games
Knowledge and Information Systems (KAIS), Volume 62, Issue 4Pages 1465–1496https://doi.org/10.1007/s10115-019-01394-7AbstractAs mobile devices become more and more popular, mobile gaming has emerged as a promising market with billion-dollar revenue. A variety of mobile game platforms and services have been developed around the world. A critical challenge for these ...
- research-articleMay 2019
Real-Time Streaming Graph Embedding Through Local Actions
WWW '19: Companion Proceedings of The 2019 World Wide Web ConferencePages 285–293https://doi.org/10.1145/3308560.3316585Recently, considerable research attention has been paid to graph embedding, a popular approach to construct representations of vertices in latent space. Due to the curse of dimensionality and sparsity in graphical datasets, this approach has become ...
- research-articleMay 2019
Iterative Discriminant Tensor Factorization for Behavior Comparison in Massive Open Online Courses
WWW '19: The World Wide Web ConferencePages 2068–2079https://doi.org/10.1145/3308558.3313713The increasing utilization of massive open online courses has significantly expanded global access to formal education. Despite the technology's promising future, student interaction on MOOCs is still a relatively under-explored and poorly understood ...
- research-articleOctober 2018
Event Analytics via Discriminant Tensor Factorization
ACM Transactions on Knowledge Discovery from Data (TKDD), Volume 12, Issue 6Article No.: 72, Pages 1–38https://doi.org/10.1145/3184455Analyzing the impact of disastrous events has been central to understanding and responding to crises. Traditionally, the assessment of disaster impact has primarily relied on the manual collection and analysis of surveys and questionnaires as well as ...
- research-articleNovember 2017
Anomaly Detection in Dynamic Networks using Multi-view Time-Series Hypersphere Learning
CIKM '17: Proceedings of the 2017 ACM on Conference on Information and Knowledge ManagementPages 827–836https://doi.org/10.1145/3132847.3132964Detecting anomalous patterns from dynamic and multi-attributed network systems has been a challenging problem due to the complication of temporal dynamics and the variations reflected in multiple data sources. We propose a Multi-view Time-Series ...
- ArticleNovember 2016
The Dynamics of Group Risk Perception in the US After Paris Attacks
Social InformaticsPages 168–184https://doi.org/10.1007/978-3-319-47880-7_11AbstractThis paper examines how the public perceived immigrant groups as potential risk, and how such risk perception changed after the attacks that took place in Paris on November 13, 2015. The study utilizes the Twitter conversations associated with ...
- research-articleOctober 2016
PairFac: Event Analytics through Discriminant Tensor Factorization
CIKM '16: Proceedings of the 25th ACM International on Conference on Information and Knowledge ManagementPages 519–528https://doi.org/10.1145/2983323.2983837The study of disaster events and their impact in the urban space has been traditionally conducted through manual collections and analysis of surveys, questionnaires and authority documents. While there have been increasingly rich troves of human ...
- research-articleJanuary 2016
Twitter in academic events
Computer Communications (COMS), Volume 73, Issue PBPages 301–314https://doi.org/10.1016/j.comcom.2015.07.001Analysis of Twitter on 16 CS conferences over five years.Over time, users increase informational use and decrease conversational usage.LDA allows conference clustering, unveiling shared areas of interest.Sentiment analysis exposes differences between ...
- research-articleNovember 2015
Information Seeking and Responding Networks in Physical Gatherings: A Case Study of Academic Conferences in Twitter
COSN '15: Proceedings of the 2015 ACM on Conference on Online Social NetworksPages 197–208https://doi.org/10.1145/2817946.2817960With the allure of immediacy, social media like Twitter have been widely used in physical gatherings as a ``backchannel'' to facilitate the conversations among participants. Studies have been centered around identifying the characteristics of such ...
- short-paperSeptember 2014
Twitter in academic conferences: usage, networking and participation over time
HT '14: Proceedings of the 25th ACM conference on Hypertext and social mediaPages 285–290https://doi.org/10.1145/2631775.2631826Twitter is often referred to as a backchannel for conferences. While the main conference takes place in a physical setting, attendees and virtual attendees socialize, introduce new ideas or broadcast information by microblogging on Twitter. In this ...
- posterApril 2014
Who will trade with whom?: predicting buyer-seller interactions in online trading platforms through social networks
WWW '14 Companion: Proceedings of the 23rd International Conference on World Wide WebPages 387–388https://doi.org/10.1145/2567948.2577364In this paper we present the latest results of a recently started project that aims at studying the extent to which links between buyers and sellers, i.e. trading interactions in online trading platforms, can be predicted from external knowledge sources ...
- posterFebruary 2014
How groups of people interact with each other on Twitter during academic conferences
CSCW Companion '14: Proceedings of the companion publication of the 17th ACM conference on Computer supported cooperative work & social computingPages 253–256https://doi.org/10.1145/2556420.2556485This paper shows a work-in-progress of a recently started project, which aims to understand how people interact with each other on Twitter during academic conferences, with emphasis on different user groups. As a first step in that direction, we ...