{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,2]],"date-time":"2026-01-02T07:38:43Z","timestamp":1767339523411,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,4,14]],"date-time":"2024-04-14T00:00:00Z","timestamp":1713052800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,4,14]]},"DOI":"10.1145\/3639477.3639752","type":"proceedings-article","created":{"date-parts":[[2024,5,31]],"date-time":"2024-05-31T13:27:26Z","timestamp":1717162046000},"page":"178-188","update-policy":"https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Dynamic Alert Suppression Policy for Noise Reduction in AIOps"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/2.zoppoz.workers.dev:443\/https\/orcid.org\/0009-0009-7639-1670","authenticated-orcid":false,"given":"Karan","family":"Bhukar","sequence":"first","affiliation":[{"name":"IBM Research, Gurugram, Haryana, India"}]},{"ORCID":"https:\/\/2.zoppoz.workers.dev:443\/https\/orcid.org\/0009-0000-9126-5634","authenticated-orcid":false,"given":"Harshit","family":"Kumar","sequence":"additional","affiliation":[{"name":"IBM Research, Gurugram, Haryana, India"}]},{"ORCID":"https:\/\/2.zoppoz.workers.dev:443\/https\/orcid.org\/0000-0002-4711-8829","authenticated-orcid":false,"given":"Ruchi","family":"Mahindru","sequence":"additional","affiliation":[{"name":"IBM Research, Yorktown Heights, New York, USA"}]},{"ORCID":"https:\/\/2.zoppoz.workers.dev:443\/https\/orcid.org\/0009-0007-4809-4930","authenticated-orcid":false,"given":"Rohan","family":"Arora","sequence":"additional","affiliation":[{"name":"IBM Research, Yorktown Heights, New York, USA"}]},{"ORCID":"https:\/\/2.zoppoz.workers.dev:443\/https\/orcid.org\/0000-0003-1930-7101","authenticated-orcid":false,"given":"Seema","family":"Nagar","sequence":"additional","affiliation":[{"name":"IBM Research, Bangalore, Karnataka, India"}]},{"ORCID":"https:\/\/2.zoppoz.workers.dev:443\/https\/orcid.org\/0009-0006-3445-5654","authenticated-orcid":false,"given":"Pooja","family":"Aggarwal","sequence":"additional","affiliation":[{"name":"IBM Research, Bangalore, Karnataka, India"}]},{"ORCID":"https:\/\/2.zoppoz.workers.dev:443\/https\/orcid.org\/0000-0003-3707-8939","authenticated-orcid":false,"given":"Amit","family":"Paradkar","sequence":"additional","affiliation":[{"name":"IBM Research, Yorktown Heights, New York, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD53861.2021.00026"},{"key":"e_1_3_2_1_2_1","unstructured":"L. Borsellino and P. Crisafulli. 2001. The Day Trader's Course Workbook: Step-by-step exercises to help you master The Day Trader's Course. Wiley. https:\/\/2.zoppoz.workers.dev:443\/https\/books.google.co.in\/books?id=1pDhwAEACAAJ"},{"volume-title":"Monitoring Cloud-Native Applications: Lead Agile Operations Confidently Using Open Source Software","author":"Chakraborty Mainak","key":"e_1_3_2_1_3_1","unstructured":"Mainak Chakraborty and Ajit Pratap Kundan. 2021. Architecture of a Modern Monitoring System. In Monitoring Cloud-Native Applications: Lead Agile Operations Confidently Using Open Source Software. Springer, 55--96."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00020"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1002\/pmic.200401261"},{"volume-title":"Suppress Alerts with Downtimes. Retrieved Accessed","year":"2023","key":"e_1_3_2_1_6_1","unstructured":"Datadog, 2023. Suppress Alerts with Downtimes. Retrieved Accessed: May 1, 2023 from https:\/\/2.zoppoz.workers.dev:443\/https\/docs.datadoghq.com\/monitors\/guide\/suppress-alert-with-downtimes\/?tab=api"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Dipanwita Guhathakurta Pooja Aggarwal Seema Nagar Rohan Arora and Bing Zhou. 2022. Utilizing Persistence for Post Facto Suppression of Invalid Anomalies Using System Logs. (2022).","DOI":"10.1109\/ICSE-NIER55298.2022.9793537"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/CISP.2008.704"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3534678.3539339"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00032"},{"volume-title":"IBM Instana Observability: Smart Alerts. Retrieved Accessed","year":"2023","key":"e_1_3_2_1_12_1","unstructured":"Instana, 2023. IBM Instana Observability: Smart Alerts. Retrieved Accessed: May 1, 2023 from https:\/\/2.zoppoz.workers.dev:443\/https\/www.ibm.com\/docs\/en\/instana-observability\/current?topic=websites-smart-alerts"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417054"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/NSSMIC.2002.1239285"},{"key":"e_1_3_2_1_15_1","volume-title":"Technical Analysis: The Complete Resource for Financial Market Technicians. Pearson Education. https:\/\/2.zoppoz.workers.dev:443\/https\/books.google.co.in\/books?id=I5SgX5q5sQEC","author":"Kirkpatrick C.D.","year":"2010","unstructured":"C.D. Kirkpatrick and J.A. Dahlquist. 2010. Technical Analysis: The Complete Resource for Financial Market Technicians. Pearson Education. https:\/\/2.zoppoz.workers.dev:443\/https\/books.google.co.in\/books?id=I5SgX5q5sQEC"},{"key":"e_1_3_2_1_16_1","volume-title":"Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 1379--1389","author":"Kumar Harshit","year":"2022","unstructured":"Harshit Kumar, Ruchi Mahindru, and Debanjana Kar. 2022. Metadata-based retrieval for resolution recommendation in AIOps. In Proceedings of the 30th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. 1379--1389."},{"key":"e_1_3_2_1_17_1","article-title":"Online degradation assessment and adaptive fault detection using modified hidden Markov model","volume":"132","author":"Lee Seungchul","year":"2010","unstructured":"Seungchul Lee, Lin Li, and Jun Ni. 2010. Online degradation assessment and adaptive fault detection using modified hidden Markov model. Journal of Manufacturing Science and Engineering 132, 2 (2010).","journal-title":"Journal of Manufacturing Science and Engineering"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.08.030"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1080\/1350485022000041032","article-title":"An empirical comparison of moving average envelopes and Bollinger Bands","volume":"10","author":"Man-Joe Leung Joseph","year":"2003","unstructured":"Joseph Man-Joe Leung and Terence Tai-Leung Chong. 2003. An empirical comparison of moving average envelopes and Bollinger Bands. Applied Economics Letters 10, 6 (2003), 339--341.","journal-title":"Applied Economics Letters"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2623330.2623360"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-15-7749-9_1"},{"key":"e_1_3_2_1_22_1","volume-title":"Arjan Van Genderen, and Peter Beukelman","author":"Ma Meng","year":"2005","unstructured":"Meng Ma, Arjan Van Genderen, and Peter Beukelman. 2005. Developing and Implementing Peak Detection for Real-Time Image Registration. (01 2005)."},{"key":"e_1_3_2_1_23_1","volume-title":"36th IEEE\/ACM International Conference on Automated Software Engineering (ASE-2021)","author":"Mahindru Ruchi","year":"2021","unstructured":"Ruchi Mahindru, Harshit Kumar, and Sahil Bansal. 2021. Log Anomaly to Resolution: AI Based Proactive Incident Remediation. In 36th IEEE\/ACM International Conference on Automated Software Engineering (ASE-2021). IEEE\/Association for Computational Linguistics, Melbourne, Australia."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2012.01.435"},{"key":"e_1_3_2_1_25_1","volume-title":"Cyberspace Safety and Security: 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings 5. Springer, 183--197","author":"Mirheidari Seyed Ali","year":"2013","unstructured":"Seyed Ali Mirheidari, Sajjad Arshad, and Rasool Jalili. 2013. Alert correlation algorithms: A survey and taxonomy. In Cyberspace Safety and Security: 5th International Symposium, CSS 2013, Zhangjiajie, China, November 13-15, 2013, Proceedings 5. Springer, 183--197."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"crossref","unstructured":"Jeong-Seon Park Sang-Woong Lee Unsang Park et al. 2017. R peak detection method using wavelet transform and modified shannon energy envelope. Journal of healthcare engineering 2017 (2017).","DOI":"10.1155\/2017\/4901017"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"crossref","first-page":"469","DOI":"10.1007\/s12046-016-0485-8","article-title":"An improved method for R-peak detection by using Shannon energy envelope","volume":"41","author":"Rakshit M","year":"2016","unstructured":"M Rakshit, D Panigrahy, and PK Sahu. 2016. An improved method for R-peak detection by using Shannon energy envelope. S\u0101dhan\u0101 41 (2016), 469--477.","journal-title":"S\u0101dhan\u0101"},{"volume-title":"What Is AIOps? In Hands-on AIOps: Best Practices Guide to Implementing AIOps","author":"Sabharwal Navin","key":"e_1_3_2_1_28_1","unstructured":"Navin Sabharwal and Gaurav Bhardwaj. 2022. What Is AIOps? In Hands-on AIOps: Best Practices Guide to Implementing AIOps. Springer, 1--17."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.comnet.2012.10.022"},{"key":"e_1_3_2_1_30_1","volume-title":"Advanced Data Mining and Applications: Second International Conference, ADMA 2006, Xi'an, China, August 14-16, 2006 Proceedings 2. Springer, 1049--1056","author":"Shin Moon Sun","year":"2006","unstructured":"Moon Sun Shin and Kyeong Ja Jeong. 2006. Alert correlation analysis in intrusion detection. In Advanced Data Mining and Applications: Second International Conference, ADMA 2006, Xi'an, China, August 14-16, 2006 Proceedings 2. Springer, 1049--1056."},{"key":"e_1_3_2_1_31_1","volume-title":"A systematic analysis of performance measures for classification tasks. Information processing & management 45, 4","author":"Sokolova Marina","year":"2009","unstructured":"Marina Sokolova and Guy Lapalme. 2009. A systematic analysis of performance measures for classification tasks. Information processing & management 45, 4 (2009), 427--437."},{"volume-title":"Define alert suppression groups to throttle sets of similar alerts. Retrieved Accessed","year":"2023","key":"e_1_3_2_1_32_1","unstructured":"Splunk, 2023. Define alert suppression groups to throttle sets of similar alerts. Retrieved Accessed: May 1, 2023 from https:\/\/2.zoppoz.workers.dev:443\/https\/docs.splunk.com\/Documentation\/Splunk\/9.0.4\/Alert\/SuppressionGroups"},{"key":"e_1_3_2_1_33_1","article-title":"Adaptive markets hypothesis: Evidence from Asia-Pacific financial markets","volume":"1","author":"Todea Alexandru","year":"2009","unstructured":"Alexandru Todea, Maria Ulici, and Simona Silaghi. 2009. Adaptive markets hypothesis: Evidence from Asia-Pacific financial markets. The Review of Finance and Banking 1, 1 (2009).","journal-title":"The Review of Finance and Banking"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"crossref","unstructured":"Alexandru Todea Adrian Zoicas-Ienciu and Angela-Maria Filip. 2009. Profitability of the moving average strategy and the episodic dependencies: Empirical evidence from european stock markets. (2009).","DOI":"10.35808\/ersj\/210"},{"key":"e_1_3_2_1_35_1","first-page":"4790","article-title":"A Study On Commodity Market Volatality With Special Reference To Natural Gas","volume":"20","author":"Udhayasankar R","year":"2021","unstructured":"R Udhayasankar, N Balaji, Maran Marimuthu, and M Vijay. 2021. A Study On Commodity Market Volatality With Special Reference To Natural Gas. Ilkogretim Online 20, 1 (2021), 4790--4803.","journal-title":"Ilkogretim Online"},{"key":"e_1_3_2_1_36_1","volume-title":"2010 IEEE Network Operations and Management Symposium-NOMS","author":"Wang Chengwei","year":"2010","unstructured":"Chengwei Wang, Vanish Talwar, Karsten Schwan, and Parthasarathy Ranganathan. 2010. Online detection of utility cloud anomalies using metric distributions. In 2010 IEEE Network Operations and Management Symposium-NOMS 2010. IEEE, 96--103."},{"key":"e_1_3_2_1_37_1","volume-title":"2017 IEEE International Conference on Services Computing (SCC). IEEE, 35--43","author":"Xu Jingmin","year":"2017","unstructured":"Jingmin Xu, Yuan Wang, Pengfei Chen, and Ping Wang. 2017. Lightweight and adaptive service api performance monitoring in highly dynamic cloud environment. In 2017 IEEE International Conference on Services Computing (SCC). IEEE, 35--43."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377813.3381363"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/INFOCOM41043.2020.9155219"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/956750.956789"}],"event":{"name":"ICSE-SEIP '24: 46th International Conference on Software Engineering: Software Engineering in Practice","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS","Faculty of Engineering of University of Porto"],"location":"Lisbon Portugal","acronym":"ICSE-SEIP '24"},"container-title":["Proceedings of the 46th International Conference on Software Engineering: Software Engineering in Practice"],"original-title":[],"link":[{"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3639477.3639752","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/dl.acm.org\/doi\/pdf\/10.1145\/3639477.3639752","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:32Z","timestamp":1750290272000},"score":1,"resource":{"primary":{"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/dl.acm.org\/doi\/10.1145\/3639477.3639752"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,14]]},"references-count":40,"alternative-id":["10.1145\/3639477.3639752","10.1145\/3639477"],"URL":"https:\/\/2.zoppoz.workers.dev:443\/https\/doi.org\/10.1145\/3639477.3639752","relation":{},"subject":[],"published":{"date-parts":[[2024,4,14]]},"assertion":[{"value":"2024-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}