{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T09:11:17Z","timestamp":1743153077675,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030644369"},{"type":"electronic","value":"9783030644376"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-64437-6_13","type":"book-chapter","created":{"date-parts":[[2020,11,26]],"date-time":"2020-11-26T13:02:45Z","timestamp":1606395765000},"page":"251-269","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Automatically Generating Descriptive Texts in Logging Statements: How Far Are We?"],"prefix":"10.1007","author":[{"given":"Xiaotong","family":"Liu","sequence":"first","affiliation":[]},{"given":"Tong","family":"Jia","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hao","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Yue","sequence":"additional","affiliation":[]},{"given":"Chuanjia","family":"Hou","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,11,24]]},"reference":[{"key":"13_CR1","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/s10664-016-9429-5","volume":"22","author":"B Chen","year":"2017","unstructured":"Chen, B., Jiang, Z.M.J.: Characterizing logging practices in Java-based open source software projects\u2013a replication study in Apache Software Foundation. Empirical Softw. Eng. 22, 330\u2013374 (2017)","journal-title":"Empirical Softw. Eng."},{"key":"13_CR2","doi-asserted-by":"crossref","unstructured":"Zhu, J., He, P., Fu, Q., Zhang, H., Lyu, M.R., Zhang, D.: Learning to log: helping developers make informed logging decisions. In: Proceedings of the 37th International Conference on Software Engineering, vol. 1, pp. 415\u2013425. IEEE Press (2015)","DOI":"10.1109\/ICSE.2015.60"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Yuan, D., Zheng, J., Park, S., Zhou, Y., Savage, S.: Improving software diagnosability via log enhancement. ACM Trans. Comput. Syst. (TOCS) 30, 4 (2012)","DOI":"10.1145\/2248487.1950369"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"He, P., Chen, Z., He, S., Lyu, M.R.: Characterizing the natural language descriptions in software logging statements. In: Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, pp. 178\u2013189. ACM (2018)","DOI":"10.1145\/3238147.3238193"},{"key":"13_CR5","doi-asserted-by":"crossref","unstructured":"Lv, F., Zhang, H., Lou, J.-g., Wang, S., Zhang, D., Zhao, J.: Codehow: effective code search based on API understanding and extended boolean model (e). In: 30th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 260\u2013270. IEEE (2015)","DOI":"10.1109\/ASE.2015.42"},{"key":"13_CR6","unstructured":"Gu, X., Zhang, H., Zhang, D., Kim, S.: Deep API learning. In: Proceedings of the 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 631\u2013642"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Gu, X., Zhang, H., Kim, S.: Deep code search. In: IEEE\/ACM 40th International Conference on Software Engineering (ICSE), pp. 933\u2013944. IEEE (2018)","DOI":"10.1145\/3180155.3180167"},{"key":"13_CR8","unstructured":"Eclipse JDT. http:\/\/www.eclipse.org\/jdt\/"},{"key":"13_CR9","unstructured":"Camel Case. https:\/\/en.wikipedia.org\/wiki\/camelcase"},{"key":"13_CR10","unstructured":"Levenshtein Distance. https:\/\/en.wikipedia.org\/wiki\/Levenshtein_distance"},{"key":"13_CR11","unstructured":"Jaccard Index. https:\/\/en.wikipedia.org\/wiki\/Jaccard_index"},{"key":"13_CR12","doi-asserted-by":"crossref","unstructured":"Papineni, K., Roukos, S., Ward, T., Zhu, W.-J.: BLEU: a method for automatic evaluation of machine translation. In: Proceedings of the 40th annual meeting on association for computational linguistics, pp. 311\u2013318. Association for Computational Linguistics (2002)","DOI":"10.3115\/1073083.1073135"},{"key":"13_CR13","unstructured":"Lin, C.-Y.: Rouge: a package for automatic evaluation of summaries. In: Text Summarization Branches Out, pp. 74\u201381 (2004)"},{"key":"13_CR14","doi-asserted-by":"crossref","unstructured":"Luong, M.-T., Pham, H., Manning, C.D.: Effective approaches to attention-based neural machine translation. arXiv preprint arXiv:1508.04025 (2015)","DOI":"10.18653\/v1\/D15-1166"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"See, A., Liu, P.J., Manning, C.D.: Get to the point: summarization with pointer-generator networks. arXiv preprint arXiv:1704.04368 (2017)","DOI":"10.18653\/v1\/P17-1099"},{"key":"13_CR16","doi-asserted-by":"crossref","unstructured":"Wu, Y., Wei, F., Huang, S., Wang, Y., Li, Z., Zhou, M.: Response generation by context-aware prototype editing. In: Proceedings of the AAAI Conference on Artificial Intelligence, pp. 7281\u20137288 (2019)","DOI":"10.1609\/aaai.v33i01.33017281"},{"key":"13_CR17","unstructured":"Yuan, D., et al.: Be conservative: enhancing failure diagnosis with proactive logging. In: Presented as part of the 10th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 2012), pp. 293\u2013306 (2012)"},{"key":"13_CR18","doi-asserted-by":"crossref","unstructured":"Lal, S., Sardana, N., Sureka, A.: LogOptPlus: learning to optimize logging in catch and if programming constructs. In: IEEE 40th Annual Computer Software and Applications Conference (COMPSAC), pp. 215\u2013220. IEEE (2016)","DOI":"10.1109\/COMPSAC.2016.149"},{"key":"13_CR19","doi-asserted-by":"crossref","unstructured":"Jia, T., Li, Y., Zhang, C., Xia, W., Jiang, J., Liu, Y.: Machine deserves better logging: a log enhancement approach for automatic fault diagnosis. In: IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), pp. 106\u2013111. IEEE (2018)","DOI":"10.1109\/ISSREW.2018.00-22"},{"key":"13_CR20","doi-asserted-by":"crossref","unstructured":"Zhao, X., Rodrigues, K., Luo, Y., Stumm, M., Yuan, D., Zhou, Y.: The game of twenty questions: do you know where to log? In: Proceedings of the 16th Workshop on Hot Topics in Operating Systems, pp. 125\u2013131. ACM (2017)","DOI":"10.1145\/3102980.3103001"},{"key":"13_CR21","doi-asserted-by":"publisher","first-page":"806","DOI":"10.1109\/TSE.2012.67","volume":"39","author":"M Cinque","year":"2012","unstructured":"Cinque, M., Cotroneo, D., Pecchia, A.: Event logs for the analysis of software failures: a rule-based approach. IEEE Trans. Software Eng. 39, 806\u2013821 (2012)","journal-title":"IEEE Trans. Software Eng."},{"key":"13_CR22","doi-asserted-by":"crossref","unstructured":"Chen, B., Jiang, Z.M.J.: Characterizing and detecting anti-patterns in the logging code. In: Proceedings of the 39th International Conference on Software Engineering, pp. 71\u201381. IEEE Press (2017)","DOI":"10.1109\/ICSE.2017.15"},{"issue":"4","key":"13_CR23","doi-asserted-by":"publisher","first-page":"1684","DOI":"10.1007\/s10664-016-9456-2","volume":"22","author":"H Li","year":"2016","unstructured":"Li, H., Shang, W., Hassan, A.E.: Which log level should developers choose for a new logging statement? Empirical Softw. Eng. 22(4), 1684\u20131716 (2016). https:\/\/doi.org\/10.1007\/s10664-016-9456-2","journal-title":"Empirical Softw. Eng."},{"key":"13_CR24","doi-asserted-by":"crossref","unstructured":"Su, Z., Ahn, B.-R., Eom, K.-Y., Kang, M.-K., Kim, J.-P., Kim, M.-K.: Plagiarism detection using the Levenshtein distance and Smith-Waterman algorithm. In: 3rd International Conference on Innovative Computing Information and Control, pp. 569\u2013569. IEEE (2008)","DOI":"10.1109\/ICICIC.2008.422"},{"key":"13_CR25","unstructured":"Apache Ecosystem. https:\/\/www.apache.org\/"},{"key":"13_CR26","doi-asserted-by":"publisher","first-page":"1069","DOI":"10.1109\/TSE.2011.84","volume":"38","author":"C McMillan","year":"2011","unstructured":"McMillan, C., Grechanik, M., Poshyvanyk, D., Fu, C., Xie, Q.: Exemplar: a source code search engine for finding highly relevant applications. IEEE Trans. Softw. Eng. 38, 1069\u20131087 (2011)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"13_CR27","unstructured":"Wang, K., Ming, Z., Chua, T.-S.: A syntactic tree matching approach to finding similar questions in community-based QA services. In: Proceedings of the 32nd ACM SIGIR conference on Research and development in information retrieval, pp. 187\u2013194. ACM (2019)"},{"key":"13_CR28","doi-asserted-by":"crossref","unstructured":"Shen, Y., Rong, W., Sun, Z., Ouyang, Y., Xiong, Z.: Question\/answer matching for CQA system via combining lexical and sequential information. In: Twenty-Ninth AAAI Conference on Artificial Intelligence (2015)","DOI":"10.1609\/aaai.v29i1.9178"},{"key":"13_CR29","doi-asserted-by":"crossref","unstructured":"Pecchia, A., Cinque, M., Carrozza, G., Cotroneo, D.: Industry practices and event logging: assessment of a critical software development process. In: Proceedings of the 37th International Conference on Software Engineering, vol. 2, pp. 169\u2013178. IEEE Press (2015)","DOI":"10.1109\/ICSE.2015.145"},{"key":"13_CR30","doi-asserted-by":"crossref","unstructured":"Li, Z., Chen, T.-H., Yang, J., Shang, W.: DLFinder: characterizing and detecting duplicate logging code smells. In: IEEE\/ACM 41st International Conference on Software Engineering (ICSE), pp. 152\u2013163. IEEE (2019)","DOI":"10.1109\/ICSE.2019.00032"},{"key":"13_CR31","doi-asserted-by":"crossref","unstructured":"Liu, Z., Xia, X., Hassan, A.E., Lo, D., Xing, Z., Wang, X.: Neural-machine-translation-based commit message generation: how far are we? In: IEEE\/ACM 33rd International Conference on Automated Software Engineering (ASE), pp. 373\u2013384. IEEE (2018)","DOI":"10.1145\/3238147.3238190"}],"container-title":["Lecture Notes in Computer Science","Programming Languages and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-64437-6_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,11,30]],"date-time":"2022-11-30T00:12:40Z","timestamp":1669767160000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-64437-6_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030644369","9783030644376"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-64437-6_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"24 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"APLAS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Asian Symposium on Programming Languages and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Fukuoka","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Japan","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"aplas2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/conf.researchr.org\/home\/aplas-2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Hotcrp.com","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"46","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"17","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"37% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}