{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T18:50:45Z","timestamp":1743015045195,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031308253"},{"type":"electronic","value":"9783031308260"}],"license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2023,4,20]],"date-time":"2023-04-20T00:00:00Z","timestamp":1681948800000},"content-version":"vor","delay-in-days":109,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2023]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>This short paper takes initial steps towards developing a novel approach, called <jats:italic>log slicing<\/jats:italic>, that aims to answer a practical question in the field of log analysis: <jats:italic>Can we automatically identify log messages related to a specific message (e.g., an error message)?<\/jats:italic> The basic idea behind log slicing is that we can consider how different log messages are \u201ccomputationally related\u201d to each other by looking at the corresponding logging statements in the source code. These logging statements are identified by 1) computing a backwards program slice, using as criterion the logging statement that generated a <jats:italic>problematic<\/jats:italic> log message; and 2) extending that slice to include <jats:italic>relevant<\/jats:italic> logging statements.<\/jats:p><jats:p>The paper presents a problem definition of log slicing, describes an initial approach for log slicing, and discusses a key open issue that can lead towards new research directions.<\/jats:p>","DOI":"10.1007\/978-3-031-30826-0_14","type":"book-chapter","created":{"date-parts":[[2023,4,19]],"date-time":"2023-04-19T18:02:59Z","timestamp":1681927379000},"page":"249-259","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Towards Log Slicing"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2289-1620","authenticated-orcid":false,"given":"Joshua Heneage","family":"Dawes","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0840-6449","authenticated-orcid":false,"given":"Donghwan","family":"Shin","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4854-685X","authenticated-orcid":false,"given":"Domenico","family":"Bianculli","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,4,20]]},"reference":[{"key":"14_CR1","doi-asserted-by":"crossref","unstructured":"van\u00a0der Aalst, W.M.P.: Distributed process discovery and conformance checking. In: de\u00a0Lara, J., Zisman, A. (eds.) Fundamental Approaches to Software Engineering. pp. 1\u201325. Springer Berlin Heidelberg, Berlin, Heidelberg (2012)","DOI":"10.1007\/978-3-642-28872-2_1"},{"key":"14_CR2","doi-asserted-by":"publisher","unstructured":"Agrawal, H., Horgan, J.R.: Dynamic program slicing. SIGPLAN Not. 25(6), 246\u2013256 (jun 1990). https:\/\/doi.org\/10.1145\/93548.93576, https:\/\/doi.org\/10.1145\/93548.93576","DOI":"10.1145\/93548.93576"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Basin, D., Caronni, G., Ereth, S., Harvan, M., Klaedtke, F., Mantel, H.: Scalable offline monitoring. In: Bonakdarpour, B., Smolka, S.A. (eds.) Runtime Verification. pp. 31\u201347. Springer International Publishing, Cham (2014)","DOI":"10.1007\/978-3-319-11164-3_4"},{"key":"14_CR4","doi-asserted-by":"publisher","unstructured":"Bushong, V., Sanders, R., Curtis, J., Du, M., Cerny, T., Frajtak, K., Bures, M., Tisnovsky, P., Shin, D.: On matching log analysis to source code: A systematic mapping study. In: Proceedings of the International Conference on Research in Adaptive and Convergent Systems. p. 181\u2013187. RACS \u201920, Association for Computing Machinery, New York, NY, USA (2020). https:\/\/doi.org\/10.1145\/3400286.3418262, https:\/\/doi.org\/10.1145\/3400286.3418262","DOI":"10.1145\/3400286.3418262"},{"key":"14_CR5","doi-asserted-by":"publisher","unstructured":"He, S., He, P., Chen, Z., Yang, T., Su, Y., Lyu, M.R.: A survey on automated log analysis for reliability engineering. ACM Comput. Surv. 54(6) (Jul 2021). https:\/\/doi.org\/10.1145\/3460345","DOI":"10.1145\/3460345"},{"key":"14_CR6","doi-asserted-by":"publisher","unstructured":"Jia, T., Yang, L., Chen, P., Li, Y., Meng, F., Xu, J.: Logsed: Anomaly diagnosis through mining time-weighted control flow graph in logs. In: 2017 IEEE 10th International Conference on Cloud Computing (CLOUD). pp. 447\u2013455. IEEE, IEEE, Honolulu, CA, USA (2017). https:\/\/doi.org\/10.1109\/CLOUD.2017.64","DOI":"10.1109\/CLOUD.2017.64"},{"key":"14_CR7","doi-asserted-by":"publisher","unstructured":"Liu, Z., Xia, X., Lo, D., Xing, Z., Hassan, A.E., Li, S.: Which variables should I log? IEEE Transactions on Software Engineering 47(9), 2012\u20132031 (2021). https:\/\/doi.org\/10.1109\/TSE.2019.2941943","DOI":"10.1109\/TSE.2019.2941943"},{"key":"14_CR8","doi-asserted-by":"publisher","unstructured":"Messaoudi, S., Shin, D., Panichella, A., Bianculli, D., Briand, L.C.: Log-based slicing for system-level test cases. In: Proceedings of the 30th ACM SIGSOFT International Symposium on Software Testing and Analysis. p. 517\u2013528. ISSTA 2021, Association for Computing Machinery, New York, NY, USA (2021). https:\/\/doi.org\/10.1145\/3460319.3464824, https:\/\/doi.org\/10.1145\/3460319.3464824","DOI":"10.1145\/3460319.3464824"},{"key":"14_CR9","doi-asserted-by":"publisher","unstructured":"Mi, H., Wang, H., Zhou, Y., Lyu, M.R.T., Cai, H.: Toward fine-grained, unsupervised, scalable performance diagnosis for production cloud computing systems. IEEE Transactions on Parallel and Distributed Systems 24(6), 1245\u20131255 (2013). https:\/\/doi.org\/10.1109\/TPDS.2013.21","DOI":"10.1109\/TPDS.2013.21"},{"key":"14_CR10","doi-asserted-by":"publisher","unstructured":"Nandi, A., Mandal, A., Atreja, S., Dasgupta, G.B., Bhattacharya, S.: Anomaly detection using program control flow graph mining from execution logs. In: 2016 26nd ACM International Conference on Knowledge Discovery and Data Mining (SIGKDD). pp. 215\u2013224. KDD \u201916, Association for Computing Machinery, New York, NY, USA (2016). https:\/\/doi.org\/10.1145\/2939672.2939712","DOI":"10.1145\/2939672.2939712"},{"key":"14_CR11","doi-asserted-by":"publisher","unstructured":"Schipper, D., Aniche, M., van Deursen, A.: Tracing back log data to its log statement: From research to practice. In: 2019 IEEE\/ACM 16th International Conference on Mining Software Repositories (MSR). pp. 545\u2013549 (2019). https:\/\/doi.org\/10.1109\/MSR.2019.00081","DOI":"10.1109\/MSR.2019.00081"},{"key":"14_CR12","doi-asserted-by":"publisher","unstructured":"Shin, D., Bianculli, D., Briand, L.: PRINS: scalable model inference for component-based system logs. Empirical Software Engineering 27(4), \u00a087 (2022). https:\/\/doi.org\/10.1007\/s10664-021-10111-4, https:\/\/doi.org\/10.1007\/s10664-021-10111-4","DOI":"10.1007\/s10664-021-10111-4"},{"key":"14_CR13","doi-asserted-by":"publisher","unstructured":"Tak, B.C., Tao, S., Yang, L., Zhu, C., Ruan, Y.: Logan: Problem diagnosis in the cloud using log-based reference models. In: 2016 IEEE International Conference on Cloud Engineering (IC2E). pp. 62\u201367 (2016). https:\/\/doi.org\/10.1109\/IC2E.2016.12","DOI":"10.1109\/IC2E.2016.12"},{"key":"14_CR14","doi-asserted-by":"publisher","unstructured":"Weiser, M.: Program slicing. IEEE Trans. Softw. Eng. 10(4), 352\u2013357 (Jul 1984). https:\/\/doi.org\/10.1109\/TSE.1984.5010248, https:\/\/doi.org\/10.1109\/TSE.1984.5010248","DOI":"10.1109\/TSE.1984.5010248"},{"key":"14_CR15","doi-asserted-by":"publisher","unstructured":"Yuan, D., Zheng, J., Park, S., Zhou, Y., Savage, S.: Improving software diagnosability via log enhancement. ACM Trans. Comput. Syst. 30(1) (Feb 2012). https:\/\/doi.org\/10.1145\/2110356.2110360","DOI":"10.1145\/2110356.2110360"},{"key":"14_CR16","doi-asserted-by":"publisher","unstructured":"Zhao, X., Rodrigues, K., Luo, Y., Stumm, M., Yuan, D., Zhou, Y.: Log20: Fully automated optimal placement of log printing statements under specified overhead threshold. In: 2017 26th Symposium on Operating Systems Principles (SOSP). p. 565\u2013581. SOSP \u201917, Association for Computing Machinery, New York, NY, USA (2017). https:\/\/doi.org\/10.1145\/3132747.3132778","DOI":"10.1145\/3132747.3132778"},{"key":"14_CR17","unstructured":"Zhao, X., Rodrigues, K., Luo, Y., Yuan, D., Stumm, M.: Non-Intrusive performance profiling for entire software stacks based on the flow reconstruction principle. In: 12th USENIX Symposium on Operating Systems Design and Implementation (OSDI 16). pp. 603\u2013618. USENIX Association, Savannah, GA (Nov 2016), https:\/\/www.usenix.org\/conference\/osdi16\/technical-sessions\/presentation\/zhao"},{"key":"14_CR18","doi-asserted-by":"publisher","unstructured":"Zhou, P., Wang, Y., Li, Z., Tyson, G., Guan, H., Xie, G.: Logchain: Cloud workflow reconstruction & troubleshooting with unstructured logs. Computer Networks 175, 107279 (2020). https:\/\/doi.org\/10.1016\/j.comnet.2020.107279, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1389128619316731","DOI":"10.1016\/j.comnet.2020.107279"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-30826-0_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,22]],"date-time":"2023-05-22T22:03:28Z","timestamp":1684793008000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-30826-0_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023]]},"ISBN":["9783031308253","9783031308260"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-30826-0_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2023]]},"assertion":[{"value":"20 April 2023","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FASE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Fundamental Approaches to Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2023","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"22 April 2023","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"27 April 2023","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fase2023","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/etaps.org\/2023\/fase","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"50","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"24% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"6-7","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The proceedings also include 2 tool papers, 2 NIER papers, and 2 competition papers","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}