{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T19:10:09Z","timestamp":1749928209809,"version":"3.41.0"},"publisher-location":"Singapore","reference-count":21,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819681693","type":"print"},{"value":"9789819681709","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-8170-9_19","type":"book-chapter","created":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T18:50:53Z","timestamp":1749927053000},"page":"238-249","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["LRTHT: An Efficient Log Clustering Framework Based on\u00a0Radix Tree and\u00a0Hash Table"],"prefix":"10.1007","author":[{"given":"Yizhen","family":"Li","sequence":"first","affiliation":[]},{"given":"Tao","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Jinzi","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Chenxu","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Yuan-cheng","family":"Lu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,6,15]]},"reference":[{"key":"19_CR1","unstructured":"Nagaraj, K., Killian, C.E., Neville, J.: Structured comparative analysis of systems logs to diagnose performance problems. In: Proceedings of the USENIX Symposium on Networked Systems and Design Implementation, pp. 353\u2013366 (2012)"},{"key":"19_CR2","unstructured":"Chow, M., Meisner, D., Flinn, J., Peek, D., Wenisch, T.F.: The mystery machine: end-to-end performance analysis of large-scale internet services. In: Proceedings of the USENIX Symposium on Operating Systems Design and Implementation, pp. 217\u2013231 (2014)"},{"issue":"11","key":"19_CR3","doi-asserted-by":"publisher","first-page":"7718","DOI":"10.1109\/TII.2022.3144177","volume":"18","author":"A Bakdi","year":"2022","unstructured":"Bakdi, A., Kristensen, N.B., Stakkeland, M.: Multiple instance learning with random forest for event logs analysis and predictive maintenance in ship electric propulsion system. IEEE Trans. Ind. Inform. 18(11), 7718\u20137728 (2022)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"19_CR4","doi-asserted-by":"crossref","unstructured":"He, S., Lin, Q., Lou, J., Zhang, H., Lyu, M.R., Zhang, D.: Identifying impactful service system problems via log analysis. In: Proceedings of the ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 60\u201370 (2018)","DOI":"10.1145\/3236024.3236083"},{"issue":"5","key":"19_CR5","doi-asserted-by":"publisher","first-page":"2136","DOI":"10.1109\/TDSC.2020.3037903","volume":"18","author":"H Studiawan","year":"2021","unstructured":"Studiawan, H., Sohel, F., Payne, C.: Anomaly detection in operating system logs with deep learning-based sentiment analysis. IEEE Trans. Dependable Secur. Comput. 18(5), 2136\u20132148 (2021)","journal-title":"IEEE Trans. Dependable Secur. Comput."},{"issue":"3","key":"19_CR6","doi-asserted-by":"publisher","first-page":"665","DOI":"10.1002\/spe.3164","volume":"53","author":"PS Kalaki","year":"2023","unstructured":"Kalaki, P.S., Shameli-Sendi, A., Abbasi, B.: Anomaly detection on openstack logs based on an improved robust principal component analysis model and its projection onto column space. Softw. Pract. Exp. 53(3), 665\u2013681 (2023)","journal-title":"Softw. Pract. Exp."},{"issue":"9","key":"19_CR7","doi-asserted-by":"publisher","first-page":"5771","DOI":"10.1109\/TII.2021.3136580","volume":"18","author":"T Le","year":"2022","unstructured":"Le, T., Hsu, C., Chen, W.: A hybrid blockchain-based log management scheme with nonrepudiation for smart grids. IEEE Trans. Ind. Inform. 18(9), 5771\u20135782 (2022)","journal-title":"IEEE Trans. Ind. Inform."},{"key":"19_CR8","doi-asserted-by":"crossref","unstructured":"Makanju, A., Zincir-Heywood, N., Milios, E.E.: Clustering event logs using iterative partitioning. In: Proceedings of the ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp. 1255\u20131264 (2009)","DOI":"10.1145\/1557019.1557154"},{"key":"19_CR9","doi-asserted-by":"crossref","unstructured":"Hamooni, H., Debnath, B., Xu, J., Zhang, H., Jiang, G., Mueen, A.: Logmine: fast pattern recognition for log analytics. In: International on Conference on Information and Knowledge Management, pp. 1573\u20131582 (2016)","DOI":"10.1145\/2983323.2983358"},{"issue":"11","key":"19_CR10","doi-asserted-by":"publisher","first-page":"2213","DOI":"10.1109\/TKDE.2018.2875442","volume":"31","author":"M Du","year":"2019","unstructured":"Du, M., Li, F.: Spell: online streaming parsing of large unstructured system logs. IEEE Trans. Knowl. Data Eng. 31(11), 2213\u20132227 (2019)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"key":"19_CR11","doi-asserted-by":"crossref","unstructured":"He, P., Zhu, J., Zheng, Z., Lyu, M.R.: Drain: an online log parsing approach with fixed depth tree. In: Proceedings - IEEE International Conference on Web Services, pp. 33\u201340 (2017)","DOI":"10.1109\/ICWS.2017.13"},{"issue":"3","key":"19_CR12","first-page":"879","volume":"48","author":"H Dai","year":"2022","unstructured":"Dai, H., Li, H., Chen, C., Shang, W., Chen, T.: Logram: efficient log parsing using $$n$$-gram dictionaries. IEEE Trans. Softw. Eng. 48(3), 879\u2013892 (2022)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"19_CR13","doi-asserted-by":"crossref","unstructured":"Xu, W., Huang, L., Fox, A., Patterson, D.A., Jordan, M.I.: Detecting large-scale system problems by mining console logs. In: Proceedings of the ACM Symposium on Operating Systems Principles, pp. 117\u2013132 (2009)","DOI":"10.1145\/1629575.1629587"},{"key":"19_CR14","doi-asserted-by":"crossref","unstructured":"Vaarandi, R., Pihelgas, M.: Logcluster - a data clustering and pattern mining algorithm for event logs. In: Proceedings of the International Conference on Network and Service Management, pp. 1\u20137 (2015)","DOI":"10.1109\/CNSM.2015.7367331"},{"key":"19_CR15","doi-asserted-by":"crossref","unstructured":"Messaoudi, S., Panichella, A., Bianculli, D., Briand, L.C., Sasnauskas, R.: A search-based approach for accurate identification of log message formats. In: Proceedings of the IEEE International Conference on Program Comprehension, pp. 167\u2013177 (2018)","DOI":"10.1145\/3196321.3196340"},{"key":"19_CR16","doi-asserted-by":"crossref","unstructured":"Vaarandi, R.: A data clustering algorithm for mining patterns from event logs. In: Proceedings of the IEEE Workshop IP Operation Management, IPOM, pp. 119\u2013126 (2003)","DOI":"10.1109\/IPOM.2003.1251233"},{"key":"19_CR17","doi-asserted-by":"crossref","unstructured":"Jiang, Z.M., Hassan, A.E., Flora, P., Hamann, G.: Abstracting execution logs to execution events for enterprise applications (short paper). In: Proceedings of the IEEE International Conference on Quality Software, Reliability and Security, QRS, pp. 181\u2013186 (2008)","DOI":"10.1109\/QSIC.2008.50"},{"issue":"11","key":"19_CR18","doi-asserted-by":"publisher","first-page":"1921","DOI":"10.1109\/TKDE.2011.138","volume":"24","author":"A Makanju","year":"2012","unstructured":"Makanju, A., Zincir-Heywood, A.N., Milios, E.E.: A lightweight algorithm for message type extraction in system application logs. IEEE Trans. Knowl. Data Eng. 24(11), 1921\u20131936 (2012)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"FSE","key":"19_CR19","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1145\/3643733","volume":"1","author":"Z Jiang","year":"2024","unstructured":"Jiang, Z., et al.: LILAC: log parsing using LLMs with adaptive parsing cache. Proc. ACM Softw. Eng. 1(FSE), 137\u2013160 (2024)","journal-title":"Proc. ACM Softw. Eng."},{"key":"19_CR20","doi-asserted-by":"crossref","unstructured":"Zhu, J., et al.: Tools and benchmarks for automated log parsing. In: Proceedings of the International Conference on Software Engineering, pp. 121\u2013130 (2019)","DOI":"10.1109\/ICSE-SEIP.2019.00021"},{"issue":"4","key":"19_CR21","doi-asserted-by":"publisher","first-page":"2177","DOI":"10.1109\/TII.2019.2933675","volume":"16","author":"J Xiao","year":"2020","unstructured":"Xiao, J., Tian, Y., Xie, L., Jiang, X., Huang, J.: A hybrid classification framework based on clustering. IEEE Trans. Ind. Inform. 16(4), 2177\u20132188 (2020)","journal-title":"IEEE Trans. Ind. Inform."}],"container-title":["Lecture Notes in Computer Science","Advances in Knowledge Discovery and Data Mining"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-8170-9_19","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,14]],"date-time":"2025-06-14T18:50:57Z","timestamp":1749927057000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-8170-9_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819681693","9789819681709"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-8170-9_19","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"15 June 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"PAKDD","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Pacific-Asia Conference on Knowledge Discovery and Data Mining","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Sydney, NSW","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Australia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"10 June 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 June 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pakdd2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/pakdd2025.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}