{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T07:50:35Z","timestamp":1774597835536,"version":"3.50.1"},"publisher-location":"Singapore","reference-count":18,"publisher":"Springer Nature Singapore","isbn-type":[{"value":"9789819698141","type":"print"},{"value":"9789819698158","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,1,1]],"date-time":"2025-01-01T00:00:00Z","timestamp":1735689600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025]]},"DOI":"10.1007\/978-981-96-9815-8_6","type":"book-chapter","created":{"date-parts":[[2025,7,23]],"date-time":"2025-07-23T09:18:14Z","timestamp":1753262294000},"page":"64-75","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Logcode: Source Code-Driven Log Parsing for Rare Patterns"],"prefix":"10.1007","author":[{"given":"Hongli","family":"Su","sequence":"first","affiliation":[]},{"given":"Jing","family":"Li","sequence":"additional","affiliation":[]},{"given":"Guodong","family":"Fan","sequence":"additional","affiliation":[]},{"given":"Ming","family":"Zhu","sequence":"additional","affiliation":[]},{"given":"Zhiyong","family":"Zhao","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,7,24]]},"reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Zhang, X., et al.: Robust log-based anomaly detection on unstable log data. In: Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, pp. 807\u2013817. ACM, New York (2019)","DOI":"10.1145\/3338906.3338931"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Lu, S., Rao, B.B., Wei, X., et al.: Log-based abnormal task detection and root cause analysis for Spark. In: 2017 IEEE International Conference on Web Services (ICWS), pp. 389\u2013396. IEEE, New York (2017)","DOI":"10.1109\/ICWS.2017.135"},{"key":"6_CR3","doi-asserted-by":"crossref","unstructured":"Das, A., Mueller, F., Siegel, C., et al.: Desh: deep learning for system health prediction of lead times to failure in HPC. In: Proceedings of the 27th International Symposium on High-Performance Parallel and Distributed Computing, pp. 40\u201351. ACM, New York (2018)","DOI":"10.1145\/3208040.3208051"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Liu, J., Zhu, J., He, S., et al.: Logzip: Extracting hidden structures via iterative clustering for log compression. In: 2019 34th IEEE\/ACM International Conference on Automated Software Engineering (ASE), pp. 863\u2013873. IEEE, New York (2019)","DOI":"10.1109\/ASE.2019.00085"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Fu, Q., Lou, J.G., Wang, Y., et al.: Execution anomaly detection in distributed systems through unstructured log analysis. In: 2009 Ninth IEEE International Conference on Data Mining (ICDM), pp. 149\u2013158. IEEE, New York (2009)","DOI":"10.1109\/ICDM.2009.60"},{"key":"6_CR6","doi-asserted-by":"crossref","unstructured":"Tang, L., Li, T., Perng, C.S.: LogSig: generating system events from raw textual logs. In: Proceedings of the 20th ACM International Conference on Information and Knowledge Management (CIKM), pp. 785\u2013794. ACM, New York (2011)","DOI":"10.1145\/2063576.2063690"},{"key":"6_CR7","unstructured":"Shima, K.: Length matters: Clustering system log messages using length of words. arXiv preprint arXiv:1611.03213 (2016)"},{"issue":"4","key":"6_CR8","doi-asserted-by":"publisher","first-page":"11130","DOI":"10.48084\/etasr.6013","volume":"13","author":"AB Lashram","year":"2023","unstructured":"Lashram, A.B., Hsairi, L., Al Ahmadi, H.: HCLPars: a new hierarchical clustering log parsing method. Eng. Technol. Appl. Sci. Res. 13(4), 11130\u201311138 (2023)","journal-title":"Eng. Technol. Appl. Sci. Res."},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Jiang, Z.M., Hassan, A.E., Flora, P., et al.: Abstracting execution logs to execution events for enterprise applications (short paper). In: The Eighth International Conference on Quality Software (QSIC), pp. 181\u2013186. IEEE, New York (2008)","DOI":"10.1109\/QSIC.2008.50"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Du, M., Li, F.: Spell: Streaming parsing of system event logs. In: 2016 IEEE 16th International Conference on Data Mining (ICDM), pp. 859\u2013864. IEEE, New York (2016)","DOI":"10.1109\/ICDM.2016.0103"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"He, P., Zhu, J., Zheng, Z., et al.: Drain: An online log parsing approach with fixed depth tree. In: 2017 IEEE International Conference on Web Services (ICWS), pp. 33\u201340. IEEE, New York (2017)","DOI":"10.1109\/ICWS.2017.13"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Le, V.H., Zhang, H.: Log parsing with prompt-based few-shot learning. In: 2023 IEEE\/ACM 45th International Conference on Software Engineering (ICSE), pp. 2438\u20132449. IEEE, New York (2023)","DOI":"10.1109\/ICSE48619.2023.00204"},{"key":"6_CR13","doi-asserted-by":"crossref","unstructured":"Yu, S., Wu, Y., Li, Z., et al.: Log parsing with generalization ability under new log types. In: Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering (ESEC\/FSE), pp. 425\u2013437. ACM, New York (2023)","DOI":"10.1145\/3611643.3616355"},{"issue":"3","key":"6_CR14","first-page":"879","volume":"48","author":"H Dai","year":"2020","unstructured":"Dai, H., Li, H., Chen, C.S., et al.: Logram: efficient log parsing using n-gram dictionaries. IEEE Trans. Softw. Eng. 48(3), 879\u2013892 (2020)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"6_CR15","unstructured":"Devlin, J., Chang, M.W., Lee, K., et al.: BERT: Pre-training of deep bidirectional transformers for language understanding. In: Proceedings of the 2019 Conference of the North American Chapter of the Association for Computational Linguistics: Human Language Technologies (NAACL-HLT), pp. 4171\u20134186 (2019)"},{"issue":"1","key":"6_CR16","first-page":"123","volume":"24","author":"K Kuramitsu","year":"2016","unstructured":"Kuramitsu, K.: Fast, flexible, and declarative construction of abstract syntax trees with PEGs. J. Inf. Process. 24(1), 123\u2013131 (2016)","journal-title":"J. Inf. Process."},{"key":"6_CR17","doi-asserted-by":"crossref","unstructured":"Jiang, Z., Liu, J., Huang, J., et al.: A large-scale evaluation for log parsing techniques: How far are we? In: Proceedings of the 33rd ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA), pp. 223\u2013234. ACM, New York (2024)","DOI":"10.1145\/3650212.3652123"},{"key":"6_CR18","unstructured":"Liu, Y., Ott, M., Goyal, N., et al.: RoBERTa: A Robustly Optimized BERT Pretraining Approach (2019). arXiv preprint arXiv:1907.11692"}],"container-title":["Lecture Notes in Computer Science","Advanced Intelligent Computing Technology and Applications"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-981-96-9815-8_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T06:56:33Z","timestamp":1774594593000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-981-96-9815-8_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025]]},"ISBN":["9789819698141","9789819698158"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-981-96-9815-8_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025]]},"assertion":[{"value":"24 July 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Intelligent Computing","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ningbo","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"26 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icic2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.ic-icc.cn\/icg\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}