{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,1]],"date-time":"2026-04-01T04:03:51Z","timestamp":1775016231714,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,5,7]],"date-time":"2016-05-07T00:00:00Z","timestamp":1462579200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002790","name":"Canadian Network for Research and Innovation in Machining Technology, Natural Sciences and Engineering Research Council of Canada (CA)","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002790","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2017,2]]},"DOI":"10.1007\/s10664-016-9429-5","type":"journal-article","created":{"date-parts":[[2016,5,7]],"date-time":"2016-05-07T08:54:24Z","timestamp":1462611264000},"page":"330-374","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":95,"title":["Characterizing logging practices in Java-based open source software projects \u2013 a replication study in Apache Software Foundation"],"prefix":"10.1007","volume":"22","author":[{"given":"Boyuan","family":"Chen","sequence":"first","affiliation":[]},{"given":"Zhen Ming","family":"(Jack) Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,7]]},"reference":[{"key":"9429_CR1","unstructured":"ASF Apache Software Foundation (2016) https:\/\/www.apache.org\/ . Accessed 8 April 2016"},{"issue":"4","key":"9429_CR2","doi-asserted-by":"crossref","first-page":"456","DOI":"10.1109\/32.799939","volume":"25","author":"VR Basili","year":"1999","unstructured":"Basili VR, Shull F, Lanubile F (1999) Building knowledge through families of experiments. IEEE Trans Softw Eng 25(4):456\u2013473","journal-title":"IEEE Trans Softw Eng"},{"key":"9429_CR3","doi-asserted-by":"crossref","unstructured":"Beschastnikh I, Brun Y, Ernst MD, Krishnamurthy A (2014) Inferring models of concurrent systems from logs of their behavior with csight. In: Proceedings of the 36th International Conference on Software Engineering (ICSE)","DOI":"10.1145\/2568225.2568246"},{"key":"9429_CR4","doi-asserted-by":"crossref","unstructured":"Beschastnikh I, Brun Y, Schneider S, Sloan M, Ernst MD (2011) Leveraging existing instrumentation to automatically infer invariant-constrained models. In: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering, ESEC\/FSE \u201911","DOI":"10.1145\/2025113.2025151"},{"key":"9429_CR5","doi-asserted-by":"crossref","unstructured":"Bettenburg N, Just S, Schr\u00f6ter A, Weiss C, Premraj R, Zimmermann T (2008) What makes a good bug report?. In: Proceedings of the 16th ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE)","DOI":"10.1145\/1453101.1453146"},{"key":"9429_CR6","doi-asserted-by":"crossref","unstructured":"Bird C, Bachmann A, Aune E, Duffy J, Bernstein A, Filkov V, Devanbu P (2009) Fair and balanced?: bias in bug-fix datasets. In: Proceedings of the the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering (ESEC\/FSE)","DOI":"10.1145\/1595696.1595716"},{"key":"9429_CR7","unstructured":"BlackBerry Enterprise Server Logs Submission (2015). https:\/\/www.blackberry.com\/beslog\/ . Accessed 10 May 2015"},{"key":"9429_CR8","unstructured":"Ding R, Zhou H, Lou JG, Zhang H, Lin Q, Fu Q, Zhang D, Xie T (2015) Log2: A cost-aware logging mechanism for performance diagnosis. In: USENIX Annual Technical Conference"},{"key":"9429_CR9","unstructured":"Dumps of the ASF Subversion repository (2015) Dumps http:\/\/svn-dump.apache.org\/ . Accessed 10 May 2015"},{"key":"9429_CR10","unstructured":"Estimating the reproducibility of psychological science (2015) Open Science Collaboration"},{"issue":"11","key":"9429_CR11","doi-asserted-by":"crossref","first-page":"725","DOI":"10.1109\/TSE.2007.70731","volume":"33","author":"B Fluri","year":"2007","unstructured":"Fluri B, Wursch M, Pinzger M, Gall H (2007) Change distilling:tree differencing for fine-grained source code change extraction. IEEE Trans Softw Eng 33 (11):725\u2013743","journal-title":"IEEE Trans Softw Eng"},{"key":"9429_CR12","doi-asserted-by":"crossref","unstructured":"Fu Q, Zhu J, Hu W, Lou JG, Ding R, Lin Q, Zhang D, Xie T (2014) Where do developers log? An empirical study on logging practices in industry. In: Companion Proceedings of the 36th International Conference on Software Engineering","DOI":"10.1145\/2591062.2591175"},{"key":"9429_CR13","doi-asserted-by":"crossref","unstructured":"Gall HC, Fluri B, Pinzger M (2009) Change analysis with Evolizer and ChangeDistiller. IEEE Softw 26(1)","DOI":"10.1109\/MS.2009.6"},{"key":"9429_CR14","unstructured":"Gartner (2014) SIEM Magic Quadrant Leadership Report. http:\/\/www.gartner.com\/document\/2780017 . Last accessed 05\/10\/2015"},{"key":"9429_CR15","doi-asserted-by":"crossref","unstructured":"Ghezzi G, Gall HC (2013) Replicating mining studies with SOFAS. In: Proceedings of the 10th working conference on mining software repositories","DOI":"10.1109\/MSR.2013.6624050"},{"key":"9429_CR16","doi-asserted-by":"crossref","unstructured":"Greiler M, Herzig K, Czerwonka J (2015) Code ownership and software quality: a replication study. In: Proceedings of the 12th working conference on mining software repositories (MSR), pp 2\u201312. IEEE Press","DOI":"10.1109\/MSR.2015.8"},{"key":"9429_CR17","unstructured":"Group TO (2014) Application Response Measurement - ARM. https:\/\/collaboration.opengroup.org\/tech\/management\/arm\/ . Last accessed 24 November 2014"},{"key":"9429_CR18","volume-title":"Data mining: concepts and techniques","author":"J Han","year":"2005","unstructured":"Han J (2005) Data mining: concepts and techniques. Morgan Kaufmann Publishers Inc., San Francisco"},{"key":"9429_CR19","unstructured":"Hassan AE, Martin DJ, Flora P, Mansfield P, Dietz D (2008) An industrial case study of customizing operational profiles using log compression. In: Proceedings of the 30th International Conference on Software Engineering (ICSE)"},{"key":"9429_CR20","unstructured":"JDT Java development tools (2015) https:\/\/eclipse.org\/jdt\/ . Accessed 23 October 2015"},{"key":"9429_CR21","doi-asserted-by":"crossref","unstructured":"Jiang ZM, Hassan AE, Hamann G, Flora P (2008) Automatic identification of load testing problems. In: Proceedings of the 24th IEEE international conference on software maintenance (ICSM)","DOI":"10.1109\/ICSM.2008.4658079"},{"key":"9429_CR22","doi-asserted-by":"crossref","unstructured":"Jiang ZM, Hassan AE, Hamann G, Flora P (2009) Automated performance analysis of load tests. In: Proceedings of the 25th IEEE international conference on software maintenance (ICSM)","DOI":"10.1109\/ICSM.2009.5306331"},{"key":"9429_CR23","doi-asserted-by":"crossref","unstructured":"Kampstra P (2008) Beanplot: a boxplot alternative for visual comparison of distributions. J Stat Softw Code Snippets 28(1)","DOI":"10.18637\/jss.v028.c01"},{"key":"9429_CR24","unstructured":"logstash - open source log management (2015) http:\/\/logstash.net\/ . Accessed 18 April 2015"},{"key":"9429_CR25","unstructured":"LOG4J a logging library for Java (2016) http:\/\/logging.apache.org\/log4j\/1.2\/ . Accessed 8 April 2016"},{"issue":"3","key":"9429_CR26","doi-asserted-by":"crossref","first-page":"309","DOI":"10.1145\/567793.567795","volume":"11","author":"A Mockus","year":"2002","unstructured":"Mockus A, Fielding RT, Herbsleb JD (2002) Two case studies of open source software development: Apache and mozilla. ACM Trans Softw Eng Methodol 11 (3):309\u2013346","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"9429_CR27","doi-asserted-by":"crossref","unstructured":"Nagappan N, Ball T (2005) Use of relative code churn measures to predict system defect density. Association for Computing Machinery, Inc.","DOI":"10.1145\/1062455.1062514"},{"key":"9429_CR28","unstructured":"Nagios Log Server - Monitor and Manage Your Log Data (2015) https:\/\/exchange.nagios.org\/directory\/Plugins\/Log-Files . Accessed 10 May 2015"},{"issue":"2","key":"9429_CR29","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1145\/2076450.2076466","volume":"55","author":"A Oliner","year":"2012","unstructured":"Oliner A, Ganapathi A, Xu W (2012) Advances and challenges in log analysis. Commun ACM 55(2):55\u201361","journal-title":"Commun ACM"},{"key":"9429_CR30","doi-asserted-by":"crossref","unstructured":"Premraj R, Herzig K (2011) Network versus code metrics to predict defects: A replication study. In: Proceedings of the 2011 international symposium on empirical software engineering and measurement (ESEM), pp. 215\u2013224","DOI":"10.1109\/ESEM.2011.30"},{"key":"9429_CR31","doi-asserted-by":"crossref","unstructured":"Rahman F, Posnett D, Herraiz I, Devanbu P (2013) Sample size vs. bias in defect prediction. In: Proceedings of the 9th joint meeting on foundations of software engineering (ESEC\/FSE)","DOI":"10.1145\/2491411.2491418"},{"key":"9429_CR32","doi-asserted-by":"crossref","unstructured":"Rajlich V (2014) Software Evolution and Maintenance. In: Proceedings of the on future of software engineering (FOSE), pp 133\u2013144. ACM","DOI":"10.1145\/2593882.2593893"},{"key":"9429_CR33","doi-asserted-by":"crossref","unstructured":"Rigby PC, German DM, Storey MA (2008) Open source software peer review practices: a case study of the apache server. In: Proceedings of the 30th international conference on software engineering (ICSE), pp 541\u2013550","DOI":"10.1145\/1368088.1368162"},{"key":"9429_CR34","doi-asserted-by":"crossref","unstructured":"Robles G (2010) Replicating msr: A study of the potential replicability of papers published in the mining software repositories proceedings. In: Proceedings of the 7th IEEE Working Conference on Mining Software Repositories (MSR), pp 171\u2013180","DOI":"10.1109\/MSR.2010.5463348"},{"key":"9429_CR35","unstructured":"Romano J, Kromrey JD, Coraggio J, Skowronek J (2006) Appropriate statistics for ordinal level data: should we really be using t-test and Cohen\u2019sd for evaluating group differences on the NSSE and other surveys?. In: Annual meeting of the Florida Association of Institutional Research"},{"key":"9429_CR36","unstructured":"Shang W, Jiang ZM, Adams B, Hassan A (2009) MapReduce as a general framework to support research in Mining Software Repositories (MSR). In: Proceedings of the 6th IEEE international working conference on mining software repositories"},{"issue":"1","key":"9429_CR37","first-page":"3","volume":"26","author":"W Shang","year":"2014","unstructured":"Shang W, Jiang ZM, Adams B, Hassan AE, Godfrey MW, Nasser M, Flora P (2014) An exploratory study of the evolution of communicated information about the execution of large software systems. Journal of Software: Evolution and Process 26 (1):3\u201326","journal-title":"Journal of Software: Evolution and Process"},{"key":"9429_CR38","doi-asserted-by":"crossref","unstructured":"Shang W, Jiang ZM, Hemmati H, Adams B, Hassan AE, Martin P (2013) Assisting developers of big data analytics applications when deploying on hadoop clouds. In: Proceedings of the 35th international conference on software engineering (ICSE)","DOI":"10.1109\/ICSE.2013.6606586"},{"key":"9429_CR39","doi-asserted-by":"crossref","unstructured":"Shang W, Nagappan M, Hassan AE (2015) Studying the relationship between logging characteristics and the code quality of platform software. Empir Softw Eng 20 (1)","DOI":"10.1007\/s10664-013-9274-8"},{"key":"9429_CR40","unstructured":"Splunk (2015) http:\/\/www.splunk.com\/ . Accessed 18 April 2015"},{"key":"9429_CR41","unstructured":"Summary of Sarbanes-Oxley Act of 2002 (2015) http:\/\/www.soxlaw.com\/ . Accessed 10 May 2015"},{"key":"9429_CR42","doi-asserted-by":"crossref","unstructured":"Syer MD, Jiang ZM, Nagappan M, Hassan AE, Nasser M, Flora P (2014) Continuous validation of load test suites. In: Proceedings of the 5th ACM\/SPEC international conference on performance engineering (ICPE)","DOI":"10.1145\/2568088.2568101"},{"issue":"2","key":"9429_CR43","doi-asserted-by":"crossref","first-page":"176","DOI":"10.1109\/TSE.2014.2361131","volume":"41","author":"MD Syer","year":"2015","unstructured":"Syer MD, Nagappan M, Adams B, Hassan AE (2015) Replicating and re-evaluating the theory of relative defect-proneness. IEEE Trans Softw Eng 41 (2):176\u2013197","journal-title":"IEEE Trans Softw Eng"},{"key":"9429_CR44","doi-asserted-by":"crossref","unstructured":"Tan L, Yuan D, Krishna G, Zhou Y (2007) \/* iComment: Bugs or Bad Comments? *\/. In: Proceedings of the 21st ACM Symposium on Operating Systems Principles (SOSP)","DOI":"10.1145\/1294261.1294276"},{"key":"9429_CR45","unstructured":"The AspectJ project (2015) https:\/\/eclipse.org\/aspectj\/ . Accessed 10 May 2015"},{"key":"9429_CR46","unstructured":"The replication package (2015) https:\/\/www.dropbox.com\/s\/tf5omwtaylffsbs\/replication_package_major_revision.zip?dl=0 https:\/\/www.dropbox.com\/s\/tf5omwtaylffsbs\/replication_package_major_revision.zip?dl=0 . Accessed 23 October 2015"},{"key":"9429_CR47","unstructured":"Wheeler D SLOCCOUNT source lines of code count. http:\/\/www.dwheeler.com\/sloccount\/"},{"key":"9429_CR48","doi-asserted-by":"crossref","unstructured":"Woodside M, Franks G, Petriu DC (2007) The Future of Software Performance Engineering. In: Proceedings of the future of software engineering (FOSE) track, international conference on software engineering (ICSE)","DOI":"10.1109\/FOSE.2007.32"},{"key":"9429_CR49","doi-asserted-by":"crossref","unstructured":"Xu W, Huang L, Fox A, Patterson D, Jordan MI (2009) Detecting large-scale system problems by mining console logs. In: Proceedings of the ACM SIGOPS 22nd symposium on operating systems principles (SOSP)","DOI":"10.1145\/1629575.1629587"},{"key":"9429_CR50","doi-asserted-by":"crossref","unstructured":"Yuan D, Mai H, Xiong W, Tan L, Zhou Y, Pasupathy S (2010) Sherlog: Error diagnosis by connecting clues from run-time logs. In: Proceedings of the fifteenth edition of ASPLOS on architectural support for programming languages and operating systems (ASPLOS)","DOI":"10.1145\/1736020.1736038"},{"key":"9429_CR51","doi-asserted-by":"crossref","unstructured":"Yuan D, Park S, Zhou Y (2012) Characterizing logging practices in open-source software. In: Proceedings of the 34th international conference on software engineering, ICSE \u201912. IEEE Press, Piscataway, pp 102\u2013112","DOI":"10.1109\/ICSE.2012.6227202"},{"key":"9429_CR52","doi-asserted-by":"crossref","unstructured":"Yuan D, Zheng J, Park S, Zhou Y, Savage S (2011) Improving software diagnosability via log enhancement. In: Proceedings of the sixteenth international conference on architectural support for programming languages and operating systems (ASPLOS)","DOI":"10.1145\/1950365.1950369"},{"key":"9429_CR53","doi-asserted-by":"crossref","unstructured":"Zhu J, He P, Fu Q, Zhang H, Lyu MR, Zhang D (2015) Learning to log: Helping developers make informed logging decisions. In: Proceedings of the 37th international conference on software engineering","DOI":"10.1109\/ICSE.2015.60"},{"key":"9429_CR54","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Premraj R, Bettenburg N, Just S, Schroter A, Weiss C (2010) What makes a good bug report? Transactions on Software Engineering (TSE)","DOI":"10.1109\/TSE.2010.63"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-016-9429-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9429-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9429-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9429-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,7]],"date-time":"2019-09-07T07:41:12Z","timestamp":1567842072000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-016-9429-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,7]]},"references-count":54,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,2]]}},"alternative-id":["9429"],"URL":"https:\/\/doi.org\/10.1007\/s10664-016-9429-5","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,5,7]]}}}