{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,8]],"date-time":"2026-02-08T20:48:51Z","timestamp":1770583731179,"version":"3.49.0"},"reference-count":45,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T00:00:00Z","timestamp":1477267200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2017,8]]},"DOI":"10.1007\/s10664-016-9467-z","type":"journal-article","created":{"date-parts":[[2016,10,24]],"date-time":"2016-10-24T05:48:06Z","timestamp":1477288086000},"page":"1831-1865","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":65,"title":["Towards just-in-time suggestions for log changes"],"prefix":"10.1007","volume":"22","author":[{"given":"Heng","family":"Li","sequence":"first","affiliation":[]},{"given":"Weiyi","family":"Shang","sequence":"additional","affiliation":[]},{"given":"Ying","family":"Zou","sequence":"additional","affiliation":[]},{"given":"Ahmed","family":"E. Hassan","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,24]]},"reference":[{"key":"9467_CR1","unstructured":"Apache-Commons (2016) Apache commons logging user guide - best practices. \n                        http:\/\/commons.apache.org\/proper\/commons-logging\/guide.html"},{"key":"9467_CR2","unstructured":"Bitincka L, Ganapathi A, Sorkin S, Zhang S (2010) Optimizing data analysis with a semi-structured time series database. In: Proceedings of the 2010 Workshop on Managing Systems via Log Analysis and Machine Learning Techniques, SLAML\u201910, pp 7\u20137"},{"issue":"1","key":"9467_CR3","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1023\/A:1010933404324","volume":"45","author":"L Breiman","year":"2001","unstructured":"Breiman L (2001) Random forests. Mach Learn 45(1):5\u201332","journal-title":"Mach Learn"},{"key":"9467_CR4","unstructured":"Breiman L (2002) Manual on setting up, using, and understanding random forests v3.1. \n                        http:\/\/oz.berkeley.edu\/users\/breiman\/Using_random_forests_V3"},{"key":"9467_CR5","unstructured":"Cohen I, Goldszmidt M, Kelly T, Symons J, Chase JS (2004) Correlating instrumentation data to system states: A building block for automated diagnosis and control. In: Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation - Volume 6, OSDI\u2019 04, pp 16\u201316"},{"issue":"4-5","key":"9467_CR6","doi-asserted-by":"crossref","first-page":"531","DOI":"10.1007\/s10664-011-9173-9","volume":"17","author":"M D\u2019Ambros","year":"2012","unstructured":"D\u2019Ambros M, Lanza M, Robbes R (2012) Evaluating defect prediction approaches: a benchmark and an extensive comparison. Empirical Software Engineering 17(4-5):531\u2013577","journal-title":"Empirical Software Engineering"},{"issue":"1","key":"9467_CR7","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1214\/aos\/1176344552","volume":"7","author":"B Efron","year":"1979","unstructured":"Efron B (1979) Bootstrap methods: another look at the jackknife. Ann Stat 7 (1):1\u201326","journal-title":"Ann Stat"},{"key":"9467_CR8","doi-asserted-by":"crossref","unstructured":"Fu Q, Lou JG, Wang Y, Li J (2009) Execution anomaly detection in distributed systems through unstructured log analysis. In: Proceedings of the 2009 Ninth IEEE International Conference on Data Mining, ICDM \u201909, pp 149\u2013158","DOI":"10.1109\/ICDM.2009.60"},{"key":"9467_CR9","doi-asserted-by":"crossref","unstructured":"Fu Q, Lou JG, Lin Q, Ding R, Zhang D, Xie T (2013) Contextual analysis of program logs for understanding system behaviors. In: Proceedings of the 10th Working Conference on Mining Software Repositories, MSR \u201913, pp 397\u2013400","DOI":"10.1109\/MSR.2013.6624054"},{"key":"9467_CR10","doi-asserted-by":"crossref","unstructured":"Fu Q, Zhu J, Hu W, Lou JG, Ding R, Lin Q, Zhang D, Xie T (2014) Where do developers log? An empirical study on logging practices in industry. In: Companion Proceedings of the 36th International Conference on Software Engineering, ICSE Companion \u201914, pp 24\u201333","DOI":"10.1145\/2591062.2591175"},{"key":"9467_CR11","doi-asserted-by":"crossref","unstructured":"Fukushima T, Kamei Y, McIntosh S, Yamashita K, Ubayashi N (2014) An empirical study of just-in-time defect prediction using cross-project models. In: Proceedings of the 11th Working Conference on Mining Software Repositories, MSR, vol 2014, pp 172\u2013181","DOI":"10.1145\/2597073.2597075"},{"key":"9467_CR12","doi-asserted-by":"crossref","unstructured":"Ghotra B, McIntosh S, Hassan AE (2015) Revisiting the impact of classification techniques on the performance of defect prediction models. In: Proceedings of the 37th International Conference on Software Engineering - Volume 1, ICSE \u201915, pp 789\u2013800","DOI":"10.1109\/ICSE.2015.91"},{"key":"9467_CR13","doi-asserted-by":"crossref","unstructured":"Glerum K, Kinshumann K, Greenberg S, Aul G, Orgovan V, Nichols G, Grant D, Loihle G, Hunt G (2009) Debugging in the (very) large: Ten years of implementation and experience. In: Proceedings of the ACM SIGOPS 22Nd Symposium on Operating Systems Principles, SOSP \u201909, pp 103\u2013116","DOI":"10.1145\/1629575.1629586"},{"key":"9467_CR14","volume-title":"The complete log4j manual","author":"C G\u00fclc\u00fc","year":"2003","unstructured":"G\u00fclc\u00fc C, Stark S (2003) The complete log4j manual. QOS.CH, Lausanne, Switzerland"},{"issue":"1","key":"9467_CR15","first-page":"3","volume":"15","author":"EG Jelihovschi","year":"2014","unstructured":"Jelihovschi EG, Faria JC, Allaman IB (2014) Scottknott: A package for performing the scott-knott clustering algorithm in R. Trends in Applied and Computational Mathematics 15(1):3\u201317","journal-title":"Trends in Applied and Computational Mathematics"},{"key":"9467_CR16","doi-asserted-by":"crossref","unstructured":"Kabinna S, Bezemer CP, Shang W, Hassan AE (2016) Logging library migrations: a case study for the apache software foundation projects. In: Proceedings of the 13th International Conference on Mining Software Repositories, MSR \u201916, pp 154\u2013164","DOI":"10.1145\/2901739.2901769"},{"issue":"6","key":"9467_CR17","doi-asserted-by":"crossref","first-page":"757","DOI":"10.1109\/TSE.2012.70","volume":"39","author":"Y Kamei","year":"2013","unstructured":"Kamei Y, Shihab E, Adams B, Hassan AE, Mockus A, Sinha A, Ubayashi N (2013) A large-scale empirical study of just-in-time quality assurance. IEEE Transactions on Software Engineering 39(6):757\u2013773","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"5","key":"9467_CR18","doi-asserted-by":"crossref","first-page":"2072","DOI":"10.1007\/s10664-015-9400-x","volume":"21","author":"Y Kamei","year":"2016","unstructured":"Kamei Y, Fukushima T, McIntosh S, Yamashita K, Ubayashi N, Hassan AE (2016) Studying just-in-time defect prediction using cross-project models. Empir Softw Eng 21(5):2072\u20132106","journal-title":"Empir Softw Eng"},{"key":"9467_CR19","doi-asserted-by":"crossref","unstructured":"Kavulya S, Tan J, Gandhi R, Narasimhan P (2010) An analysis of traces from a production mapreduce cluster. In: Proceedings of the 2010 10th IEEE\/ACM International Conference on Cluster, Cloud and Grid Computing, CCGRID \u201910, pp 94\u2013103","DOI":"10.1109\/CCGRID.2010.112"},{"issue":"8","key":"9467_CR20","first-page":"707","volume":"10","author":"VI Levenshtein","year":"1966","unstructured":"Levenshtein VI (1966) Binary codes capable of correcting deletions, insertions, and reversals. Soviet physics doklady 10(8):707\u2013710","journal-title":"Soviet physics doklady"},{"issue":"3","key":"9467_CR21","first-page":"18","volume":"2","author":"A Liaw","year":"2002","unstructured":"Liaw A, Wiener M (2002) Classification and regression by randomforest. R news 2(3):18\u201322","journal-title":"R news"},{"key":"9467_CR22","doi-asserted-by":"crossref","unstructured":"Mariani L, Pastore F (2008) Automated identification of failure causes in system logs. In: Proceedings of the 2008 19th International Symposium on Software Reliability Engineering, ISSRE \u201908, pp 117\u2013126","DOI":"10.1109\/ISSRE.2008.48"},{"key":"9467_CR23","doi-asserted-by":"crossref","unstructured":"Mariani L, Pastore F, Pezze M (2009) A toolset for automated failure analysis. In: Proceedings of the 31st International Conference on Software Engineering, ICSE \u201909, pp 563\u2013566","DOI":"10.1109\/ICSE.2009.5070556"},{"key":"9467_CR24","doi-asserted-by":"crossref","unstructured":"McIntosh S, Kamei Y, Adams B, Hassan AE (2014) The impact of code review coverage and code review participation on software quality: A case study of the qt, vtk, and itk projects. In: Proceedings of the 11th Working Conference on Mining Software Repositories, MSR \u201914, pp 192\u2013201","DOI":"10.1145\/2597073.2597076"},{"key":"9467_CR25","unstructured":"Microsoft-MSDN (2016) Logging an exception. \n                        https:\/\/msdn.microsoft.com\/en-us\/library\/ff664711(v=pandp.50).aspx"},{"key":"9467_CR26","doi-asserted-by":"crossref","unstructured":"Nagappan N, Ball T (2007) Using software dependencies and churn metrics to predict field failures: An empirical case study. In: Proceedings of the First International Symposium on Empirical Software Engineering and Measurement, ESEM \u201907, pp 364\u2013373","DOI":"10.1109\/ESEM.2007.13"},{"key":"9467_CR27","doi-asserted-by":"crossref","unstructured":"Nagappan N, Ball T, Zeller A (2006) Mining metrics to predict component failures. In: Proceedings of the 28th International Conference on Software Engineering, ICSE \u201906, pp 452\u2013461","DOI":"10.1145\/1134285.1134349"},{"issue":"2","key":"9467_CR28","doi-asserted-by":"crossref","first-page":"55","DOI":"10.1145\/2076450.2076466","volume":"55","author":"A Oliner","year":"2012","unstructured":"Oliner A, Ganapathi A, Xu W (2012) Advances and challenges in log analysis. Commun ACM 55(2):55\u201361","journal-title":"Commun ACM"},{"issue":"3","key":"9467_CR29","doi-asserted-by":"crossref","first-page":"507","DOI":"10.2307\/2529204","volume":"30","author":"A Scott","year":"1974","unstructured":"Scott A, Knott M (1974) A cluster analysis method for grouping means in the analysis of variance. Biometrics 30(3):507\u2013512","journal-title":"Biometrics"},{"key":"9467_CR30","doi-asserted-by":"crossref","unstructured":"Shang W, Jiang ZM, Adams B, Hassan AE, Godfrey MW, Nasser M, Flora P (2011) An exploratory study of the evolution of communicated information about the execution of large software systems. In: Proceedings of the 18th Working Conference on Reverse Engineering, WCRE \u201911, pp 335\u2013344","DOI":"10.1109\/WCRE.2011.48"},{"key":"9467_CR31","doi-asserted-by":"crossref","unstructured":"Shang W, Jiang ZM, Adams B, Hassan AE, Godfrey MW, Nasser M, Flora P (2014a) An exploratory study of the evolution of communicated information about the execution of large software systems. J Soft: Evolution and Process 26(1):3\u201326","DOI":"10.1002\/smr.1579"},{"key":"9467_CR32","doi-asserted-by":"crossref","unstructured":"Shang W, Nagappan M, Hassan AE, Jiang ZM (2014b) Understanding log lines using development knowledge. In: Proceedings of the 30th IEEE International Conference on Software Maintenance and Evolution, ICSME \u201914, pp 21\u201330","DOI":"10.1109\/ICSME.2014.24"},{"issue":"1","key":"9467_CR33","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/s10664-013-9274-8","volume":"20","author":"W Shang","year":"2015","unstructured":"Shang W, Nagappan M, Hassan AE (2015) Studying the relationship between logging characteristics and the code quality of platform software. Empirical Softw Engg 20(1):1\u201327","journal-title":"Empirical Softw Engg"},{"key":"9467_CR34","doi-asserted-by":"crossref","unstructured":"Sharma B, Chudnovsky V, Hellerstein JL, Rifaat R, Das CR (2011) Modeling and synthesizing task placement constraints in google compute clusters. In: Proceedings of the 2Nd ACM Symposium on Cloud Computing, SOCC \u201911, pp 3:1\u20133:14","DOI":"10.1145\/2038916.2038919"},{"key":"9467_CR35","doi-asserted-by":"crossref","unstructured":"Syer MD, Jiang ZM, Nagappan M, Hassan AE, Nasser M, Flora P (2013) Leveraging performance counters and execution logs to diagnose memory-related performance issues. In: Proceedings of the 29th IEEE International Conference on Software Maintenance, ICSM \u201913:, pp 110\u2013119","DOI":"10.1109\/ICSM.2013.22"},{"issue":"99","key":"9467_CR36","first-page":"1","volume":"PP","author":"C Tantithamthavorn","year":"2016","unstructured":"Tantithamthavorn C, McIntosh S, Hassan A, Matsumoto K (2016) An empirical comparison of model validation techniques for defect prediction models. IEEE Trans Softw Eng PP(99):1\u20131","journal-title":"IEEE Trans Softw Eng"},{"key":"9467_CR37","doi-asserted-by":"crossref","unstructured":"Tourani P, Adams B (2016) The impact of human discussions on just-in-time quality assurance: An empirical study on openstack and eclipse. In: Proceedings of the 23rd International Conference on Software Analysis, Evolution, and Reengineering, SANER \u201916, pp 189\u2013200","DOI":"10.1109\/SANER.2016.113"},{"key":"9467_CR38","doi-asserted-by":"crossref","unstructured":"Xu W, Huang L, Fox A, Patterson D, Jordan MI (2009) Detecting large-scale system problems by mining console logs. In: Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP \u201909, pp 117\u2013132","DOI":"10.1145\/1629575.1629587"},{"key":"9467_CR39","doi-asserted-by":"crossref","unstructured":"Yuan D, Mai H, Xiong W, Tan L, Zhou Y, Pasupathy S (2010) Sherlog: Error diagnosis by connecting clues from run-time logs. In: Proceedings of the 15th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS, vol XV, pp 143\u2013154","DOI":"10.1145\/1736020.1736038"},{"key":"9467_CR40","doi-asserted-by":"crossref","unstructured":"Yuan D, Zheng J, Park S, Zhou Y, Savage S (2011) Improving software diagnosability via log enhancement. In: Proceedings of the 16th International Conference on Architectural Support for Programming Languages and Operating Systems, ASPLOS, vol XVI, pp 3\u201314","DOI":"10.1145\/1950365.1950369"},{"key":"9467_CR41","unstructured":"Yuan D, Park S, Huang P, Liu Y, Lee MM, Tang X, Zhou Y, Savage S (2012a) Be conservative: Enhancing failure diagnosis with proactive logging. In: Proceedings of the 10th USENIX conference on Operating Systems Design and Implementation, OSDI \u201912, vol 12, pp 293\u2013306"},{"key":"9467_CR42","doi-asserted-by":"crossref","unstructured":"Yuan D, Park S, Zhou Y (2012b) Characterizing logging practices in open-source software. In: Proceedings of the 34th International Conference on Software Engineering, ICSE \u201912, pp 102\u2013112","DOI":"10.1109\/ICSE.2012.6227202"},{"key":"9467_CR43","doi-asserted-by":"crossref","unstructured":"Zhang S, Cohen I, Symons J, Fox A (2005) Ensembles of models for automated diagnosis of system performance problems. In: Proceedings of the 2005 International Conference on Dependable Systems and Networks, DSN \u201905, pp 644\u2013653","DOI":"10.1109\/DSN.2005.44"},{"key":"9467_CR44","doi-asserted-by":"crossref","unstructured":"Zhu J, He P, Fu Q, Zhang H, Lyu MR, Zhang D (2015) Learning to log: Helping developers make informed logging decisions. In: Proceedings of the 37th International Conference on Software Engineering - Volume 1, ICSE \u201915, pp 415\u2013425","DOI":"10.1109\/ICSE.2015.60"},{"key":"9467_CR45","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Weisgerber P, Diehl S, Zeller A (2004) Mining version histories to guide software changes. In: Proceedings of the 26th International Conference on Software Engineering, ICSE \u201904, pp 563\u2013572","DOI":"10.1109\/ICSE.2004.1317478"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-016-9467-z\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9467-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-016-9467-z.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,7,24]],"date-time":"2017-07-24T10:02:37Z","timestamp":1500890557000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-016-9467-z"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,24]]},"references-count":45,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2017,8]]}},"alternative-id":["9467"],"URL":"https:\/\/doi.org\/10.1007\/s10664-016-9467-z","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,24]]}}}