{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T06:52:40Z","timestamp":1774594360429,"version":"3.50.1"},"reference-count":54,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T00:00:00Z","timestamp":1551916800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002790","name":"Canadian Network for Research and Innovation in Machining Technology, Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002790","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2019,8]]},"DOI":"10.1007\/s10664-019-09690-0","type":"journal-article","created":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T14:00:47Z","timestamp":1551967247000},"page":"2285-2322","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Extracting and studying the Logging-Code-Issue- Introducing changes in Java-based large-scale open source software systems"],"prefix":"10.1007","volume":"24","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9103-5820","authenticated-orcid":false,"given":"Boyuan","family":"Chen","sequence":"first","affiliation":[]},{"given":"Zhen Ming","family":"Jiang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,3,7]]},"reference":[{"key":"9690_CR1","unstructured":"JBoss Logging (2018) \n                              https:\/\/jboss-logging.github.io\/jboss-logging-tools\/\n                              \n                           . Last accessed: 11\/28\/2018"},{"key":"9690_CR2","unstructured":"PR5906 (2018) Split all log messages into separate module project codes. \n                              https:\/\/github.com\/wildfly\/wildfly\/pull\/5906\n                              \n                           . Last accessed: 02\/14\/2018"},{"key":"9690_CR3","unstructured":"Replication Package for the LCAnalyzer work (2018) \n                              http:\/\/www.cse.yorku.ca\/zmjiang\/share\/replication_package\/icse2017_chen\/LCAnalyzer.zip\n                              \n                           . Last accessed: 02\/14\/2018"},{"key":"9690_CR4","unstructured":"The AspectJ Project (2016) \n                              https:\/\/eclipse.org\/aspectj\/\n                              \n                           . Last accessed: 08\/26\/2016"},{"key":"9690_CR5","unstructured":"The replication package (2018) \n                              http:\/\/www.cse.yorku.ca\/zmjiang\/share\/replication_package\/emse2018_chen\/replication_package.zip\n                              \n                           . Last accessed: 04\/09\/2018"},{"key":"9690_CR6","doi-asserted-by":"crossref","unstructured":"Barik T, DeLine R, Drucker S, Fisher D (2016) The Bones of the System: A Case Study of Logging and Telemetry at Microsoft. In: Companion Proceedings of the 38th International Conference on Software Engineering)","DOI":"10.1145\/2889160.2889231"},{"key":"9690_CR7","doi-asserted-by":"crossref","unstructured":"Bird C, Bachmann A, Aune E, Duffy J, Bernstein A, Filkov V, Devanbu P (2009) Fair and balanced?: Bias in bug-fix datasets. In: Proceedings of the the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on The Foundations of Software Engineering (ESEC\/FSE)","DOI":"10.1145\/1595696.1595716"},{"key":"9690_CR8","doi-asserted-by":"crossref","unstructured":"Chen B, Jiang ZM (2016) Characterizing logging practices in Java-based open source software projects \u2013 a replication study in Apache Software Foundation Empirical Software Engineering","DOI":"10.1007\/s10664-016-9429-5"},{"key":"9690_CR9","doi-asserted-by":"crossref","unstructured":"Chen B, Jiang ZM (2017) Characterizing and detecting anti-patterns in the logging code. In: 2017 IEEE\/ACM 39Th international conference on software engineering (ICSE), pp 71\u201381","DOI":"10.1109\/ICSE.2017.15"},{"issue":"7","key":"9690_CR10","doi-asserted-by":"publisher","first-page":"641","DOI":"10.1109\/TSE.2016.2616306","volume":"43","author":"DA da Costa","year":"2017","unstructured":"da Costa DA, McIntosh S, Shang W, Kulesza U, Coelho R, Hassan A (2017) A framework for evaluating the results of the szz approach for identifying bug-introducing changes. IEEE Trans Softw Eng 43(7):641\u2013657","journal-title":"IEEE Trans Softw Eng"},{"issue":"1","key":"9690_CR11","first-page":"107","volume":"26","author":"S Davies","year":"2014","unstructured":"Davies S, Roper M, Wood M (2014) Comparing text-based and dependence-based approaches for determining the origins of bugs. J Softw: Evol Process 26(1):107\u2013139","journal-title":"J Softw: Evol Process"},{"key":"9690_CR12","unstructured":"Ding R, Zhou H, Lou JG, Zhang H, Lin Q, Fu Q, Zhang D, Xie T (2015) Log2: A Cost-aware Logging Mechanism for Performance Diagnosis. In: Proceedings of the 2015 USENIX Conference on Usenix Annual Technical Conference (ATC)"},{"issue":"11","key":"9690_CR13","doi-asserted-by":"publisher","first-page":"725","DOI":"10.1109\/TSE.2007.70731","volume":"33","author":"B Fluri","year":"2007","unstructured":"Fluri B, Wursch M, Pinzger M, Gall H (2007) Change distilling:tree differencing for fine-grained source code change extraction. IEEE Trans Softw Eng 33 (11):725\u2013743","journal-title":"IEEE Trans Softw Eng"},{"key":"9690_CR14","volume-title":"Refactoring: Improving the design of existing code","author":"M Fowler","year":"1999","unstructured":"Fowler M, Beck K, Brant J, Opdyke W, Roberts D (1999) Refactoring: Improving the design of existing code. Addison-Wesley Longman Publishing co. Inc., Reading"},{"key":"9690_CR15","doi-asserted-by":"crossref","unstructured":"Fu Q, Zhu J, Hu W, Lou JG, Ding R, Lin Q, Zhang D, Xie T (2014) Where Do Developers Log? An Empirical Study on Logging Practices in Industry. In: Companion Proceedings of the 36th International Conference on Software Engineering","DOI":"10.1145\/2591062.2591175"},{"key":"9690_CR16","unstructured":"HADOOP-12666 (2018a) Support Microsoft Azure Data Lake - as a file system in Hadoop. \n                              https:\/\/issues.apache.org\/jira\/browse\/HADOOP-12666\n                              \n                           . Last accessed: 02\/06\/2018"},{"key":"9690_CR17","unstructured":"HADOOP-7358 (2018b) Improve log levels when exceptions caught in RPC handler. \n                              https:\/\/issues.apache.org\/jira\/browse\/HADOOP-7358\n                              \n                           . Last accessed: 02\/14\/2018"},{"key":"9690_CR18","unstructured":"HADOOP-8347 (2018c) Hadoop Common logs misspell \u2019successful\u2019. \n                              https:\/\/issues.apache.org\/jira\/browse\/HADOOP-8347\n                              \n                           . Last accessed: 02\/14\/2018"},{"key":"9690_CR19","unstructured":"HBASE-10470 (2018a) Import generates huge log file while importing large amounts of data. \n                              https:\/\/issues.apache.org\/jira\/browse\/HBASE-10470\n                              \n                           . Last accessed: 01\/24\/2018"},{"key":"9690_CR20","unstructured":"HBASE-12539 (2018b) HFileLinkCleaner logs are uselessly noisy. \n                              https:\/\/issues.apache.org\/jira\/browse\/HBASE-12539\n                              \n                           . Last accessed: 02\/14\/2018"},{"key":"9690_CR21","unstructured":"HBASE-750 (2016c) NPE caused by StoreFileScanner.updateReaders. \n                              https:\/\/issues.apache.org\/jira\/browse\/HBASE-750\/\n                              \n                           . Last accessed: 08\/26\/2016"},{"key":"9690_CR22","unstructured":"HBASE-8754 (2018d) Log the client IP\/port of the balancer invoker. \n                              https:\/\/issues.apache.org\/jira\/browse\/HBASE-8754\n                              \n                           . Last accessed: 02\/14\/2018"},{"key":"9690_CR23","unstructured":"HDFS-1073 (2018a) Simpler model for Namenode\u2019s fs Image and edit Logs. \n                              https:\/\/issues.apache.org\/jira\/browse\/HDFS-1073\n                              \n                           . Last accessed: 02\/14\/2018"},{"key":"9690_CR24","unstructured":"HDFS-11448 (2018b) JN log segment syncing should support HA upgrade. \n                              https:\/\/issues.apache.org\/jira\/browse\/HDFS-11448\n                              \n                           . Last accessed: 02\/14\/2018"},{"key":"9690_CR25","unstructured":"HDFS-4122 (2018c) Cleanup HDFS logs and reduce the size of logged messages. \n                              https:\/\/issues.apache.org\/jira\/browse\/HDFS-4122\n                              \n                           . Last accessed: 02\/07\/2018"},{"key":"9690_CR26","unstructured":"HDFS-5800 (2018d) Typo: soft-limit for hard-limit in DFSClient. \n                              https:\/\/issues.apache.org\/jira\/browse\/HDFS-5800\n                              \n                           . Last accessed: 02\/14\/2018"},{"key":"9690_CR27","unstructured":"HHH-6732 (2018) Some logging trace statements are missing guards against unneeded string creation. \n                              https:\/\/hibernate.atlassian.net\/browse\/HHH-6732\n                              \n                           . Last accessed: 02\/14\/2018"},{"key":"9690_CR28","volume-title":"Continuous delivery: Reliable Software Releases Through Build, Test, and Deployment Automation","author":"J Humble","year":"2010","unstructured":"Humble J, Farley D (2010) Continuous delivery: Reliable Software Releases Through Build, Test, and Deployment Automation. Addison-Wesley Professional, Reading"},{"key":"9690_CR29","doi-asserted-by":"crossref","unstructured":"Jiang ZM, Hassan AE, Hamann G, Flora P (2009) Automated performance analysis of load tests. In: Proceedings of the 25th IEEE International Conference on Software Maintenance (ICSM)","DOI":"10.1109\/ICSM.2009.5306331"},{"key":"9690_CR30","doi-asserted-by":"crossref","unstructured":"Kabinna S, Bezemer CP, Shang W, Hassan AE (2016) Logging Library Migrations: A Case Study for the Apache Software Foundation Projects. In: Proceedings of the 13th International Conference on Mining Software Repositories (MSR)","DOI":"10.1145\/2901739.2901769"},{"key":"9690_CR31","doi-asserted-by":"crossref","unstructured":"Kampstra P (2008) Beanplot: A boxplot alternative for visual comparison of distributions. J Stat Softw Code Snippets 28(1):1\u20139","DOI":"10.18637\/jss.v028.c01"},{"key":"9690_CR32","doi-asserted-by":"crossref","unstructured":"Kiczales G, Lamping J, Mendhekar A, Maeda C, Lopes C, Loingtier JM, Irwin J (1997) Aspect-oriented programming","DOI":"10.1007\/BFb0053381"},{"key":"9690_CR33","doi-asserted-by":"crossref","unstructured":"Kim S, Zimmermann T, Pan K, Whitehead EJJ (2006) Automatic identification of bug-introducing changes. In: 21St IEEE\/ACM international conference on automated software engineering (ASE\u201906)","DOI":"10.1109\/ASE.2006.23"},{"key":"9690_CR34","doi-asserted-by":"crossref","unstructured":"Li H, Shang W, Hassan AE (2017a) Which log level should developers choose for a new logging statement? Empir Softw Eng 22(4):1684\u20131716","DOI":"10.1007\/s10664-016-9456-2"},{"key":"9690_CR35","doi-asserted-by":"crossref","unstructured":"Li H, Shang W, Zou Y, Hassan AE (2017b) Towards just-in-time suggestions for log changes. Empir Softw Eng 22(4):1831\u20131865","DOI":"10.1007\/s10664-016-9467-z"},{"key":"9690_CR36","doi-asserted-by":"crossref","unstructured":"Moha N, Gueheneuc YG, Duchien L, Meur AFL (2010) DECOR: a method for the specification and detection of code and design smells IEEE transactions on software engineering (TSE)","DOI":"10.1109\/TSE.2009.50"},{"issue":"2","key":"9690_CR37","doi-asserted-by":"publisher","first-page":"55","DOI":"10.1145\/2076450.2076466","volume":"55","author":"A Oliner","year":"2012","unstructured":"Oliner A, Ganapathi A, Xu W (2012) Advances and challenges in log analysis. Commun ACM 55(2):55\u201361","journal-title":"Commun ACM"},{"key":"9690_CR38","doi-asserted-by":"crossref","unstructured":"Palomba F, Bavota G, Penta MD, Oliveto R, Poshyvanyk D, Lucia AD (2015) Mining Version Histories for Detecting Code Smells IEEE transactions on software engineering (TSE)","DOI":"10.1109\/TSE.2014.2372760"},{"key":"9690_CR39","doi-asserted-by":"crossref","unstructured":"Pecchia A, Cinque M, Carrozza G, Cotroneo D (2015) Industry practices and event logging: Assessment of a critical software development process. In: Companion Proceedings of the 37th International Conference on Software Engineering","DOI":"10.1109\/ICSE.2015.145"},{"key":"9690_CR40","doi-asserted-by":"crossref","unstructured":"Rigby PC, German DM, Storey MA (2008) Open source software peer review practices: a case study of the apache server. In: Proceedings of the 30th International Conference on Software Engineering (ICSE)","DOI":"10.1145\/1368088.1368162"},{"key":"9690_CR41","unstructured":"Romano J, Kromrey JD, Coraggio J, Skowronek J (2006) Appropriate statistics for ordinal level data: Should we really be using t-test and Cohen\u2019sd for evaluating group differences on the NSSE and other surveys? In: Annual meeting of the Florida Association of Institutional Research"},{"key":"9690_CR42","doi-asserted-by":"crossref","unstructured":"Sajnani H, Saini V, Svajlenko J, Roy CK, Lopes CV (2016) SourcererCC: Scaling Code Clone Detection to Big-code. In: Proceedings of the 38th International Conference on Software Engineering (ICSE)","DOI":"10.1145\/2884781.2884877"},{"key":"9690_CR43","doi-asserted-by":"crossref","unstructured":"Shang W, Jiang ZM, Adams B, Hassan AE, Godfrey MW, Nasser M, Flora P (2014a) An exploratory study of the evolution of communicated information about the execution of large software systems. J Softw: Evol Process 26(1):3\u201326","DOI":"10.1002\/smr.1579"},{"key":"9690_CR44","doi-asserted-by":"crossref","unstructured":"Shang W, Nagappan M, Hassan AE, Jiang ZM (2014b) Understanding Log Lines Using Development Knowledge. In: Proceedings of the 2014 IEEE International Conference on Software Maintenance and Evolution (ICSME)","DOI":"10.1109\/ICSME.2014.24"},{"key":"9690_CR45","doi-asserted-by":"crossref","unstructured":"Shang W, Nagappan M, Hassan AE (2015) Studying the relationship between logging characteristics and the code quality of platform software. Empir Softw Eng 20(1):1\u201327","DOI":"10.1007\/s10664-013-9274-8"},{"key":"9690_CR46","doi-asserted-by":"crossref","unstructured":"\u015aliwerski J, Zimmermann T, Zeller A (2005) When do changes induce fixes?. In: Proceedings of the 2005 International Workshop on Mining Software Repositories","DOI":"10.1145\/1083142.1083147"},{"key":"9690_CR47","doi-asserted-by":"crossref","unstructured":"Williams C, Spacco J (2008a) Branching and merging in the repository. In: Proceedings of the 2008 International Working Conference on Mining Software Repositories, MSR\u201908, pp 19\u201322, New York","DOI":"10.1145\/1370750.1370754"},{"key":"9690_CR48","doi-asserted-by":"crossref","unstructured":"Williams C, Spacco J (2008b) Szz revisited: Verifying when changes induce fixes. In: Proceedings of the 2008 Workshop on Defects in Large Software Systems, DEFECTS \u201908, pp 32\u201336, New York","DOI":"10.1145\/1390817.1390826"},{"key":"9690_CR49","doi-asserted-by":"crossref","unstructured":"Yuan D, Zheng J, Park S, Zhou Y, Savage S (2011) Improving software diagnosability via log enhancement. In: Proceedings of the Sixteenth International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS)","DOI":"10.1145\/1950365.1950369"},{"key":"9690_CR50","unstructured":"Yuan D, Park S, Huang P, Liu Y, Lee MM, Tang X, Zhou Y, Savage S (2012a) Be conservative: Enhancing failure diagnosis with proactive logging. In: Proceedings of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI)"},{"key":"9690_CR51","doi-asserted-by":"crossref","unstructured":"Yuan D, Park S, Zhou Y (2012b) Characterizing logging practices in open-source software. In: Proceedings of the 34th International Conference on Software Engineering, ICSE \u201912. IEEE Press, Piscataway, pp 102\u2013112","DOI":"10.1109\/ICSE.2012.6227202"},{"key":"9690_CR52","doi-asserted-by":"crossref","unstructured":"Zhao X, Rodrigues K, Luo Y, Stumm M, Yuan D, Zhou Y (2017) log20: Fully automated optimal placement of log printing statements under specified overhead threshold. In: Proceedings of the 26th Symposium on Operating Systems Principles (SOSP)","DOI":"10.1145\/3132747.3132778"},{"key":"9690_CR53","doi-asserted-by":"crossref","unstructured":"Zhu J, He P, Fu Q, Zhang H, Lyu MR, Zhang D (2015) Learning to log: Helping developers make informed logging decisions. In: Proceedings of the 37th International Conference on Software Engineering","DOI":"10.1109\/ICSE.2015.60"},{"key":"9690_CR54","doi-asserted-by":"crossref","unstructured":"Zimmermann T, Premraj R, Zeller A (2007) Predicting defects for eclipse. In: Proceedings of the Third International Workshop on Predictor Models in Software Engineering (PROMISE)","DOI":"10.1109\/PROMISE.2007.10"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-019-09690-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-019-09690-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-019-09690-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,3,6]],"date-time":"2020-03-06T00:19:22Z","timestamp":1583453962000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-019-09690-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,7]]},"references-count":54,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,8]]}},"alternative-id":["9690"],"URL":"https:\/\/doi.org\/10.1007\/s10664-019-09690-0","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,7]]},"assertion":[{"value":"7 March 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}