{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,9]],"date-time":"2026-01-09T06:27:54Z","timestamp":1767940074879,"version":"3.49.0"},"reference-count":99,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T00:00:00Z","timestamp":1676073600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T00:00:00Z","timestamp":1676073600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2023,3]]},"DOI":"10.1007\/s10664-022-10258-8","type":"journal-article","created":{"date-parts":[[2023,2,11]],"date-time":"2023-02-11T11:06:25Z","timestamp":1676113585000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["An interview study about the use of logs in embedded software engineering"],"prefix":"10.1007","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3071-0244","authenticated-orcid":false,"given":"Nan","family":"Yang","sequence":"first","affiliation":[]},{"given":"Pieter","family":"Cuijpers","sequence":"additional","affiliation":[]},{"given":"Dennis","family":"Hendriks","sequence":"additional","affiliation":[]},{"given":"Ramon","family":"Schiffelers","sequence":"additional","affiliation":[]},{"given":"Johan","family":"Lukkien","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Serebrenik","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2023,2,11]]},"reference":[{"issue":"3","key":"10258_CR1","doi-asserted-by":"publisher","first-page":"e1821","DOI":"10.1002\/smr.1821","volume":"29","author":"K Aggarwal","year":"2017","unstructured":"Aggarwal K, Timbers F, Rutgers T, Hindle A, Stroulia E, Greiner R (2017) Detecting duplicate bug reports with software engineering domain knowledge. J Softw Evol Process 29(3):e1821","journal-title":"J Softw Evol Process"},{"key":"10258_CR2","doi-asserted-by":"crossref","unstructured":"Amar H, Bao L, Busany N, Lo D, Maoz S (2018) Using finite-state models for log differencing. In: ESEC\/FSE, pp 49\u201359","DOI":"10.1145\/3236024.3236069"},{"issue":"6","key":"10258_CR3","doi-asserted-by":"publisher","first-page":"56","DOI":"10.1109\/MS.2016.142","volume":"33","author":"PO Antonino","year":"2016","unstructured":"Antonino PO, Morgenstern A, Kuhn T (2016) Embedded-software architects: it\u2019s not only about the software. IEEE Softw 33(6):56\u201362","journal-title":"IEEE Softw"},{"key":"10258_CR4","doi-asserted-by":"crossref","unstructured":"Artho C, Havelund K, Honiden S (2007) Visualization of concurrent program executions. In: COMPSAC, pp 541\u2013546","DOI":"10.1109\/COMPSAC.2007.236"},{"key":"10258_CR5","doi-asserted-by":"crossref","unstructured":"Asadollah SA, Inam R, Hansson H (2015) A survey on testing for cyber physical system. In: ICTSS, pp 194\u2013207","DOI":"10.1007\/978-3-319-25945-1_12"},{"key":"10258_CR6","doi-asserted-by":"crossref","unstructured":"Asuncion H, Asuncion A, Taylor R (2010) Software traceability with topic modeling. In: ICSE (1), pp 95\u2013104","DOI":"10.1145\/1806799.1806817"},{"key":"10258_CR7","unstructured":"Baltes S, Ralph P (2020) Sampling in software engineering research: a critical review and guidelines. arXiv:200207764"},{"key":"10258_CR8","doi-asserted-by":"crossref","unstructured":"Bao L, Busany N, Lo D, Maoz S (2019) Statistical log differencing. In: ASE, pp 851\u2013862","DOI":"10.1109\/ASE.2019.00084"},{"key":"10258_CR9","doi-asserted-by":"crossref","unstructured":"Barik T, DeLine R, Drucker S, Fisher D (2016) The bones of the system: a case study of logging and telemetry at microsoft. In: 2016 IEEE\/ACM 38th international conference on software engineering companion (ICSE-C). IEEE, pp 92\u2013101","DOI":"10.1145\/2889160.2889231"},{"key":"10258_CR10","doi-asserted-by":"publisher","unstructured":"Beschastnikh I, Liu P, Xing A, Wang P, Brun Y, Ernst MD (2020a) Visualizing distributed system executions 29. https:\/\/doi.org\/10.1145\/3375633","DOI":"10.1145\/3375633"},{"issue":"2","key":"10258_CR11","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3375633","volume":"29","author":"I Beschastnikh","year":"2020","unstructured":"Beschastnikh I, Liu P, Xing A, Wang P, Brun Y, Ernst MD (2020b) Visualizing distributed system executions. TOSEM 29(2):1\u201338","journal-title":"TOSEM"},{"issue":"6","key":"10258_CR12","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1109\/TC.1972.5009015","volume":"100","author":"A Biermann","year":"1972","unstructured":"Biermann A, Feldman J (1972) On the synthesis of finite-state machines from samples of their behavior. IEEE Trans Comput 100(6):592\u2013597","journal-title":"IEEE Trans Comput"},{"key":"10258_CR13","doi-asserted-by":"crossref","unstructured":"Bird C (2016) Interviews. In: Perspectives on data science for software engineering. Morgan Kaufmann","DOI":"10.1016\/B978-0-12-804206-9.00025-8"},{"key":"10258_CR14","doi-asserted-by":"crossref","unstructured":"Broadfoot GH (2005) Asd case notes: costs and benefits of applying formal methods to industrial control software. In: International symposium on formal methods. Springer, pp 548\u2013551","DOI":"10.1007\/11526841_39"},{"issue":"1","key":"10258_CR15","doi-asserted-by":"publisher","first-page":"106","DOI":"10.1177\/1473325010370189","volume":"10","author":"E Buchbinder","year":"2011","unstructured":"Buchbinder E (2011) Beyond checking: experiences of the validation interview. Qual Soc Work 10(1):106\u2013122","journal-title":"Qual Soc Work"},{"issue":"4","key":"10258_CR16","first-page":"1","volume":"54","author":"B Chen","year":"2021","unstructured":"Chen B, Jiang ZM (2021) A survey of software log instrumentation. ACM Comput Surv (CSUR) 54(4):1\u201334","journal-title":"ACM Comput Surv (CSUR)"},{"issue":"1","key":"10258_CR17","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1007\/s10664-016-9429-5","volume":"22","author":"B Chen","year":"2017","unstructured":"Chen B, et al. (2017) Characterizing logging practices in java-based open source software projects\u2014a replication study in apache software foundation. Empir Softw Eng 22(1):330\u2013374","journal-title":"Empir Softw Eng"},{"key":"10258_CR18","doi-asserted-by":"crossref","unstructured":"Cicchetti A, Di Ruscio D, Eramo R, Pierantonio A (2008) Automating co-evolution in model-driven engineering. In: 2008 12th International IEEE enterprise distributed object computing conference. IEEE, pp 222\u2013231","DOI":"10.1109\/EDOC.2008.44"},{"key":"10258_CR19","doi-asserted-by":"crossref","unstructured":"da Silva AJ, Linhares MV, Padilha R, Roqueiro N, de Oliveira RS (2006) An empirical study of sysml in the modeling of embedded systems. In: 2006 IEEE international conference on systems, man and cybernetics, vol 6. IEEE, pp 4569\u20134574","DOI":"10.1109\/ICSMC.2006.384866"},{"key":"10258_CR20","doi-asserted-by":"crossref","unstructured":"Dallmeier V, Knopp N, Mallon C, Hack S, Zeller A (2010) Generating test cases for specification mining. In: ISSTA, pp 85\u201396","DOI":"10.1145\/1831708.1831719"},{"issue":"1","key":"10258_CR21","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.jss.2004.12.018","volume":"79","author":"D Edwards","year":"2006","unstructured":"Edwards D, Simmons S, Wilde N (2006) An approach to feature location in distributed systems. J Syst Softw 79(1):57\u201368. https:\/\/doi.org\/10.1016\/j.jss.2004.12.018","journal-title":"J Syst Softw"},{"key":"10258_CR22","doi-asserted-by":"publisher","first-page":"106276","DOI":"10.1016\/j.infsof.2020.106276","volume":"122","author":"D El-Masri","year":"2020","unstructured":"El-Masri D, Petrillo F, Gu\u00e9h\u00e9neuc YG, Hamou-Lhadj A, Bouziane A (2020) A systematic literature review on automated log abstraction techniques. Inf Softw Technol 122:106276","journal-title":"Inf Softw Technol"},{"key":"10258_CR23","doi-asserted-by":"crossref","unstructured":"Etien A, Salinesi C (2005) Managing requirements in a co-evolution context. In: 13th IEEE international 31 conference on requirements engineering (RE\u201905). IEEE, pp 125\u2013134","DOI":"10.1109\/RE.2005.37"},{"key":"10258_CR24","doi-asserted-by":"crossref","unstructured":"Feng Y, Dreef K, Jones JA, van Deursen A (2018) Hierarchical abstraction of execution traces for program comprehension. In: ICPC, pp 86\u201396","DOI":"10.1145\/3196321.3196343"},{"key":"10258_CR25","unstructured":"Fidge CJ (1987) Timestamps in message-passing systems that preserve the partial ordering. Australian National University, Department of Computer Science"},{"key":"10258_CR26","unstructured":"Fleming SD, Stirewalt R (2009) Successful strategies for debugging concurrent software: an empirical investigation. Michigan State University, Computer Science"},{"issue":"11","key":"10258_CR27","first-page":"725","volume":"33","author":"B Fluri","year":"2007","unstructured":"Fluri B, Wursch M, PInzger M, Gall H (2007) Change distilling: tree differencing for fine-grained source code change extraction. TSE 33 (11):725\u2013743","journal-title":"TSE"},{"key":"10258_CR28","doi-asserted-by":"crossref","unstructured":"Flyvbjerg B (2007) Five misunderstandings about case-study research. Sage","DOI":"10.1177\/1077800405284363"},{"key":"10258_CR29","doi-asserted-by":"crossref","unstructured":"Fu Q, Zhu J, Hu W, Lou JG, Ding R, Lin Q, Zhang D, Xie T (2014) Where do developers log? An empirical study on logging practices in industry. In: ICSE, pp 24\u201333","DOI":"10.1145\/2591062.2591175"},{"issue":"3","key":"10258_CR30","doi-asserted-by":"publisher","first-page":"225","DOI":"10.1002\/spe.4380160304","volume":"16","author":"J Gait","year":"1986","unstructured":"Gait J (1986) A probe effect in concurrent programs. Softw Pract Exp 16(3):225\u2013233","journal-title":"Softw Pract Exp"},{"key":"10258_CR31","unstructured":"Gholamian S, Ward PA (2021a) A comprehensive survey of logging in software: from logging statements automation to log mining and analysis. arXiv:211012489"},{"key":"10258_CR32","doi-asserted-by":"crossref","unstructured":"Gholamian S, Ward PA (2021b) What distributed systems say: a study of seven spark application logs. In: 2021 40th International symposium on reliable distributed systems (SRDS). IEEE, pp 222\u2013232","DOI":"10.1109\/SRDS53918.2021.00030"},{"key":"10258_CR33","doi-asserted-by":"crossref","unstructured":"Goldstein M, Raz D, Segall I (2017) Experience report: log-based behavioral differencing. In: ISSRE, pp 282\u2013293","DOI":"10.1109\/ISSRE.2017.14"},{"issue":"6","key":"10258_CR34","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1109\/MS.2003.1241368","volume":"20","author":"B Graaf","year":"2003","unstructured":"Graaf B, Lormans M, Toetenel H (2003) Embedded software engineering: the state of the practice. IEEE Softw 20(6):61\u201369","journal-title":"IEEE Softw"},{"key":"10258_CR35","unstructured":"GrayLog (2020) A leading centralized log management solution. https:\/\/www.graylog.org"},{"key":"10258_CR36","doi-asserted-by":"crossref","unstructured":"Gu S, Rong G, Zhang H, Shen H (2022) Logging practices in software engineering: a systematic mapping study. IEEE Trans Softw Eng","DOI":"10.1109\/TSE.2022.3166924"},{"key":"10258_CR37","doi-asserted-by":"crossref","unstructured":"Gulzar MA, Zhu Y, Han X (2019) Perception and practices of differential testing. In: 2019 IEEE\/ACM 41st international conference on software engineering: software engineering in practice (ICSE-SEIP). IEEE, pp 71\u201380","DOI":"10.1109\/ICSE-SEIP.2019.00016"},{"key":"10258_CR38","doi-asserted-by":"publisher","unstructured":"Gupta M, Mandal A, Dasgupta G, Serebrenik A (2018) Runtime monitoring in continuous deployment by differencing execution behavior model. In: Pahl C, Vukovic M, Yin J, Yu Q (eds) ICSOC, Springer, Lecture Notes in Computer Science. https:\/\/doi.org\/10.1007\/978-3-030-03596-9_58, vol 11236, pp 812\u2013827","DOI":"10.1007\/978-3-030-03596-9_58"},{"key":"10258_CR39","doi-asserted-by":"crossref","unstructured":"Harty J, Zhang H, Wei L, Pascarella L, Aniche M, Shang W (2021) Logging practices with mobile analytics: An empirical study on firebase. In: 2021 IEEE\/ACM 8th international conference on mobile software engineering and systems (MobileSoft). IEEE, pp 56\u201360","DOI":"10.1109\/MobileSoft52590.2021.00013"},{"issue":"6","key":"10258_CR40","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/3460345","volume":"54","author":"S He","year":"2021","unstructured":"He S, He P, Chen Z, Yang T, Su Y, Lyu MR (2021) A survey on automated log analysis for reliability engineering. ACM Comput Surv (CSUR) 54(6):1\u201337","journal-title":"ACM Comput Surv (CSUR)"},{"key":"10258_CR41","doi-asserted-by":"crossref","unstructured":"Hendriks D, Meer Avd, Oortwijn W (2022) A multi-level methodology for behavioral comparison of software-intensive systems. In: International conference on formal methods for industrial critical systems. Springer, pp 226\u2013243","DOI":"10.1007\/978-3-031-15008-1_15"},{"issue":"10","key":"10258_CR42","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1109\/MC.2007.364","volume":"40","author":"TA Henzinger","year":"2007","unstructured":"Henzinger TA, Sifakis J (2007) The discipline of embedded systems design. Computer 40(10):32\u201340","journal-title":"Computer"},{"key":"10258_CR43","doi-asserted-by":"crossref","unstructured":"Holton JA (2007) The coding process and its challenges. The Sage handbook of grounded theory, vol 3, pp 265\u2013289","DOI":"10.4135\/9781848607941.n13"},{"key":"10258_CR44","doi-asserted-by":"crossref","unstructured":"Hooimeijer B, Geilen M, Groote JF, Hendriks D, Schiffelers R (2022) Constructive model inference: model learning for component-based software architectures. In: 17th International conference on software technologies (ICSOFT), pp 146\u2013158","DOI":"10.5220\/0011145700003266"},{"key":"10258_CR45","doi-asserted-by":"crossref","unstructured":"Jerding DF, Stasko JT, Ball T (1997) Visualizing interactions in program executions. In: ICSE, pp 360\u2013370","DOI":"10.1145\/253228.253356"},{"key":"10258_CR46","doi-asserted-by":"crossref","unstructured":"Kabinna S, Bezemer CP, Shang W, Hassan AE (2016) Logging library migrations: a case study for the apache software foundation projects. In: 2016 IEEE\/ACM 13th working conference on mining software repositories (MSR). IEEE, pp 154\u2013164","DOI":"10.1145\/2901739.2901769"},{"issue":"1","key":"10258_CR47","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1007\/s10664-017-9518-0","volume":"23","author":"S Kabinna","year":"2018","unstructured":"Kabinna S, Bezemer CP, Shang W, Syer MD, Hassan AE (2018) Examining the stability of logging statements. Empir Softw Eng 23(1):290\u2013333","journal-title":"Empir Softw Eng"},{"key":"10258_CR48","doi-asserted-by":"crossref","unstructured":"Kagdi H, Gethers M, Poshyvanyk D, Collard ML (2010) Blending conceptual and evolutionary couplings to support change impact analysis in source code. In: RE, pp 119\u2013128","DOI":"10.1109\/WCRE.2010.21"},{"key":"10258_CR49","doi-asserted-by":"crossref","unstructured":"Krka I, Brun Y, Medvidovic N (2014) Automatic mining of specifications from invocation traces and method invariants. In: ESEC\/FSE, pp 178\u2013189","DOI":"10.1145\/2635868.2635890"},{"key":"10258_CR50","doi-asserted-by":"crossref","unstructured":"Kurfess TR, Hodgson TJ (2007) Metrology, sensors and control. In: Micromanufacturing. Springer, pp 89\u2013109","DOI":"10.1007\/978-1-4020-5949-0_5"},{"key":"10258_CR51","doi-asserted-by":"crossref","unstructured":"Lee EA (2008) Cyber physical systems: design challenges. In: 2008 11th IEEE international symposium on object and component-oriented real-time distributed computing (ISORC). IEEE, pp 363\u2013369","DOI":"10.1109\/ISORC.2008.25"},{"key":"10258_CR52","doi-asserted-by":"crossref","unstructured":"Legunsen O, Hassan WU, Xu X, Ro\u015fu G, Marinov D (2016) How good are the specs? A study of the bug-finding effectiveness of existing java api specifications. In: ASE, pp 602\u2013613","DOI":"10.1145\/2970276.2970356"},{"key":"10258_CR53","doi-asserted-by":"crossref","unstructured":"Lemieux C, Park D, Beschastnikh I (2015) General ITL specification mining. In: ASE, pp 81\u201392","DOI":"10.1109\/ASE.2015.71"},{"key":"10258_CR54","doi-asserted-by":"crossref","unstructured":"Levy O, Feitelson D (2019) Understanding large-scale software\u2014a hierarchical view. In: ICPC, pp 283\u2013293","DOI":"10.1109\/ICPC.2019.00047"},{"issue":"5","key":"10258_CR55","first-page":"2655","volume":"23","author":"H Li","year":"2018","unstructured":"Li H, Chen THP, Shang W, Hassan AE (2018) Studying software logging using topic models. EMSE 23(5):2655\u20132694","journal-title":"EMSE"},{"key":"10258_CR56","doi-asserted-by":"crossref","unstructured":"Li H, Shang W, Adams B, Sayagh M, Hassan AE (2020a) A qualitative study of the benefits and costs of logging from developers\u2019 perspectives. TSE","DOI":"10.1109\/TSE.2020.2970422"},{"issue":"3","key":"10258_CR57","doi-asserted-by":"publisher","first-page":"2302","DOI":"10.1007\/s10664-019-09757-y","volume":"25","author":"S Li","year":"2020","unstructured":"Li S, Niu X, Jia Z, Liao X, Wang J, Li T (2020b) Guiding log revisions by learning from software evolution history. Empir Softw Eng 25 (3):2302\u20132340","journal-title":"Empir Softw Eng"},{"key":"10258_CR58","doi-asserted-by":"crossref","unstructured":"Lian X, Rahimi M, Cleland-Huang J, Zhang L, Ferrai R, Smith M (2016) Mining requirements knowledge from collections of domain documents. In: 2016 IEEE 24th international requirements engineering conference (RE), pp 156\u2013165","DOI":"10.1109\/RE.2016.50"},{"key":"10258_CR59","unstructured":"Liu X, Lin W, Pan A, Zhang Z (2007) WiDS checker: combating bugs in distributed systems. In: 4th Symposium on networked systems design and implementation, NSDI 2007, pp 257\u2013270"},{"key":"10258_CR60","doi-asserted-by":"crossref","unstructured":"Lo D, Maoz S (2012) Scenario-based and value-based specification mining: better together. In: ASE, vol 19, pp 423\u2013458","DOI":"10.1007\/s10515-012-0103-x"},{"key":"10258_CR61","doi-asserted-by":"crossref","unstructured":"Lo D, Mariani L, Pezz\u00e8 M (2009) Automatic steering of behavioral model inference. In: Proceedings of the 7th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering, pp 345\u2013354","DOI":"10.1145\/1595696.1595761"},{"key":"10258_CR62","doi-asserted-by":"crossref","unstructured":"Luo Q, Hariri F, Eloussi L, Marinov D (2014) An empirical analysis of flaky tests. In: FSE, pp 643\u2013653","DOI":"10.1145\/2635868.2635920"},{"key":"10258_CR63","doi-asserted-by":"crossref","unstructured":"Maoz S, Ringert JO, Rumpe B (2010) A manifesto for semantic model differencing. In: MODELS. Springer, pp 194\u2013203","DOI":"10.1007\/978-3-642-21210-9_19"},{"key":"10258_CR64","doi-asserted-by":"crossref","unstructured":"Mashhadi MJ, Hemmati H (2019) An empirical study on practicality of specification mining algorithms on a real-world application. In: ICPC, pp 65\u201369","DOI":"10.1109\/ICPC.2019.00020"},{"key":"10258_CR65","doi-asserted-by":"publisher","first-page":"20","DOI":"10.1016\/j.infsof.2019.05.002","volume":"113","author":"MJ Mashhadi","year":"2019","unstructured":"Mashhadi MJ, Siddiqui TR, Hemmati H, Loewen H (2019) Interactive semi-automated specification mining for debugging: an experience report. Inf Softw Technol 113:20\u201338","journal-title":"Inf Softw Technol"},{"key":"10258_CR66","unstructured":"Mattern F, et al. (1988) Virtual time and global states of distributed systems. Univ. Department of Computer Science"},{"key":"10258_CR67","doi-asserted-by":"crossref","unstructured":"McBurney PW, Liu C, McMillan C, Weninger T (2014) Improving topic model source code summarization. In: Proceedings of the 22nd international conference on program comprehension, pp 291\u2013294","DOI":"10.1145\/2597008.2597793"},{"key":"10258_CR68","unstructured":"Mengerink J, Schiffelers RRH, Serebrenik A, van den Brand M (2016) Dsl\/model co-evolution in industrial emf-based MDSE ecosystems. In: Mayerhofer T, Pierantonio A, Sch\u00e4tz B, Tamzalit D (eds) Proceedings of the 10th workshop on models and evolution co-located with ACM\/IEEE 19th international conference on model driven engineering languages and systems (MODELS 2016), Saint-Malo, France, October 2, 2016, CEUR-WS.org, CEUR Workshop Proceedings, vol 1706. http:\/\/ceur-ws.org\/Vol-1706\/paper1.pdf, pp 2\u20137"},{"key":"10258_CR69","doi-asserted-by":"crossref","unstructured":"Mishra D, Mishra A, Yazici A (2008) Successful requirement elicitation by combining requirement engineering techniques. In: 2008 First international conference on the applications of digital information and Web technologies (ICADIWT). IEEE, pp 258\u2013263","DOI":"10.1109\/ICADIWT.2008.4664355"},{"key":"10258_CR70","unstructured":"Noergaard T (2012) Embedded systems architecture: a comprehensive guide for engineers and programmers. Newnes"},{"key":"10258_CR71","doi-asserted-by":"crossref","unstructured":"Pandey D, Suman U, Ramani AK (2010) An effective requirement engineering process model for software development and requirements management. In: 2010 International conference on advances in recent technologies in communication and computing. IEEE, pp 287\u2013291","DOI":"10.1109\/ARTCom.2010.24"},{"key":"10258_CR72","doi-asserted-by":"crossref","unstructured":"Pecchia A, Cinque M, Carrozza G, Cotroneo D (2015) Industry practices and event logging: assessment of a critical software development process. In: ICSE (2). IEEE, pp 169\u2013178","DOI":"10.1109\/ICSE.2015.145"},{"key":"10258_CR73","doi-asserted-by":"crossref","unstructured":"Pradel M, Gross TR (2012) Leveraging test generation and specification mining for automated bug detection without false positives. In: ICSE, pp 288\u2013298","DOI":"10.1109\/ICSE.2012.6227185"},{"key":"10258_CR74","doi-asserted-by":"crossref","unstructured":"Rong G, Zhang Q, Liu X, Gu S (2017) A systematic review of logging practice in software engineering. In: 2017 24th Asia-Pacific software engineering conference (APSEC). IEEE, pp 534\u2013539","DOI":"10.1109\/APSEC.2017.61"},{"key":"10258_CR75","doi-asserted-by":"crossref","unstructured":"Rong G, Gu S, Zhang H, Shao D, Liu W (2018) How is logging practice implemented in open source software projects? A preliminary exploration. In: 2018 25th Australasian software engineering conference (ASWEC). IEEE, pp 171\u2013180","DOI":"10.1109\/ASWEC.2018.00031"},{"key":"10258_CR76","doi-asserted-by":"crossref","unstructured":"Rong G, Xu Y, Gu S, Zhang H, Shao D (2020) Can you capture information as you intend to? A case study on logging practice in industry. In: 2020 IEEE International conference on software maintenance and evolution (ICSME). IEEE, pp 12\u201322","DOI":"10.1109\/ICSME46990.2020.00012"},{"issue":"2","key":"10258_CR77","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1007\/s10664-008-9102-8","volume":"14","author":"P Runeson","year":"2009","unstructured":"Runeson P, H\u00f6st M (2009) Guidelines for conducting and reporting case study research in software engineering. Empir Softw Eng 14(2):131","journal-title":"Empir Softw Eng"},{"key":"10258_CR78","doi-asserted-by":"crossref","unstructured":"Said W, Quante J, Koschke R (2018) Towards interactive mining of understandable state machine models from embedded software. In: MODELSWARD, pp 117\u2013128","DOI":"10.5220\/0006593501170128"},{"issue":"4","key":"10258_CR79","doi-asserted-by":"publisher","first-page":"557","DOI":"10.1109\/32.799955","volume":"25","author":"CB Seaman","year":"1999","unstructured":"Seaman CB (1999) Qualitative methods in empirical studies of software engineering. IEEE Trans Softw Eng 25(4):557\u2013572","journal-title":"IEEE Trans Softw Eng"},{"issue":"3","key":"10258_CR80","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1287\/isre.6.3.286","volume":"6","author":"TM Shaft","year":"1995","unstructured":"Shaft TM, Vessey I (1995) The relevance of application domain knowledge: the case of computer program comprehension. ISR 6(3):286\u2013299","journal-title":"ISR"},{"key":"10258_CR81","doi-asserted-by":"crossref","unstructured":"Shang W, Nagappan M, Hassan AE, Jiang ZM (2014) Understanding log lines using development knowledge. In: ICSME, pp 21\u201330","DOI":"10.1109\/ICSME.2014.24"},{"issue":"2","key":"10258_CR82","doi-asserted-by":"publisher","first-page":"211","DOI":"10.1007\/s10664-008-9060-1","volume":"13","author":"FJ Shull","year":"2008","unstructured":"Shull FJ, Carver JC, Vegas S, Juristo N (2008) The role of replications in empirical software engineering. Empir Softw Eng 13(2):211\u2013218","journal-title":"Empir Softw Eng"},{"key":"10258_CR83","unstructured":"Silva E, Freitas EP, Wagner FR, Carvalho FC, Pereira CE (2006) Java framework for distributed real-time embedded systems. In: 9th IEEE international symposium on object and component-oriented real-time distributed computing (ISORC\u201906). IEEE, p 8"},{"key":"10258_CR84","unstructured":"Splunk (2005) http:\/\/www.splunk.com"},{"issue":"5","key":"10258_CR85","doi-asserted-by":"publisher","first-page":"4097","DOI":"10.1007\/s10664-020-09858-z","volume":"25","author":"MA Storey","year":"2020","unstructured":"Storey MA, Ernst NA, Williams C, Kalliamvakou E (2020) The who, what, how of software engineering research: a socio-technical framework. Empir Softw Eng 25(5):4097\u20134129","journal-title":"Empir Softw Eng"},{"key":"10258_CR86","doi-asserted-by":"publisher","first-page":"46434","DOI":"10.1109\/ACCESS.2019.2909093","volume":"7","author":"PE Strandberg","year":"2019","unstructured":"Strandberg PE, Enoiu EP, Afzal W, Sundmark D, Feldt R (2019) Information flow in software testing\u2014an interview study with embedded software engineering practitioners. IEEE Access 7:46434\u201346453","journal-title":"IEEE Access"},{"key":"10258_CR87","unstructured":"Strauss A, Corbin JM (1997) Grounded theory in practice. Sage"},{"key":"10258_CR88","unstructured":"Tan L, Bockisch C (2019) A survey of refactoring detection tools. In: EMLS, pp 100\u2013105"},{"issue":"3-4","key":"10258_CR89","doi-asserted-by":"publisher","first-page":"387","DOI":"10.3233\/FI-2009-136","volume":"94","author":"JMEM van der Werf","year":"2009","unstructured":"van der Werf JMEM, van Dongen BF, Hurkens CAJ, Serebrenik A (2009) Process Discovery using Integer Linear Programming. Fundam Inform 94 (3-4):387\u2013412","journal-title":"Fundam Inform"},{"key":"10258_CR90","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1016\/j.jss.2015.08.026","volume":"110","author":"B Vogel-Heuser","year":"2015","unstructured":"Vogel-Heuser B, Fay A, Schaefer I, Tichy M (2015) Evolution of software in automated production systems: challenges and research directions. J Syst Softw 110:54\u201384","journal-title":"J Syst Softw"},{"issue":"3","key":"10258_CR91","doi-asserted-by":"publisher","first-page":"811","DOI":"10.1007\/s10664-015-9367-7","volume":"21","author":"N Walkinshaw","year":"2016","unstructured":"Walkinshaw N, Taylor R, Derrick J (2016) Inferring extended finite state machine models from software executions. Empir Softw Eng 21(3):811\u2013853","journal-title":"Empir Softw Eng"},{"key":"10258_CR92","doi-asserted-by":"crossref","unstructured":"Yang N, Aslam K, Schiffelers R, Lensink L, Hendriks D, Cleophas L, Serebrenik A (2019) Improving model inference in industry by combining active and passive learning. In: SANER, pp 253\u2013263","DOI":"10.1109\/SANER.2019.8668007"},{"key":"10258_CR93","doi-asserted-by":"publisher","unstructured":"Yang N, Cuijpers PJL, Schiffelers RRH, Lukkien J, Serebrenik A (2021) An interview study of how developers use execution logs in embedded software engineering. In: 43rd IEEE\/ACM International conference on software engineering: software engineering in practice, ICSE (SEIP) 2021, Madrid, Spain, May 25\u201328, 2021. https:\/\/doi.org\/10.1109\/ICSE-SEIP52600.2021.00015. IEEE, pp 61\u201370","DOI":"10.1109\/ICSE-SEIP52600.2021.00015"},{"key":"10258_CR94","doi-asserted-by":"crossref","unstructured":"Ye X, Bunescu R, Liu C (2014) Learning to rank relevant files for bug reports using domain knowledge. In: Proceedings of the 22nd ACM SIGSOFT international symposium on foundations of software engineering, pp 689\u2013699","DOI":"10.1145\/2635868.2635874"},{"key":"10258_CR95","doi-asserted-by":"crossref","unstructured":"Yuan D, Park S, Zhou Y (2012) Characterizing logging practices in open-source software. In: 2012 34th International conference on software engineering (ICSE). IEEE, pp 102\u2013112","DOI":"10.1109\/ICSE.2012.6227202"},{"key":"10258_CR96","doi-asserted-by":"crossref","unstructured":"Zaidman A, Demeyer S (2004) Managing trace data volume through a heuristical clustering process based on event execution frequency. In: CSMR, pp 329\u2013338","DOI":"10.1109\/CSMR.2004.1281435"},{"issue":"3","key":"10258_CR97","doi-asserted-by":"publisher","first-page":"325","DOI":"10.1007\/s10664-010-9143-7","volume":"16","author":"A Zaidman","year":"2011","unstructured":"Zaidman A, Van Rompaey B, van Deursen A, Demeyer S (2011) Studying the co-evolution of production and test code in open source and industrial developer test processes through repository mining. Empir Softw Eng 16(3):325\u2013364","journal-title":"Empir Softw Eng"},{"issue":"6","key":"10258_CR98","doi-asserted-by":"publisher","first-page":"3394","DOI":"10.1007\/s10664-019-09687-9","volume":"24","author":"Y Zeng","year":"2019","unstructured":"Zeng Y, Chen J, Shang W, Chen THP (2019) Studying the characteristics of logging practices in mobile apps: a case study on f-droid. Empir Softw Eng 24(6):3394\u20133434","journal-title":"Empir Softw Eng"},{"key":"10258_CR99","doi-asserted-by":"crossref","unstructured":"Zhu J, He P, Fu Q, Zhang H, Lyu MR, Zhang D (2015) Learning to log: helping developers make informed logging decisions. In: 2015 IEEE\/ACM 37th IEEE international conference on software engineering, vol 1. IEEE, pp 415\u2013425","DOI":"10.1109\/ICSE.2015.60"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-022-10258-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-022-10258-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-022-10258-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,4,3]],"date-time":"2023-04-03T07:03:24Z","timestamp":1680505404000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-022-10258-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,2,11]]},"references-count":99,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,3]]}},"alternative-id":["10258"],"URL":"https:\/\/doi.org\/10.1007\/s10664-022-10258-8","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,2,11]]},"assertion":[{"value":"2 November 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 February 2023","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no conflicts of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"<!--Emphasis Type='Bold' removed-->Conflict of Interest"}}],"article-number":"43"}}