{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,7]],"date-time":"2026-03-07T17:59:32Z","timestamp":1772906372714,"version":"3.50.1"},"reference-count":28,"publisher":"Springer Science and Business Media LLC","issue":"5","license":[{"start":{"date-parts":[[2016,9,1]],"date-time":"2016-09-01T00:00:00Z","timestamp":1472688000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2016,9]]},"DOI":"10.1007\/s11390-016-1678-7","type":"journal-article","created":{"date-parts":[[2016,9,5]],"date-time":"2016-09-05T06:14:38Z","timestamp":1473056078000},"page":"1038-1052","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":49,"title":["UiLog: Improving Log-Based Fault Diagnosis by Log Analysis"],"prefix":"10.1007","volume":"31","author":[{"given":"De-Qing","family":"Zou","sequence":"first","affiliation":[]},{"given":"Hao","family":"Qin","sequence":"additional","affiliation":[]},{"given":"Hai","family":"Jin","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,9]]},"reference":[{"key":"1678_CR1","doi-asserted-by":"crossref","unstructured":"Zawoad S, Dutta A K, Hasan R. SecLaaS: Secure logging-as-a-service for cloud forensics. In Proc. the 8th ACM SIGSAC Symposium on Information, Computer and Communications Security, May 2013, pp.219-230.","DOI":"10.1145\/2484313.2484342"},{"key":"1678_CR2","doi-asserted-by":"crossref","unstructured":"Rao X, Wang H, Shi D et al. Identifying faults in large-scale distributed systems by filtering noisy error logs. In Proc. the IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops, June 2011, pp.140-145.","DOI":"10.1109\/DSNW.2011.5958800"},{"key":"1678_CR3","doi-asserted-by":"crossref","unstructured":"Yuan D, Mai H, Xiong W et al. SherLog: Error diagnosis by connecting clues from run-time logs. ACM SIGARCH Computer Architecture News, 2010, 38(1): 143-154.","DOI":"10.1145\/1735970.1736038"},{"key":"1678_CR4","doi-asserted-by":"crossref","unstructured":"Fu Q, Lou J G, Wang Y et al. Execution anomaly detection in distributed systems through unstructured log analysis. In Proc. the 9th IEEE International Conference on Data Mining, December 2009, pp.149-158.","DOI":"10.1109\/ICDM.2009.60"},{"key":"1678_CR5","doi-asserted-by":"crossref","unstructured":"Xu W, Huang L, Fox A et al. Detecting large-scale system problems by mining console logs. In Proc. the 22nd ACM Symposium on Operating Systems Principles, October 2009, pp.117-132.","DOI":"10.1145\/1629575.1629587"},{"key":"1678_CR6","doi-asserted-by":"crossref","unstructured":"Hansen J P, Siewiorek D P. Models for time coalescence in event logs. In Proc. the 22nd IEEE International Symposium on Fault-Tolerant Computing, July 1992, pp.221-227.","DOI":"10.1109\/FTCS.1992.243597"},{"key":"1678_CR7","doi-asserted-by":"crossref","unstructured":"Mi H B, Wang H M, Zhou Y F et al. Localizing root causes of performance anomalies in cloud computing systems by analyzing request trace logs. Science China (Information Sciences), 2012, 55(12): 2757-2773.","DOI":"10.1007\/s11432-012-4747-8"},{"key":"1678_CR8","unstructured":"Prewett J E, James E. Listening to your cluster with LoGS. In Proc. the 5th LCI International Conference on Linux Clusters: The HPC Revolution, May 2004."},{"key":"1678_CR9","doi-asserted-by":"crossref","unstructured":"Jain S, Singh I, Chandra A et al. Extracting the textual and temporal structure of supercomputing logs. In Proc. the 16th IEEE International Conference on High Performance Computing, December 2009, pp.254-263.","DOI":"10.1109\/HIPC.2009.5433202"},{"key":"1678_CR10","doi-asserted-by":"crossref","unstructured":"Takada T, Koike H. Tudumi: Information visualization system for monitoring and auditing computer logs. In Proc. the International Conference on Information Visualization, July 2002, pp.570-576.","DOI":"10.1109\/IV.2002.1028831"},{"key":"1678_CR11","doi-asserted-by":"crossref","unstructured":"Vaarandi R. A data clustering algorithm for mining patterns from event logs. In Proc. the 3rd IEEE Workshop on IP Operations and Management, October 2003, pp.119-126.","DOI":"10.1109\/IPOM.2003.1251233"},{"key":"1678_CR12","doi-asserted-by":"crossref","unstructured":"Bellec J H, Kechadi T M. Cufres: Clustering using fuzzy representative events selection for the fault recognition problem in telecommunication networks. In Proc. the 1st ACM Ph.D. Workshop on Information and Knowledge Management, November 2007, pp.55-62.","DOI":"10.1145\/1316874.1316884"},{"key":"1678_CR13","doi-asserted-by":"crossref","unstructured":"Ganapathi A, Patterson D. Crash data collection: A windows case study. In Proc. the IEEE\/IFIP International Conference on Dependable Systems and Networks, June 28-July 1, 2005, pp.280-285.","DOI":"10.1109\/DSN.2005.32"},{"key":"1678_CR14","doi-asserted-by":"crossref","unstructured":"Pecchia A, Cotroneo D, Kalbarczyk Z et al. Improving log-based field failure data analysis of multi-node computing systems. In Proc. the IEEE\/IFIP International Conference on Dependable Systems and Networks, June 2011, pp.97-108.","DOI":"10.1109\/DSN.2011.5958210"},{"key":"1678_CR15","doi-asserted-by":"crossref","unstructured":"Stearley J, Oliner A J. Bad words: Finding faults in Spirit\u2019s syslogs. In Proc. the IEEE International Symposium on Cluster Computing and the Grid, May 2008, pp.765-770.","DOI":"10.1109\/CCGRID.2008.107"},{"key":"1678_CR16","doi-asserted-by":"crossref","unstructured":"Stearley J. Towards informatic analysis of Syslogs. In Proc. the IEEE International Conference on Cluster Computing, September 2004, pp.309-318.","DOI":"10.1109\/CLUSTR.2004.1392628"},{"key":"1678_CR17","unstructured":"Xu W, Huang L, Fox A et al. Mining console logs for large-scale system problem detection. In Proc. the IEEE Conference on Tackling Computer Systems Problems with Machine Learning Techniques, December 2008."},{"key":"1678_CR18","unstructured":"Salfner F, Tschirpke S. Error log processing for accurate failure prediction. In Proc. the 1st USENIX Workshop on Analysis of System Logs, December 2008, p.4."},{"key":"1678_CR19","doi-asserted-by":"crossref","unstructured":"Wen X, Zhang X, Zhu Y. Design of fault detection observer based on Hyper Basis Function. Tsinghua Science and Technology, 2015, 20(2): 200-204.","DOI":"10.1109\/TST.2015.7085633"},{"key":"1678_CR20","doi-asserted-by":"crossref","unstructured":"Park J, Yoo G, Lee E. Proactive self-healing system based on multi-agent technologies. In Proc. the ACIS International Conference on Software Engineering Research, Management and Applications, August 2005, pp.256-263.","DOI":"10.1109\/SERA.2005.55"},{"key":"1678_CR21","doi-asserted-by":"crossref","unstructured":"Li T, Liang F, Ma S et al. An integrated framework on mining logs files for computing system management. In Proc. the 11th ACM International Conference on Knowledge Discovery in Data Mining, August 2005, pp.776-781.","DOI":"10.1145\/1081870.1081972"},{"key":"1678_CR22","doi-asserted-by":"crossref","unstructured":"Vaarandi R. A breadth-first algorithm for mining frequent patterns from event logs. In Proc. Intelligence in Communication Systems, November 2004, pp.293-308.","DOI":"10.1007\/978-3-540-30179-0_27"},{"key":"1678_CR23","doi-asserted-by":"crossref","unstructured":"Oliner A, Stearley J. What supercomputers say: A study of five system logs. In Proc. the 37th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, June 2007, pp.575-584.","DOI":"10.1109\/DSN.2007.103"},{"key":"1678_CR24","doi-asserted-by":"crossref","unstructured":"Simache C, Ka\u00e2niche M, Sa\u00a8\u0131dane A. Event log based dependability analysis of Windows NT and 2K systems. In Proc. the Pacific Rim International Symposium on Dependable Computing, December 2002, pp.311-315.","DOI":"10.1109\/PRDC.2002.1185651"},{"key":"1678_CR25","unstructured":"Ester M, Kriegel H P, Sander J et al. A density-based algorithm for discovering clusters in large spatial databases with noise. In Proc. the 2nd ACM International Conference on Knowledge Discovery and Data Mining, August 1996, pp.226-231."},{"key":"1678_CR26","unstructured":"Levenshtein V I. Binary codes capable of correcting deletions, insertions and reversals. Journal of Soviet Physics Doklady, 1966, 10: 707-711."},{"key":"1678_CR27","unstructured":"Tsao M M, Siewiorek D P. Trend analysis on system error files. In Proc. the IEEE International Symposium on Fault-Tolerant Computing, June 1983, pp.116-119."},{"key":"1678_CR28","doi-asserted-by":"crossref","unstructured":"Fu S, Xu C Z. Exploring event correlation for failure prediction in coalitions of clusters. In Proc. the ACM\/IEEE Conference on High Performance Networking and Computing, November 2007.","DOI":"10.1145\/1362622.1362678"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-016-1678-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-016-1678-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-016-1678-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,10]],"date-time":"2025-06-10T16:48:56Z","timestamp":1749574136000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-016-1678-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9]]},"references-count":28,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2016,9]]}},"alternative-id":["1678"],"URL":"https:\/\/doi.org\/10.1007\/s11390-016-1678-7","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"value":"1000-9000","type":"print"},{"value":"1860-4749","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,9]]}}}