{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T13:16:57Z","timestamp":1778591817492,"version":"3.51.4"},"reference-count":73,"publisher":"Elsevier BV","license":[{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-017"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-012"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2026,8,1]],"date-time":"2026-08-01T00:00:00Z","timestamp":1785542400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-004"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2024YFB4505904"],"award-info":[{"award-number":["2024YFB4505904"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100021171","name":"Basic and Applied Basic Research Foundation of Guangdong Province","doi-asserted-by":"publisher","award":["2023B1515020054"],"award-info":[{"award-number":["2023B1515020054"]}],"id":[{"id":"10.13039\/501100021171","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62272495"],"award-info":[{"award-number":["62272495"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2026,8]]},"DOI":"10.1016\/j.jss.2026.112854","type":"journal-article","created":{"date-parts":[[2026,3,26]],"date-time":"2026-03-26T17:13:37Z","timestamp":1774545217000},"page":"112854","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":0,"special_numbering":"C","title":["Logfun: An efficient function-Level log management framework for systems implemented with python"],"prefix":"10.1016","volume":"238","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-0049-361X","authenticated-orcid":false,"given":"Min","family":"Li","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0009-0008-6580-1470","authenticated-orcid":false,"given":"Gou","family":"Tan","sequence":"additional","affiliation":[]},{"given":"Mingdong","family":"He","sequence":"additional","affiliation":[]},{"given":"Guangba","family":"Yu","sequence":"additional","affiliation":[]},{"given":"Pengfei","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Chuanfu","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jss.2026.112854_bib0001","unstructured":"7za, 2024. 7za. https:\/\/linux.die.net\/man\/1\/7za."},{"key":"10.1016\/j.jss.2026.112854_bib0002","unstructured":"Anyscale, 2025. Ray. https:\/\/www.ray.io\/."},{"key":"10.1016\/j.jss.2026.112854_bib0003","unstructured":"Apache, 2025. Log4j. https:\/\/logging.apache.org\/log4j\/2.x\/."},{"key":"10.1016\/j.jss.2026.112854_bib0004","unstructured":"apache, 2025. openwhisk. https:\/\/openwhisk.apache.org\/."},{"issue":"4","key":"10.1016\/j.jss.2026.112854_bib0005","doi-asserted-by":"crossref","first-page":"103","DOI":"10.1007\/s10664-024-10452-w","article-title":"A literature review and existing challenges on software logging practices: from the creation to the analysis of software logs","volume":"29","author":"Batoun","year":"2024","journal-title":"Empiric. Softw. Eng."},{"key":"10.1016\/j.jss.2026.112854_bib0006","doi-asserted-by":"crossref","DOI":"10.7717\/peerj-cs.489","article-title":"Log-based software monitoring: a systematic mapping study","volume":"7","author":"C\u00e2ndido","year":"2021","journal-title":"PeerJ Comput. Sci."},{"issue":"4","key":"10.1016\/j.jss.2026.112854_bib0007","doi-asserted-by":"crossref","first-page":"2285","DOI":"10.1007\/s10664-019-09690-0","article-title":"Extracting and studying the logging-code-issue-introducing changes in java-based large-scale open source software systems","volume":"24","author":"Chen","year":"2019","journal-title":"Empir. Softw. Eng."},{"key":"10.1016\/j.jss.2026.112854_bib0008","series-title":"Proceedings of the 22Nd Acm Sigkdd International Conference on Knowledge Discovery and Data Mining","first-page":"785","article-title":"Xgboost: a scalable tree boosting system","author":"Chen","year":"2016"},{"key":"10.1016\/j.jss.2026.112854_bib0009","series-title":"Proceedings of the Conference on Research in Adaptive and Convergent Systems","first-page":"161","article-title":"Outlier detection using isolation forest and local outlier factor","author":"Cheng","year":"2019"},{"key":"10.1016\/j.jss.2026.112854_bib0010","unstructured":"cyberw, 2024. locust. https:\/\/docs.locust.io\/."},{"issue":"3","key":"10.1016\/j.jss.2026.112854_bib0011","first-page":"879","article-title":"Logram: efficient log parsing using n n-gram dictionaries","volume":"48","author":"Dai","year":"2020","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.jss.2026.112854_bib0012","unstructured":"danieldk, 2024. text-generation-inference. https:\/\/github.com\/huggingface\/text-generation-inference."},{"key":"10.1016\/j.jss.2026.112854_bib0013","unstructured":"Delgan, 2025. loguru. https:\/\/github.com\/Delgan\/loguru."},{"key":"10.1016\/j.jss.2026.112854_bib0014","series-title":"30Th USENIX Security Symposium (USENIX Security 21)","first-page":"3023","article-title":"{ELISE}: A storage efficient logging system powered by redundancy reduction and representation learning","author":"Ding","year":"2021"},{"key":"10.1016\/j.jss.2026.112854_bib0015","series-title":"2016\u202fIEEE 16Th International Conference on Data Mining (ICDM)","first-page":"859","article-title":"Spell: streaming parsing of system event logs","author":"Du","year":"2016"},{"issue":"3","key":"10.1016\/j.jss.2026.112854_bib0016","doi-asserted-by":"crossref","DOI":"10.1016\/j.ipm.2021.102540","article-title":"Qllog: a log anomaly detection method based on q-learning algorithm","volume":"58","author":"Duan","year":"2021","journal-title":"Inf. Process. Manag."},{"key":"10.1016\/j.jss.2026.112854_bib0017","unstructured":"elasticsearch, 2025. elasticsearch. https:\/\/www.elastic.co\/."},{"key":"10.1016\/j.jss.2026.112854_bib0018","series-title":"Int. Conf. Knowledge Discovery and Data Mining","first-page":"6","article-title":"Density-based spatial clustering of applications with noise","volume":"Vol. 240","author":"Ester","year":"1996"},{"key":"10.1016\/j.jss.2026.112854_bib0019","series-title":"Companion Proceedings of the 36Th International Conference on Software Engineering","first-page":"24","article-title":"Where do developers log? an empirical study on logging practices in industry","author":"Fu","year":"2014"},{"key":"10.1016\/j.jss.2026.112854_bib0020","unstructured":"G3log, 2025. G3log. https:\/\/kjellkod.github.io\/g3log\/."},{"key":"10.1016\/j.jss.2026.112854_bib0021","unstructured":"getlogbook, 2024. Logbook. https:\/\/logbook.readthedocs.io\/en\/stable."},{"key":"10.1016\/j.jss.2026.112854_bib0022","series-title":"Entropy and information theory","author":"Gray","year":"2011"},{"key":"10.1016\/j.jss.2026.112854_bib0023","series-title":"2021 International Joint Conference on Neural Networks (IJCNN)","first-page":"1","article-title":"Logbert: log anomaly detection via bert","author":"Guo","year":"2021"},{"key":"10.1016\/j.jss.2026.112854_bib0024","unstructured":"gzip, 2024. gzip. https:\/\/www.gzip.org\/."},{"key":"10.1016\/j.jss.2026.112854_bib0025","series-title":"International Conference on Software Business","first-page":"456","article-title":"Understanding cost dynamics of serverless computing: an empirical study","author":"Hamza","year":"2023"},{"key":"10.1016\/j.jss.2026.112854_bib0026","series-title":"2017\u202fIEEE International Conference on Web Services (ICWS)","first-page":"33","article-title":"Drain: an online log parsing approach with fixed depth tree","author":"He","year":"2017"},{"issue":"4","key":"10.1016\/j.jss.2026.112854_bib0027","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1109\/5254.708428","article-title":"Support vector machines","volume":"13","author":"Hearst","year":"1998","journal-title":"IEEE Intell. Syst. Appl."},{"key":"10.1016\/j.jss.2026.112854_bib0028","unstructured":"hynek, 2024. Structlog. https:\/\/betterstack.com\/community\/guides\/logging\/structlog."},{"key":"10.1016\/j.jss.2026.112854_bib0029","unstructured":"itamarst, 2024. Eliot. https:\/\/github.com\/itamarst\/eliot."},{"key":"10.1016\/j.jss.2026.112854_bib0030","series-title":"Proceedings of the 28Th ACM SIGKDD Conference on Knowledge Discovery and Data Mining","first-page":"3081","article-title":"Augmenting log-based anomaly detection models to reduce false anomalies with human feedback","author":"Jia","year":"2022"},{"key":"10.1016\/j.jss.2026.112854_bib0031","series-title":"Proceedings of the ACM SIGOPS 28Th Symposium on Operating Systems Principles","first-page":"691","article-title":"Boki: stateful serverless computing with shared logs","author":"Jia","year":"2021"},{"key":"10.1016\/j.jss.2026.112854_bib0032","series-title":"Proceedings of the 33Rd ACM SIGSOFT International Symposium on Software Testing and Analysis","first-page":"223","article-title":"A large-scale evaluation for log parsing techniques: how far are we?","author":"Jiang","year":"2024"},{"key":"10.1016\/j.jss.2026.112854_bib0033","series-title":"2008 The Eighth International Conference on Quality Software","first-page":"181","article-title":"Abstracting execution logs to execution events for enterprise applications (short paper)","author":"Jiang","year":"2008"},{"key":"10.1016\/j.jss.2026.112854_bib0034","series-title":"2019\u202fIEEE 12Th International Conference on Cloud Computing (CLOUD)","first-page":"502","article-title":"Functionbench: a suite of workloads for serverless cloud function service","author":"Kim","year":"2019"},{"key":"10.1016\/j.jss.2026.112854_bib0035","unstructured":"kmaork, 2024. pyinjector. https:\/\/github.com\/kmaork\/pyinjector."},{"key":"10.1016\/j.jss.2026.112854_bib0036","unstructured":"Kubernetes, 2025. Kubernetes. https:\/\/kubernetes.io\/."},{"key":"10.1016\/j.jss.2026.112854_bib0037","article-title":"Deep learning for anomaly detection in log data: a survey","volume":"12","author":"Landauer","year":"2023","journal-title":"Mach. Learn. Appl."},{"key":"10.1016\/j.jss.2026.112854_bib0038","unstructured":"Le, V.-H., et al., 2023. Log parsing with prompt-based few-shot learning. arXiv preprint arXiv: 2302.07435."},{"issue":"12","key":"10.1016\/j.jss.2026.112854_bib0039","doi-asserted-by":"crossref","first-page":"2858","DOI":"10.1109\/TSE.2020.2970422","article-title":"A qualitative study of the benefits and costs of logging from developers\u2019 perspectives","volume":"47","author":"Li","year":"2020","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.jss.2026.112854_bib0040","series-title":"Proceedings of the 46Th IEEE\/ACM International Conference on Software Engineering","first-page":"1","article-title":"Logshrink: effective log compression by leveraging commonality and variability of log data","author":"Li","year":"2024"},{"issue":"3","key":"10.1016\/j.jss.2026.112854_bib0041","first-page":"18","article-title":"Classification and regression by randomforest","volume":"2","author":"Liaw","year":"2002","journal-title":"R News"},{"key":"10.1016\/j.jss.2026.112854_bib0042","series-title":"2019 34Th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","first-page":"863","article-title":"Logzip: extracting hidden structures via iterative clustering for log compression","author":"Liu","year":"2019"},{"key":"10.1016\/j.jss.2026.112854_bib0043","unstructured":"Log4cpp, 2023. Log4cpp. https:\/\/log4cpp.sourceforge.net\/."},{"key":"10.1016\/j.jss.2026.112854_bib0044","unstructured":"LogFun, 2025. Logfun. https:\/\/github.com\/limin5120\/LogFun."},{"key":"10.1016\/j.jss.2026.112854_bib0045","unstructured":"Logging, 2025. Logging. https:\/\/docs.python.org\/3.13\/library\/logging.html."},{"key":"10.1016\/j.jss.2026.112854_bib0046","series-title":"Proceedings of the 15Th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining","first-page":"1255","article-title":"Clustering event logs using iterative partitioning","author":"Makanju","year":"2009"},{"key":"10.1016\/j.jss.2026.112854_bib0047","series-title":"Advances in Information Retrieval: 43rd European Conference on IR Research, ECIR 2021, Virtual Event, March 28\u2013April 1, 2021, Proceedings, Part II 43","first-page":"525","article-title":"LogUI: contemporary logging infrastructure for web-based experiments","author":"Maxwell","year":"2021"},{"key":"10.1016\/j.jss.2026.112854_bib0048","unstructured":"microsoft, 2024a. Deepspeed-MII. https:\/\/github.com\/microsoft\/DeepSpeed-MII."},{"key":"10.1016\/j.jss.2026.112854_bib0049","unstructured":"microsoft, 2024b. Picologging. https:\/\/github.com\/microsoft\/picologging."},{"key":"10.1016\/j.jss.2026.112854_bib0050","unstructured":"OpenNMT, 2024. Ctranslate2. https:\/\/github.com\/OpenNMT\/CTranslate2."},{"key":"10.1016\/j.jss.2026.112854_bib0051","unstructured":"Pantheios, 2025. Pantheios. http:\/\/www.pantheios.org\/."},{"key":"10.1016\/j.jss.2026.112854_bib0052","series-title":"15Th {USENIX} Symposium on Operating Systems Design and Implementation ({OSDI} 21)","first-page":"183","article-title":"{CLP}: Efficient and scalable search on compressed text logs","author":"Rodrigues","year":"2021"},{"key":"10.1016\/j.jss.2026.112854_bib0053","unstructured":"Savvov, S., 2024. Frameworks for serving LLMs. https:\/\/betterprogramming.pub\/frameworks-for-serving-llms-60b7f7b23407."},{"key":"10.1016\/j.jss.2026.112854_bib0054","article-title":"Length matters: clustering system log messages using length of words","volume":"abs\/1611.03213","author":"Shima","year":"2016","journal-title":"CoRR"},{"key":"10.1016\/j.jss.2026.112854_bib0055","unstructured":"(Switzerland), Q. c. S., 2025. Logback. https:\/\/logback.qos.ch\/."},{"key":"10.1016\/j.jss.2026.112854_bib0056","series-title":"Proceedings of the Eighteenth European Conference on Computer Systems","first-page":"452","article-title":"Loggrep: fast and cheap cloud log storage by exploiting both static and runtime patterns","author":"Wei","year":"2023"},{"key":"10.1016\/j.jss.2026.112854_bib0057","series-title":"19Th USENIX Conference on File and Storage Technologies (FAST 21)","first-page":"249","article-title":"On the feasibility of parser-based log compression in {Large-Scale} cloud systems","author":"Wei","year":"2021"},{"key":"10.1016\/j.jss.2026.112854_bib0058","series-title":"Proceedings of the IEEE\/ACM 46Th International Conference on Software Engineering","first-page":"1","article-title":"Divlog: log parsing with prompt enhanced in-context learning","author":"Xu","year":"2024"},{"key":"10.1016\/j.jss.2026.112854_bib0059","series-title":"Proceedings of the ACM SIGOPS 22Nd Symposium on Operating Systems Principles","first-page":"117","article-title":"Detecting large-scale system problems by mining console logs","author":"Xu","year":"2009"},{"key":"10.1016\/j.jss.2026.112854_bib0060","series-title":"NanoLog: A Nanosecond Scale Logging System","author":"Yang","year":"2020"},{"issue":"1","key":"10.1016\/j.jss.2026.112854_bib0061","doi-asserted-by":"crossref","first-page":"488","DOI":"10.1007\/s10664-019-09748-z","article-title":"Log4perf: suggesting and updating logging locations for web-based systems\u2019 performance monitoring","volume":"25","author":"Yao","year":"2020","journal-title":"Empir. Softw. Eng."},{"key":"10.1016\/j.jss.2026.112854_bib0062","doi-asserted-by":"crossref","first-page":"3043","DOI":"10.1007\/s10664-020-09822-x","article-title":"A study of the performance of general compressors on log files","volume":"25","author":"Yao","year":"2020","journal-title":"Empir. Softw. Eng."},{"issue":"8","key":"10.1016\/j.jss.2026.112854_bib0063","doi-asserted-by":"crossref","first-page":"2748","DOI":"10.1109\/TSE.2021.3069958","article-title":"Improving state-of-the-art compression techniques for log management tools","volume":"48","author":"Yao","year":"2021","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/j.jss.2026.112854_bib0064","series-title":"45Th IEEE\/ACM International Conference on Software Engineering, ICSE 2023, Melbourne, Australia, May 14\u201320, 2023","first-page":"1763","article-title":"Logreducer: identify and reduce log hotspots in kernel on the fly","author":"Yu","year":"2023"},{"key":"10.1016\/j.jss.2026.112854_bib0065","series-title":"2023\u202fIEEE\/ACM 45Th International Conference on Software Engineering (ICSE)","first-page":"1763","article-title":"Logreducer: identify and reduce log hotspots in kernel on the fly","author":"Yu","year":"2023"},{"key":"10.1016\/j.jss.2026.112854_bib0066","series-title":"Proceedings of the 31St ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC\/FSE 2023, San Francisco, CA, USA, December 3\u20139, 2023","first-page":"553","article-title":"Nezha: interpretable fine-grained root causes analysis for microservices on multi-modal observability data","author":"Yu","year":"2023"},{"issue":"5","key":"10.1016\/j.jss.2026.112854_bib0067","doi-asserted-by":"crossref","first-page":"3332","DOI":"10.1109\/TSC.2023.3274769","article-title":"FaaSDeliver: cost-efficient and qos-aware function delivery in computing continuum","volume":"16","author":"Yu","year":"2023","journal-title":"IEEE Trans. Serv. Comput."},{"issue":"5","key":"10.1016\/j.jss.2026.112854_bib0068","doi-asserted-by":"crossref","first-page":"3224","DOI":"10.1109\/TSC.2023.3270566","article-title":"Brain: log parsing with bidirectional parallel tree","volume":"16","author":"Yu","year":"2023","journal-title":"IEEE Trans. Serv. Comput."},{"key":"10.1016\/j.jss.2026.112854_bib0069","series-title":"Proceedings of the 11Th ACM Symposium on Cloud Computing","first-page":"30","article-title":"Characterizing serverless platforms with serverlessbench","author":"Yu","year":"2020"},{"key":"10.1016\/j.jss.2026.112854_bib0070","series-title":"Proceedings of the Fifteenth International Conference on Architectural Support for Programming Languages and Operating Systems","first-page":"143","article-title":"Sherlog: error diagnosis by connecting clues from run-time logs","author":"Yuan","year":"2010"},{"key":"10.1016\/j.jss.2026.112854_bib0071","article-title":"System log parsing: a survey","author":"Zhang","year":"2023","journal-title":"IEEE Trans. Knowl. Data Eng"},{"key":"10.1016\/j.jss.2026.112854_bib0072","series-title":"International Conference on Knowledge Science, Engineering and Management","first-page":"222","article-title":"Logattn: unsupervised log anomaly detection with an autoencoder based attention mechanism","author":"Zhang","year":"2021"},{"key":"10.1016\/j.jss.2026.112854_bib0073","series-title":"2019\u202fIEEE\/ACM 41St International Conference on Software Engineering: Software Engineering in Practice (ICSE-SEIP)","first-page":"121","article-title":"Tools and benchmarks for automated log parsing","author":"Zhu","year":"2019"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121226000889?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121226000889?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2026,5,12]],"date-time":"2026-05-12T12:58:26Z","timestamp":1778590706000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121226000889"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,8]]},"references-count":73,"alternative-id":["S0164121226000889"],"URL":"https:\/\/doi.org\/10.1016\/j.jss.2026.112854","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[2026,8]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Logfun: An efficient function-Level log management framework for systems implemented with python","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems and Software","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jss.2026.112854","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"\u00a9 2026 Elsevier Inc. All rights are reserved, including those for text and data mining, AI training, and similar technologies.","name":"copyright","label":"Copyright"}],"article-number":"112854"}}