{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T06:42:33Z","timestamp":1770273753230,"version":"3.49.0"},"reference-count":39,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,3]]},"DOI":"10.1109\/saner.2018.8330197","type":"proceedings-article","created":{"date-parts":[[2018,4,6]],"date-time":"2018-04-06T00:41:53Z","timestamp":1522975313000},"page":"61-71","source":"Crossref","is-referenced-by-count":31,"title":["SMARTLOG: Place error log statement by deep understanding of log intention"],"prefix":"10.1109","author":[{"given":"Zhouyang","family":"Jia","sequence":"first","affiliation":[]},{"given":"Shanshan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Xiaodong","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Xiangke","family":"Liao","sequence":"additional","affiliation":[]},{"given":"Yunhuai","family":"Liu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/3132747.3132778"},{"key":"ref38","doi-asserted-by":"crossref","DOI":"10.1145\/2889160.2889231","article-title":"The bones of the system-a case study of logging and telemetry at Microsoft","author":"barik","year":"2016","journal-title":"ICSE"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/844128.844148"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629594"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629586"},{"key":"ref30","first-page":"139","article-title":"Log2: A cost-aware logging mechanism for performance diagnosis","author":"ding","year":"0","journal-title":"2015 USENIX Annual Technical Conference (USENIX ATC 15)"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568254"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.08.031"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2110356.2110359"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1993744.1993757"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.60"},{"key":"ref11","year":"2016","journal-title":"The art of logging"},{"key":"ref12","year":"2016","journal-title":"The problem with logging"},{"key":"ref13","first-page":"487","article-title":"Fast algorithms for mining association rules","volume":"1215","author":"agrawal","year":"1994","journal-title":"Proc 20th Int Conf on Very large Data Bases"},{"key":"ref14","year":"2016","journal-title":"Httpd"},{"key":"ref15","year":"2016","journal-title":"Subversion"},{"key":"ref16","year":"2016","journal-title":"MySql"},{"key":"ref17","year":"2016","journal-title":"PostgreSQL"},{"key":"ref18","year":"2016","journal-title":"GIMP"},{"key":"ref19","year":"2016","journal-title":"Wireshark"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.29"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591175"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.67"},{"key":"ref3","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1109\/IPDPS.2004.1303243","article-title":"Comprehensive logfiles for autonomic systems","author":"salfner","year":"2004","journal-title":"Parallel and Distributed Processing Symposium 2004 Proceedings 18th International"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629587"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.15"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227202"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736038"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629582"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/2110356.2110360"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2012.24"},{"key":"ref1","first-page":"293","article-title":"Be conservative: Enhancing failure diagnosis with proactive logging","volume":"12","author":"yuan","year":"2012","journal-title":"OSDI"},{"key":"ref20","year":"2016","journal-title":"WordNet"},{"key":"ref22","volume":"1","author":"allen","year":"2002","journal-title":"Optimizing Compilers for Modern Architectures A Dependence-Based Approach"},{"key":"ref21","author":"segmentation","year":"2016"},{"key":"ref24","year":"2016","journal-title":"Reaching definition"},{"key":"ref23","first-page":"4","article-title":"Mining console logs for large-scale system problem detection","volume":"8","author":"xu","year":"2008","journal-title":"SysML"},{"key":"ref26","article-title":"A graphical representation for identifier structure in logs","author":"rabkin","year":"2010","journal-title":"Proc Workshop Managing Systems via Log Analysis and Machine Learning Techniques"},{"key":"ref25","year":"2016","journal-title":"GNU Diffutils"}],"event":{"name":"2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)","location":"Campobasso","start":{"date-parts":[[2018,3,20]]},"end":{"date-parts":[[2018,3,23]]}},"container-title":["2018 IEEE 25th International Conference on Software Analysis, Evolution and Reengineering (SANER)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8326467\/8330182\/08330197.pdf?arnumber=8330197","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,31]],"date-time":"2020-10-31T01:11:42Z","timestamp":1604106702000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8330197\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/saner.2018.8330197","relation":{},"subject":[],"published":{"date-parts":[[2018,3]]}}}