{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,18]],"date-time":"2026-01-18T05:49:55Z","timestamp":1768715395214,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2591062.2591175","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"24-33","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":188,"title":["Where do developers log? an empirical study on logging practices in industry"],"prefix":"10.1145","author":[{"given":"Qiang","family":"Fu","sequence":"first","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Jieming","family":"Zhu","sequence":"additional","affiliation":[{"name":"Chinese University of Hong Kong, China"}]},{"given":"Wenlu","family":"Hu","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Jian-Guang","family":"Lou","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Rui","family":"Ding","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Qingwei","family":"Lin","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Dongmei","family":"Zhang","sequence":"additional","affiliation":[{"name":"Microsoft Research, China"}]},{"given":"Tao","family":"Xie","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"7\n    Good Rules to Log Exceptions. http:\/\/codemonkeyism.com\/7-good-rules-to-log-exceptions\/  7 Good Rules to Log Exceptions. http:\/\/codemonkeyism.com\/7-good-rules-to-log-exceptions\/"},{"key":"e_1_3_2_1_2_1","unstructured":"7\n    More Good Tips on Logging. http:\/\/codemonkeyism.com- \/7-more-good-tips-on-logging\/  7 More Good Tips on Logging. http:\/\/codemonkeyism.com- \/7-more-good-tips-on-logging\/"},{"key":"e_1_3_2_1_3_1","unstructured":"10\n    Tips for Proper Application Logging. http:\/\/www.javacodegeeks.com\/2011\/01\/10-tips-proper-applicationlogging.html  10 Tips for Proper Application Logging. http:\/\/www.javacodegeeks.com\/2011\/01\/10-tips-proper-applicationlogging.html"},{"key":"e_1_3_2_1_4_1","unstructured":"B. Gregg and J. Mauro. 2011. DTrace: Dynamic Tracing in Oracle Solaris Mac OS X and FreeBSD. Prentice Hall Press.   B. Gregg and J. Mauro. 2011. DTrace: Dynamic Tracing in Oracle Solaris Mac OS X and FreeBSD. Prentice Hall Press."},{"key":"e_1_3_2_1_5_1","unstructured":"Kibana \u2013 make sense of a mountain of logs. http:\/\/kibana.org  Kibana \u2013 make sense of a mountain of logs. http:\/\/kibana.org"},{"key":"e_1_3_2_1_6_1","unstructured":"Logstash \u2013 open-source log management. http:\/\/logstash.net\/  Logstash \u2013 open-source log management. http:\/\/logstash.net\/"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351735"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629586"},{"key":"e_1_3_2_1_9_1","unstructured":"C. D. Manning and H. Sch\u00fctze. 2001. Foundations of statistical natural language processing. The MIT Press.   C. D. Manning and H. Sch\u00fctze. 2001. Foundations of statistical natural language processing. The MIT Press."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.21"},{"key":"e_1_3_2_1_11_1","volume-title":"Proc. of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI\u201912)","author":"Nagaraj K.","unstructured":"K. Nagaraj , C. Killian , and J. Neville . 2012. Structured comparative analysis of systems logs to diagnose performance problems . In Proc. of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI\u201912) . K. Nagaraj, C. Killian, and J. Neville. 2012. Structured comparative analysis of systems logs to diagnose performance problems. In Proc. of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI\u201912)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076450.2076466"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2011.5958206"},{"key":"e_1_3_2_1_14_1","unstructured":"Optimal Logging. http:\/\/googletesting.blogspot.com\/2013\/- 06\/optimal-logging.html  Optimal Logging. http:\/\/googletesting.blogspot.com\/2013\/- 06\/optimal-logging.html"},{"key":"e_1_3_2_1_15_1","volume-title":"programs for machine learning","author":"Quinlan J. R.","unstructured":"J. R. Quinlan . 1993. C4.5 : programs for machine learning . Morgan Kaufmann Publishers . J. R. Quinlan. 1993. C4.5: programs for machine learning. Morgan Kaufmann Publishers."},{"key":"e_1_3_2_1_16_1","unstructured":"Roslyn. http:\/\/msdn.microsoft.com\/en-us\/vstudio\/roslyn.aspx  Roslyn. http:\/\/msdn.microsoft.com\/en-us\/vstudio\/roslyn.aspx"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2038916.2038919"},{"key":"e_1_3_2_1_18_1","unstructured":"Splunk \u2013 log management. http:\/\/www.splunk.com\/  Splunk \u2013 log management. http:\/\/www.splunk.com\/"},{"key":"e_1_3_2_1_19_1","unstructured":"The Art of Logging. http:\/\/www.codeproject.com\/Articles\/- 42354\/The-Art-of-Logging  The Art of Logging. http:\/\/www.codeproject.com\/Articles\/- 42354\/The-Art-of-Logging"},{"key":"e_1_3_2_1_20_1","first-page":"293","volume-title":"Proc. of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI'12)","author":"Yuan D.","unstructured":"D. Yuan , S. Park , P. Huang , Y. Liu , M. Lee , Y. Zhou , and S. Savage . 2012. Be conservative: enhancing failure diagnosis with proactive logging . In Proc. of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI'12) , pages 293 - 306 . D. Yuan, S. Park, P. Huang, Y. Liu, M. Lee, Y. Zhou, and S. Savage. 2012. Be conservative: enhancing failure diagnosis with proactive logging. In Proc. of the 10th USENIX Conference on Operating Systems Design and Implementation (OSDI'12), pages 293-306."},{"key":"e_1_3_2_1_21_1","first-page":"102","volume-title":"Proc. of the 34th International Conference on Software Engineering (ICSE\u201912)","author":"Yuan D.","unstructured":"D. Yuan , S. Park , and Y. Zhou . 2012. Characterizing logging practices in open-source software . In Proc. of the 34th International Conference on Software Engineering (ICSE\u201912) , pages 102 - 112 . D. Yuan, S. Park, and Y. Zhou. 2012. Characterizing logging practices in open-source software. In Proc. of the 34th International Conference on Software Engineering (ICSE\u201912), pages 102-112."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110356.2110360"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736038"},{"key":"e_1_3_2_1_24_1","first-page":"4","volume-title":"Proc. of 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201911)","author":"Sambasivan R.","unstructured":"R. Sambasivan , A. Zheng , M. Rosa , E. Krevat , S. Whitman , M. Stroucken , W. Wang , L. Xu , and G. Ganger . 2011. Diagnosing performance changes by comparing request flows . In Proc. of 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201911) , pages 4 - 4 . R. Sambasivan, A. Zheng, M. Rosa, E. Krevat, S. Whitman, M. Stroucken, W. Wang, L. Xu, and G. Ganger. 2011. Diagnosing performance changes by comparing request flows. In Proc. of 8th USENIX Symposium on Networked Systems Design and Implementation (NSDI\u201911), pages 4-4."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/SRDS.2012.40"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2009.60"},{"key":"e_1_3_2_1_27_1","volume-title":"Proc. of 2010 USENIX Annual Technical Conference (ATC\u201910)","author":"Lou J.G.","unstructured":"J.G. Lou , Q. Fu , S. Yang , Y. Xu , and J. Li . 2010. Mining invariants from console logs for system problem detection . In Proc. of 2010 USENIX Annual Technical Conference (ATC\u201910) . J.G. Lou, Q. Fu, S. Yang, Y. Xu, and J. Li. 2010. Mining invariants from console logs for system problem detection. In Proc. of 2010 USENIX Annual Technical Conference (ATC\u201910)."},{"key":"e_1_3_2_1_28_1","first-page":"397","volume-title":"Proc. of 10th Working Conference on Mining Software Repositories (MSR\u201913)","author":"Fu Q.","unstructured":"Q. Fu , J.G. Lou , Q. Lin , R. Ding , D. Zhang , and T. Xie . 2013. Contextual analysis of program logs for understanding system behaviors . In Proc. of 10th Working Conference on Mining Software Repositories (MSR\u201913) , pages 397 - 400 . Q. Fu, J.G. Lou, Q. Lin, R. Ding, D. Zhang, and T. Xie. 2013. Contextual analysis of program logs for understanding system behaviors. In Proc. of 10th Working Conference on Mining Software Repositories (MSR\u201913), pages 397-400."},{"key":"e_1_3_2_1_29_1","volume-title":"Predictive inference: an introduction","author":"Geisser S.","unstructured":"S. Geisser . 1993. Predictive inference: an introduction . Chapman and Hall , New York , ISBN 0-412-03471-9. S. Geisser. 1993. Predictive inference: an introduction. Chapman and Hall, New York, ISBN 0-412-03471-9."}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","location":"Hyderabad India","acronym":"ICSE '14","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."]},"container-title":["Companion Proceedings of the 36th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2591062.2591175","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2591062.2591175","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:30Z","timestamp":1750230090000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2591062.2591175"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":29,"alternative-id":["10.1145\/2591062.2591175","10.1145\/2591062"],"URL":"https:\/\/doi.org\/10.1145\/2591062.2591175","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}