{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T06:20:10Z","timestamp":1770272410626,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":78,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416636","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:39:02Z","timestamp":1611790742000},"page":"361-372","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["Where shall we log?"],"prefix":"10.1145","author":[{"given":"Zhenhao","family":"Li","sequence":"first","affiliation":[{"name":"Concordia University, Montreal, Quebec, Canada"}]},{"given":"Tse-Hsun (Peter)","family":"Chen","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, Quebec, Canada"}]},{"given":"Weiyi","family":"Shang","sequence":"additional","affiliation":[{"name":"Concordia University, Montreal, Quebec, Canada"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"gensim Word2vec embeddings. https:\/\/radimrehurek.com\/gensim\/models\/word2vec.html. Last checked","year":"2020","unstructured":"[n.d.]. gensim Word2vec embeddings. https:\/\/radimrehurek.com\/gensim\/models\/word2vec.html. Last checked Feb. 2020."},{"key":"e_1_3_2_1_2_1","volume-title":"Keras: The Python Deep Learning library. https:\/\/keras.io\/. Last checked","year":"2020","unstructured":"[n.d.]. Keras: The Python Deep Learning library. https:\/\/keras.io\/. Last checked Feb. 2020."},{"key":"e_1_3_2_1_3_1","unstructured":"[n.d.]. Log4j. http:\/\/logging.apache.org\/log4j\/2.x\/."},{"key":"e_1_3_2_1_4_1","volume-title":"Oracle Java Documentation. https:\/\/docs.oracle.com\/javase\/tutorial\/java\/nutsandbolts\/flow.html. Last checked","year":"2020","unstructured":"[n.d.]. Oracle Java Documentation. https:\/\/docs.oracle.com\/javase\/tutorial\/java\/nutsandbolts\/flow.html. Last checked Mar. 2020."},{"key":"e_1_3_2_1_5_1","unstructured":"[n.d.]. Simple Logging Facade for Java (SLF4J). http:\/\/www.slf4j.org. Last checked Feb. 2018."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/3290353"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884667"},{"key":"e_1_3_2_1_8_1","volume-title":"Nutshell: A Desktop Quick Reference","author":"Boslaugh S.","year":"2008","unstructured":"S. Boslaugh and P.A. Watters. 2008. Statistics in a Nutshell: A Desktop Quick Reference. O'Reilly Media."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9429-5"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.15"},{"key":"e_1_3_2_1_11_1","volume-title":"Extracting and studying the Logging-Code-Issue-Introducing changes in Java-based large-scale open source software systems. Empirical Software Engineering 24, 4 (01","author":"Chen Boyuan","year":"2019","unstructured":"Boyuan Chen and Zhen Ming (Jack) Jiang. 2019. Extracting and studying the Logging-Code-Issue-Introducing changes in Java-based large-scale open source software systems. Empirical Software Engineering 24, 4 (01 Aug 2019), 2285--2322."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380408"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238214"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950303"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2017.26"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9402-8"},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 9th Working Conference on Mining Software Repositories (MSR '12)","author":"Chen Tse-Hsun","unstructured":"Tse-Hsun Chen, S. W. Thomas, Meiyappan Nagappan, and A.E. Hassan. 2012. Explaining Software Defects Using Topic Models. In Proceedings of the 9th Working Conference on Mining Software Repositories (MSR '12)."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568259"},{"key":"e_1_3_2_1_19_1","volume-title":"SequenceR: Sequence-to-Sequence Learning for End-to-End Program Repair. CoRR abs\/1901.01808","author":"Chen Zimin","year":"2019","unstructured":"Zimin Chen, Steve Kommrusch, Michele Tufano, Louis-No\u00ebl Pouchet, Denys Poshyvanyk, and Martin Monperrus. 2019. SequenceR: Sequence-to-Sequence Learning for End-to-End Program Repair. CoRR abs\/1901.01808 (2019)."},{"key":"e_1_3_2_1_20_1","volume-title":"2015 USENIX Annual Technical Conference, USENIX ATC '15","author":"Ding Rui","year":"2015","unstructured":"Rui Ding, Hucheng Zhou, Jian-Guang Lou, Hongyu Zhang, Qingwei Lin, Qiang Fu, Dongmei Zhang, and Tao Xie. 2015. Log2: A Cost-Aware Logging Mechanism for Performance Diagnosis. In 2015 USENIX Annual Technical Conference, USENIX ATC '15,. 139--150."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380351"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00102"},{"key":"e_1_3_2_1_23_1","volume-title":"Tracking Code Clones in Evolving Software. In 29th International Conference on Software Engineering (ICSE","author":"Duala-Ekoko Ekwa","year":"2007","unstructured":"Ekwa Duala-Ekoko and Martin P. Robillard. 2007. Tracking Code Clones in Evolving Software. In 29th International Conference on Software Engineering (ICSE 2007). 158--167."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0031619"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591175"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297033"},{"key":"e_1_3_2_1_27_1","volume-title":"Deep Code Search. In 2018 IEEE\/ACM 40th International Conference on Software Engineering, ICSE 2018. 933--944","author":"Gu X.","unstructured":"X. Gu, H. Zhang, and S. Kim. 2018. Deep Code Search. In 2018 IEEE\/ACM 40th International Conference on Software Engineering, ICSE 2018. 933--944."},{"key":"e_1_3_2_1_28_1","first-page":"810","article-title":"An Empirical Study Towards Characterizing Deep Learning Development and Deployment Across Different Frameworks and Platforms. In 34th IEEE\/ACM International Conference on Automated Software Engineering","volume":"2019","author":"Guo Qianyu","year":"2019","unstructured":"Qianyu Guo, Sen Chen, Xiaofei Xie, Lei Ma, Qiang Hu, Hongtao Liu, Yang Liu, Jianjun Zhao, and Xiaohong Li. 2019. An Empirical Study Towards Characterizing Deep Learning Development and Deployment Across Different Frameworks and Platforms. In 34th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2019. 810--822.","journal-title":"ASE"},{"key":"e_1_3_2_1_29_1","volume-title":"Studying and Detecting Log-Related Issues. Empirical Software Engineering","author":"Hassani Mehran","year":"2018","unstructured":"Mehran Hassani, Weiyi Shang, Emad Shihab, and Nikolaos Tsantalis. 2018. Studying and Detecting Log-Related Issues. Empirical Software Engineering (2018)."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00016"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196321.3196334"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2931725"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00011"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00064"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 42nd International Conference on Software Engineering, (ICSE","author":"Lamothe Maxime","year":"2020","unstructured":"Maxime Lamothe and Weiyi Shang. 2020. When APIs are Intentionally By-passed: An Exploratory Study of API Workarounds. In Proceedings of the 42nd International Conference on Software Engineering, (ICSE 2020)."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.2307\/2529310"},{"key":"e_1_3_2_1_38_1","volume-title":"Hassan","author":"Li Heng","year":"2018","unstructured":"Heng Li, Tse-Hsun (Peter) Chen, Weiyi Shang, and Ahmed E. Hassan. 2018. Studying software logging using topic models. Empirical Software Engineering (Jan 2018)."},{"key":"e_1_3_2_1_39_1","volume-title":"Hassan","author":"Li Heng","year":"2020","unstructured":"Heng Li, Weiyi Shang, Bram Adams, Mohammed Sayagh, and Ahmed E. Hassan. 2020. A Qualitative Study of the Benefits and Costs of Logging from Developers' Perspectives. IEEE Transactions on Software Engineering (2020), 1--17."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9456-2"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-016-9467-z"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2876006"},{"key":"e_1_3_2_1_43_1","volume-title":"Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, ICSE 2019. 147--149","author":"Li Zhenhao","year":"2019","unstructured":"Zhenhao Li. 2019. Characterizing and detecting duplicate logging code smells. In Proceedings of the 41st International Conference on Software Engineering: Companion Proceedings, ICSE 2019. 147--149."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377812.3382168"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377812.3381385"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00032"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889232"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Z. Liu X. Xia D. Lo Z. Xing A. E. Hassan and S. Li. 2019. Which Variables Should I Log? IEEE Transactions on Software Engineering (2019). Early Access.","DOI":"10.1109\/TSE.2019.2941943"},{"key":"e_1_3_2_1_49_1","volume-title":"Efficient Estimation of Word Representations in Vector Space. In 1st International Conference on Learning Representations, ICLR","author":"Mikolov Tomas","year":"2013","unstructured":"Tomas Mikolov, Kai Chen, Greg Corrado, and Jeffrey Dean. 2013. Efficient Estimation of Word Representations in Vector Space. In 1st International Conference on Learning Representations, ICLR 2013."},{"key":"e_1_3_2_1_50_1","volume-title":"Vouk","author":"Nagappan Meiyappan","year":"2009","unstructured":"Meiyappan Nagappan, Kesheng Wu, and Mladen A. Vouk. 2009. Efficiently extracting operational profiles from execution logs using suffix arrays. In ISSRE'09: Proceedings of the 20th IEEE International Conference on Software Reliability Engineering. IEEE Press, 41--50."},{"key":"e_1_3_2_1_51_1","volume-title":"Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI '12)","author":"Nagaraj Karthik","year":"2012","unstructured":"Karthik Nagaraj, Charles Edwin Killian, and Jennifer Neville. 2012. Structured Comparative Analysis of Systems Logs to Diagnose Performance Problems. In Proceedings of the 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI '12). 353--366."},{"key":"e_1_3_2_1_52_1","volume-title":"Bilateral Dependency Neural Networks for Cross-Language Algorithm Classification. In 26th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER","author":"Nghi Bui D. Q.","year":"2019","unstructured":"Bui D. Q. Nghi, Yijun Yu, and Lingxiao Jiang. 2019. Bilateral Dependency Neural Networks for Cross-Language Algorithm Classification. In 26th IEEE International Conference on Software Analysis, Evolution and Reengineering, SANER 2019. 422--433."},{"key":"e_1_3_2_1_53_1","volume-title":"Proceedings of the 22nd ACM Symposium on Operating Systems Principles 2009, SOSP 2009. 87--102","author":"Perkins Jeff H.","unstructured":"Jeff H. Perkins, Sunghun Kim, Samuel Larsen, Saman P. Amarasinghe, Jonathan Bachrach, Michael Carbin, Carlos Pacheco, Frank Sherwood, Stelios Sidiroglou, Greg Sullivan, Weng-Fai Wong, Yoav Zibin, Michael D. Ernst, and Martin C. Rinard. 2009. Automatically patching errors in deployed software. In Proceedings of the 22nd ACM Symposium on Operating Systems Principles 2009, SOSP 2009. 87--102."},{"key":"e_1_3_2_1_54_1","volume-title":"Proceedings of the 33rd IEEE international conference on Automated software engineering. 1--11","author":"Pinjia He","unstructured":"He Pinjia, Zhuangbin Chen, Shilin He, and Michael R. Lyu. 2018. Characterizing the Natural Language Descriptions in Software Logging Statements. In Proceedings of the 33rd IEEE international conference on Automated software engineering. 1--11."},{"key":"e_1_3_2_1_55_1","volume-title":"The Concept of Stratified Sampling of Execution Traces. In The 19th IEEE International Conference on Program Comprehension, ICPC 2011. 225--226","author":"Pirzadeh Heidar","year":"2011","unstructured":"Heidar Pirzadeh, Sara Shanian, Abdelwahab Hamou-Lhadj, and Ali Mehrabian. 2011. The Concept of Stratified Sampling of Execution Traces. In The 19th IEEE International Conference on Program Comprehension, ICPC 2011. 225--226."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1093\/ptj\/85.3.257"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.5555\/2627435.2670313"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196431"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1613\/jair.2934"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2597073.2597099"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970359"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338962"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.12.006"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2961111.2962606"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2788018"},{"key":"e_1_3_2_1_66_1","volume-title":"Log4Perf: suggesting and updating logging locations for web-based systems performance monitoring. Empirical Software Engineering 25, 1","author":"Yao Kundi","year":"2020","unstructured":"Kundi Yao, Guilherme B. de P\u00e1dua, Weiyi Shang, Catalin Sporea, Andrei Toma, and Sarah Sajedi. 2020. Log4Perf: suggesting and updating logging locations for web-based systems performance monitoring. Empirical Software Engineering 25, 1 (2020)."},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/3184407.3184416"},{"key":"e_1_3_2_1_68_1","volume-title":"Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation (OSDI'14)","author":"Yuan Ding","year":"2014","unstructured":"Ding Yuan, Yu Luo, Xin Zhuang, Guilherme Renna Rodrigues, Xu Zhao, Yongle Zhang, Pranay U. Jain, and Michael Stumm. 2014. Simple Testing Can Prevent Most Critical Failures: An Analysis of Production Failures in Distributed Data-intensive Systems. In Proceedings of the 11th USENIX Conference on Operating Systems Design and Implementation (OSDI'14). 249--265."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736038"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227202"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950369"},{"key":"e_1_3_2_1_72_1","volume-title":"Weiyi iShang, and Tse-Hsun (Peter) Chen","author":"Zeng Yi","year":"2019","unstructured":"Yi Zeng, Jinfu Chen, Weiyi iShang, and Tse-Hsun (Peter) Chen. 2019. Studying the characteristics of logging practices in mobile apps: a case study on F-Droid. Empirical Software Engineering (2019), 1--41."},{"key":"e_1_3_2_1_73_1","volume-title":"Stack Overflow: Not Enough! IEEE Transactions on Software Engineering","author":"Zhang H.","year":"2019","unstructured":"H. Zhang, S. Wang, T. Chen, and A. E. Hassan. 2019. Reading Answers on Stack Overflow: Not Enough! IEEE Transactions on Software Engineering (2019)."},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00086"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00086"},{"key":"e_1_3_2_1_76_1","volume-title":"An Empirical Study of Common Challenges in Developing Deep Learning Applications. In 30th IEEE International Symposium on Software Reliability Engineering, ISSRE","author":"Zhang Tianyi","year":"2019","unstructured":"Tianyi Zhang, Cuiyun Gao, Lei Ma, Michael R. Lyu, and Miryung Kim. 2019. An Empirical Study of Common Challenges in Developing Deep Learning Applications. In 30th IEEE International Symposium on Software Reliability Engineering, ISSRE 2019. 104--115."},{"key":"e_1_3_2_1_77_1","volume-title":"An Exploratory Study of Logging Configuration Practice in Java. In 2019 IEEE International Conference on Software Maintenance and Evolution, ICSME","author":"Zhi Chen","year":"2019","unstructured":"Chen Zhi, Jianwei Yin, Shuiguang Deng, Maoxin Ye, Min Fu, and Tao Xie. 2019. An Exploratory Study of Logging Configuration Practice in Java. In 2019 IEEE International Conference on Software Maintenance and Evolution, ICSME 2019. 459--469."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.60"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia","acronym":"ASE '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416636","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416636","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:22Z","timestamp":1750193242000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416636"}},"subtitle":["studying and suggesting logging locations in code blocks"],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":78,"alternative-id":["10.1145\/3324884.3416636","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416636","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}