{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T17:55:13Z","timestamp":1776362113729,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3616260","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"413-424","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Hue: A User-Adaptive Parser for Hybrid Logs"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0001-1516-103X","authenticated-orcid":false,"given":"Junjielong","family":"Xu","sequence":"first","affiliation":[{"name":"The Chinese University of Hong Kong, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2420-955X","authenticated-orcid":false,"given":"Qiuai","family":"Fu","sequence":"additional","affiliation":[{"name":"Huawei Cloud Computing Technologies, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0009-1032-4715","authenticated-orcid":false,"given":"Zhouruixing","family":"Zhu","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-8641-8079","authenticated-orcid":false,"given":"Yutong","family":"Cheng","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2066-9874","authenticated-orcid":false,"given":"Zhijing","family":"Li","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0002-3304-1389","authenticated-orcid":false,"given":"Yuchi","family":"Ma","sequence":"additional","affiliation":[{"name":"Huawei Cloud Computing Technologies, Shenzhen, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3377-8129","authenticated-orcid":false,"given":"Pinjia","family":"He","sequence":"additional","affiliation":[{"name":"The Chinese University of Hong Kong, Shenzhen, China"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00031"},{"key":"e_1_3_2_2_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3007554"},{"key":"e_1_3_2_2_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDM.2016.0103"},{"key":"e_1_3_2_2_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133956.3134015"},{"key":"e_1_3_2_2_5_1","volume-title":"Manage multiline messages. https:\/\/www.elastic.co\/guide\/en\/beats\/filebeat\/current\/multiline-examples.html#multiline-examples [Online","author":"ELK.","year":"2023","unstructured":"ELK. 2023. Manage multiline messages. https:\/\/www.elastic.co\/guide\/en\/beats\/filebeat\/current\/multiline-examples.html#multiline-examples [Online; accessed 15-June-2023]"},{"key":"e_1_3_2_2_6_1","volume-title":"https:\/\/docs.fluentd.org\/parser\/multiline [Online","year":"2023","unstructured":"Fluentd. 2023. Multiline. https:\/\/docs.fluentd.org\/parser\/multiline [Online; accessed 15-June-2023]"},{"key":"e_1_3_2_2_7_1","unstructured":"Qiang Fu Jian-Guang Lou Yi Wang and Jiang Li. 2009. Execution anomaly detection in distributed systems through unstructured log analysis. In 2009 ninth IEEE international conference on data mining. 149\u2013158."},{"key":"e_1_3_2_2_8_1","unstructured":"Qiang Fu Jian-Guang Lou Yi Wang and Jiang Li. 2009. Execution anomaly detection in distributed systems through unstructured log analysis. In 2009 ninth IEEE international conference on data mining. 149\u2013158."},{"key":"e_1_3_2_2_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICASSP.2013.6638947"},{"key":"e_1_3_2_2_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983323.2983358"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2762673"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"e_1_3_2_2_13_1","volume-title":"A survey on automated log analysis for reliability engineering. ACM computing surveys (CSUR), 54, 6","author":"He Shilin","year":"2021","unstructured":"Shilin He, Pinjia He, Zhuangbin Chen, Tianyi Yang, Yuxin Su, and Michael R Lyu. 2021. A survey on automated log analysis for reliability engineering. ACM computing surveys (CSUR), 54, 6 (2021), 1\u201337."},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236083"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"},{"key":"e_1_3_2_2_16_1","unstructured":"Yintong Huo Yuxin Su Baitong Li and Michael R Lyu. 2021. SemParser: A Semantic Parser for Log Analysis. arXiv preprint arXiv:2112.12636."},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510101"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.144"},{"key":"e_1_3_2_2_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889232"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00085"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511993"},{"key":"e_1_3_2_2_22_1","volume-title":"2010 USENIX Annual Technical Conference (USENIX ATC 10)","author":"Lou Jian-Guang","year":"2010","unstructured":"Jian-Guang Lou, Qiang Fu, Shenqi Yang, Ye Xu, and Jiang Li. 2010. Mining invariants from console logs for system problem detection. In 2010 USENIX Annual Technical Conference (USENIX ATC 10)."},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1557019.1557154"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCC.2013.73"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2010.5463281"},{"key":"e_1_3_2_2_26_1","volume-title":"Multi Line Logs to Single Line Logs. https:\/\/community.netwitness.com\/t5\/netwitness-discussions\/multi-line-logs-to-single-line-logs-conversion\/td-p\/511346 [Online","author":"NETWITNESS.","year":"2023","unstructured":"NETWITNESS. 2023. Multi Line Logs to Single Line Logs. https:\/\/community.netwitness.com\/t5\/netwitness-discussions\/multi-line-logs-to-single-line-logs-conversion\/td-p\/511346 [Online; accessed 15-June-2023]"},{"key":"e_1_3_2_2_27_1","volume-title":"Multi-line Logging Strategies. https:\/\/www.observeinc.com\/blog\/multi-line-logging-strategies\/ [Online","author":"OBSERVE.","year":"2023","unstructured":"OBSERVE. 2023. Multi-line Logging Strategies. https:\/\/www.observeinc.com\/blog\/multi-line-logging-strategies\/ [Online; accessed 15-June-2023]"},{"key":"e_1_3_2_2_28_1","unstructured":"Keiichi Shima. 2016. Length matters: Clustering system log messages using length of words. arXiv preprint arXiv:1611.03213."},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063690"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPOM.2003.1251233"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/CNSM.2015.7367331"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3540250.3549176"},{"key":"e_1_3_2_2_33_1","volume-title":"19th USENIX Conference on File and Storage Technologies (FAST 21)","author":"Wei Junyu","year":"2021","unstructured":"Junyu Wei, Guangyan Zhang, Yang Wang, Zhiwei Liu, Zhanyang Zhu, Junchao Chen, Tingtao Sun, and Qi Zhou. 2021. On the Feasibility of Parser-based Log Compression in $Large-Scale$ Cloud Systems. In 19th USENIX Conference on File and Storage Technologies (FAST 21). 249\u2013262."},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3179405"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338931"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00021"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"San Francisco CA USA","acronym":"ESEC\/FSE '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616260","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3616260","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:36:03Z","timestamp":1750178163000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3616260"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":36,"alternative-id":["10.1145\/3611643.3616260","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3616260","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}