{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T20:12:28Z","timestamp":1759435948094,"version":"build-2065373602"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2025,6,23]]},"DOI":"10.1145\/3711875.3736683","type":"proceedings-article","created":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T19:30:22Z","timestamp":1759433422000},"page":"753-758","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Empirical Analysis of LLMDPP: Advancing Log Parsing in the LLM Era"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7762-8491","authenticated-orcid":false,"given":"Kehan","family":"Wang","sequence":"first","affiliation":[{"name":"China Telecom Cloud Computing Corporation,Beijing,China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8355-2465","authenticated-orcid":false,"given":"Siqin","family":"Zhang","sequence":"additional","affiliation":[{"name":"China Telecom Cloud Computing Corporation,Beijing,China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6174-7891","authenticated-orcid":false,"given":"Haijing","family":"Nan","sequence":"additional","affiliation":[{"name":"China Telecom Cloud Computing Corporation,Beijing,China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0003-2134-7644","authenticated-orcid":false,"given":"Xueyu","family":"Hou","sequence":"additional","affiliation":[{"name":"China Telecom Cloud Computing Corporation,Beijing,China, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6969-3082","authenticated-orcid":false,"given":"Jiaqi","family":"Zou","sequence":"additional","affiliation":[{"name":"Tsinghua University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-6810-5728","authenticated-orcid":false,"given":"Zicong","family":"Miao","sequence":"additional","affiliation":[{"name":"China Telecom Cloud Computing Corporation,Beijing,China, Beijing, China"}]}],"member":"320","published-online":{"date-parts":[[2025,9,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.21"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468543"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00031"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236083"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2889232"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2017.2762673"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00078"},{"key":"e_1_3_2_1_8_1","volume-title":"An evaluation study on log parsing and its use in log mining. In 2016 46th annual IEEE\/IFIP international conference on dependable systems and networks (DSN)","author":"He Pinjia","unstructured":"Pinjia He, Jieming Zhu, Shilin He, Jian Li, and Michael R Lyu. 2016. An evaluation study on log parsing and its use in log mining. In 2016 46th annual IEEE\/IFIP international conference on dependable systems and networks (DSN). IEEE, 654\u2013661."},{"key":"e_1_3_2_1_9_1","volume-title":"Fast greedy map inference for determinantal point process to improve recommendation diversity. Advances in Neural Information Processing Systems 31","author":"Chen Laming","year":"2018","unstructured":"Laming Chen, Guoxin Zhang, and Eric Zhou. 2018. Fast greedy map inference for determinantal point process to improve recommendation diversity. Advances in Neural Information Processing Systems 31 (2018)."},{"key":"e_1_3_2_1_10_1","volume-title":"The Eleventh International Conference on Learning Representations.","author":"Arora Simran","year":"2022","unstructured":"Simran Arora, Avanika Narayan, Mayee F Chen, Laurel Orr, Neel Guha, Kush Bhatia, Ines Chami, and Christopher Re. 2022. Ask me anything: A simple strategy for prompting language models. In The Eleventh International Conference on Learning Representations."},{"key":"e_1_3_2_1_11_1","first-page":"1","article-title":"Exploring the limits of transfer learning with a unified text-to-text transformer","volume":"21","author":"Raffel Colin","year":"2020","unstructured":"Colin Raffel, Noam Shazeer, Adam Roberts, Katherine Lee, Sharan Narang, Michael Matena, Yanqi Zhou, Wei Li, and Peter J Liu. 2020. Exploring the limits of transfer learning with a unified text-to-text transformer. Journal of machine learning research 21, 140 (2020), 1\u201367.","journal-title":"Journal of machine learning research"},{"key":"e_1_3_2_1_12_1","first-page":"879","article-title":"Logram: Efficient log parsing using n-gram dictionaries","volume":"48","author":"Dai Hetong","year":"2020","unstructured":"Hetong Dai, Heng Li, Che-Shao Chen, Weiyi Shang, and Tse-Hsun Chen. 2020. Logram: Efficient log parsing using n-gram dictionaries. IEEE Transactions on Software Engineering 48, 3 (2020), 879\u2013892.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS.2017.13"},{"key":"e_1_3_2_1_14_1","volume-title":"Execution anomaly detection in distributed systems through unstructured log analysis. In 2009 ninth IEEE international conference on data mining","author":"Fu Qiang","unstructured":"Qiang Fu, Jian-Guang Lou, Yi Wang, and Jiang Li. 2009. Execution anomaly detection in distributed systems through unstructured log analysis. In 2009 ninth IEEE international conference on data mining. IEEE, 149\u2013158."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2063576.2063690"},{"key":"e_1_3_2_1_16_1","volume-title":"Length matters: Clustering system log messages using length of words. arXiv preprint arXiv:1611.03213","author":"Shima Keiichi","year":"2016","unstructured":"Keiichi Shima. 2016. Length matters: Clustering system log messages using length of words. arXiv preprint arXiv:1611.03213 (2016)."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPOM.2003.1251233"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"crossref","unstructured":"Chen Zhuge and Risto Vaarandi. 2017. Efficient event log mining with Log-ClusterC. In 2017 ieee 3rd international conference on big data security on cloud (bigdatasecurity) ieee international conference on high performance and smart computing (hpsc) and ieee international conference on intelligent data and security (ids). IEEE 261\u2013266.","DOI":"10.1109\/BigDataSecurity.2017.26"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE48619.2023.00204"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3639478.3643108"},{"key":"e_1_3_2_1_21_1","unstructured":"Ben Mann N Ryder M Subbiah J Kaplan P Dhariwal A Neelakantan P Shyam G Sastry A Askell S Agarwal et al. 2020. Language models are few-shot learners. arXiv preprint arXiv:2005.14165 1 (2020)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/IWQoS57198.2023.10188759"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639155"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/3597503.3639150"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00021"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3485447.3511993"},{"key":"e_1_3_2_1_27_1","volume-title":"RoBERTa: A robustly optimized BERT pretraining approach. arXiv [Preprint](2019). arXiv preprint arXiv:1907.11692","author":"Liu Y","year":"1907","unstructured":"Y Liu, M Ott, N Goyal, J Du, M Joshi, D Chen, O Levy, M Lewis, L Zettlemoyer, and V Stoyanov. 1907. RoBERTa: A robustly optimized BERT pretraining approach. arXiv [Preprint](2019). arXiv preprint arXiv:1907.11692 (1907)."}],"event":{"name":"MobiSys '25: 23rd Annual International Conference on Mobile Systems, Applications and Services","location":"Hilton Anaheim Anaheim CA USA","acronym":"MobiSys '25","sponsor":["SIGMOBILE ACM Special Interest Group on Mobility of Systems, Users, Data and Computing","SIGOPS ACM Special Interest Group on Operating Systems"]},"container-title":["Proceedings of the 23rd Annual International Conference on Mobile Systems, Applications and Services"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3711875.3736683","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,2]],"date-time":"2025-10-02T19:34:57Z","timestamp":1759433697000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3711875.3736683"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6,23]]},"references-count":27,"alternative-id":["10.1145\/3711875.3736683","10.1145\/3711875"],"URL":"https:\/\/doi.org\/10.1145\/3711875.3736683","relation":{},"subject":[],"published":{"date-parts":[[2025,6,23]]},"assertion":[{"value":"2025-09-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}