{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:56:08Z","timestamp":1730321768370,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":29,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,10,28]],"date-time":"2019-10-28T00:00:00Z","timestamp":1572220800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,10,28]]},"DOI":"10.1145\/3361242.3361261","type":"proceedings-article","created":{"date-parts":[[2019,10,24]],"date-time":"2019-10-24T15:04:48Z","timestamp":1571929488000},"page":"1-6","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["JLLAR"],"prefix":"10.1145","author":[{"given":"Jing","family":"Zhu","sequence":"first","affiliation":[{"name":"Software Institute, Nanjing University, Nanjing, Jiangsu, China"}]},{"given":"Guoping","family":"Rong","sequence":"additional","affiliation":[{"name":"Software Institute, Nanjing University, Nanjing, Jiangsu, China"}]},{"given":"Guocheng","family":"Huang","sequence":"additional","affiliation":[{"name":"Software Institute, Nanjing University, Nanjing, Jiangsu, China"}]},{"given":"Shenghui","family":"Gu","sequence":"additional","affiliation":[{"name":"Software Institute, Nanjing University, Nanjing, Jiangsu, China"}]},{"given":"He","family":"Zhang","sequence":"additional","affiliation":[{"name":"Software Institute, Nanjing University, Nanjing, Jiangsu, China"}]},{"given":"Dong","family":"Shao","sequence":"additional","affiliation":[{"name":"Software Institute, Nanjing University, Nanjing, Jiangsu, China"}]}],"member":"320","published-online":{"date-parts":[[2019,10,28]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"2","article-title":"Advances and challenges in log analysis","volume":"55","author":"Ganapathi A.","year":"2012","journal-title":"Commun. ACM"},{"volume-title":"2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering (ICSE '15)","author":"Carrozza A.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","first-page":"1","article-title":"Modeling and synthesizing task placement constraints in Google compute clusters. In Proceedings of the 2Nd ACM Symposium on Cloud Computing (SOCC '11). ACM, New York","volume":"3","author":"Hellerstein R.","year":"2011","journal-title":"NY, USA"},{"volume-title":"Random Forests. Machine Learning 45, 1 (01","year":"2001","author":"Leo Breiman","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.15"},{"volume-title":"Support-vector networks. Machine Learning 20, 3 (01","year":"1995","author":"Corinna Cortes","key":"e_1_3_2_1_6_1"},{"volume-title":"Proceedings of the 10th USENIX Symposium on Operating Systems Design and Implementation (OSDI '12)","author":"Huang Y.","key":"e_1_3_2_1_7_1"},{"volume-title":"Proceedings of the 34th International Conference on Software Engineering (ICSE '12)","author":"Park D.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","article-title":"Improving software diagnosability via log enhancement","volume":"30","author":"Park Y.","year":"2012","journal-title":"ACM Transactions on Computer Systems"},{"key":"e_1_3_2_1_10_1","first-page":"771","article-title":"A short introduction to boosting","volume":"14","author":"Yoav Freund","year":"1999","journal-title":"Journal-Japanese Society For Artificial Intelligence"},{"volume-title":"Proceedings of the Twentieth ACM Symposium on Operating Systems Principles (SOSP '05)","author":"Goldszmidt J.","key":"e_1_3_2_1_11_1"},{"volume-title":"d.]. Github research: Over 50% of java logging statements are written wrong. Retrieved","year":"2017","author":"Idan","key":"e_1_3_2_1_12_1"},{"volume-title":"2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering (ICSE '15)","author":"Fu H.","key":"e_1_3_2_1_13_1"},{"volume-title":"Proceedings of the 9th USENIX Conference on Networked Systems Design and Implementation (NSDI '12)","author":"Killian K.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","unstructured":"B. W. Kernighan and R. Pike. 1999. The practice of programming. Addison-Wesley Professional. B. W. Kernighan and R. Pike. 1999. The practice of programming. Addison-Wesley Professional."},{"volume-title":"Proceedings of the Nineteenth ACM Symposium on Operating Systems Principles (SOSP '03)","author":"Wiener P.","key":"e_1_3_2_1_16_1"},{"volume-title":"IEEE\/IFIP International Conference on Dependable Systems and Networks Workshops (DSN '12)","author":"Dagit R. B.","key":"e_1_3_2_1_17_1"},{"volume-title":"Retrieved","year":"2016","author":"Simon Maple","key":"e_1_3_2_1_18_1"},{"volume-title":"2008 19th International Symposium on Software Reliability Engineering (ISSRE '08)","author":"Mariani F.","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","volume-title":"AAAI-98 workshop on learning for text categorization","volume":"752","author":"Andrew McCallum","year":"1998"},{"key":"e_1_3_2_1_21_1","unstructured":"Andrew Y Ng and Michael I Jordan. 2002. On discriminative vs. generative classifiers: A comparison of logistic regression and naive bayes. In Advances in neural information processing systems. 841--848. Andrew Y Ng and Michael I Jordan. 2002. On discriminative vs. generative classifiers: A comparison of logistic regression and naive bayes. In Advances in neural information processing systems. 841--848."},{"volume-title":"2011 IEEE\/IFIP 41st International Conference on Dependable Systems Networks (DSN). IEEE, 49--60","author":"Oliner A.","key":"e_1_3_2_1_22_1"},{"volume-title":"Companion Proceedings of the 36th International Confer- ence on Software Engineering (ICSE Companion","year":"2014","author":"Hu J.-G.","key":"e_1_3_2_1_23_1"},{"volume-title":"2009 Ninth IEEE International Conference on Data Mining (ICDM '09)","author":"Wang Q.","key":"e_1_3_2_1_24_1"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2018.00031"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2017.61"},{"volume-title":"Proceedings of the ACM SIGOPS 22Nd Symposium on Operating Systems Principles (SOSP '09)","author":"Fox D.","key":"e_1_3_2_1_27_1"},{"volume-title":"2012 IEEE 31st Symposium on Reliable Distributed Systems. IEEE, 71--80","author":"Zhan W.","key":"e_1_3_2_1_28_1"},{"volume-title":"Proceedings of the 16th Workshop on Hot Topics in Operating Systems (HotOS '17)","author":"Luo M.","key":"e_1_3_2_1_29_1"}],"event":{"name":"Internetware '19: The 11th Asia-Pacific Symposium on Internetware","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Fukuoka Japan","acronym":"Internetware '19"},"container-title":["Proceedings of the 11th Asia-Pacific Symposium on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3361242.3361261","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,13]],"date-time":"2023-01-13T21:04:21Z","timestamp":1673643861000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3361242.3361261"}},"subtitle":["A Logging Recommendation Plug-in Tool for Java"],"short-title":[],"issued":{"date-parts":[[2019,10,28]]},"references-count":29,"alternative-id":["10.1145\/3361242.3361261","10.1145\/3361242"],"URL":"https:\/\/doi.org\/10.1145\/3361242.3361261","relation":{},"subject":[],"published":{"date-parts":[[2019,10,28]]},"assertion":[{"value":"2019-10-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}