[1] |
Salfner F,Tschirpke S,Malek M.Comprehensive logfiles for autonomic systems[C]∥
|
|
Proc of the 18th International on Parallel and Distributed Processing Symposium,2004:211.
|
[2] |
Yuan D,Park S,Zhou Y.Characterizing logging practices in opensource software[C]∥Proc of the 2012 International Conference on Software Engineering,2012:102112.
|
[3] |
Yuan D,Park S,Huang P,et al.Be Conservative:Enhancing Failure Diagnosis with Proactive Logging[C]∥Proc of the 10th Symposium on Operating Systems Design and Implementation (OSDI),2012:293306.
|
[4] |
Yuan D,Zheng J,Park S,et al.Improving software diagnosability via log enhancement[J].ACM Transactions on Computer Systems (TOCS),2012,30(1):4.
|
[5] |
Fu Q,Zhu J,Hu W,et al.Where do developers log? an empirical study on logging practices in industry[C]∥Proc of the 36th International Conference on Software Engineering,2014:2433.
|
[6] |
Zhu J,He P,Fu Q,et al.Learning to log:Helping developers make informed logging decisions[C]∥Proc of the 37th International Conference on Software Engineering,2015:1.
|
[7] |
Yuan D,Mai H,Xiong W,et al.SherLog:Error diagnosis by connecting clues from runtime logs[J]. Acm Sigarch Computer Architecture News,2010,45(1):143154.
|
[8] |
Rabkin A,Xu W,Wildani A,et al.A graphical representation for identifier structure in logs[C]∥Proc of Workshop on Managing Systems via Log Analysis and Machine Learning Techniques (SLAML),2010:1.
|
[9] |
Cinque M,Cotroneo D,Pecchia A.Event logs for the analysis of software failures:A rulebased approach[J].IEEE Transactions on Software Engineering,2013,39(6):806821.
|
[10] |
Pecchia A,Russo S.Detection of software failures through event logs:An experimental study[C]∥Proc of 2012 IEEE 23rd International Symposium on Software Reliability Engineering (ISSRE),2012:3140.
|
[11] |
Kadav A,Renzelmann M J,Swift M M.Tolerating hardware device failures in software[C]∥Proc of the ACM SIGOPS 22nd Symposium on Operating Systems Principles,2009:5972.
|
[12] |
Silva L M.Comparing error detection techniques for web applications:An experimental study[C]∥
|
|
Proc of the 7th IEEE International Symposium on Network Computing and Applications(NCA’08),2008:144151.
|
[13] |
Xiao Hui,Wang Lihua.User identify algorithm in web log mining[J].Computer Systems & Applications,2011,20(5):223226.(in Chinese)
|
[14] |
Song Qinbao, Shen Junyi. Efficient multipropose mining algorithm of web log[J].Journal of Computer Research and Development,2001,38(3):328333.(in Chinese)
|
[15] |
Cheng Miao,Chen Huaping.Web log mining based on Hadoop[J].Computer Engineering,2011,37(11):3739.(in Chinese)
|
[16] |
LLVM
|
|
[EB/OL].[20150816].
|
|
http:∥llvm.org/.
|
[17] |
Wiki[EB/OL].[20150816].http:∥en.m.wikipedia.org/wiki/Usedefine_chain.
|
[18] |
Quinlan J R. C4.5:programs for machine learning[M].New York:Elsevier,2014.
|
[19] |
Geisser S.Predictive inference:An introduction[J].Journal of the Royal Statistical SocietySeries A Statistics in Society,1995,158(1):185.
|
[20] |
Wiki[EB/OL].[20150816].https:∥en.wikipedia.org/wiki/F_score.
|
|
附中文参考文献:
|
[13] |
肖慧,王立华.Web日志挖掘中的用户识别算法[J].计算机系统应用,2011,20(5):223226.
|
[14] |
宋擒豹,沈钧毅.Web日志的高效多能挖掘算法[J].计算机研究与发展,2001,38(3):328333.
|
[15] |
程苗,陈华平.基于 Hadoop 的 Web 日志挖掘[J].计算机工程,2011,37(11):3739.
|