共 25 条
[1]
[Anonymous], 2015, PROC USENIX ANN TECH
[2]
[Anonymous], 2008, Introduction to information retrieval
[3]
Finding failures by cluster analysis of execution profiles
[J].
PROCEEDINGS OF THE 23RD INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING,
2001,
:339-348
[4]
Mining Historical Issue Repositories to Heal Large-Scale Online Service Systems
[J].
2014 44TH ANNUAL IEEE/IFIP INTERNATIONAL CONFERENCE ON DEPENDABLE SYSTEMS AND NETWORKS (DSN),
2014,
:311-322
[5]
Ding R, 2012, IEEE INT CONF AUTOM, P318, DOI 10.1145/2351676.2351735
[6]
Where Do Developers Log? An Empirical Study on Logging Practices in Industry
[J].
36TH INTERNATIONAL CONFERENCE ON SOFTWARE ENGINEERING (ICSE COMPANION 2014),
2014,
:24-33
[7]
Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis
[J].
2009 9TH IEEE INTERNATIONAL CONFERENCE ON DATA MINING,
2009,
:149-+
[8]
Gower J. C., 1969, APPL STAT, V18, DOI DOI 10.2307/2346439
[9]
Isard M., 2007, P EUROSYS 2007 MAR
[10]
Abstracting Execution Logs to Execution Events for Enterprise Applications
[J].
QSIC 2008: PROCEEDINGS OF THE EIGHTH INTERNATIONAL CONFERENCE ON QUALITY SOFTWARE,
2008,
:181-+