1. [1] D. Yuan, H. Mai, W. Xiong, L. Tan, Y. Zhou, and S. Pasupathy, “SherLog: Error Diagnosis by Connecting Clues from Run-time Logs,” Proc. 15th ACM International Conference on Architectural Support for Programming Languages and Operating Systems (ASPLOS '10), New York, NY, USA, pp.143-154, 2010. 10.1145/1735970.1736038
2. [2] W. Xu, L. Huang, A. Fox, D. Patterson, and M. Jordan, “Detecting Large-Scale System Problems by Mining Console Logs,” Proc. 22nd ACM Symposium on Operating Systems Principles (SOSP '09), Big Sky, MT, 2009. 10.1145/1629575.1629587
3. [3] X. Zhao, Y. Zhang, D. Lion, M.F. Ullah, Y. Luo, D. Yuan, and M. Stumm, “lprof: A non-intrusive request flow profiler for distributed systems,” Proc. 11th USENIX Symposium on Operating Systems Design and Implementation (OSDI '14), Broomfield, CO, pp.629-644, 2014. 10.13140/2.1.1520.0009
4. [4] Q. Fu, J.G. Lou, Y. Wang, and J. Li, “Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis,” Proc. 2009 Ninth IEEE Int. Conf. Data Mining (ICDM '09), 2009. 10.1109/ICDM.2009.60
5. [5] J.G. Lou, Q. Fu, S. Yang, Y. Xu, and J. Li, “Mining invariants from console logs for system problem detection,” Proc. USENIX Annual Technical Conference (ATC '10), 2010.