Skip to content

Commit

Permalink
format publication
Browse files Browse the repository at this point in the history
  • Loading branch information
JinYang88 committed Jun 5, 2018
1 parent 6284132 commit 6be7276
Showing 1 changed file with 31 additions and 83 deletions.
114 changes: 31 additions & 83 deletions docs/publication.md
Original file line number Diff line number Diff line change
Expand Up @@ -2,97 +2,45 @@ Publications
============

1. [**ICPC'18**] Salma Messaoudi, Annibale Panichella, Domenico Bianculli, Lionel Briand, Raimondas Sasnauskas. [A Search-based Approach for Accurate Identification of Log Message Formats](http://publications.uni.lu/bitstream/10993/35286/1/ICPC-2018.pdf), *IEEE/ACM International Conference on Program Comprehension (ICPC)*, 2018.
1. **[ICMD'18]** Gao Y, Huang S, Parameswaran A. [Navigating the Data Lake with Datamaran: Automatically Extracting Structure from Log Datasets](https://arxiv.org/pdf/1708.08905.pdf), *InProceedings of the 2018 International Conference on Management of Data (ICMD)*, 2018.

1. [**ICWS'17**] Pinjia He, Jieming Zhu, Zibin Zheng, and Michael R. Lyu. [Drain: An Online Log Parsing Approach with Fixed Depth Tree](http://jiemingzhu.github.io/pub/pjhe_icws2017.pdf), *IEEE International Conference on Web Services (ICWS)*, 2017.

1. **[ISDFS'17]**Thaler S, Menkonvski V, Petkovic M. [Towards a neural language model for signature extraction from forensic logs](https://ieeexplore.ieee.org/abstract/document/7916497/), *InDigital Forensic and Security (ISDFS), 2017*
1. [**ICWS'17**] Pinjia He, Jieming Zhu, Zibin Zheng, and Michael R. Lyu. [Drain: An Online Log Parsing Approach with Fixed Depth Tree](http://jiemingzhu.github.io/pub/pjhe_icws2017.pdf), *IEEE International Conference on Web Services (ICWS)*, 2017.
1. [**ICDM'16**] Min Du, Feifei Li. [Spell: Streaming Parsing of System Event Logs](https://www.cs.utah.edu/~lifeifei/papers/spell.pdf), *IEEE International Conference on Data Mining (ICDM)*, 2016.

1. **[MILCOM'16]** Vaarandi R, Kont M, Pihelgas M. [Event log analysis with the LogCluster tool](https://ieeexplore.ieee.org/abstract/document/7795458/). *InMilitary Communications Conference (MILCOM)*, 2016.
1. **[KDD'16]** Nandi A, Mandal A, Atreja S, Dasgupta GB, Bhattacharya S. [Anomaly detection using program control flow graph mining from execution logs](https://pdfs.semanticscholar.org/cc2c/1755d4fd55a25d924894afdf5090c5bdaf6f.pdf), *InProceedings of the 22nd ACM SIGKDD International Conference on Knowledge Discovery and Data Mining (KDD)*, 2016.
1. **[arXiv'16]** Shima K. [Length Matters: Clustering System Log Messages using Length of Words](https://arxiv.org/pdf/1611.03213), *arXiv preprint arXiv:1611.03213 (arXiv)*, 2016.
1. **[ICKM'16]** Hamooni H, Debnath B, Xu J, Zhang H, Jiang G, Mueen A. [LogMine: Fast Pattern Recognition for Log Analytics](https://pdfs.semanticscholar.org/8de8/a4b5193200d332aa4c86956bffbdac758194.pdf), *InProceedings of the 25th ACM International on Conference on Information and Knowledge Management (ICKM)*, 2016.
1. **[IDPSW'16]** [Zhao Y, Xiao H. Extracting log patterns from system logs in LARGE](http://web.cse.ohio-state.edu/~lu.932/hpbdc2016/slides/hpbdc16-zhao.pdf), *InParallel and Distributed Processing Symposium Workshops (IDPSW)*, 2016
1. **[MILCOM'15]** Ya J, Liu T, Zhang H, Shi J, Guo L. [An automatic approach to extract the formats of network and security log messages](http://or.nsfc.gov.cn/bitstream/00001903-5/420617/1/1000014323760.pdf), *InMilitary Communications Conference, (MILCOM)*, 2015
1. [**CNSM'15**] Risto Vaarandi, Mauno Pihelgas. [LogCluster - A Data Clustering and Pattern Mining Algorithm for Event Logs](http://ristov.github.io/publications/cnsm15-logcluster-web.pdf), *International Conference on Network and Service Management (CNSM)*, 2015.

1. [**CNSM'15**] Keiichi Shima. [Length Matters: Clustering System Log Messages using Length of Words](https://arxiv.org/pdf/1611.03213.pdf), *International Conference on Network and Service Management (CNSM)*, 2015.

1. **[CNSM'15]** Kimura T, Watanabe A, Toyono T, Ishibashi K. [Proactive failure detection learning generation patterns of large-scale network logs](https://pdfs.semanticscholar.org/6b9d/2b40529b4464fdfffded76aff0d89704f9e5.pdf), *InNetwork and Service Management (CNSM)*, 2015.
1. **['14]** Ning X, Jiang G. [HLAer:a System for Heterogeneous Log Analysis](https://pdfs.semanticscholar.org/236d/9c76dbaa6e2e07ef6d17a8f3cc4fac6e1e55.pdf), *in SDM Workshop on Heterogeneous Learning*, 2014.
1. **[MSR'14]** Khodabandelou G, Hug C, Deneckère R, Salinesi C. [Unsupervised discovery of intentional process models from event logs](https://hal-paris1.archives-ouvertes.fr/hal-00994197/file/msr2014_submission_25.pdf), *InProceedings of the 11th Working Conference on Mining Software Repositories (MSR)*, 2014.
1. **[FIT'14]** Kobayashi S, Fukuda K, Esaki H. [Towards an NLP-based log template generation algorithm for system log analysis](http://sat.hongo.wide.ad.jp/cfi2014.pdf),*InProceedings of The Ninth International Conference on Future Internet Technologies (FIT)*, 2014 .
1. **['14]** Joshi B. [A data streaming algorithm for signature generation and clustering of log messages](https://www.researchgate.net/profile/Basanta_Joshi2/publication/307136529_A_data_streaming_algorithm_for_signature_generation_and_clustering_of_log_messages/links/57c2552308ae2f5eb334caa8.pdf), 2014.
1. **[CIKM'13]** Tang L, Li T, Chen SC, Zhu S. [Searching similar segments over textual event sequences](http://www.dtic.mil/get-tr-doc/pdf?AD=AD1022236), *InProceedings of the 22nd ACM international conference on Information & Knowledge Management (CIKM)*, 2013
1. **['13]** Zulkernine F, Martin P, Powley W, Soltani S, Mankovskii S, Addleman M. [Capri: A tool for mining complex line patterns in large log data](http://www.academia.edu/download/46095186/Capri_KDD_BigMine.pdf), *InProceedings of the 2nd International Workshop on Big Data, Streams and Heterogeneous Source Mining: Algorithms, Systems, Programming Models and Applications ()*, 2013
1. [**TKDE'12**] Adetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos E. Milios. [A Lightweight Algorithm for Message Type Extraction in System Application Logs](http://ieeexplore.ieee.org/abstract/document/5936060/), *IEEE Transactions on Knowledge and Data Engineering (TKDE)*, 2012.
1. **[CIKM,11]** Liang Tang, Tao Li, Chang-Shing Perng. [LogSig: Generating System Events from Raw Textual Logs](http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.222.9320&rep=rep1&type=pdf), *ACM International Conference on Information and Knowledge Management (CIKM)*, 2011.
1. **[ICPP'11]** Gainaru A, Cappello F, Trausan-Matu S, Kramer B. [Event log mining tool for large scale HPC systems](https://link.springer.com/chapter/10.1007/978-3-642-23400-2_6), *InEuropean Conference on Parallel Processing (ICPP)*, 2011.
1. **[SIGOPS'10]** Zhu KQ, Fisher K, Walker D. [Incremental learning of system log formats](http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.153.2089&rep=rep1&type=pdf), *ACM SIGOPS Operating Systems Review (SIGOPS)*, 2010.
1. **[MSR'10]** Meiyappan Nagappan, Mladen A. Vouk. [Abstracting Log Lines to Log Event Types for Mining Software System Logs](http://www.se.rit.edu/~mei/publications/pdfs/Abstracting-Log-Lines-to-Log-Event-Types-for-Mining-Software-System-Logs.pdf), *International Working Conference on Mining Software Repositories (MSR)*, 2010.
1. **[MSR'10]** Nagappan M, Vouk MA. [Abstracting log lines to log event types for mining software system logs](https://cs.uwaterloo.ca/~m2nagapp/publications/pdfs/Abstracting-Log-Lines-to-Log-Event-Types-for-Mining-Software-System-Logs.pdf), *InMining Software Repositories (MSR)*, 2010.
1. **[ICDM'10]** Tang L, Li T. [LogTree: A framework for generating system events from raw textual logs](http://users.cis.fiu.edu/~lpeng/log/1_LogTree%20A%20Framework%20for%20Generating%20System%20Events%20from%20Raw%20Textual%20Logs.pdf), *InData Mining (ICDM)*, 2010.
1. **[KDD'09]** Adetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos E. Milios. [Clustering Event Logs Using Iterative Partitioning](https://web.cs.dal.ca/~makanju/publications/paper/kdd09.pdf), *Proceedings of ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD)*, 2009.
1. **[ICDM'09]** Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li. [Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis](https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/DM790-CR.pdf), *Proceedings of IEEE International Conference on Data Mining (ICDM)*, 2009.
1. **[SOSP'09]** Xu W, Huang L, Fox A, Patterson D, Jordan M. [Largescale system problem detection by mining console logs](http://nma.berkeley.edu/ark:/28722/bk0005k9b6k), *Proceedings of SOSP*, 2009.
1. **[ISSRE'09]** Nagappan M, Wu K, Vouk MA. [Efficiently extracting operational profiles from execution logs using suffix arrays](http://www.se.rit.edu/~mei/publications/publications/issre_Nagappan.pdf), *InSoftware Reliability Engineering (ISSRE)*, 2009.
1. **[JSEP'08]** Jiang ZM, Hassan AE, Hamann G, Flora P. [An automated approach for abstracting execution logs to execution events](http://sail.cs.queensu.ca/Downloads/JSME_AnAutomatedApproachForAbstractingExecutionLogsToExecutionEvents.pdf), *Journal of Software: Evolution and Process (JSEP)*, 2008.
1. **[QSIC'08]** Jiang ZM, Hassan AE, Flora P, Hamann G. [Abstracting execution logs to execution events for enterprise applications](https://www.researchgate.net/profile/Ahmed_E_Hassan/publication/4366728_Abstracting_Execution_Logs_to_Execution_Events_for_Enterprise_Applications_Short_Paper/links/5577f2cf08aeacff200054cd.pdf), *InQuality Software, 2008. QSIC'08. The Eighth International Conference (QSIC)*, 2018.
1. **[NOMS'08]** Vaarandi R. [Mining event logs with slct and loghound](http://ieeexplore.ieee.org/abstract/document/4575281/), *InNetwork Operations and Management Symposium, (NOMS)*, 2008.
1. **[ICS'04]** Vaarandi R. [A breadth-first algorithm for mining frequent patterns from event logs](https://link.springer.com/content/pdf/10.1007/978-3-540-30179-0_27.pdf), *InIntelligence in Communication Systems (ICS)*, 2004.
1. **[IPOM'03]** Risto Vaarandi. [A Data Clustering Algorithm for Mining Patterns from Event Logs](http://www.quretec.com/u/vilo/edu/2003-04/DM_seminar_2003_II/ver1/P12/slct-ipom03-web.pdf), *Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM)*, 2003.

1. Liang Tang, Tao Li, Chang-Shing Perng. [LogSig: Generating System Events from Raw Textual Logs](http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.222.9320&rep=rep1&type=pdf), *ACM International Conference on Information and Knowledge Management (CIKM)*, 2011.

1. Meiyappan Nagappan, Mladen A. Vouk. [Abstracting Log Lines to Log Event Types for Mining Software System Logs](http://www.se.rit.edu/~mei/publications/pdfs/Abstracting-Log-Lines-to-Log-Event-Types-for-Mining-Software-System-Logs.pdf), *International Working Conference on Mining Software Repositories (MSR)*, 2010.





1. Adetokunbo Makanju, A. Nur Zincir-Heywood, Evangelos E. Milios. [Clustering Event Logs Using Iterative Partitioning](https://web.cs.dal.ca/~makanju/publications/paper/kdd09.pdf), *Proceedings of ACM SIGKDD Conference on Knowledge Discovery and Data Mining (KDD)*, 2009.

1. Qiang Fu, Jian-Guang Lou, Yi Wang, Jiang Li. [Execution Anomaly Detection in Distributed Systems through Unstructured Log Analysis](https://www.microsoft.com/en-us/research/wp-content/uploads/2016/02/DM790-CR.pdf), *Proceedings of IEEE International Conference on Data Mining (ICDM)*, 2009.

1. Risto Vaarandi. [A Data Clustering Algorithm for Mining Patterns from Event Logs](http://www.quretec.com/u/vilo/edu/2003-04/DM_seminar_2003_II/ver1/P12/slct-ipom03-web.pdf), *Proceedings of the 3rd IEEE Workshop on IP Operations & Management (IPOM)*, 2003.

1. A. Gainaru, F. Cappello, S. Trausan-Matu, B. Kramer. Event Log Mining Tool for Large Scale HPC Systems, in Euro-Par, 2011.

1. H. C. Xia Ning, Geoff Jiang, K. Yoshihira. HLAer:a System for Heterogeneous Log Analysis, in SDM Workshop on Heterogeneous Learning, 2014.

1. 2016-[CIKM] LogMine:Fast Pattern Recognition for Log Analytics,

1. 2016-[KDD] Anomaly Detection Using Program Control Flow Graph Mining from Execution Logs

1. 2016 - Extracting Log Patterns from System Logs in LARGE

1. 2015 - An Automatic Approach to Extract the Formats of Network and Security Log Messages


1. 2014-[MSR] - Unsupervised Discovery of Intentional Process Models from Event Logs

1. 2014 - Towards an NLP-based Log Template Generation Algorithm for System Log Analysis

1. 2013-[CIKM] - Searching Similar Segments over Textual Event Sequences

1. 2013-[BigMine] - CAPRI:A Tool for Mining Complex Line Patterns in Large Log Data

1. 2011 - Event Log Mining Tool for Large Scale HPC Systems

1. 2010-[SIGOPS OS Review] - Incremental Learning of System Log Formats

1. 2010-[MSR] - Abstracting Log Lines to Log Event Types for Mining Software System Logs

1. 2010-[ICDM] - LogTree:A Framework for Generating System Events from Raw Textual Logs

1. 2008 - An automated approach for abstracting execution logs to execution events

1. 2008 - Abstracting Execution Logs to Execution Events for Enterprise Applications

1. Proactive Failure Detection Learning Generation Patterns of Large-scale Network Logs

1. [2004] A Breadth-First Algorithm for Mining Frequent Patterns from Event Logs

1. [2008][NOMS] Mining Event Logs with SLCT and Loghound

1. [2009][SOSP] Large-Scale System Problem Detection by Mining Console Logs

1. [2009][ISSRE] Efficiently Extracting Operational Profiles from Execution Logs Using Suffix Arrays

1. [2010] Incremental Learning of System Log Formats

1. [2016] Event Log Analysis with the LogCluster Tool

1. [2017] Towards a Neural Language Model for Signature Extraction from Forensic Logs

1. 2013-[BigMine] - CAPRI:A Tool for Mining Complex Line Patterns in Large Log Data

1. 2014 - Towards an NLP-based Log Template Generation Algorithm for System Log Analysis

1. T. Kimura, A. Watanabe, T. Toyono, and
K. Ishibashi. Proactive Failure Detection Learning
Generation Patterns of Large-scale Network
Logs. In Proceedings of the 11th International
Conference on Network and Service Management
(CNSM 2015), pages 8–14, Nov 2015.

1. 2016-[KDD] - Anomaly Detection Using Program Control Flow Graph Mining from Execution Logs

1. A data streaming algorithm for signature generation and clustering of log messages

1. Length Matters: Clustering System Log Messages using Length of Words



1. Navigating the Data Lake with Datamaran: Automatically Extracting Structure from Log Datasets

0 comments on commit 6be7276

Please sign in to comment.