1Coverity. Coverity Scan: 2012 Open Source Report. 2013. http://www.coverity.com/.
2Yuan D, Park S, Huang P, Liu Y, Lee MM, Tang X, Zhou Y, Savage S. Be conservative: enhancing failure diagnosis with proactive logging. In: Proe. of the 10th Syrup. on Operating Systems Design and Implementation (OSDI). 2012. 293-306.
3Yuan D, Park S, Zhou Y. Characterizing logging practices in open-source software. In: Proc. of the 2012 Int'l Conf. on Software Engineering. 2012. 102-112. [doi: 10.1109/ICSE.2012.6227202].
4Kavulya SP, Joshi K, Di Giandomenico F, Narasimhan P. Failure Diagnosis of Complex Systems, Resilience Assessment and Evaluation of Computing Systems. Springer-Verlag, 2012. 239-261. [doi: 10.1007/978-3-642-29032-9].
5Fu Q, Zhu J, Hu W, Lou JG, Ding R, Lin Q, Zhang D, Xie T. Where do developers log? An empirical study on logging practices in industry. In: Proc. of the 36th Int'l Conf. on Software Engineering. 2014.24-33. [doi: 10.1145/2591062.2591175 ].
6Jiang W, Hu C, Pasupathy S, Kanevsky A, Li Z, Zhou Y. Understanding Customer Problem Troubleshooting from Storage System Logs. In: Proc. of the 7th USENIX Conf. on File and Storage Technologies (FAST). 2009.43-56.
7Prewett JE. Analyzing cluster log files using logsurfer. In: Proc. of the 4th Annual Conf. on Linux Clusters. 2003.
8Hellerstein JL, Ma S, Perng CS. Discovering actionable patterns in event data. IBM Systems Journal, 2002,41(3):475-493. [doi: 10. 1147/sj.413.0475].
9Ma S, Hellerstein JL. Mining partially periodic event patterns with unknown periods. In: Proc. of the 17th Int'l Conf. on Data Engineering. 2001. 205-214. [doi: 10.1109/ICDE.2001.914829].
10Yamanishi K, Maruyama Y. Dynamic syslog mining for network failure monitoring, In: Proc. of the 11th ACM SIGKDD Int'l Conf. on Knowledge Discovery in Data Mining. 2005.499-508. [doi: 10.1145/1081870.1081927].