Code search is all you need? improving code suggestions with code search

J Chen, X Hu, Z Li, C Gao, X **a, D Lo - Proceedings of the IEEE/ACM …, 2024 - dl.acm.org
Modern integrated development environments (IDEs) provide various automated code
suggestion techniques (eg, code completion and code generation) to help developers …

Go static: Contextualized logging statement generation

Y Li, Y Huo, R Zhong, Z Jiang, J Liu, J Huang… - Proceedings of the …, 2024 - dl.acm.org
Logging practices have been extensively investigated to assist developers in writing
appropriate logging statements for documenting software behaviors. Although numerous …

Logsd: Detecting anomalies from system logs through self-supervised learning and frequency-based masking

Y **e, H Zhang, MA Babar - Proceedings of the ACM on Software …, 2024 - dl.acm.org
Log analysis is one of the main techniques that engineers use for troubleshooting large-
scale software systems. Over the years, many supervised, semi-supervised, and …

Studying Practitioners' Expectations on Clear Code Review Comments

Z Li, J Chen, Q Mao, X Hu, K Liu, X **a - arxiv preprint arxiv:2410.06515, 2024 - arxiv.org
The code review comment (CRC) is pivotal in the process of modern code review. It provides
reviewers with the opportunity to identify potential bugs, offer constructive feedback, and …

Practitioners' Expectations on Log Anomaly Detection

X Ma, Y Li, J Keung, X Yu, H Zou, Z Yang… - arxiv preprint arxiv …, 2024 - arxiv.org
Log anomaly detection has become a common practice for software engineers to analyze
software system behavior. Despite significant research efforts in log anomaly detection over …

On the inadequacy of open-source application logs for digital forensics

A Azahari, D Balzarotti - Forensic Science International: Digital …, 2024 - Elsevier
This study explores the challenges with utilizing application logs for incident response or
forensic analysis. Application logs have the potential to significantly enhance security …

Discovery of timeline and crowd reaction of software vulnerability disclosures

YW Heng, Z Ma, H Zhang, Z Li - arxiv preprint arxiv:2411.07480, 2024 - arxiv.org
Reusing third-party libraries increases productivity and saves time and costs for developers.
However, the downside is the presence of vulnerabilities in those libraries, which can lead to …

Learning from Mistakes: Understanding Ad-hoc Logs through Analyzing Accidental Commits

YH Chou, Y Min, AY Wang, JA Jones - arxiv preprint arxiv:2501.09892, 2025 - arxiv.org
Developers often insert temporary" print" or" log" instructions into their code to help them
better understand runtime behavior, usually when the code is not behaving as they …

Automated Defects Detection and Fix in Logging Statement

R Zhong, Y Li, J Kuang, W Gu, Y Huo… - arxiv preprint arxiv …, 2024 - arxiv.org
Developers use logging statements to monitor software, but misleading logs can complicate
maintenance by obscuring actual activities. Existing research on logging quality issues is …

Easy over Hard: A Simple Baseline for Test Failures Causes Prediction

Z Gao, Z Xue, X Hu, W Shang, X **a - Companion Proceedings of the …, 2024 - dl.acm.org
The test failure causes analysis is critical since it determines the subsequent way of
handling different types of bugs, which is the prerequisite to get the bugs properly analyzed …