Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey on automated log analysis for reliability engineering
Logs are semi-structured text generated by logging statements in software source code. In
recent decades, software logs have become imperative in the reliability assurance …
recent decades, software logs have become imperative in the reliability assurance …
A survey on explainable anomaly detection
In the past two decades, most research on anomaly detection has focused on improving the
accuracy of the detection, while largely ignoring the explainability of the corresponding …
accuracy of the detection, while largely ignoring the explainability of the corresponding …
Automatic software repair: A survey
Debugging software failures is still a painful, time consuming, and expensive process. For
instance, recent studies showed that debugging activities often account for about 50% of the …
instance, recent studies showed that debugging activities often account for about 50% of the …
Experience report: System log analysis for anomaly detection
Anomaly detection plays an important role in management of modern large-scale distributed
systems. Logs, which record system runtime information, are widely used for anomaly …
systems. Logs, which record system runtime information, are widely used for anomaly …
Automatic anomaly detection in the cloud via statistical learning
Performance and high availability have become increasingly important drivers, amongst
other drivers, for user retention in the context of web services such as social networks, and …
other drivers, for user retention in the context of web services such as social networks, and …
A taxonomy for classifying runtime verification tools
Over the last 20 years, runtime verification (RV) has grown into a diverse and active field,
which has stimulated the development of numerous theoretical frameworks and practical …
which has stimulated the development of numerous theoretical frameworks and practical …
Logflash: Real-time streaming anomaly detection and diagnosis from system logs for large-scale software systems
Today, software systems are getting increasingly large and complex and a short failure time
may cause huge loss. Therefore, it is important to detect and diagnose anomalies accurately …
may cause huge loss. Therefore, it is important to detect and diagnose anomalies accurately …
Logsed: Anomaly diagnosis through mining time-weighted control flow graph in logs
Detecting execution anomalies is very important to monitoring and maintenance of cloud
systems. People often use execution logs for troubleshooting and problem diagnosis, which …
systems. People often use execution logs for troubleshooting and problem diagnosis, which …
Investigating and improving log parsing in practice
Logs are widely used for system behavior diagnosis by automatic log mining. Log parsing is
an important data preprocessing step that converts semi-structured log messages into …
an important data preprocessing step that converts semi-structured log messages into …
An empirical study of the impact of log parsers on the performance of log-based anomaly detection
Log-based anomaly detection plays an essential role in the fast-emerging Artificial
Intelligence for IT Operations (AIOps) of software systems. Many log-based anomaly …
Intelligence for IT Operations (AIOps) of software systems. Many log-based anomaly …