Leveraging Code Clones and Natural Language Processing for Log Statement Prediction
Thu 18 Nov 2021 10:32 - 10:34 at Kangaroo - LBR + DS Poster (2) (Thursday 21:00 - 00:00) Chair(s): Xiaoyin Wang
Software developers embed logging statements inside the source code as an imperative duty in modern software development as log files are necessary for tracking down runtime system issues and troubleshooting system management tasks. Prior research has emphasized the importance of logging statements in the operation and debugging of software systems. However, the current logging process is mostly manual and ad hoc, and thus, proper placement and content of logging statements remain as challenges. To overcome these challenges, methods that aim to automate log placement and log content, i.e., ‘where, what, and how to log’, are of high interest. Thus, in this research, we propose to accomplish the goal of this research, that is “to predict the log statements by utilizing source code clones and natural language processing (NLP)”, with the following four research objectives: (RO1) investigate whether source code clones can be leveraged for log statement location prediction, (RO2) propose a clone-based approach for log statement prediction, (RO3) predict log statement’s description with code-clone and NLP models, and (RO4) examine approaches to automatically predict additional details of log statement, such as its verbosity level and variables. For this purpose, we perform an experimental analysis on seven open-source java projects, extract their method-level code clones, investigate their attributes, and utilize them for log location and description prediction. Our work demonstrates the effectiveness of log-aware clone detection for automated log location and description prediction and outperforms the prior work.
Mon 15 NovDisplayed time zone: Hobart change
09:05 - 10:20 | |||
09:05 15mTalk | A Prediction Model for Software Requirements Change Impact Doctoral Symposium Kareshna Zamani PhD candidate File Attached | ||
09:20 15mTalk | DSInfoSearch: Supporting experimentation process of data scientists Doctoral Symposium Shangeetha Sivasothy Applied Artificial Intelligence Institute, Deakin University File Attached | ||
09:35 15mTalk | Towards the generation of machine learning defect reports Doctoral Symposium Tuan Dung Lai Deakin University Pre-print File Attached | ||
09:50 15mTalk | Leveraging Code Clones and Natural Language Processing for Log Statement Prediction Doctoral Symposium Sina Gholamian University of Waterloo Pre-print | ||
10:05 15mOther | Discussion with presenters Doctoral Symposium |
Thu 18 NovDisplayed time zone: Hobart change
10:00 - 11:00 | LBR + DS Poster (2) (Thursday 21:00 - 00:00)Late Breaking Results / Doctoral Symposium at Kangaroo Chair(s): Xiaoyin Wang University of Texas at San Antonio | ||
10:00 2mTalk | API Compatibility Issue Detection, Testing and Analysis for Android Apps Doctoral Symposium Tarek Mahmud Texas State University File Attached | ||
10:02 2mTalk | Towards the generation of machine learning defect reports Doctoral Symposium Tuan Dung Lai Deakin University Pre-print File Attached | ||
10:04 2mTalk | DSInfoSearch: Supporting experimentation process of data scientists Doctoral Symposium Shangeetha Sivasothy Applied Artificial Intelligence Institute, Deakin University File Attached | ||
10:06 2mTalk | A First Look at the Effect of Deep Learning inCoverage-guided Fuzzing Late Breaking Results Siqi Li Tianjin University, Yun Lin National University of Singapore, Xiaofei Xie Kyushu University, Yuekang Li Nanyang Technological University, Xiaohong Li TianJin University, Weimin Ge Tianjin University, Yang Liu Nanyang Technological University, Jin Song Dong National University of Singapore | ||
10:08 2mTalk | Counterexample Guided Inductive Repair of Reactive Contracts Late Breaking Results Soha Hussein University of Minnesota, USA / Ain Shams University, Egypt, Vaibhav Sharma University of Minnesota, USA, Stephen McCamant University of Minnesota, USA, Sanjai Rayadurgam University of Minnesota, Mats Heimdahl University of Minnesota | ||
10:10 2mTalk | AST-Transformer: Encoding Abstract Syntax TreesEfficiently for Code Summarization Late Breaking Results Ze Tang Software Institute, Nanjing University, Chuanyi Li Software Institute, Nanjing University, Jidong Ge , Xiaoyu Shen Alexa AI, Amazon, Zheling Zhu Software Institute, Nanjing University, Bin Luo Software Institute, Nanjing University | ||
10:12 2mTalk | An Automated Pipeline for Privacy Leak Analysis of Android Applications Doctoral Symposium Yifan Zhou The University of Adelaide File Attached | ||
10:14 2mTalk | Detecting Adversarial Samples with Graph-Guided Testing Late Breaking Results Zuohui Chen Zhejiang University of Technology, Renxuan Wang Zhejiang University of Technology, Jingyang Xiang Zhejiang University of Technology, Yue Yu College of Computer, National University of Defense Technology, Changsha 410073, China, Xin Xia Huawei Software Engineering Application Technology Lab, Shouling Ji Zhejiang University, Qi Xuan Zhejiang University of Technology, Xiaoniu Yang Zhejiang University of Technology | ||
10:16 2mTalk | Using Static Analysis to Address Microservice Architecture Reconstruction Late Breaking Results Vincent Bushong Baylor University, Dipta Das Baylor University, Abdullah Al Maruf Baylor University, Tomas Cerny Baylor University | ||
10:18 2mTalk | Applying Semi-Automated Hyperparameter Tuning for Clustering Algorithms Late Breaking Results Elizabeth Forest James Cook University, Anne Swinbourne James Cook University, Trina Myers Queensland University of Technology, Mitchell Scovell James Cook University Link to publication | ||
10:20 2mTalk | Business Process Extraction Using Static Analysis Late Breaking Results | ||
10:22 2mTalk | Binary Code Similarity Detection Doctoral Symposium Zian Liu Swinburne University of Technology; Data61, CSIRO, Chao Chen James Cook University, Jun Zhang Digital Research & Innovation Capability Platform, Swinburne University of Technology, Dongxi Liu Data61, CSIRO, Muhammad Ejaz Ahmed Data61, CSIRO, Yang Xiang Digital Research & Innovation Capability Platform, Swinburne University of Technology File Attached | ||
10:24 2mTalk | Improving Mutation-Based Fault Localization with Plausible-code Generating Mutation Operators Late Breaking Results | ||
10:26 2mTalk | Using Version Control and Issue Tickets to detect Code Debt and Economical Cost Late Breaking Results Abdullah Al Maruf Baylor University, Noah Lambaria Baylor University, Amr Elsayed Baylor University, Tomas Cerny Baylor University File Attached | ||
10:28 2mTalk | Human-in-the-Loop XAI-enabled Vulnerability Detection, Investigation, and Mitigation Late Breaking Results Tien N. Nguyen University of Texas at Dallas, Kim-Kwang Raymond Choo University of Texas at San Antonio | ||
10:30 2mTalk | A Prediction Model for Software Requirements Change Impact Doctoral Symposium Kareshna Zamani PhD candidate File Attached | ||
10:32 2mTalk | Leveraging Code Clones and Natural Language Processing for Log Statement Prediction Doctoral Symposium Sina Gholamian University of Waterloo Pre-print |