{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:40:04Z","timestamp":1742913604388,"version":"3.40.3"},"publisher-location":"Cham","reference-count":35,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030452339"},{"type":"electronic","value":"9783030452346"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-45234-6_18","type":"book-chapter","created":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T14:04:23Z","timestamp":1587391463000},"page":"357-377","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":6,"title":["Analysis and Refactoring of Software Systems Using Performance Antipattern Profiles"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-2678-9260","authenticated-orcid":false,"given":"Radu","family":"Calinescu","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4507-464X","authenticated-orcid":false,"given":"Vittorio","family":"Cortellessa","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3741-252X","authenticated-orcid":false,"given":"Ioannis","family":"Stefanakos","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7675-6942","authenticated-orcid":false,"given":"Catia","family":"Trubiani","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,17]]},"reference":[{"key":"18_CR1","unstructured":"Aldeida Aleti, Barbora Buhnova, Lars Grunske, Anne Koziolek, and Indika Meedeniya. Software architecture optimization methods: A systematic literature review. IEEE Transactions on Software Engineering, 39(5):658\u2013683, 2012"},{"key":"18_CR2","doi-asserted-by":"crossref","unstructured":"Aldeida Aleti, Catia Trubiani, Andr\u00e9 van Hoorn, and Pooyan Jamshidi. An efficient method for uncertainty propagation in robust software performance estimation. Journal of Systems and Software, 138:222\u2013235, 2018.","DOI":"10.1016\/j.jss.2018.01.010"},{"key":"18_CR3","doi-asserted-by":"crossref","unstructured":"Vahid Alizadeh and Marouane Kessentini. Reducing interactive refactoring effort via clustering-based multi-objective search. In ASE\u201918, pages 464\u2013474, 2018.","DOI":"10.1145\/3238147.3238217"},{"key":"18_CR4","doi-asserted-by":"crossref","unstructured":"Davide Arcelli, Vittorio Cortellessa, and Catia Trubiani. Antipattern-based model refactoring for software performance improvement. In QoSA\u201912, pages 33\u201342, 2012.","DOI":"10.1145\/2304696.2304704"},{"key":"18_CR5","doi-asserted-by":"crossref","unstructured":"Gabriele Bavota, Andrea De Lucia, Massimiliano Di Penta, Rocco Oliveto, and Fabio Palomba. An experimental investigation on the innate relationship between quality and refactoring. Journal of Systems and Software, 107:1\u201314, 2015.","DOI":"10.1016\/j.jss.2015.05.024"},{"key":"18_CR6","doi-asserted-by":"crossref","unstructured":"Simona Bernardi, Jos\u00e9 Merseguer, and Dorina C. Petriu. Dependability modeling and analysis of software systems specified with UML. ACM Comput. Surv., 45(1):2:1\u20132:48, 2012.","DOI":"10.1145\/2379776.2379778"},{"key":"18_CR7","doi-asserted-by":"crossref","unstructured":"Gunter Bolch, Stefan Greiner, Hermann De Meer, and Kishor S Trivedi. Queueing networks and Markov chains: modeling and performance evaluation with computer science applications. John Wiley & Sons, 2006.","DOI":"10.1002\/0471791571"},{"key":"18_CR8","unstructured":"William H Brown, Raphael C Malveau, Hays W McCormick, and Thomas J Mowbray. AntiPatterns: refactoring software, architectures, and projects in crisis. John Wiley & Sons, 1998."},{"key":"18_CR9","doi-asserted-by":"crossref","unstructured":"Axel Busch, Dominik Fuchss, and Anne Koziolek. Peropteryx: Automated improvement of software architectures. In ICSA-C\u201919, pages 162\u2013165, 2019.","DOI":"10.1109\/ICSA-C.2019.00036"},{"key":"18_CR10","doi-asserted-by":"crossref","unstructured":"Radu Calinescu, Carlo Ghezzi, Marta Z. Kwiatkowska, and Raffaela Mirandola. Self-adaptive software needs quantitative verification at runtime. Commun. ACM, 55(9):69\u201377, 2012.","DOI":"10.1145\/2330667.2330686"},{"key":"18_CR11","doi-asserted-by":"crossref","unstructured":"Radu Calinescu, Milan Ceska Jr., Simos Gerasimou, Marta Kwiatkowska, and Nicola Paoletti. Efficient synthesis of robust models for stochastic systems. Journal of Systems and Software, 143:140\u2013158, 2018.","DOI":"10.1016\/j.jss.2018.05.013"},{"key":"18_CR12","doi-asserted-by":"crossref","unstructured":"Radu Calinescu and Shinji Kikuchi. Formal methods @ runtime. In Monterey Workshop, pages 122\u2013135. Springer, 2010.","DOI":"10.1007\/978-3-642-21292-5_7"},{"key":"18_CR13","doi-asserted-by":"crossref","unstructured":"Radu Calinescu and Marta Kwiatkowska. CADS*: Computer-aided development of self-* systems. In FASE\u201909, pages 421\u2013424. Springer, 2009.","DOI":"10.1007\/978-3-642-00593-0_29"},{"key":"18_CR14","doi-asserted-by":"crossref","unstructured":"Radu Calinescu, Danny Weyns, Simos Gerasimou, Muhammad Usman Iftikhar, Ibrahim Habli, and Tim Kelly. Engineering trustworthy self-adaptive software with dynamic assurance cases. IEEE Transactions on Software Engineering, 44(11), 1039\u20131069, 2018.","DOI":"10.1109\/TSE.2017.2738640"},{"key":"18_CR15","doi-asserted-by":"crossref","unstructured":"Xi\u00a0Chen, Zibin Zheng, Qi\u00a0Yu, and Michael R. Lyu. Web service recommendation via exploiting location and qos information. IEEE Trans. Parallel Distrib. Syst., 25(7):1913\u20131924, 2014.","DOI":"10.1109\/TPDS.2013.308"},{"key":"18_CR16","doi-asserted-by":"crossref","unstructured":"Vittorio Cortellessa, Antinisca Di Marco, and Paola Inverardi. Model-Based Software Performance Analysis. Springer, 2011.","DOI":"10.1007\/978-3-642-13621-4"},{"key":"18_CR17","doi-asserted-by":"crossref","unstructured":"Vittorio Cortellessa, Antinisca Di Marco, and Catia Trubiani. An approach for modeling and detecting software performance antipatterns based on first-order logics. Software and Systems Modeling, 13(1):391\u2013432, 2014.","DOI":"10.1007\/s10270-012-0246-z"},{"key":"18_CR18","doi-asserted-by":"crossref","unstructured":"Christian Dehnert, Sebastian Junges, Joost-Pieter Katoen, and Matthias Volk. A storm is coming: A modern probabilistic model checker. In Computer Aided Verification, pages 592\u2013600. Springer International Publishing, 2017.","DOI":"10.1007\/978-3-319-63390-9_31"},{"key":"18_CR19","doi-asserted-by":"crossref","unstructured":"Michalis Famelis and Marsha Chechik. Managing design-time uncertainty. Software and Systems Modeling, 18(2):1249\u20131284, 2019.","DOI":"10.1007\/s10270-017-0594-9"},{"key":"18_CR20","doi-asserted-by":"crossref","unstructured":"Simos Gerasimou, Radu Calinescu, and Giordano Tamburrelli. Synthesis of probabilistic models for quality-of-service software engineering. Autom. Softw. Eng., 25(4):785\u2013831, 2018.","DOI":"10.1007\/s10515-018-0235-8"},{"key":"18_CR21","doi-asserted-by":"crossref","unstructured":"Shadi Ghaith, Miao Wang, Philip Perry, Zhen Ming Jiang, Patrick O\u2019Sullivan, and John Murphy. Anomaly detection in performance regression testing by transaction profile estimation. Softw. Test., Verif. Reliab., 26(1):4\u201339, 2016.","DOI":"10.1002\/stvr.1573"},{"key":"18_CR22","unstructured":"Sunil Kamavaram and Katerina Goseva-Popstojanova. Sensitivity of software usage to changes in the operational profile. In Annual Workshop of NASA Goddard Software Engineering, pages 157\u2013164, 2003."},{"key":"18_CR23","doi-asserted-by":"crossref","unstructured":"Arijit Khan, Xifeng Yan, Shu Tao, and Nikos Anerousis. Workload characterization and prediction in the cloud: A multiple time series approach. In NOMS\u201912, pages 1287\u20131294, 2012.","DOI":"10.1109\/NOMS.2012.6212065"},{"key":"18_CR24","doi-asserted-by":"crossref","unstructured":"M. Kwiatkowska, G. Norman, and D. Parker. PRISM 4.0: Verification of probabilistic real-time systems. In CAV\u201911, volume 6806 of LNCS, pages 585\u2013591, 2011.","DOI":"10.1007\/978-3-642-22110-1_47"},{"key":"18_CR25","doi-asserted-by":"crossref","unstructured":"Adrian Nistor, Po-Chun Chang, Cosmin Radoi, and Shan Lu. Caramel: Detecting and fixing performance problems that have non-intrusive fixes. In ICSE\u201915, pages 902\u2013912, 2015.","DOI":"10.1109\/ICSE.2015.100"},{"key":"18_CR26","unstructured":"Ali Ouni, Marouane Kessentini, Mel \u00d3 Cinn\u00e9ide, Houari A. Sahraoui, Kalyanmoy Deb, and Katsuro Inoue. MORE: A multi-objective refactoring recommendation approach to introducing design patterns and fixing code smells. Journal of Software: Evolution and Process, 29(5), 2017."},{"key":"18_CR27","doi-asserted-by":"crossref","unstructured":"S\u00fcleyman \u00d6zekici and Refik Soyer. Reliability of software with an operational profile. European Journal of Operational Research, 149(2):459\u2013474, 2003.","DOI":"10.1016\/S0377-2217(02)00461-7"},{"key":"18_CR28","doi-asserted-by":"crossref","unstructured":"Sebastian Ruland, G\u00e9za Kulcs\u00e1r, Erhan Leblebici, Sven Peldszus, and Malte Lochau. Controlling the attack surface of object-oriented refactorings. In FASE\u201918, pages 38\u201355, 2018.","DOI":"10.1007\/978-3-319-89363-1_3"},{"key":"18_CR29","doi-asserted-by":"crossref","unstructured":"Martina De Sanctis, Catia Trubiani, Vittorio Cortellessa, Antinisca Di Marco, and Mirko Flamminj. A model-driven approach to catch performance antipatterns in ADL specifications. Information & Software Technology, 83:35\u201354, 2017.","DOI":"10.1016\/j.infsof.2016.11.008"},{"key":"18_CR30","unstructured":"Carol Smidts, Chetan Mutha, Manuel Rodr\u00edguez, and Matthew J Gerber. Software testing with an operational profile: Op definition. ACM Computing Surveys (CSUR), 46(3):39, 2014."},{"key":"18_CR31","unstructured":"Connie U. Smith and Lloyd G. Williams. Software performance antipatterns for identifying and correcting performance problems. In CMG\u201912, 2012."},{"key":"18_CR32","doi-asserted-by":"crossref","unstructured":"Mirco Tribastone, Stephen Gilmore, and Jane Hillston. Scalable differential analysis of process algebra models. IEEE Trans. Software Eng., 38(1):205\u2013219, 2012.","DOI":"10.1109\/TSE.2010.82"},{"key":"18_CR33","doi-asserted-by":"crossref","unstructured":"Kishor S. Trivedi and Andrea Bobbio. Reliability and Availability Engineering - Modeling, Analysis,and Applications. Cambridge University Press, 2017.","DOI":"10.1017\/9781316163047"},{"key":"18_CR34","unstructured":"Alexander Wert, Jens Happe, and Lucia Happe. Supporting swift reaction: automatically uncovering performance problems by systematic experiments. In ICSE\u201913, pages 552\u2013561, 2013."},{"key":"18_CR35","doi-asserted-by":"crossref","unstructured":"Xiao Yu, Shi Han, Dongmei Zhang, and Tao Xie. Comprehending performance from real-world execution traces: Adevice-driver case. In ACM SIGPLAN Notices, volume 49, pages 193\u2013206, 2014.","DOI":"10.1145\/2644865.2541968"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-45234-6_18","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,8,11]],"date-time":"2020-08-11T12:22:40Z","timestamp":1597148560000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-45234-6_18"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030452339","9783030452346"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-45234-6_18","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"17 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FASE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Fundamental Approaches to Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dublin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ireland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fase2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.etaps.org\/2020\/fase","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"81","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference could not take place due to the COVID-19 pandemic. There was an online event on July 2, 2020.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}