{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T19:10:02Z","timestamp":1748545802865,"version":"3.41.0"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319221823"},{"type":"electronic","value":"9783319221830"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22183-0_3","type":"book-chapter","created":{"date-parts":[[2015,7,27]],"date-time":"2015-07-27T11:55:37Z","timestamp":1437998137000},"page":"31-46","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Amortised Optimisation of Non-functional Properties in Production Environments"],"prefix":"10.1007","author":[{"given":"Shin","family":"Yoo","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,28]]},"reference":[{"key":"3_CR1","unstructured":"CPUBoss: a benchmark comparison between Xeon W3680 and Core-i7 3820QM. http:\/\/cpuboss.com\/cpus\/Intel-Xeon-W3680-vs-Intel-Core-i7-3820QM"},{"issue":"6","key":"3_CR2","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1016\/j.infsof.2008.12.005","volume":"51","author":"W Afzal","year":"2009","unstructured":"Afzal, W., Torkar, R., Feldt, R.: A systematic review of search-based testing for non-functional system properties. Inf. Softw. Technol. 51(6), 957\u2013976 (2009)","journal-title":"Inf. Softw. Technol."},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Bolz, C.F., Cuni, A., Fijalkowski, M., Rigo, A.: Tracing the meta-level: Pypy\u2019s tracing JIT compiler. In: Proceedings of the 4th Workshop on the Implementation, Compilation, Optimization of Object-Oriented Languages and Programming Systems, ICOOOLPS 2009, pp. 18\u201325. ACM, New York (2009)","DOI":"10.1145\/1565824.1565827"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Briand, L.C., Labiche, Y., Shousha, M.: Stress testing real-time systems with genetic algorithms. In: Proceedings of the Genetic and Evolutionary Computation Conference, GECCO 2005, pp. 1021\u20131028 (2005)","DOI":"10.1145\/1068009.1068183"},{"key":"3_CR5","doi-asserted-by":"crossref","unstructured":"Budynek, J., Bonabeau, E., Shargel, B.: Evolving computer intrusion scripts for vulnerability assessment and log analysis. In: Proceedings of the Genetic and Evolutionary Computation Conference, GECCO 2005, pp. 1905\u20131912 (2005)","DOI":"10.1145\/1068009.1068331"},{"key":"3_CR6","unstructured":"Canfora, G., Penta, M.D., Esposito, R., Villani, M.L.: An approach for QoS-aware service composition based on genetic algorithms. In: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation (GECCO 2005), pp. 1069\u20131075. ACM, Washington, D.C., 25\u201329 June 2005"},{"key":"3_CR7","volume-title":"Elementary Matrix Theory","author":"H Eves","year":"1980","unstructured":"Eves, H.: Elementary Matrix Theory. Dover Publication, New York (1980)"},{"key":"3_CR8","unstructured":"Gro\u00df, H.G.: An evaluation of dynamic, optimisation-based worst-case execution time analysis. In: ITPC 2003: Proceedings of the International Conference on Information Technology: Prospects and Challenges in the 21st Century, Kathmandu, pp. 8\u201314 (2003)"},{"key":"3_CR9","doi-asserted-by":"crossref","unstructured":"Grosso, C.D., Antoniol, G., Penta, M.D., Galinier, P., Merlo, E.: Improving network applications security: a new heuristic to generate stress testing data. In: Proceedings of the 2005 Conference on Genetic and Evolutionary Computation (GECCO 2005), pp. 1037\u20131043. ACM, Washington, D.C., 25\u201329 June 2005","DOI":"10.1145\/1068009.1068185"},{"issue":"10","key":"3_CR10","doi-asserted-by":"publisher","first-page":"3125","DOI":"10.1016\/j.cor.2007.01.013","volume":"35","author":"CD Grosso","year":"2008","unstructured":"Grosso, C.D., Antoniol, G., Merlo, E., Galinier, P.: Detecting buffer overflow via automatic test input data generation. Comput. Oper. Res. 35(10), 3125\u20133143 (2008)","journal-title":"Comput. Oper. Res."},{"key":"3_CR11","doi-asserted-by":"crossref","unstructured":"Hosek, P., Cadar, C.: Safe software updates via multi-version execution. In: Proceedings of the 2013 International Conference on Software Engineering, ICSE 2013, pp. 612\u2013621. IEEE Press, Piscataway (2013)","DOI":"10.1109\/ICSE.2013.6606607"},{"key":"3_CR12","doi-asserted-by":"crossref","unstructured":"Kruse, P.M., Wegener, J., Wappler, S.: A highly configurable test system for evolutionary black-box testing of embedded systems. In: Proceedings of the Genetic and Evolutionary Computation Conference, GECCO 2009, pp. 1545\u20131552 (2009)","DOI":"10.1145\/1569901.1570108"},{"issue":"1","key":"3_CR13","doi-asserted-by":"publisher","first-page":"118","DOI":"10.1109\/TEVC.2013.2281544","volume":"19","author":"W Langdon","year":"2015","unstructured":"Langdon, W., Harman, M.: Optimizing existing software with genetic programming. Trans. Evol. Comput. 19(1), 118\u2013135 (2015)","journal-title":"Trans. Evol. Comput."},{"key":"3_CR14","doi-asserted-by":"crossref","unstructured":"Penta, M.D., Canfora, G., Esposito, G., Mazza, V., Bruno, M.: Search-based testing of service level agreements. In: Proceedings of the Genetic and Evolutionary Computation, GECCO 2007, pp. 1090\u20131097 (2007)","DOI":"10.1145\/1276958.1277174"},{"key":"3_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"137","DOI":"10.1007\/978-3-662-44303-3_12","volume-title":"Genetic Programming","author":"J Petke","year":"2014","unstructured":"Petke, J., Harman, M., Langdon, W.B., Weimer, W.: Using genetic improvement and code transplants to specialise a C++ program to a problem class. In: Nicolau, M., Krawiec, K., Heywood, M.I., Castelli, M., Garc\u00eda-S\u00e1nchez, P., Merelo, J.J., Rivas Santos, V.M., Sim, K. (eds.) EuroGP 2014. LNCS, vol. 8599, pp. 137\u2013149. Springer, Heidelberg (2014)"},{"key":"3_CR16","unstructured":"Pohlheim, H., Wegener, J.: Testing the temporal behavior of real-time software modules using extended evolutionary algorithms. In: Proceedings of the Genetic and Evolutionary Computation Conference, pp. 1795\u20131802, July 1999"},{"key":"3_CR17","unstructured":"Torres, M.: Pypy Speed Centre. http:\/\/speed.pypy.org\/"},{"issue":"3","key":"3_CR18","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1023\/A:1008096431840","volume":"15","author":"J Wegener","year":"1998","unstructured":"Wegener, J., Grochtmann, M.: Verifying timing constraints of real-time systems by means of evolutionary testing. Real-Time Syst. 15(3), 275\u2013298 (1998)","journal-title":"Real-Time Syst."},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Wu, F., Weimer, W., Harman, M., Jia, Y., Krinke, J.: Deep parameter optimisation. In: Genetic and Evolutionary Computation Conference (2015, to appear)","DOI":"10.1145\/2739480.2754648"}],"container-title":["Lecture Notes in Computer Science","Search-Based Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22183-0_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,29]],"date-time":"2025-05-29T18:54:48Z","timestamp":1748544888000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22183-0_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319221823","9783319221830"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22183-0_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}