{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,6]],"date-time":"2025-04-06T01:49:09Z","timestamp":1743904149007,"version":"3.37.3"},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319662985"},{"type":"electronic","value":"9783319662992"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-66299-2_14","type":"book-chapter","created":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T07:14:31Z","timestamp":1502867671000},"page":"161-167","source":"Crossref","is-referenced-by-count":6,"title":["Optimising Darwinian Data Structures on Google Guava"],"prefix":"10.1007","author":[{"given":"Michail","family":"Basios","sequence":"first","affiliation":[]},{"given":"Lingbo","family":"Li","sequence":"additional","affiliation":[]},{"given":"Fan","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Leslie","family":"Kanthan","sequence":"additional","affiliation":[]},{"given":"Earl T.","family":"Barr","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,8,17]]},"reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-319-09940-8_21","volume-title":"Search-Based Software Engineering","author":"H Dan","year":"2014","unstructured":"Dan, H., Harman, M., Krinke, J., Li, L., Marginean, A., Wu, F.: Pidgin Crasher: searching for minimised crashing GUI event sequences. In: Goues, C., Yoo, S. (eds.) SSBSE 2014. LNCS, vol. 8636, pp. 253\u2013258. Springer, Cham (2014). doi:\n10.1007\/978-3-319-09940-8_21"},{"key":"14_CR2","doi-asserted-by":"crossref","unstructured":"Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.A.M.T.: A fast and elitist multiobjective genetic algorithm: Nsga-ii. IEEE Trans. Evol. Comput. 6(2), 182\u2013197 (2002)","DOI":"10.1109\/4235.996017"},{"key":"14_CR3","doi-asserted-by":"crossref","unstructured":"Georges, A., Buytaert, D., Eeckhout, L.: Statistically rigorous Java performance evaluation. ACM SIGPLAN Notices 42(10), 57\u201376 (2007)","DOI":"10.1145\/1297105.1297033"},{"key":"14_CR4","unstructured":"Hardin, B.: Companies with \u201chacking\u201d cultures fail (2016). \nhttps:\/\/blog.bretthard.in\/companies-with-hacking-cultures-fail-b8907a69e3d\n\n. Accessed 25 Feb 2017"},{"issue":"8","key":"14_CR5","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1109\/TSE.2002.1027796","volume":"28","author":"BA Kitchenham","year":"2002","unstructured":"Kitchenham, B.A., Pfleeger, S.L., Pickard, L.M., Jones, P.W., Hoaglin, D.C., El Emam, K., Rosenberg, J.: Preliminary guidelines for empirical research in software engineering. IEEE Trans. Softw. Eng. 28(8), 721\u2013734 (2002)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"4","key":"14_CR6","doi-asserted-by":"crossref","first-page":"261","DOI":"10.1145\/356635.356640","volume":"6","author":"DE Knuth","year":"1974","unstructured":"Knuth, D.E.: Structured programming with go to statements. ACM Comput. Surv. 6(4), 261\u2013301 (1974)","journal-title":"ACM Comput. Surv."},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Langdon, W.B., Modat, M., Petke, J., Harman, M.: Improving 3d medical image registration cuda software with genetic programming. In: Proceedings of the 2014 GECCO, pp. 951\u2013958. ACM (2014)","DOI":"10.1145\/2576768.2598244"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"289","DOI":"10.1007\/978-3-319-22183-0_25","volume-title":"Search-Based Software Engineering","author":"L Li","year":"2015","unstructured":"Li, L., Harman, M., Wu, F., Zhang, Y.: SBSelector: search based component selection for budget hardware. In: Barros, M., Labiche, Y. (eds.) SSBSE 2015. LNCS, vol. 9275, pp. 289\u2013294. Springer, Cham (2015). doi:\n10.1007\/978-3-319-22183-0_25"},{"key":"14_CR9","unstructured":"Michail, B., Li, L., Wu, F., Kanthan, L., Lawrence, D., Barr, E.: Darwinian data structure selection. arXiv preprint \narXiv:1706.03232\n\n (2017)"},{"key":"14_CR10","unstructured":"Nowling, R.J.: Gotchas with Scala Mutable Collections and Large Data Sets (2015). \nhttp:\/\/rnowling.github.io\/software\/engineering\/2015\/07\/01\/gotcha-scala-collections.html\n\n. Accessed 18 Feb 2017"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Shacham, O., Vechev, M., Yahav, E.: Chameleon: adaptive selection of collections. In: ACM Sigplan Notices, vol. 44, pp. 408\u2013418. ACM (2009)","DOI":"10.1145\/1542476.1542522"},{"key":"14_CR12","doi-asserted-by":"crossref","unstructured":"Wu, F., Weimer, W., Harman, M., Jia, Y., Krinke, J.: Deep parameter optimisation. In: Proceedings of the 2015 Annual Conference on Genetic and Evolutionary Computation, pp. 1375\u20131382. ACM (2015)","DOI":"10.1145\/2739480.2754648"},{"issue":"6","key":"14_CR13","doi-asserted-by":"crossref","first-page":"419","DOI":"10.1145\/1543135.1542523","volume":"44","author":"X Guoqing","year":"2009","unstructured":"Guoqing, X., Arnold, M., Mitchell, N., Rountev, A., Sevitsky, G.: Go with the flow: profiling copies to find runtime bloat. ACM Sigplan Not. 44(6), 419\u2013430 (2009)","journal-title":"ACM Sigplan Not."},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Xu, G., Rountev, A.: Precise memory leak detection for Java software using container profiling. In: ACM\/IEEE 30th International Conference on Software Engineering, ICSE 2008, pp. 151\u2013160. IEEE (2008)","DOI":"10.1145\/1368088.1368110"}],"container-title":["Lecture Notes in Computer Science","Search Based Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-66299-2_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,8,16]],"date-time":"2017-08-16T07:19:39Z","timestamp":1502867979000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-66299-2_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319662985","9783319662992"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-66299-2_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}