{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T21:11:34Z","timestamp":1725570694628},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642173578"},{"type":"electronic","value":"9783642173585"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-31875-7_41","type":"book-chapter","created":{"date-parts":[[2012,7,19]],"date-time":"2012-07-19T13:51:09Z","timestamp":1342705869000},"page":"307-320","source":"Crossref","is-referenced-by-count":0,"title":["Performance Analysis and Problem Determination in SOA Environments"],"prefix":"10.1007","author":[{"given":"Vijay","family":"Mann","sequence":"first","affiliation":[]},{"given":"Venkateswara R.","family":"Madduri","sequence":"additional","affiliation":[]},{"given":"Srividya","family":"Shamaiah","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"41_CR1","unstructured":"Heap fragmentation with IBM 1.3.1 and 1.4.2 JVMs, http:\/\/www-01.ibm.com\/support\/docview.wss?uid=swg21196072"},{"key":"41_CR2","unstructured":"Java Diagnostics Guide 1.4.2 - Common causes of perceived leaks, http:\/\/publib.boulder.ibm.com\/infocenter\/javasdk\/v1r4m2\/topic\/com.ibm.java.doc.diagnostics.142\/html\/commoncausesofleaks.html"},{"key":"41_CR3","unstructured":"Java Diagnostics Guide 1.4.2 - verbose GC outut from a compaction, http:\/\/publib.boulder.ibm.com\/infocenter\/javasdk\/v1r4m2\/index.jsp?topic=\/com.ibm.java.doc.diagnostics.142\/html\/id1156.html"},{"key":"41_CR4","unstructured":"JDBC 4.0 API Specification Final Release - JSR-000221, http:\/\/java.sun.com\/products\/jdbc\/download.html"},{"key":"41_CR5","unstructured":"Mash that trash \u2013 Incremental compaction in the IBM JDK Garbage Collector, http:\/\/www.ibm.com\/developerworks\/ibm\/library\/i-incrcomp\/index.html"},{"key":"41_CR6","unstructured":"Retained and Shallow Heap, http:\/\/www.yourkit.com\/docs\/90\/help\/sizes.jsp"},{"key":"41_CR7","unstructured":"RUBiS Homepage, http:\/\/rubis.ow2.org\/"},{"key":"41_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"161","DOI":"10.1007\/11907466_14","volume-title":"Large Scale Management of Distributed Systems","author":"M.K. Agarwal","year":"2006","unstructured":"Agarwal, M.K., Sachindran, N., Gupta, M., Mann, V.: Fast Extraction of Adaptive Change Point Based Patterns for Problem Resolution in Enterprise Systems. In: State, R., van der Meer, S., O\u2019Sullivan, D., Pfeifer, T. (eds.) DSOM 2006. LNCS, vol.\u00a04269, pp. 161\u2013172. Springer, Heidelberg (2006)"},{"key":"41_CR9","doi-asserted-by":"crossref","unstructured":"Cecchet, E., Marguerite, J., Zwaenepoel, W.: Performance and Scalability of EJB Applications. In: ACM OOPSLA (November 2002)","DOI":"10.1145\/582419.582443"},{"key":"41_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"383","DOI":"10.1007\/978-3-642-22655-7_18","volume-title":"ECOOP 2011 \u2013 Object-Oriented Programming","author":"A.E. Chis","year":"2011","unstructured":"Chis, A.E., Mitchell, N., Schonberg, E., Sevitsky, G., O\u2019Sullivan, P., Parsons, T., Murphy, J.: Patterns of Memory Inefficiency. In: Mezini, M. (ed.) ECOOP 2011. LNCS, vol.\u00a06813, pp. 383\u2013407. Springer, Heidelberg (2011)"},{"key":"41_CR11","doi-asserted-by":"crossref","unstructured":"Jump, M., McKinley, K.: Cork: dynamic memory leak detection for garbage-collected languages. In: Symposium on Principles of Programming Languages, POPL (2007)","DOI":"10.1145\/1190216.1190224"},{"key":"41_CR12","doi-asserted-by":"crossref","unstructured":"Mann, V., Agarwal, M.K., Gupta, M., Sachindran, N.: Problem Determination in Enterprise Middleware Systems Using Change Point Correlation of Time Series Data. In: IEEE\/IFIP NOMS (2006)","DOI":"10.1109\/NOMS.2006.1687576"},{"key":"41_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"351","DOI":"10.1007\/978-3-540-45070-2_16","volume-title":"ECOOP 2003 - Object-Oriented Programming","author":"N. Mitchell","year":"2003","unstructured":"Mitchell, N., Sevitsky, G.: Leakbot: An Automated and Lightweight Tool for Diagnosing Memory Leaks in Large Java Applications. In: Cardelli, L. (ed.) ECOOP 2003. LNCS, vol.\u00a02743, pp. 351\u2013377. Springer, Heidelberg (2003)"},{"key":"41_CR14","doi-asserted-by":"crossref","unstructured":"Xu, G., Rountev, A.: Precise memory leak detection for java software using container profiling. In: ACM International Conference on Software Engineering, ICSE (2008)","DOI":"10.1145\/1368088.1368110"}],"container-title":["Lecture Notes in Computer Science","Service-Oriented Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-31875-7_41","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,1]],"date-time":"2019-07-01T04:34:58Z","timestamp":1561955698000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-31875-7_41"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642173578","9783642173585"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-31875-7_41","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}