{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T22:59:07Z","timestamp":1772233147009,"version":"3.50.1"},"reference-count":77,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T00:00:00Z","timestamp":1641859200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"},{"start":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T00:00:00Z","timestamp":1641859200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2022,3]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:sec><jats:title>Context<\/jats:title><jats:p>The microservices architectural style is gaining momentum in the IT industry. This style does not guarantee that a target system can continuously meet acceptable performance levels. The ability to study the violations of performance requirements and eventually predict them would help practitioners to tune techniques like dynamic load balancing or horizontal scaling to achieve the resilience property.<\/jats:p><\/jats:sec><jats:sec><jats:title>Objective<\/jats:title><jats:p>The goal of this work is to study the violations of performance requirements of microservices through time series analysis and provide practical instruments that can detect resilient and non-resilient microservices and possibly predict their performance behavior.<\/jats:p><\/jats:sec><jats:sec><jats:title>Method<\/jats:title><jats:p>We introduce a new method based on<jats:italic>growth theory<\/jats:italic>to model the occurrences of violations of performance requirements as a stochastic process. We applied our method to an in-vitro e-commerce benchmark and an in-production real-world telecommunication system. We interpreted the resulting growth models to characterize the microservices in terms of their transient performance behavior.<\/jats:p><\/jats:sec><jats:sec><jats:title>Results<\/jats:title><jats:p>Our empirical evaluation shows that, in most of the cases, the non-linear S-shaped growth models capture the occurrences of performance violations of resilient microservices with high accuracy. The bounded nature associated with this models tell that the performance degradation is limited and thus the microservice is able to come back to an acceptable performance level even under changes in the nominal number of concurrent users. We also detect cases where linear models represent a better description. These microservices are not resilient and exhibit constant growth and unbounded performance violations over time. The application of our methodology to a real in-production system identified additional resilience profiles that were not observed in the in-vitro experiments. These profiles show the ability of services to react differently to the same solicitation. We found that when a service is resilient it can either decrease the rate of the violations occurrences in a continuous manner or with repeated attempts (periodical or not).<\/jats:p><\/jats:sec><jats:sec><jats:title>Conclusions<\/jats:title><jats:p>We showed that growth theory can be successfully applied to study the occurences of performance violations of in-vitro and in-production real-world systems. Furthermore, the cost of our model calibration heuristics, based on the mathematical expression of the selected non-linear growth models, is limited. We discussed how the resulting models can shed some light on the trend of performance violations and help engineers to spot problematic microservice operations that exhibit performance issues. Thus, meaningful insights from the application of growth theory have been derived to characterize the behavior of (non) resilient microservices operations.<\/jats:p><\/jats:sec>","DOI":"10.1007\/s10664-021-10088-0","type":"journal-article","created":{"date-parts":[[2022,1,11]],"date-time":"2022-01-11T09:02:57Z","timestamp":1641891777000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":16,"title":["Modeling Performance of Microservices Systems with Growth Theory"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2491-5267","authenticated-orcid":false,"given":"Matteo","family":"Camilli","sequence":"first","affiliation":[]},{"given":"Barbara","family":"Russo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,1,11]]},"reference":[{"key":"10088_CR1","doi-asserted-by":"publisher","first-page":"950","DOI":"10.1109\/TSE.1986.6313050","volume":"9","author":"AA Abdel-Ghaly","year":"1986","unstructured":"Abdel-Ghaly AA, Chan PY, Littlewood B (1986) Evaluation of competing software reliability predictions. IEEE Trans Softw Eng 9:950\u2013967","journal-title":"IEEE Trans Softw Eng"},{"key":"10088_CR2","doi-asserted-by":"crossref","unstructured":"Alshuqayran N, Ali N, Evans R (2016) A systematic mapping study in microservice architecture. In: Proc. IEEE 9th International Conference on Service-Oriented Computing and Applications (SOCA 2016), pp 44\u201351","DOI":"10.1109\/SOCA.2016.15"},{"key":"10088_CR3","unstructured":"Antonakakis M, April T, Bailey M, Bernhard M, Bursztein E, Cochran J, Durumeric Z, Halderman JA, Invernizzi L, Kallitsis M et al (2017) Understanding the Mirai botnet. In: USENIX Security Symposium, pp 1092\u20131110"},{"key":"10088_CR4","doi-asserted-by":"publisher","unstructured":"Antoniol G, Ayari K, Di Penta M, Khomh F, Gu\u00e9h\u00e9neuc Y-G (2008) Is it a bug or an enhancement? a text-based approach to classify change requests. In: Proceedings of the 2008 Conference of the Center for Advanced Studies on Collaborative Research: Meeting of Minds. CASCON \u201908. https:\/\/doi.org\/10.1145\/1463788.1463819. Association for Computing Machinery, New York, NY, USA","DOI":"10.1145\/1463788.1463819"},{"key":"10088_CR5","doi-asserted-by":"publisher","unstructured":"Assun\u00e7\u00e3o W K G, Kr\u00fcger J, Mendon\u00e7a W D F (2020) Variability management meets microservices: Six challenges of re-engineering microservice-based webshops. In: Proceedings of the 24th ACM Conference on Systems and Software Product Line: Volume A - Volume A. SPLC \u201920. https:\/\/doi.org\/10.1145\/3382025.3414942. Association for Computing Machinery, New York, NY, USA","DOI":"10.1145\/3382025.3414942"},{"key":"10088_CR6","doi-asserted-by":"publisher","unstructured":"Avritzer A, Britto R, Trubiani C, Russo B, Janes A, Camilli M, van Hoorn A, Heinrich R, Rapp M, Hen\u00df J (2021) A multivariate characterization and detection of software performance antipatterns. In: Proceedings of the ACM\/SPEC International Conference on Performance Engineering. ICPE \u201921. Association for Computing Machinery, New York, NY, USA, p 61?72 https:\/\/doi.org\/10.1145\/3427921.3450246","DOI":"10.1145\/3427921.3450246"},{"key":"10088_CR7","doi-asserted-by":"crossref","unstructured":"Avritzer A, Camilli M, Janes A, Russo B, Jahic J, Hoorn A, Britto R, Trubiani C (2021) PPTAM\u03bb: What, where, and how of cross-domain scalability assessment. In: 2021 IEEE 18th International Conference on Software Architecture Companion (ICSA-C), pp 62\u201369","DOI":"10.1109\/ICSA-C52384.2021.00016"},{"key":"10088_CR8","doi-asserted-by":"crossref","unstructured":"Avritzer A, Ferme V, Janes A, Russo B, Schulz H, van Hoorn A (2018) A quantitative approach for the assessment of microservice architecture deployment alternatives by automated performance testing. In: Proceedings of the 12th European Conference on Software Architecture (ECSA), pp 159\u2013174","DOI":"10.1007\/978-3-030-00761-4_11"},{"key":"10088_CR9","doi-asserted-by":"publisher","first-page":"110564","DOI":"10.1016\/j.jss.2020.110564","volume":"165","author":"A Avritzer","year":"2020","unstructured":"Avritzer A, Ferme V, Janes A, Russo B, van Hoorn A, Schulz H, Menasch\u00e9 D, Rufino V (2020) Scalability assessment of microservice architecture deployment configurations: A domain-based approach leveraging operational profiles and load tests. J Syst Softw 165:110564. https:\/\/doi.org\/10.1016\/j.jss.2020.110564","journal-title":"J Syst Softw"},{"key":"10088_CR10","doi-asserted-by":"publisher","first-page":"110564","DOI":"10.1016\/j.jss.2020.110564","volume":"165","author":"A Avritzer","year":"2020","unstructured":"Avritzer A, Ferme V, Janes A, Russo B, van Hoorn A, Schulz H, Menasch\u00e9 D, Rufino V (2020) Scalability assessment of microservice architecture deployment configurations: A domain-based approach leveraging operational profiles and load tests. J Syst Softw 165:110564. https:\/\/doi.org\/10.1016\/j.jss.2020.110564","journal-title":"J Syst Softw"},{"key":"10088_CR11","doi-asserted-by":"crossref","unstructured":"Avritzer A, Menasch\u00e9 DS, Rufino V, Russo B, Janes A, Ferme V, van Hoorn A, Schulz H (2019) PPTAM: production and performance testing based application monitoring. In: Companion of the 2019 ACM\/SPEC International Conference on Performance Engineering (ICPE), pp 39\u201340","DOI":"10.1145\/3302541.3311961"},{"key":"10088_CR12","unstructured":"Barker CJ (2016) Mirai (DDoS) source code review Medium.com (ed). https:\/\/medium.com\/@cjbarker\/mirai-ddos-source-code-review-57269c4a68fs"},{"key":"10088_CR13","doi-asserted-by":"crossref","unstructured":"Bassin KA, Santhanam P (1997) Use of software triggers to evaluate software process effectiveness and capture customer usage profiles. In: Proceedings The Eighth International Symposium on Software Reliability Engineering - Case Studies -, pp 103\u2013114","DOI":"10.1109\/ISSRE.1997.630874"},{"key":"10088_CR14","doi-asserted-by":"crossref","unstructured":"Benaddy M, Aljahdali S, Wakrim M (2011) Evolutionary prediction for cumulative failure modeling: A comparative study. In: 2011 Eighth International Conference on Information Technology: New Generations, pp 41\u201347","DOI":"10.1109\/ITNG.2011.15"},{"key":"10088_CR15","doi-asserted-by":"publisher","unstructured":"Benni B, Mosser S, Caissy J-P, Gu\u00e9h\u00e9neuc Y-G (2020) Can microservice-based online-retailers be used as an spl? a study of six reference architectures. In: Proceedings of the 24th ACM Conference on Systems and Software Product Line: Volume A - Volume A. SPLC \u201920. https:\/\/doi.org\/10.1145\/3382025.3414979. Association for Computing Machinery, New York, NY, USA","DOI":"10.1145\/3382025.3414979"},{"key":"10088_CR16","volume-title":"Data networks (2nd ed.)","author":"D Bertsekas","year":"1992","unstructured":"Bertsekas D, Gallager R (1992) Data networks (2nd ed.) Prentice-Hall, Inc., USA"},{"key":"10088_CR17","doi-asserted-by":"publisher","first-page":"257?","DOI":"10.1023\/A:1016396232448","volume":"7","author":"S Biffl","year":"2002","unstructured":"Biffl S, Gutjahr WJ (2002) Using a reliability growth model to control software inspection. Empir Softw Eng 7:257?-284","journal-title":"Empir Softw Eng"},{"issue":"3","key":"10088_CR18","doi-asserted-by":"publisher","first-page":"387","DOI":"10.1109\/TSE.2010.92","volume":"37","author":"R Calinescu","year":"2011","unstructured":"Calinescu R, Grunske L, Kwiatkowska M, Mirandola R, Tamburrelli G (2011) Dynamic qos management and optimization in service-based systems. IEEE Trans Softw Eng 37(3):387\u2013409. https:\/\/doi.org\/10.1109\/TSE.2010.92","journal-title":"IEEE Trans Softw Eng"},{"key":"10088_CR19","doi-asserted-by":"crossref","unstructured":"Camilli M, Colarusso C, Russo B, Zimeo E (2020) Domain metric driven decomposition of data-intensive applications. In: 2020 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW), pp 189\u2013196","DOI":"10.1109\/ISSREW51248.2020.00071"},{"issue":"7","key":"10088_CR20","doi-asserted-by":"publisher","first-page":"e1638","DOI":"10.1002\/stvr.1638","volume":"27","author":"M Cinque","year":"2017","unstructured":"Cinque M, Cotroneo D, Pecchia A, Pietrantuono R, Russo S (2017) Debugging-workflow-aware software reliability growth analysis. Software Testing, Verification and Reliability 27(7):e1638. https:\/\/doi.org\/10.1002\/stvr.1638","journal-title":"Software Testing, Verification and Reliability"},{"key":"10088_CR21","doi-asserted-by":"publisher","unstructured":"David HA, Edwards AWF (2001) The logistic growth curve. In: Annotated Readings in the History of Statistics. https:\/\/doi.org\/10.1007\/978-1-4757-3500-0_11. Springer New York, New York, NY, pp 65\u201367","DOI":"10.1007\/978-1-4757-3500-0_11"},{"key":"10088_CR22","doi-asserted-by":"crossref","unstructured":"Draper NR, Smith H (1998) Applied regression analysis. John Wiley & Sons, 326","DOI":"10.1002\/9781118625590"},{"key":"10088_CR23","volume-title":"Primer of applied regression & analysis of variance, ed","author":"SA Glantz","year":"2001","unstructured":"Glantz SA, Slinker BK (2001) Primer of applied regression & analysis of variance, ed. McGraw-Hill, Inc., New York"},{"issue":"12","key":"10088_CR24","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.1109\/TSE.1985.232177","volume":"SE-11","author":"AL Goel","year":"1985","unstructured":"Goel AL (1985) Software reliability models: Assumptions, limitations, and applicability. IEEE Trans Softw Eng SE-11(12):1411\u20131423. https:\/\/doi.org\/10.1109\/TSE.1985.232177","journal-title":"IEEE Trans Softw Eng"},{"issue":"3","key":"10088_CR25","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1109\/TR.1979.5220566","volume":"R-28","author":"AL Goel","year":"1979","unstructured":"Goel AL, Okumoto K (1979) Time-dependent error-detection rate model for software reliability and other performance measures. IEEE Trans Reliab R-28(3):206\u2013211. https:\/\/doi.org\/10.1109\/TR.1979.5220566","journal-title":"IEEE Trans Reliab"},{"key":"10088_CR26","unstructured":"Gokhale SS, Trivedi KS (1998) Log-logistic software reliability growth model. In: Proceedings Third IEEE International High-Assurance Systems Engineering Symposium (Cat. No.98EX231), pp 34\u201341"},{"key":"10088_CR27","doi-asserted-by":"publisher","unstructured":"Grambow M, Meusel L, Wittern E, Bermbach D (2020) Benchmarking microservice performance: A pattern-based approach. In: Proceedings of the 35th Annual ACM Symposium on Applied Computing. SAC \u201920. Association for Computing Machinery, New York, NY, USA, p 232?241 https:\/\/doi.org\/10.1145\/3341105.3373875","DOI":"10.1145\/3341105.3373875"},{"key":"10088_CR28","doi-asserted-by":"publisher","unstructured":"Heinrich R, van Hoorn A, Knoche H, Li F, Lwakatare LE, Pahl C, Schulte S, Wettinger J (2017) Performance engineering for microservices: Research challenges and directions. In: Proceedings of the 8th ACM\/SPEC on International Conference on Performance Engineering Companion. ICPE \u201917 Companion. Association for Computing Machinery, New York, NY, USA, pp 223?-226 https:\/\/doi.org\/10.1145\/3053600.3053653","DOI":"10.1145\/3053600.3053653"},{"issue":"4","key":"10088_CR29","doi-asserted-by":"publisher","first-page":"604","DOI":"10.1109\/24.273589","volume":"42","author":"SA Hossain","year":"1993","unstructured":"Hossain SA, Dahiya RC (1993) Estimating the parameters of a non-homogeneous poisson-process model for software reliability. IEEE Trans Reliab 42 (4):604\u2013612. https:\/\/doi.org\/10.1109\/24.273589","journal-title":"IEEE Trans Reliab"},{"key":"10088_CR30","doi-asserted-by":"crossref","unstructured":"Huang H-H, Hsiao CK, Huang S-Y Peterson P, Baker E, McGaw B (eds) (2010) Nonlinear regression analysis, Third Edition. Elsevier, Oxford","DOI":"10.1016\/B978-0-08-044894-7.01352-X"},{"key":"10088_CR31","doi-asserted-by":"crossref","unstructured":"Iannino A, Musa JD (1990) Software reliability, 30, pp 85\u2013170, Elsevier. https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0065245808602995","DOI":"10.1016\/S0065-2458(08)60299-5"},{"issue":"6","key":"10088_CR32","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1109\/TSE.1984.5010297","volume":"SE-10","author":"A Iannino","year":"1984","unstructured":"Iannino A, Musa JD, Okumoto K, Littlewood B (1984) Criteria for software reliability model comparisons. IEEE Trans Softw Eng SE-10(6):687\u2013691. https:\/\/doi.org\/10.1109\/TSE.1984.5010297","journal-title":"IEEE Trans Softw Eng"},{"key":"10088_CR33","doi-asserted-by":"crossref","unstructured":"Ibe OC Ibe O C (ed) (2013) 1 - basic concepts in probability, Second Edition. Elsevier, Oxford","DOI":"10.1016\/B978-0-12-407795-9.00001-3"},{"issue":"11","key":"10088_CR34","doi-asserted-by":"publisher","first-page":"1091","DOI":"10.1109\/TSE.2015.2445340","volume":"41","author":"ZM Jiang","year":"2015","unstructured":"Jiang ZM, Hassan AE (2015) A survey on load testing of large-scale software systems. IEEE Trans. Softw. Eng. 41(11):1091\u20131118","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10088_CR35","unstructured":"Kececioglu DB (1991) Reliability engineering handbook, 2, Prentice-Hall, N J"},{"issue":"8","key":"10088_CR36","doi-asserted-by":"publisher","first-page":"634","DOI":"10.1016\/j.peva.2009.07.007","volume":"67","author":"H Koziolek","year":"2010","unstructured":"Koziolek H (2010) Performance evaluation of component-based software systems: A survey. Perform Eval 67(8):634\u2013658. http:\/\/www.sciencedirect.com\/science\/article\/pii\/S016653160900100X. Special Issue on Software and Performance","journal-title":"Perform Eval"},{"issue":"2","key":"10088_CR37","doi-asserted-by":"publisher","first-page":"242","DOI":"10.1007\/s13198-019-00777-x","volume":"10","author":"R Kumar","year":"2019","unstructured":"Kumar R, Kumar S, Tiwari SK (2019) A study of software reliability on big data open source software. International Journal of System Assurance Engineering and Management 10(2):242\u2013250. https:\/\/doi.org\/10.1007\/s13198-019-00777-x","journal-title":"International Journal of System Assurance Engineering and Management"},{"key":"10088_CR38","unstructured":"Lewis J, Fowler M (2014) Microservices. https:\/\/martinfowler.com\/articles\/microservices.html, last accessed on February 3rd, 2021"},{"key":"10088_CR39","unstructured":"Li PL, Herbsleb J, Shaw M (2005) Finding predictors of field defects for open source software systems in commonly available data sources: a case study of openbsd. In: 11th IEEE International Software Metrics Symposium (METRICS\u201905), pp 10\u201332"},{"key":"10088_CR40","unstructured":"Li PL, Shaw M, Herbsleb J (20031) Selecting a Defect Prediction Model for Maintenance Resource Planning and Software Insurance"},{"key":"10088_CR41","doi-asserted-by":"crossref","unstructured":"Li PL, Shaw M, Herbsleb J, Ray B, Santhanam P (2004) Empirical evaluation of defect projection models for widely-deployed production software systems. In: Proceedings of the 12th ACM SIGSOFT Twelfth International Symposium on Foundations of Software Engineering. Association for Computing Machinery, New York, NY, USA, p 263?272","DOI":"10.1145\/1041685.1029930"},{"key":"10088_CR42","unstructured":"Lyu MR (ed) (1996) Handbook of software reliability engineering. McGraw-Hill, Inc., USA"},{"key":"10088_CR43","doi-asserted-by":"crossref","unstructured":"Mukherjee J, Wang M, Krishnamurthy D (2014) Performance testing web applications on the cloud. In: 2014 IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops, pp 363\u2013369","DOI":"10.1109\/ICSTW.2014.57"},{"key":"10088_CR44","volume-title":"Software reliability: Measurement, prediction, application","author":"JD Musa","year":"1987","unstructured":"Musa JD, Iannino A, Okumoto K (1987) Software reliability: Measurement, prediction, application. McGraw-Hill, Inc., USA"},{"key":"10088_CR45","doi-asserted-by":"crossref","unstructured":"Nguyen TT, Nguyen TN, Duesterwald E, Klinger T, Santhanam P (2012) Inferring developer expertise through defect analysis. In: Proceedings of the 34th International Conference on Software Engineering. ICSE \u201912. IEEE Press, p 1297?1300","DOI":"10.1109\/ICSE.2012.6227095"},{"key":"10088_CR46","volume-title":"Usability engineering","author":"J Nielsen","year":"1994","unstructured":"Nielsen J (1994) Usability engineering. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA"},{"key":"10088_CR47","doi-asserted-by":"crossref","unstructured":"Ohishi K, Okamura H, Dohi T (2005) Gompertz software reliability model and its application. In: 29th Annual International Computer Software and Applications Conference (COMPSAC\u201905), vol 1, pp 405\u2013410 Vol. 2","DOI":"10.1109\/COMPSAC.2005.82"},{"issue":"8","key":"10088_CR48","doi-asserted-by":"publisher","first-page":"1985","DOI":"10.1016\/j.asoc.2012.02.004","volume":"12","author":"W Pedrycz","year":"2012","unstructured":"Pedrycz W, Russo B, Succi G (2012) Knowledge transfer in system modeling and its realization through an optimal allocation of information granularity. Appl Soft Comput 12 (8):1985\u20131995. https:\/\/doi.org\/10.1016\/j.asoc.2012.02.004https:\/\/doi.org\/ https:\/\/doi.org\/10.1016\/j.asoc.2012.02.00410.1016\/j.asoc.2012.02.004, https:\/\/www.sciencedirect.com\/science\/article\/pii\/S1568494612000609","journal-title":"Appl Soft Comput"},{"issue":"1","key":"10088_CR49","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1109\/MS.2017.4541055","volume":"35","author":"D Port","year":"2018","unstructured":"Port D, Taber B (2018) Actionable analytics for strategic maintenance of critical software: An industry experience report. IEEE Softw 35(1):58\u201363. https:\/\/doi.org\/10.1109\/MS.2017.4541055","journal-title":"IEEE Softw"},{"issue":"2","key":"10088_CR50","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1080\/00031305.1994.10476030","volume":"48","author":"F Pukelsheim","year":"1994","unstructured":"Pukelsheim F (1994) The three sigma rule. The American Statistician 48(2):88\u201391","journal-title":"The American Statistician"},{"key":"10088_CR51","doi-asserted-by":"crossref","unstructured":"Rahmani C, Siy HP, Azadmanesh AH (2009) An experimental analysis of open source software reliability","DOI":"10.4304\/jsw.5.12.1384-1394"},{"key":"10088_CR52","unstructured":"Richardson C (2018) Microservices patterns: With examples in java. Manning Publications. https:\/\/books.google.it\/books?id=UeK1swEACAAJ"},{"key":"10088_CR53","unstructured":"Rigdon SE, Basu AP (2000) Statistical methods for the reliability of repairable systems. Wiley Series in Probability and Statistics, Wiley. https:\/\/books.google.it\/books?id=722hRAAACAAJ"},{"key":"10088_CR54","doi-asserted-by":"crossref","unstructured":"Rossi B, Russo B, Succi G (2010) Modelling failures occurrences of open source software with reliability growth. In: \u00c5gerfalk P J, Boldyreff C, Gonz\u00e1lez-Barahona J M, Madey G R, Noll J (eds) Open Source Software: New Horizons - 6th International IFIP WG 2.13 Conference on Open Source Systems, OSS 2010, Notre Dame, IN, USA, May 30 - June 2, 2010. Proceedings. IFIP Advances in Information and Communication Technology, vol 319. Springer, pp 268\u2013280","DOI":"10.1007\/978-3-642-13244-5_21"},{"key":"10088_CR55","doi-asserted-by":"publisher","unstructured":"Satoh D, Yamada S (2002) Parameter estimation of discrete logistic curve models for software reliability assessment. Japan J. Indust. Appl. Math, 19. https:\/\/doi.org\/10.1007\/BF03167447","DOI":"10.1007\/BF03167447"},{"key":"10088_CR56","doi-asserted-by":"publisher","first-page":"582","DOI":"10.1016\/j.ijid.2020.04.085","volume":"96","author":"CY Shen","year":"2020","unstructured":"Shen CY (2020) Logistic growth modelling of covid-19 proliferation in china and its international implications. Int J Infect Dis 96:582\u2013589. https:\/\/doi.org\/10.1016\/j.ijid.2020.04.085","journal-title":"Int J Infect Dis"},{"key":"10088_CR57","doi-asserted-by":"crossref","unstructured":"Shibata K, Rinsaka K, Dohi T, Okamura H (2007) Quantifying software maintainability based on a fault-detection\/correction model. In: 13th Pacific Rim International Symposium on Dependable Computing (PRDC 2007), pp 35\u201342","DOI":"10.1109\/PRDC.2007.46"},{"key":"10088_CR58","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1016\/j.jss.2018.09.082","volume":"146","author":"J Soldani","year":"2018","unstructured":"Soldani J, Tamburri DA, Heuvel W-JVD (2018) The pains and gains of microservices: A systematic grey literature review. J Syst Softw 146:215\u2013232. https:\/\/doi.org\/10.1016\/j.jss.2018.09.082, http:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121218302139","journal-title":"J Syst Softw"},{"key":"10088_CR59","doi-asserted-by":"crossref","unstructured":"Spiess A-N, Neumeyer N (2010) An evaluation of r2 as an inadequate measure for nonlinear models in pharmacological and biochemical research: a monte carlo approach. BMC Pharmacol, 10, 6","DOI":"10.1186\/1471-2210-10-6"},{"key":"10088_CR60","doi-asserted-by":"publisher","first-page":"319?343","DOI":"10.1023\/A:1020515105175","volume":"7","author":"C Stringfellow","year":"2002","unstructured":"Stringfellow C, Andrews AA (2002) An empirical method for selecting software reliability growth models. Empir Softw Eng 7:319?343. https:\/\/doi.org\/10.1023\/A:1020515105175","journal-title":"Empir Softw Eng"},{"issue":"2","key":"10088_CR61","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1023\/A:1023014713253","volume":"8","author":"G Succi","year":"2003","unstructured":"Succi G, Pedrycz W, Stefanovic M, Russo B (2003) An investigation on the occurrence of service requests in commercial software applications. Empir Softw Eng 8(2):197\u2013215","journal-title":"Empir Softw Eng"},{"issue":"2","key":"10088_CR62","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1023\/A:1023014713253","volume":"8","author":"G Succi","year":"2003","unstructured":"Succi G, Pedrycz W, Stefanovic M, Russo B (2003) An investigation on the occurrence of service requests in commercial software applications. Empir Softw Eng 8 (2):197\u2013215. https:\/\/doi.org\/10.1023\/A:1023014713253https:\/\/doi.org\/10.1023\/ https:\/\/doi.org\/10.1023\/A:1023014713253A:1023014713253","journal-title":"Empir Softw Eng"},{"key":"10088_CR63","doi-asserted-by":"crossref","unstructured":"Taber W, Port D (2014) Empirical and face validity of software maintenance defect models used at the jet propulsion laboratory. In: Proceedings of the 8th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement. ESEM ?14. Association for Computing Machinery, New York, NY, USA","DOI":"10.1145\/2652524.2652590"},{"key":"10088_CR64","doi-asserted-by":"crossref","unstructured":"Tamura Y, Yamada S (2005) Comparison of software reliability assessment methods for open source software. In: 11th International Conference on Parallel and Distributed Systems (ICPADS\u201905), vol 2, pp 488\u2013492","DOI":"10.1109\/ICPADS.2005.111"},{"key":"10088_CR65","doi-asserted-by":"crossref","unstructured":"Tamura Y, Yamada S (2005) Comparison of software reliability assessment methods for open source software. In: 11th International Conference on Parallel and Distributed Systems (ICPADS\u201905), vol 2, pp 488\u2013492","DOI":"10.1109\/ICPADS.2005.111"},{"key":"10088_CR66","doi-asserted-by":"crossref","unstructured":"Taylor RN, Medvidovic N, Dashofy E (2009) Software architecture: foundations, theory, and practice. John Wiley & Sons","DOI":"10.1145\/1810295.1810435"},{"key":"10088_CR67","doi-asserted-by":"publisher","first-page":"79?","DOI":"10.3758\/BF03329960","volume":"21","author":"KL T.O.","year":"1983","unstructured":"T.O. KL (1983) Note on the r2 measure of goodness of fit for nonlinear models. Bull. Psychon. Soc. 21:79?-80. https:\/\/doi.org\/10.3758\/BF03329960","journal-title":"Bull. Psychon. Soc."},{"key":"10088_CR68","doi-asserted-by":"crossref","unstructured":"Ueda T, Nakaike T, Ohara M (2016) Workload characterization for microservices. In: 2016 IEEE International Symposium on Workload Characterization (IISWC), pp 1\u201310","DOI":"10.1109\/IISWC.2016.7581269"},{"key":"10088_CR69","unstructured":"Virene EP (1968) Reliability growth and its upper limit. In: Proceedings of 1968 Annual Symposium on Reliability. IEEE, pp 265\u2013270"},{"issue":"2","key":"10088_CR70","doi-asserted-by":"publisher","first-page":"443","DOI":"10.1007\/s10270-016-0566-5","volume":"17","author":"C V\u00f6gele","year":"2018","unstructured":"V\u00f6gele C, van Hoorn A, Schulz E, Hasselbring W, Krcmar H (2018) WESSBAS: Extraction of probabilistic workload specifications for load testing and performance prediction\u2014A model-driven approach for session-based application systems. Softw. and Syst. Modeling 17(2):443\u2013477","journal-title":"Softw. and Syst. Modeling"},{"key":"10088_CR71","unstructured":"Wert A (2018) Performance problem diagnostics by systematic experimentation. sThe Karlsruhe Series on Software Design and Quality. KIT Scientific Publishing. https:\/\/books.google.it\/books?id=QvlaDwAAQBAJ"},{"issue":"11","key":"10088_CR72","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/2.544240","volume":"29","author":"A Wood","year":"1996","unstructured":"Wood A (1996) Predicting software reliability. Computer 29(11):69\u201377","journal-title":"Computer"},{"issue":"11","key":"10088_CR73","doi-asserted-by":"publisher","first-page":"69","DOI":"10.1109\/2.544240","volume":"29","author":"A Wood","year":"1996","unstructured":"Wood A (1996) Predicting software reliability. Computer 29 (11):69\u201377. https:\/\/doi.org\/10.1109\/2.544240","journal-title":"Computer"},{"issue":"5","key":"10088_CR74","doi-asserted-by":"publisher","first-page":"475","DOI":"10.1109\/TR.1983.5221735","volume":"R-32","author":"S Yamada","year":"1983","unstructured":"Yamada S, Ohba M, Osaki S (1983) S-shaped reliability growth modeling for software error detection. IEEE Trans Reliab R-32(5):475\u2013484. https:\/\/doi.org\/10.1109\/TR.1983.5221735","journal-title":"IEEE Trans Reliab"},{"issue":"1","key":"10088_CR75","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1109\/TR.1986.4335332","volume":"35","author":"S Yamada","year":"1986","unstructured":"Yamada S, Ohtera H, Narihisa H (1986) Software reliability growth models with testing-effort. IEEE Trans Reliab 35(1):19\u201323. https:\/\/doi.org\/10.1109\/TR.1986.4335332","journal-title":"IEEE Trans Reliab"},{"key":"10088_CR76","doi-asserted-by":"crossref","unstructured":"Zhang F, Khomh F, Zou Y, Hassan AE (2012) An empirical study on factors impacting bug fixing time. In: 2012 19th Working Conference on Reverse Engineering, pp 225\u2013234","DOI":"10.1109\/WCRE.2012.32"},{"key":"10088_CR77","doi-asserted-by":"publisher","unstructured":"Zhou Y, Davis J (May 2005) Open source software reliability model: An empirical approach. SIGSOFT Softw. Eng. Notes 30(4):1?6. https:\/\/doi.org\/10.1145\/1082983.1083273","DOI":"10.1145\/1082983.1083273"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-021-10088-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-021-10088-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-021-10088-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,9,16]],"date-time":"2024-09-16T01:34:23Z","timestamp":1726450463000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-021-10088-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,1,11]]},"references-count":77,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2022,3]]}},"alternative-id":["10088"],"URL":"https:\/\/doi.org\/10.1007\/s10664-021-10088-0","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,1,11]]},"assertion":[{"value":"16 November 2021","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 January 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"39"}}