{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,1]],"date-time":"2026-05-01T12:04:57Z","timestamp":1777637097001,"version":"3.51.4"},"reference-count":96,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2022,4,30]],"date-time":"2022-04-30T00:00:00Z","timestamp":1651276800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2022,4,30]],"date-time":"2022-04-30T00:00:00Z","timestamp":1651276800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2022,7]]},"DOI":"10.1007\/s10664-022-10152-3","type":"journal-article","created":{"date-parts":[[2022,4,30]],"date-time":"2022-04-30T11:02:20Z","timestamp":1651316540000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":5,"title":["On the Effectiveness of Bisection in Performance Regression Localization"],"prefix":"10.1007","volume":"27","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2468-3902","authenticated-orcid":false,"given":"Frolin S.","family":"Ocariza,","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,4,30]]},"reference":[{"key":"10152_CR1","doi-asserted-by":"crossref","unstructured":"Ahmed TM, Bezemer C-P, Chen T-H, Hassan AE, Shang W (2016) Studying the effectiveness of application performance management (apm) tools for detecting performance regressions for web applications: an experience report. In: Proceedings of the international conference on mining software repositories (MSR). ACM, pp 1\u201312","DOI":"10.1145\/2901739.2901774"},{"key":"10152_CR2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4842-4941-3","volume-title":"Pro. net benchmarking: The art of performance measurement","author":"A Akinshin","year":"2019","unstructured":"Akinshin A (2019) Pro. net benchmarking: The art of performance measurement. Springer, Berlin"},{"key":"10152_CR3","unstructured":"Alcocer J P S, Beck F, Bergel A (2019) Performance evolution matrix: Visualizing performance variations along software versions. In: Proceedings of the working conference on software visualization (VISSOFT). IEEE, pp 1\u201311"},{"issue":"2","key":"10152_CR4","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1145\/2936313.2816718","volume":"51","author":"JPS Alcocer","year":"2015","unstructured":"Alcocer J P S, Bergel A (2015) Tracking down performance variation against source code evolution. ACM SIGPLAN Not 51(2):129\u2013139","journal-title":"ACM SIGPLAN Not"},{"key":"10152_CR5","doi-asserted-by":"crossref","unstructured":"An G, Yoo S (2021) Reducing the search space of bug inducing commits using failure coverage. In: Proceedings of the joint meeting on european software engineering conference and symposium on the foundations of software engineering (ESEC\/FSE). ACM, pp 1459\u20131462","DOI":"10.1145\/3468264.3473129"},{"issue":"3","key":"10152_CR6","doi-asserted-by":"publisher","first-page":"1490","DOI":"10.1007\/s10664-017-9553-x","volume":"23","author":"MM Arif","year":"2018","unstructured":"Arif M M, Shang W, Shihab E (2018) Empirical study on the discrepancy between performance testing results from virtual and physical environments. Empir Softw Eng 23(3):1490\u20131518","journal-title":"Empir Softw Eng"},{"issue":"3","key":"10152_CR7","doi-asserted-by":"publisher","first-page":"223","DOI":"10.1007\/s10009-010-0139-9","volume":"13","author":"C Artho","year":"2011","unstructured":"Artho C (2011) Iterative delta debugging. Int J Softw Tools Technol Transfer (STTT) 13(3):223\u2013246","journal-title":"Int J Softw Tools Technol Transfer (STTT)"},{"key":"10152_CR8","unstructured":"Automattic (2021) Automattic WordPress Calypso. https:\/\/www.github.com\/Automattic\/wp-calypso (Accessed: July 20, 2021)"},{"key":"10152_CR9","doi-asserted-by":"crossref","unstructured":"Ben-Or M, Hassidim A (2008) The bayesian learner is optimal for noisy binary search (and pretty good for quantum as well). In: Proceedings of the IEEE symposium on foundations of computer science. IEEE, pp 221\u2013230","DOI":"10.1109\/FOCS.2008.58"},{"issue":"12","key":"10152_CR10","doi-asserted-by":"publisher","first-page":"1193","DOI":"10.1002\/smr.1657","volume":"26","author":"C Bezemer","year":"2014","unstructured":"Bezemer C, Milon E, Zaidman A, Pouwelse J (2014) Detecting and analyzing I\/O performance regressions. J Softw Evol Process (JSEP) 26 (12):1193\u20131212","journal-title":"J Softw Evol Process (JSEP)"},{"key":"10152_CR11","doi-asserted-by":"crossref","unstructured":"Bezemer C-P, Pouwelse J, Gregg B (2015) Understanding software performance regressions using differential flame graphs. In: Proceedings of the international conference on software analysis, evolution, and reengineering (SANER). IEEE, pp 535\u2013539","DOI":"10.1109\/SANER.2015.7081872"},{"key":"10152_CR12","doi-asserted-by":"crossref","unstructured":"Bittner D M, Sarwate A D, Wright R N (2018) Using noisy binary search for differentially private anomaly detection. In: Proceedings of the international symposium on cyber security cryptography and machine learning (CSCML). Springer, pp 20\u201337","DOI":"10.1007\/978-3-319-94147-9_3"},{"key":"10152_CR13","doi-asserted-by":"crossref","unstructured":"Chen J, Shang W (2017) An exploratory study of performance regression introducing code changes. In: Proceedings of the international conference on software maintenance and evolution (ICSME). IEEE Computer Society, pp 341\u2013352","DOI":"10.1109\/ICSME.2017.13"},{"issue":"5","key":"10152_CR14","doi-asserted-by":"publisher","first-page":"1442","DOI":"10.1109\/TC.2014.2315614","volume":"64","author":"T Chen","year":"2014","unstructured":"Chen T, Guo Q, Temam O, Wu Y, Bao Y, Xu Z, Chen Y (2014) Statistical performance comparisons of computers. IEEE Trans Comput 64(5):1442\u20131455","journal-title":"IEEE Trans Comput"},{"key":"10152_CR15","doi-asserted-by":"crossref","unstructured":"Chen Y, Winter S, Suri N (2019) Inferring performance bug patterns from developer commits. In: Proceedings of the international symposium on software reliability engineering (ISSRE). IEEE Computer Society, pp 70\u201381","DOI":"10.1109\/ISSRE.2019.00017"},{"key":"10152_CR16","unstructured":"Cockroach Labs (2021) CockroachDB. https:\/\/www.github.com\/cockroachdb\/cockroach (Accessed: July 20, 2021)"},{"key":"10152_CR17","unstructured":"Couder C (2009) Fighting regressions with git bisect. https:\/\/git-scm.com\/docs\/git-bisect-lk2009 (Accessed: August 9, 2021)"},{"key":"10152_CR18","doi-asserted-by":"crossref","unstructured":"Crovella M E (2000) Performance evaluation with heavy tailed distributions. In: International conference on modelling techniques and tools for computer performance evaluation (TOOLS). Springer, pp 1\u20139","DOI":"10.1007\/3-540-46429-8_1"},{"key":"10152_CR19","first-page":"3","volume":"1","author":"ME Crovella","year":"1998","unstructured":"Crovella M E, Taqqu M S, Bestavros A (1998) Heavy-tailed probability distributions in the world wide web. A practical guide to heavy tails: statistical techniques and applications 1:3\u201326","journal-title":"A practical guide to heavy tails: statistical techniques and applications"},{"key":"10152_CR20","unstructured":"Dahl R (2021) Node.js. https:\/\/www.github.com\/nodejs\/node (Accessed: July 20, 2021)"},{"key":"10152_CR21","doi-asserted-by":"crossref","unstructured":"Della Toffola L, Pradel M, Gross T R (2015) Performance problems you can fix: A dynamic analysis of memoization opportunities. In: Proceedings of the international conference on object-oriented programming, systems, languages, and applications (OOPSLA). ACM, pp 607\u2013622","DOI":"10.1145\/2858965.2814290"},{"key":"10152_CR22","doi-asserted-by":"crossref","unstructured":"Dereniowski D, \u0141ukasiewicz A, Uzna\u0144ski P (2021) An efficient noisy binary search in graphs via median approximation. In: Proceedings of the international workshop on combinatorial algorithms. Springer, pp 265\u2013281","DOI":"10.1007\/978-3-030-79987-8_19"},{"key":"10152_CR23","unstructured":"Dynatrace (2018) Dynatrace. https:\/\/www.dynatrace.com\/ (Accessed: January 8, 2018)"},{"key":"10152_CR24","unstructured":"Elastic NV (2021) Elasticsearch. https:\/\/www.github.com\/elastic\/elasticsearch (Accessed: July 20, 2021)"},{"key":"10152_CR25","unstructured":"Epa N S, Gan J, Wirth A (2019) Result-sensitive binary search with noisy information. In: Proceedings of the international symposium on algorithms and computation (ISAAC). Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik"},{"key":"10152_CR26","unstructured":"Exadv1 (2021) Space Station 13. https:\/\/www.github.com\/tgstation\/tgstation (Accessed: July 20, 2021)"},{"key":"10152_CR27","unstructured":"Fossil (2006) Fossil bisect command documentation. https:\/\/www.fossil-scm.org\/fossil\/help\/bisect (Accessed: August 11, 2021)"},{"key":"10152_CR28","unstructured":"Gaviar A (2019) GitHub\u2019s Top 100 Most Valuable Repositories Out of 96 Million. https:\/\/hackernoon.com\/githubs-top-100-most-valuable-repositories-out-of-96-million-bb48caa9eb0b (Accessed: July 19, 2021)"},{"key":"10152_CR29","unstructured":"Git (2009) Git Bisect Documentation. https:\/\/git-scm.com\/docs\/git-bisect (Accessed: August 11, 2021)"},{"key":"10152_CR30","unstructured":"Google (2018) Chrome DevTools Overview. https:\/\/developer.chrome.com\/devtools (Accessed: February 19, 2018)"},{"key":"10152_CR31","unstructured":"Google (2021) Bisecting performance regressions. https:\/\/chromium.googlesource.com\/chromium\/src\/+\/refs\/heads\/main\/docs\/speed\/bisects.md (Accessed: November 29, 2021)"},{"key":"10152_CR32","unstructured":"Google (2021) Google Flutter. https:\/\/www.github.com\/flutter\/flutter (Accessed: July 20, 2021)"},{"key":"10152_CR33","unstructured":"Google (2021) Kubernetes. https:\/\/www.github.com\/kubernetes\/kubernetes (Accessed: July 20, 2021)"},{"key":"10152_CR34","unstructured":"Google (2021) TensorFlow. https:\/\/www.github.com\/tensorflow\/tensorflow (Accessed: July 20, 2021)"},{"key":"10152_CR35","doi-asserted-by":"crossref","unstructured":"Graham S L, Kessler P B, Mckusick M K (1982) Gprof: A call graph execution profiler. In: Proceedings of the SIGPLAN symposium on compiler construction. ACM, pp 120\u2013126","DOI":"10.1145\/872726.806987"},{"issue":"2","key":"10152_CR36","doi-asserted-by":"publisher","first-page":"91","DOI":"10.1145\/2927299.2927301","volume":"14","author":"B Gregg","year":"2016","unstructured":"Gregg B (2016) The flame graph: This visualization of software execution is a new necessity for performance profiling and debugging. Queue 14(2):91\u2013110","journal-title":"Queue"},{"key":"10152_CR37","unstructured":"Gross T (1997) Bisection debugging. In: Proceedings of the international workshop on automatic debugging (AADEBUG). Link\u00f8ping University Electronic Press, pp 185\u2013191"},{"key":"10152_CR38","doi-asserted-by":"publisher","first-page":"268","DOI":"10.1016\/j.jss.2019.06.100","volume":"156","author":"X Han","year":"2019","unstructured":"Han X, Carroll D, Yu T (2019) Reproducing performance bug reports in server applications: The researchers\u2019 experiences. J Syst Softw 156:268\u2013282","journal-title":"J Syst Softw"},{"key":"10152_CR39","doi-asserted-by":"crossref","unstructured":"Han X, Yu T (2016) An empirical study on performance bugs for highly configurable software systems. In: Proceedings of the international symposium on empirical software engineering and measurement. ACM\/IEEE, pp 1\u201310","DOI":"10.1145\/2961111.2962602"},{"key":"10152_CR40","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139226424","volume-title":"Performance modeling and design of computer systems: queueing theory in action","author":"M Harchol-Balter","year":"2013","unstructured":"Harchol-Balter M (2013) Performance modeling and design of computer systems: queueing theory in action. Cambridge University Press, Cambridge"},{"key":"10152_CR41","doi-asserted-by":"crossref","unstructured":"Heger C, Happe J, Farahbod R (2013) Automated root cause isolation of performance regressions during software development. In: Proceedings of the international conference on performance engineering (ICPE). ACM, pp 27\u201338","DOI":"10.1145\/2479871.2479879"},{"issue":"10","key":"10152_CR42","doi-asserted-by":"publisher","first-page":"3851","DOI":"10.1080\/03610928908830127","volume":"18","author":"HF Inman","year":"1989","unstructured":"Inman HF, Bradley EL Jr (1989) The overlapping coefficient as a measure of agreement between probability distributions and point estimation of the overlap of two normal densities. Commun Stat-Theory Methods 18(10):3851\u20133874","journal-title":"Commun Stat-Theory Methods"},{"issue":"1","key":"10152_CR43","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1239\/jap\/1331216837","volume":"49","author":"B Jedynak","year":"2012","unstructured":"Jedynak B, Frazier P I, Sznitman R (2012) Twenty questions with noise: Bayes optimal policies for entropy loss. J Appl Probab 49(1):114\u2013136","journal-title":"J Appl Probab"},{"issue":"1","key":"10152_CR44","doi-asserted-by":"publisher","first-page":"57","DOI":"10.14778\/3357377.3357382","volume":"13","author":"J Jung","year":"2019","unstructured":"Jung J, Hu H, Arulraj J, Kim T, Kang W (2019) Apollo: Automatic detection and diagnosis of performance regressions in database systems. Proceedings of the VLDB Endowment 13(1):57\u201370","journal-title":"Proceedings of the VLDB Endowment"},{"key":"10152_CR45","unstructured":"Karp R M, Kleinberg R (2007) Noisy binary search and its applications. In: Proceedings of the ACM-SIAM symposium on discrete algorithms. ACM, pp 881\u2013890"},{"key":"10152_CR46","unstructured":"Keenan J E (2019) Multisection: When Bisection Isn\u2019t Enough to Debug a Problem \u2013 The Perl Conference 2019. https:\/\/www.youtube.com\/watch?v=05CwdTRt6AM (Accessed: November 18, 2021)"},{"key":"10152_CR47","unstructured":"Larabel M (2009a) Autonomously finding performance regressions in the linux kernel. https:\/\/www.phoronix.com\/scan.php?page=article&item=linux_perf_regressions&num=2 (Accessed: August 11, 2021)"},{"key":"10152_CR48","unstructured":"Larabel M (2009b) Phoromatic tracker launches to monitor linux performance. https:\/\/www.phoronix.com\/scan.php?page=article&item=phoromatic_tracker&num=2 (Accessed: August 11, 2021)"},{"key":"10152_CR49","doi-asserted-by":"crossref","unstructured":"Leitner P, Bezemer C-P (2017) An exploratory study of the state of practice of performance testing in java-based open source projects. In: Proceedings of the international conference on performance engineering (ICPE). ACM, pp 373\u2013384","DOI":"10.1145\/3030207.3030213"},{"key":"10152_CR50","doi-asserted-by":"crossref","unstructured":"Linares-V\u00e1squez M, Vendome C, Luo Q, Poshyvanyk D (2015) How developers detect and fix performance bottlenecks in Android apps. In: Proceedings of the international conference on software maintenance and evolution (ICSME). IEEE Computer Society, pp 352\u2013361","DOI":"10.1109\/ICSM.2015.7332486"},{"key":"10152_CR51","doi-asserted-by":"crossref","unstructured":"Luo Q, Poshyvanyk D, Grechanik M (2016) Mining performance regression inducing code changes in evolving software. In: Proceedings of the international conference on mining software repositories (MSR). ACM, pp 25\u201336","DOI":"10.1145\/2901739.2901765"},{"key":"10152_CR52","doi-asserted-by":"crossref","unstructured":"Malik H, Adams B, Hassan AE (2010) Pinpointing the subsystems responsible for the performance deviations in a load test. In: Proceedings of the international symposium on software reliability engineering (ISSRE). IEEE Computer Society, pp 201\u2013210","DOI":"10.1109\/ISSRE.2010.43"},{"key":"10152_CR53","unstructured":"Mercurial (2005) Mercurial bisect command documentation. https:\/\/www.selenic.com\/mercurial\/hg.1.html (Accessed: August 11, 2021)"},{"key":"10152_CR54","unstructured":"Microsoft (2015) How to: Compare Performance Data Files. https:\/\/msdn.microsoft.com\/en-us\/library\/bb385753.aspx (Accessed: February 19, 2018)"},{"key":"10152_CR55","unstructured":"Microsoft (2018) Startup performance regressed. https:\/\/github.com\/microsoft\/vscode\/issues\/42513 (Accessed: June 20, 2021)"},{"key":"10152_CR56","unstructured":"Microsoft (2021a) Microsoft .NET CoreFX. https:\/\/www.github.com\/dotnet\/runtime (Accessed: July 20, 2021)"},{"key":"10152_CR57","unstructured":"Microsoft (2021b) Microsoft .NET Roslyn. https:\/\/www.github.com\/dotnet\/roslyn (Accessed: July 20, 2021)"},{"key":"10152_CR58","unstructured":"Microsoft (2021c) Microsoft Visual Studio Code. https:\/\/www.github.com\/microsoft\/vscode (Accessed: July 20, 2021)"},{"key":"10152_CR59","unstructured":"Microsoft (2021) [Perf -6%] Regression in System.Text.Encodings.Web.Tests.Perf_Encoders. https:\/\/github.com\/dotnet\/runtime\/issues\/48519 (Accessed: June 20, 2021)"},{"key":"10152_CR60","unstructured":"Moby Project (2021) Moby. https:\/\/www.github.com\/moby\/moby (Accessed: July 20, 2021)"},{"key":"10152_CR61","unstructured":"Mozilla Corporation (2021) Servo. https:\/\/www.github.com\/servo\/servo (Accessed: July 20, 2021)"},{"key":"10152_CR62","unstructured":"Murphy W (2018) Investigating performance changes with git bisect. https:\/\/willmurphyscode.net\/2018\/02\/07\/investigating-performance-changes-with-git-bisect\/l (Accessed: August 11, 2021)"},{"key":"10152_CR63","doi-asserted-by":"crossref","unstructured":"Najafi A, Rigby P C, Shang W (2019) Bisecting commits and modeling commit risk during testing. In: Proceedings of joint meeting on european software engineering conference and symposium on the foundations of software engineering (ESEC\/FSE). ACM, pp 279\u2013289","DOI":"10.1145\/3338906.3338944"},{"issue":"3","key":"10152_CR64","doi-asserted-by":"publisher","first-page":"37","DOI":"10.1145\/3475965.3477581","volume":"19","author":"GV Neville-Neil","year":"2021","unstructured":"Neville-Neil GV (2021) Divide and conquer: The use and limits of bisection. Queue 19(3):37\u201339","journal-title":"Queue"},{"key":"10152_CR65","doi-asserted-by":"crossref","unstructured":"Nguyen Thanh HD, Nagappan M, Hassan A E, Nasser M, Flora P (2014) An industrial case study of automatically identifying performance regression-causes. In: Proceedings of the international working conference on mining software repositories (MSR). ACM, pp 232\u2013241","DOI":"10.1145\/2597073.2597092"},{"key":"10152_CR66","doi-asserted-by":"crossref","unstructured":"Nistor A, Chang P-C, Radoi C, Lu S (2015) Caramel: detecting and fixing performance problems that have non-intrusive fixes. In: Proceedings of the International Conference on Software Engineering (ICSE). IEEE Computer Society, pp 902\u2013912","DOI":"10.1109\/ICSE.2015.100"},{"key":"10152_CR67","doi-asserted-by":"crossref","unstructured":"Nistor A, Jiang T, Tan L (2013) Discovering, reporting, and fixing performance bugs. In: Proceedings of the working conference on mining software repositories (MSR). IEEE Computer Society, pp 237\u2013246","DOI":"10.1109\/MSR.2013.6624035"},{"key":"10152_CR68","unstructured":"NixOS (2021) NixOS package collection. https:\/\/www.github.com\/NixOS\/nixpkgs (Accessed: July 20, 2021)"},{"key":"10152_CR69","unstructured":"Nowak R (2009) Noisy generalized binary search. In: Proceedings of advances in neural iinformation processing systems, pp 1366\u20131374"},{"key":"10152_CR70","unstructured":"Ocariza F (2020) Web Application Debugging \u2013 UBC Guest Lecture. https:\/\/www.youtube.com\/watch?v=gNa247IaaGM (Accessed: June 20, 2021)"},{"key":"10152_CR71","doi-asserted-by":"crossref","unstructured":"Ocariza F, Bajaj K, Pattabiraman K, Mesbah A (2013) An empirical study of client-side JavaScript bugs. In: Proceedings of the international symposium on empirical software engineering and measurement (ESEM). IEEE Computer Society, pp 55\u201364","DOI":"10.1109\/ESEM.2013.18"},{"issue":"5","key":"10152_CR72","doi-asserted-by":"crossref","first-page":"e1750","DOI":"10.1002\/stvr.1750","volume":"31","author":"F Ocariza","year":"2021","unstructured":"Ocariza F, Zhao B (2021) Localizing software performance regressions in web applications by comparing execution timelines. Software Testing, Verification and Reliability (STVR) 31(5):e1750","journal-title":"Software Testing, Verification and Reliability (STVR)"},{"issue":"2","key":"10152_CR73","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1109\/TSE.2016.2586066","volume":"43","author":"FS Ocariza","year":"2017","unstructured":"Ocariza F S, Bajaj K, Pattabiraman K, Mesbah A (2017) A study of causes and consequences of client-side javascript bugs. IEEE Trans Softw Eng 43(2):128\u2013144","journal-title":"IEEE Trans Softw Eng"},{"key":"10152_CR74","doi-asserted-by":"crossref","unstructured":"Olianas D, Leotta M, Ricca F, Biagiola M, Tonella P (2021) STILE: a tool for parallel execution of e2e web test scripts. In: Proceedings of the international conference on software testing, verification and validation (ICST). IEEE Computer Society, pp 460\u2013465","DOI":"10.1109\/ICST49551.2021.00060"},{"issue":"2","key":"10152_CR75","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/0304-3975(89)90077-7","volume":"63","author":"A Pelc","year":"1989","unstructured":"Pelc A (1989) Searching with known error probability. Theor Comput Sci 63(2):185\u2013202","journal-title":"Theor Comput Sci"},{"key":"10152_CR76","doi-asserted-by":"crossref","unstructured":"Pradel M, Schuh P, Sen K (2014) EventBreak: analyzing the responsiveness of user interfaces through performance-guided test generation. In: Proceedings of the international conference on object oriented programming systems languages & applications (OOPSLA). ACM, pp 33\u201347","DOI":"10.1145\/2714064.2660233"},{"key":"10152_CR77","unstructured":"Red Hat (2021a) Ansible. https:\/\/www.github.com\/ansible\/ansible (Accessed: July 20, 2021)"},{"key":"10152_CR78","unstructured":"Red Hat (2021b) Red Hat OpenShift. https:\/\/www.github.com\/openshift\/origin (Accessed: July 20, 2021)"},{"issue":"3","key":"10152_CR79","doi-asserted-by":"publisher","first-page":"396","DOI":"10.1016\/0022-0000(80)90014-8","volume":"20","author":"RL Rivest","year":"1980","unstructured":"Rivest R L, Meyer A R, Kleitman D J, Winklmann K, Spencer J (1980) Coping with errors in binary search procedures. J Comput Syst Sci 20 (3):396\u2013404","journal-title":"J Comput Syst Sci"},{"key":"10152_CR80","doi-asserted-by":"crossref","unstructured":"Rogora D, Carzaniga A, Diwan A, Hauswirth M, Soul\u00e9 R (2020) Analyzing system performance with probabilistic performance annotations. In: Proceedings of the european conference on computer systems (EuroSys), pp 1\u201314","DOI":"10.1145\/3342195.3387554"},{"key":"10152_CR81","doi-asserted-by":"crossref","unstructured":"Saha R, Gligoric M (2017) Selective bisection debugging. In: Proceedings of the international conference on fundamental approaches to software engineering (FASE). Springer, pp 60\u201377","DOI":"10.1007\/978-3-662-54494-5_4"},{"key":"10152_CR82","doi-asserted-by":"publisher","first-page":"107214","DOI":"10.1109\/ACCESS.2020.3000928","volume":"8","author":"AB S\u00e1nchez","year":"2020","unstructured":"S\u00e1nchez A B, Delgado-P\u00e9rez P, Medina-Bulo I, Segura S (2020) Tandem: A taxonomy and a dataset of real-world performance bugs. IEEE Access 8:107214\u2013107228","journal-title":"IEEE Access"},{"key":"10152_CR83","doi-asserted-by":"crossref","unstructured":"Sandoval Alcocer JP, Bergel A, Valente M T (2016) Learning from source code history to identify performance failures. In: Proceedings of the international conference on performance engineering (ICPE). ACM, pp 37\u201348","DOI":"10.1145\/2851553.2851571"},{"key":"10152_CR84","doi-asserted-by":"crossref","unstructured":"Sasaki H, Su F-H, Tanimoto T, Sethumadhavan S (2017) Why do programs have heavy tails?. In: Proceedings of the international symposium on workload characterization (IISWC). IEEE, pp 135\u2013145","DOI":"10.1109\/IISWC.2017.8167771"},{"key":"10152_CR85","doi-asserted-by":"crossref","unstructured":"Selakovic M, Pradel M (2016) Performance issues and optimizations in JavaScript: an empirical study. In: Proceedings of the international conference on software engineering (ICSE). ACM, pp 61\u201372","DOI":"10.1145\/2884781.2884829"},{"key":"10152_CR86","doi-asserted-by":"crossref","unstructured":"Shang W, Hassan A E, Nasser M, Flora P (2015) Automated detection of performance regressions using regression models on clustered performance counters. In: Proceedings of the international conference on performance engineering (ICPE). ACM, pp 15\u201326","DOI":"10.1145\/2668930.2688052"},{"key":"10152_CR87","unstructured":"The Rust Foundation (2021) Rust. https:\/\/www.github.com\/rust-lang\/rust (Accessed: July 20, 2021)"},{"key":"10152_CR88","doi-asserted-by":"crossref","unstructured":"Tizpaz-Niari S, Cerny P, Chang B-Y E, Trivedi A (2018) Differential performance debugging with discriminant regression trees. In: Proceedings of the AAAI conference on artificial intelligence. AAAI","DOI":"10.1609\/aaai.v32i1.11875"},{"key":"10152_CR89","doi-asserted-by":"crossref","unstructured":"Tizpaz-Niari S, \u010cerny\u0300 P, Trivedi A (2020) Detecting and understanding real-world differential performance bugs in machine learning libraries. In: Proceedings of the international symposium on software testing and analysis (ISSTA). ACM, pp 189\u2013199","DOI":"10.1145\/3395363.3404540"},{"key":"10152_CR90","doi-asserted-by":"crossref","unstructured":"Tsiligkaridis T (2016) Asynchronous decentralized algorithms for the noisy 20 questions problem. In: Proceedings of the international symposium on information theory (ISIT). IEEE, pp 2699\u20132703","DOI":"10.1109\/ISIT.2016.7541789"},{"issue":"3","key":"10152_CR91","doi-asserted-by":"publisher","first-page":"2261","DOI":"10.1137\/120861898","volume":"51","author":"R Waeber","year":"2013","unstructured":"Waeber R, Frazier P I, Henderson S G (2013) Bisection search with noisy responses. SIAM J Control Optim 51(3):2261\u20132279","journal-title":"SIAM J Control Optim"},{"key":"10152_CR92","volume-title":"Measures of overlap of income distributions of white and negro families in the united states, vol 3","author":"MS Weitzman","year":"1970","unstructured":"Weitzman MS (1970) Measures of overlap of income distributions of white and negro families in the united states, vol 3. US Bureau of the Census, USA"},{"key":"10152_CR93","unstructured":"YourKit (2018) YourKit. https:\/\/www.yourkit.com\/ (Accessed: July 2, 2018)"},{"key":"10152_CR94","doi-asserted-by":"crossref","unstructured":"Zaman S, Adams B, Hassan A E (2012) A qualitative study on performance bugs. In: Proceedings of the IEEE working conference on mining software repositories (MSR). IEEE Computer Society, pp 199\u2013208","DOI":"10.1109\/MSR.2012.6224281"},{"key":"10152_CR95","doi-asserted-by":"crossref","unstructured":"Zeller A (1999) Yesterday, my program worked. today, it does not. why?. In: Proceedings of the joint meeting of the european software engineering conference and the symposium on the foundations of software engineering (ESEC\/FSE). ACM, pp 253\u2013266","DOI":"10.1007\/3-540-48166-4_16"},{"key":"10152_CR96","doi-asserted-by":"crossref","unstructured":"Zhao Y, Xiao L, Wang X, Sun L, Chen B, Liu Y, Bondi A B (2020) How are performance issues caused and resolved?-an empirical study from a design perspective. In: Proceedings of the international conference on performance engineering (ICPE). ACM, pp 181\u2013192","DOI":"10.1145\/3358960.3379130"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-022-10152-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10664-022-10152-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-022-10152-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,11,20]],"date-time":"2023-11-20T22:08:56Z","timestamp":1700518136000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10664-022-10152-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,4,30]]},"references-count":96,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2022,7]]}},"alternative-id":["10152"],"URL":"https:\/\/doi.org\/10.1007\/s10664-022-10152-3","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2022,4,30]]},"assertion":[{"value":"23 March 2022","order":1,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"30 April 2022","order":2,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}],"article-number":"95"}}