{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:13:56Z","timestamp":1763507636306},"reference-count":25,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2005,6,1]],"date-time":"2005-06-01T00:00:00Z","timestamp":1117584000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Netw Syst Manage"],"published-print":{"date-parts":[[2005,6]]},"DOI":"10.1007\/s10922-005-4443-8","type":"journal-article","created":{"date-parts":[[2005,7,1]],"date-time":"2005-07-01T06:51:52Z","timestamp":1120200712000},"page":"219-237","source":"Crossref","is-referenced-by-count":24,"title":["Automated Problem Determination Using Call-Stack Matching"],"prefix":"10.1007","volume":"13","author":[{"given":"Mark","family":"Brodie","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Sheng","family":"Ma","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Leonid","family":"Rachevsky","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Jon","family":"Champlin","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"4443_CR1","unstructured":"BoundsChecker, http:\/\/www.compuware.com\/products\/devpartner\/bounds.htm."},{"key":"4443_CR2","unstructured":"TrueTime, http:\/\/www.hallogram.com\/devvb\/truetime\/."},{"key":"4443_CR3","unstructured":"VTune, http:\/\/developer.intel.com\/software\/products\/vtune\/index.htm."},{"key":"4443_CR4","unstructured":"PurifyPlus, http:\/\/www-306.ibm.com\/software\/awdtools\/purifyplus\/."},{"key":"4443_CR5","unstructured":"S. Shende, A. D. Malony, and R. Ansell-Bell, Instrumentation and Measurement Strategies for Flexible and Portable Empirical Performance Evaluation, Proceedings of Parallel and Distributed Processing Techniques and Applications, 2001."},{"key":"4443_CR6","unstructured":"\u201cComparing and contrasting runtime error detection technologies,\u201d available from MicroQuill at http:\/\/www.microquill.com\/heapagent\/ha_comp.htm."},{"key":"4443_CR7","unstructured":"HPROF, http:\/\/java.sun.com\/developer\/TechTips\/2000\/tt0124.html."},{"key":"4443_CR8","unstructured":"xdProf, http:\/\/xdprof.sourceforge.net\/."},{"key":"4443_CR9","unstructured":"M. Pietrek, Under the Hood: The .NET Profiling API and the DNProfiler Tool, MSDN Magazine, December 2001."},{"key":"4443_CR10","unstructured":"JVMDI, http:\/\/java.sun.com\/j2se\/1.4.2\/docs\/guide\/jpda\/jvmdi-spec.html."},{"key":"4443_CR11","unstructured":"D. Crevier, AI: The Tumultuous History of the Search for Artificial Intelligence, Basic Books, 1993."},{"issue":"2","key":"4443_CR12","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1109\/32.988498","volume":"28","author":"A. Zeller","year":"February 2002","unstructured":"A. Zeller and R. Hildebrandt, Simplifying and isolating failure-inducing input, IEEE Transactions on Software Engineering 28(2), pp. 183\u2013200, February 2002.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"4443_CR13","doi-asserted-by":"crossref","unstructured":"J. D. Choi and A. Zeller, Isolating Failure-Inducing Thread Schedules, Proceedings of the International Symposium on Software Testing and Analysis, July 2002.","DOI":"10.1145\/566172.566211"},{"key":"4443_CR14","unstructured":"H. Cleve and A. Zeller, Finding Failure Cases through Automated Testing, Proceedings of the Fourth International Workshop on Automated Debugging, 2000."},{"key":"4443_CR15","unstructured":"B. Liblit, A. Aiken, A. Zheng, and M. Jordan, Sampling User Executions for Bug Isolation, Workshop on Remote Analysis and Measurement of Software Systems, 2003."},{"key":"4443_CR16","doi-asserted-by":"crossref","unstructured":"M. Chen, A. Zheng, J. Lloyd, M. Jordan, and E. Brewer, Failure Diagnosis Using Decision Trees, International Conference on Autonomic Computing, 2004.","DOI":"10.1109\/ICAC.2004.1301345"},{"key":"4443_CR17","doi-asserted-by":"crossref","unstructured":"A. Podgurski, D. Leon, P. Francis, and M. Minch, Automated Support for Classifying and Prioritizing Software Failure Reports, 25th International Conference on Software Engineering, pp. 465, 2003.","DOI":"10.1109\/ICSE.2003.1201224"},{"key":"4443_CR18","doi-asserted-by":"crossref","unstructured":"S. Hangal and M. Lam, Tracking Down Software Bugs Using Automatic Anomaly Detection, 24th International Conference on Software Engineering, pp. 291, 2002.","DOI":"10.1145\/581376.581377"},{"key":"4443_CR19","doi-asserted-by":"crossref","unstructured":"M. D. Ernst, J. Cockrell, W. Grisowold, and D. Notkin, dynamically discovering likely program invariants to support program evolution, IEEE Transactions on Software Engineering, Vol. 27, No. 2, February 2001.","DOI":"10.1109\/32.908957"},{"key":"4443_CR20","unstructured":"T. Acorn and S. Walden, SMART: Support management reasoning technology for Compaq customer service, Innovative Applications of Artificial Intelligence, Vol. 4, 1992."},{"key":"4443_CR21","unstructured":"T. Li, S. Zhu, and M. Ogihara, Mining Patterns from Case Base Analysis, Workshop on Integrating Data Mining and Knowledge Management, 2001."},{"key":"4443_CR22","unstructured":"L. Lewis, Managing Computer Networks: A Case-Based Reasoning Approach, Artech House Publishers, 1995."},{"key":"4443_CR23","doi-asserted-by":"crossref","unstructured":"H. H. Feng, O. Kolesnikov, P. Fogla, W. Lee, and W. Gong, Anomaly Detection Using Call Stack Information, Proceedings of the 2003 IEEE Symposium on Security and Privacy, pp. 62, 2003.","DOI":"10.1109\/SECPRI.2003.1199328"},{"key":"4443_CR24","unstructured":"J. Lambert, Using Stack Traces to Identify Failed Executions in a Java Distributed System, Masters Thesis, Case Western Reserve University, 2002."},{"key":"4443_CR25","unstructured":"J. Lambert and A. Podgurski, xdProf: A Tool for the capture and analysis of stack traces in a distributed Java system, International Society of Optical Engineering (SPIE) Proceedings, Vol. 4521, pp. 96\u2013105, 2001."}],"container-title":["Journal of Network and Systems Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-005-4443-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10922-005-4443-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10922-005-4443-8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,4,8]],"date-time":"2020-04-08T02:54:23Z","timestamp":1586314463000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10922-005-4443-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,6]]},"references-count":25,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2005,6]]}},"alternative-id":["4443"],"URL":"https:\/\/doi.org\/10.1007\/s10922-005-4443-8","relation":{},"ISSN":["1064-7570","1573-7705"],"issn-type":[{"value":"1064-7570","type":"print"},{"value":"1573-7705","type":"electronic"}],"subject":[],"published":{"date-parts":[[2005,6]]}}}