{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,29]],"date-time":"2025-09-29T20:26:21Z","timestamp":1759177581629,"version":"3.37.3"},"reference-count":55,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T00:00:00Z","timestamp":1619049600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T00:00:00Z","timestamp":1619049600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"funder":[{"name":"Ministry of Education, India","award":["Indian Institute of Technology"],"award-info":[{"award-number":["Indian Institute of Technology"]}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Innovations Syst Softw Eng"],"published-print":{"date-parts":[[2021,9]]},"DOI":"10.1007\/s11334-021-00393-8","type":"journal-article","created":{"date-parts":[[2021,4,22]],"date-time":"2021-04-22T20:02:51Z","timestamp":1619121771000},"page":"289-307","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["A mathematical framework for design discovery from multi-threaded applications using neural sequence solvers"],"prefix":"10.1007","volume":"17","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3935-4087","authenticated-orcid":false,"given":"Srijoni","family":"Majumdar","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1109-5063","authenticated-orcid":false,"given":"Nachiketa","family":"Chatterjee","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1435-6051","authenticated-orcid":false,"given":"Partha Pratim","family":"Das","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4380-3172","authenticated-orcid":false,"given":"Amlan","family":"Chakrabarti","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,4,22]]},"reference":[{"issue":"4","key":"393_CR1","doi-asserted-by":"publisher","first-page":"433","DOI":"10.1002\/wics.101","volume":"2","author":"H Abdi","year":"2010","unstructured":"Abdi H, Williams LJ (2010) Principal component analysis. Wiley Interdiscip Rev Cmput Stat 2(4):433\u2013459","journal-title":"Wiley Interdiscip Rev Cmput Stat"},{"issue":"10","key":"393_CR2","doi-asserted-by":"publisher","first-page":"1340","DOI":"10.1093\/bioinformatics\/btq134","volume":"26","author":"A Altmann","year":"2010","unstructured":"Altmann A, Tolo\u015fi L, Sander O, Lengauer T (2010) Permutation importance: a corrected feature importance measure. Bioinformatics 26(10):1340\u20131347","journal-title":"Bioinformatics"},{"key":"393_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-02384-3","volume-title":"Empirical approach to machine learning","author":"PP Angelov","year":"2019","unstructured":"Angelov PP, Gu X (2019) Empirical approach to machine learning. Springer, Berlin"},{"key":"393_CR4","doi-asserted-by":"crossref","unstructured":"Begel A, Zimmermann T (2014) Analyze this! 145 questions for data scientists in software engineering. In: International conference on software engineering (ICSE). ACM, pp 12\u201323","DOI":"10.1145\/2568225.2568233"},{"key":"393_CR5","doi-asserted-by":"crossref","unstructured":"Benesty J, Chen J, Huang Y, Cohen I (2009) Pearson correlation coefficient. In: Noise reduction in speech processing. Springer, pp 1\u20134","DOI":"10.1007\/978-3-642-00296-0_5"},{"issue":"1","key":"393_CR6","first-page":"281","volume":"13","author":"J Bergstra","year":"2012","unstructured":"Bergstra J, Bengio Y (2012) Random search for hyper-parameter optimization. J Mach Learn Res 13(1):281\u2013305","journal-title":"J Mach Learn Res"},{"key":"393_CR7","doi-asserted-by":"crossref","unstructured":"Bienia C, Kumar S, Singh JP, Li K (2008) The parsec benchmark suite: characterization and architectural implications. In: International conference on parallel architectures and compilation techniques (PACT). IEEE, pp 72\u201381","DOI":"10.1145\/1454115.1454128"},{"key":"393_CR8","unstructured":"CDAC (2019) In house pthreads benchmarks. https:\/\/www.cdac.in\/index.aspx?id=ev_hpc_hypack_pthreads_overview. Accessed 1 Feb 2019"},{"key":"393_CR9","unstructured":"Chatterjee N, Majumdar S, Sahoo SR, Das PP (2015) Debugging multi-threaded applications using pin-augmented gdb (pgdb). In: International conference on software engineering research and practice (SERP). Springer, pp 109\u2013115"},{"key":"393_CR10","doi-asserted-by":"crossref","unstructured":"Chen CP (2003) The parallel debugging architecture in the intel\u00ae debugger. In: International conference on parallel computing technologies. Springer, pp 444\u2013451","DOI":"10.1007\/978-3-540-45145-7_41"},{"key":"393_CR11","unstructured":"Chen Y, Lee YH, Wong WE, Guo D (2008) A race condition graph for concurrent program behavior. In: International conference on intelligent system and knowledge engineering (ICISKE). IEEE, pp 662\u2013667"},{"issue":"5","key":"393_CR12","doi-asserted-by":"publisher","first-page":"684","DOI":"10.1109\/TSE.2009.28","volume":"35","author":"B Cornelissen","year":"2009","unstructured":"Cornelissen B, Zaidman A, Van Deursen A, Moonen L, Koschke R (2009) A systematic survey of program comprehension through dynamic analysis. IEEE Trans Softw Eng 35(5):684\u2013702","journal-title":"IEEE Trans Softw Eng"},{"key":"393_CR13","unstructured":"Decugis S, Vivier L, Bisain A (2019) Open posix test suite, open gpl source project. https:\/\/github.com\/juj\/posixtestsuite. Accessed 1 Feb 2019"},{"issue":"1","key":"393_CR14","doi-asserted-by":"publisher","first-page":"63","DOI":"10.5455\/aim.2012.21.63-66","volume":"21","author":"SMH Dehaghani","year":"2013","unstructured":"Dehaghani SMH, Hajrahimi N (2013) Which factors affect software projects maintenance cost more? Acta Inform Medica 21(1):63\u201372","journal-title":"Acta Inform Medica"},{"key":"393_CR15","unstructured":"Docs O (2019) Design considerations for a multithreaded and multicontexted application. https:\/\/docs.oracle.com\/cd\/E13203_01\/tuxedo\/tux71\/html\/pgthr8.htm. Accessed 12 Oct 2019"},{"key":"393_CR16","unstructured":"Drepper U, Molnar I (2003) The native posix thread library for linux. White Paper, Red Hat Inc vol 10, no 2, pp 22\u201342"},{"key":"393_CR17","doi-asserted-by":"crossref","unstructured":"Du\u00a0Bois K, Sartor JB, Eyerman S, Eeckhout L (2013) Bottle graphs: visualizing scalability bottlenecks in multi-threaded applications. In: Special Interest Group on programming languages notices (SIGPLAN). ACM, pp 355\u2013372","DOI":"10.1145\/2544173.2509529"},{"key":"393_CR18","doi-asserted-by":"crossref","unstructured":"Favre JM, Duclos F, Estublier J, Sanlaville R, Auffret JJ (2001) Reverse engineering a large component-based software product. In: European conference on software maintenance and reengineering (CSMR). IEEE, pp 95\u2013104","DOI":"10.1109\/CSMR.2001.914973"},{"key":"393_CR19","doi-asserted-by":"crossref","unstructured":"Freitas JL et\u00a0al (2012) A comment analysis approach for program comprehension. In: Annual software engineering workshop (SEW). IEEE, pp 11\u201320","DOI":"10.1109\/SEW.2012.8"},{"issue":"5","key":"393_CR20","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1109\/MC.2005.160","volume":"38","author":"D Geer","year":"2005","unstructured":"Geer D (2005) Chip makers turn to multicore processors. Computer 38(5):11\u201313","journal-title":"Computer"},{"issue":"3","key":"393_CR21","doi-asserted-by":"publisher","first-page":"330","DOI":"10.1016\/j.sapharm.2012.04.004","volume":"9","author":"N Gisev","year":"2013","unstructured":"Gisev N et al (2013) Interrater agreement and interrater reliability: key concepts, approaches, and applications. Soc Adm Pharm 9(3):330\u2013338","journal-title":"Soc Adm Pharm"},{"key":"393_CR22","doi-asserted-by":"crossref","unstructured":"Guo S et\u00a0al (2016) Concise: incremental symbolic execution of concurrent software. In: Automated software engineering (ASE). ACM, pp 531\u2013542","DOI":"10.1145\/2970276.2970332"},{"issue":"4","key":"393_CR23","doi-asserted-by":"publisher","first-page":"e1006682","DOI":"10.1371\/journal.pcbi.1006682","volume":"15","author":"PS Hosmani","year":"2019","unstructured":"Hosmani PS et al (2019) A quick guide for student-driven community genome annotation. PLoS Comput Biol 15(4):e1006682","journal-title":"PLoS Comput Biol"},{"key":"393_CR24","unstructured":"Intel (2007) Multicore has gone mainstream, but are developers ready?. http:\/\/www.ece.uprm.edu\/wrivera\/ICOM4036\/Paper2.pdf"},{"key":"393_CR25","unstructured":"Joaquim L (2020) Typeform (2012) www.typeform.com. Accessed 25 April 2020"},{"key":"393_CR26","doi-asserted-by":"publisher","first-page":"971","DOI":"10.1109\/TSE.2006.116","volume":"12","author":"AJ Ko","year":"2006","unstructured":"Ko AJ, Myers BA, Coblenz MJ, Aung HH (2006) An exploratory study of how developers seek, relate, and collect relevant information during software maintenance tasks. IEEE Trans Softw Eng 12:971\u2013987","journal-title":"IEEE Trans Softw Eng"},{"issue":"2","key":"393_CR27","first-page":"1","volume":"11","author":"HT Lin","year":"2003","unstructured":"Lin HT, Lin CJ (2003) A study on sigmoid kernels for svm and the training of non-psd kernels by smo-type methods. Neural Comput 11(2):1\u201332","journal-title":"Neural Comput"},{"key":"393_CR28","doi-asserted-by":"crossref","unstructured":"Liu Y, Sun X, Duan Y (2015) Analyzing program readability based on wordnet. In: International workshop on empirical assessment of software technologies (EASE). ACM, pp 27\u201332","DOI":"10.1145\/2745802.2745837"},{"issue":"1","key":"393_CR29","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1002\/widm.8","volume":"1","author":"WY Loh","year":"2011","unstructured":"Loh WY (2011) Classification and regression trees. Wiley Interdiscip Rev Data Min Knowl Discov 1(1):14\u201323","journal-title":"Wiley Interdiscip Rev Data Min Knowl Discov"},{"key":"393_CR30","doi-asserted-by":"crossref","unstructured":"Luk CK et\u00a0al (2005) Pin: building customized program analysis tools with dynamic instrumentation. In: Special Interest Group on programming languages notices (SIGPLAN). ACM, pp 190\u2013200","DOI":"10.1145\/1064978.1065034"},{"key":"393_CR31","unstructured":"Majumdar S. Dcube. https:\/\/sites.google.com\/site\/codepoapluginforeclipse\/setup-instructions-tool"},{"key":"393_CR32","doi-asserted-by":"crossref","unstructured":"Majumdar S, Chatterjee N, Sahoo SR, Das PP (2016) D-cube: tool for dynamic design discovery from multi-threaded applications using pin. In: International conference on software quality, reliability and security (QRS). IEEE, pp 25\u201332","DOI":"10.1109\/QRS.2016.13"},{"key":"393_CR33","doi-asserted-by":"crossref","unstructured":"Majumdar S et\u00a0al (2019) Smartkt: a search framework to assist program comprehension using smart knowledge transfer. In: International conference on software quality, reliability and security (QRS). IEEE, pp 97\u2013108","DOI":"10.1109\/QRS.2019.00026"},{"key":"393_CR34","doi-asserted-by":"publisher","DOI":"10.1002\/047084535X","volume-title":"Recurrent neural networks for prediction: learning algorithms, architectures and stability","author":"D Mandic","year":"2001","unstructured":"Mandic D, Chambers J (2001) Recurrent neural networks for prediction: learning algorithms, architectures and stability. Wiley, Hoboken"},{"key":"393_CR35","doi-asserted-by":"crossref","unstructured":"Martin J, Muller HA (2001) Strategies for migration from C to Java. In: European conference on software maintenance and reengineering. IEEE, pp 200\u2013209","DOI":"10.1109\/CSMR.2001.914988"},{"key":"393_CR36","unstructured":"Microsoft (2019) Microsoft concurrency visualizer. https:\/\/msdn.microsoft.com\/en-us\/library\/dd537632.aspx. Accessed 1 Feb 2019"},{"key":"393_CR37","doi-asserted-by":"crossref","unstructured":"Moiseev M, Glukhikh M, Zakharov A, Richter H (2013) A static analysis approach to data race detection in systemc designs. In: International symposium on design and diagnostics of electronic circuits & systems (DDECS). IEEE, pp 54\u201359","DOI":"10.1109\/DDECS.2013.6549788"},{"issue":"1","key":"393_CR38","first-page":"20","volume":"13","author":"W Peng","year":"2009","unstructured":"Peng W, Chen J, Zhou H (2009) An implementation of id3-decision tree learning algorithm. Int J Adv Inf Sci Technol 13(1):20\u201327","journal-title":"Int J Adv Inf Sci Technol"},{"issue":"4","key":"393_CR39","first-page":"298","volume":"23","author":"C Pheatt","year":"2008","unstructured":"Pheatt C (2008) Intel\u00ae threading building blocks. J Comput Sci Coll 23(4):298\u2013298","journal-title":"J Comput Sci Coll"},{"key":"393_CR40","doi-asserted-by":"crossref","unstructured":"Quante J, Koschke R (2007) Dynamic protocol recovery. In: Working conference on reverse engineering (WCRE). IEEE, pp 219\u2013228","DOI":"10.1109\/WCRE.2007.24"},{"key":"393_CR41","volume-title":"Vtune performance analyzer essentials","author":"J Reinders","year":"2005","unstructured":"Reinders J (2005) Vtune performance analyzer essentials. Intel Press, Santa Clara"},{"issue":"4","key":"393_CR42","doi-asserted-by":"publisher","first-page":"434","DOI":"10.1109\/TSE.2008.26","volume":"34","author":"J Sillito","year":"2008","unstructured":"Sillito J et al (2008) Asking and answering questions during a programming change task. IEEE Trans Softw Eng 34(4):434\u2013451","journal-title":"IEEE Trans Softw Eng"},{"key":"393_CR43","unstructured":"software.intel.com (2020) Intel inspector user guide for linux os. https:\/\/software.intel.com\/en-us\/. Accessed 3 May 2020"},{"key":"393_CR44","doi-asserted-by":"crossref","unstructured":"Song YW, Lee YH (2014) Efficient data race detection for c\/c++ programs using dynamic granularity. In: International conference on parallel and distributed processing symposium (ICPDPS). IEEE, pp 679\u2013688","DOI":"10.1109\/IPDPS.2014.76"},{"key":"393_CR45","doi-asserted-by":"crossref","unstructured":"Steidl D, Hummel B, Juergens E (2013) Quality analysis of source code comments. In: International conference on program comprehension (ICPC). IEEE, pp 83\u201392","DOI":"10.1109\/ICPC.2013.6613836"},{"key":"393_CR46","doi-asserted-by":"crossref","unstructured":"Tallent NR, Mellor-Crummey JM (2009) Effective performance measurement and analysis of multithreaded applications. In: Special Interest Group on programming languages notices (SIGPLAN). ACM, pp 229\u2013240","DOI":"10.1145\/1594835.1504210"},{"key":"393_CR47","unstructured":"Team TD (2020) Multi-threaded application and synchronization analysis. https:\/\/developer.tizen.org\/. Accessed 1 July 2020"},{"key":"393_CR48","doi-asserted-by":"crossref","unstructured":"Terragni V, Cheung SC, Zhang C (2015) Recontest: effective regression testing of concurrent programs. In: International conference on software engineering (ICSE). ACM, pp 246\u2013256","DOI":"10.1109\/ICSE.2015.45"},{"issue":"2","key":"393_CR49","doi-asserted-by":"publisher","first-page":"169","DOI":"10.3233\/AIC-170729","volume":"30","author":"A Tharwat","year":"2017","unstructured":"Tharwat A, Gaber T, Ibrahim A, Hassanien AE (2017) Linear discriminant analysis: a detailed tutorial. AI Commun 30(2):169\u2013190","journal-title":"AI Commun"},{"key":"393_CR50","unstructured":"Vocking H (2012) Performance analysis using Great Performance Tools and Linux Trace Toolkit next generation"},{"issue":"5","key":"393_CR51","first-page":"116","volume":"148","author":"L Wang","year":"2018","unstructured":"Wang L et al (2018) Tracking runtime dependences in java threads using thread control profiling. J Syst Softw 148(5):116\u2013131","journal-title":"J Syst Softw"},{"key":"393_CR52","volume-title":"Learning from strangers: the art and method of qualitative interview studies","author":"RS Weiss","year":"1995","unstructured":"Weiss RS (1995) Learning from strangers: the art and method of qualitative interview studies. Simon and Schuster, New York"},{"key":"393_CR53","unstructured":"Williams A, Escriba VB (2019) The boost. Thread library. https:\/\/www.boost.org\/doc\/libs\/1_68_0\/doc\/html\/thread.html. Accessed 1 Feb 2019"},{"issue":"3","key":"393_CR54","doi-asserted-by":"publisher","first-page":"031101","DOI":"10.1007\/s11432-015-0203-2","volume":"60","author":"Z Wu","year":"2017","unstructured":"Wu Z, Lu K, Wang X (2017) Surveying concurrency bug detectors based on types of detected bugs. Sci China Inf Sci 60(3):031101","journal-title":"Sci China Inf Sci"},{"key":"393_CR55","doi-asserted-by":"crossref","unstructured":"Ziadi T, da\u00a0Silva MAA, Hillah LM, Ziane M (2011) A fully dynamic approach to the reverse engineering of uml sequence diagrams. In: International conference on engineering of complex computer systems (ICECCS). IEEE, pp 107\u2013116","DOI":"10.1109\/ICECCS.2011.18"}],"container-title":["Innovations in Systems and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-021-00393-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s11334-021-00393-8\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-021-00393-8.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,31]],"date-time":"2021-07-31T12:12:04Z","timestamp":1627733524000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s11334-021-00393-8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,4,22]]},"references-count":55,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2021,9]]}},"alternative-id":["393"],"URL":"https:\/\/doi.org\/10.1007\/s11334-021-00393-8","relation":{},"ISSN":["1614-5046","1614-5054"],"issn-type":[{"type":"print","value":"1614-5046"},{"type":"electronic","value":"1614-5054"}],"subject":[],"published":{"date-parts":[[2021,4,22]]},"assertion":[{"value":"14 January 2021","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 March 2021","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"22 April 2021","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare that there is no conflict of interest.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Conflict of interest"}},{"value":"The program pool has been made available at .","order":3,"name":"Ethics","group":{"name":"EthicsHeading","label":"Availability of data and material"}},{"value":"The source code and other related documents have been made available at . All authors and authorities at institute\/organization have provided consent to submit this research work.","order":4,"name":"Ethics","group":{"name":"EthicsHeading","label":"Code availability"}}]}}