{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,12]],"date-time":"2026-02-12T13:37:50Z","timestamp":1770903470757,"version":"3.50.1"},"reference-count":81,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"DOI":"10.13039\/501100000780","name":"European Commission","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000780","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Spanish Ministry of Science, Innovation and Universities","award":["RTI2018-101204-B-C21"],"award-info":[{"award-number":["RTI2018-101204-B-C21"]}]},{"name":"Spanish Ministry of Science, Innovation and Universities","award":["RTI2018-093608-B-C33"],"award-info":[{"award-number":["RTI2018-093608-B-C33"]}]},{"name":"Andalusian Research, Development and Innovation Program","award":["US-1264651"],"award-info":[{"award-number":["US-1264651"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Access"],"published-print":{"date-parts":[[2020]]},"DOI":"10.1109\/access.2020.3000928","type":"journal-article","created":{"date-parts":[[2020,6,8]],"date-time":"2020-06-08T21:26:21Z","timestamp":1591651581000},"page":"107214-107228","source":"Crossref","is-referenced-by-count":11,"title":["TANDEM: A Taxonomy and a Dataset of Real-World Performance Bugs"],"prefix":"10.1109","volume":"8","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1473-0955","authenticated-orcid":false,"given":"Ana B.","family":"Sanchez","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1568-9288","authenticated-orcid":false,"given":"Pedro","family":"Delgado-Perez","sequence":"additional","affiliation":[]},{"given":"Inmaculada","family":"Medina-Bulo","sequence":"additional","affiliation":[]},{"given":"Sergio","family":"Segura","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950316"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/3131704.3131705"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3357390.3361025"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180250"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483784"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2015.4"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3276519"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606602"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635903"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3190508.3190552"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950360"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2016.7482078"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.100"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.14236\/ewic\/EASE2010.14"},{"key":"ref31","article-title":"Guidelines for performing systematic literature reviews in software engineering","author":"kitchenham","year":"2007"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2851613.2851978"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.41"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786860"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICPP.2012.30"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2961111.2962602"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2018.00045"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2018.00044"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213874"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180194"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100093"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2307636.2307661"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737966"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384690"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/1993316.1993530"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1728"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1007\/s11334-012-0192-5"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/1375634.1375653"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-1015-5"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2013.6624035"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.06.100"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.03.013"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.03.002"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236081"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2015.7321208"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2012.6224281"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568229"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931066"},{"key":"ref50","first-page":"1971","article-title":"A &#x2018;human-in-the-loop&#x2019; approach for resolving complex software anomalies","author":"kothari","year":"2014","journal-title":"Proc IEEE Int Conf Syst Man Cybern (SMC)"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2008.12"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264589"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2491894.2466485"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2660193.2660234"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838348"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2581122.2544151"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568307"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786815"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814290"},{"key":"ref10","first-page":"296","article-title":"PerfBlower: Quickly detecting memory-related performance problems via amplification","author":"fang","year":"2015","journal-title":"Proc of Euro Conf on Object-Oriented Programming (ECOOP)"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TrustCom.2016.0126"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806616"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.50"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.11.016"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-23502-4_3"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/69605.2085"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00066"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-26529-2_18"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931067"},{"key":"ref18","first-page":"893","article-title":"Performance problems diagnosis in cloud computing systems by mining request trace logs","author":"mi","year":"2012","journal-title":"Proc IEEE Net Oper Manag Symp"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064186"},{"key":"ref80","first-page":"232","author":"su","year":"2007","journal-title":"Automatic Communication Performance Debugging in PGAS Languages"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227198"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.260"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238204"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254075"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICIS.2016.7550866"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.02.025"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3342498"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2015.7335414"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2016.43"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2016.7446070"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606651"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.59"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/SNPD.2016.7515933"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2323982"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2858800"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2018.00010"}],"container-title":["IEEE Access"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6287639\/8948470\/09110902.pdf?arnumber=9110902","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,12,17]],"date-time":"2021-12-17T19:52:34Z","timestamp":1639770754000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9110902\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"references-count":81,"URL":"https:\/\/doi.org\/10.1109\/access.2020.3000928","relation":{},"ISSN":["2169-3536"],"issn-type":[{"value":"2169-3536","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020]]}}}