{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T09:02:14Z","timestamp":1774602134183,"version":"3.50.1"},"reference-count":64,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,10]]},"DOI":"10.1109\/ase.2017.8115661","type":"proceedings-article","created":{"date-parts":[[2017,11,23]],"date-time":"2017-11-23T17:03:57Z","timestamp":1511456637000},"page":"497-508","source":"Crossref","is-referenced-by-count":71,"title":["Transfer learning for performance modeling of configurable systems: An exploratory analysis"],"prefix":"10.1109","author":[{"given":"Pooyan","family":"Jamshidi","sequence":"first","affiliation":[]},{"given":"Norbert","family":"Siegmund","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Velez","sequence":"additional","affiliation":[]},{"given":"Christian","family":"Kastner","sequence":"additional","affiliation":[]},{"given":"Akshay","family":"Patel","sequence":"additional","affiliation":[]},{"given":"Yuvraj","family":"Agarwal","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2009.191"},{"key":"ref38","article-title":"Architectural principles for cloud software","author":"pahl","year":"2017","journal-title":"ACM Trans on Internet Technology (TOIT)"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-017-0225-2"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2491627.2491647"},{"key":"ref31","first-page":"97","article-title":"Learning transferable features with deep adaptation networks","author":"long","year":"2015","journal-title":"Proc of International Conference on Machine Learning (ICML-05)"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2885497"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1254882.1254899"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2648511.2648521"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606584"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786814"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/781027.781052"},{"key":"ref62","first-page":"3320","article-title":"How transferable are features in deep neural networks?","author":"yosinski","year":"2014","journal-title":"Proceedings of the 1st USENIX conference on Operating Systems Design and Implementation (OSDI"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2013.9"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.15"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970339"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1272998.1273020"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9300-5"},{"key":"ref29","author":"kuhn","year":"2013","journal-title":"Introduction to Combinatorial Testing"},{"key":"ref2","first-page":"1","article-title":"Performance evolution blueprint: Understanding the impact of software evolution on performance","author":"alcocer","year":"2013","journal-title":"Proc of the Working Conf on Software Visualization (VISSOFT)"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1643"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21434-9_3"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1152154.1152174"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2076450.2076469"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.39"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2016.17"},{"key":"ref26","article-title":"Sensitivity analysis for building evolving and & adaptive robotic software","author":"kawthekar","year":"2016","journal-title":"IJCAI Workshop on Autonomous Mobile Service Robots"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2017.11"},{"key":"ref50","first-page":"242","article-title":"Transfer learning","volume":"1","author":"torrey","year":"2009","journal-title":"Handbook Of Research On Machine Learning Applications and Trends Algorithms Methods and Techniques"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3030207.3030216"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522727"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/3025453.3025999"},{"key":"ref57","first-page":"619","article-title":"Early detection of configuration errors to reduce failure damage","author":"xu","year":"2016","journal-title":"USENIX Association"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786852"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988711"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2739480.2754648"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.32"},{"key":"ref52","first-page":"1305","article-title":"Active transfer learning under model shift","author":"wang","year":"2014","journal-title":"International Conference on Machine Learning"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882296"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.37"},{"key":"ref40","doi-asserted-by":"crossref","DOI":"10.18653\/v1\/D17-1038","article-title":"Learning to select data for transfer learning with Bayesian Optimization","author":"ruder","year":"2017","journal-title":"Proceedings of the 2017 Conference on Empirical Methods in Natural Language Processing"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786833"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2017.9"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-40528-5_4"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693089"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.69"},{"key":"ref17","article-title":"Distilling the knowledge in a neural network","author":"hinton","year":"2015","journal-title":"arXiv preprint arXiv 1503"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.2307\/2529336"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950390"},{"key":"ref4","author":"bishop","year":"2006","journal-title":"Pattern Recognition and Machine Learning"},{"key":"ref3","author":"arta?","year":"2017","journal-title":"Deliverable 5 2 DICE delivery tools-Intermediate version"},{"key":"ref6","article-title":"Performance-oriented devops: A research agenda","author":"brunnert","year":"2015","journal-title":"SPEC-RG-2015&#x2013;01 RG DevOps Performance"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2967938.2967963"},{"key":"ref8","author":"cover","year":"2012","journal-title":"Elements of Information Theory"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.121"},{"key":"ref49","article-title":"Staccato: A bug finder for dynamic configuration updates (artifact)","volume":"2","author":"toman","year":"2016","journal-title":"DARTS-Dagstuhl Artifacts Series"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/356733.356735"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2010.10"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227196"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/1811099.1811041"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34413-8_15"},{"key":"ref42","author":"saltelli","year":"2008","journal-title":"Global Sensitivity Analysis The Primer"},{"key":"ref41","year":"0","journal-title":"SaC compiler"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786845"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.45"}],"event":{"name":"2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE)","location":"Urbana, IL","start":{"date-parts":[[2017,10,30]]},"end":{"date-parts":[[2017,11,3]]}},"container-title":["2017 32nd IEEE\/ACM International Conference on Automated Software Engineering (ASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8106906\/8115603\/08115661.pdf?arnumber=8115661","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,6]],"date-time":"2019-10-06T14:31:13Z","timestamp":1570372273000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/8115661\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,10]]},"references-count":64,"URL":"https:\/\/doi.org\/10.1109\/ase.2017.8115661","relation":{},"subject":[],"published":{"date-parts":[[2017,10]]}}}