{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:11:52Z","timestamp":1763467912021,"version":"3.28.0"},"reference-count":33,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009,5]]},"DOI":"10.1109\/icse.2009.5070516","type":"proceedings-article","created":{"date-parts":[[2009,6,10]],"date-time":"2009-06-10T18:24:29Z","timestamp":1244658269000},"page":"144-154","source":"Crossref","is-referenced-by-count":33,"title":["The road not taken: Estimating path execution frequency statically"],"prefix":"10.1109","author":[{"given":"Raymond P.L.","family":"Buse","sequence":"first","affiliation":[]},{"given":"Westley","family":"Weimer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1330017.1330019"},{"key":"ref32","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1007\/978-3-540-31980-1_30","article-title":"Mining temporal specifications for error detection","author":"weimer","year":"2005","journal-title":"Tools and Algorithms for the Construction and Analysis of Systems"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/178243.178260"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/11817963_38"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/239912.239923"},{"key":"ref11","first-page":"146","article-title":"On the statistical properties of the f-measure","author":"chen","year":"2004","journal-title":"International Conference on Quality Software"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/356989.357008"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/mcda.313"},{"key":"ref14","doi-asserted-by":"crossref","first-page":"57","DOI":"10.1145\/502059.502041","article-title":"Bugs as inconsistent behavior: A general approach to inferring errors in systems code","author":"engler","year":"2001","journal-title":"Symposium on Operating Systems Principles"},{"key":"ref15","first-page":"125","article-title":"Soot-a java optimization framework","year":"1999","journal-title":"Proceedings of CASCON 1999"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287681"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/989393.989401"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1201\/9781420040579.ch4"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ANZIIS.1994.396988"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/778559.778561"},{"key":"ref4","first-page":"23","article-title":"Design of a two-level hot path detector for path-based loop optimizations","author":"baba","year":"2007","journal-title":"Advances in Computer Science and Technology"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"432","DOI":"10.1145\/267896.267925","article-title":"The use of program profiling for software maintenance with applications to the year 2000 problem","volume":"22","author":"reps","year":"1997","journal-title":"SIGSOFT Softw Eng Notes"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/351397.351416"},{"key":"ref6","first-page":"46","article-title":"Efficient path profiling","author":"ball","year":"1996","journal-title":"International Symposium on Microarchitecture"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321746"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/155090.155119"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2006.1620809"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/268946.268958"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/277652.277665"},{"key":"ref9","article-title":"Automated dynamic analysis of CUDA programs","author":"boyer","year":"2008","journal-title":"Workshop on Software Tools for MultiCore Systems"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503275"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44898-5_16"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/301618.301678"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.106"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ISCA.1999.765946"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/M-PDT.1995.414840"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/SUPERC.1992.236713"},{"journal-title":"Machine Learning","year":"1997","author":"mitchell","key":"ref25"}],"event":{"name":"2009 31st International Conference on Software Engineering (ICSE 2009)","start":{"date-parts":[[2009,5,16]]},"location":"Vancouver, BC","end":{"date-parts":[[2009,5,24]]}},"container-title":["2009 IEEE 31st International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/5062304\/5070493\/05070516.pdf?arnumber=5070516","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,18]],"date-time":"2017-06-18T20:54:07Z","timestamp":1497819247000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/5070516\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,5]]},"references-count":33,"URL":"https:\/\/doi.org\/10.1109\/icse.2009.5070516","relation":{},"subject":[],"published":{"date-parts":[[2009,5]]}}}