{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:11:35Z","timestamp":1763467895522},"reference-count":29,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,9]]},"DOI":"10.1109\/icsm.2008.4658079","type":"proceedings-article","created":{"date-parts":[[2008,10,28]],"date-time":"2008-10-28T17:09:40Z","timestamp":1225213780000},"source":"Crossref","is-referenced-by-count":68,"title":["Automatic identification of load testing problems"],"prefix":"10.1109","author":[{"given":"Zhen Ming","family":"Jiang","sequence":"first","affiliation":[{"name":"Software Analysis and Intelligence Lab (SAIL), Queen's University Kingston, ON, Canada"}]},{"given":"Ahmed E.","family":"Hassan","sequence":"additional","affiliation":[{"name":"Software Analysis and Intelligence Lab (SAIL), Queen's University Kingston, ON, Canada"}]},{"given":"Gilbert","family":"Hamann","sequence":"additional","affiliation":[{"name":"Performance Engineering, Research In Motion (RIM), Waterloo, ON, Canada"}]},{"given":"Parminder","family":"Flora","sequence":"additional","affiliation":[{"name":"Performance Engineering, Research In Motion (RIM), Waterloo, ON, Canada"}]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/502059.502041"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1295074.1295089"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146267"},{"key":"15","author":"beizer","year":"1984","journal-title":"Software System Testing and Quality Assurance"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1007\/s10710-006-9003-9"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/32.464549"},{"key":"14","year":"0"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1145\/154183.154244"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/186258.186507"},{"key":"21","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1145\/581376.581377","article-title":"Tracking Down Software Bugs using Automatic Anomaly Detection","author":"sudheendra hangal","year":"2002","journal-title":"Proceedings of the 24th International Conference on Software Engineering ICSE 2002"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134340"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1002\/smr.374"},{"key":"23","year":"0"},{"key":"24","doi-asserted-by":"crossref","DOI":"10.1145\/1081706.1081755","article-title":"pr-miner: automatically extracting implicit programming rules and detecting violations in large software code","author":"li","year":"2005","journal-title":"ESEC\/FSE-13"},{"key":"25","year":"0"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1994.296790"},{"key":"27","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-31980-1_30","article-title":"mining temporal specifications for error detection","author":"weimer","year":"2005","journal-title":"International Conference on Tools and Algorithms for the Construction and Analysis of Systems"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134325"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1002\/spe.487"},{"key":"3","year":"0","journal-title":"Implementing the Microsoft NET Pet Shop using Java"},{"key":"2","year":"0"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.1998.732614"},{"key":"1","year":"0","journal-title":"Dell DVD Store"},{"key":"7","year":"0"},{"key":"6","year":"0"},{"key":"5","year":"0","journal-title":"Java pet store"},{"key":"4","year":"0","journal-title":"Jakarta Struts"},{"key":"9","author":"visser's","year":"0","journal-title":"Research"},{"key":"8","year":"0","journal-title":"WebLoad"}],"event":{"name":"2008 IEEE International Conference on Software Maintenance","location":"Beijing, China","start":{"date-parts":[[2008,9,28]]},"end":{"date-parts":[[2008,10,4]]}},"container-title":["2008 IEEE International Conference on Software Maintenance"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4653773\/4658028\/04658079.pdf?arnumber=4658079","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,2]],"date-time":"2021-04-02T20:01:43Z","timestamp":1617393703000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/4658079\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,9]]},"references-count":29,"URL":"https:\/\/doi.org\/10.1109\/icsm.2008.4658079","relation":{},"subject":[],"published":{"date-parts":[[2008,9]]}}}