{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,23]],"date-time":"2026-03-23T11:16:02Z","timestamp":1774264562016,"version":"3.50.1"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,5]]},"DOI":"10.1109\/msr.2013.6624035","type":"proceedings-article","created":{"date-parts":[[2013,10,17]],"date-time":"2013-10-17T21:46:58Z","timestamp":1382046418000},"page":"237-246","source":"Crossref","is-referenced-by-count":68,"title":["Discovering, reporting, and fixing performance bugs"],"prefix":"10.1109","author":[{"given":"Adrian","family":"Nistor","sequence":"first","affiliation":[]},{"given":"Tian","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Lin","family":"Tan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453111"},{"key":"35","article-title":"An empirical study of supplementary bug fixes","author":"park","year":"2012","journal-title":"MSR"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542523"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025121"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227199"},{"key":"33","year":"0","journal-title":"Yourkit Profiler"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227196"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806618"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882297"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806870"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254074"},{"key":"14","doi-asserted-by":"crossref","DOI":"10.1145\/1985793.1985822","article-title":"LIME: A framework for debugging load imbalance in multi-threaded execution","author":"oh","year":"2011","journal-title":"ICSE"},{"key":"37","article-title":"A study of the internal and external effects of concurrency bugs","author":"fonseca","year":"2010","journal-title":"DSN"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227198"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346323"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254076"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100093"},{"key":"20","article-title":"Reuse, recycle to de-bloat software","author":"bhattacharya","year":"2011","journal-title":"ECOOP"},{"key":"43","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502042"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/ICDSN.2000.857521"},{"key":"41","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070530"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595716"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2012.6224267"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025155"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993559"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.20"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227197"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070545"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254075"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985457"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2012.6224281"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1145\/356635.356640"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993544"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227211"},{"key":"3","author":"bryant","year":"2010","journal-title":"Computer Systems A Programmer's Perspective"},{"key":"2","author":"molyneaux","year":"2009","journal-title":"The Art of Application Performance Testing Help for Programmers and Quality Assurance"},{"key":"10","author":"fields","year":"2009","journal-title":"Inside Windows 7-reliability Performance and PerfTrack"},{"key":"1","year":"0","journal-title":"Bugzilla Keyword Descriptions"},{"key":"30","article-title":"Automated concurrency-bug fixing","author":"jin","year":"2012","journal-title":"OSDI"},{"key":"7","author":"mituzas","year":"2009","journal-title":"Embarrassment"},{"key":"6","author":"richardson","year":"2002","journal-title":"1901 Census Site Still Down after Six Months"},{"key":"32","year":"0","journal-title":"HPROF JVM Profiler"},{"key":"5","author":"morris","year":"2004","journal-title":"Lessons from the Colorado Benefits Management System Disaster"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.24"},{"key":"4","author":"kallender","year":"2005","journal-title":"Trend Mcro Will Pay for PC Repair Costs"},{"key":"9","year":"0","journal-title":"Apache's JIRA issue Tracker"},{"key":"8","year":"0","journal-title":"Connect"}],"event":{"name":"2013 10th IEEE Working Conference on Mining Software Repositories (MSR 2013)","location":"San Francisco, CA, USA","start":{"date-parts":[[2013,5,18]]},"end":{"date-parts":[[2013,5,19]]}},"container-title":["2013 10th Working Conference on Mining Software Repositories (MSR)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6597024\/6623991\/06624035.pdf?arnumber=6624035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,3,9]],"date-time":"2022-03-09T14:22:04Z","timestamp":1646835724000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6624035\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,5]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/msr.2013.6624035","relation":{},"subject":[],"published":{"date-parts":[[2013,5]]}}}