{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,21]],"date-time":"2026-03-21T13:00:13Z","timestamp":1774098013939,"version":"3.50.1"},"reference-count":85,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"4","license":[{"start":{"date-parts":[[2023,4,1]],"date-time":"2023-04-01T00:00:00Z","timestamp":1680307200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/legalcode"}],"funder":[{"name":"MUR PRIN","award":["SEDUCE 2017TWRCNB"],"award-info":[{"award-number":["SEDUCE 2017TWRCNB"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2023,4,1]]},"DOI":"10.1109\/tse.2023.3234321","type":"journal-article","created":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T19:11:01Z","timestamp":1673377861000},"page":"2873-2891","source":"Crossref","is-referenced-by-count":9,"title":["Automated Detection of Software Performance Antipatterns in Java-Based Applications"],"prefix":"10.1109","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7675-6942","authenticated-orcid":false,"given":"Catia","family":"Trubiani","sequence":"first","affiliation":[{"name":"Gran Sasso Science Institute, L&#x0027;Aquila, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3375-7256","authenticated-orcid":false,"given":"Riccardo","family":"Pinciroli","sequence":"additional","affiliation":[{"name":"Gran Sasso Science Institute, L&#x0027;Aquila, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1229-5219","authenticated-orcid":false,"given":"Andrea","family":"Biaggi","sequence":"additional","affiliation":[{"name":"University of Milano-Bicocca, Milano, Italy"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1195-530X","authenticated-orcid":false,"given":"Francesca Arcelli","family":"Fontana","sequence":"additional","affiliation":[{"name":"University of Milano-Bicocca, Milano, Italy"}]}],"member":"263","reference":[{"key":"ref1","volume-title":"Java Performance","author":"Hunt","year":"2011"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1297105.1297033"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/584369.584388"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.12.034"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2330667.2330686"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2010.66"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1007\/s00766-011-0137-9"},{"key":"ref8","first-page":"438","article-title":"An empirical study on the importance of quality requirements in industry","volume-title":"Proc. Int. Conf. Softw. Eng. Knowl. Eng.","author":"De La Vara"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.64"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2009.07.007"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.VALUETOOLS2009.7981"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-59155-7_17"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2016.16"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2188286.2188326"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3359981"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-031-05469-3_21"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4302-4570-4"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2735399.2735416"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/3427921.3450240"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568259"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.100"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00032"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3023955"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2018.00009"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2714064.2660234"},{"key":"ref26","first-page":"717","article-title":"More new software performance antipatterns: Even more ways to shoot yourself in the foot","volume-title":"Proc. Int. Conf. Comput. Meas. Group","author":"Smith"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3358960.3379138"},{"key":"ref28","article-title":"Replication package: Automated detection of software performance antipatterns in Java-based applications","author":"Trubiani","year":"2022"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA51549.2021.00021"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.07.014"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/CloudCom.2014.141"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2012.35"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2014.03.081"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-45234-6_18"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606601"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2018.05.057"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-015-9378-4"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.37"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606614"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.9"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1251535.1251537"},{"key":"ref42","first-page":"25","article-title":"Mining performance regression inducing code changes in evolving software","volume-title":"Proc. IEEE Work. Conf. Mining Softw. Repositories","author":"Luo"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2017.13"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-27455-9_6"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2017.17"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2021.3131529"},{"key":"ref47","volume-title":"Bitter Java","author":"Tate","year":"2002"},{"key":"ref48","volume-title":"J2EE antipatterns","author":"Dudney","year":"2003"},{"key":"ref49","volume-title":"Bitter EJB","author":"Tate","year":"2003"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2004.1357968"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3030207.3030213"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2008.7.3.a1"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.11.016"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/2851553.2851569"},{"key":"ref55","article-title":"YourKit GmbH, YourKit Java profiler features","year":"2022"},{"key":"ref56","article-title":"YourKit GmbH, YourKit Customers","year":"2022"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/ICSA47634.2020.00027"},{"key":"ref58","article-title":"YourKit GmbH, Profiling overhead: How to reduce or avoid","year":"2022"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2834344"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254075"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2844343"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2887384"},{"key":"ref63","article-title":"CloudStore synchronizes your data","year":"2022"},{"key":"ref64","article-title":"TeaStore: A micro-service reference and test application","year":"2022"},{"key":"ref65","first-page":"223","article-title":"TeaStore: A micro-service reference application for benchmarking, modeling and resource management research","volume-title":"Proc. IEEE Int. Symp. Modelling, Anal., Simul. Comput. Telecommun. Syst.","author":"Eismann"},{"key":"ref66","article-title":"WebGoat 8: A deliberately insecure Web Application","year":"2022"},{"key":"ref67","article-title":"Train Ticket: A Benchmark Microservice System","year":"2022"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338961"},{"key":"ref69","article-title":"OpenMRS: Medical Record System","year":"2022"},{"key":"ref70","article-title":"The Apache Software Foundation, Apache Hadoop","year":"2022"},{"key":"ref71","article-title":"The Apache Software Foundation, Apache Cassandra: Open source NoSQL database","year":"2022"},{"key":"ref72","article-title":"TestDFSIO","year":"2022"},{"key":"ref73","article-title":"The Apache Software Foundation, Cassandra Stress","year":"2022"},{"key":"ref74","article-title":"Locust: An open source load testing tool","author":"Heyman","year":"2022"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29044-2"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/1809028.1806618"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-016-0196-8"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338923"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1145\/2714064.2660210"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-012-0246-z"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.93"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092725"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/3185768.3186289"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/SC41405.2020.00073"},{"key":"ref85","first-page":"349","article-title":"Yak: A high-performance big-data-friendly garbage collector","volume-title":"Proc. USENIX Symp. Operating Syst. Des. Implementation","author":"Nguyen"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/10103953\/10013942.pdf?arnumber=10013942","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,5,29]],"date-time":"2024-05-29T17:27:57Z","timestamp":1717003677000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10013942\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,4,1]]},"references-count":85,"journal-issue":{"issue":"4"},"URL":"https:\/\/doi.org\/10.1109\/tse.2023.3234321","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,4,1]]}}}