{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,28]],"date-time":"2026-01-28T06:55:51Z","timestamp":1769583351573,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":23,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,5,1]],"date-time":"2010-05-01T00:00:00Z","timestamp":1272672000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-06-2-0189"],"award-info":[{"award-number":["FA8750-06-2-0189"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CNS-0509415CCF-0811397IIS-0835652"],"award-info":[{"award-number":["CNS-0509415CCF-0811397IIS-0835652"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-0509415CCF-0811397IIS-0835652"],"award-info":[{"award-number":["CNS-0509415CCF-0811397IIS-0835652"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000145","name":"Division of Information and Intelligent Systems","doi-asserted-by":"publisher","award":["CNS-0509415CCF-0811397IIS-0835652"],"award-info":[{"award-number":["CNS-0509415CCF-0811397IIS-0835652"]}],"id":[{"id":"10.13039\/100000145","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,5]]},"DOI":"10.1145\/1806799.1806808","type":"proceedings-article","created":{"date-parts":[[2010,6,8]],"date-time":"2010-06-08T12:37:34Z","timestamp":1276000654000},"page":"25-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":164,"title":["Quality of service profiling"],"prefix":"10.1145","author":[{"given":"Sasa","family":"Misailovic","sequence":"first","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Stelios","family":"Sidiroglou","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Henry","family":"Hoffmann","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]},{"given":"Martin","family":"Rinard","sequence":"additional","affiliation":[{"name":"MIT CSAIL"}]}],"member":"320","published-online":{"date-parts":[[2010,5]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"prof. Digital Unix man page.  prof. Digital Unix man page."},{"key":"e_1_3_2_1_2_1","unstructured":"UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml\/.  UCI Machine Learning Repository. http:\/\/archive.ics.uci.edu\/ml\/."},{"key":"e_1_3_2_1_3_1","unstructured":"VTune Performance Analyser Intel Corp.  VTune Performance Analyser Intel Corp."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10791-008-9066-8"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265925"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542481"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133255.1134000"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454115.1454128"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146266"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062499"},{"key":"e_1_3_2_1_12_1","volume-title":"Motion Estimation Algorithms for Video Compression","author":"Furht B.","year":"1996","unstructured":"B. Furht , J. Greenberg , and R. Westwater . Motion Estimation Algorithms for Video Compression . Kluwer Academic Publishers , Norwell, MA, USA , 1996 . B. Furht, J. Greenberg, and R. Westwater. Motion Estimation Algorithms for Video Compression. Kluwer Academic Publishers, Norwell, MA, USA, 1996."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/800230.806987"},{"key":"e_1_3_2_1_15_1","volume-title":"CGO'04","author":"Lattner C.","unstructured":"C. Lattner and V. Adve . LLVM: A Compilation Framework for Lifelong Program Analysis &amp; Transformation . In CGO'04 . C. Lattner and V. Adve. LLVM: A Compilation Framework for Lifelong Program Analysis &amp; Transformation. In CGO'04."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/103085.103090"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1296907.1296912"},{"key":"e_1_3_2_1_19_1","volume-title":"jProf - a JVMPI based profiler","author":"Pennington G.","year":"2000","unstructured":"G. Pennington and R. Watson . jProf - a JVMPI based profiler , 2000 . G. Pennington and R. Watson. jProf - a JVMPI based profiler, 2000."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1183401.1183447"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297055"},{"key":"e_1_3_2_1_23_1","volume-title":"William S. Beebee. Enhancing Server Availability and Security Through Failure-Oblivious Computing. In OSDI '04","author":"Rinard M.","unstructured":"M. Rinard , C. Cadar , D. Dumitran , D. M. Roy , T. Leu , and J. William S. Beebee. Enhancing Server Availability and Security Through Failure-Oblivious Computing. In OSDI '04 . M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and J. William S. Beebee. Enhancing Server Availability and Security Through Failure-Oblivious Computing. In OSDI '04."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508250"},{"key":"e_1_3_2_1_25_1","volume-title":"USENIX '05","author":"Sidiroglou S.","unstructured":"S. Sidiroglou , M. E. Locasto , S. W. Boyd , and A. D. Keromytis . Building a reactive immune system for software services . In USENIX '05 . S. Sidiroglou, M. E. Locasto, S. W. Boyd, and A. D. Keromytis. Building a reactive immune system for software services. In USENIX '05."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.391.0082"}],"event":{"name":"ICSE '10: 32nd International Conference on Software Engineering","location":"Cape Town South Africa","acronym":"ICSE '10","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering - Volume 1"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1806799.1806808","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1806799.1806808","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:39:37Z","timestamp":1750246777000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1806799.1806808"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5]]},"references-count":23,"alternative-id":["10.1145\/1806799.1806808","10.1145\/1806799"],"URL":"https:\/\/doi.org\/10.1145\/1806799.1806808","relation":{},"subject":[],"published":{"date-parts":[[2010,5]]},"assertion":[{"value":"2010-05-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}