{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:26:47Z","timestamp":1750307207880,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":14,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,4,22]],"date-time":"2012-04-22T00:00:00Z","timestamp":1335052800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,4,22]]},"DOI":"10.1145\/2188286.2188288","type":"proceedings-article","created":{"date-parts":[[2012,4,24]],"date-time":"2012-04-24T18:41:27Z","timestamp":1335292887000},"page":"1-8","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Best practices for writing and managing performance requirements"],"prefix":"10.1145","author":[{"given":"Andr\u00e9 B.","family":"Bondi","sequence":"first","affiliation":[{"name":"Siemens Corp., Corporate Research and Technologies, Princeton, NJ, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,4,22]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/WICSA.2007.37"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/350391.350432"},{"volume":"197","journal-title":"J. Denning. Operating Systems Theory. Prentice Hall","author":"Coffman E.","key":"e_1_3_2_1_3_1"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Cooper R. B. Introduction to Queueing Theory Second Edition North Holland 1981.  Cooper R. B. Introduction to Queueing Theory Second Edition North Holland 1981.","DOI":"10.1145\/800175.809851"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/AGILE.2006.41"},{"key":"e_1_3_2_1_6_1","unstructured":"IEEE Std 830--1998 IEEE Recommended Practice for Software Requirements Specifications --Description  IEEE Std 830--1998 IEEE Recommended Practice for Software Requirements Specifications --Description"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/349806"},{"key":"e_1_3_2_1_8_1","unstructured":"http:\/\/www.prnewswire.com\/cgi-bin\/stories.pl?ACCT=104&STORY=\/www\/story\/06--28--2007\/0004617850&EDATE=  http:\/\/www.prnewswire.com\/cgi-bin\/stories.pl?ACCT=104&STORY=\/www\/story\/06--28--2007\/0004617850&EDATE="},{"key":"e_1_3_2_1_9_1","unstructured":"NFPA 72 National Fire Alarm Code \u00ae 2007 Edition NFPA Quincy MA 02169--7471.  NFPA 72 National Fire Alarm Code \u00ae 2007 Edition NFPA Quincy MA 02169--7471."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/287318.287348"},{"volume":"200","journal-title":"CMG Magazine","author":"Odlyszko A.M.","key":"e_1_3_2_1_11_1"},{"key":"e_1_3_2_1_12_1","unstructured":"R. F. Rey (ed). Engineering and Operations in the Bell System AT&T Bell Laboratories 1983.  R. F. Rey (ed). Engineering and Operations in the Bell System AT&T Bell Laboratories 1983."},{"volume-title":"Scalable Software. Addison-Wesley","year":"2000","author":"Smith Connie U","key":"e_1_3_2_1_13_1"},{"key":"e_1_3_2_1_14_1","unstructured":"Webster's Ninth New Collegiate Dictionary Merriam Webster 1988.  Webster's Ninth New Collegiate Dictionary Merriam Webster 1988."}],"event":{"name":"ICPE'12: Third Joint WOSP\/SIPEW International Conference on Performance Engineering","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGSOFT ACM Special Interest Group on Software Engineering","SPEC SPEC Research Group"],"location":"Boston Massachusetts USA","acronym":"ICPE'12"},"container-title":["Proceedings of the 3rd ACM\/SPEC International Conference on Performance Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2188286.2188288","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2188286.2188288","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T10:06:29Z","timestamp":1750241189000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2188286.2188288"}},"subtitle":["a tutorial"],"short-title":[],"issued":{"date-parts":[[2012,4,22]]},"references-count":14,"alternative-id":["10.1145\/2188286.2188288","10.1145\/2188286"],"URL":"https:\/\/doi.org\/10.1145\/2188286.2188288","relation":{},"subject":[],"published":{"date-parts":[[2012,4,22]]},"assertion":[{"value":"2012-04-22","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}