{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:16:53Z","timestamp":1763468213698,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":9,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2591062.2591134","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"598-599","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Shedding light on distributed system executions"],"prefix":"10.1145","author":[{"given":"Jenny","family":"Abrahamson","sequence":"first","affiliation":[{"name":"Facebook, USA"}]},{"given":"Ivan","family":"Beschastnikh","sequence":"additional","affiliation":[{"name":"University of British Columbia, Canada"}]},{"given":"Yuriy","family":"Brun","sequence":"additional","affiliation":[{"name":"University of Massachusetts, USA"}]},{"given":"Michael D.","family":"Ernst","sequence":"additional","affiliation":[{"name":"University of Washington, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945454"},{"key":"e_1_3_2_1_2_1","volume-title":"OSDI","author":"Barham P.","year":"2004","unstructured":"P. Barham , A. Donnelly , R. Isaacs , and R. Mortier . Using magpie for request extraction and workload modelling . In OSDI , 2004 . P. Barham, A. Donnelly, R. Isaacs, and R. Mortier. Using magpie for request extraction and workload modelling. In OSDI, 2004."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568246"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.47"},{"key":"e_1_3_2_1_5_1","first-page":"66","volume-title":"11th Australian Computer Science Conference","author":"Fidge C. J.","year":"1988","unstructured":"C. J. Fidge . Timestamps in message-passing systems that preserve the partial ordering . In 11th Australian Computer Science Conference , pages 55\u2013 66 , 1988 . C. J. Fidge. Timestamps in message-passing systems that preserve the partial ordering. In 11th Australian Computer Science Conference, pages 55\u201366, 1988."},{"issue":"8","key":"e_1_3_2_1_6_1","first-page":"499","article-title":"Poet","volume":"40","author":"Kunz T.","year":"1997","unstructured":"T. Kunz , J. P. Black , D. J. Taylor , and T. Basten . Poet : Target-System Independent Visualizations of Complex Distributed-Application Executions. The Computer Journal , 40 ( 8 ): 499 \u2013 512 , 1997 . T. Kunz, J. P. Black, D. J. Taylor, and T. Basten. Poet: Target-System Independent Visualizations of Complex Distributed-Application Executions. The Computer Journal, 40(8):499\u2013512, 1997.","journal-title":"Target-System Independent Visualizations of Complex Distributed-Application Executions. The Computer Journal"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/359545.359563"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1135777.1135830"},{"key":"e_1_3_2_1_9_1","volume-title":"USENIX","author":"Tak B. C.","year":"2009","unstructured":"B. C. Tak , C. Tang , C. Zhang , S. Govindan , B. Urgaonkar , and R. N. Chang . vPath: Precise discovery of request processing paths from black-box observations of thread and network activities . In USENIX , 2009 . B. C. Tak, C. Tang, C. Zhang, S. Govindan, B. Urgaonkar, and R. N. Chang. vPath: Precise discovery of request processing paths from black-box observations of thread and network activities. In USENIX, 2009."}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."],"location":"Hyderabad India","acronym":"ICSE '14"},"container-title":["Companion Proceedings of the 36th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2591062.2591134","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2591062.2591134","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:01:29Z","timestamp":1750230089000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2591062.2591134"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":9,"alternative-id":["10.1145\/2591062.2591134","10.1145\/2591062"],"URL":"https:\/\/doi.org\/10.1145\/2591062.2591134","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}