{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:30Z","timestamp":1750306650084,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":43,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,15]],"date-time":"2014-09-15T00:00:00Z","timestamp":1410739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CCF1130822"],"award-info":[{"award-number":["CCF1130822"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,15]]},"DOI":"10.1145\/2642937.2642979","type":"proceedings-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T14:22:41Z","timestamp":1410963761000},"page":"7-18","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Automated analysis of multithreaded programs for performance modeling"],"prefix":"10.1145","author":[{"given":"Alexander","family":"Tarvo","sequence":"first","affiliation":[{"name":"Brown University, Providence, RI, USA"}]},{"given":"Steven P.","family":"Reiss","sequence":"additional","affiliation":[{"name":"Brown University, Providence, RI, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,9,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"http:\/\/linux.die.net\/man\/8\/btrace.  http:\/\/linux.die.net\/man\/8\/btrace."},{"key":"e_1_3_2_1_2_1","unstructured":"http:\/\/www.omnetpp.org\/.  http:\/\/www.omnetpp.org\/."},{"key":"e_1_3_2_1_3_1","unstructured":"http:\/\/asm.ow2.org\/.  http:\/\/asm.ow2.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"http:\/\/sunflow.sourceforge.net\/.  http:\/\/sunflow.sourceforge.net\/."},{"key":"e_1_3_2_1_5_1","unstructured":"http:\/\/itextpdf.com\/.  http:\/\/itextpdf.com\/."},{"key":"e_1_3_2_1_6_1","unstructured":"http:\/\/docs.oracle.com\/javase\/6\/docs\/technotes\/guides\/concurrency\/overvie%w.html.  http:\/\/docs.oracle.com\/javase\/6\/docs\/technotes\/guides\/concurrency\/overvie%w.html."},{"key":"e_1_3_2_1_7_1","first-page":"18","volume-title":"Proc. of the Symposium on Opearting Systems Design & Implementation","author":"Barham P.","year":"2004","unstructured":"P. Barham , A. Donnelly , R. Isaacs , and R. Mortier . Using magpie for request extraction and workload modelling . In Proc. of the Symposium on Opearting Systems Design & Implementation , pages 18 -- 18 , Berkeley, CA, USA , 2004 . USENIX Association. P. Barham, A. Donnelly, R. Isaacs, and R. Mortier. Using magpie for request extraction and workload modelling. In Proc. of the Symposium on Opearting Systems Design & Implementation, pages 18--18, Berkeley, CA, USA, 2004. USENIX Association."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1038\/324446a0"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1216993.1217006"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2005.50"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100052"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/304065.304103"},{"key":"e_1_3_2_1_13_1","volume-title":"Mantis: Predicting system performance through program analysis and modeling. CoRR, abs\/1010.0019","author":"Chun B.-G.","year":"2010","unstructured":"B.-G. Chun , L. Huang , S. Lee , P. Maniatis , and M. Naik . Mantis: Predicting system performance through program analysis and modeling. CoRR, abs\/1010.0019 , 2010 . B.-G. Chun, L. Huang, S. Lee, P. Maniatis, and M. Naik. Mantis: Predicting system performance through program analysis and modeling. CoRR, abs\/1010.0019, 2010."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989359"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.nahs.2006.04.012"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/287318.287346"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDEW.2010.5452742"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/876891.880591"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSST.2011.5937213"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1071021.1071037"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.v20:3"},{"key":"e_1_3_2_1_22_1","volume-title":"HP Laboratories Palo Alto","author":"Kelly T.","year":"2004","unstructured":"T. Kelly , T. Kelly , I. Cohen , I. Cohen , M. Goldszmidt , M. Goldszmidt , K. Keeton , and K. Keeton . Inducing models of black-box storage arrays. Technical report , HP Laboratories Palo Alto , 2004 . T. Kelly, T. Kelly, I. Cohen, I. Cohen, M. Goldszmidt, M. Goldszmidt, K. Keeton, and K. Keeton. Inducing models of black-box storage arrays. Technical report, HP Laboratories Palo Alto, 2004."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.5555\/550113"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1229428.1229479"},{"key":"e_1_3_2_1_25_1","volume-title":"Int. CMG Conference","author":"Menasce D. A.","year":"2006","unstructured":"D. A. Menasce and M. N. Bennani . Analytic performance models for single class and multiple class multithreaded software servers . In Int. CMG Conference , 2006 . D. A. Menasce and M. N. Bennani. Analytic performance models for single class and multiple class multithreaded software servers. In Int. CMG Conference, 2006."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2020976.1958760"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242531.1242554"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1097871.1098137"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1958746.1958761"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2188286.2188321"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1177\/109434200001400306"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/VISSOFT.2013.6650540"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/381473.381497"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.4108\/ICST.VALUETOOLS2009.7988"},{"key":"e_1_3_2_1_35_1","first-page":"317","volume-title":"MASCOTS","author":"Roy N.","year":"2008","unstructured":"N. Roy , A. Dabholkar , N. Hamm , L. W. Dowdy , and D. C. Schmidt . Modeling software contention using colored petri nets. In E. L. Miller and C. L. Williamson, editors , MASCOTS , pages 317 -- 324 . IEEE, 2008 . N. Roy, A. Dabholkar, N. Hamm, L. W. Dowdy, and D. C. Schmidt. Modeling software contention using colored petri nets. In E. L. Miller and C. L. Williamson, editors, MASCOTS, pages 317--324. IEEE, 2008."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.5555\/517927"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2012.37"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2188286.2188320"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1147\/JRD.2010.2058481"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/1032659.1034246"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351703"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1123058.1123064"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/1791889.1791901"}],"event":{"name":"ASE '14: ACM\/IEEE International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","M\u00e4lardalen University M\u00e4lardalen University","IEEE CS"],"location":"Vasteras Sweden","acronym":"ASE '14"},"container-title":["Proceedings of the 29th ACM\/IEEE International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642937.2642979","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2642937.2642979","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:09Z","timestamp":1750229769000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642937.2642979"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,15]]},"references-count":43,"alternative-id":["10.1145\/2642937.2642979","10.1145\/2642937"],"URL":"https:\/\/doi.org\/10.1145\/2642937.2642979","relation":{},"subject":[],"published":{"date-parts":[[2014,9,15]]},"assertion":[{"value":"2014-09-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}