{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T00:48:24Z","timestamp":1772930904368,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,15]],"date-time":"2014-09-15T00:00:00Z","timestamp":1410739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006112","name":"Microsoft Research","doi-asserted-by":"publisher","award":["Software Engineering Innovation Foundation Award"],"award-info":[{"award-number":["Software Engineering Innovation Foundation Award"]}],"id":[{"id":"10.13039\/100006112","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,15]]},"DOI":"10.1145\/2642937.2642988","type":"proceedings-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T14:22:41Z","timestamp":1410963761000},"page":"19-30","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":36,"title":["Behavioral resource-aware model inference"],"prefix":"10.1145","author":[{"given":"Tony","family":"Ohmann","sequence":"first","affiliation":[{"name":"University of Massachusetts, Amherst, MA, USA"}]},{"given":"Michael","family":"Herzberg","sequence":"additional","affiliation":[{"name":"University of Massachusetts, Amherst, CA, USA"}]},{"given":"Sebastian","family":"Fiss","sequence":"additional","affiliation":[{"name":"University of Massachusetts, Amherst, CA, USA"}]},{"given":"Armand","family":"Halbert","sequence":"additional","affiliation":[{"name":"University of Massachusetts, Amherst, CA, USA"}]},{"given":"Marc","family":"Palyart","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Ivan","family":"Beschastnikh","sequence":"additional","affiliation":[{"name":"University of British Columbia, Vancouver, BC, Canada"}]},{"given":"Yuriy","family":"Brun","sequence":"additional","affiliation":[{"name":"University of Massachusetts, Amherst, MA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,9,15]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/945445.945454"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/0304-3975(94)90010-8"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/174644.174651"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-0000(80)90041-0"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.9"},{"key":"e_1_3_2_1_6_1","volume-title":"Symposium on Operating System Design and Implementation (OSDI)","author":"Barham P.","year":"2004","unstructured":"P. Barham , A. Donnelly , R. Isaacs , and R. Mortier . Using magpie for request extraction and workload modelling . In Symposium on Operating System Design and Implementation (OSDI) , 2004 . P. Barham, A. Donnelly, R. Isaacs, and R. Mortier. Using magpie for request extraction and workload modelling. In Symposium on Operating System Design and Implementation (OSDI), 2004."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1609\/icwsm.v3i1.13937"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606571"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568246"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025151"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1972.5009015"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1755913.1755926"},{"key":"e_1_3_2_1_13_1","volume-title":"Reversible debugging software. Technical report","author":"Britton T.","year":"2013","unstructured":"T. Britton , L. Jeng , G. Carver , P. Cheak , and T. Katzenellenbogen . Reversible debugging software. Technical report , University of Cambridge , Judge Business School, 2013 . T. Britton, L. Jeng, G. Carver, P. Cheak, and T. Katzenellenbogen. Reversible debugging software. Technical report, University of Cambridge, Judge Business School, 2013."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/647769.734089"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882312"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831719"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302672"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.908957"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693102"},{"key":"e_1_3_2_1_20_1","volume-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Fonseca R.","year":"2007","unstructured":"R. Fonseca , G. Porter , R. H. Katz , S. Shenker , and I. Stoica . X-trace: A pervasive network tracing framework . In USENIX Symposium on Networked Systems Design and Implementation (NSDI) , 2007 . R. Fonseca, G. Porter, R. H. Katz, S. Shenker, and I. Stoica. X-trace: A pervasive network tracing framework. In USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2007."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453150"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568234"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(67)91165-5"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337242"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321639"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2007.190648"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048081"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635890"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810324"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985807"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781148"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1835449.1835513"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181808"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859081"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368157"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/222124.222136"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491434"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591107"},{"key":"e_1_3_2_1_39_1","unstructured":"Perfume (ASE 2014 supplementary content) http:\/\/people. cs.umass.edu\/~ohmann\/perfume\/ase2014\/.  Perfume (ASE 2014 supplementary content) http:\/\/people. cs.umass.edu\/~ohmann\/perfume\/ase2014\/."},{"key":"e_1_3_2_1_41_1","volume-title":"USENIX Symposium on Networked Systems Design and Implementation (NSDI)","author":"Sambasivan R. R.","year":"2011","unstructured":"R. R. Sambasivan , A. X. Zheng , M. D. Rosa , E. Krevat , S. Whitman , M. Stroucken , W. Wang , L. Xu , and G. R. Ganger . Diagnosing performance changes by comparing request flows . In USENIX Symposium on Networked Systems Design and Implementation (NSDI) , 2011 . R. R. Sambasivan, A. X. Zheng, M. D. Rosa, E. Krevat, S. Whitman, M. Stroucken, W. Wang, L. Xu, and G. R. Ganger. Diagnosing performance changes by comparing request flows. In USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2011."},{"key":"e_1_3_2_1_42_1","volume-title":"Workshop on Managing Systems via Log Analysis and Machine Learning Techniques (SLAML)","author":"Schneider S.","year":"2010","unstructured":"S. Schneider , I. Beschastnikh , S. Chernyak , M. D. Ernst , and Y. Brun . Synoptic: Summarizing system logs with refinement . In Workshop on Managing Systems via Log Analysis and Machine Learning Techniques (SLAML) , Vancouver, Canada , October 2010 . DOI: 10.1145\/1928991.1928995. 10.1145\/1928991.1928995 S. Schneider, I. Beschastnikh, S. Chernyak, M. D. Ernst, and Y. Brun. Synoptic: Summarizing system logs with refinement. In Workshop on Managing Systems via Log Analysis and Machine Learning Techniques (SLAML), Vancouver, Canada, October 2010. DOI: 10.1145\/1928991.1928995."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491426"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025133"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660193.2660234"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/822083.823193"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.35"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2007.13"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.32"},{"key":"e_1_3_2_1_50_1","volume-title":"Workshop on Managing Systems via Log Analysis and Machine Learning Techniques (SLAML)","author":"Xu W.","year":"2010","unstructured":"W. Xu , L. Huang , A. Fox , D. Patterson , and M. Jordan . Experience mining Google's production console logs . In Workshop on Managing Systems via Log Analysis and Machine Learning Techniques (SLAML) , 2010 . W. Xu, L. Huang, A. Fox, D. Patterson, and M. Jordan. Experience mining Google's production console logs. In Workshop on Managing Systems via Log Analysis and Machine Learning Techniques (SLAML), 2010."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134325"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2110356.2110360"}],"event":{"name":"ASE '14: ACM\/IEEE International Conference on Automated Software Engineering","location":"Vasteras Sweden","acronym":"ASE '14","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","M\u00e4lardalen University M\u00e4lardalen University","IEEE CS"]},"container-title":["Proceedings of the 29th ACM\/IEEE International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642937.2642988","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2642937.2642988","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:09Z","timestamp":1750229769000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642937.2642988"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,9,15]]},"references-count":51,"alternative-id":["10.1145\/2642937.2642988","10.1145\/2642937"],"URL":"https:\/\/doi.org\/10.1145\/2642937.2642988","relation":{},"subject":[],"published":{"date-parts":[[2014,9,15]]},"assertion":[{"value":"2014-09-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}