{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:18:45Z","timestamp":1750306725354,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,1,31]],"date-time":"2015-01-31T00:00:00Z","timestamp":1422662400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,1,31]]},"DOI":"10.1145\/2668930.2688040","type":"proceedings-article","created":{"date-parts":[[2015,1,12]],"date-time":"2015-01-12T20:42:45Z","timestamp":1421095365000},"page":"175-186","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Subsuming Methods"],"prefix":"10.1145","author":[{"given":"David","family":"Maplesden","sequence":"first","affiliation":[{"name":"The University of Auckland, Auckland, New Zealand"}]},{"given":"Ewan","family":"Tempero","sequence":"additional","affiliation":[{"name":"The University of Auckland, Auckland, New Zealand"}]},{"given":"John","family":"Hosking","sequence":"additional","affiliation":[{"name":"The University of Auckland, Auckland, New Zealand"}]},{"given":"John C.","family":"Grundy","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Melbourne, Australia"}]}],"member":"320","published-online":{"date-parts":[[2015,1,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879211.1879224"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPPW.2010.35"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/258915.258924"},{"key":"e_1_3_2_1_4_1","volume-title":"Approximating the calling context tree via sampling","author":"Arnold M.","year":"2000","unstructured":"M. Arnold and P. Sweeney . Approximating the calling context tree via sampling . IBM TJ Watson Research Center , 2000 . M. Arnold and P. Sweeney. Approximating the calling context tree via sampling. IBM TJ Watson Research Center, 2000."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032497.2032524"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/11575467_13"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.v36:6"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167488"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032497.2032523"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993559"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273480"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453111"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1506409.1506425"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1879211.1879228"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2010.7"},{"key":"e_1_3_2_1_16_1","first-page":"85","volume-title":"The diary of a datum: an approach to modeling runtime complexity in framework-based applications","author":"Mitchell N.","year":"2005","unstructured":"N. Mitchell , G. Sevitsky , and H. Srinivasan . The diary of a datum: an approach to modeling runtime complexity in framework-based applications . Library-Centric Software Design - LCSD '05, page 85 , 2005 . N. Mitchell, G. Sevitsky, and H. Srinivasan. The diary of a datum: an approach to modeling runtime complexity in framework-based applications. Library-Centric Software Design - LCSD'05, page 85, 2005."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11785477_25"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/VISSOF.2009.5336425"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491416"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2011.11.003"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2093157.2093160"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542522"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081730"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384690"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806617"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882362.1882448"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806616"},{"key":"e_1_3_2_1_28_1","first-page":"134","volume-title":"Uncovering performance problems in Java applications with reference propagation profiling. 34th Int'l Conf. on Software Engineering (ICSE)","author":"Yan D.","year":"2012","unstructured":"D. Yan , G. Xu , and A. Rountev . Uncovering performance problems in Java applications with reference propagation profiling. 34th Int'l Conf. on Software Engineering (ICSE) , pages 134 -- 144 , 2012 . D. Yan, G. Xu, and A. Rountev. Uncovering performance problems in Java applications with reference propagation profiling. 34th Int'l Conf. on Software Engineering (ICSE), pages 134--144, 2012."}],"event":{"name":"ICPE'15: ACM\/SPEC International Conference on Performance Engineering","sponsor":["SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SIGSOFT ACM Special Interest Group on Software Engineering","SPEC SPEC Research Group"],"location":"Austin Texas USA","acronym":"ICPE'15"},"container-title":["Proceedings of the 6th ACM\/SPEC International Conference on Performance Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2668930.2688040","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2668930.2688040","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:37Z","timestamp":1750231177000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2668930.2688040"}},"subtitle":["Finding New Optimisation Opportunities in Object-Oriented Software"],"short-title":[],"issued":{"date-parts":[[2015,1,31]]},"references-count":28,"alternative-id":["10.1145\/2668930.2688040","10.1145\/2668930"],"URL":"https:\/\/doi.org\/10.1145\/2668930.2688040","relation":{},"subject":[],"published":{"date-parts":[[2015,1,31]]},"assertion":[{"value":"2015-01-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}