{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:36Z","timestamp":1750306296532,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,14]],"date-time":"2016-05-14T00:00:00Z","timestamp":1463184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100007615","name":"Australian Research Council","doi-asserted-by":"publisher","award":["LP150100892"],"award-info":[{"award-number":["LP150100892"]}],"id":[{"id":"10.13039\/100007615","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,14]]},"DOI":"10.1145\/2889160.2889242","type":"proceedings-article","created":{"date-parts":[[2016,5,16]],"date-time":"2016-05-16T12:27:23Z","timestamp":1463401643000},"page":"202-211","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":12,"title":["Opaque service virtualisation"],"prefix":"10.1145","author":[{"given":"Steve","family":"Versteeg","sequence":"first","affiliation":[{"name":"CA Research, Melbourne, Australia"}]},{"given":"Miao","family":"Du","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Hawthorn, Victoria, Australia"}]},{"given":"Jean-Guy","family":"Schneider","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Hawthorn, Victoria, Australia"}]},{"given":"John","family":"Grundy","sequence":"additional","affiliation":[{"name":"Deakin University, Burwood, Victoria, Australia"}]},{"given":"Jun","family":"Han","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Hawthorn, Victoria, Australia"}]},{"given":"Menka","family":"Goyal","sequence":"additional","affiliation":[{"name":"CA Technologies, Plano, Texas"}]}],"member":"320","published-online":{"date-parts":[[2016,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"DevOps: A Software Architect's Perspective","author":"Bass L.","year":"2015","unstructured":"L. Bass , I. Weber , and L. Zhu , DevOps: A Software Architect's Perspective . Addison-Wesley Professional , 2015 . L. Bass, I. Weber, and L. Zhu, DevOps: A Software Architect's Perspective. Addison-Wesley Professional, 2015."},{"key":"e_1_3_2_1_2_1","first-page":"1","volume-title":"USA","author":"Sugerman J.","year":"2001","unstructured":"J. Sugerman , G. Venkitachalam , and B.-H. Lim , \"Virtualizing i\/o devices on vmware workstation's hosted virtual machine monitor,\" in Proceedings of the General Track: 2001 USENIX Annual Technical Conference (USENIX 2001) , USA , 2001 , pp. 1 -- 14 . J. Sugerman, G. Venkitachalam, and B.-H. Lim, \"Virtualizing i\/o devices on vmware workstation's hosted virtual machine monitor,\" in Proceedings of the General Track: 2001 USENIX Annual Technical Conference (USENIX 2001), USA, 2001, pp. 1--14."},{"key":"e_1_3_2_1_3_1","volume-title":"Faculty of Information and Communication Technologies","author":"Hine C.","year":"2012","unstructured":"C. Hine , \"Emulating enterprise software environments,\" PhD thesis, Swinburne University of Technology , Faculty of Information and Communication Technologies , 2012 . {Online}. Available : http:\/\/quoll.ict.swin.edu.au\/doc\/cmh-phd-thesis.pdf C. Hine, \"Emulating enterprise software environments,\" PhD thesis, Swinburne University of Technology, Faculty of Information and Communication Technologies, 2012. {Online}. Available: http:\/\/quoll.ict.swin.edu.au\/doc\/cmh-phd-thesis.pdf"},{"key":"e_1_3_2_1_4_1","volume-title":"USA","author":"Ghosh S.","year":"1999","unstructured":"S. Ghosh and A. P. Mathur , \" Issues in Testing Distributed Component-Based Systems,\" in 1st International ICSE Workshop on Testing Distributed Component-Based Systems (ICSE 1999) , USA , 1999 . S. Ghosh and A. P. Mathur, \"Issues in Testing Distributed Component-Based Systems,\" in 1st International ICSE Workshop on Testing Distributed Component-Based Systems (ICSE 1999), USA, 1999."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1629116.1629121"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568273"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:AUSE.0000049207.62380.74"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2010.72"},{"key":"e_1_3_2_1_9_1","volume-title":"Docker. {Online}. Available: http:\/\/docker.com","author":"Docker Inc.","year":"2015","unstructured":"Docker Inc. ( 2015 ) Docker. {Online}. Available: http:\/\/docker.com Docker Inc. (2015) Docker. {Online}. Available: http:\/\/docker.com"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68524-1_19"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.25"},{"key":"e_1_3_2_1_12_1","first-page":"199","volume-title":"USA","author":"Cui W.","year":"2007","unstructured":"W. Cui , J. Kannan , and H. J. Wang , \" Discoverer: Automatic protocol reverse engineering from network traces,\" in 16th USENIX Security Symposium (Security 2007), Boston, MA , USA , 2007 , pp. 199 -- 212 . W. Cui, J. Kannan, and H. J. Wang, \"Discoverer: Automatic protocol reverse engineering from network traces,\" in 16th USENIX Security Symposium (Security 2007), Boston, MA, USA, 2007, pp. 199--212."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2013.64"},{"key":"e_1_3_2_1_14_1","first-page":"1","volume-title":"Protocol-independent adaptive replay of application dialog,\" in 13th Annual Network and Distributed System Security Symposium (NDSS","author":"Cui W.","year":"2006","unstructured":"W. Cui , V. Paxson , N. C. Weaver , and R. H. Katz , \" Protocol-independent adaptive replay of application dialog,\" in 13th Annual Network and Distributed System Security Symposium (NDSS 2006 ), San Diego , California, USA , 2006, pp. 1 -- 15 . W. Cui, V. Paxson, N. C. Weaver, and R. H. Katz, \"Protocol-independent adaptive replay of application dialog,\" in 13th Annual Network and Distributed System Security Symposium (NDSS 2006), San Diego, California, USA, 2006, pp. 1--15."},{"key":"e_1_3_2_1_15_1","volume-title":"Apress","author":"Michelsen J.","year":"2012","unstructured":"J. Michelsen and J. English , Service Virtualization: Reality is Overrated . Apress , September 2012 . J. Michelsen and J. English, Service Virtualization: Reality is Overrated. Apress, September 2012."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2836(70)90057-4"},{"key":"e_1_3_2_1_17_1","volume-title":"The Protocol,\" 6","author":"Sermersheim J.","year":"2006","unstructured":"J. Sermersheim , \"Lightweight Directory Access Protocol (LDAP) : The Protocol,\" 6 2006 , RFC 4511. J. Sermersheim, \"Lightweight Directory Access Protocol (LDAP): The Protocol,\" 6 2006, RFC 4511."},{"key":"e_1_3_2_1_18_1","first-page":"1","volume-title":"USA","author":"Du M.","year":"2013","unstructured":"M. Du , S. Versteeg , J.-G. Schneider , J. Han , and J. Grundy , \" Interaction traces mining for efficient system responses generation,\" in Proceedings of the 2nd International Workshop on Software Mining (SoftMine 2013), Palo Alto, CA , USA , 2013 , pp. 1 -- 8 . M. Du, S. Versteeg, J.-G. Schneider, J. Han, and J. Grundy, \"Interaction traces mining for efficient system responses generation,\" in Proceedings of the 2nd International Workshop on Software Mining (SoftMine 2013), Palo Alto, CA, USA, 2013, pp. 1--8."},{"key":"e_1_3_2_1_19_1","first-page":"2225","volume-title":"Honolulu","author":"Bezdek J. C.","year":"2002","unstructured":"J. C. Bezdek and R. J. Hathaway , \" Vat: A tool for visual assessment of (cluster) tendency,\" in 2002 International Joint Conference on Neural Networks (IJCNN 2002) , Honolulu , Hawaii, USA , 2002 , pp. 2225 -- 2230 . J. C. Bezdek and R. J. Hathaway, \"Vat: A tool for visual assessment of (cluster) tendency,\" in 2002 International Joint Conference on Neural Networks (IJCNN 2002), Honolulu, Hawaii, USA, 2002, pp. 2225--2230."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1089\/cmb.1994.1.337"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511790492"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/SP.2009.14"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/22.22.4673"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1093\/nar\/20.5.1093"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465478.2465485"},{"key":"e_1_3_2_1_28_1","volume-title":"IBM International Technical Support Organisation","author":"Long R.","year":"2000","unstructured":"R. Long , M. Harrington , R. Hain , and G. Nicholls , IMS Primer . IBM International Technical Support Organisation , 2000 . R. Long, M. Harrington, R. Hain, and G. Nicholls, IMS Primer. IBM International Technical Support Organisation, 2000."},{"key":"e_1_3_2_1_29_1","volume-title":"Simple Object Access Protocol (SOAP) 1.1,\" 5","author":"Box D.","year":"2000","unstructured":"D. Box , D. Ehnebuske , G. Kakivaya , A. Layman , N. Mendelsohn , H. F. Nielsen , S. Thatte , and D. Winer , \" Simple Object Access Protocol (SOAP) 1.1,\" 5 2000 , w3C Note 08 May 2000. D. Box, D. Ehnebuske, G. Kakivaya, A. Layman, N. Mendelsohn, H. F. Nielsen, S. Thatte, and D. Winer, \"Simple Object Access Protocol (SOAP) 1.1,\" 5 2000, w3C Note 08 May 2000."},{"key":"e_1_3_2_1_30_1","unstructured":"Twitter \"The Twitter REST API \" 2014. {Online}. Available: https:\/\/dev.twitter.com\/docs\/api  Twitter \"The Twitter REST API \" 2014. {Online}. Available: https:\/\/dev.twitter.com\/docs\/api"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1002\/047172842X"},{"key":"e_1_3_2_1_32_1","volume-title":"December 16","author":"Swan D.","year":"2014","unstructured":"D. Swan , \"Swinburne , CA Technologies in virtualisation breakthrough,\" The Australian , December 16 2014 . {Online}. Available: http:\/\/www.theaustralian.com.au\/business\/latest\/swinburne-ca-technologies-in-virtualisation-breakthrough\/story-e6frg90f-1227158041554 D. Swan, \"Swinburne, CA Technologies in virtualisation breakthrough,\" The Australian, December 16 2014. {Online}. Available: http:\/\/www.theaustralian.com.au\/business\/latest\/swinburne-ca-technologies-in-virtualisation-breakthrough\/story-e6frg90f-1227158041554"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2008.158"},{"key":"e_1_3_2_1_34_1","unstructured":"Health Level Seven International \"Introduction to HL7 standards \" 2015. {Online}. Available: http:\/\/www.hl7.org\/implement\/standards  Health Level Seven International \"Introduction to HL7 standards \" 2015. {Online}. Available: http:\/\/www.hl7.org\/implement\/standards"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2015.13"}],"event":{"name":"ICSE '16: 38th International Conference on Software Engineering","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS\\TCSE TC on Software Engineering","IEEE-CS\\DATC IEEE Computer Society"],"location":"Austin Texas","acronym":"ICSE '16"},"container-title":["Proceedings of the 38th International Conference on Software Engineering Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2889160.2889242","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2889160.2889242","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:12Z","timestamp":1750221552000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2889160.2889242"}},"subtitle":["a practical tool for emulating endpoint systems"],"short-title":[],"issued":{"date-parts":[[2016,5,14]]},"references-count":34,"alternative-id":["10.1145\/2889160.2889242","10.1145\/2889160"],"URL":"https:\/\/doi.org\/10.1145\/2889160.2889242","relation":{},"subject":[],"published":{"date-parts":[[2016,5,14]]},"assertion":[{"value":"2016-05-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}