{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:31Z","timestamp":1750306291943,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,14]],"date-time":"2016-05-14T00:00:00Z","timestamp":1463184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100000923","name":"Australian Research Council","doi-asserted-by":"publisher","award":["LP150100892"],"award-info":[{"award-number":["LP150100892"]}],"id":[{"id":"10.13039\/501100000923","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,14]]},"DOI":"10.1145\/2896941.2896950","type":"proceedings-article","created":{"date-parts":[[2016,7,21]],"date-time":"2016-07-21T15:20:09Z","timestamp":1469114409000},"page":"49-55","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Enhanced playback of automated service emulation models using entropy analysis"],"prefix":"10.1145","author":[{"given":"Steve","family":"Versteeg","sequence":"first","affiliation":[{"name":"CA Research, Melbourne, Australia"}]},{"given":"Miao","family":"Du","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Hawthorn, Victoria, Australia"}]},{"given":"John","family":"Bird","sequence":"additional","affiliation":[{"name":"CA Technologies, Melbourne, Australia"}]},{"given":"Jean-Guy","family":"Schneider","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Hawthorn, Victoria, Australia"}]},{"given":"John","family":"Grundy","sequence":"additional","affiliation":[{"name":"Deakin University, Burwood, Victoria, Australia"}]},{"given":"Jun","family":"Han","sequence":"additional","affiliation":[{"name":"Swinburne University of Technology, Hawthorn, Victoria, Australia"}]}],"member":"320","published-online":{"date-parts":[[2016,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/CCGRID.2010.72"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-68524-1_19"},{"key":"e_1_3_2_1_3_1","volume-title":"Simple Object Access Protocol (SOAP) 1.1, 5","author":"Box D.","year":"2000","unstructured":"D. Box , D. Ehnebuske , G. Kakivaya , A. Layman , N. Mendelsohn , H. F. Nielsen , S. Thatte , and D. Winer . Simple Object Access Protocol (SOAP) 1.1, 5 2000 . W3C Note 08 May 2000. D. Box, D. Ehnebuske, G. Kakivaya, A. Layman, N. Mendelsohn, H. F. Nielsen, S. Thatte, and D. Winer. Simple Object Access Protocol (SOAP) 1.1, 5 2000. W3C Note 08 May 2000."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2015.27"},{"key":"e_1_3_2_1_5_1","first-page":"1","volume-title":"Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS 2006","author":"Cui W.","year":"2006","unstructured":"W. Cui , V. Paxson , N. C. Weaver , and R. H. Katz . Protocol-independent adaptive replay of application dialog . In Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS 2006 ), pages 1 -- 15 , San Diego, California, USA , 2006 . W. Cui, V. Paxson, N. C. Weaver, and R. H. Katz. Protocol-independent adaptive replay of application dialog. In Proceedings of the 13th Annual Network and Distributed System Security Symposium (NDSS 2006), pages 1--15, San Diego, California, USA, 2006."},{"key":"e_1_3_2_1_6_1","volume-title":"http:\/\/docker.com","author":"Docker Inc. Docker.","year":"2015","unstructured":"Docker Inc. Docker. http:\/\/docker.com , 2015 . Docker Inc. Docker. http:\/\/docker.com, 2015."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465478.2465485"},{"key":"e_1_3_2_1_8_1","volume-title":"Virus Bulletin","author":"Ebringer T.","year":"2008","unstructured":"T. Ebringer , L. Sun , and S. Boztas . A fast randomness test that preserves local detail . Virus Bulletin , 2008 . T. Ebringer, L. Sun, and S. Boztas. A fast randomness test that preserves local detail. Virus Bulletin, 2008."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593812.2593813"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568273"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:AUSE.0000049207.62380.74"},{"key":"e_1_3_2_1_12_1","volume-title":"Emulating Enterprise Software Environments. Phd thesis","author":"Hine C.","year":"2012","unstructured":"C. Hine . Emulating Enterprise Software Environments. Phd thesis , Swinburne University of Technology , Faculty of Information and Communication Technologies, 2012 . C. Hine. Emulating Enterprise Software Environments. Phd thesis, Swinburne University of Technology, Faculty of Information and Communication Technologies, 2012."},{"key":"e_1_3_2_1_13_1","volume-title":"http:\/\/continuousdelivery.com\/2010\/08\/continuous-delivery-vs-continuous-deployment\/","author":"Humble J.","year":"2010","unstructured":"J. Humble . Continuous delivery vs continuous deployment. http:\/\/continuousdelivery.com\/2010\/08\/continuous-delivery-vs-continuous-deployment\/ , 13 August 2010 . ( Accessed 19 January 2016). J. Humble. Continuous delivery vs continuous deployment. http:\/\/continuousdelivery.com\/2010\/08\/continuous-delivery-vs-continuous-deployment\/, 13 August 2010. (Accessed 19 January 2016)."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.3390\/d2020207"},{"issue":"3","key":"e_1_3_2_1_15_1","first-page":"11","article-title":"our Experiences with VMware and VirtualBox","volume":"25","author":"Selecting P. Li.","year":"2010","unstructured":"P. Li. Selecting and Using Virtualization Solutions : our Experiences with VMware and VirtualBox . Journal of Computing Sciences in Colleges , 25 ( 3 ): 11 -- 17 , 2010 . P. Li. Selecting and Using Virtualization Solutions: our Experiences with VMware and VirtualBox. Journal of Computing Sciences in Colleges, 25(3):11--17, 2010.","journal-title":"Journal of Computing Sciences in Colleges"},{"key":"e_1_3_2_1_16_1","volume-title":"IBM International Technical Support Organisation","author":"Long R.","year":"2000","unstructured":"R. Long , M. Harrington , R. Hain , and G. Nicholls . IMS Primer . IBM International Technical Support Organisation , 2000 . R. Long, M. Harrington, R. Hain, and G. Nicholls. IMS Primer. IBM International Technical Support Organisation, 2000."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/047172842X"},{"key":"e_1_3_2_1_18_1","volume-title":"Apress","author":"Michelsen J.","year":"2012","unstructured":"J. Michelsen and J. English . Service Virtualization: Reality is Overrated . Apress , September 2012 . J. Michelsen and J. English. Service Virtualization: Reality is Overrated. Apress, September 2012."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/0022-2836(70)90057-4"},{"key":"e_1_3_2_1_20_1","first-page":"6","article-title":"Lightweight Directory Access Protocol (LDAP)","author":"Sermersheim J.","year":"2006","unstructured":"J. Sermersheim . Lightweight Directory Access Protocol (LDAP) : The Protocol , 6 2006 . RFC 4511. J. Sermersheim. Lightweight Directory Access Protocol (LDAP): The Protocol, 6 2006. RFC 4511.","journal-title":"The Protocol"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1948.tb01338.x"},{"key":"e_1_3_2_1_22_1","volume-title":"Nature","author":"Simpson E. H.","year":"1949","unstructured":"E. H. Simpson . Measurement of diversity . Nature , 1949 . E. H. Simpson. Measurement of diversity. Nature, 1949."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.25"},{"volume-title":"The Twitter REST API","year":"2014","key":"e_1_3_2_1_24_1","unstructured":"Twitter. The Twitter REST API , 2014 . Twitter. The Twitter REST API, 2014."}],"event":{"name":"ICSE '16: 38th International Conference on Software Engineering","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS\\DATC IEEE Computer Society","TCSE IEEE Computer Society's Tech. Council on Software Engin."],"location":"Austin Texas","acronym":"ICSE '16"},"container-title":["Proceedings of the International Workshop on Continuous Software Evolution and Delivery"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2896941.2896950","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2896941.2896950","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:06Z","timestamp":1750221546000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2896941.2896950"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,14]]},"references-count":24,"alternative-id":["10.1145\/2896941.2896950","10.1145\/2896941"],"URL":"https:\/\/doi.org\/10.1145\/2896941.2896950","relation":{},"subject":[],"published":{"date-parts":[[2016,5,14]]},"assertion":[{"value":"2016-05-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}