{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:09:53Z","timestamp":1750306193958,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,9,23]],"date-time":"2016-09-23T00:00:00Z","timestamp":1474588800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,9,23]]},"DOI":"10.1145\/2975969.2975972","type":"proceedings-article","created":{"date-parts":[[2016,8,29]],"date-time":"2016-08-29T12:17:16Z","timestamp":1472473036000},"page":"24-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Profiling actor utilization and communication in Akka"],"prefix":"10.1145","author":[{"given":"Andrea","family":"Ros\u00e0","sequence":"first","affiliation":[{"name":"University of Lugano, Switzerland"}]},{"given":"Lydia Y.","family":"Chen","sequence":"additional","affiliation":[{"name":"IBM Research, Switzerland"}]},{"given":"Walter","family":"Binder","sequence":"additional","affiliation":[{"name":"University of Lugano, Switzerland"}]}],"member":"320","published-online":{"date-parts":[[2016,9,23]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"VisualVM. https:\/\/visualvm.java.net.  VisualVM. https:\/\/visualvm.java.net."},{"key":"e_1_3_2_1_2_1","unstructured":"Akka Tracing. https:\/\/github.com\/levkhomich\/ akka-tracing.  Akka Tracing. https:\/\/github.com\/levkhomich\/ akka-tracing."},{"key":"e_1_3_2_1_3_1","unstructured":"AppDynamics. https:\/\/www.appdynamics.com\/java\/akka\/.  AppDynamics. https:\/\/www.appdynamics.com\/java\/akka\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Apache Flink. https:\/\/flink.apache.org.  Apache Flink. https:\/\/flink.apache.org."},{"key":"e_1_3_2_1_5_1","unstructured":"JProfiler. https:\/\/www.ej-technologies.com\/products\/ jprofiler\/overview.html.  JProfiler. https:\/\/www.ej-technologies.com\/products\/ jprofiler\/overview.html."},{"key":"e_1_3_2_1_6_1","unstructured":"Kamon. http:\/\/kamon.io\/integrations\/akka\/ actor-router-and-dispatcher-metrics\/.  Kamon. http:\/\/kamon.io\/integrations\/akka\/ actor-router-and-dispatcher-metrics\/."},{"key":"e_1_3_2_1_7_1","unstructured":"Lightbend Monitoring. https:\/\/www.lightbend.com\/ products\/monitoring.  Lightbend Monitoring. https:\/\/www.lightbend.com\/ products\/monitoring."},{"key":"e_1_3_2_1_8_1","unstructured":"NewRelic. https:\/\/newrelic.com.  NewRelic. https:\/\/newrelic.com."},{"key":"e_1_3_2_1_9_1","unstructured":"Observer. http:\/\/erlang.org\/doc\/apps\/observer.  Observer. http:\/\/erlang.org\/doc\/apps\/observer."},{"key":"e_1_3_2_1_10_1","unstructured":"Takipi. https:\/\/www.takipi.com.  Takipi. https:\/\/www.takipi.com."},{"key":"e_1_3_2_1_11_1","unstructured":"Yourkit. https:\/\/www.yourkit.com.  Yourkit. https:\/\/www.yourkit.com."},{"key":"e_1_3_2_1_12_1","unstructured":"Zipkin. http:\/\/zipkin.io.  Zipkin. http:\/\/zipkin.io."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1086.001.0001","volume-title":"Actors: A Model of Concurrent Computation in Distributed Systems","author":"Agha G.","year":"1986","unstructured":"G. Agha . Actors: A Model of Concurrent Computation in Distributed Systems . MIT Press , 1986 . G. Agha. Actors: A Model of Concurrent Computation in Distributed Systems. MIT Press, 1986."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150412"},{"key":"e_1_3_2_1_15_1","first-page":"272","volume-title":"OSDI","author":"Barham P.","year":"2004","unstructured":"P. Barham , A. Donnelly , R. Isaacs , and R. Mortier . Using Magpie for Request Extraction and Workload Modelling . In OSDI , pages 259\u2013 272 , 2004 . P. Barham, A. Donnelly, R. Isaacs, and R. Mortier. Using Magpie for Request Extraction and Workload Modelling. In OSDI, pages 259\u2013 272, 2004."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(97)00040-6"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/504282.504293"},{"key":"e_1_3_2_1_18_1","unstructured":"B.-E. Dahlberg. Percept - An Erlang Concurrency Profiling Tool. http:\/\/www.erlang.org\/doc\/man\/percept.html.  B.-E. Dahlberg. Percept - An Erlang Concurrency Profiling Tool. http:\/\/www.erlang.org\/doc\/man\/percept.html."},{"key":"e_1_3_2_1_19_1","first-page":"199","volume-title":"Cray Performance Analysis Tools. In International Workshop on Parallel Tools for High Performance Computing","author":"DeRose L.","year":"2008","unstructured":"L. DeRose , B. Homer , D. Johnson , S. Kaufmann , and H. Poxon . Cray Performance Analysis Tools. In International Workshop on Parallel Tools for High Performance Computing , pages 191\u2013 199 , 2008 . L. DeRose, B. Homer, D. Johnson, S. Kaufmann, and H. Poxon. Cray Performance Analysis Tools. In International Workshop on Parallel Tools for High Performance Computing, pages 191\u2013199, 2008."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509529"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS.2012.6189221"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2005.346"},{"key":"e_1_3_2_1_23_1","first-page":"284","volume-title":"NSDI","author":"Fonseca R.","year":"2007","unstructured":"R. Fonseca , G. Porter , R. H. Katz , S. Shenker , and I. Stoica . X-trace: A Pervasive Network Tracing Framework . In NSDI , pages 271\u2013 284 , 2007 . R. Fonseca, G. Porter, R. H. Katz, S. Shenker, and I. Stoica. X-trace: A Pervasive Network Tracing Framework. In NSDI, pages 271\u2013284, 2007."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2009.76"},{"key":"e_1_3_2_1_25_1","first-page":"221","volume-title":"HPFC","volume":"95","author":"Hammond K.","year":"1995","unstructured":"K. Hammond , H.-W. Loidl , and A. S. Partridge . Visualising granularity in parallel programs: A graphical winnowing system for Haskell . In HPFC , volume 95 , pages 208\u2013 221 , 1995 . K. Hammond, H.-W. Loidl, and A. S. Partridge. Visualising granularity in parallel programs: A graphical winnowing system for Haskell. In HPFC, volume 95, pages 208\u2013221, 1995."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810479.1810509"},{"key":"e_1_3_2_1_27_1","first-page":"245","volume-title":"IJCAI","author":"Hewitt C.","year":"1973","unstructured":"C. Hewitt , P. Bishop , and R. Steiger . A Universal Modular ACTOR Formalism for Artificial Intelligence . In IJCAI , pages 235\u2013 245 , 1973 . C. Hewitt, P. Bishop, and R. Steiger. A Universal Modular ACTOR Formalism for Artificial Intelligence. In IJCAI, pages 235\u2013245, 1973."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2687357.2687368"},{"key":"e_1_3_2_1_29_1","first-page":"463","volume-title":"ISCA","author":"Kambadur M.","year":"2012","unstructured":"M. Kambadur , K. Tang , and M. A. Kim . Harmony: Collection and Analysis of Parallel Block Vectors . In ISCA , pages 452\u2013 463 , 2012 . M. Kambadur, K. Tang, and M. A. Kim. Harmony: Collection and Analysis of Parallel Block Vectors. In ISCA, pages 452\u2013463, 2012."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2414740.2414747"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/646158.680006"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2505305.2505311"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2162049.2162077"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517208.2517219"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2014.01.003"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.parco.2004.04.001"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3012408.3012418"},{"key":"e_1_3_2_1_38_1","volume-title":"Google","author":"Sigelman B. H.","year":"2010","unstructured":"B. H. Sigelman , L. A. Barroso , M. Burrows , P. Stephenson , M. Plakal , D. Beaver , S. Jaspan , and C. Shanbhag . Dapper, a Large-Scale Distributed Systems Tracing Infrastructure. Technical report , Google , Inc ., 2010 . B. H. Sigelman, L. A. Barroso, M. Burrows, P. Stephenson, M. Plakal, D. Beaver, S. Jaspan, and C. Shanbhag. Dapper, a Large-Scale Distributed Systems Tracing Infrastructure. Technical report, Google, Inc., 2010."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1940281.1940330"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2010.47"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39038-8_13"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1811039.1811098"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/511334.511364"},{"key":"e_1_3_2_1_44_1","first-page":"70","volume-title":"NSDI","author":"Yu M.","year":"2011","unstructured":"M. Yu , A. Greenberg , D. Maltz , J. Rexford , L. Yuan , S. Kandula , and C. Kim . Profiling Network Performance for Multi-tier Data Center Applications . In NSDI , pages 57\u2013 70 , 2011 . M. Yu, A. Greenberg, D. Maltz, J. Rexford, L. Yuan, S. Kandula, and C. Kim. Profiling Network Performance for Multi-tier Data Center Applications. In NSDI, pages 57\u201370, 2011."},{"key":"e_1_3_2_1_45_1","first-page":"14","volume-title":"NSDI","author":"Zaharia M.","year":"2012","unstructured":"M. Zaharia , M. Chowdhury , T. Das , A. Dave , J. Ma , M. McCauley , M. J. Franklin , S. Shenker , and I. Stoica . Resilient Distributed Datasets: A Fault-tolerant Abstraction for In-memory Cluster Computing . In NSDI , pages 2:1\u20132: 14 , 2012 . M. Zaharia, M. Chowdhury, T. Das, A. Dave, J. Ma, M. McCauley, M. J. Franklin, S. Shenker, and I. Stoica. Resilient Distributed Datasets: A Fault-tolerant Abstraction for In-memory Cluster Computing. In NSDI, pages 2:1\u20132:14, 2012."},{"key":"e_1_3_2_1_46_1","first-page":"644","volume-title":"OSDI","author":"Zhao X.","year":"2014","unstructured":"X. Zhao , Y. Zhang , D. Lion , M. F. Ullah , Y. Luo , D. Yuan , and M. Stumm . lprof: A Non-intrusive Request Flow Profiler for Distributed Systems . In OSDI , pages 629\u2013 644 , 2014 . X. Zhao, Y. Zhang, D. Lion, M. F. Ullah, Y. Luo, D. Yuan, and M. Stumm. lprof: A Non-intrusive Request Flow Profiler for Distributed Systems. In OSDI, pages 629\u2013644, 2014."}],"event":{"name":"ICFP'16: ACM SIGPLAN International Conference on Functional Programming","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Nara Japan","acronym":"ICFP'16"},"container-title":["Proceedings of the 15th International Workshop on Erlang"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2975969.2975972","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2975969.2975972","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:50:19Z","timestamp":1750218619000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2975969.2975972"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,9,23]]},"references-count":46,"alternative-id":["10.1145\/2975969.2975972","10.1145\/2975969"],"URL":"https:\/\/doi.org\/10.1145\/2975969.2975972","relation":{},"subject":[],"published":{"date-parts":[[2016,9,23]]},"assertion":[{"value":"2016-09-23","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}