{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T17:15:16Z","timestamp":1771953316542,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":49,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T00:00:00Z","timestamp":1540512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,26]]},"DOI":"10.1145\/3236024.3236043","type":"proceedings-article","created":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T12:06:00Z","timestamp":1540814760000},"page":"118-128","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["Darwinian data structure selection"],"prefix":"10.1145","author":[{"given":"Michail","family":"Basios","sequence":"first","affiliation":[{"name":"University College London, UK"}]},{"given":"Lingbo","family":"Li","sequence":"additional","affiliation":[{"name":"University College London, UK"}]},{"given":"Fan","family":"Wu","sequence":"additional","affiliation":[{"name":"University College London, UK"}]},{"given":"Leslie","family":"Kanthan","sequence":"additional","affiliation":[{"name":"University College London, UK"}]},{"given":"Earl T.","family":"Barr","sequence":"additional","affiliation":[{"name":"University College London, UK"}]}],"member":"320","published-online":{"date-parts":[[2018,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/583854.582432"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635898"},{"key":"e_1_3_2_1_3_1","first-page":"167","volume-title":"International Symposium on Search Based Software Engineering","author":"Basios M."},{"key":"e_1_3_2_1_4_1","volume-title":"Addison-Wesley Professional","author":"Binder R. V.","year":"2000"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167515.1167488"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509531"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882362.1882373"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2739480.2754752"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3168825"},{"key":"e_1_3_2_1_10_1","unstructured":"N. Dale and H. M. Walker. Abstract data types: specifications implementations and applications. Jones &amp; Bartlett Learning 1996.   N. Dale and H. M. Walker. Abstract data types: specifications implementations and applications. Jones &amp; Bartlett Learning 1996."},{"key":"e_1_3_2_1_11_1","first-page":"258","volume-title":"International Symposium on Search Based Software Engineering","author":"Dan H."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814228.2814231"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453111"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1214\/09-SS051"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297105.1297033"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337225"},{"key":"e_1_3_2_1_18_1","unstructured":"B. Hardin. Companies with hacking cultures fai. https:\/\/blog.bretthard.in\/ companies-with-hacking-cultures-fail-b8907a69e3d#.ffdkyb1w2 2016. {Online; accessed 25-February-2017}.  B. Hardin. Companies with hacking cultures fai. https:\/\/blog.bretthard.in\/ companies-with-hacking-cultures-fail-b8907a69e3d#.ffdkyb1w2 2016. {Online; accessed 25-February-2017}."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.29"},{"key":"e_1_3_2_1_20_1","unstructured":"IBM. T.J. Watson Libraries for Analysis (WALA). http:\/\/wala.sourceforge.net\/ wiki\/index.php\/Main_Page 2009. {Online; accessed 18-February-2017}.  IBM. T.J. Watson Libraries for Analysis (WALA). http:\/\/wala.sourceforge.net\/ wiki\/index.php\/Main_Page 2009. {Online; accessed 18-February-2017}."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2739482.2768417"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993316.1993509"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2555670.2464160"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/356635.356640"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2576768.2598244"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/RE.2016.7"},{"key":"e_1_3_2_1_27_1","volume-title":"UCL","author":"Li L.","year":"2017"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2576768.2598334"},{"key":"e_1_3_2_1_29_1","first-page":"294","volume-title":"International Symposium on Search Based Software Engineering","author":"Li L."},{"key":"e_1_3_2_1_30_1","first-page":"1","article-title":"The value of exact analysis in requirements selection","author":"Li L.","year":"2016","journal-title":"IEEE Transactions on Software Engineering, PP (99), pages"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568297"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297105.1297046"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1007\/11785477_25"},{"key":"e_1_3_2_1_34_1","first-page":"71","volume-title":"EDBT","author":"Nagel F.","year":"2017"},{"key":"e_1_3_2_1_35_1","first-page":"10","volume-title":"Eighth IEEE International Conference on Software Testing, Verification and Validation, ICST 2015 Workshops","author":"Nanavati J.","year":"2015"},{"key":"e_1_3_2_1_36_1","unstructured":"R. J. Nowling. Gotchas with Scala Mutable Collections and Large Data Sets. http:\/\/rnowling.github.io\/software\/engineering\/2015\/07\/01\/ gotcha-scala-collections.html 2015. {Online; accessed 18-February-2017}.  R. J. Nowling. Gotchas with Scala Mutable Collections and Large Data Sets. http:\/\/rnowling.github.io\/software\/engineering\/2015\/07\/01\/ gotcha-scala-collections.html 2015. {Online; accessed 18-February-2017}."},{"key":"e_1_3_2_1_37_1","article-title":"Genetic improvement of software: a comprehensive survey","author":"Petke J.","year":"2017","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-44303-3_12"},{"key":"e_1_3_2_1_39_1","unstructured":"R. Poli W. B. Langdon N. F. McPhee and J. R. Koza. A field guide to genetic programming. Lulu. com 2008.   R. Poli W. B. Langdon N. F. McPhee and J. R. Koza. A field guide to genetic programming. Lulu. com 2008."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542522"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542522"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1449955.1449775"},{"issue":"120","key":"e_1_3_2_1_43_1","first-page":"11","article-title":"Design patterns: Elements of reusable object-oriented software. Reading","volume":"49","author":"Vlissides J.","year":"1995","journal-title":"Addison-Wesley"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.03.002"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2739480.2754648"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542523"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/1809028.1806617"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368110"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2003.810758"}],"event":{"name":"ESEC\/FSE '18: 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Lake Buena Vista FL USA","acronym":"ESEC\/FSE '18","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236024.3236043","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3236024.3236043","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:25Z","timestamp":1750208245000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236024.3236043"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,26]]},"references-count":49,"alternative-id":["10.1145\/3236024.3236043","10.1145\/3236024"],"URL":"https:\/\/doi.org\/10.1145\/3236024.3236043","relation":{},"subject":[],"published":{"date-parts":[[2018,10,26]]},"assertion":[{"value":"2018-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}