{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,27]],"date-time":"2026-03-27T02:37:37Z","timestamp":1774579057319,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":75,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,26]],"date-time":"2018-10-26T00:00:00Z","timestamp":1540512000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["1318808, 1552944, and 1717022"],"award-info":[{"award-number":["1318808, 1552944, and 1717022"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"AFRL and DARPA","award":["FA8750-16-2-0042"],"award-info":[{"award-number":["FA8750-16-2-0042"]}]},{"name":"DFG","award":["SI 2171\/2 and SI 2171\/3-1"],"award-info":[{"award-number":["SI 2171\/2 and SI 2171\/3-1"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,26]]},"DOI":"10.1145\/3236024.3236074","type":"proceedings-article","created":{"date-parts":[[2018,10,29]],"date-time":"2018-10-29T12:06:00Z","timestamp":1540814760000},"page":"71-82","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":55,"title":["Learning to sample: exploiting similarities across environments to learn performance models for configurable systems"],"prefix":"10.1145","author":[{"given":"Pooyan","family":"Jamshidi","sequence":"first","affiliation":[{"name":"University of South Carolina, USA"}]},{"given":"Miguel","family":"Velez","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Christian","family":"K\u00e4stner","sequence":"additional","affiliation":[{"name":"Carnegie Mellon University, USA"}]},{"given":"Norbert","family":"Siegmund","sequence":"additional","affiliation":[{"name":"Bauhaus-University Weimar, Germany"}]}],"member":"320","published-online":{"date-parts":[[2018,10,26]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Apache Storm. 2018. http:\/\/storm.apache.org\/.  Apache Storm. 2018. http:\/\/storm.apache.org\/."},{"key":"e_1_3_2_1_2_1","first-page":"9","volume-title":"Proc. of Working Conference on Software Visualization (VISSOFT)","author":"Alcocer J. P. S.","unstructured":"J. P. S. Alcocer , A. Bergel , S. Ducasse , and M. Denker . Performance evolution blueprint: Understanding the impact of software evolution on performance . In Proc. of Working Conference on Software Visualization (VISSOFT) , pages 1\u2013 9 . IEEE, 2013. J. P. S. Alcocer, A. Bergel, S. Ducasse, and M. Denker. Performance evolution blueprint: Understanding the impact of software evolution on performance. In Proc. of Working Conference on Software Visualization (VISSOFT), pages 1\u20139. IEEE, 2013."},{"key":"e_1_3_2_1_3_1","volume-title":"Deliverable 5.2: DICE delivery tools-Intermediate version","author":"Arta\u010d M.","year":"2017","unstructured":"M. Arta\u010d , editor. Deliverable 5.2: DICE delivery tools-Intermediate version . 2017 . http:\/\/www.dice-h2020.eu\/. M. Arta\u010d, editor. Deliverable 5.2: DICE delivery tools-Intermediate version. 2017. http:\/\/www.dice-h2020.eu\/."},{"key":"e_1_3_2_1_4_1","first-page":"779","volume-title":"AAAI","author":"Biedenkapp A.","year":"2017","unstructured":"A. Biedenkapp , M. T. Lindauer , K. Eggensperger , F. Hutter , C. Fawcett , and H. H. Hoos . Efficient parameter importance analysis via ablation with surrogates . In AAAI , pages 773\u2013 779 , 2017 . A. Biedenkapp, M. T. Lindauer, K. Eggensperger, F. Hutter, C. Fawcett, and H. H. Hoos. Efficient parameter importance analysis via ablation with surrogates. In AAAI, pages 773\u2013779, 2017."},{"key":"e_1_3_2_1_5_1","volume-title":"Pattern recognition and machine learning","author":"Bishop C. M.","year":"2006","unstructured":"C. M. Bishop . Pattern recognition and machine learning . Springer , New York , 2006 . C. M. Bishop. Pattern recognition and machine learning. Springer, New York, 2006."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2967938.2967963"},{"key":"e_1_3_2_1_7_1","volume-title":"RG DevOps Performance","author":"Brunnert A.","year":"2015","unstructured":"A. Brunnert , A. van Hoorn , F. Willnecker , A. Danciu , W. Hasselbring , C. Heger , N. Herbst , P. Jamshidi , R. Jung , J. von Kistowski , A. Koziolek , J. Kross , S. Spinner , C. V\u00f6gele , J. Walter , and A. Wert . Performance-oriented devops: A research agenda. SPEC-RG-2015-01 , RG DevOps Performance , 2015 . A. Brunnert, A. van Hoorn, F. Willnecker, A. Danciu, W. Hasselbring, C. Heger, N. Herbst, P. Jamshidi, R. Jung, J. von Kistowski, A. Koziolek, J. Kross, S. Spinner, C. V\u00f6gele, J. Walter, and A. Wert. Performance-oriented devops: A research agenda. SPEC-RG-2015-01, RG DevOps Performance, 2015."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TKDE.2010.121"},{"key":"e_1_3_2_1_9_1","volume-title":"July","author":"Chen Y.","year":"2015","unstructured":"Y. Chen , E. Keogh , B. Hu , N. Begum , A. Bagnall , A. Mueen , and G. Batista . The ucr time series classification archive , July 2015 . Y. Chen, E. Keogh, B. Hu, N. Begum, A. Bagnall, A. Mueen, and G. Batista. The ucr time series classification archive, July 2015."},{"key":"e_1_3_2_1_10_1","unstructured":"www.cs.ucr.edu\/~eamonn\/time_ series_data\/.  www.cs.ucr.edu\/~eamonn\/time_ series_data\/."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786826"},{"key":"e_1_3_2_1_12_1","volume-title":"Elements of information theory","author":"Cover T. M.","year":"2012","unstructured":"T. M. Cover and J. A. Thomas . Elements of information theory . John Wiley & amp; Sons, 2012 . T. M. Cover and J. A. Thomas. Elements of information theory. John Wiley &amp; Sons, 2012."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882296"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.37"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786833"},{"key":"e_1_3_2_1_16_1","first-page":"168","volume-title":"Proc. Int\u2019l Conf. Software Engineering (ICSE)","author":"Foo K. C.","unstructured":"K. C. Foo , Z. M. J. Jiang , B. Adams , A. E. Hassan , Y. Zou , and P. Flora . An industrial case study on the automated detection of performance regressions in heterogeneous environments . In Proc. Int\u2019l Conf. Software Engineering (ICSE) , pages 159\u2013 168 . IEEE Press, 2015. K. C. Foo, Z. M. J. Jiang, B. Adams, A. E. Hassan, Y. Zou, and P. Flora. An industrial case study on the automated detection of performance regressions in heterogeneous environments. In Proc. Int\u2019l Conf. Software Engineering (ICSE), pages 159\u2013168. IEEE Press, 2015."},{"key":"e_1_3_2_1_17_1","volume-title":"The elements of statistical learning","author":"Friedman J.","year":"2001","unstructured":"J. Friedman , T. Hastie , and R. Tibshirani . The elements of statistical learning , volume 1 . Springer series in statistics New York, 2001 . J. Friedman, T. Hastie, and R. Tibshirani. The elements of statistical learning, volume 1. Springer series in statistics New York, 2001."},{"key":"e_1_3_2_1_18_1","first-page":"1232","volume-title":"Greedy function approximation: a gradient boosting machine. Annals of statistics","author":"Friedman J. H.","year":"2001","unstructured":"J. H. Friedman . Greedy function approximation: a gradient boosting machine. Annals of statistics , pages 1189\u2013 1232 , 2001 . J. H. Friedman. Greedy function approximation: a gradient boosting machine. Annals of statistics, pages 1189\u20131232, 2001."},{"key":"e_1_3_2_1_19_1","volume-title":"Springer","author":"Grebhahn A.","year":"2016","unstructured":"A. Grebhahn , N. Siegmund , H. K\u00f6stler , and S. Apel . Performance prediction of multigrid-solver configurations. In Software for Exascale Computing-SPPEXA 2013-2015, pages 69\u201388 . Springer , 2016 . A. Grebhahn, N. Siegmund, H. K\u00f6stler, and S. Apel. Performance prediction of multigrid-solver configurations. In Software for Exascale Computing-SPPEXA 2013-2015, pages 69\u201388. Springer, 2016."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693089"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9781139226424","volume-title":"Performance modeling and design of computer systems: queueing theory in action","author":"Harchol-Balter M.","year":"2013","unstructured":"M. Harchol-Balter . Performance modeling and design of computer systems: queueing theory in action . Cambridge University Press , 2013 . M. Harchol-Balter. Performance modeling and design of computer systems: queueing theory in action. Cambridge University Press, 2013."},{"key":"e_1_3_2_1_22_1","first-page":"528","volume-title":"Proc. Int\u2019l Conf. Software Engineering (ICSE)","author":"Henard C.","unstructured":"C. Henard , M. Papadakis , M. Harman , and Y. Le Traon . Combining multi-objective search and constraint solving for configuring large software product lines . In Proc. Int\u2019l Conf. Software Engineering (ICSE) , pages 517\u2013 528 . IEEE, 2015. C. Henard, M. Papadakis, M. Harman, and Y. Le Traon. Combining multi-objective search and constraint solving for configuring large software product lines. In Proc. Int\u2019l Conf. Software Engineering (ICSE), pages 517\u2013528. IEEE, 2015."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.2307\/2529336"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950390"},{"key":"e_1_3_2_1_25_1","volume-title":"Springer","author":"Hoos H. H.","year":"2011","unstructured":"H. H. Hoos . Automated algorithm configuration and parameter tuning. In Autonomous search, pages 37\u201371 . Springer , 2011 . H. H. Hoos. Automated algorithm configuration and parameter tuning. In Autonomous search, pages 37\u201371. Springer, 2011."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2076450.2076469"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1152154.1152174"},{"key":"e_1_3_2_1_28_1","volume-title":"International journal of forecasting, 22(4):679\u2013688","author":"Hyndman R. J.","year":"2006","unstructured":"R. J. Hyndman and A. B. Koehler . Another look at measures of forecast accuracy . International journal of forecasting, 22(4):679\u2013688 , 2006 . R. J. Hyndman and A. B. Koehler. Another look at measures of forecast accuracy. International journal of forecasting, 22(4):679\u2013688, 2006."},{"key":"e_1_3_2_1_29_1","first-page":"48","volume-title":"Proc. Int\u2019l Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS)","author":"Jamshidi P.","unstructured":"P. Jamshidi and G. Casale . An uncertainty-aware approach to optimal configuration of stream processing systems . In Proc. Int\u2019l Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS) , pages 39\u2013 48 . IEEE, September 2016. P. Jamshidi and G. Casale. An uncertainty-aware approach to optimal configuration of stream processing systems. In Proc. Int\u2019l Symp. on Modeling, Analysis and Simulation of Computer and Telecommunication Systems (MASCOTS), pages 39\u201348. IEEE, September 2016."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2013.39"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155625"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAMS.2017.11"},{"key":"e_1_3_2_1_33_1","volume-title":"Proceedings of the IJCAI Workshop on Autonomous Mobile Service Robots (WSR), 7","author":"Kawthekar P.","year":"2016","unstructured":"P. Kawthekar and C. K\u00e4stner . Sensitivity analysis for building evolving and &amp; adaptive robotic software . In Proceedings of the IJCAI Workshop on Autonomous Mobile Service Robots (WSR), 7 2016 . P. Kawthekar and C. K\u00e4stner. Sensitivity analysis for building evolving and &amp; adaptive robotic software. In Proceedings of the IJCAI Workshop on Autonomous Mobile Service Robots (WSR), 7 2016."},{"key":"e_1_3_2_1_34_1","volume-title":"Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980","author":"Kingma D.","year":"2014","unstructured":"D. Kingma and J. Ba . Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980 , 2014 . D. Kingma and J. Ba. Adam: A method for stochastic optimization. arXiv preprint arXiv:1412.6980, 2014."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-014-9300-5"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970339"},{"key":"e_1_3_2_1_37_1","volume-title":"Introduction to combinatorial testing","author":"Kuhn D. R.","year":"2013","unstructured":"D. R. Kuhn , R. N. Kacker , and Y. Lei . Introduction to combinatorial testing . CRC press , 2013 . D. R. Kuhn, R. N. Kacker, and Y. Lei. Introduction to combinatorial testing. CRC press, 2013."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2885497"},{"key":"e_1_3_2_1_39_1","volume-title":"Design and analysis of experiments","author":"Montgomery D. C.","year":"2017","unstructured":"D. C. Montgomery . Design and analysis of experiments . John Wiley & amp; Sons, 2017 . D. C. Montgomery. Design and analysis of experiments. John Wiley &amp; Sons, 2017."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491627.2491647"},{"key":"e_1_3_2_1_41_1","volume-title":"Faster discovery of faster system configurations with spectral learning. arXiv preprint arXiv:1701.08106","author":"Nair V.","year":"2017","unstructured":"V. Nair , T. Menzies , N. Siegmund , and S. Apel . Faster discovery of faster system configurations with spectral learning. arXiv preprint arXiv:1701.08106 , 2017 . V. Nair, T. Menzies, N. Siegmund, and S. Apel. Faster discovery of faster system configurations with spectral learning. arXiv preprint arXiv:1701.08106, 2017."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-017-0225-2"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106238"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786814"},{"key":"e_1_3_2_1_45_1","first-page":"391","volume-title":"Proc. Int\u2019l Conf. Software Engineering (ICSE)","author":"Nam J.","unstructured":"J. Nam , S. J. Pan , and S. Kim . Transfer defect learning . In Proc. Int\u2019l Conf. Software Engineering (ICSE) , pages 382\u2013 391 . IEEE, 2013. J. Nam, S. J. Pan, and S. Kim. Transfer defect learning. In Proc. Int\u2019l Conf. Software Engineering (ICSE), pages 382\u2013391. IEEE, 2013."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106273"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2648511.2648521"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1254882.1254899"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3104028"},{"key":"e_1_3_2_1_50_1","volume-title":"Gaussian processes for machine learning","author":"Rasmussen C. E.","year":"2006","unstructured":"C. E. Rasmussen and C. K. Williams . Gaussian processes for machine learning , volume 1 . MIT press Cambridge , 2006 . C. E. Rasmussen and C. K. Williams. Gaussian processes for machine learning, volume 1. MIT press Cambridge, 2006."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.2307\/1269417"},{"key":"e_1_3_2_1_52_1","volume-title":"NIPS 2005 Workshop on Transfer Learning","volume":"898","author":"Rosenstein M. T.","year":"2005","unstructured":"M. T. Rosenstein , Z. Marx , L. P. Kaelbling , and T. G. Dietterich . To transfer or not to transfer . In NIPS 2005 Workshop on Transfer Learning , volume 898 , 2005 . M. T. Rosenstein, Z. Marx, L. P. Kaelbling, and T. G. Dietterich. To transfer or not to transfer. In NIPS 2005 Workshop on Transfer Learning, volume 898, 2005."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.18653\/v1\/D17-1038"},{"key":"e_1_3_2_1_54_1","unstructured":"SaC compiler. www.sac-home.org.  SaC compiler. www.sac-home.org."},{"key":"e_1_3_2_1_55_1","first-page":"352","volume-title":"Proc. Int\u2019l Conf. Automated Software Engineering (ASE)","author":"Sarkar A.","unstructured":"A. Sarkar , J. Guo , N. Siegmund , S. Apel , and K. Czarnecki . Cost-efficient sampling for performance prediction of configurable systems . In Proc. Int\u2019l Conf. Automated Software Engineering (ASE) , pages 342\u2013 352 . IEEE, November 2015. A. Sarkar, J. Guo, N. Siegmund, S. Apel, and K. Czarnecki. Cost-efficient sampling for performance prediction of configurable systems. In Proc. Int\u2019l Conf. Automated Software Engineering (ASE), pages 342\u2013352. IEEE, November 2015."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/JPROC.2015.2494218"},{"key":"e_1_3_2_1_57_1","first-page":"19","volume-title":"Proc. Int\u2019l Conf. Software Engineering (ICSE)","volume":"1","author":"Siegmund J.","unstructured":"J. Siegmund , N. Siegmund , and S. Apel . Views on internal and external validity in empirical software engineering . In Proc. Int\u2019l Conf. Software Engineering (ICSE) , volume 1 , pages 9\u2013 19 . IEEE, 2015. J. Siegmund, N. Siegmund, and S. Apel. Views on internal and external validity in empirical software engineering. In Proc. Int\u2019l Conf. Software Engineering (ICSE), volume 1, pages 9\u201319. IEEE, 2015."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786845"},{"key":"e_1_3_2_1_59_1","first-page":"177","volume-title":"Proc. Int\u2019l Conf. Software Engineering (ICSE)","author":"Siegmund N.","unstructured":"N. Siegmund , S. S. Kolesnikov , C. K\u00e4stner , S. Apel , D. Batory , M. Rosenm\u00fcller , and G. Saake . Predicting performance via automated feature-interaction detection . In Proc. Int\u2019l Conf. Software Engineering (ICSE) , pages 167\u2013 177 . IEEE, 2012. N. Siegmund, S. S. Kolesnikov, C. K\u00e4stner, S. Apel, D. Batory, M. Rosenm\u00fcller, and G. Saake. Predicting performance via automated feature-interaction detection. In Proc. Int\u2019l Conf. Software Engineering (ICSE), pages 167\u2013177. IEEE, 2012."},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106251"},{"key":"e_1_3_2_1_61_1","unstructured":"ESEC\/FSE \u201918 November 4\u20139 2018 Lake Buena Vista FL USA Pooyan Jamshidi Miguel Velez Christian K\u00e4stner and Norbert Siegmund  ESEC\/FSE \u201918 November 4\u20139 2018 Lake Buena Vista FL USA Pooyan Jamshidi Miguel Velez Christian K\u00e4stner and Norbert Siegmund"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2010.10"},{"key":"e_1_3_2_1_63_1","first-page":"219","volume-title":"Learning and Intelligent Optimization","author":"Styles J.","unstructured":"J. Styles , H. H. Hoos , and M. M\u00fcller . Automatically configuring algorithms for scaling performance . In Learning and Intelligent Optimization , pages 205\u2013 219 . Springer, 2012. J. Styles, H. H. Hoos, and M. M\u00fcller. Automatically configuring algorithms for scaling performance. In Learning and Intelligent Optimization, pages 205\u2013219. Springer, 2012."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1811099.1811041"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3030207.3030216"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/3035918.3064029"},{"key":"e_1_3_2_1_67_1","first-page":"1313","volume-title":"International Conference on Machine Learning","author":"Wang X.","year":"2014","unstructured":"X. Wang , T.-K. Huang , and J. Schneider . Active transfer learning under model shift . In International Conference on Machine Learning , pages 1305\u2013 1313 , 2014 . X. Wang, T.-K. Huang, and J. Schneider. Active transfer learning under model shift. In International Conference on Machine Learning, pages 1305\u20131313, 2014."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.32"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2739480.2754648"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/988672.988711"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786852"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/781027.781052"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/MASCOTS.2013.9"},{"key":"e_1_3_2_1_74_1","first-page":"373","volume-title":"Proc. Int\u2019l Conf. Automated Software Engineering (ASE)","author":"Zhang Y.","unstructured":"Y. Zhang , J. Guo , E. Blais , and K. Czarnecki . Performance prediction of configurable software systems by Fourier learning . In Proc. Int\u2019l Conf. Automated Software Engineering (ASE) , pages 365\u2013 373 . IEEE, 2015. Y. Zhang, J. Guo, E. Blais, and K. Czarnecki. Performance prediction of configurable software systems by Fourier learning. In Proc. Int\u2019l Conf. Automated Software Engineering (ASE), pages 365\u2013373. IEEE, 2015."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1145\/1272998.1273020"}],"event":{"name":"ESEC\/FSE '18: 26th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"Lake Buena Vista FL USA","acronym":"ESEC\/FSE '18","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236024.3236074","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3236024.3236074","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3236024.3236074","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:26Z","timestamp":1750208246000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3236024.3236074"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,26]]},"references-count":75,"alternative-id":["10.1145\/3236024.3236074","10.1145\/3236024"],"URL":"https:\/\/doi.org\/10.1145\/3236024.3236074","relation":{},"subject":[],"published":{"date-parts":[[2018,10,26]]},"assertion":[{"value":"2018-10-26","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}