{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:13:58Z","timestamp":1759032838020,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100012659","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872373,61872375"],"award-info":[{"award-number":["61872373,61872375"]}],"id":[{"id":"10.13039\/501100012659","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National Key R&D Program of China","award":["2017YFB1001802"],"award-info":[{"award-number":["2017YFB1001802"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416531","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:38:56Z","timestamp":1611790736000},"page":"623-634","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":14,"title":["CP-detector"],"prefix":"10.1145","author":[{"given":"Haochen","family":"He","sequence":"first","affiliation":[{"name":"National University of Defense Technology, China"}]},{"given":"Zhouyang","family":"Jia","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]},{"given":"Shanshan","family":"Li","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]},{"given":"Erci","family":"Xu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]},{"given":"Tingting","family":"Yu","sequence":"additional","affiliation":[{"name":"University of Kentucky"}]},{"given":"Yue","family":"Yu","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]},{"given":"Ji","family":"Wang","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]},{"given":"Xiangke","family":"Liao","sequence":"additional","affiliation":[{"name":"National University of Defense Technology, China"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Categories and subcategories in computer science. https:\/\/en.wikipedia.org\/wiki\/Category:Computing."},{"key":"e_1_3_2_1_2_1","unstructured":"Fit CDF for normal distribution. https:\/\/en.wikipedia.org\/wiki\/Cumulative_distribution_function."},{"key":"e_1_3_2_1_3_1","unstructured":"spaCy. https:\/\/spacy.io."},{"key":"e_1_3_2_1_4_1","unstructured":"Statistical hypothesis testing. https:\/\/en.wikipedia.org\/wiki\/Statistical\\_hypothesis_testing."},{"key":"e_1_3_2_1_5_1","unstructured":"IEEE standard glossary of software engineering terminology. IEEE Std 610.12 (1990)."},{"key":"e_1_3_2_1_6_1","volume-title":"https:\/\/perf.wiki.kernel.org\/index.php\/Main_Page","author":"Linux","year":"2015","unstructured":"Linux perf tool. https:\/\/perf.wiki.kernel.org\/index.php\/Main_Page, 2015."},{"key":"e_1_3_2_1_7_1","unstructured":"httpd 33605 Acc.: 2020. https:\/\/bz.apache.org\/bugzilla\/show_bug.cgi?id=33605."},{"key":"e_1_3_2_1_8_1","unstructured":"httpd 42065 Acc.: 2020. https:\/\/bz.apache.org\/bugzilla\/show_bug.cgi?id=42065."},{"key":"e_1_3_2_1_9_1","unstructured":"httpd 50002 Acc.: 2020. https:\/\/bz.apache.org\/bugzilla\/show_bug.cgi?id=50002."},{"key":"e_1_3_2_1_10_1","unstructured":"httpd 58037 Acc.: 2020. https:\/\/bz.apache.org\/bugzilla\/show_bug.cgi?id=58037."},{"key":"e_1_3_2_1_11_1","unstructured":"GCC 17520 Accessed: 2020. https:\/\/gcc.gnu.org\/bugzilla\/show_bug.cgi?id=17520."},{"key":"e_1_3_2_1_12_1","unstructured":"GCC 94957 Accessed: 2020. https:\/\/gcc.gnu.org\/bugzilla\/show_bug.cgi?id=94957."},{"key":"e_1_3_2_1_13_1","unstructured":"MariaDB 5802 Accessed: 2020. https:\/\/jira.mariadb.org\/browse\/MDEV-5802."},{"key":"e_1_3_2_1_14_1","unstructured":"MongoDB 27700 Accessed: 2020. https:\/\/jira.mongodb.org\/browse\/server-27700."},{"key":"e_1_3_2_1_15_1","unstructured":"MongoDB 27753 Accessed: 2020. https:\/\/jira.mongodb.org\/browse\/server-27753."},{"key":"e_1_3_2_1_16_1","unstructured":"MongoDB 30643 Accessed: 2020. https:\/\/jira.mongodb.org\/browse\/server-30643."},{"key":"e_1_3_2_1_17_1","unstructured":"MySQL 21727 Accessed: 2020. https:\/\/bugs.mysql.com\/bug.php?id=21727."},{"key":"e_1_3_2_1_18_1","unstructured":"MySQL 67432 Accessed: 2020. https:\/\/bugs.mysql.com\/bug.php?id=67432."},{"key":"e_1_3_2_1_19_1","unstructured":"MySQL 74325 Accessed: 2020. https:\/\/bugs.mysql.com\/bug.php?id=74325."},{"key":"e_1_3_2_1_20_1","unstructured":"MySQL 77094 Accessed: 2020. https:\/\/bugs.mysql.com\/bug.php?id=77094."},{"key":"e_1_3_2_1_21_1","volume-title":"International Conference on Software Engineering (ICSE)","author":"Atlee J.M.","year":"2019","unstructured":"Atlee, J.M., Bultan, T., and Whittle, J. View-centric performance optimization for database-backed web applications. In International Conference on Software Engineering (ICSE) (2019)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950314"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1093\/acref\/9780199688975.001.0001"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884794"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950303"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180229"},{"key":"e_1_3_2_1_27_1","volume-title":"Workshop on Hot Topics in Operating Systems (HotOS)","author":"Coady Y.","year":"2005","unstructured":"Coady, Y., Cox, R., DeTreville, J., Druschel, P., Hellerstein, J., Hume, A., Keeton, K., Nguyen, T., Small, C., Stein, L., and Warfield, A. Falling off the cliff: When systems go nonlinear. In Workshop on Hot Topics in Operating Systems (HotOS) (2005)."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254076"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950360"},{"key":"e_1_3_2_1_30_1","volume-title":"International Conference on Software Engineering (ICSE)","author":"Ding Z.","year":"2020","unstructured":"Ding, Z., Chen, J., and Shang, W. Towards the use of the readily available tests from the release pipeline as performance tests. are we there yet? In International Conference on Software Engineering (ICSE) (2020)."},{"key":"e_1_3_2_1_31_1","unstructured":"GmbH Y. The industry leader in .NET & Java profiling. https:\/\/www.yourkit.com."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.06.100"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2961111.2962602"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238204"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115661"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254075"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/MET.2019.00017"},{"key":"e_1_3_2_1_38_1","volume-title":"International Conference on Performance Engineering (ICPE)","author":"Juliana A. P.","year":"2020","unstructured":"Juliana, A. P., Mathieu, A., Hugo, M., and Jean-Marc, J. Sampling effect on performance prediction of configurable systems: A case study. In International Conference on Performance Engineering (ICPE) (2020)."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00112"},{"key":"e_1_3_2_1_40_1","volume-title":"ACM Knowledge Discovery and Data Mining (SIGKDD)","author":"Leshl N.","year":"1999","unstructured":"Leshl, N., Zaki, M. J., and Ogihara3, M. Mining features for sequence classification. In ACM Knowledge Discovery and Data Mining (SIGKDD) (1999)."},{"key":"e_1_3_2_1_41_1","volume-title":"Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA)","author":"Liu T.","year":"2011","unstructured":"Liu, T., and Berger., E. D. Sheriff: Precise detection and automatic mitigation of false sharing. In Conference on Object-Oriented Programming Systems, Languages, and Applications (OOPSLA) (2011)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.1999.802089"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106238"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491416"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.100"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606602"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106273"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737966"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610393"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660193.2660233"},{"key":"e_1_3_2_1_51_1","volume-title":"International Conference on Performance Engineering (ICPE)","author":"Ravjot S.","year":"2016","unstructured":"Ravjot, S., Cor-Paul, B., Weiyi, S., and E., H. A. Optimizing the performance-related configurations of object-relational mapping frameworks using a multi-objective genetic algorithm. In International Conference on Performance Engineering (ICPE) (2016)."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.45"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2018.01.013"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2017.16"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771816"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786845"},{"key":"e_1_3_2_1_57_1","volume-title":"A systematic analysis of performance measures for classification tasks. Information Processing & Management","author":"Sokolovaa M.","year":"2009","unstructured":"Sokolovaa, M., and Lapalmeb, G. A systematic analysis of performance measures for classification tasks. Information Processing & Management (2009)."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660193.2660234"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.41"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.64"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00103"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814290"},{"key":"e_1_3_2_1_63_1","volume-title":"USENIX Annual Technical Conference (ATC)","author":"Xiang C.","year":"2020","unstructured":"Xiang, C., Huang, H., Yoo, A., Zhou, Y., and Pasupathy, S. Pracextractor: Extracting configuration good practices from manuals to detect server misconfigurations. In USENIX Annual Technical Conference (ATC) (2020)."},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2517349.2522727"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180194"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931070"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254074"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.72"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Virtual Event Australia","acronym":"ASE '20"},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416531","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416531","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:37Z","timestamp":1750197697000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416531"}},"subtitle":["using configuration-related performance properties to expose performance bugs"],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":68,"alternative-id":["10.1145\/3324884.3416531","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416531","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}