{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,14]],"date-time":"2026-03-14T22:15:30Z","timestamp":1773526530644,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2021,10,11]],"date-time":"2021-10-11T00:00:00Z","timestamp":1633910400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2021,10,11]]},"DOI":"10.1145\/3475716.3475774","type":"proceedings-article","created":{"date-parts":[[2021,10,6]],"date-time":"2021-10-06T11:43:50Z","timestamp":1633520630000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Evaluating the Impact of Java Virtual Machines on Energy Consumption"],"prefix":"10.1145","author":[{"given":"Zakaria","family":"Ournani","sequence":"first","affiliation":[{"name":"Orange Labs \/ Inria \/ Univ. Lille"}]},{"given":"Mohammed Chakib","family":"Belgaid","sequence":"additional","affiliation":[{"name":"Inria \/ Univ. Lille"}]},{"given":"Romain","family":"Rouvoy","sequence":"additional","affiliation":[{"name":"Univ. Lille \/ Inria \/ IUF"}]},{"given":"Pierre","family":"Rust","sequence":"additional","affiliation":[{"name":"Orange Labs"}]},{"given":"Jo\u00ebl","family":"Penhoat","sequence":"additional","affiliation":[{"name":"Orange Labs"}]}],"member":"320","published-online":{"date-parts":[[2021,10,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Danilo S Alves Lucio M Duarte Davi Silva and Paulo H M Maia. 2020. Experiments on Model-Based Software Energy Consumption Analysis. (2020) 8.  Danilo S Alves Lucio M Duarte Davi Silva and Paulo H M Maia. 2020. Experiments on Model-Based Software Energy Consumption Analysis. (2020) 8."},{"key":"e_1_3_2_1_2_1","volume-title":"Communications in Computer and Information Science","volume":"367","author":"Balouek Daniel","year":"2013"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167515.1167488"},{"key":"e_1_3_2_1_4_1","first-page":"3","article-title":"Search-Based Energy Optimization of Some Ubiquitous Algorithms","volume":"1","author":"Ian Brownlee Alexander Edward","year":"2017","journal-title":"IEEE Transactions on Emerging Topics in Computational Intelligence"},{"key":"e_1_3_2_1_5_1","volume-title":"Towards Selecting Best Combination of SQL-on-Hadoop Systems and JVMs. In 2018 IEEE 11th International Conference on Cloud Computing (CLOUD). 245--252","author":"Chiba T.","year":"2018"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2989081.2989088"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.133"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2398857.2384641"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3177754"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/11682127_22"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3030207.3030211"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568088.2568097"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568297"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICIMU.2011.6122743"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3358960.3379142"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.80"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3136014.3136031"},{"key":"e_1_3_2_1_18_1","volume-title":"2016 IEEE International Conference on Software Maintenance and Evolution (ICSME). IEEE","author":"Pinto Gustavo","year":"2016"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314637"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314637"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884869"},{"key":"e_1_3_2_1_23_1","volume-title":"Benchmarking Crimes: An Emerging Threat in Systems Security. CoRR abs\/1801.02381","author":"van der Kouwe Erik","year":"2018"},{"key":"e_1_3_2_1_24_1","volume-title":"St\u00e9phane Le Masson, and Jean-Marc Menaud","author":"Wang Yewan","year":"2018"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2011.06.005"}],"event":{"name":"ESEM '21: ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement","location":"Bari Italy","acronym":"ESEM '21","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 15th ACM \/ IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3475716.3475774","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3475716.3475774","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:48:17Z","timestamp":1750193297000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3475716.3475774"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021,10,11]]},"references-count":24,"alternative-id":["10.1145\/3475716.3475774","10.1145\/3475716"],"URL":"https:\/\/doi.org\/10.1145\/3475716.3475774","relation":{},"subject":[],"published":{"date-parts":[[2021,10,11]]},"assertion":[{"value":"2021-10-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}