{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T14:57:57Z","timestamp":1772204277950,"version":"3.50.1"},"reference-count":60,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2024,4,17]],"date-time":"2024-04-17T00:00:00Z","timestamp":1713312000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0\/"}],"funder":[{"name":"UMass Dartmouth\u2019s Marine and Undersea Technology (MUST) Research Program"},{"DOI":"10.13039\/100000006","name":"Office of Naval Research","doi-asserted-by":"crossref","award":["N00014-23-1\u20132141"],"award-info":[{"award-number":["N00014-23-1\u20132141"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2024,5,31]]},"abstract":"<jats:p>\n            Software development teams establish elaborate continuous integration pipelines containing automated test cases to accelerate the development process of software. Automated tests help to verify the correctness of code modifications decreasing the response time to changing requirements. However, when the software teams do not track the performance impact of pending modifications, they may need to spend considerable time refactoring existing code. This article presents\n            <jats:monospace>PACE<\/jats:monospace>\n            , a program analysis framework that provides continuous feedback on the performance impact of pending code updates. We design performance microbenchmarks by mapping the execution time of functional test cases given a code update. We map microbenchmarks to code stylometry features and feed them to predictors for performance predictions. Our experiments achieved significant performance in predicting code performance, outperforming current state-of-the-art by 75% on neural-represented code stylometry features.\n          <\/jats:p>","DOI":"10.1145\/3637230","type":"journal-article","created":{"date-parts":[[2023,12,14]],"date-time":"2023-12-14T11:42:14Z","timestamp":1702554134000},"page":"1-23","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["PACE: A Program Analysis Framework for Continuous Performance Prediction"],"prefix":"10.1145","volume":"33","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5904-2764","authenticated-orcid":false,"given":"Chidera","family":"Biringa","sequence":"first","affiliation":[{"name":"University of Massachusetts Dartmouth, North Dartmouth, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6467-1979","authenticated-orcid":false,"given":"G\u00f6khan","family":"Kul","sequence":"additional","affiliation":[{"name":"University of Massachusetts Dartmouth, North Dartmouth, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,4,17]]},"reference":[{"key":"e_1_3_2_2_2","doi-asserted-by":"publisher","DOI":"10.1145\/1344411.1344413"},{"key":"e_1_3_2_3_2","first-page":"101","volume-title":"Proceedings of the ACM SIGSAC Conference on Computer and Communications Security","author":"Abuhamad Mohammed","year":"2018","unstructured":"Mohammed Abuhamad, Tamer AbuHmed, Aziz Mohaisen, and DaeHun Nyang. 2018. Large-scale and language-oblivious code authorship identification. In Proceedings of the ACM SIGSAC Conference on Computer and Communications Security. 101\u2013114. DOI:10.1145\/3243734.3243738"},{"key":"e_1_3_2_4_2","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1145\/350391.350404","volume-title":"Proceedings of the 2nd International Workshop on Software and Performance","author":"Andolfi F.","year":"2000","unstructured":"F. Andolfi, Federica Aquilani, Simonetta Balsamo, and Paola Inverardi. 2000. Deriving performance models of software architectures from message sequence charts. In Proceedings of the 2nd International Workshop on Software and Performance. 47\u201357. DOI:10.1145\/350391.350404"},{"key":"e_1_3_2_5_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-5316(01)00035-9"},{"key":"e_1_3_2_6_2","doi-asserted-by":"publisher","DOI":"10.1109\/TPAMI.2013.50"},{"key":"e_1_3_2_7_2","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1145\/584369.584376","volume-title":"Proceedings of the 3rd International Workshop on Software and Performance","author":"Bernardi Simona","year":"2002","unstructured":"Simona Bernardi, Susanna Donatelli, and Jos\u00e9 Merseguer. 2002. From UML sequence diagrams and statecharts to analysable petri net models. In Proceedings of the 3rd International Workshop on Software and Performance. 35\u201345. DOI:10.1145\/584369.584376"},{"key":"e_1_3_2_8_2","first-page":"53","volume-title":"Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy (HASP\u201922)","author":"Biringa Chidera","year":"2023","unstructured":"Chidera Biringa, Baye Gaspard, and Gokhan Kul. 2023. Short paper: Static and microarchitectural ML-based approaches for detecting spectre vulnerabilities and attacks. In Proceedings of the 11th International Workshop on Hardware and Architectural Support for Security and Privacy (HASP\u201922). ACM, New York, NY, 53\u201357. DOI:10.1145\/3569562.3569589"},{"key":"e_1_3_2_9_2","first-page":"125","volume-title":"Proceedings of the IEEE\/ACM International Conference on Automation of Software Test (AST\u201921)","author":"Biringa Chidera","year":"2021","unstructured":"Chidera Biringa and G\u00f6khan Kul. 2021. Automated user experience testing through multi-dimensional performance impact analysis. In Proceedings of the IEEE\/ACM International Conference on Automation of Software Test (AST\u201921). IEEE, 125\u2013128. DOI:10.1109\/AST52587.2021.00024"},{"key":"e_1_3_2_10_2","first-page":"35","volume-title":"Proceedings of the 31st IEEE\/ACM International Conference on Program Comprehension (ICPC\u201923)","author":"B\u00f6ck Markus","year":"2023","unstructured":"Markus B\u00f6ck, Sarra Habchi, Mathieu Nayrolles, and J\u00fcrgen Cito. 2023. Performance prediction from source code is task and domain specific. In Proceedings of the 31st IEEE\/ACM International Conference on Program Comprehension (ICPC\u201923). IEEE, 35\u201342. DOI:10.1109\/ICPC58990.2023.00015"},{"key":"e_1_3_2_11_2","first-page":"255","volume-title":"Proceedings of the 24th USENIX Security Symposium (USENIX Security\u201915)","author":"Caliskan-Islam Aylin","year":"2015","unstructured":"Aylin Caliskan-Islam, Richard Harang, Andrew Liu, Arvind Narayanan, Clare Voss, Fabian Yamaguchi, and Rachel Greenstadt. 2015. De-anonymizing programmers via code stylometry. In Proceedings of the 24th USENIX Security Symposium (USENIX Security\u201915). 255\u2013270."},{"key":"e_1_3_2_12_2","first-page":"50","volume-title":"Proceedings of the 14th Euromicro Conference on Real-time Systems (Euromicro RTS\u201902)","author":"Colin Antoine","year":"2002","unstructured":"Antoine Colin and Guillem Bernat. 2002. Scope-tree: A program representation for symbolic worst-case execution time analysis. In Proceedings of the 14th Euromicro Conference on Real-time Systems (Euromicro RTS\u201902). IEEE, 50\u201359. DOI:10.1109\/EMRTS.2002.1019185"},{"key":"e_1_3_2_13_2","doi-asserted-by":"crossref","first-page":"58","DOI":"10.1145\/350391.350406","volume-title":"Proceedings of the 2nd International Workshop on Software and Performance","author":"Cortellessa Vittorio","year":"2000","unstructured":"Vittorio Cortellessa and Raffaela Mirandola. 2000. Deriving a queueing network based performance model from UML diagrams. In Proceedings of the 2nd International Workshop on Software and Performance. 58\u201370. DOI:10.1145\/350391.350406"},{"key":"e_1_3_2_14_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2925345"},{"key":"e_1_3_2_15_2","first-page":"668","volume-title":"Proceedings of the 3rd IEEE International Conference on Broadband Network and Multimedia Technology","author":"Cui Baojiang","year":"2010","unstructured":"Baojiang Cui, Jiansong Li, Tao Guo, Jianxin Wang, and Ding Ma. 2010. Code comparison system based on abstract syntax tree. In Proceedings of the 3rd IEEE International Conference on Broadband Network and Multimedia Technology. IEEE, 668\u2013673. DOI:10.1109\/ICBNMT.2010.5705174"},{"key":"e_1_3_2_16_2","doi-asserted-by":"crossref","first-page":"356","DOI":"10.1145\/3183440.3195007","volume-title":"Proceedings of the IEEE\/ACM 40th International Conference on Software Engineering: Companion","author":"Dauber Edwin","year":"2018","unstructured":"Edwin Dauber, Aylin Caliskan, Richard Harang, and Rachel Greenstadt. 2018. Poster: Git blame who?: Stylistic authorship attribution of small, incomplete source code fragments. In Proceedings of the IEEE\/ACM 40th International Conference on Software Engineering: Companion. IEEE, 356\u2013357."},{"key":"e_1_3_2_17_2","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1145\/350391.350411","volume-title":"Proceedings of the 2nd International Workshop on Software and Performance","author":"Miguel Miguel de","year":"2000","unstructured":"Miguel de Miguel, Thomas Lambolais, Mehdi Hannouz, St\u00e9phane Betg\u00e9-Brezetz, and Sophie Piekarec. 2000. UML extensions for the specification and evaluation of latency constraints in architectural models. In Proceedings of the 2nd International Workshop on Software and Performance. 83\u201388. DOI:10.1145\/350391.350411"},{"key":"e_1_3_2_18_2","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1145\/2668930.2688047","volume-title":"Proceedings of the 6th ACM\/SPEC International Conference on Performance Engineering","author":"Didona Diego","year":"2015","unstructured":"Diego Didona, Francesco Quaglia, Paolo Romano, and Ennio Torre. 2015. Enhancing performance prediction robustness by combining analytical modeling and machine learning. In Proceedings of the 6th ACM\/SPEC International Conference on Performance Engineering. 145\u2013156. DOI:10.1145\/2668930.2688047"},{"key":"e_1_3_2_19_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1710.00794"},{"key":"e_1_3_2_20_2","volume-title":"Hands-on Machine Learning with Scikit-Learn, Keras, and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems","author":"G\u00e9ron Aur\u00e9lien","year":"2019","unstructured":"Aur\u00e9lien G\u00e9ron. 2019. Hands-on Machine Learning with Scikit-Learn, Keras, and TensorFlow: Concepts, Tools, and Techniques to Build Intelligent Systems. O\u2019Reilly Media."},{"key":"e_1_3_2_21_2","volume-title":"Data Structures and Algorithms in Java","author":"Goodrich Michael T.","year":"2014","unstructured":"Michael T. Goodrich, Roberto Tamassia, and Michael H. Goldwasser. 2014. Data Structures and Algorithms in Java. John Wiley & Sons."},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9573-6"},{"issue":"13","key":"e_1_3_2_23_2","article-title":"Software test process, testing types and techniques","volume":"111","author":"Hooda Itti","year":"2015","unstructured":"Itti Hooda and Rajender Singh Chhillar. 2015. Software test process, testing types and techniques. Int. J. Comput. Appl. 111, 13 (2015).","journal-title":"Int. J. Comput. Appl."},{"key":"e_1_3_2_24_2","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45156-0_11"},{"key":"e_1_3_2_25_2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2020.2987024"},{"key":"e_1_3_2_26_2","volume-title":"Efficient Regular Expressions That Produce Parse Trees","author":"Karper Aaron","year":"2014","unstructured":"Aaron Karper. 2014. Efficient Regular Expressions That Produce Parse Trees. epubli GmbH."},{"key":"e_1_3_2_27_2","doi-asserted-by":"publisher","DOI":"10.1145\/3391231"},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1080\/08993400412331363843"},{"key":"e_1_3_2_29_2","first-page":"677","volume-title":"Proceedings of the 37th IEEE\/ACM International Conference on Software Engineering (ICSE\u201915)","volume":"1","author":"Lavall\u00e9e Mathieu","year":"2015","unstructured":"Mathieu Lavall\u00e9e and Pierre N. Robillard. 2015. Why good developers write bad code: An observational case study of the impacts of organizational factors on software quality. In Proceedings of the 37th IEEE\/ACM International Conference on Software Engineering (ICSE\u201915), Vol. 1. IEEE, 677\u2013687. DOI:10.1109\/ICSE.2015.83"},{"key":"e_1_3_2_30_2","doi-asserted-by":"crossref","first-page":"487","DOI":"10.1109\/CLUSTR.2003.1253355","volume-title":"Proceedings of the IEEE International Conference on Cluster Computing","author":"Lee Byoung-Dai","year":"2003","unstructured":"Byoung-Dai Lee et\u00a0al. 2003. Run-time prediction of parallel applications on shared environments. In Proceedings of the IEEE International Conference on Cluster Computing. IEEE, 487\u2013491. DOI:10.1109\/CLUSTR.2003.1253355"},{"key":"e_1_3_2_31_2","first-page":"318","volume-title":"Proceedings of the IEEE International Conference on Software Quality, Reliability, and Security (QRS\u201917)","author":"Li Jian","year":"2017","unstructured":"Jian Li, Pinjia He, Jieming Zhu, and Michael R. Lyu. 2017. Software defect prediction via convolutional neural network. In Proceedings of the IEEE International Conference on Software Quality, Reliability, and Security (QRS\u201917). IEEE, 318\u2013328. DOI:10.1109\/QRS.2017.42"},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/1121949.1121951"},{"key":"e_1_3_2_33_2","doi-asserted-by":"crossref","first-page":"25","DOI":"10.1145\/584369.584375","volume-title":"Proceedings of the 3rd International Workshop on Software and Performance","author":"Lindemann Christoph","year":"2002","unstructured":"Christoph Lindemann, Axel Th\u00fcmmler, Alexander Klemm, Marco Lohmann, and Oliver P. Waldhorst. 2002. Performance analysis of time-enhanced UML diagrams based on stochastic processes. In Proceedings of the 3rd International Workshop on Software and Performance. 25\u201334. DOI:10.1145\/584369.584375"},{"key":"e_1_3_2_34_2","doi-asserted-by":"publisher","DOI":"10.1080\/09540091.2020.1762542"},{"key":"e_1_3_2_35_2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.114"},{"key":"e_1_3_2_36_2","first-page":"66","volume-title":"Proceedings of the 6th International Conference on Neural Information Processing (ICONIP\u201999, ANZIIS\u201999, ANNES\u201999, ACNN\u201999)","volume":"1","author":"MacDonell Stephen G.","year":"1999","unstructured":"Stephen G. MacDonell, Andrew R. Gray, Grant MacLennan, and Philip J. Sallis. 1999. Software forensics for discriminating between program authors using case-based reasoning, feedforward neural networks and multiple discriminant analysis. In Proceedings of the 6th International Conference on Neural Information Processing (ICONIP\u201999, ANZIIS\u201999, ANNES\u201999, ACNN\u201999), Vol. 1. IEEE, 66\u201371. DOI:10.1109\/ICONIP.1999.843963"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.881718"},{"key":"e_1_3_2_38_2","first-page":"103","volume-title":"Proceedings of the IEEE International Conference on Cluster Computing (CLUSTER\u201917)","author":"Meng Kewen","year":"2017","unstructured":"Kewen Meng and Boyana Norris. 2017. Mira: A framework for static performance analysis. In Proceedings of the IEEE International Conference on Cluster Computing (CLUSTER\u201917). IEEE, 103\u2013113. DOI:10.1109\/CLUSTER.2017.43"},{"key":"e_1_3_2_39_2","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2014.58"},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.1301.3781"},{"key":"e_1_3_2_41_2","first-page":"4602","volume-title":"Proceedings of the AAAI Conference on Artificial Intelligence","volume":"33","author":"Morris Christopher","year":"2019","unstructured":"Christopher Morris, Martin Ritzert, Matthias Fey, William L. Hamilton, Jan Eric Lenssen, Gaurav Rattan, and Martin Grohe. 2019. Weisfeiler and Leman go neural: Higher-order graph neural networks. In Proceedings of the AAAI Conference on Artificial Intelligence, Vol. 33. 4602\u20134609. DOI:10.1609\/aaai.v33i01.33014602"},{"key":"e_1_3_2_42_2","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-5256-6"},{"key":"e_1_3_2_43_2","first-page":"1","volume-title":"Proceedings of the International Workshop on Mining Software Repositories","author":"Neamtiu Iulian","year":"2005","unstructured":"Iulian Neamtiu, Jeffrey S. Foster, and Michael Hicks. 2005. Understanding source code evolution using abstract syntax tree matching. In Proceedings of the International Workshop on Mining Software Repositories. 1\u20135. DOI:10.1145\/1082983.1083143"},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","unstructured":"Pengyu Nie Ahmet Celik Matthew Coley Aleksandar Milicevic Jonathan Bell and Milos Gligoric. 2020. Debugging the performance of Maven\u2019s test isolation: Experience report. In Proceedings of the 29th ACM SIGSOFT International Symposium on Software Testing and Analysis(ISSTA\u201920). ACM New York NY 249\u2013259. DOI:10.1145\/3395363.3397381","DOI":"10.1145\/3395363.3397381"},{"key":"e_1_3_2_45_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2004.00958"},{"key":"e_1_3_2_46_2","unstructured":"Bojan Pavic Chris Anstey and Jeremy Wagner. 2019. Why Does Speed Matter? Retrieved from https:\/\/web.dev\/why-speed-matters\/"},{"key":"e_1_3_2_47_2","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1007\/3-540-46029-2_9","volume-title":"Proceedings of the International Conference on Modelling Techniques and Tools for Computer Performance Evaluation","author":"Petriu Dorin C.","year":"2002","unstructured":"Dorin C. Petriu and Murray Woodside. 2002. Software performance models from system scenarios in use case maps. In Proceedings of the International Conference on Modelling Techniques and Tools for Computer Performance Evaluation. Springer, 141\u2013158. DOI:10.1007\/3-540-46029-2_9"},{"key":"e_1_3_2_48_2","first-page":"151","volume-title":"Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS\u201921)","author":"Ramadan Tarek","year":"2021","unstructured":"Tarek Ramadan, Tanzima Z. Islam, Chase Phelps, Nathan Pinnow, and Jayaraman J. Thiagarajan. 2021. Comparative code structure analysis using deep learning for performance prediction. In Proceedings of the IEEE International Symposium on Performance Analysis of Systems and Software (ISPASS\u201921). IEEE, 151\u2013161. DOI:10.1109\/ISPASS51385.2021.00032"},{"key":"e_1_3_2_49_2","first-page":"464","volume-title":"Proceedings of the 23rd International Conference on Product-Focused Software Process Improvement (PROFES\u201922)","author":"Samoaa Hazem Peter","year":"2022","unstructured":"Hazem Peter Samoaa, Antonio Longa, Mazen Mohamad, Morteza Haghir Chehreghani, and Philipp Leitner. 2022. TEP-GNN: Accurate execution time prediction of functional tests using graph neural networks. In Proceedings of the 23rd International Conference on Product-Focused Software Process Improvement (PROFES\u201922). Springer, 464\u2013479. DOI:10.1007\/978-3-031-21388-5_32"},{"key":"e_1_3_2_50_2","doi-asserted-by":"publisher","DOI":"10.48550\/arXiv.2304.13032"},{"key":"e_1_3_2_51_2","doi-asserted-by":"publisher","DOI":"10.1007\/s42979-021-00592-x"},{"key":"e_1_3_2_52_2","first-page":"337","volume-title":"Proceedings of the International Conference on Information Technology (ICIT\u201919)","author":"Sarnot Saloni Alias Puja","year":"2019","unstructured":"Saloni Alias Puja Sarnot, Sanjana Rinke, Rayomand Raimalwalla, Raviraj Joshi, Rahul Khengare, and Purvi Goel. 2019. Snapcode-a snapshot based approach to code stylometry. In Proceedings of the International Conference on Information Technology (ICIT\u201919). IEEE, 337\u2013341. DOI:10.1109\/ICIT48102.2019.00066"},{"key":"e_1_3_2_53_2","first-page":"1","volume-title":"Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering","author":"Sherief Nada","year":"2014","unstructured":"Nada Sherief. 2014. Software evaluation via users\u2019 feedback at runtime. In Proceedings of the 18th International Conference on Evaluation and Assessment in Software Engineering. 1\u20134. DOI:10.1145\/2601248.2613085"},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.2478\/popets-2022-0007"},{"key":"e_1_3_2_55_2","first-page":"1072","volume-title":"Proceedings of the 43rd IEEE\/ACM International Conference on Software Engineering (ICSE\u201921)","author":"Velez Miguel","year":"2021","unstructured":"Miguel Velez, Pooyan Jamshidi, Norbert Siegmund, Sven Apel, and Christian K\u00e4stner. 2021. White-box analysis over machine learning: Modeling performance of configurable systems. In Proceedings of the 43rd IEEE\/ACM International Conference on Software Engineering (ICSE\u201921). IEEE, 1072\u20131084. DOI:10.1109\/ICSE43902.2021.00100"},{"key":"e_1_3_2_56_2","first-page":"261","volume-title":"Proceedings of the IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER\u201920)","author":"Wang Wenhan","year":"2020","unstructured":"Wenhan Wang, Ge Li, Bo Ma, Xin Xia, and Zhi Jin. 2020. Detecting code clones with graph neural network and flow-augmented abstract syntax tree. In Proceedings of the IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER\u201920). IEEE, 261\u2013271. DOI:10.1109\/SANER48275.2020.9054857"},{"key":"e_1_3_2_57_2","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-5316(01)00033-5"},{"key":"e_1_3_2_58_2","first-page":"783","volume-title":"Proceedings of the IEEE\/ACM 41st International Conference on Software Engineering (ICSE\u201919)","author":"Zhang Jian","year":"2019","unstructured":"Jian Zhang, Xu Wang, Hongyu Zhang, Hailong Sun, Kaixuan Wang, and Xudong Liu. 2019. A novel neural source code representation based on abstract syntax tree. In Proceedings of the IEEE\/ACM 41st International Conference on Software Engineering (ICSE\u201919). IEEE, 783\u2013794. DOI:10.1109\/ICSE.2019.00086"},{"key":"e_1_3_2_59_2","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2015.2417526"},{"key":"e_1_3_2_60_2","doi-asserted-by":"publisher","unstructured":"Wayne Xin Zhao Kun Zhou Junyi Li Tianyi Tang Xiaolei Wang Yupeng Hou Yingqian Min Beichen Zhang Junjie Zhang Zican Dong et\u00a0al. 2023. A survey of large language models. Retrieved from https:\/\/arXiv:2303.18223. DOI:10.48550\/arXiv.2303.18223","DOI":"10.48550\/arXiv.2303.18223"},{"key":"e_1_3_2_61_2","first-page":"252","volume-title":"Proceedings of the 26th Asia-Pacific Software Engineering Conference (APSEC\u201919)","author":"Zhou Meiling","year":"2019","unstructured":"Meiling Zhou, Jie Chen, Haiyang Hu, Jiacheng Yu, Zhongjin Li, and Hua Hu. 2019. DeepTLE: Learning code-level features to predict code performance before it runs. In Proceedings of the 26th Asia-Pacific Software Engineering Conference (APSEC\u201919). IEEE, 252\u2013259. DOI:10.1109\/APSEC48747.2019.00042"}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637230","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3637230","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:43:42Z","timestamp":1750290222000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3637230"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,4,17]]},"references-count":60,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2024,5,31]]}},"alternative-id":["10.1145\/3637230"],"URL":"https:\/\/doi.org\/10.1145\/3637230","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"value":"1049-331X","type":"print"},{"value":"1557-7392","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,4,17]]},"assertion":[{"value":"2023-06-06","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-11-22","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2024-04-17","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}