{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,30]],"date-time":"2026-04-30T17:43:55Z","timestamp":1777571035191,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2026,5,4]]},"DOI":"10.1145\/3777884.3797014","type":"proceedings-article","created":{"date-parts":[[2026,4,23]],"date-time":"2026-04-23T12:27:26Z","timestamp":1776947246000},"page":"96-107","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["B-Perf: Black-box Performance Antipattern Detection Using System-level Execution Tracing"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0000-5507-1461","authenticated-orcid":false,"given":"Morteza","family":"Noferesti","sequence":"first","affiliation":[{"name":"Computer Science, Brock University, ST CATHARINES, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-6369-8982","authenticated-orcid":false,"given":"Mahsa","family":"Panahandeh","sequence":"additional","affiliation":[{"name":"School of Electrical Engineering and Computer Science, University of Ottawa, Ottawa, ON, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1435-6297","authenticated-orcid":false,"given":"Naser","family":"Ezzati-Jivan","sequence":"additional","affiliation":[{"name":"Computer Science, Brock University, ST CATHARINES, ON, Canada"}]}],"member":"320","published-online":{"date-parts":[[2026,5,3]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n.d.]. Trace Compass. https:\/\/eclipse.dev\/tracecompass\/. Accessed: 2025-02-01."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2011.24"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/3064176.3064186"},{"key":"e_1_3_2_1_4_1","volume-title":"Architecture and Performance Anti-patterns Correlation in Microservice Architectures. In 2025 IEEE 22nd International Conference on Software Architecture (ICSA). IEEE, 60-71","author":"Avritzer Alberto","year":"2025","unstructured":"Alberto Avritzer, Andrea Janes, Catia Trubiani, Helena Rodrigues, Yuanfang Cai, Daniel Sadoc Menasch\u00e9, and \u00c1lvaro Jos\u00e9 Abreu de Oliveira. 2025. Architecture and Performance Anti-patterns Correlation in Microservice Architectures. In 2025 IEEE 22nd International Conference on Software Architecture (ICSA). IEEE, 60-71."},{"key":"e_1_3_2_1_5_1","first-page":"209","volume-title":"OLS (Ottawa Linux Symposium)","volume":"2006","author":"Desnoyers Mathieu","year":"2006","unstructured":"Mathieu Desnoyers and Michel R Dagenais. 2006. The lttng tracer: A low impact performance and behavior monitor for GNU\/Linux. In OLS (Ottawa Linux Symposium), Vol. 2006. Citeseer, 209-224."},{"key":"e_1_3_2_1_6_1","unstructured":"Clemens Eisserer. 2019. Bugzilla issue: Firefox takes 5min to render poster PDF. https:\/\/bugzilla.mozilla.org\/show_bug.cgi?id=1508765"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3272"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","unstructured":"Naser Ezzati-Jivan Quentin Fournier Michel R. Dagenais and Abdelwahab Hamou-Lhadj. 2020. DepGraph: Localizing Performance Bottlenecks in Multi- Core Applications Using Waiting Dependency Graphs and Software Tracing. In 2020 IEEE 20th International Working Conference on Source Code Analysis and Manipulation (SCAM). 149-159. doi:10.1109\/SCAM51674.2020.00022","DOI":"10.1109\/SCAM51674.2020.00022"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/IC2E52221.2021.00015"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3524610.3527898"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2016.36"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2019.2949286"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-40787-1_13"},{"key":"e_1_3_2_1_14_1","first-page":"353","volume-title":"9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12)","author":"Nagaraj Karthik","year":"2012","unstructured":"Karthik Nagaraj, Charles Killian, and Jennifer Neville. 2012. Structured comparative analysis of systems logs to diagnose performance problems. In 9th USENIX Symposium on Networked Systems Design and Implementation (NSDI 12). 353-366."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2851553.2851563"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321661"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISPASS61541.2024.00013"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/NOMS.2014.6838353"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/350391.350420"},{"key":"e_1_3_2_1_20_1","volume-title":"Computer Measurement Group Conference. 717-725","author":"Smith Connie U","year":"2003","unstructured":"Connie U Smith and Lloyd G Williams. 2003. More new software performance antipatterns: Even more ways to shoot yourself in the foot. In Computer Measurement Group Conference. 717-725."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2880977"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2017.11.016"},{"key":"e_1_3_2_1_23_1","volume-title":"N-Lane Bridge Performance Antipattern Analysis Using System-Level Execution Tracing. In 2022 IEEE 22nd International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, 83-93","author":"VanDonge Riley","year":"2022","unstructured":"Riley VanDonge and Naser Ezzati-Jivan. 2022. N-Lane Bridge Performance Antipattern Analysis Using System-Level Execution Tracing. In 2022 IEEE 22nd International Working Conference on Source Code Analysis and Manipulation (SCAM). IEEE, 83-93."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-020-00273-8"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2465498.2465499"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606601"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2602576.2602579"},{"key":"e_1_3_2_1_28_1","volume-title":"Trustworthy AIbased performance diagnosis systems for cloud applications: A review. Comput. Surveys 57, 5","author":"Xin Ruyue","year":"2025","unstructured":"Ruyue Xin, Jingye Wang, Peng Chen, and Zhiming Zhao. 2025. Trustworthy AIbased performance diagnosis systems for cloud applications: A review. Comput. Surveys 57, 5 (2025), 115:1-115:37."}],"event":{"name":"ICPE '26: 17th ACM\/SPEC International Conference on Performance Engineering","location":"Florence Italy","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","SIGMETRICS ACM Special Interest Group on Measurement and Evaluation","SPEC"]},"container-title":["Proceedings of the 17th ACM\/SPEC International Conference on Performance Engineering"],"original-title":[],"deposited":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T19:12:10Z","timestamp":1777403530000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3777884.3797014"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2026,5,3]]},"references-count":28,"alternative-id":["10.1145\/3777884.3797014","10.1145\/3777884"],"URL":"https:\/\/doi.org\/10.1145\/3777884.3797014","relation":{},"subject":[],"published":{"date-parts":[[2026,5,3]]},"assertion":[{"value":"2026-05-03","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}