{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T20:51:50Z","timestamp":1730321510080,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":53,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,8,12]],"date-time":"2019-08-12T00:00:00Z","timestamp":1565568000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,8,12]]},"DOI":"10.1145\/3338906.3338923","type":"proceedings-article","created":{"date-parts":[[2019,8,9]],"date-time":"2019-08-09T12:21:03Z","timestamp":1565353263000},"page":"818-829","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Pinpointing performance inefficiencies in Java"],"prefix":"10.1145","author":[{"given":"Pengfei","family":"Su","sequence":"first","affiliation":[{"name":"College of William and Mary, USA"}]},{"given":"Qingsen","family":"Wang","sequence":"additional","affiliation":[{"name":"College of William and Mary, USA"}]},{"given":"Milind","family":"Chabbi","sequence":"additional","affiliation":[{"name":"Scalable Machines Research, USA"}]},{"given":"Xu","family":"Liu","sequence":"additional","affiliation":[{"name":"College of William and Mary, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,8,12]]},"reference":[{"volume-title":"Toddler: Detecting Performance Problems via Similar Memory-Access Patterns","year":"2013","author":"Nistor Adrian","key":"e_1_3_2_1_1_1"},{"volume-title":"Antonio Cuni, Benjamin Peterson, Alex Gaynor, Holger Krekel, and Samuele Pedroni.","year":"2018","author":"Rigo Armin","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/125826.125925"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1167473.1167488"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259016.2259033"},{"key":"e_1_3_2_1_6_1","unstructured":"Intel Corp. 2010. Intel Microarchitecture Codename Nehalem Performance Monitoring Unit Programming Guide. https:\/\/software.intel.com\/sites\/default\/files\/ m\/5\/2\/c\/f\/1\/30320-Nehalem-PMU-Programming-Guide-Core.pdf. Intel Corp. 2010. Intel Microarchitecture Codename Nehalem Performance Monitoring Unit Programming Guide. https:\/\/software.intel.com\/sites\/default\/files\/ m\/5\/2\/c\/f\/1\/30320-Nehalem-PMU-Programming-Guide-Core.pdf."},{"key":"e_1_3_2_1_7_1","unstructured":"Intel Corp. 2015. Intel X86 Encoder Decoder Software Library. https:\/\/software. intel.com\/en-us\/articles\/xed-x86-encoder-decoder-software-library. Intel Corp. 2015. Intel X86 Encoder Decoder Software Library. https:\/\/software. intel.com\/en-us\/articles\/xed-x86-encoder-decoder-software-library."},{"key":"e_1_3_2_1_8_1","unstructured":"Oracle Corp. 2017. Oracle Developer Studio Performance Analyzer. https:\/\/www.oracle.com\/technetwork\/server-storage\/solarisstudio\/ documentation\/o11-151-perf-analyzer-brief-1405338.pdf. Oracle Corp. 2017. Oracle Developer Studio Performance Analyzer. https:\/\/www.oracle.com\/technetwork\/server-storage\/solarisstudio\/ documentation\/o11-151-perf-analyzer-brief-1405338.pdf."},{"key":"e_1_3_2_1_9_1","unstructured":"Oracle Corp. 2018. JVMTM Tool Interface. https:\/\/docs.oracle.com\/en\/java\/ javase\/11\/docs\/specs\/jvmti.html. Oracle Corp. 2018. JVMTM Tool Interface. https:\/\/docs.oracle.com\/en\/java\/ javase\/11\/docs\/specs\/jvmti.html."},{"key":"e_1_3_2_1_10_1","unstructured":"Oracle Corporation. 2018. All-in-One Java Troubleshooting Tool. https: \/\/visualvm.github.io. Oracle Corporation. 2018. All-in-One Java Troubleshooting Tool. https: \/\/visualvm.github.io."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814290"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950360"},{"key":"e_1_3_2_1_13_1","unstructured":"Paul J. Drongowski. 2007. Instruction-Based Sampling: A New Performance Analysis Technique for AMD Family 10h Processors. https:\/\/pdfs.semanticscholar. org\/5219\/4b43b8385ce39b2b08ecd409c753e0efafe5.pdf. Paul J. Drongowski. 2007. Instruction-Based Sampling: A New Performance Analysis Technique for AMD Family 10h Processors. https:\/\/pdfs.semanticscholar. org\/5219\/4b43b8385ce39b2b08ecd409c753e0efafe5.pdf."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908090"},{"key":"e_1_3_2_1_15_1","unstructured":"ej-technologies GmbH. 2018. THE AWARD-WINNING ALL-IN-ONE JAVA PROFILER. https:\/\/www.ej-technologies.com\/products\/jprofiler\/overview.html. ej-technologies GmbH. 2018. THE AWARD-WINNING ALL-IN-ONE JAVA PROFILER. https:\/\/www.ej-technologies.com\/products\/jprofiler\/overview.html."},{"volume-title":"The Sable Research Group\u2019s Compiler Compiler. http: \/\/sablecc.org","year":"2018","author":"Gagnon Etienne","key":"e_1_3_2_1_16_1"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297027.1297033"},{"key":"e_1_3_2_1_18_1","unstructured":"David Gilbert. 2017. Welcome To JFree.org. http:\/\/www.jfree.org. November 2017. David Gilbert. 2017. Welcome To JFree.org. http:\/\/www.jfree.org. November 2017."},{"volume-title":"The Industry Leader in .NET &","author":"YourKit","key":"e_1_3_2_1_19_1"},{"key":"e_1_3_2_1_20_1","unstructured":"Google Corp. 2018. Google V8 JavaScript Engine. https:\/\/v8.dev. Google Corp. 2018. Google V8 JavaScript Engine. https:\/\/v8.dev."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2647508.2647509"},{"key":"e_1_3_2_1_22_1","unstructured":"IBM Corp. 2018. Monitoring and Post Mortem. https:\/\/developer.ibm.com\/ javasdk\/tools. IBM Corp. 2018. Monitoring and Post Mortem. https:\/\/developer.ibm.com\/ javasdk\/tools."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/800050.801837"},{"key":"e_1_3_2_1_24_1","unstructured":"John Levon et al. 2017. OProfile. http:\/\/oprofile.sourceforge.net. John Levon et al. 2017. OProfile. http:\/\/oprofile.sourceforge.net."},{"key":"e_1_3_2_1_25_1","unstructured":"Linux. 2012. perf_event_open - Linux man page. https:\/\/linux.die.net\/man\/2\/ perf_event_open. Linux. 2012. perf_event_open - Linux man page. https:\/\/linux.die.net\/man\/2\/ perf_event_open."},{"key":"e_1_3_2_1_26_1","unstructured":"Linux. 2015. Linux Perf Tool. https:\/\/perf.wiki.kernel.org\/index.php\/Main_Page. Linux. 2015. Linux Perf Tool. https:\/\/perf.wiki.kernel.org\/index.php\/Main_Page."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/800050.801833"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950360"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806618"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491416"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486862"},{"key":"e_1_3_2_1_32_1","unstructured":"Nitsan Wakart. 2016. The Pros and Cons of AsyncGetCallTrace Profilers. http: \/\/psy-lob-saw.blogspot.com\/2016\/06\/the-pros-and-cons-of-agct.html. Nitsan Wakart. 2016. The Pros and Cons of AsyncGetCallTrace Profilers. http: \/\/psy-lob-saw.blogspot.com\/2016\/06\/the-pros-and-cons-of-agct.html."},{"volume-title":"JAVA Grande Benchmark Suite. https:\/\/www.epcc.ed.ac.uk\/research\/computing\/performance-characterisation- and-benchmarking\/java-grande-benchmark-suite","year":"2018","author":"The University of Edinburgh. 2018.","key":"e_1_3_2_1_33_1"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737966"},{"key":"e_1_3_2_1_35_1","unstructured":"Andrei Pangin. 2018. Async-profiler. https:\/\/github.com\/jvm-profiling-tools\/ async-profiler. Andrei Pangin. 2018. Async-profiler. https:\/\/github.com\/jvm-profiling-tools\/ async-profiler."},{"volume-title":"Find Bugs in Java Programs. http: \/\/findbugs.sourceforge.net","year":"2015","author":"Pugh Bill","key":"e_1_3_2_1_36_1"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048118"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.41"},{"volume-title":"SPEC JVM2008 Benchmark Suite. https:\/\/www.spec. org\/jvm2008","year":"2015","author":"SPEC Corporation","key":"e_1_3_2_1_39_1"},{"key":"e_1_3_2_1_40_1","first-page":"3","article-title":"IBM POWER7 performance modeling, verification, and evaluation","volume":"55","author":"Srinivas M.","year":"2011","journal-title":"IBM JRD"},{"volume-title":"Pinpointing Performance Inefficiencies in Java. ArXiv e-prints","year":"2019","author":"Su Pengfei","key":"e_1_3_2_1_41_1"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00103"},{"key":"e_1_3_2_1_43_1","unstructured":"The Sable Research Group. 2018. A framework for analyzing and transforming Java and Android applications. https:\/\/sable.github.io\/soot. The Sable Research Group. 2018. A framework for analyzing and transforming Java and Android applications. https:\/\/sable.github.io\/soot."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3147.3165"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/HPCA.2019.00056"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/3037697.3037729"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/3173162.3177159"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509512"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542523"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806617"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806616"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338966.2336805"},{"volume-title":"Dead Store Elimination (Still) Considered Harmful. In 26th USENIX Security Symposium. USENIX Association","year":"2017","author":"Yang Zhaomo","key":"e_1_3_2_1_53_1"}],"event":{"name":"ESEC\/FSE '19: 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Tallinn Estonia","acronym":"ESEC\/FSE '19"},"container-title":["Proceedings of the 2019 27th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3338906.3338923","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,7]],"date-time":"2023-01-07T15:49:25Z","timestamp":1673106565000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3338906.3338923"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,8,12]]},"references-count":53,"alternative-id":["10.1145\/3338906.3338923","10.1145\/3338906"],"URL":"https:\/\/doi.org\/10.1145\/3338906.3338923","relation":{},"subject":[],"published":{"date-parts":[[2019,8,12]]},"assertion":[{"value":"2019-08-12","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}