{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:06:20Z","timestamp":1759032380517,"version":"3.44.0"},"reference-count":109,"publisher":"Elsevier BV","issue":"9","license":[{"start":{"date-parts":[[2013,9,1]],"date-time":"2013-09-01T00:00:00Z","timestamp":1377993600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2013,9,1]],"date-time":"2013-09-01T00:00:00Z","timestamp":1377993600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/legal\/tdmrep-license"},{"start":{"date-parts":[[2013,7,16]],"date-time":"2013-07-16T00:00:00Z","timestamp":1373932800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"funder":[{"DOI":"10.13039\/501100000266","name":"Engineering and Physical Sciences Research Council","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100000266","id-type":"DOI","asserted-by":"crossref"}]},{"name":"Scottish Informatics and Computer Science Alliance (SICSA)"}],"content-domain":{"domain":["elsevier.com","sciencedirect.com"],"crossmark-restriction":true},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[2013,9]]},"DOI":"10.1016\/j.jss.2012.10.027","type":"journal-article","created":{"date-parts":[[2012,11,23]],"date-time":"2012-11-23T17:33:48Z","timestamp":1353692028000},"page":"2225-2241","update-policy":"https:\/\/doi.org\/10.1016\/elsevier_cm_policy","source":"Crossref","is-referenced-by-count":38,"title":["Cloud engineering is Search Based Software Engineering too"],"prefix":"10.1016","volume":"86","author":[{"given":"Mark","family":"Harman","sequence":"first","affiliation":[]},{"given":"Kiran","family":"Lakhotia","sequence":"additional","affiliation":[]},{"given":"Jeremy","family":"Singer","sequence":"additional","affiliation":[]},{"given":"David R.","family":"White","sequence":"additional","affiliation":[]},{"given":"Shin","family":"Yoo","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/j.jss.2012.10.027_bib0005","first-page":"3","article-title":"Data management in the cloud: limitations and opportunities","volume":"32","author":"Abadi","year":"2009","journal-title":"Bulletin of the IEEE Computer Society Technical Committee on Data Engineering"},{"key":"10.1016\/j.jss.2012.10.027_bib0010","doi-asserted-by":"crossref","first-page":"11984","DOI":"10.1016\/j.eswa.2011.03.041","article-title":"On the application of genetic programming for software engineering predictive modeling: a systematic review","volume":"38","author":"Afzal","year":"2011","journal-title":"Expert Systems Applications"},{"key":"10.1016\/j.jss.2012.10.027_bib0015","doi-asserted-by":"crossref","first-page":"957","DOI":"10.1016\/j.infsof.2008.12.005","article-title":"A systematic review of search-based testing for non-functional system properties","volume":"51","author":"Afzal","year":"2009","journal-title":"Information and Software Technology"},{"key":"10.1016\/j.jss.2012.10.027_bib0020","series-title":"Second International Symposium on Search Based Software Engineering (SSBSE 2010)","article-title":"Search-based prediction of fault-slip-through in large software projects","author":"Afzal","year":"2010"},{"key":"10.1016\/j.jss.2012.10.027_bib0025","doi-asserted-by":"crossref","first-page":"742","DOI":"10.1109\/TSE.2009.52","article-title":"A systematic review of the application and empirical investigation of search-based test-case generation","volume":"36","author":"Ali","year":"2010","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.jss.2012.10.027_bib0030","series-title":"26th IEEE\/ACM International Conference on Automated Software Engineering (ASE 2011)","article-title":"Automated web application testing using search based software engineering","author":"Alshahwan","year":"2011"},{"key":"10.1016\/j.jss.2012.10.027_bib0035","unstructured":"Amazon, 2012. Amazon EC2 Spot Instances. http:\/\/aws.amazon.com\/ec2\/spot-instances\/ (accessed on 12.06.12)."},{"key":"10.1016\/j.jss.2012.10.027_bib0040","series-title":"Proceedings of the IEEE Congress on Evolutionary Computation (CEC '08)","article-title":"A novel co-evolutionary approach to automatic software bug fixing","author":"Arcuri","year":"2008"},{"key":"10.1016\/j.jss.2012.10.027_bib0045","doi-asserted-by":"crossref","first-page":"50","DOI":"10.1145\/1721654.1721672","article-title":"A view of cloud computing","volume":"53","author":"Armbrust","year":"2010","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.jss.2012.10.027_bib0050","unstructured":"Armbrust, M., Fox, A., Griffith, R., Joseph, A.D., Katz, R.H., Konwinski, A., Lee, G., Patterson, D.A., Rabkin, A., Zaharia, M., 2009. Above the clouds: a Berkeley view of cloud computing. Technical Report UCB\/EECS-2009-28. EECS Department, University of California, Berkeley."},{"key":"10.1016\/j.jss.2012.10.027_bib0055","doi-asserted-by":"crossref","first-page":"164","DOI":"10.1145\/1165389.945462","article-title":"Xen and the art of virtualization","volume":"37","author":"Barham","year":"2003","journal-title":"SIGOPS Operating Systems Review"},{"key":"10.1016\/j.jss.2012.10.027_bib0060","first-page":"1","article-title":"The datacenter as a computer: An introduction to the design of warehouse-scale machines","volume":"4.1","author":"Barroso","year":"2009","journal-title":"Synthesis Lectures on Computer Architecture"},{"key":"10.1016\/j.jss.2012.10.027_bib0065","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1016\/0004-3702(76)90011-4","article-title":"A partial evaluator, and its use as a programming tool","volume":"7","author":"Beckman","year":"1976","journal-title":"Artificial Intelligence"},{"key":"10.1016\/j.jss.2012.10.027_bib0070","series-title":"IEEE\/ACM International Conference on Cluster Cloud and Grid Computing","article-title":"Energy efficient allocation of virtual machines in cloud data centers","author":"Beloglazov","year":"2010"},{"key":"10.1016\/j.jss.2012.10.027_bib0075","series-title":"IEEE 3rd International Conference on Cloud Computing Technology and Science (CloudCom 2011)","article-title":"Deconstructing Amazon EC2 spot instance pricing","author":"Ben-Yehuda","year":"2011"},{"year":"1988","series-title":"Partial Evaluation and Mixed Computation: Proceedings of the IFIP TC2 Workshop, Gammel Avernaes, Denmark, 18\u201324 Oct., 1987","key":"10.1016\/j.jss.2012.10.027_bib0080"},{"key":"10.1016\/j.jss.2012.10.027_bib0085","series-title":"33rd International Conference on Software Engineering (ICSE\u201911)","article-title":"Symbolic execution for software testing in practice: preliminary assessment","author":"Cadar","year":"2011"},{"key":"10.1016\/j.jss.2012.10.027_bib0090","doi-asserted-by":"crossref","first-page":"23","DOI":"10.1002\/spe.995","article-title":"CloudSim: a toolkit for modeling and simulation of cloud computing environments and evaluation of resource provisioning algorithms","volume":"41","author":"Calheiros","year":"2011","journal-title":"Software-Practice & Experience"},{"key":"10.1016\/j.jss.2012.10.027_bib0095","doi-asserted-by":"crossref","first-page":"493","DOI":"10.1007\/s10009-008-0088-8","article-title":"Healing web applications through automatic workarounds","volume":"10","author":"Carzaniga","year":"2008","journal-title":"International Journal on Software Tools for Technology Transfer"},{"issue":"1\u20134","key":"10.1016\/j.jss.2012.10.027_bib0100","first-page":"26","article-title":"Bigtable: a distributed storage system for structured data","volume":"4","author":"Chang","year":"2008","journal-title":"ACM Transactions on Computer Systems"},{"key":"10.1016\/j.jss.2012.10.027_bib0105","series-title":"Future of Software Engineering 2007","article-title":"From state of the art to the future of requirements engineering","author":"Cheng","year":"2007"},{"key":"10.1016\/j.jss.2012.10.027_bib0110","article-title":"Remotely hosted services and \u2018Cloud Computing\u2019","author":"Cliff","year":"2010","journal-title":"British Educational Communications and Technology Agency (BECTA)"},{"key":"10.1016\/j.jss.2012.10.027_bib0115","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1177\/003754978304100502","article-title":"A simulation model of stock exchange trading","volume":"41","author":"Cohen","year":"1983","journal-title":"Simulation"},{"key":"10.1016\/j.jss.2012.10.027_bib0120","series-title":"Proceedings of the ACM Sigplan 1999 Workshop on Languages, Compilers and Tools for Embedded Systems (LCTES\u201899)","article-title":"Optimizing for reduced code space using genetic algorithms","author":"Cooper","year":"1999"},{"key":"10.1016\/j.jss.2012.10.027_bib0125","series-title":"Proceedings of the IEEE Aerospace Conference","article-title":"Optimizing spacecraft design \u2013 optimization engine development: progress and plans","author":"Cornford","year":"2003"},{"year":"2007","series-title":"Nasdaq Market Simulation: Insights on a Major Market from the Science of Complex Adaptive Systems","author":"Darley","key":"10.1016\/j.jss.2012.10.027_bib0130"},{"key":"10.1016\/j.jss.2012.10.027_bib0135","doi-asserted-by":"crossref","first-page":"271","DOI":"10.1145\/359104.359106","article-title":"Social processes and proofs of theorems and programs","volume":"22","author":"De Millo","year":"1979","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.jss.2012.10.027_bib0140","series-title":"Proceedings of Twenty-first ACM SIGOPS Symposium on Operating Systems Principles","article-title":"Dynamo: Amazon's highly available key-value store","author":"DeCandia","year":"2007"},{"key":"10.1016\/j.jss.2012.10.027_bib0145","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1145\/1005888.1005890","article-title":"On a political pamphlet from the middle ages (a response to the paper \u2018Social Processes and Proofs of Theorems and Programs\u2019 by DeMillo, Lipton, and Perlis)","volume":"3","author":"Dijkstra","year":"1978","journal-title":"ACM SIGSOFT, Software Engineering Notes"},{"key":"10.1016\/j.jss.2012.10.027_bib0150","series-title":"Proceedings of the 1st International Symposium on Search Based Software Engineering (SSBSE '09)","article-title":"A study of the multi-objective next release problem","author":"Durillo","year":"2009"},{"key":"10.1016\/j.jss.2012.10.027_bib0155","doi-asserted-by":"crossref","first-page":"704","DOI":"10.1109\/TSE.2009.58","article-title":"Stressing search with scenarios for flexible solutions to real-time task allocation problems","volume":"36","author":"Emberson","year":"2010","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.jss.2012.10.027_bib0160","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1145\/1273440.1250665","article-title":"Power provisioning for a warehouse-sized computer","volume":"35","author":"Fan","year":"2007","journal-title":"SIGARCH Computer Architecture News"},{"key":"10.1016\/j.jss.2012.10.027_bib0165","series-title":"12th International Working Conference on Reverse Engineering (WCRE 05)","article-title":"Search-based amorphous slicing","author":"Fatiregun","year":"2005"},{"key":"10.1016\/j.jss.2012.10.027_bib0170","series-title":"Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation","first-page":"947","article-title":"A genetic programming approach to automated software repair","author":"Forrest","year":"2009"},{"key":"10.1016\/j.jss.2012.10.027_bib0175","series-title":"8th European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC\/FSE '11)","article-title":"EvoSuite: automatic test suite generation for object-oriented software","author":"Fraser","year":"2011"},{"key":"10.1016\/j.jss.2012.10.027_bib0180","series-title":"3rd International Symposium on Search based Software Engineering (SSBSE 2011)","article-title":"Ten years of search based software engineering: a bibliometric analysis","author":"Freitas","year":"2011"},{"key":"10.1016\/j.jss.2012.10.027_bib0185","unstructured":"Google, Inc., 2012. Traces of Google Workloads. http:\/\/code.google.com\/p\/googleclusterdata\/ (accessed on 12.06.12)."},{"key":"10.1016\/j.jss.2012.10.027_bib0190","series-title":"Proceedings of the USENIX Annual Technical Conference","first-page":"247","article-title":"CDE: using system call interposition to automatically create portable software packages","author":"Guo","year":"2011"},{"key":"10.1016\/j.jss.2012.10.027_bib0195","series-title":"2nd International Workshop on Automation of Software Test (AST 07)","article-title":"Automated test data generation using search based software engineering","author":"Harman","year":"2007"},{"key":"10.1016\/j.jss.2012.10.027_bib0200","series-title":"15th International Conference on Program Comprehension (ICPC 07)","article-title":"Search based software engineering for program comprehension","author":"Harman","year":"2007"},{"key":"10.1016\/j.jss.2012.10.027_bib0205","series-title":"Future of Software Engineering 2007","article-title":"The current state and future of search based software engineering","author":"Harman","year":"2007"},{"key":"10.1016\/j.jss.2012.10.027_bib0210","series-title":"1st International Workshop on Search Based Testing (SBT 2008)","article-title":"Open problems in testability transformation","author":"Harman","year":"2008"},{"key":"10.1016\/j.jss.2012.10.027_bib0215","series-title":"6th International Conference on Predictive Models in Software Engineering","article-title":"The relationship between search based software engineering and predictive modeling","author":"Harman","year":"2010"},{"key":"10.1016\/j.jss.2012.10.027_bib0220","series-title":"10th IEEE International Working Conference on Source Code Analysis and Manipulation","article-title":"Why source code analysis and manipulation will always be important","author":"Harman","year":"2010"},{"key":"10.1016\/j.jss.2012.10.027_bib0225","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1002\/swf.41","article-title":"An overview of program slicing","volume":"2","author":"Harman","year":"2001","journal-title":"Software Focus"},{"key":"10.1016\/j.jss.2012.10.027_bib0230","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1016\/S0950-5849(01)00189-6","article-title":"Search based software engineering","volume":"43","author":"Harman","year":"2001","journal-title":"Information and Software Technology"},{"key":"10.1016\/j.jss.2012.10.027_bib0235","doi-asserted-by":"crossref","first-page":"11:1","DOI":"10.1145\/2379776.2379787","article-title":"Search-based software engineering: Trends, techniques and applications","volume":"45","author":"Harman","year":"2012","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/j.jss.2012.10.027_bib0240","doi-asserted-by":"crossref","first-page":"226","DOI":"10.1109\/TSE.2009.71","article-title":"A theoretical and empirical study of search based testing: local, global and hybrid search","volume":"36","author":"Harman","year":"2010","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.jss.2012.10.027_bib0245","series-title":"Empirical Software Engineering and Verification: LASER 2009\u20132010","first-page":"1","article-title":"Search based software engineering: techniques, taxonomy, tutorial","author":"Harman","year":"2012"},{"key":"10.1016\/j.jss.2012.10.027_bib0250","series-title":"Programming Methodology, A Collection of Articles by Members of IFIP WG2.3","article-title":"The engineering of software: a startling contradiction","author":"Hoare","year":"1978"},{"key":"10.1016\/j.jss.2012.10.027_bib0255","series-title":"IEEE International Conference on Software Engineering (ICSE\u201996)","article-title":"How did software get so reliable without proof?","author":"Hoare","year":"1996"},{"key":"10.1016\/j.jss.2012.10.027_bib0260","series-title":"FME '96: Industrial Benefit and Advances in Formal Methods: Third International Symposium of Formal Methods Europe","article-title":"How did software get so reliable without proof?","author":"Hoare","year":"1996"},{"key":"10.1016\/j.jss.2012.10.027_bib0265","series-title":"Proceedings of the 6th Annual IEEE\/ACM International Symposium on Code Generation and Optimization","article-title":"Cole: compiler optimization level exploration","author":"Hoste","year":"2008"},{"key":"10.1016\/j.jss.2012.10.027_bib0270","unstructured":"IDC, 2011. Press Release. http:\/\/www.idc.com\/getdoc.jsp?containerId=prUS23177411 (accessed on 12.06.12)."},{"key":"10.1016\/j.jss.2012.10.027_bib0275","doi-asserted-by":"crossref","first-page":"36","DOI":"10.1145\/1536616.1536632","article-title":"The pathologies of big data","volume":"52","author":"Jacobs","year":"2009","journal-title":"Communications of the ACM"},{"key":"10.1016\/j.jss.2012.10.027_bib0280","series-title":"EuroGP 2006","article-title":"Dynamic scheduling with genetic programming","author":"Jakobovi\u0107","year":"2006"},{"key":"10.1016\/j.jss.2012.10.027_bib0285","series-title":"EuroGP 2007","article-title":"Genetic programming heuristics for multiple machine scheduling","author":"Jakobovic","year":"2007"},{"key":"10.1016\/j.jss.2012.10.027_bib0290","series-title":"3rd Testing Academia and Industry Conference \u2013 Practice and Research Techniques (TAIC PART\u201908)","article-title":"Milu: a customizable, runtime-optimized higher order mutation testing tool for the full C language","author":"Jia","year":"2008"},{"key":"10.1016\/j.jss.2012.10.027_bib0295","doi-asserted-by":"crossref","first-page":"480","DOI":"10.1145\/243439.243447","article-title":"An introduction to partial evaluation","volume":"28","author":"Jones","year":"1996","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/j.jss.2012.10.027_bib0300","series-title":"Electrical & Computer Engineering (CCECE) 2012","article-title":"Performance-aware virtual machine allocation approach in an intercloud environment","author":"Justafort","year":"2012"},{"key":"10.1016\/j.jss.2012.10.027_bib0305","doi-asserted-by":"crossref","first-page":"671","DOI":"10.1126\/science.220.4598.671","article-title":"Optimization by simulated annealing","volume":"220","author":"Kirkpatrick","year":"1983","journal-title":"Science"},{"key":"10.1016\/j.jss.2012.10.027_bib0310","series-title":"Global Telecommunications Conference (GLOBECOM 2010)","article-title":"GreenCloud: a packet-level simulator of energy-aware cloud computing data centers","author":"Kliazovich","year":"2010"},{"year":"1992","series-title":"Genetic Programming: On the Programming of Computers by Means of Natural Selection","author":"Koza","key":"10.1016\/j.jss.2012.10.027_bib0315"},{"key":"10.1016\/j.jss.2012.10.027_bib0320","series-title":"Proceeding of the EuroSys","article-title":"SnowFlock: rapid virtual machine cloning for cloud computing","author":"Lagar-cavilla","year":"2009"},{"key":"10.1016\/j.jss.2012.10.027_bib0325","series-title":"2nd International Symposium on Search Based Software Engineering (SSBSE 2010)","article-title":"AUSTIN: a tool for search based software testing for the c language and its evaluation on deployed automotive systems","author":"Lakhotia","year":"2010"},{"key":"10.1016\/j.jss.2012.10.027_bib0330","series-title":"22nd IFIP International Conference on Testing Software and Systems (ICTSS 2010)","article-title":"FloPSy \u2013 search-based floating point constraint solving for symbolic execution","author":"Lakhotia","year":"2010"},{"key":"10.1016\/j.jss.2012.10.027_bib0335","series-title":"IEEE Congress on Evolutionary Computation","article-title":"Evolving a CUDA kernel from an nVidia template","author":"Langdon","year":"2010"},{"key":"10.1016\/j.jss.2012.10.027_bib0340","series-title":"International Conference on Software Engineering","article-title":"A systematic study of automated program repair: fixing 55 out of 105 bugs for $8 each","author":"Le Goues","year":"2012"},{"key":"10.1016\/j.jss.2012.10.027_bib0345","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/TSE.2011.104","article-title":"GenProg: a generic method for automatic software repair","volume":"38","author":"Le Goues","year":"2012","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.jss.2012.10.027_bib0350","doi-asserted-by":"crossref","first-page":"268","DOI":"10.1007\/s11227-010-0421-3","article-title":"Energy efficient utilization of resources in cloud computing systems","volume":"60","author":"Lee","year":"2012","journal-title":"Journal of Supercomputing"},{"key":"10.1016\/j.jss.2012.10.027_bib0355","doi-asserted-by":"crossref","first-page":"613","DOI":"10.1016\/S1383-7621(01)00019-4","article-title":"Evolving good hierarchical decompositions of complex systems","volume":"47","author":"Lutz","year":"2001","journal-title":"Journal of Systems Architecture"},{"key":"10.1016\/j.jss.2012.10.027_bib0360","series-title":"Proceedings of the 2nd USENIX Conference on Hot Topics in Cloud Computing","article-title":"Turning down the LAMP: software specialisation for the cloud","author":"Madhavapeddy","year":"2010"},{"key":"10.1016\/j.jss.2012.10.027_bib0365","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1002\/stvr.294","article-title":"Search-based software test data generation: a survey. software testing","volume":"14","author":"McMinn","year":"2004","journal-title":"Verification and Reliability"},{"key":"10.1016\/j.jss.2012.10.027_bib0370","article-title":"The NIST definition of cloud computing","volume":"53","author":"Mell","year":"2009","journal-title":"National Institute of Standards and Technology"},{"key":"10.1016\/j.jss.2012.10.027_bib0375","unstructured":"Microsoft, 2012. Autoscaling Rules Schema Description. http:\/\/msdn.microsoft.com\/en-us\/library\/hh680955 (accessed on 12.06.12)."},{"key":"10.1016\/j.jss.2012.10.027_bib0380","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1145\/1773394.1773400","article-title":"Towards characterizing cloud backend workloads: insights from Google compute clusters","volume":"37","author":"Mishra","year":"2010","journal-title":"SIGMETRICS Performance Evaluation Review"},{"key":"10.1016\/j.jss.2012.10.027_bib0385","doi-asserted-by":"crossref","first-page":"193","DOI":"10.1109\/TSE.2006.31","article-title":"On the automatic modularization of software systems using the bunch tool","volume":"32","author":"Mitchell","year":"2006","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/j.jss.2012.10.027_bib0390","first-page":"224","article-title":"Multi-objective evolutionary optimization of agent-based models: an application to emergency response planning","author":"Narzisi","year":"2006","journal-title":"Computational Intelligence"},{"key":"10.1016\/j.jss.2012.10.027_bib0395","unstructured":"Netflix Tech Blog, 2008. 5 Lessons We\u2019ve Learned Using AWS. http:\/\/techblog.netflix.com\/2010\/12\/5-lessons-weve-learned-using-aws.html (accessed on 12.06.12)."},{"key":"10.1016\/j.jss.2012.10.027_bib0400","series-title":"Cluster Computing and the Grid","article-title":"The eucalyptus open-source cloud-computing system","author":"Nurmi","year":"2009"},{"key":"10.1016\/j.jss.2012.10.027_bib0405","unstructured":"Panayi, E., Harman, M., Wetherilt, A. Agent-based modelling of stock markets using existing order book data. In: Proceedings of 13th International Workshop on Multi-Agent-Based Simulation (MABS), in press."},{"key":"10.1016\/j.jss.2012.10.027_bib0410","doi-asserted-by":"crossref","first-page":"389","DOI":"10.1007\/s00778-007-0044-3","article-title":"Service oriented architectures: approaches, technologies and research issues","volume":"16","author":"Papazoglou","year":"2007","journal-title":"The VLDB Journal"},{"key":"10.1016\/j.jss.2012.10.027_bib0415","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1016\/j.cosrev.2010.06.001","article-title":"A survey on search-based software design","volume":"4","author":"R\u00e4ih\u00e4","year":"2010","journal-title":"Computer Science Review"},{"key":"10.1016\/j.jss.2012.10.027_bib0420","doi-asserted-by":"crossref","first-page":"32","DOI":"10.1147\/sj.431.0032","article-title":"The utility business model and the future of computing services","volume":"43","author":"Rappa","year":"2004","journal-title":"IBM Systems Journal"},{"key":"10.1016\/j.jss.2012.10.027_bib0425","unstructured":"Red Hat Enterprise, 2007. Oracle Tuning Guide. http:\/\/docs.redhat.com\/docs\/en-US\/Red_hat_Enterprise_Linux\/5\/html\/Oracle_Tuning_Guide\/RHELTuningandOptimizationforOracleV11.pdf (accessed on 12.06.12)."},{"year":"2009","series-title":"Cloud Application Architectures","author":"Reese","key":"10.1016\/j.jss.2012.10.027_bib0430"},{"key":"10.1016\/j.jss.2012.10.027_bib0435","series-title":"5th Workshop on Agent-based Simulation","article-title":"Multi-objective calibration for agent-based models","author":"Rogers","year":"2004"},{"year":"2000","series-title":"Automatic Re-engineering of Software Using Genetic Programming","author":"Ryan","key":"10.1016\/j.jss.2012.10.027_bib0440"},{"key":"10.1016\/j.jss.2012.10.027_bib0445","doi-asserted-by":"crossref","first-page":"12:1","DOI":"10.1145\/2187671.2187674","article-title":"A vocabulary of program slicing-based techniques","volume":"44","author":"Silva","year":"2012","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/j.jss.2012.10.027_bib0450","doi-asserted-by":"crossref","DOI":"10.1145\/2070781.2024186","article-title":"Genetic programming for shader simplification","volume":"30","author":"Sitthi-Amorn","year":"2011","journal-title":"ACM Transactions on Graphics"},{"key":"10.1016\/j.jss.2012.10.027_bib0455","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/MIC.2009.119","article-title":"Virtual infrastructure management in private and hybrid clouds","volume":"13","author":"Sotomayor","year":"2009","journal-title":"IEEE Internet Computing"},{"key":"10.1016\/j.jss.2012.10.027_bib0460","series-title":"HotPower\u201908","article-title":"Energy aware consolidation for cloud computing","author":"Srikantaiah","year":"2008"},{"key":"10.1016\/j.jss.2012.10.027_bib0465","series-title":"Parallel Distributed Processing Symposium (IPDPS) 2012","article-title":"Virtual machine resource allocation for service hosting on heterogeneous distributed platforms","author":"Stillwell","year":"2012"},{"key":"10.1016\/j.jss.2012.10.027_bib0470","doi-asserted-by":"crossref","first-page":"1137","DOI":"10.1109\/TVCG.2009.171","article-title":"Participatory visualization with wordle","volume":"15","author":"Viegas","year":"2009","journal-title":"IEEE Transactions on Visualization and Computer Graphics"},{"key":"10.1016\/j.jss.2012.10.027_bib0475","series-title":"Proceedings of the 1st ACM symposium on Cloud Computing","article-title":"Characterizing cloud computing hardware reliability","author":"Vishwanath","year":"2010"},{"key":"10.1016\/j.jss.2012.10.027_bib0480","series-title":"Proceedings of the 1st International Conference on Cloud Computing","article-title":"Cost of virtual machine live migration in clouds: a performance evaluation","author":"Voorsluys","year":"2009"},{"key":"10.1016\/j.jss.2012.10.027_bib0485","series-title":"Genetic and Evolutionary Computation Conference (GECCO 2004)","article-title":"Evaluation of different fitness functions for the evolutionary testing of an autonomous parking system","author":"Wegener","year":"2004"},{"key":"10.1016\/j.jss.2012.10.027_bib0490","series-title":"International Conference on Software Engineering (ICSE 2009)","article-title":"Automatically finding patches using genetic programming","author":"Weimer","year":"2009"},{"key":"10.1016\/j.jss.2012.10.027_bib0495","unstructured":"Weiser, M., 1979. Program slices: formal, psychological, and practical investigations of an automatic program abstraction method. Ph.D. Thesis. University of Michigan, Ann Arbor, MI."},{"key":"10.1016\/j.jss.2012.10.027_bib0500","doi-asserted-by":"crossref","first-page":"515","DOI":"10.1109\/TEVC.2010.2083669","article-title":"Evolutionary improvement of programs","volume":"15","author":"White","year":"2011","journal-title":"IEEE Transactions on Evolutionary Computation"},{"key":"10.1016\/j.jss.2012.10.027_bib0505","series-title":"2008 Genetic and Evolutionary Computation Conference (GECCO 2008)","article-title":"Searching for resource-efficient programs: low-power pseudorandom number generators","author":"White","year":"2008"},{"key":"10.1016\/j.jss.2012.10.027_bib0510","doi-asserted-by":"crossref","first-page":"817","DOI":"10.1016\/S0950-5849(01)00188-4","article-title":"An overview of evolutionary algorithms: practical issues and common pitfalls","volume":"43","author":"Whitley","year":"2001","journal-title":"Information and Software Technology"},{"key":"10.1016\/j.jss.2012.10.027_bib0515","doi-asserted-by":"crossref","first-page":"205","DOI":"10.1145\/2007477.1952709","article-title":"Overdriver: handling memory overload in an oversubscribed cloud","volume":"46","author":"Williams","year":"2011","journal-title":"SIGPLAN Notices"},{"key":"10.1016\/j.jss.2012.10.027_bib0520","unstructured":"Wine, 2012. Windows Compatibility Layer for UNIX. http:\/\/www.winehq.org\/ (accessed on 12.06.12)."},{"key":"10.1016\/j.jss.2012.10.027_bib0525","unstructured":"Yoo, S., 2012. NIA3CIN: non-invasive autonomous and amortised adaptivity code injection. Technical Report RN\/12\/13. Department of Computer Science, University College London."},{"key":"10.1016\/j.jss.2012.10.027_bib0530","series-title":"8th European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC\/FSE '11)","article-title":"Faster fault finding at Google using multi-objective regression test optimisation","author":"Yoo","year":"2011"},{"key":"10.1016\/j.jss.2012.10.027_bib0535","series-title":"International Working Conference on Requirements Engineering: Foundation for Software Quality (REFSQ\u201908)","article-title":"Search based requirements optimisation: existing work and challenges","author":"Zhang","year":"2008"},{"key":"10.1016\/j.jss.2012.10.027_bib0540","unstructured":"Zhang, Y., Harman, M., Mansouri, A., 2012. The SBSE Repository: A Repository and Analysis of Authors and Research Articles on Search Based Software Engineering. http:\/\/crestweb.cs.ucl.ac.uk\/resources\/sbse_repository\/."},{"key":"10.1016\/j.jss.2012.10.027_bib0545","series-title":"GECCO '07: Proceedings of the 2007 Genetic and Evolutionary Computation Conference","article-title":"The multi-objective next release problem","author":"Zhang","year":"2007"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121212002853?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0164121212002853?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,9,27]],"date-time":"2025-09-27T23:16:29Z","timestamp":1759014989000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0164121212002853"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9]]},"references-count":109,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2013,9]]}},"alternative-id":["S0164121212002853"],"URL":"https:\/\/doi.org\/10.1016\/j.jss.2012.10.027","relation":{},"ISSN":["0164-1212"],"issn-type":[{"type":"print","value":"0164-1212"}],"subject":[],"published":{"date-parts":[[2013,9]]},"assertion":[{"value":"Elsevier","name":"publisher","label":"This article is maintained by"},{"value":"Cloud engineering is Search Based Software Engineering too","name":"articletitle","label":"Article Title"},{"value":"Journal of Systems and Software","name":"journaltitle","label":"Journal Title"},{"value":"https:\/\/doi.org\/10.1016\/j.jss.2012.10.027","name":"articlelink","label":"CrossRef DOI link to publisher maintained version"},{"value":"article","name":"content_type","label":"Content Type"},{"value":"Copyright \u00a9 2012 Elsevier Inc.","name":"copyright","label":"Copyright"}]}}