{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:08:00Z","timestamp":1759032480431,"version":"3.40.4"},"reference-count":53,"publisher":"Elsevier BV","issue":"8","license":[{"start":{"date-parts":[[2013,8,1]],"date-time":"2013-08-01T00:00:00Z","timestamp":1375315200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"},{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"vor","delay-in-days":1461,"URL":"https:\/\/www.elsevier.com\/open-access\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Science of Computer Programming"],"published-print":{"date-parts":[[2013,8]]},"DOI":"10.1016\/j.scico.2012.11.002","type":"journal-article","created":{"date-parts":[[2012,12,3]],"date-time":"2012-12-03T23:11:38Z","timestamp":1354576298000},"page":"1099-1118","source":"Crossref","is-referenced-by-count":14,"title":["Stratified sampling of execution traces: Execution phases serving as strata"],"prefix":"10.1016","volume":"78","author":[{"given":"Heidar","family":"Pirzadeh","sequence":"first","affiliation":[]},{"given":"Sara","family":"Shanian","sequence":"additional","affiliation":[]},{"given":"Abdelwahab","family":"Hamou-Lhadj","sequence":"additional","affiliation":[]},{"given":"Luay","family":"Alawneh","sequence":"additional","affiliation":[]},{"given":"Arya","family":"Shafiee","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"10","key":"10.1016\/j.scico.2012.11.002_br000005","doi-asserted-by":"crossref","first-page":"970","DOI":"10.1109\/TSE.2002.1041053","article-title":"Recovering traceability links between code and documentation","volume":"28","author":"Antoniol","year":"2002","journal-title":"Software Engineering, IEEE Transactions on"},{"key":"10.1016\/j.scico.2012.11.002_br000010","unstructured":"G. Antoniol, Y.-G. Gu\u00e9h\u00e9neuc, Feature identification: a novel approach and a case study, Software Maintenance, 2005. ICSM\u201905. Proceedings of the 21st IEEE International Conference on, Sept. 2005, pp. 357\u2013366, pp. 26\u201329."},{"key":"10.1016\/j.scico.2012.11.002_br000015","first-page":"931","article-title":"Java-ML: a machine learning library","volume":"10","author":"Abeel","year":"2009","journal-title":"Journal of Machine Learning Research"},{"issue":"5","key":"10.1016\/j.scico.2012.11.002_br000020","doi-asserted-by":"crossref","first-page":"72","DOI":"10.1145\/175290.175300","article-title":"Program understanding and the concept assignment problem","volume":"37","author":"Biggerstaff","year":"1994","journal-title":"Communications of the ACM"},{"year":"1960","series-title":"An introduction to mathematical statistics","author":"Brunk","key":"10.1016\/j.scico.2012.11.002_br000025"},{"key":"10.1016\/j.scico.2012.11.002_br000030","doi-asserted-by":"crossref","unstructured":"A. Chan, R. Holmes, G.C. Murphy, A.T.T. Ying, Scaling an object-oriented system execution visualizer through sampling, in: Program Comprehension, 2003. 11th IEEE International Workshop on, 2003, pp. 237\u2013244.","DOI":"10.1109\/WPC.2003.1199207"},{"key":"10.1016\/j.scico.2012.11.002_br000035","doi-asserted-by":"crossref","unstructured":"B. Cornelissen, D. Holten, A. Zaidman, L. Moonen, J.J. van Wijk, A. van Deursen, Understanding Execution Traces Using Massive Sequence and Circular Bundle Views, Program Comprehension, 2007. ICPC \u201907. 15th IEEE International Conference on, 2007, pp. 49\u201358, pp. 26\u201329.","DOI":"10.1109\/ICPC.2007.39"},{"year":"1977","series-title":"Sampling Techniques","author":"Cochran","key":"10.1016\/j.scico.2012.11.002_br000040"},{"year":"1980","series-title":"Practical nonparametric statistics","author":"Conover","key":"10.1016\/j.scico.2012.11.002_br000045"},{"key":"10.1016\/j.scico.2012.11.002_br000050","doi-asserted-by":"crossref","unstructured":"K. Chen, V. Rajlich, Case Study of Feature Location Using Dependence Graph, Program Comprehension, IWPC\u201900. Proceedings of 8th International Workshop on, 2000, pp. 241\u2013249.","DOI":"10.1109\/WPC.2000.852498"},{"key":"10.1016\/j.scico.2012.11.002_br000055","doi-asserted-by":"crossref","unstructured":"P. Dugerdil, Using trace sampling techniques to identify dynamic clusters of classes, in: CASCON\u201907, Proceedings of the IBM Software and Systems Engineering Symposium, 2007, pp. 306\u2013314.","DOI":"10.1145\/1321211.1321254"},{"key":"10.1016\/j.scico.2012.11.002_br000060","doi-asserted-by":"crossref","unstructured":"A.D. Eisenberg, K. De Volder, Dynamic feature traces: finding features in unfamiliar code, in: Software Maintenance, 2005. ICSM\u201905. Proceedings of the 21st IEEE International Conference on, 2005, pp. 337\u2013346, pp. 26\u201329.","DOI":"10.1109\/ICSM.2005.42"},{"issue":"3","key":"10.1016\/j.scico.2012.11.002_br000065","doi-asserted-by":"crossref","first-page":"210","DOI":"10.1109\/TSE.2003.1183929","article-title":"Locating features in source code","volume":"29","author":"Eisenbarth","year":"2003","journal-title":"Software Engineering, IEEE Transactions on"},{"key":"10.1016\/j.scico.2012.11.002_br000070","unstructured":"EXTRAVIS: http:\/\/www.swerl.tudelft.nl\/extravis\/."},{"issue":"6","key":"10.1016\/j.scico.2012.11.002_br000075","doi-asserted-by":"crossref","first-page":"711","DOI":"10.1016\/S0042-6989(00)00277-7","article-title":"Edge co-occurrence in natural images predicts contour grouping performance","volume":"41","author":"Geisler","year":"2001","journal-title":"Vision Research Journal"},{"key":"10.1016\/j.scico.2012.11.002_br000080","doi-asserted-by":"crossref","unstructured":"G.K. Ghosh, C. Michael, M. Schatz, M. Schatz, A real-time intrusion detection system based on learning program behavior, in: Proc. of the third Intl. Workshop on Recent Advances in Intrusion Detection, Toulouse, France, 2000, pp. 93\u2013109.","DOI":"10.1007\/3-540-39945-3_7"},{"key":"10.1016\/j.scico.2012.11.002_br000085","doi-asserted-by":"crossref","unstructured":"A. Hamou-Lhadj, T. Lethbridge, Summarizing the Content of Large Traces to Facilitate the Understanding of the Behaviour of a Software System, Program Comprehension, ICPC 2006. 14th IEEE International Conference on, 2006, pp.181\u2013190.","DOI":"10.1109\/ICPC.2006.45"},{"key":"10.1016\/j.scico.2012.11.002_br000090","unstructured":"A. Hamou-Lhadj, T. Lethbridge, A Survey of Trace Exploration Tools and Techniques, Collaborative research, CASCON\u201904, Proceedings of the 2004 Conference of the Centre for Advance Studies on, 2004, pp. 42\u201354."},{"key":"10.1016\/j.scico.2012.11.002_br000095","unstructured":"Oracle Corporation, Inc. Java Platform, Standard Edition 7.0 API Specification. Available at: http:\/\/docs.oracle.com\/javase\/7\/docs\/api\/, 2011."},{"key":"10.1016\/j.scico.2012.11.002_br000100","series-title":"Proc. of the International Conference on Software Engineering","first-page":"360","article-title":"Visualizing Interactions in Program Executions","author":"Jerding","year":"1997"},{"key":"10.1016\/j.scico.2012.11.002_br000105","unstructured":"JHOTDRAW, http:\/\/www.jhotdraw.org\/."},{"key":"10.1016\/j.scico.2012.11.002_br000110","doi-asserted-by":"crossref","unstructured":"J. Kothari, T. Denton, S. Mancoridis, A. Shokoufandeh, Reducing Program Comprehension Effort in Evolving Software by Recognizing Feature Implementation Convergence, Program Comprehension, 2007. ICPC 2007. The 15th IEEE International Conference on, Banff, Canada, 2007.","DOI":"10.1109\/ICPC.2007.33"},{"key":"10.1016\/j.scico.2012.11.002_br000115","doi-asserted-by":"crossref","unstructured":"A. Kuhn, O. Greevy, Exploiting the Analogy Between Traces and Signal Processing, Software Maintenance, 2006. ICSM \u201906. 22nd IEEE International Conference on, 2006, pp.320\u2013329, pp. 24\u201327.","DOI":"10.1109\/ICSM.2006.29"},{"year":"1935","series-title":"Principles of Gestalt Psychology","author":"Koffka","key":"10.1016\/j.scico.2012.11.002_br000120"},{"key":"10.1016\/j.scico.2012.11.002_br000125","doi-asserted-by":"crossref","unstructured":"B. Liblit, A. Aiken, A.X. Zheng, M.I. Jordan, Bug isolation via remote program sampling, in: Programming Language Design and Implementation, PLDI\u201903, Proceedings of the ACM SIGPLAN 2003 conference on, 2003, pp. 141\u2013154.","DOI":"10.1145\/781131.781148"},{"key":"10.1016\/j.scico.2012.11.002_br000130","unstructured":"j. MacQueen, Some methods for classification and analysis of multivariate observations, Math Statistics and Probability, Proceedings of the 5th Berkeley Symposium on, 1967, pp. 281\u2013296."},{"key":"10.1016\/j.scico.2012.11.002_br000135","doi-asserted-by":"crossref","unstructured":"A. Marcus, J.I. Maletic, Recovering documentation-to-source-code traceability links using latent semantic indexing, in: Software Engineering, ICSE\u201903. Proceedings of 25th International Conference on, 2003, pp. 125\u2013135.","DOI":"10.1109\/ICSE.2003.1201194"},{"year":"2008","series-title":"Introduction to Information Retrieval","author":"Manning","key":"10.1016\/j.scico.2012.11.002_br000140"},{"key":"10.1016\/j.scico.2012.11.002_br000145","doi-asserted-by":"crossref","unstructured":"H. Pirzadeh, A. Agarwal, A. Hamou-Lhadj, An approach for detecting execution phases of a system for the purpose of program comprehension, in: Proceedings of Software Engineering Research, Management and Applications (SERA), 2010 Eighth ACIS International Conference on, 2010, pp. 207\u2013214.","DOI":"10.1109\/SERA.2010.34"},{"key":"10.1016\/j.scico.2012.11.002_br000150","doi-asserted-by":"crossref","unstructured":"H. Pirzadeh, A. Hamou-Lhadj, A novel approach based on gestalt psychology for abstracting the content of large execution traces for program comprehension, in: Proceedings of the 16th IEEE International Conference on Engineering of Complex Computer Systems, 2011, pp. 221\u2013230.","DOI":"10.1109\/ICECCS.2011.29"},{"key":"10.1016\/j.scico.2012.11.002_br000155","doi-asserted-by":"crossref","unstructured":"H. Pirzadeh, A. Hamou-Lhadj, A software behaviour analysis framework based on the human perception systems, in: Proceedings of the 33rd International Conference on Software Engineering, ICSE 2011, New Ideas and Emerging Results Track, 2011, pp. 948\u2013951.","DOI":"10.1145\/1985793.1985955"},{"key":"10.1016\/j.scico.2012.11.002_br000160","unstructured":"D. Pelleg, A. Moore, X-means: extending K-means with efficient estimation of the number of clusters, in: Machine Learning, ICML\u201900, in: Proceedings of 17th International Conference on, 2000, pp. 727\u2013734."},{"key":"10.1016\/j.scico.2012.11.002_br000165","doi-asserted-by":"crossref","unstructured":"H. Pirzadeh, S. Shanian, A. Hamou-Lhadj, A. Mehrabian, The concept of stratified sampling of execution traces, in: Proceedings of the 19th International Conference on Program Comprehension, ICPC 2011, Kingston, Ontario, Canada, June 2011.","DOI":"10.1109\/ICPC.2011.17"},{"issue":"6","key":"10.1016\/j.scico.2012.11.002_br000170","doi-asserted-by":"crossref","first-page":"589","DOI":"10.1097\/OPX.0b013e3181a5238a","article-title":"Perceptual organization in infancy: bottom-up and top-down influences","volume":"86","author":"Quinn","year":"2009","journal-title":"Optometry and Vision Science"},{"key":"10.1016\/j.scico.2012.11.002_br000175","doi-asserted-by":"crossref","unstructured":"S.P. Reiss, Dynamic detection and visualization of software phases, in: Dynamic Analysis, WODA\u201905, Proceedings of the 3rd International Workshop on, 2005, pp. 1\u20136.","DOI":"10.1145\/1083246.1083254"},{"issue":"2","key":"10.1016\/j.scico.2012.11.002_br000180","doi-asserted-by":"crossref","DOI":"10.1016\/j.jvlc.2007.01.003","article-title":"Visual representations of executing programs","volume":"18","author":"Reiss","year":"2007","journal-title":"Journal of Visual Languages and Computing"},{"key":"10.1016\/j.scico.2012.11.002_br000185","doi-asserted-by":"crossref","unstructured":"A. Rohatgi, A. Hamou-Lhadj, J. Rilling, An approach for mapping features to code based on static and dynamic analysis, in: Program Comprehension, 2008. ICPC 2008, The 16th IEEE International Conference on, 2008, pp. 236\u2013241.","DOI":"10.1109\/ICPC.2008.35"},{"year":"2003","series-title":"The BLOOM Software Visualization System, in: Software Visualization\u2013From Theory to Practice","author":"Reiss","key":"10.1016\/j.scico.2012.11.002_br000190"},{"key":"10.1016\/j.scico.2012.11.002_br000195","unstructured":"J. Roberts, C. Zilles, TraceVis: an execution trace visualization tool, Modeling, Benchmarking and Simulation, MoBS\u201905, Proceedings of Workshop on, 2005, pp. 5\u201315."},{"issue":"2","key":"10.1016\/j.scico.2012.11.002_br000200","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1214\/aos\/1176344136","article-title":"\u00cbstimating the dimension of a model","volume":"6","author":"Schwarz","year":"1978","journal-title":"The Annals of Statistics"},{"issue":"4","key":"10.1016\/j.scico.2012.11.002_br000205","doi-asserted-by":"crossref","first-page":"361","DOI":"10.2190\/KVVE-B0EL-B0CJ-92KM","article-title":"Gestalt theory: a foundation for instructional screen design","volume":"27","author":"Smith-Gratto","year":"1999","journal-title":"Journal of Instructional Technology Systems"},{"key":"10.1016\/j.scico.2012.11.002_br000210","unstructured":"SPSS, Inc., 2009, Chicago, IL, www.spss.com."},{"key":"10.1016\/j.scico.2012.11.002_br000215","series-title":"Proceedings of the 7th Working Conference on Reverse Engineering","first-page":"214","article-title":"Understanding the behaviour of Java programs","author":"Syst\u00e4","year":"2000"},{"key":"10.1016\/j.scico.2012.11.002_br000220","doi-asserted-by":"crossref","unstructured":"V. Tzerpos, R.C. Holt, Software botryology: automatic clustering of software systems, in: DEXA Workshop, pp 811\u2013818, 1998.","DOI":"10.1109\/DEXA.1998.707499"},{"key":"10.1016\/j.scico.2012.11.002_br000225","unstructured":"Eclipse TPTP, Eclipse Test & Performance Tools Platform Project, http:\/\/www.eclipse.org\/tptp\/."},{"key":"10.1016\/j.scico.2012.11.002_br000230","unstructured":"S Vassilvitskii, K-Means: algorithms, analyses, experiments, Ph.D. Dissertation, Stanford University, Stanford, CA, USA. Advisor(s) Rajeev Motwani, 2007."},{"key":"10.1016\/j.scico.2012.11.002_br000235","doi-asserted-by":"crossref","unstructured":"W. Wang, X.H. Guan, X.L. Zhang, Modeling program behaviors by hidden Markov models for intrusion detection, in: Proc. of Intl. Conf. on Machine Learning and Cybernetics, Shanghai, China, pp. 2830-2835, 2004.","DOI":"10.1109\/ICMLC.2004.1378514"},{"key":"10.1016\/j.scico.2012.11.002_br000240","unstructured":"WEKA, URL: www.cs.waikato.ac.nz\/ml\/weka\/."},{"issue":"2","key":"10.1016\/j.scico.2012.11.002_br000245","first-page":"87","article-title":"Quantifying the closeness between program components and features","volume":"54","author":"Wong","year":"2000","journal-title":"Journal of Systems and Software - Special issue on software maintenance"},{"key":"10.1016\/j.scico.2012.11.002_br000250","doi-asserted-by":"crossref","unstructured":"Y. Watanabe, T. Ishio, K. Inoue, Feature-level phase detection for execution trace using object cache, in: Dynamic Analysis, WODA\u201908, Proceedings of the International Workshop on, pp. 8\u201314, 2008.","DOI":"10.1145\/1401827.1401830"},{"issue":"1","key":"10.1016\/j.scico.2012.11.002_br000255","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1002\/smr.4360070105","article-title":"Software reconnaissance: mapping program features to code","volume":"7","author":"Wilde","year":"1995","journal-title":"Journal of Software Maintenance: Research and Practice"},{"key":"10.1016\/j.scico.2012.11.002_br000260","doi-asserted-by":"crossref","unstructured":"Zaidman Andy, Scalability solutions for program comprehension through dynamic analysis, Ph.D. Dissertation, Universiteit Antwerpen, 2006.","DOI":"10.1109\/CSMR.2006.46"},{"key":"10.1016\/j.scico.2012.11.002_br000265","article-title":"Exploring marketing research","volume":"vol. 5","author":"Zikmund","year":"2000"}],"container-title":["Science of Computer Programming"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167642312002080?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0167642312002080?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2025,4,23]],"date-time":"2025-04-23T04:41:18Z","timestamp":1745383278000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0167642312002080"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8]]},"references-count":53,"journal-issue":{"issue":"8","published-print":{"date-parts":[[2013,8]]}},"alternative-id":["S0167642312002080"],"URL":"https:\/\/doi.org\/10.1016\/j.scico.2012.11.002","relation":{},"ISSN":["0167-6423"],"issn-type":[{"type":"print","value":"0167-6423"}],"subject":[],"published":{"date-parts":[[2013,8]]}}}