{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:29:45Z","timestamp":1760660985704,"version":"build-2065373602"},"publisher-location":"Cham","reference-count":30,"publisher":"Springer Nature Switzerland","isbn-type":[{"value":"9783032008275","type":"print"},{"value":"9783032008282","type":"electronic"}],"license":[{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T00:00:00Z","timestamp":1760659200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2026]]},"DOI":"10.1007\/978-3-032-00828-2_23","type":"book-chapter","created":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T16:23:53Z","timestamp":1760631833000},"page":"424-443","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["EMS-HFL: A Hybrid Based Fault Localization"],"prefix":"10.1007","author":[{"given":"Donghua","family":"Wang","sequence":"first","affiliation":[]},{"given":"Zheng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Hengyuan","family":"Liu","sequence":"additional","affiliation":[]},{"given":"Yong","family":"Liu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,17]]},"reference":[{"key":"23_CR1","volume-title":"Why Programs Fail: A Guide to Systematic Debugging","author":"A Zeller","year":"2005","unstructured":"Zeller, A.: Why Programs Fail: A Guide to Systematic Debugging. Morgan Kaufmann Publishers Inc., San Francisco (2005)"},{"key":"23_CR2","doi-asserted-by":"crossref","unstructured":"Shin, D., Bae, D.-H.: A theoretical framework for understanding mutation-based testing methods. In: 2016 IEEE International Conference on Software Testing, Verification and Validation (ICST), pp. 299\u2013308. IEEE (2016)","DOI":"10.1109\/ICST.2016.22"},{"issue":"8","key":"23_CR3","doi-asserted-by":"publisher","first-page":"707","DOI":"10.1109\/TSE.2016.2521368","volume":"42","author":"WE Wong","year":"2016","unstructured":"Wong, W.E., Gao, R., Li, Y., Abreu, R., Wotawa, F.: A survey on software fault localization. IEEE Trans. Software Eng. 42(8), 707\u2013740 (2016)","journal-title":"IEEE Trans. Software Eng."},{"key":"23_CR4","doi-asserted-by":"crossref","unstructured":"Debroy, V., Wong, W.E.: Insights on fault interference for programs with multiple bugs. In: 20th International Symposium on Software Reliability Engineering, vol. 2009, pp. 165\u2013174. IEEE (2009)","DOI":"10.1109\/ISSRE.2009.14"},{"key":"23_CR5","doi-asserted-by":"publisher","first-page":"18","DOI":"10.1016\/j.infsof.2018.03.008","volume":"100","author":"A Arrieta","year":"2018","unstructured":"Arrieta, A., Segura, S., Markiegi, U., Sagardui, G., Etxeberria, L.: Spectrum-based fault localization in software product lines. Inf. Softw. Technol. 100, 18\u201331 (2018)","journal-title":"Inf. Softw. Technol."},{"issue":"5\u20137","key":"23_CR6","doi-asserted-by":"publisher","first-page":"605","DOI":"10.1002\/stvr.1509","volume":"25","author":"M Papadakis","year":"2015","unstructured":"Papadakis, M., Traon, Y.: Metallaxis-FL: mutation-based fault localization. Softw. Test. Verification Reliab. 25(5\u20137), 605\u2013628 (2015)","journal-title":"Softw. Test. Verification Reliab."},{"key":"23_CR7","unstructured":"Budd, T.A.: Mutation analysis of program test data, Ph.D. dissertation, Yale University, USA (1980)"},{"key":"23_CR8","doi-asserted-by":"crossref","unstructured":"Pearson, S., et al.: Evaluating and improving fault localization. In: 2017 IEEE\/ACM 39th International Conference on Software Engineering (ICSE), pp. 609\u2013620. IEEE (2017)","DOI":"10.1109\/ICSE.2017.62"},{"key":"23_CR9","doi-asserted-by":"publisher","first-page":"172296","DOI":"10.1109\/ACCESS.2020.3025460","volume":"8","author":"Z Cui","year":"2020","unstructured":"Cui, Z., Jia, M., Chen, X., Zheng, L., Liu, X.: Improving software fault localization by combining spectrum and mutation. IEEE Access 8, 172296\u2013172307 (2020)","journal-title":"IEEE Access"},{"key":"23_CR10","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/978-3-030-67084-9_10","volume-title":"Lean and Agile Software Development","author":"A Dutta","year":"2021","unstructured":"Dutta, A., Godboley, S.: MSFL: a model for fault localization using mutation-spectra technique. In: Przyby\u0142ek, A., Miler, J., Poth, A., Riel, A. (eds.) LASD 2021. LNBIP, vol. 408, pp. 156\u2013173. Springer, Cham (2021). https:\/\/doi.org\/10.1007\/978-3-030-67084-9_10"},{"key":"23_CR11","doi-asserted-by":"crossref","unstructured":"Feyzi, F., Parsa, S.: FPA-FL: incorporating static fault-proneness analysis into statistical fault localization. J. Syst. Softw. 136, pp. 39\u201358 (2018). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121217302583","DOI":"10.1016\/j.jss.2017.11.002"},{"key":"23_CR12","doi-asserted-by":"crossref","unstructured":"Besz\u00e9des, \u00c1., Horv\u00e1th, F., Di\u00a0Penta, M., Gyim\u00f3thy, T.: Leveraging contextual information from function call chains to improve fault localization. In: 2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER), pp. 468\u2013479. IEEE (2020)","DOI":"10.1109\/SANER48275.2020.9054820"},{"key":"23_CR13","doi-asserted-by":"crossref","unstructured":"Yan, Y., Jiang, S., Zhang, Y., Zhang, C.: An effective fault localization approach based on pagerank and mutation analysis. J. Syst. Softw. 204, 111799 (2023). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121223001942","DOI":"10.1016\/j.jss.2023.111799"},{"key":"23_CR14","doi-asserted-by":"crossref","unstructured":"Robillard, M.P., Murphy, G.C.: Concern graphs: finding and describing concerns using structural program dependencies. In: Proceedings of the 24th International Conference on Software Engineering, pp. 406\u2013416 (2002)","DOI":"10.1109\/ICSE.2002.1007986"},{"key":"23_CR15","doi-asserted-by":"publisher","first-page":"102","DOI":"10.1016\/j.micpro.2017.02.007","volume":"50","author":"M Kooli","year":"2017","unstructured":"Kooli, M., Kaddachi, F., Natale, G., Bosio, A., Benoit, P., Torres, L.: Computing reliability: on the differences between software testing and software fault injection techniques. Microprocess. Microsyst. 50, 102\u2013112 (2017)","journal-title":"Microprocess. Microsyst."},{"key":"23_CR16","doi-asserted-by":"publisher","first-page":"45","DOI":"10.1016\/j.jss.2013.10.042","volume":"90","author":"V Debroy","year":"2014","unstructured":"Debroy, V., Wong, W.E.: Combining mutation and fault localization for automated program debugging. J. Syst. Softw. 90, 45\u201360 (2014)","journal-title":"J. Syst. Softw."},{"key":"23_CR17","doi-asserted-by":"crossref","unstructured":"Abreu, R., Zoeteweij, P., Van Gemund, A.J.: An evaluation of similarity coefficients for software fault localization. In: 12th Pacific Rim International Symposium on Dependable Computing (PRDC 2006), vol. 2006, pp. 39\u201346. IEEE (2006)","DOI":"10.1109\/PRDC.2006.18"},{"key":"23_CR18","doi-asserted-by":"publisher","unstructured":"Jones, J.A., Harrold, M.J.: Empirical evaluation of the tarantula automatic fault-localization technique. In: Proceedings of the 20th IEEE\/ACM International Conference on Automated Software Engineering, ser. ASE 2005, pp. 273\u2013282. Association for Computing Machinery, New York (2005). https:\/\/doi.org\/10.1145\/1101908.1101949","DOI":"10.1145\/1101908.1101949"},{"issue":"1","key":"23_CR19","doi-asserted-by":"publisher","first-page":"290","DOI":"10.1109\/TR.2013.2285319","volume":"63","author":"WE Wong","year":"2013","unstructured":"Wong, W.E., Debroy, V., Gao, R., Li, Y.: The DStar method for effective software fault localization. IEEE Trans. Reliab. 63(1), 290\u2013308 (2013)","journal-title":"IEEE Trans. Reliab."},{"key":"23_CR20","doi-asserted-by":"crossref","unstructured":"Liu, Y., Li, Z., Zhao, R., Gong, P.: An optimal mutation execution strategy for cost reduction of mutation-based fault localization. Inf. Sci. 422, 572\u2013596 (2018). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0020025516306867","DOI":"10.1016\/j.ins.2017.09.006"},{"key":"23_CR21","doi-asserted-by":"crossref","unstructured":"Abreu, R., Zoeteweij, P., Van\u00a0Gemund, A.J.: An evaluation of similarity coefficients for software fault localization. In: 2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC 2006), pp. 39\u201346 (2006)","DOI":"10.1109\/PRDC.2006.18"},{"key":"23_CR22","doi-asserted-by":"crossref","unstructured":"Le, T.-D.B., Thung, F., Lo, D.: Theory and practice, do they match? a case with spectrum-based fault localization. In: IEEE International Conference on Software Maintenance, vol. 2013, pp. 380\u2013383 (2013)","DOI":"10.1109\/ICSM.2013.52"},{"key":"23_CR23","doi-asserted-by":"crossref","unstructured":"Wong, W.E., Qi, Y., Zhao, L., Cai, K.Y.: Effective fault localization using code coverage. In: 31st Annual International Computer Software and Applications Conference (COMPSAC 2007), vol.\u00a01, pp. 449\u2013456 (2007)","DOI":"10.1109\/COMPSAC.2007.109"},{"key":"23_CR24","doi-asserted-by":"publisher","DOI":"10.1016\/j.cola.2021.101064","volume":"66","author":"A Dutta","year":"2021","unstructured":"Dutta, A., Srivastava, S.S., Godboley, S., Mohapatra, D.P.: Combi-FL: neural network and SBFL based fault localization using mutation analysis. J. Comput. Lang. 66, 101064 (2021)","journal-title":"J. Comput. Lang."},{"key":"23_CR25","doi-asserted-by":"crossref","unstructured":"Ju, X., Jiang, S., Chen, X., Wang, X., Zhang, Y., Cao, H.: Hsfal: effective fault localization using hybrid spectrum of full slices and execution slices. J. Syst. Softw. 90, 3\u201317 (2014). https:\/\/www.sciencedirect.com\/science\/article\/pii\/S0164121213002823","DOI":"10.1016\/j.jss.2013.11.1109"},{"key":"23_CR26","doi-asserted-by":"crossref","unstructured":"Keller, F., Grunske, L., Heiden, S., Filieri, A., van Hoorn, A., Lo, D.: A critical evaluation of spectrum-based fault localization techniques on a large-scale software system. In: 2017 IEEE International Conference on Software Quality, Reliability and Security (QRS), pp. 114\u2013125 (2017)","DOI":"10.1109\/QRS.2017.22"},{"key":"23_CR27","doi-asserted-by":"crossref","unstructured":"Just, R., Jalali, D., Ernst, M.D.: Defects4j: a database of existing faults to enable controlled testing studies for java programs. In: Proceedings of the 2014 International Symposium on Software Testing and Analysis, pp. 437\u2013440 (2014)","DOI":"10.1145\/2610384.2628055"},{"key":"23_CR28","doi-asserted-by":"crossref","unstructured":"Li, X., Li, W., Zhang, Y., Zhang, L.: Deepfl: integrating multiple fault diagnosis dimensions for deep fault localization. In: Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis, pp. 169\u2013180 (2019)","DOI":"10.1145\/3293882.3330574"},{"issue":"2","key":"23_CR29","doi-asserted-by":"publisher","first-page":"1157","DOI":"10.1109\/TR.2022.3162039","volume":"71","author":"H Wang","year":"2022","unstructured":"Wang, H., et al.: Can higher-order mutants improve the performance of mutation-based fault localization? IEEE Trans. Reliab. 71(2), 1157\u20131173 (2022)","journal-title":"IEEE Trans. Reliab."},{"issue":"2","key":"23_CR30","doi-asserted-by":"publisher","first-page":"332","DOI":"10.1109\/TSE.2019.2892102","volume":"47","author":"D Zou","year":"2019","unstructured":"Zou, D., Liang, J., Xiong, Y., Ernst, M.D., Zhang, L.: An empirical study of fault localization families and their combinations. IEEE Trans. Softw. Eng. 47(2), 332\u2013347 (2019)","journal-title":"IEEE Trans. Softw. Eng."}],"container-title":["Lecture Notes in Computer Science","Engineering of Complex Computer Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-032-00828-2_23","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T16:24:01Z","timestamp":1760631841000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-032-00828-2_23"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,17]]},"ISBN":["9783032008275","9783032008282"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-032-00828-2_23","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,17]]},"assertion":[{"value":"17 October 2025","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICECCS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Engineering of Complex Computer Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hangzhou","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2025","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2 July 2025","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2025","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"29","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iceccs2025","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iceccs2025-hangzhou.github.io\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}