{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T14:52:55Z","timestamp":1743000775652,"version":"3.40.3"},"publisher-location":"Cham","reference-count":19,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319076010"},{"type":"electronic","value":"9783319076027"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-07602-7_14","type":"book-chapter","created":{"date-parts":[[2014,6,12]],"date-time":"2014-06-12T11:29:08Z","timestamp":1402572548000},"page":"215-233","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Using Daikon to Prioritize and Group Unit Bugs"],"prefix":"10.1007","author":[{"given":"Nehul","family":"Jain","sequence":"first","affiliation":[]},{"given":"Saikat","family":"Dutta","sequence":"additional","affiliation":[]},{"given":"Ansuman","family":"Banerjee","sequence":"additional","affiliation":[]},{"given":"Anil K.","family":"Ghosh","sequence":"additional","affiliation":[]},{"given":"Lihua","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Huibiao","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2014,6,13]]},"reference":[{"key":"14_CR1","unstructured":"Daikon Invariant Detector. http:\/\/groups.csail.mit.edu\/pag\/daikon\/download\/doc\/daikon.html"},{"key":"14_CR2","unstructured":"Klee. http:\/\/klee.llvm.org\/"},{"key":"14_CR3","unstructured":"Siemens Benchmarks. http:\/\/pleuma.cc.gatech.edu\/aristotle\/Tools\/subjects\/"},{"key":"14_CR4","unstructured":"The yices smt solver. http:\/\/yices.csl.sri.com\/"},{"key":"14_CR5","doi-asserted-by":"crossref","unstructured":"Burnim, J., Sen, K.: Heuristics for scalable dynamic test generation. In: ASE, pp. 443\u2013446 (2008)","DOI":"10.1109\/ASE.2008.69"},{"key":"14_CR6","unstructured":"Chaki, S., Clarke, E., Giannakopoulou, D., Psreanu, C.S.: Abstraction and assume-guarantee reasoning for automated software verification. Technical report (2004)"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Dang, Y., Wu, R., Zhang, H., Zhang, D., Nobel, P.: Rebucket: a method for clustering duplicate crash reports based on call stack similarity. In: ICSE, pp. 1084\u20131093 (2012)","DOI":"10.1109\/ICSE.2012.6227111"},{"issue":"2","key":"14_CR8","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/32.988497","volume":"28","author":"SG Elbaum","year":"2002","unstructured":"Elbaum, S.G., Malishevsky, A.G., Rothermel, G.: Test case prioritization: a family of empirical studies. IEEE Trans. Softw. Eng. 28(2), 159\u2013182 (2002)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1\u20133","key":"14_CR9","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.scico.2007.01.015","volume":"69","author":"MD Ernst","year":"2007","unstructured":"Ernst, M.D., Perkins, J.H., Guo, P.J., McCamant, S., Pacheco, C., Tschantz, M.S., Xiao, C.: The daikon system for dynamic detection of likely invariants. Sci. Comput. Program. 69(1\u20133), 35\u201345 (2007)","journal-title":"Sci. Comput. Program."},{"issue":"10","key":"14_CR10","doi-asserted-by":"publisher","first-page":"1592","DOI":"10.1109\/TPAMI.2005.204","volume":"27","author":"AK Ghosh","year":"2005","unstructured":"Ghosh, A.K., Chaudhuri, P., Murthy, C.A.: On visualization and aggregation of nearest neighbor classifiers. IEEE Trans. Pattern Anal. Mach. Intell. 27(10), 1592\u20131602 (2005)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Henzinger, T.A., Jhala, R., MAjumdar, R., Sutre, G.: Lazy abstraction. In: POPL, pp. 58\u201370 (2002)","DOI":"10.1145\/565816.503279"},{"issue":"3","key":"14_CR12","doi-asserted-by":"publisher","first-page":"430","DOI":"10.1109\/TSE.2011.20","volume":"37","author":"D Kim","year":"2011","unstructured":"Kim, D., Wang, X., Kim, S., Zeller, A., Cheung, S.C., Park, S.: Which crashes should I fix first?: predicting top crashes at an early stage to prioritize debugging efforts. IEEE Trans. Softw. Eng. 37(3), 430\u2013447 (2011)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Kremenek, T., Ashcraft, K., Yang, J., Engler, D.R.: Correlation exploitation in error ranking. In: SIGSOFT FSE, pp. 83\u201393 (2004)","DOI":"10.1145\/1041685.1029909"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Mitra, S., Banerjee, A., Dasgupta, P.: Formal methods for ranking counterexamples through assumption mining. In: DATE, pp. 911\u2013916 (2012)","DOI":"10.1109\/DATE.2012.6176627"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Rothermel, G., Untch, R.H., Chu, C., Harrold, M.J.: Test case prioritization: an empirical study. In: ICSM, pp. 179\u2013188 (1999)","DOI":"10.1109\/ICSM.1999.792604"},{"key":"14_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"419","DOI":"10.1007\/11817963_38","volume-title":"Computer Aided Verification","author":"K Sen","year":"2006","unstructured":"Sen, K., Agha, G.: CUTE and jCUTE: concolic unit testing and explicit path model-checking tools. In: Ball, T., Jones, R.B. (eds.) CAV 2006. LNCS, vol. 4144, pp. 419\u2013423. Springer, Heidelberg (2006)"},{"key":"14_CR17","doi-asserted-by":"crossref","unstructured":"Sen, K., Marinov, D., Agha, G.: Cute: a concolic unit testing engine for c. In: ESEC\/SIGSOFT FSE, pp. 263\u2013272 (2005)","DOI":"10.1145\/1095430.1081750"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Seo, H., Kim, S.: Predicting recurring crash stacks. In: ASE, pp. 180\u2013189 (2012)","DOI":"10.1145\/2351676.2351702"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Shen, H., Fang, J., Zhao, J.: Efindbugs: effective error ranking for findbugs. In: ICST, pp. 299\u2013308 (2011)","DOI":"10.1109\/ICST.2011.51"}],"container-title":["Lecture Notes in Computer Science","Formal Aspects of Component Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-07602-7_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,2,20]],"date-time":"2023-02-20T03:07:13Z","timestamp":1676862433000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-07602-7_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319076010","9783319076027"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-07602-7_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]},"assertion":[{"value":"13 June 2014","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}