{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T07:27:17Z","timestamp":1750318037018,"version":"3.40.4"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319117362"},{"type":"electronic","value":"9783319117379"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11737-9_17","type":"book-chapter","created":{"date-parts":[[2014,10,15]],"date-time":"2014-10-15T00:52:14Z","timestamp":1413334334000},"page":"251-266","source":"Crossref","is-referenced-by-count":17,"title":["A Formula-Based Approach for Automatic Fault Localization of Imperative Programs"],"prefix":"10.1007","author":[{"given":"Si-Mohamed","family":"Lamraoui","sequence":"first","affiliation":[]},{"given":"Shin","family":"Nakajima","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"17_CR1","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1145\/1217295.1217297","volume":"16","author":"David Binkley","year":"2007","unstructured":"Binkley, D., Gold, N., Harman, M.: An Empirical Study of Static Program Slice Size. ACM TOSEM\u00a016(2), Article 8 (April 2007)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"17_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-642-35873-9_13","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"J. Christ","year":"2013","unstructured":"Christ, J., Ermis, E., Sch\u00e4f, M., Wies, T.: Flow-Sensitive Fault Localization. In: Giacobazzi, R., Berdine, J., Mastroeni, I. (eds.) VMCAI 2013. LNCS, vol.\u00a07737, pp. 189\u2013208. Springer, Heidelberg (2013)"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"168","DOI":"10.1007\/978-3-540-24730-2_15","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"E. Clarke","year":"2004","unstructured":"Clarke, E., Kroning, D., Lerda, F.: A Tool for Checking ANSI-C Programs. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol.\u00a02988, pp. 168\u2013176. Springer, Heidelberg (2004)"},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"DiGiuseppe, N., Jones, J.A.: On the Influence of Multiple Faults on Coverage-based Fault Localization. In: Proc. ISSTA 2011, pp. 210\u2013220 (2011)","DOI":"10.1145\/2001420.2001446"},{"key":"17_CR5","unstructured":"Dutertre, B., de Moura, L.: The Yices SMT Solver, http:\/\/yices.csl.sri.com"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Griesmayer, A., Staber, S., Bloem, R.: Fault Localization using a Model Checker. In: STVR, pp. 149\u2013173 (2010)","DOI":"10.1002\/stvr.421"},{"issue":"3","key":"17_CR7","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1007\/s10009-005-0202-0","volume":"8","author":"A. Groce","year":"2006","unstructured":"Groce, A., Chaki, S., Kroening, D., Strichman, O.: Error Explanation with Distance Metrics. STTT\u00a08(3), 229\u2013247 (2006)","journal-title":"STTT"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Jones, J.A., Harrold, M.J.: Empirical Evaluation of the Tarantula Automatic Fault-Localization Technique. In: Proc. ASE 2005, pp. 273\u2013282 (2005)","DOI":"10.1145\/1101908.1101949"},{"issue":"6","key":"17_CR9","doi-asserted-by":"crossref","first-page":"437","DOI":"10.1145\/1993316.1993550","volume":"46","author":"Manu Jose","year":"2011","unstructured":"Jose, M., Majumdar, R.: Cause Clue Clauses: Error Localization using Maximum Satisfiability. In: Proc. PLDI 2011, pp. 437\u2013446 (2011)","journal-title":"ACM SIGPLAN Notices"},{"issue":"1","key":"17_CR10","doi-asserted-by":"publisher","first-page":"49","DOI":"10.1023\/A:1014823126938","volume":"7","author":"S. Kusumoto","year":"2002","unstructured":"Kusumoto, S., Nishimatsu, A., Nishie, K., Inoue, K.: Experimental Evaluation of Program Slicing for Fault Localization. Empirical Software Engineering\u00a07(1), 49\u201376 (2002)","journal-title":"Empirical Software Engineering"},{"key":"17_CR11","doi-asserted-by":"crossref","unstructured":"Lattner, C., Adve, V.: LLVM: A Compilation Framework for Lifelong Program Analysis & Transformation. In: Proc. CGO 2004, pp. 75\u201386 (2004)","DOI":"10.1109\/CGO.2004.1281665"},{"issue":"1","key":"17_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/s10817-007-9084-z","volume":"40","author":"M.H. Liffiton","year":"2008","unstructured":"Liffiton, M.H., Sakallah, K.A.: Algorithms for Computing Minimal Unsatisfiable Subsets of Constraints. Automated Reasoning\u00a040(1), 1\u201333 (2008)","journal-title":"Automated Reasoning"},{"key":"17_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"146","DOI":"10.1007\/978-3-642-27705-4_12","volume-title":"Verified Software: Theories, Tools, Experiments","author":"F. Merz","year":"2012","unstructured":"Merz, F., Falke, S., Sinz, C.: LLBMC: Bounded Model Checking of C and C++ Programs Using a Compiler IR. In: Joshi, R., M\u00fcller, P., Podelski, A. (eds.) VSTTE 2012. LNCS, vol.\u00a07152, pp. 146\u2013161. Springer, Heidelberg (2012)"},{"key":"17_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-642-39611-3_13","volume-title":"Hardware and Software: Verification and Testing","author":"A. Morgado","year":"2013","unstructured":"Morgado, A., Liffiton, M., Marques-Silva, J.: MaxSAT-Based MCS Enumeration. In: Biere, A., Nahir, A., Vos, T. (eds.) HVC. LNCS, vol.\u00a07857, pp. 86\u2013101. Springer, Heidelberg (2013)"},{"issue":"2","key":"17_CR15","doi-asserted-by":"publisher","first-page":"156","DOI":"10.1007\/s10009-004-0183-4","volume":"7","author":"M.R. Prasad","year":"2005","unstructured":"Prasad, M.R., Biere, A., Gupta, A.: A Survey of Recent Advances in SAT-Based Formal Verification. STTT\u00a07(2), 156\u2013173 (2005)","journal-title":"STTT"},{"issue":"1","key":"17_CR16","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/0004-3702(87)90062-2","volume":"32","author":"R. Reiter","year":"1987","unstructured":"Reiter, R.: A Theory of Diagnosis from First Principles. Artificial Intelligence\u00a032(1), 57\u201395 (1987)","journal-title":"Artificial Intelligence"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Safarpour, S., Mangassarian, H., Veneris, A., Liffiton, M.H., Sakallah, K.A.: Improved Design Debugging using Maximum Satisfiability. In: Proc. FMCAD 2007, pp. 13\u201319 (2007)","DOI":"10.1109\/FMCAD.2007.4401977"},{"issue":"7","key":"17_CR18","doi-asserted-by":"publisher","first-page":"446","DOI":"10.1145\/358557.358577","volume":"25","author":"M. Weiser","year":"1982","unstructured":"Weiser, M.: Programmers Use Slices When Debugging. Comm. ACM\u00a025(7), 446\u2013452 (1982)","journal-title":"Comm. ACM"},{"issue":"1","key":"17_CR19","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/S0004-3702(01)00161-8","volume":"135","author":"F. Wotawa","year":"2002","unstructured":"Wotawa, F.: On the Relationship between Model-based Debugging and Program Slicing. Artificial Intelligence\u00a0135(1), 125\u2013143 (2002)","journal-title":"Artificial Intelligence"},{"issue":"4","key":"17_CR20","doi-asserted-by":"publisher","first-page":"390","DOI":"10.1016\/j.jlap.2012.03.002","volume":"81","author":"F. Wotawa","year":"2012","unstructured":"Wotawa, F., Nica, M., Moraru, I.: Automated Debugging based on a Constraint Model of the Program and a Test Case. Logic and Algebraic Programming\u00a081(4), 390\u2013407 (2012)","journal-title":"Logic and Algebraic Programming"},{"issue":"2","key":"17_CR21","doi-asserted-by":"publisher","first-page":"183","DOI":"10.1109\/32.988498","volume":"28","author":"A. Zeller","year":"2002","unstructured":"Zeller, A., Hildebrandt, R.: Simplifying and Isolating Failure-Inducing Input. IEEE Trans. Softw. Eng.\u00a028(2), 183\u2013200 (2002)","journal-title":"IEEE Trans. Softw. Eng."}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11737-9_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T04:24:52Z","timestamp":1746419092000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11737-9_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319117362","9783319117379"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11737-9_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}