{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T14:15:53Z","timestamp":1742393753377,"version":"3.37.3"},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540213055"},{"type":"electronic","value":"9783540247210"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24721-0_20","type":"book-chapter","created":{"date-parts":[[2010,7,28]],"date-time":"2010-07-28T00:15:12Z","timestamp":1280276112000},"page":"267-280","source":"Crossref","is-referenced-by-count":22,"title":["Automated Debugging Using\u00a0Path-Based\u00a0Weakest\u00a0Preconditions"],"prefix":"10.1007","author":[{"given":"Haifeng","family":"He","sequence":"first","affiliation":[]},{"given":"Neelam","family":"Gupta","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"crossref","unstructured":"Agrawal, H., Horgan, J.R., London, S., Wong, W.E.: Fault localization using execution slices and dataflowtests. In: Proceedings of the Sixth IEEE International Symposium on Software Reliability Engineering, Toulouse, France, October 1995, pp. 143\u2013151 (1995)","DOI":"10.1109\/ISSRE.1995.497652"},{"key":"20_CR2","unstructured":"Boyer, R.S., Moore, J.S.: A Computational Logic Handbook. Academic Press, Boston"},{"key":"20_CR3","doi-asserted-by":"crossref","unstructured":"Clarke, L.A., Richardson, D.J.: The application of error-sensitive testing strategies to debugging. In: Proceedings of the Symposium on High-Level Debugging, pp. 45\u201352 (1983)","DOI":"10.1145\/1006147.1006158"},{"key":"20_CR4","doi-asserted-by":"crossref","unstructured":"DeMillo, R.A., Pan, H., Spafford, E.H.: Critical slicing for software fault localization. In: Proceedings of the International Symposium on Software Testing and Analysis, San Diego, CA, pp. 121\u2013134 (1996)","DOI":"10.1145\/229000.226310"},{"key":"20_CR5","volume-title":"A Discipline of Programming","author":"E.W. Dijkstra","year":"1976","unstructured":"Dijkstra, E.W.: A Discipline of Programming. Prentice Hall, Englewood Cliffs (1976)"},{"key":"20_CR6","volume-title":"Fundamentals of Software Engineering","author":"C. Ghezzi","year":"2003","unstructured":"Ghezzi, C., Jazayeri, M., Mandrioli, D.: Fundamentals of Software Engineering, 2nd edn. Prentice-Hall, Englewood Cliffs (2003)","edition":"2"},{"key":"20_CR7","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4612-5983-1","volume-title":"The Science of Programming","author":"D. Gries","year":"1981","unstructured":"Gries, D.: The Science of Programming. Springer, Heidelberg (1981)"},{"key":"20_CR8","doi-asserted-by":"crossref","unstructured":"Hangal, S., Lam, M.S.: Tracking down software bugs using automatic anomaly detection. In: Proceedings of the International Conference on Software Engineering (May 2002)","DOI":"10.1145\/581376.581377"},{"key":"20_CR9","doi-asserted-by":"crossref","unstructured":"Hildebrandt, R., Zeller, A.: Simplifying failure-inducing input. In: Proceedings of the International Symposium on Software Testing and Analysis, pp. 135\u2013145 (2000)","DOI":"10.1145\/347324.348938"},{"key":"20_CR10","doi-asserted-by":"crossref","unstructured":"Jones, J.A., Harrold, M.J., Stasko, J.: Visualization of test information to assist fault localization. In: Proceedings of the 24th International Conference on Software Engineering, Orlando, Florida, USA, May 2002, pp. 467\u2013477 (2002)","DOI":"10.1145\/581396.581397"},{"key":"20_CR11","unstructured":"Korel, B., Rilling, J.: Application of dynamic slicing in program debugging. In: Automated and Algorithmic Debugging, pp. 43\u201358 (1997)"},{"key":"20_CR12","unstructured":"Leino, K.R.M., Saxe, J.B., Stata, R.: Checking Java programs via guarded commands. Compaq SRC Technical Note # 1999-002, Palo Alto, CA (1999)"},{"key":"20_CR13","unstructured":"Leino, K.R.M., Millstein, T., Saxe, J.B.: Generating error traces from verificationcondition counterexamples, http:\/\/research.microsoft.com\/leino\/papers.html"},{"key":"20_CR14","doi-asserted-by":"crossref","unstructured":"Lencevicius, R.: On-the-fly query-based debugging with examples. In: Automated and Algorithmic Debugging (2000)","DOI":"10.1007\/978-1-4419-8774-7_3"},{"key":"20_CR15","unstructured":"Lyle, J.R., Weiser, M.: Automatic program bug location by program slicing. In: Proceedings of the 2nd International Conference on Computers and Applications, pp. 877\u2013882 (1987)"},{"key":"20_CR16","doi-asserted-by":"crossref","unstructured":"Nimmer, J.W., Ernst, M.D.: Invariant inference for static checking. In: Proceedings of the ACM\/SIGSOFT Symposium on the Foundations of Software Engineering, Charleston, SC, November 2002, pp. 11\u201320 (2002)","DOI":"10.1145\/587051.587054"},{"key":"20_CR17","doi-asserted-by":"crossref","unstructured":"Renieris, M., Reiss, S.: Fault localization with nearest neighbor queries. In: Proceedings of the 18th IEEE International Conference on Automated Software Engineering (October 2003)","DOI":"10.1109\/ASE.2003.1240292"},{"key":"20_CR18","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/1192.001.0001","volume-title":"Algorithmic Program Debugging","author":"E.Y. Shapiro","year":"1983","unstructured":"Shapiro, E.Y.: Algorithmic Program Debugging. The MIT Press, Cambridge (1983)"},{"key":"20_CR19","doi-asserted-by":"crossref","unstructured":"Zeller, A.: Isolating cause-effect chains from computer programs. In: Proceedings of the ACM\/SIGSOFT International Symposium on Foundations of Software Engineering (2002)","DOI":"10.1145\/587051.587053"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24721-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,23]],"date-time":"2025-02-23T12:31:12Z","timestamp":1740313872000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24721-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540213055","9783540247210"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24721-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}