{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,17]],"date-time":"2025-10-17T13:32:39Z","timestamp":1760707959181},"publisher-location":"Berlin, Heidelberg","reference-count":28,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540691631"},{"type":"electronic","value":"9783540691662"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69166-2_2","type":"book-chapter","created":{"date-parts":[[2008,7,13]],"date-time":"2008-07-13T09:25:03Z","timestamp":1215941103000},"page":"18-31","source":"Crossref","is-referenced-by-count":2,"title":["Reflections on the Role of Static Analysis in Cooperative Bug Isolation"],"prefix":"10.1007","author":[{"given":"Ben","family":"Liblit","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","volume-title":"Cooperative Bug Isolation","author":"B. Liblit","year":"2007","unstructured":"Liblit, B.:Cooperative Bug Isolation (Winning Thesis of the 2005 ACM Doctoral Dissertation Competition). LNCS, vol.\u00a04440. Springer, Heidelberg (2007)"},{"key":"2_CR2","unstructured":"Driscoll, E., Cooksey, G.: CBI++. CS706 class project, University of Wisconsin\u2013Madison (December 2006)"},{"key":"2_CR3","unstructured":"Hunter, J., Kolpin, G., Saeed, U.: CBI instrumentation for Java bytecode. CS706 class project, University of Wisconsin\u2013Madison (December 2005)"},{"key":"2_CR4","unstructured":"Kolpin, G.: Jikes CBI implementation details. Independent study project, University of Wisconsin\u2013Madison (May 2006)"},{"key":"2_CR5","unstructured":"Liblit, B.: Guide to the bug isolation sampler (January 2008), http:\/\/www.cs.wisc.edu\/cbi\/developers\/guide\/"},{"key":"2_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1007\/3-540-45937-5_16","volume-title":"Compiler Construction","author":"G.C. Necula","year":"2002","unstructured":"Necula, G.C., McPeak, S., Rahul, S.P., Weimer, W.: CIL: Intermediate language and tools for analysis and transformation of C programs. In: Horspool, R.N. (ed.) CC 2002 and ETAPS 2002. LNCS, vol.\u00a02304, pp. 213\u2013228. Springer, Heidelberg (2002)"},{"issue":"1-3","key":"2_CR7","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.scico.2007.01.015","volume":"69","author":"M.D. Ernst","year":"2007","unstructured":"Ernst, M.D., Perkins, J.H., Guo, P.J., McCamant, S., Pacheco, C., Tschantz, M.S., Xiao, C.: The Daikon system for dynamic detection of likely invariants. Sci. Comput. Program.\u00a069(1-3), 35\u201345 (2007)","journal-title":"Sci. Comput. Program."},{"key":"2_CR8","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1145\/781131.781148","volume-title":"PLDI","author":"B. Liblit","year":"2003","unstructured":"Liblit, B., Aiken, A., Zheng, A.X., Jordan, M.I.: Bug isolation via remote program sampling. In: PLDI, pp. 141\u2013154. ACM, New York (2003)"},{"key":"2_CR9","doi-asserted-by":"crossref","unstructured":"Arnold, M., Ryder, B.G.: A framework for reducing the cost of instrumented code. In: PLDI, pp. 168\u2013179 (2001)","DOI":"10.1145\/378795.378832"},{"key":"2_CR10","unstructured":"Hirzel, M., Chilimbi, T.: Bursty tracing: A framework for low-overhead temporal profiling (November\u00a024, 2001)"},{"key":"2_CR11","volume-title":"NIPS","author":"A.X. Zheng","year":"2003","unstructured":"Zheng, A.X., Jordan, M.I., Liblit, B., Aiken, A.: Statistical debugging of sampled programs. In: Thrun, S., Saul, L.K., Sch\u00f6lkopf, B. (eds.) NIPS, MIT Press, Cambridge (2003)"},{"key":"2_CR12","first-page":"286","volume-title":"ESEC\/SIGSOFT FSE","author":"C. Liu","year":"2005","unstructured":"Liu, C., Yan, X., Fei, L., Han, J., Midkiff, S.P.: SOBER: statistical model-based bug localization. In: Wermelinger, M., Gall, H. (eds.) ESEC\/SIGSOFT FSE, pp. 286\u2013295. ACM, New York (2005)"},{"key":"2_CR13","doi-asserted-by":"publisher","first-page":"273","DOI":"10.1145\/1101908.1101949","volume-title":"ASE","author":"J.A. Jones","year":"2005","unstructured":"Jones, J.A., Harrold, M.J.: Empirical evaluation of the Tarantula automatic fault-localization technique. In: Redmiles, D.F., Ellman, T., Zisman, A. (eds.) ASE, pp. 273\u2013282. ACM, New York (2005)"},{"key":"2_CR14","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/1065010.1065014","volume-title":"PLDI","author":"B. Liblit","year":"2005","unstructured":"Liblit, B., Naik, M., Zheng, A.X., Aiken, A., Jordan, M.I.: Scalable statistical bug isolation. In: Sarkar, V., Hall, M.W. (eds.) PLDI, pp. 15\u201326. ACM, New York (2005)"},{"key":"2_CR15","series-title":"ACM International Conference Proceeding Series","doi-asserted-by":"publisher","first-page":"1105","DOI":"10.1145\/1143844.1143983","volume-title":"ICML","author":"A.X. Zheng","year":"2006","unstructured":"Zheng, A.X., Jordan, M.I., Liblit, B., Naik, M., Aiken, A.: Statistical debugging: simultaneous identification of multiple bugs. In: Cohen, W.W., Moore, A. (eds.) ICML. ACM International Conference Proceeding Series, vol.\u00a0148, pp. 1105\u20131112. ACM, New York (2006)"},{"key":"2_CR16","unstructured":"Wassel, H.M.G.H.: An enhanced bi-clustering algorithm for automatic multiple software bug isolation. Master\u2019s thesis, Alexandria University, Egypt (September 2007)"},{"key":"2_CR17","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/1273463.1273467","volume-title":"ISSTA","author":"P. Arumuga Nainar","year":"2007","unstructured":"Arumuga Nainar, P., Chen, T., Rosin, J., Liblit, B.: Statistical debugging using compound Boolean predicates. In: Rosenblum, D.S., Elbaum, S.G. (eds.) ISSTA, pp. 5\u201315. ACM, New York (2007)"},{"key":"2_CR18","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1145\/1321631.1321660","volume-title":"ASE","author":"L. Jiang","year":"2007","unstructured":"Jiang, L., Su, Z.: Context-aware statistical debugging: from bug predictors to faulty control flow paths. In: Stirewalt, R.E.K., Egyed, A., Fischer, B. (eds.) ASE, pp. 184\u2013193. ACM, New York (2007)"},{"key":"2_CR19","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"6","DOI":"10.1007\/978-3-540-74958-5_5","volume-title":"Machine Learning: ECML 2007","author":"D. Andrzejewski","year":"2007","unstructured":"Andrzejewski, D., Mulhern, A., Liblit, B., Zhu, X.: Statistical debugging using latent topic models. In: Kok, J.N., Koronacki, J., de M\u00e1ntaras, R.L., Matwin, S., Mladenic, D., Skowron, A. (eds.) ECML 2007. LNCS (LNAI), vol.\u00a04701, pp. 6\u201317. Springer, Heidelberg (2007)"},{"key":"2_CR20","unstructured":"Liblit, B., Aiken, A.: Building a better backtrace: Techniques for postmortem program analysis. Technical Report CSD-02-1203, University of California, Berkeley (October 2002)"},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"246","DOI":"10.1007\/11693024_17","volume-title":"Programming Languages and Systems","author":"A. Lal","year":"2006","unstructured":"Lal, A., Lim, J., Polishchuk, M., Liblit, B.: Path optimization in programs and its application to debugging. In: Sestoft, P. (ed.) ESOP 2006 and ETAPS 2006. LNCS, vol.\u00a03924, pp. 246\u2013263. Springer, Heidelberg (2006)"},{"issue":"1-2","key":"2_CR22","doi-asserted-by":"publisher","first-page":"206","DOI":"10.1016\/j.scico.2005.02.009","volume":"58","author":"T.W. Reps","year":"2005","unstructured":"Reps, T.W., Schwoon, S., Jha, S., Melski, D.: Weighted pushdown systems and their application to interprocedural dataflow analysis. Sci. Comput. Program.\u00a058(1-2), 206\u2013263 (2005)","journal-title":"Sci. Comput. Program."},{"key":"2_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"434","DOI":"10.1007\/11513988_44","volume-title":"Computer Aided Verification","author":"A. Lal","year":"2005","unstructured":"Lal, A., Reps, T.W., Balakrishnan, G.: Extended weighted pushdown systems. In: Etessami, K., Rajamani, S.K. (eds.) CAV 2005. LNCS, vol.\u00a03576, pp. 434\u2013448. Springer, Heidelberg (2005)"},{"key":"2_CR24","first-page":"342","volume-title":"ICSE","author":"H. Cleve","year":"2005","unstructured":"Cleve, H., Zeller, A.: Locating causes of program failures. In: Roman, G.C., Griswold, W.G., Nuseibeh, B. (eds.) ICSE, pp. 342\u2013351. ACM, New York (2005)"},{"key":"2_CR25","first-page":"30","volume-title":"ASE","author":"M. Renieris","year":"2003","unstructured":"Renieris, M., Reiss, S.P.: Fault localization with nearest neighbor queries. In: ASE, pp. 30\u201339. IEEE Computer Society, Los Alamitos (2003)"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Nimmer, J.W., Ernst, M.D.: Static verification of dynamically detected program invariants: Integrating Daikon and ESC\/Java. Electr. Notes Theor. Comput. Sci.\u00a055(2) (2001)","DOI":"10.1016\/S1571-0661(04)00256-7"},{"issue":"11-12","key":"2_CR27","doi-asserted-by":"publisher","first-page":"595","DOI":"10.1016\/S0950-5849(98)00086-X","volume":"40","author":"G. Canfora","year":"1998","unstructured":"Canfora, G., Cimitile, A., Lucia, A.D.: Conditioned program slicing. Information & Software Technology\u00a040(11-12), 595\u2013607 (1998)","journal-title":"Information & Software Technology"},{"key":"2_CR28","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/7432.001.0001","volume-title":"Introduction to Statistical Relational Learning (Adaptive Computation and Machine Learning)","author":"L. Getoor","year":"2007","unstructured":"Getoor, L., Taskar, B.: Introduction to Statistical Relational Learning (Adaptive Computation and Machine Learning). MIT Press, Cambridge (2007)"}],"container-title":["Lecture Notes in Computer Science","Static Analysis"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69166-2_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,19]],"date-time":"2023-05-19T05:06:40Z","timestamp":1684472800000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69166-2_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540691631","9783540691662"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69166-2_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}