{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,10]],"date-time":"2025-11-10T13:32:44Z","timestamp":1762781564962},"publisher-location":"Berlin, Heidelberg","reference-count":10,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642122132"},{"type":"electronic","value":"9783642122149"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-12214-9_49","type":"book-chapter","created":{"date-parts":[[2010,3,31]],"date-time":"2010-03-31T19:11:44Z","timestamp":1270062704000},"page":"305-309","source":"Crossref","is-referenced-by-count":5,"title":["Finding Discriminative Weighted Sub-graphs to Identify Software Bugs"],"prefix":"10.1007","author":[{"given":"Saeed","family":"Parsa","sequence":"first","affiliation":[]},{"given":"Somaye","family":"Arabi","sequence":"additional","affiliation":[]},{"given":"Neda","family":"Ebrahimi","sequence":"additional","affiliation":[]},{"given":"Mojtaba","family":"Vahidi-Asl","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"49_CR1","first-page":"5","volume-title":"International Symposium on Software Testing and Analysis","author":"P. Arumuga Nainar","year":"2007","unstructured":"Arumuga Nainar, P., Chen, T., Rosin, J., Liblit, B.: Statistical debugging using compound Boolean predicates. In: International Symposium on Software Testing and Analysis, pp. 5\u201315. ACM Press, London (2007)"},{"key":"49_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"308","DOI":"10.1007\/11693017_23","volume-title":"Fundamental Approaches to Software Engineering","author":"L. Fei","year":"2006","unstructured":"Fei, L., Lee, K., Li, F., Midkiff, S.P.: Argus: Online statistical bug detection. In: Baresi, L., Heckel, R. (eds.) FASE 2006. LNCS, vol.\u00a03922, pp. 308\u2013323. Springer, Heidelberg (2006)"},{"key":"49_CR3","first-page":"433","volume-title":"International Conference on Management of Data","author":"X. Yan","year":"2008","unstructured":"Yan, X., Cheng, H., Han, J., Yu, P.: Mining Significant Graph Patterns by Leap Search. In: International Conference on Management of Data, pp. 433\u2013444. ACM Press, Canada (2008)"},{"key":"49_CR4","first-page":"141","volume-title":"International Symptoms on Software Testing and Analysis","author":"H. Cheng","year":"2009","unstructured":"Cheng, H., Lo, D., Zhou, Y., Wang, X.: Identifying Bug Signatures Using Discriminative Graph Mining. In: International Symptoms on Software Testing and Analysis, pp. 141\u2013151. ACM Press, USA (2009)"},{"key":"49_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1007\/978-3-642-01715-5_5","volume-title":"Knowledge Acquisition: Approaches, Algorithms and Applications","author":"K. Ohara","year":"2009","unstructured":"Ohara, K., Hara, M., Takabayashi, K., Motoda, H.: Pruning Strategies Based on the Upper Bound of Information Gain for Discriminative Sub-graph Mining. In: Richards, D., Kang, B.-H. (eds.) PKAW 2008. LNCS, vol.\u00a05465, pp. 50\u201360. Springer, Heidelberg (2009)"},{"key":"49_CR6","doi-asserted-by":"publisher","DOI":"10.1002\/0470073047","volume-title":"Mining Graph Data","author":"D. Cook","year":"2006","unstructured":"Cook, D., Holder, L.: Mining Graph Data. John Wiley and Sons, Chichester (2006)"},{"key":"49_CR7","volume-title":"Why Programs Fail: A Guide to Systematic Debugging","author":"A. Zeller","year":"2006","unstructured":"Zeller, A.: Why Programs Fail: A Guide to Systematic Debugging. Morgan Kaufmann, San Francisco (2006)"},{"key":"49_CR8","unstructured":"Software-artifact infrastructure repository, \n                  \n                    http:\/\/sir.unl.edu\/portal"},{"key":"49_CR9","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-3-540-87479-9_40","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"F. Eichinger","year":"2008","unstructured":"Eichinger, F., Bohm, K., Huber, M.: Mining Edge-Weighted Call Graphs to Localize Software Bugs. In: Daelemans, W., Goethals, B., Morik, K. (eds.) ECML PKDD 2008, Part I. LNCS (LNAI), vol.\u00a05211, pp. 333\u2013348. Springer, Heidelberg (2008)"},{"key":"49_CR10","volume-title":"Introduction to Data Mining","author":"P. Tan","year":"2005","unstructured":"Tan, P., Steinbach, M., Kumar, V.: Introduction to Data Mining. Addison-Wesley Press, USA (2005)"}],"container-title":["Communications in Computer and Information Science","Information Processing and Management"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-12214-9_49.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,30]],"date-time":"2021-04-30T12:06:01Z","timestamp":1619784361000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-12214-9_49"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642122132","9783642122149"],"references-count":10,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-12214-9_49","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2010]]}}}