{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T19:03:33Z","timestamp":1725563013919},"publisher-location":"Berlin, Heidelberg","reference-count":26,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642158797"},{"type":"electronic","value":"9783642158803"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-15880-3_33","type":"book-chapter","created":{"date-parts":[[2010,8,17]],"date-time":"2010-08-17T14:08:53Z","timestamp":1282054133000},"page":"425-441","source":"Crossref","is-referenced-by-count":7,"title":["Software-Defect Localisation by Mining Dataflow-Enabled Call Graphs"],"prefix":"10.1007","author":[{"given":"Frank","family":"Eichinger","sequence":"first","affiliation":[]},{"given":"Klaus","family":"Krogmann","sequence":"additional","affiliation":[]},{"given":"Roland","family":"Klug","sequence":"additional","affiliation":[]},{"given":"Klemens","family":"B\u00f6hm","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"33_CR1","unstructured":"Asuncion, A., Newman, D.J.: UC Irvine Machine-Learning Repository, http:\/\/archive.ics.uci.edu\/ml\/"},{"issue":"5","key":"33_CR2","doi-asserted-by":"publisher","first-page":"22","DOI":"10.1109\/MS.2008.130","volume":"25","author":"N. Ayewah","year":"2008","unstructured":"Ayewah, N., Hovemeyer, D., Morgenthaler, J.D., Penix, J., Pugh, W.: Using Static Analysis to Find Bugs. IEEE Softw.\u00a025(5), 22\u201329 (2008)","journal-title":"IEEE Softw."},{"key":"33_CR3","doi-asserted-by":"crossref","unstructured":"Cheng, H., Lo, D., Zhou, Y., Wang, X., Yan, X.: Identifying Bug Signatures Using Discriminative Graph Mining. In: Proc. Int. Symposium on Software Testing and Analysis, ISSTA (2009)","DOI":"10.1145\/1572272.1572290"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Dallmeier, V., Zimmermann, T.: Extraction of Bug Localization Benchmarks from History. In: Proc. Int. Conf. on Automated Software Engineering, ASE (2007)","DOI":"10.1145\/1321631.1321702"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Di Fatta, G., Leue, S., Stegantova, E.: Discriminative Pattern Mining in Software Fault Detection. In: Proc. Int. Workshop on Software Quality Assurance (2006)","DOI":"10.1145\/1188895.1188910"},{"key":"33_CR6","volume-title":"Managing and Mining Graph Data","author":"F. Eichinger","year":"2010","unstructured":"Eichinger, F., B\u00f6hm, K.: Software-Bug Localization with Graph Mining. In: Aggarwal, C.C., Wang, H. (eds.) Managing and Mining Graph Data. Springer, Heidelberg (2010)"},{"key":"33_CR7","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"333","DOI":"10.1007\/978-3-540-87479-9_40","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"F. Eichinger","year":"2008","unstructured":"Eichinger, F., B\u00f6hm, K., Huber, M.: Mining Edge-Weighted Call Graphs to Localise Software Bugs. In: Daelemans, W., Goethals, B., Morik, K. (eds.) ECML PKDD 2008, Part I. LNCS (LNAI), vol.\u00a05211, pp. 333\u2013348. Springer, Heidelberg (2008)"},{"key":"33_CR8","doi-asserted-by":"crossref","unstructured":"Eichinger, F., Pankratius, V., Gro\u00dfe, P.W.L., B\u00f6hm, K.: Localizing Defects in Multithreaded Programs by Mining Dynamic Call Graphs. In: Proc. Testing: Academic and Industrial Conference \u2013 Practice and Research Techniques (2010)","DOI":"10.1007\/978-3-642-15585-7_7"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Han, J., Gao, J.: Research Challenges for Data Mining in Science and Engineering. In: Kargupta, H., Han, J., Yu, P.S., Motwani, R., Kumar, V. (eds.) Next Generation of Data Mining. Chapman & Hall\/CRC (2008)","DOI":"10.1201\/9781420085877.pt1"},{"key":"33_CR10","unstructured":"Hutchins, M., Foster, H., Goradia, T., Ostrand, T.: Experiments on the Effectiveness of Dataflow- and Controlflow-Based Test Adequacy Criteria. In: Proc. Int. Conf. on Software Engineering, ICSE (1994)"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Jones, J.A., Harrold, M.J.: Empirical Evaluation of the Tarantula Automatic Fault-Localization Technique. In: Proc. Int. Conf. on Automated Software Engineering, ASE (2005)","DOI":"10.1145\/1101908.1101949"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"Jones, J.A., Harrold, M.J., Stasko, J.: Visualization of Test Information to Assist Fault Localization. In: Proc. Int. Conf. on Software Engineering, ICSE (2002)","DOI":"10.1145\/581396.581397"},{"key":"33_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"327","DOI":"10.1007\/3-540-45337-7_18","volume-title":"ECOOP 2001 - Object-Oriented Programming","author":"G. Kiczales","year":"2001","unstructured":"Kiczales, G., Hilsdale, E., Hugunin, J., Kersten, M., Palm, J., Griswold, W.G.: An Overview of AspectJ. In: Knudsen, J.L. (ed.) ECOOP 2001. LNCS, vol.\u00a02072, p. 327. Springer, Heidelberg (2001)"},{"key":"33_CR14","doi-asserted-by":"crossref","unstructured":"Krogmann, K., Kuperberg, M., Reussner, R.: Using Genetic Search for Reverse Engineering of Parametric Behaviour Models for Performance Prediction. IEEE Trans. Softw. Eng. (accepted for publication, to appear 2010)","DOI":"10.1109\/TSE.2010.69"},{"issue":"2","key":"33_CR15","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1109\/TKDE.2004.1269594","volume":"16","author":"L.A. Kurgan","year":"2004","unstructured":"Kurgan, L.A., Cios, K.J.: CAIM Discretization Algorithm. IEEE Trans. Knowl. Data Eng.\u00a016(2), 145\u2013153 (2004)","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"5","key":"33_CR16","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1145\/780822.781148","volume":"38","author":"B. Liblit","year":"2003","unstructured":"Liblit, B., Aiken, A., Zheng, A.X., Jordan, M.I.: Bug Isolation via Remote Program Sampling. SIGPLAN Not.\u00a038(5), 141\u2013154 (2003)","journal-title":"SIGPLAN Not."},{"issue":"5","key":"33_CR17","doi-asserted-by":"publisher","first-page":"286","DOI":"10.1145\/1095430.1081753","volume":"30","author":"C. Liu","year":"2005","unstructured":"Liu, C., Yan, X., Fei, L., Han, J., Midkiff, S.P.: SOBER: Statistical Model-Based Bug Localization. SIGSOFT Softw. Eng. Notes\u00a030(5), 286\u2013295 (2005)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Liu, C., Yan, X., Yu, H., Han, J., Yu, P.S.: Mining Behavior Graphs for \u201cBacktrace\u201d of Noncrashing Bugs. In: Proc. SDM (2005)","DOI":"10.1137\/1.9781611972757.26"},{"issue":"2","key":"33_CR19","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1002\/stvr.409","volume":"20","author":"W. Masri","year":"2009","unstructured":"Masri, W.: Fault Localization Based on Information Flow Coverage. Softw. Test., Verif. Reliab.\u00a020(2), 121\u2013147 (2009)","journal-title":"Softw. Test., Verif. Reliab."},{"key":"33_CR20","doi-asserted-by":"crossref","unstructured":"Nagappan, N., Ball, T., Zeller, A.: Mining Metrics to Predict Component Failures. In: Proc. Int. Conf. on Software Engineering, ICSE (2006)","DOI":"10.1145\/1134285.1134349"},{"key":"33_CR21","unstructured":"Philippsen, M., et al.: ParSeMiS: The Parallel and Sequential Mining Suite, http:\/\/www2.informatik.uni-erlangen.de\/EN\/research\/ParSeMiS\/"},{"key":"33_CR22","volume-title":"C4.5: Programs for Machine Learning","author":"J.R. Quinlan","year":"1993","unstructured":"Quinlan, J.R.: C4.5: Programs for Machine Learning. Morgan Kaufmann, San Francisco (1993)"},{"key":"33_CR23","volume-title":"Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations","author":"I.H. Witten","year":"2005","unstructured":"Witten, I.H., Frank, E.: Data Mining: Practical Machine Learning Tools and Techniques with Java Implementations. Morgan Kaufmann, San Francisco (2005)"},{"key":"33_CR24","doi-asserted-by":"crossref","unstructured":"Yan, X., Cheng, H., Han, J., Yu, P.S.: Mining Significant Graph Patterns by Leap Search. In: Proc. SIGMOD (2008)","DOI":"10.1145\/1376616.1376662"},{"key":"33_CR25","doi-asserted-by":"crossref","unstructured":"Yan, X., Han, J.: CloseGraph: Mining Closed Frequent Graph Patterns. In: Proc. KDD (2003)","DOI":"10.1145\/956750.956784"},{"key":"33_CR26","volume-title":"Why Programs Fail: A Guide to Systematic Debugging","author":"A. Zeller","year":"2009","unstructured":"Zeller, A.: Why Programs Fail: A Guide to Systematic Debugging. Morgan Kaufmann, San Francisco (2009)"}],"container-title":["Lecture Notes in Computer Science","Machine Learning and Knowledge Discovery in Databases"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-15880-3_33.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:42:01Z","timestamp":1606185721000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-15880-3_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642158797","9783642158803"],"references-count":26,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-15880-3_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}