{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T15:43:03Z","timestamp":1766504583124,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":33,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783662466742"},{"type":"electronic","value":"9783662466759"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-662-46675-9_8","type":"book-chapter","created":{"date-parts":[[2015,3,31]],"date-time":"2015-03-31T16:24:38Z","timestamp":1427819078000},"page":"115-129","source":"Crossref","is-referenced-by-count":19,"title":["Evaluation of Measures for Statistical Fault Localisation and an Optimising Scheme"],"prefix":"10.1007","author":[{"given":"David","family":"Landsberg","sequence":"first","affiliation":[]},{"given":"Hana","family":"Chockler","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Kroening","sequence":"additional","affiliation":[]},{"given":"Matt","family":"Lewis","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"8_CR1","doi-asserted-by":"crossref","unstructured":"Abreu, R., Zoeteweij, P., van Gemund, A.J.C.: An evaluation of similarity coefficients for software fault localization. In: Pacific Rim International Symposium on Dependable Computing (PRDC), pp. 39\u201346. IEEE (2006)","DOI":"10.1109\/PRDC.2006.18"},{"key":"8_CR2","doi-asserted-by":"crossref","unstructured":"Abreu, R., Zoeteweij, P., van Gemund, A.J.C.: On the accuracy of spectrum-based fault localization. In: TAICPART-MUTATION, pp. 89\u201398. IEEE (2007)","DOI":"10.1109\/TAICPART.2007.4344104"},{"key":"8_CR3","doi-asserted-by":"crossref","unstructured":"Briand, L.C., Labiche, Y., Liu, X.: Using machine learning to support debugging with Tarantula. In: International Symposium on Software Reliability (ISSRE), pp. 137\u2013146. IEEE (2007)","DOI":"10.1109\/ISSRE.2007.31"},{"key":"8_CR4","unstructured":"Carnap, R.: Logical Foundations of Probability. University of Chicago Press (1962)"},{"key":"8_CR5","first-page":"43","volume":"8","author":"S.S. Choi","year":"2010","unstructured":"Choi, S.S., Cha, S.H., Tappert, C.: A Survey of Binary Similarity and Distance Measures. Journal on Systemics, Cybernetics and Informatics\u00a08, 43\u201348 (2010)","journal-title":"Journal on Systemics, Cybernetics and Informatics"},{"key":"8_CR6","unstructured":"Collofello, Woodfield: Evaluating the effectiveness of reliability-assurance techniques. Journal of Systems and Software, 745\u2013770 (1989)"},{"key":"8_CR7","doi-asserted-by":"crossref","unstructured":"Do, H., Elbaum, S., Rothermel, G.: Supporting controlled experimentation with testing techniques: An infrastructure and its potential impact. Empirical Softw. Eng, 405\u2013435 (2005)","DOI":"10.1007\/s10664-005-3861-2"},{"key":"8_CR8","doi-asserted-by":"publisher","first-page":"129","DOI":"10.1023\/A:1014712013453","volume":"107","author":"E. Eells","year":"2002","unstructured":"Eells, E., Fitelson, B.: Symmetries and asymmetries in evidential support. Philosophical Studies\u00a0107, 129\u2013142 (2002)","journal-title":"Philosophical Studies"},{"key":"8_CR9","unstructured":"Everitt, B.: The Cambridge Dictionary of Statistics. CUP (2002)"},{"key":"8_CR10","doi-asserted-by":"crossref","unstructured":"Fitelson, B., Hitchcock, C.: Probabilistic measures of causal strength. In: Illari, P.M., Russo, F., Williamson, J. (eds.) Causality in the Sciences. Oxford University Press, Oxford (2011)","DOI":"10.1093\/acprof:oso\/9780199574131.003.0029"},{"key":"8_CR11","unstructured":"Fletcher, R., Suzanne, W.: Clinical epidemiology: the essentials. Lippincott Williams and Wilkins (2005)"},{"key":"8_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-540-24730-2_8","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A. Groce","year":"2004","unstructured":"Groce, A.: Error explanation with distance metrics. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol.\u00a02988, pp. 108\u2013122. Springer, Heidelberg (2004)"},{"key":"8_CR13","unstructured":"Huber, F.: Confirmation and induction, \n                      \n                        http:\/\/www.iep.utm.edu\/conf-ind\/"},{"key":"8_CR14","doi-asserted-by":"crossref","unstructured":"Jones, J.A., Harrold, M.J.: Empirical evaluation of the Tarantula automatic fault-localization technique. In: ASE, pp. 273\u2013282. ACM (2005)","DOI":"10.1145\/1101908.1101949"},{"key":"8_CR15","doi-asserted-by":"crossref","unstructured":"Liblit, B., Naik, M., Zheng, A.X., Aiken, A., Jordan, M.I.: Scalable statistical bug isolation. In: SIGPLAN Not., pp. 15\u201326 (2005)","DOI":"10.1145\/1064978.1065014"},{"issue":"10","key":"8_CR16","doi-asserted-by":"publisher","first-page":"831","DOI":"10.1109\/TSE.2006.105","volume":"32","author":"C. Liu","year":"2006","unstructured":"Liu, C., Fei, L., Yan, X., Han, J., Midkiff, S.P.: Statistical debugging: A hypothesis testing-based approach. IEEE Trans. Softw. Eng.\u00a032(10), 831\u2013848 (2006)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"8_CR17","doi-asserted-by":"crossref","unstructured":"Liu, C., Yan, X., Fei, L., Han, J., Midkiff, S.P.: SOBER: Statistical model-based bug localization. SIGSOFT Softw. Eng. Notes, 286\u2013295 (2005)","DOI":"10.1145\/1095430.1081753"},{"key":"8_CR18","doi-asserted-by":"crossref","unstructured":"Lucia, Lo, D., Jiang, L., Budi, A.: Comprehensive evaluation of association measures for fault localization. In: International Conference on Software Maintenance (ICSM), pp. 1\u201310. IEEE (2010)","DOI":"10.1109\/ICSM.2010.5609542"},{"issue":"2","key":"8_CR19","first-page":"172","volume":"26","author":"Lucia","year":"2014","unstructured":"Lucia, Lo, D., Jiang, L., Thung, F., Budi, A.: Extended comprehensive study of association measures for fault localization. Journal of Software: Evolution and Process\u00a026(2), 172\u2013219 (2014)","journal-title":"Journal of Software: Evolution and Process"},{"key":"8_CR20","doi-asserted-by":"crossref","unstructured":"Naish, L., Lee, H.J.: Duals in spectral fault localization. In: Australian Conference on Software Engineering (ASWEC), pp. 51\u201359. IEEE (2013)","DOI":"10.1109\/ASWEC.2013.16"},{"key":"8_CR21","doi-asserted-by":"crossref","unstructured":"Naish, L., Lee, H.J., Ramamohanarao, K.: A model for spectra-based software diagnosis. ACM Trans. Softw. Eng. Methodol, 1\u201311 (2011)","DOI":"10.1145\/2000791.2000795"},{"key":"8_CR22","doi-asserted-by":"crossref","unstructured":"Parnin, C., Orso, A.: Are automated debugging techniques actually helping programmers? In: International Symposium on Software Testing and Analysis (ISSTA), pp. 199\u2013209. ACM (2011)","DOI":"10.1145\/2001420.2001445"},{"key":"8_CR23","doi-asserted-by":"crossref","unstructured":"Pearl, J.: Probabilities of causation: three counterfactual interpretations and their identification. Synthese 1-2(121), 93\u2013149 (1999)","DOI":"10.1023\/A:1005233831499"},{"key":"8_CR24","unstructured":"Pearson, K.: On the theory of contingency and its relation to association and normal correlation (1904)"},{"key":"8_CR25","unstructured":"Pytlik, B., Renieris, M., Krishnamurthi, S., Reiss, S.: Automated fault localization using potential invariants. Arxiv preprint cs.SE\/0310040 (2003)"},{"key":"8_CR26","unstructured":"Renieris, M., Reiss, S.P.: Fault localization with nearest neighbor queries. In: ASE, pp. 30\u201339 (2003)"},{"key":"8_CR27","doi-asserted-by":"crossref","unstructured":"Tan, P.-N., Kumar, V., Srivastava, J.: Selecting the right interestingness measure for association patterns. In: Knowledge Discovery and Data Mining (KDD), pp. 32\u201341. ACM (2002)","DOI":"10.1145\/775052.775053"},{"issue":"6","key":"8_CR28","doi-asserted-by":"publisher","first-page":"80","DOI":"10.2307\/3001968","volume":"1","author":"F. Wilcoxon","year":"1945","unstructured":"Wilcoxon, F.: Individual comparisons by ranking methods. Biometrics Bulletin\u00a01(6), 80\u201383 (1945)","journal-title":"Biometrics Bulletin"},{"issue":"7","key":"8_CR29","doi-asserted-by":"publisher","first-page":"891","DOI":"10.1016\/j.jss.2005.06.045","volume":"79","author":"W.E. Wong","year":"2006","unstructured":"Wong, W.E., Qi, Y.: Effective program debugging based on execution slices and inter-block data dependency. Journal of Systems and Software\u00a079(7), 891\u2013903 (2006)","journal-title":"Journal of Systems and Software"},{"key":"8_CR30","doi-asserted-by":"crossref","unstructured":"Wong, W.E., Qi, Y., Zhao, L., Cai, K.-Y.: Effective fault localization using code coverage. In: Computer Software and Applications Conference (COMPSAC), pp. 449\u2013456. IEEE (2007)","DOI":"10.1109\/COMPSAC.2007.109"},{"key":"8_CR31","doi-asserted-by":"crossref","unstructured":"Xie, X., Chen, T.Y., Kuo, F.-C., Xu, B.: A theoretical analysis of the risk evaluation formulas for spectrum-based fault localization. ACM Trans. Softw. Eng. Methodol., 31:1\u201331:40 (2013)","DOI":"10.1145\/2522920.2522924"},{"issue":"3","key":"8_CR32","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1145\/2491509.2491513","volume":"22","author":"S. Yoo","year":"2013","unstructured":"Yoo, S., Harman, M., Clark, D.: Fault localization prioritization: Comparing information-theoretic and coverage-based approaches. ACM Trans. Softw. Eng. Methodol.\u00a022(3), 19 (2013)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"8_CR33","doi-asserted-by":"crossref","unstructured":"Zhang, Z., Chan, W.K., Tse, T.H., Jiang, B., Wang, X.: Capturing propagation of infected program states. In: ESEC\/FSE, pp. 43\u201352. ACM (2009)","DOI":"10.1145\/1595696.1595705"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-662-46675-9_8","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,29]],"date-time":"2019-05-29T14:28:25Z","timestamp":1559140105000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-662-46675-9_8"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783662466742","9783662466759"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-662-46675-9_8","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}