{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,17]],"date-time":"2026-04-17T16:20:10Z","timestamp":1776442810052,"version":"3.51.2"},"reference-count":67,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T00:00:00Z","timestamp":1760745600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T00:00:00Z","timestamp":1760745600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2026,5]]},"abstract":"<jats:title>Abstract<\/jats:title>\n                  <jats:p>\n                    Bug localization (BL) is known as one of the major steps in the program repair process, which generally seeks to find a set of commands causing a program to crash or fail. At the present time, locating bugs and their sources quickly seems to be impossible as the complexity of modern software development and scaling is soaring. Accordingly, there is a huge demand for BL techniques with minimal human intervention. A graph representing source code typically encodes valuable information about both the syntactic and semantic structures of programs. Many software bugs are associated with these structures, making graphs particularly suitable for bug localization (BL). Therefore, the key contributions of this work involve labeling graph nodes, classifying these nodes, and addressing imbalanced classifications within the graph data structure to effectively locate bugs in code. A graph-based bug classifier is initially introduced in the method proposed in this paper. For this purpose, the program source codes are mapped to a graph representation. Since the graph nodes do not have labels, the Gumtree algorithm is then exploited to label them by comparing the buggy graphs and the corresponding bug-free ones. Afterward, a trained, supervised node classifier, developed based on a graph neural network (GNN), is applied to classify the nodes into buggy or bug-free ones. Given the imbalance in the data, accuracy, precision, recall, and F1-score metrics are used for evaluation. Experimental results on identical datasets show that the proposed method outperforms other related approaches. The proposed approach effectively localizes a broader spectrum of bug types, such as undefined properties, functional bugs, variable naming errors, and variable misuse issues\n                    <jats:bold>.<\/jats:bold>\n                  <\/jats:p>","DOI":"10.1007\/s10515-025-00556-y","type":"journal-article","created":{"date-parts":[[2025,10,18]],"date-time":"2025-10-18T09:50:38Z","timestamp":1760781038000},"update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Graph neural networks for precise bug localization through structural program analysis"],"prefix":"10.1007","volume":"33","author":[{"given":"Leila","family":"Yousofvand","sequence":"first","affiliation":[]},{"given":"Seyfollah","family":"Soleimani","sequence":"additional","affiliation":[]},{"given":"Vahid","family":"Rafe","sequence":"additional","affiliation":[]},{"given":"Amin","family":"Nikanjam","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2025,10,18]]},"reference":[{"issue":"5","key":"556_CR1","doi-asserted-by":"publisher","first-page":"372","DOI":"10.3390\/e20050372","volume":"20","author":"G Aakanshi","year":"2018","unstructured":"Aakanshi, G., Suri, B., Kumar, V., Misra, S., Bla\u017eauskas, T., Dama\u0161evi\u010dius, R.: Software code smell prediction model using Shannon, R\u00e9nyi and Tsallis entropies. Entropy 20(5), 372 (2018)","journal-title":"Entropy"},{"key":"556_CR2","doi-asserted-by":"crossref","unstructured":"Abreu, R., Zoeteweij, P., van Gemund, A.J.C.: On the accuracy of spectrum-based fault localization. In: Academic and industrial conference practice and research techniques -mutation (Taicpart-Mutation) (2007)","DOI":"10.1109\/TAIC.PART.2007.13"},{"key":"556_CR3","doi-asserted-by":"crossref","unstructured":"Agarwal, P., Agrawa, A.: Fault-localization techniques for software systems: a literature review. In: SIGSOFT software engineering notes (2014)","DOI":"10.1145\/2659118.2659125"},{"key":"556_CR4","doi-asserted-by":"crossref","unstructured":"Agrawal, H., De Millo, R.A., Spafford, E.: An Execution backtracking approach to program debugging. IEEE Softw. 8(5) (1991)","DOI":"10.1109\/52.88940"},{"key":"556_CR5","unstructured":"Allamanis, M., Brockschmidt, M., Khademi, M.: Learning to represent programs with graphs. In: International conference on learning representations (ICLR) (2018)"},{"key":"556_CR6","doi-asserted-by":"crossref","unstructured":"Ascari, L.C., Araki, L.Y., Pozo, A.R., Vergilio, S.R.: Exploring machine learning techniques for fault localization. In: Proceedings of 10th Latin American test workshop (2009)","DOI":"10.1109\/LATW.2009.4813783"},{"key":"556_CR7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.87","author":"GK Baah","year":"2010","unstructured":"Baah, G.K., Podgurski, A., Harrold, M.J.: The probabilistic program dependence graph and its application to fault diagnosis. IEEE Transactions on Software Engineering (2010). https:\/\/doi.org\/10.1109\/TSE.2009.87","journal-title":"IEEE Transactions on Software Engineering"},{"key":"556_CR8","doi-asserted-by":"crossref","unstructured":"Binta Hossain, S., Jiang, N., Zhou, Q., Li, X., Chiang, W.-H., Lyu, Y., Nguyen, H., Tripp, O.: A deep dive into large language models for automated bug localization and repair. In: Proceedings of the ACM on software engineering (2024)","DOI":"10.1145\/3660773"},{"key":"556_CR9","doi-asserted-by":"crossref","unstructured":"Briand, L.C., Labiche, Y., Liu, X.: Using machine learning to support debugging with tarantula. In: Proceedings of IEEE international symposium on software reliability (2007)","DOI":"10.1109\/ISSRE.2007.31"},{"key":"556_CR10","unstructured":"Campos, V.: Bug detection and localization using pre-trained code language models. In: Informatik 2024, lecture notes in informatics (LNI), Gesellschaft f\u00fcr Informatik (2024)"},{"key":"556_CR11","doi-asserted-by":"crossref","unstructured":"Chawathe, S.S., Rajaraman, A., Garcia-Molina, H., Widom, J.: Change detection in hierarchically structured information: In: Proceedings of the 1996 international conference on management of data (1996)","DOI":"10.1145\/233269.233366"},{"key":"556_CR12","unstructured":"Chen, M., Kiciman, E., Fratkin, E., Fox, A., Brewer, E.: Pinpoint: problem determination in large, dynamic internet services. In: International conference on dependable systems and networks (DSN) (2002)"},{"key":"556_CR13","doi-asserted-by":"crossref","unstructured":"DiGiuseppe, N., Jones, J.A.: On the influence of multiple faults on coverage-based fault localization. In: Proceedings of the 2011 international symposium on software testing and analysis (ISSTA) (2011)","DOI":"10.1145\/2001420.2001446"},{"key":"556_CR14","unstructured":"Dinella, E., Dai, H., Li, Z., Naik, M., Song, L., Wang, K.: Hoppity: learning graph transformations to detect and fix bugs in programs. In: International conference on learning representations (ICLR) (2020)"},{"key":"556_CR15","doi-asserted-by":"crossref","unstructured":"Do Viet, T., Markov, K.: Using large language models for bug localization and fixing. In: 12th international conference on awareness science and technology (iCAST) (2023)","DOI":"10.1109\/iCAST57874.2023.10359304"},{"key":"556_CR16","doi-asserted-by":"crossref","unstructured":"Falleri, J.R., Morandat, F., Blanc, X., Martinez, M., Monperrus, M.: Fine-grained and accurate source code differencing. In: Proceedings of the 29th ACM\/IEEE international conference on automated software engineering (2014)","DOI":"10.1145\/2642937.2642982"},{"key":"556_CR17","doi-asserted-by":"crossref","unstructured":"Gazzola, L., Micucci, D., Mariani, L.: Automatic software repair: a survey. IEEE Trans. Softw. Eng. 45(1) (2017)","DOI":"10.1109\/TSE.2017.2755013"},{"key":"556_CR18","unstructured":"Hao, D., Xie, T., Zhang, L., Wang, X., Sun, J., Mei, H.: Test input reduction for result inspection to facilitate fault localization. Autom. Softw. Eng. (2012)"},{"key":"556_CR19","doi-asserted-by":"crossref","unstructured":"Hovemeyer, D., Pugh, W.: Finding bugs is easy. In: Companion to the conference on object-oriented programming, systems, languages, and applications (OOPSLA). ACM (2004)","DOI":"10.1145\/1028664.1028717"},{"key":"556_CR20","unstructured":": [Online] (n.d.) Accessed: 17 August 2025 https:\/\/github.com\/AI-nstein\/hoppity"},{"key":"556_CR21","doi-asserted-by":"crossref","unstructured":"Jensen, S.H., M\u00f8ller, A., Thiemann, P.: Type analysis for javascript. In: Proceedings of the 16th international symposium on static analysis (2009)","DOI":"10.1007\/978-3-642-03237-0_17"},{"key":"556_CR22","doi-asserted-by":"crossref","unstructured":"Jones, J.A. Harrold, M.J.: Empirical evaluation of the tarantula automatic fault-localization technique. In: International conference on automated software engineering (ASE) (2005)","DOI":"10.1145\/1101908.1101949"},{"issue":"11","key":"556_CR23","doi-asserted-by":"publisher","first-page":"1597","DOI":"10.1109\/TSE.2013.24","volume":"39","author":"D Kim","year":"2013","unstructured":"Kim, D., Tao, Y., Kim, S., Zeller, A.: Where should we fix this bug? A two-phase recommendation model. IEEE Trans. Softw. Eng. 39(11), 1597\u20131610 (2013)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"556_CR24","unstructured":"Kipf, T.N., Welling, M.: Semi-supervised classification with graph convolutional networks. In: The international conference on learning representations (ICLR) (2017)"},{"issue":"9","key":"556_CR25","doi-asserted-by":"publisher","first-page":"1253","DOI":"10.1109\/32.6169","volume":"14","author":"B Korel","year":"1988","unstructured":"Korel, B.: PELAS \u2013 program error-locating assistant system. IEEE Trans. Softw. Eng. 14(9), 1253\u20131260 (1988)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"556_CR26","doi-asserted-by":"publisher","first-page":"91","DOI":"10.3390\/e21010091","volume":"21","author":"M Kumari","year":"2019","unstructured":"Kumari, M., Misra, A., Misra, S., Fernandez Sanz, L., Damasevicius, R., Singh, V.: Quantitative quality evaluation of software products by considering summary and comments entropy of a reported bug. Entropy 21(1), 91 (2019)","journal-title":"Entropy"},{"key":"556_CR27","doi-asserted-by":"crossref","unstructured":"Lam, A.N., Nguyen, A.T., Nguyen, H.A., Nguyen, T.N., Bug localization with combination of deep learning and information retrieval. In: 2017 IEEE\/ACM 25th international conference on program comprehension (ICPC) (2017)","DOI":"10.1109\/ICPC.2017.24"},{"key":"556_CR28","unstructured":"Le Goues, C.: Automatic program repair using genetic programming, University of Virginia: Ph.D. dissertation (2013)"},{"issue":"6","key":"556_CR29","first-page":"674","volume":"29","author":"C-C Lee","year":"1999","unstructured":"Lee, C.-C., Chung, P.-C., Tsai, J.-R., Chang, C.-I.: Robust radial basis function neural networks. IEEE Trans. Syst 29(6), 674\u2013685 (1999)","journal-title":"IEEE Trans. Syst"},{"key":"556_CR30","doi-asserted-by":"crossref","unstructured":"Li, J., Ernst, M.D.: CBCD: cloned buggy code detector. In: Proceedings of the international conference on software engineering (ICSE) (2012)","DOI":"10.1109\/ICSE.2012.6227183"},{"key":"556_CR31","doi-asserted-by":"crossref","unstructured":"Lukins, S.K., Kraft, N.A., Etzkorn, L.H.: Bug localization using latent Dirichlet allocation. Inf. Softw. Technol. 52(9) (2012)","DOI":"10.1016\/j.infsof.2010.04.002"},{"key":"556_CR32","unstructured":"Mateis, C., Stumptner, M., Wotawa, F.: Modeling java programs for diagnosis. In: Proceedings of European conference on artificial intelligence (2000)"},{"key":"556_CR33","doi-asserted-by":"crossref","unstructured":"Mayer, W., Stumptner, M.: Evaluating models for model-based debugging. In: Proceedings of ACM international conference on automated software engineering (2008)","DOI":"10.1109\/ASE.2008.23"},{"key":"556_CR34","unstructured":"Mayer, W. Stumptner, M., Wieland, D., Wotawa, F.: Can AI help to improve debugging substantially? Debugging experiences with value-based models. In: Proceedings of European conference on artificial intelligence (2002)"},{"issue":"4","key":"556_CR35","doi-asserted-by":"publisher","first-page":"61","DOI":"10.1016\/j.entcs.2006.12.030","volume":"174","author":"W Mayer","year":"2007","unstructured":"Mayer, W., Stumptner, M.: Model-based debugging: state of the art and future challenges. Electron. Notes Theor. Comput. Sci. 174(4), 61\u201382 (2007)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"556_CR36","unstructured":"Meyers, R.A.: Encyclopedia of physical science and technology, third edition, academic press (2001)"},{"key":"556_CR37","doi-asserted-by":"crossref","unstructured":"Mohajer, M.M., Aleithan, R., Harzevili, N.S., Wei, M., Belle, A.B., Viet Pham, H., Wang, S.: Effectiveness of ChatGPT for static analysis: how far are we?. In: Proceedings of the 1st ACM international conference on AI-powered softw (2024)","DOI":"10.1145\/3664646.3664777"},{"issue":"3","key":"556_CR38","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2000791.2000795","volume":"20","author":"L Naish","year":"2011","unstructured":"Naish, L., Lee, H., Ramamohanarao, K.: A model for spectra-based software diagnosis. J. ACM Trans. Softw. Eng. Methodol. 20(3), 1\u201332 (2011)","journal-title":"J. ACM Trans. Softw. Eng. Methodol."},{"key":"556_CR39","unstructured":"Pmd - an extensible cross-language static code analyzer.: (n.d.). Accessed 14 Sept 2018 https:\/\/pmd.github.io\/"},{"key":"556_CR40","doi-asserted-by":"crossref","unstructured":"Rao, S., Kak, A.: Retrieval from software libraries for bug localization: a comparative study of generic and composite text models. In: Proceedings of the 8th working conference on mining software repositories (MSR) (2011)","DOI":"10.1145\/1985441.1985451"},{"key":"556_CR41","unstructured":"Renieris, M., Reiss, S.: Fault localization with nearest neighbor queries. In: Proceedings of international conference on automated software engineering (2003)"},{"key":"556_CR42","doi-asserted-by":"crossref","unstructured":"Saha, R.K., Lease, M., Khurshid, S., Perry, D.E.: Improving bug localization using structured information retrieval. In: Proceedings of IEEE\/ACM international conference on automated software engineering (ASE) (2013)","DOI":"10.1109\/ASE.2013.6693093"},{"key":"556_CR43","doi-asserted-by":"crossref","unstructured":"Sisman, B., Kak, A.C.: Incorporating version histories in information retrieval based bug localization. In: Proceedings of 9th IEEE working conference on mining software repositories (2012)","DOI":"10.1109\/MSR.2012.6224299"},{"key":"556_CR44","unstructured":"State of the octoverse.: [Online]. Available: (2021) Accessed 17 August 2025 https:\/\/octoverse.github.com\/#top-languages-over-the-years"},{"issue":"4","key":"556_CR45","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1142\/S0218001409007326","volume":"23","author":"Y Sun","year":"2009","unstructured":"Sun, Y., Wong, A.K.C., Kamel, M.S.: Classification of imbalanced data: a review. Int. J. Pattern Recognit. Artif. Intell. 23(4), 687\u2013719 (2009)","journal-title":"Int. J. Pattern Recognit. Artif. Intell."},{"key":"556_CR46","unstructured":"Velickovic, P., Cucurull, G., Casanova, A., Romero, A., Lio, P., Bengio, Y.: Graph attention networks. In: International conference on learning representations (ICLR) (2018)"},{"key":"556_CR47","unstructured":"Vinyals, O., Fortunato, M., Jaitly, N.: Pointer networks. In: Advances in neural information processing systems (2015)"},{"key":"556_CR48","doi-asserted-by":"crossref","unstructured":"Wang, S., Lo, D., Lawall, J.: Compositional vector space models for improved bug localization. In: Proceedings of IEEE international conference on software maintenance and evolution (ICSME) (2014)","DOI":"10.1109\/ICSME.2014.39"},{"key":"556_CR49","unstructured":"Wang, M., Zheng, D., Ye, Z., Gan, Q., Li, M., Song, X., Zhou, J., Ma, C., Yu, L., Gai, Y., Xiao, T., He, T., Karypis, G., Li, J., Zhang, Z.: Deep graph library: a graph-centric, highly-performant package for graph neural networks. Preprint at https:\/\/arxiv.org\/abs\/1909.01315 (2020)"},{"key":"556_CR50","doi-asserted-by":"crossref","unstructured":"Wang, Q., Parnin, C., Orso, A.: Evaluating the usefulness of IR-based fault localization techniques. In: Proceedings of international symposium on software testing and analysis (ISSTA) (2015)","DOI":"10.1145\/2771783.2771797"},{"issue":"4","key":"556_CR51","doi-asserted-by":"publisher","first-page":"573","DOI":"10.1142\/S021819400900426X","volume":"19","author":"WE Wong","year":"2019","unstructured":"Wong, W.E., Qi, Y.: BP neural network-based effective fault localization. Int. J. Softw. Eng. Knowl. Eng. 19(4), 573\u2013597 (2019)","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"issue":"2","key":"556_CR52","doi-asserted-by":"publisher","first-page":"188","DOI":"10.1016\/j.jss.2009.09.037","volume":"83","author":"WE Wong","year":"2010","unstructured":"Wong, W.E., Debroy, V., Choi, B.: A family of code coveragebased heuristics for effective fault. J. Syst. Softw. (JSS) 83(2), 188\u2013208 (2010)","journal-title":"J. Syst. Softw. (JSS)"},{"issue":"3","key":"556_CR53","doi-asserted-by":"publisher","first-page":"378","DOI":"10.1109\/TSMCC.2011.2118751","volume":"42","author":"WE Wong","year":"2012","unstructured":"Wong, W.E., Debroy, V., Xu, D.: Towards better fault localization: a crosstab-based statistical approach. IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews) 42(3), 378\u2013396 (2012)","journal-title":"IEEE Transactions on Systems, Man, and Cybernetics, Part C (Applications and Reviews)"},{"key":"556_CR54","doi-asserted-by":"crossref","unstructured":"Wong, C.-P., Xiong, Y., Zhang, H., Hao, D., Zhang, L., Mei, H.: Boosting bug-report-oriented fault localization with segmentation and stack-trace analysis. In: Proceedings of IEEE international conference on software maintenance and evolution (ICSME) (2014)","DOI":"10.1109\/ICSME.2014.40"},{"key":"556_CR55","doi-asserted-by":"crossref","unstructured":"Wotawa, F., Stumptner, M., Mayer, W.: Model-based debugging or how to diagnose programs automatically. In: Proceedings of international conference on industrial and engineering, applications of artificial intelligence and expert systems (2002)","DOI":"10.1007\/3-540-48035-8_72"},{"key":"556_CR56","doi-asserted-by":"crossref","unstructured":"Wu, Z., Pan, S., Chen, F., Long, G., Zhang, C., Yu, P.S.: A Comprehensive survey on graph neural networks. In: IEEE transactions on neural networks and learning systems, pp 1\u201321 (2020)","DOI":"10.1109\/TNNLS.2020.2978386"},{"key":"556_CR57","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.infsof.2018.08.002","volume":"105","author":"Y Xiao","year":"2019","unstructured":"Xiao, Y., Keung, J., Bennin, K.E., Mi, Q.: Improving bug localization with word embedding and enhanced convolutional neural networks. Inf. Softw. Technol. 105, 17\u201329 (2019)","journal-title":"Inf. Softw. Technol."},{"key":"556_CR58","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2025.107675","volume":"181","author":"H Xu","year":"2025","unstructured":"Xu, H., Wang, Z., Zou, W.: A more accurate bug localization technique for bugs with multiple buggy code files. Information and Software Technology 181, 107675 (2025)","journal-title":"Information and Software Technology"},{"issue":"04","key":"556_CR59","doi-asserted-by":"publisher","first-page":"597","DOI":"10.1142\/S0219622006002258","volume":"5","author":"Q Yang","year":"2006","unstructured":"Yang, Q., Wu, X.: 10 challenging problems in data mining research. Int. J. Inf. Technol. Decis. Mak. 5(04), 597\u2013604 (2006)","journal-title":"Int. J. Inf. Technol. Decis. Mak."},{"issue":"4","key":"556_CR60","doi-asserted-by":"publisher","first-page":"1045","DOI":"10.1007\/s11219-023-09625-5","volume":"31","author":"L Yousofvand","year":"2023","unstructured":"Yousofvand, L., Soleimani, S., Rafe, V.: Automatic bug localization using a combination of deep learning and model transformation through node classification. Softw. Qual. J. 31(4), 1045\u20131063 (2023)","journal-title":"Softw. Qual. J."},{"issue":"2","key":"556_CR61","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-023-10686-y","volume":"57","author":"L Yousofvand","year":"2024","unstructured":"Yousofvand, L., Soleimani, S., Rafe, V., Esfandyari, S.: Automatic program bug fixing by focusing on finding the shortest sequence of changes. Artif. Intell. Rev. 57(2), 39 (2024)","journal-title":"Artif. Intell. Rev."},{"key":"556_CR62","unstructured":"Yousofvand, L., Soleimani, S., Esfandyari, S.: Bug detection using model transformations and deep learning. Tabriz J. Electr. Eng. (2024)"},{"key":"556_CR63","doi-asserted-by":"crossref","unstructured":"Zhao, T., Zhang, X., Wang, S.: GraphSMOTE: imbalanced node classification on graphs with graph neural networks. In: Proceedings of the fourteenth ACM international conference on web search and data mining (WSDM \u201921) (2021)","DOI":"10.1145\/3437963.3441720"},{"key":"556_CR64","doi-asserted-by":"crossref","unstructured":"Zhong, H., Su, Z.: An empirical study on real bug fixes. In: Proceedings of the international conference on software engineering (ICSE) (2015)","DOI":"10.1109\/ICSE.2015.101"},{"issue":"6","key":"556_CR65","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-019-2720-1","volume":"63","author":"H Zhong","year":"2020","unstructured":"Zhong, H., Mei, H.: Learning a graph-based classifier for fault localization. Sci. China Inf. Sci. 63(6), 162101 (2020)","journal-title":"Sci. China Inf. Sci."},{"key":"556_CR66","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.aiopen.2021.01.001","volume":"1","author":"J Zhou","year":"2020","unstructured":"Zhou, J., Cui, G., Hu, S., Zhang, Z., Yang, C., Liu, Z., Wang, L., Li, C., Sun, M.: Graph neural networks: a review of methods and applications. AI Open 1, 57\u201381 (2020)","journal-title":"AI Open"},{"key":"556_CR67","unstructured":"Zhou, Y., Liu, S., Wang, Y.: Li, Y.: BugsInPy: a database of existing bugs in python programs to enable controlled testing and debugging studies. In: Proceedings of the 2019 27th ACM joint meeting on European software engineering conference and symposium on the foundations of software engineering (2019)"}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-025-00556-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1007\/s10515-025-00556-y","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-025-00556-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,1,19]],"date-time":"2026-01-19T11:15:42Z","timestamp":1768821342000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/s10515-025-00556-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,10,18]]},"references-count":67,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2026,5]]}},"alternative-id":["556"],"URL":"https:\/\/doi.org\/10.1007\/s10515-025-00556-y","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"value":"0928-8910","type":"print"},{"value":"1573-7535","type":"electronic"}],"subject":[],"published":{"date-parts":[[2025,10,18]]},"assertion":[{"value":"2 November 2024","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"2 September 2025","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"18 October 2025","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}},{"order":1,"name":"Ethics","group":{"name":"EthicsHeading","label":"Declarations"}},{"value":"The authors declare no competing interests.","order":2,"name":"Ethics","group":{"name":"EthicsHeading","label":"Competing interests"}}],"article-number":"17"}}