{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,30]],"date-time":"2025-04-30T05:06:05Z","timestamp":1745989565991},"reference-count":26,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1995,4,1]],"date-time":"1995-04-01T00:00:00Z","timestamp":796694400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computer Languages"],"published-print":{"date-parts":[[1995,4]]},"DOI":"10.1016\/0096-0551(94)00015-i","type":"journal-article","created":{"date-parts":[[2002,7,25]],"date-time":"2002-07-25T14:53:54Z","timestamp":1027608834000},"page":"17-37","source":"Crossref","is-referenced-by-count":7,"title":["Semantic issues in the design of languages for debugging"],"prefix":"10.1016","volume":"21","author":[{"given":"Richard H.","family":"Crawford","sequence":"first","affiliation":[]},{"given":"Ronald A.","family":"Olsson","sequence":"additional","affiliation":[]},{"given":"W.Wilson","family":"Ho","sequence":"additional","affiliation":[]},{"given":"Christopher E.","family":"Wee","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"2","key":"10.1016\/0096-0551(94)00015-I_BIB1","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1002\/spe.4380210207","article-title":"A dataflow approach to event-based debugging","volume":"21","author":"Olsson","year":"1991","journal-title":"SOFTWARE \u2014 Practice Exp."},{"issue":"3","key":"10.1016\/0096-0551(94)00015-I_BIB2","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1109\/52.88941","article-title":"Sequential debugging at a high level of abstraction","volume":"8","author":"Olsson","year":"1991","journal-title":"IEEE SOFTWARE"},{"issue":"10","key":"10.1016\/0096-0551(94)00015-I_BIB3","doi-asserted-by":"crossref","first-page":"38","DOI":"10.1109\/2.42013","article-title":"Visualizing performance debugging","volume":"22","author":"Lehr","year":"1989","journal-title":"IEEE Computer"},{"key":"10.1016\/0096-0551(94)00015-I_BIB4","author":"DEC","year":"1988"},{"issue":"2","key":"10.1016\/0096-0551(94)00015-I_BIB5","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1002\/spe.4380080202","article-title":"Event associations in SNOBOL4 for program debugging","volume":"8","author":"Hanson","year":"1978","journal-title":"SOFTWARE\u2014Practice Exp."},{"key":"10.1016\/0096-0551(94)00015-I_BIB6","series-title":"Proc. Summer 1988 USENIX Conference","first-page":"161","article-title":"Saber-C, an interpreter-based programming environment for the C language","author":"Kaufer","year":"1988"},{"key":"10.1016\/0096-0551(94)00015-I_BIB7","article-title":"DBX (1)","volume":"Vol. 1","author":"UCB","year":"1983"},{"key":"10.1016\/0096-0551(94)00015-I_BIB8","article-title":"GDB Manual (The GNU Source-Level Debugger)","author":"Stallman","year":"1989"},{"key":"10.1016\/0096-0551(94)00015-I_BIB9","article-title":"Sdb: a symbolic debugger","volume":"Vol. 2C","author":"Katseff","year":"1979"},{"key":"10.1016\/0096-0551(94)00015-I_BIB10","article-title":"Topics in behavioral modelling and event-based debugging","author":"Crawford","year":"1990"},{"key":"10.1016\/0096-0551(94)00015-I_BIB11","series-title":"Proc. Summer 1984 USENIX Conference","first-page":"203","article-title":"Processes as files","author":"Killian","year":"1984"},{"key":"10.1016\/0096-0551(94)00015-I_BIB12","series-title":"Proc. ACM SIGPLAN '90 Conference on Programming Language Design and Implementation","first-page":"78","article-title":"Fast breakpoints: design and implementation","author":"Kessler","year":"1990"},{"key":"10.1016\/0096-0551(94)00015-I_BIB13","series-title":"Proc. of the ACM\/SIGPLAN Parallel Programming: Experience with Applications, Languages and Systems","first-page":"21","article-title":"Non-intrusive and interactive profiling in parasight","author":"Aral","year":"1988"},{"key":"10.1016\/0096-0551(94)00015-I_BIB14","series-title":"Proc. ACM SIGSOFT\/SIGPLAN Software Engineering Symposium on High-Level Debugging","first-page":"107","article-title":"An approach to high-level debugging of distributed systems (preliminary draft)","author":"Bates","year":"1983"},{"key":"10.1016\/0096-0551(94)00015-I_BIB15","series-title":"Quantum Theory and Measurement","first-page":"62","article-title":"The physical content of quantum kinematics and mechanics","author":"Heisenberg","year":"1983"},{"key":"10.1016\/0096-0551(94)00015-I_BIB16","author":"Heisenberg","year":"1958"},{"key":"10.1016\/0096-0551(94)00015-I_BIB17","article-title":"Issues in debugging sequential and concurrent programs: methods, techniques, and implementation","author":"Ho","year":"1992"},{"issue":"5","key":"10.1016\/0096-0551(94)00015-I_BIB18","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/390011.808248","article-title":"Viewing a programming environment as a single tool","volume":"19","author":"Delisle","year":"1984","journal-title":"ACM SIGPLAN Notices"},{"key":"10.1016\/0096-0551(94)00015-I_BIB19","author":"Quintus","year":"1990"},{"key":"10.1016\/0096-0551(94)00015-I_BIB20","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1007\/BF00268134","article-title":"An axiomatic proof technique for parallel programs","volume":"6","author":"Owicki","year":"1976","journal-title":"Acta Inform."},{"key":"10.1016\/0096-0551(94)00015-I_BIB21","article-title":"Denotational Semantics: The Scott-Strachey Approach to Programming Language Theory","author":"Stoy","year":"1987"},{"key":"10.1016\/0096-0551(94)00015-I_BIB22","series-title":"Proc. Winter USENIX Conference","first-page":"133","article-title":"Tcl: An embeddable command language","author":"Ousterhout","year":"1990"},{"key":"10.1016\/0096-0551(94)00015-I_BIB23","doi-asserted-by":"crossref","first-page":"265","DOI":"10.1016\/0164-1212(83)90012-2","article-title":"Generalized path expressions: A high level debugging mechanism","volume":"3","author":"Bruegge","year":"1983","journal-title":"J. Systems Software"},{"issue":"4","key":"10.1016\/0096-0551(94)00015-I_BIB24","doi-asserted-by":"crossref","first-page":"593","DOI":"10.1145\/76894.76897","article-title":"Debugging concurrent programs","volume":"21","author":"McDowell","year":"1989","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/0096-0551(94)00015-I_BIB25","article-title":"The design and implementation of a run-time analysis and interactive debugging environment","author":"Johnson","year":"1978"},{"key":"10.1016\/0096-0551(94)00015-I_BIB26","series-title":"Proceedings of the 36th IEEE Computer Society International Conference (COMPCON Spring 1991)","first-page":"160","article-title":"Towards a testbed for malicious code detection","author":"Lo","year":"1991"}],"container-title":["Computer Languages"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:009605519400015I?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:009605519400015I?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,27]],"date-time":"2019-04-27T21:00:09Z","timestamp":1556398809000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/009605519400015I"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1995,4]]},"references-count":26,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1995,4]]}},"alternative-id":["009605519400015I"],"URL":"https:\/\/doi.org\/10.1016\/0096-0551(94)00015-i","relation":{},"ISSN":["0096-0551"],"issn-type":[{"value":"0096-0551","type":"print"}],"subject":[],"published":{"date-parts":[[1995,4]]}}}