{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T14:10:31Z","timestamp":1738332631754,"version":"3.35.0"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2008,7]]},"DOI":"10.1109\/cit.2008.4594763","type":"proceedings-article","created":{"date-parts":[[2008,8,13]],"date-time":"2008-08-13T22:40:13Z","timestamp":1218667213000},"page":"718-723","source":"Crossref","is-referenced-by-count":0,"title":["Towards a software diagnosis method based on rough set reasoning"],"prefix":"10.1109","author":[{"family":"Chengying Mao","sequence":"first","affiliation":[]},{"family":"Xiaohua Hu","sequence":"additional","affiliation":[]},{"family":"Yansheng Lu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-73451-2_66"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/CIT.2006.26"},{"key":"14","first-page":"527","article-title":"the combination of multiple risk factor in it projects based on rough set","volume":"2","author":"lu","year":"2005","journal-title":"Chinese Journal of Management"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1007\/BF01001956"},{"year":"0","key":"12"},{"year":"0","key":"3"},{"key":"2","first-page":"121","article-title":"a survey of program slicing techniques","volume":"3","author":"tip","year":"1995","journal-title":"Programming Languages"},{"journal-title":"Software Testing Techniques","year":"1990","author":"beizer","key":"1"},{"key":"10","doi-asserted-by":"crossref","first-page":"306","DOI":"10.1145\/1081706.1081755","article-title":"prminer: automatically extracting implicit programming rules and detecting violations in large software code","author":"li","year":"2005","journal-title":"Proc ESEC\/FSE'05"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/581396.581397"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2001.919107"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.105"},{"key":"4","first-page":"382","article-title":"how bayesians debug","author":"liu","year":"2006","journal-title":"Proc of ICSM '06"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/780822.781148"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2003.1240292"}],"event":{"name":"2008 8th IEEE International Conference on Computer and Information Technology (CIT)","start":{"date-parts":[[2008,7,8]]},"location":"Sydney, Australia","end":{"date-parts":[[2008,7,11]]}},"container-title":["2008 8th IEEE International Conference on Computer and Information Technology"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/4586225\/4594630\/04594763.pdf?arnumber=4594763","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,1,31]],"date-time":"2025-01-31T13:33:35Z","timestamp":1738330415000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/4594763\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/cit.2008.4594763","relation":{},"subject":[],"published":{"date-parts":[[2008,7]]}}}