{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T10:52:21Z","timestamp":1725706341981},"reference-count":16,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,6]]},"DOI":"10.1109\/icis.2016.7550875","type":"proceedings-article","created":{"date-parts":[[2016,8,25]],"date-time":"2016-08-25T20:57:40Z","timestamp":1472158660000},"page":"1-6","source":"Crossref","is-referenced-by-count":1,"title":["Evaluation of diagnosis support methods in program debugging by trace analysis: An exploratory study"],"prefix":"10.1109","author":[{"given":"Izuru","family":"Kume","sequence":"first","affiliation":[]},{"given":"Masahide","family":"Nakamura","sequence":"additional","affiliation":[]},{"given":"Yasuyuki","family":"Tanaka","sequence":"additional","affiliation":[]},{"given":"Etsuya","family":"Shibayama","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Why Programs Fail, Second Edition: A Guide to Systematic Debugging","year":"2009","author":"Zeller","key":"ref1"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.4018\/IJSI.2015070103"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597151"},{"key":"ref4","first-page":"592","article-title":"Practical object-oriented back-in-time debugger","volume-title":"ECOOP","author":"Lienhard"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227167"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1096-908X(199903\/04)11:2<73::AID-SMR187>3.0.CO;2-A"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1650"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/VISSOFT.2013.6650537"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368130"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/WPC.2003.1199201"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466418"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1997.624226"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1016\/S0167-6423(99)00036-2"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.116"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(98)10055-9"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/985692.985712"}],"event":{"name":"2016 IEEE\/ACIS 15th International Conference on Computer and Information Science (ICIS)","start":{"date-parts":[[2016,6,26]]},"location":"Okayama, Japan","end":{"date-parts":[[2016,6,29]]}},"container-title":["2016 IEEE\/ACIS 15th International Conference on Computer and Information Science (ICIS)"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/iel7\/7537873\/7550716\/07550875.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7537873\/7550716\/07550875.pdf?arnumber=7550875","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,24]],"date-time":"2024-01-24T00:41:09Z","timestamp":1706056869000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7550875\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,6]]},"references-count":16,"URL":"https:\/\/doi.org\/10.1109\/icis.2016.7550875","relation":{},"subject":[],"published":{"date-parts":[[2016,6]]}}}