{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:46:08Z","timestamp":1729626368768,"version":"3.28.0"},"reference-count":34,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/icsm.2011.6080793","type":"proceedings-article","created":{"date-parts":[[2011,11,21]],"date-time":"2011-11-21T21:45:27Z","timestamp":1321911927000},"page":"263-272","source":"Crossref","is-referenced-by-count":4,"title":["Sahara: Guiding the debugging of failed software upgrades"],"prefix":"10.1109","author":[{"given":"Rekha","family":"Bachwani","sequence":"first","affiliation":[]},{"given":"Olivier","family":"Crameri","sequence":"additional","affiliation":[]},{"given":"Ricardo","family":"Bianchini","sequence":"additional","affiliation":[]},{"given":"Dejan","family":"Kostic","sequence":"additional","affiliation":[]},{"given":"Willy","family":"Zwaenepoel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref33","article-title":"Yesterday, my program worked. today it does not. why?","author":"zeller","year":"1999","journal-title":"ESEC"},{"key":"ref32","article-title":"Checking Inside the Black Box: Regression Testing Based on Value Spectra Differences","author":"xie","year":"2004","journal-title":"ICSM"},{"journal-title":"Data Mining Practical Machine Learning Tools and Techniques","year":"2005","author":"witten","key":"ref31"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.1002\/smr.4360070105","article-title":"Software Reconnaissance: Mapping Program Features to Code","volume":"7","author":"wilde","year":"1995","journal-title":"Journal of Software Maintenance Research and Practice"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587053"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1002\/1099-1689(200009)10:3<171::AID-STVR209>3.0.CO;2-J"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390652"},{"key":"ref12","article-title":"A Study of Cross-Validation and Bootstrap for Accuracy Estimation and Model Selection","author":"kohavi","year":"1995","journal-title":"IJCAI"},{"article-title":"Cooperative Bug Isolation","year":"2004","author":"liblit","key":"ref13"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/781147.781148"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065014"},{"key":"ref16","doi-asserted-by":"crossref","DOI":"10.1145\/1081706.1081753","article-title":"Sober: Statistical Model-based Bug Localization","author":"liu","year":"2005","journal-title":"ESEC"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/940071.940110"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24851-4_20"},{"key":"ref19","article-title":"Snitch: Interactive Decision Trees for Troubleshooting Misconfizurations","author":"mickens","year":"2007","journal-title":"SvsML"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294275"},{"journal-title":"X forwarding will not start when a command is executed in background","year":"0","key":"ref4"},{"journal-title":"SQLite Home Page","year":"0","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080793"},{"key":"ref6","article-title":"Scalability of Linux Event-Dispatch Mechanisms","author":"chandra","year":"2001","journal-title":"USENIX ATC"},{"key":"ref29","article-title":"Automatic Misconfiguration Troubleshooting with PeerPressure","author":"wang","year":"2004","journal-title":"OSDI"},{"journal-title":"Connection aborted on large data - R transfer","year":"0","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294283"},{"key":"ref7","article-title":"Locating Causes of Program Failures","author":"cleve","year":"2005","journal-title":"ICSE"},{"key":"ref2","article-title":"Automating Configuration Troubleshooting With Dynamic Information Flow Analysis","author":"attariyan","year":"2010","journal-title":"OSDI"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629586"},{"journal-title":"Compilers Principles Practices and Techniaues","year":"0","author":"aho","key":"ref1"},{"key":"ref20","article-title":"Cil: Intermediate Language and Tools for Analysis and Transformation of C Programs","author":"necula","year":"2002","journal-title":"CC"},{"journal-title":"OpenSSH release dates","year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.1997.625082"},{"journal-title":"ProxyCommand not working if $SHELL not defined","year":"0","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566182"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/BF00116251"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/1095810.1095833"}],"event":{"name":"2011 IEEE 27th International Conference on Software Maintenance (ICSM)","start":{"date-parts":[[2011,9,25]]},"location":"Williamsburg, VA, USA","end":{"date-parts":[[2011,9,30]]}},"container-title":["2011 27th IEEE International Conference on Software Maintenance (ICSM)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6068277\/6080759\/06080793.pdf?arnumber=6080793","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,19]],"date-time":"2019-06-19T22:38:06Z","timestamp":1560983886000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6080793\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":34,"URL":"https:\/\/doi.org\/10.1109\/icsm.2011.6080793","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}