{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T01:21:27Z","timestamp":1771982487626,"version":"3.50.1"},"reference-count":15,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/issrew.2013.6688894","type":"proceedings-article","created":{"date-parts":[[2014,1,3]],"date-time":"2014-01-03T18:44:26Z","timestamp":1388774666000},"page":"144-149","source":"Crossref","is-referenced-by-count":1,"title":["Program behavior characterization and clustering: An empirical study for failure clustering"],"prefix":"10.1109","author":[{"given":"Danqing","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Jianhui","family":"Jiang","sequence":"additional","affiliation":[]},{"given":"Linbo","family":"Chen","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"15","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.113"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/83.491343"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(01)00108-6"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/j.patrec.2004.09.016"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080767"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181782"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(89)90039-3"},{"key":"10","first-page":"79","article-title":"On information and sufficiency","author":"kull","year":"1951","journal-title":"Annals of Mathematical Statistics"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/12.142682"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273468"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2001.919107"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/310663.310667"},{"key":"9","first-page":"603","article-title":"Testing for software vulnerability using environment perturbation","author":"du","year":"2000","journal-title":"Proceedings of International Conference on Dependable Systems and Networks"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201224"}],"event":{"name":"2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)","location":"Pasadena, CA, USA","start":{"date-parts":[[2013,11,4]]},"end":{"date-parts":[[2013,11,7]]}},"container-title":["2013 IEEE International Symposium on Software Reliability Engineering Workshops (ISSREW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6679593\/6688826\/06688894.pdf?arnumber=6688894","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,10,14]],"date-time":"2020-10-14T15:53:56Z","timestamp":1602690836000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6688894"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":15,"URL":"https:\/\/doi.org\/10.1109\/issrew.2013.6688894","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}