{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T13:24:40Z","timestamp":1730294680689,"version":"3.28.0"},"reference-count":48,"publisher":"IEEE","license":[{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,2,1]],"date-time":"2020-02-01T00:00:00Z","timestamp":1580515200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020,2]]},"DOI":"10.1109\/saner48275.2020.9054791","type":"proceedings-article","created":{"date-parts":[[2020,4,3]],"date-time":"2020-04-03T07:47:32Z","timestamp":1585900052000},"page":"552-556","source":"Crossref","is-referenced-by-count":3,"title":["A Reflection on \u201cAn Exploratory Study on Exception Handling Bugs in Java Programs\u201d"],"prefix":"10.1109","author":[{"given":"Felipe","family":"Ebert","sequence":"first","affiliation":[]},{"given":"Fernando","family":"Castor","sequence":"additional","affiliation":[]},{"given":"Alexander","family":"Serebrenik","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Cooperative software development","year":"0","author":"ko","key":"ref39"},{"key":"ref38","article-title":"Triple agent: Monitoring, perturbation and failure-obliviousness for automated resilience improvement in java applications","volume":"abs 1812 10706","author":"zhang","year":"2018","journal-title":"CoRR"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330228"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338938"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WAPI.2017.5"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00040"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2019.8668001"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS2018.2018.00019"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2017.8103451"},{"key":"ref34","first-page":"23","article-title":"Avaliando o tratamento de excecao em &#x00B5;m sistema web corporativo: Um estudo de caso","author":"de sousa","year":"2017","journal-title":"Anais Estendidos do XXIII Simposio Brasileiro de Sistemas Multimidia e Web"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2012.24"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2019.00010"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2015.04.066"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.69"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3267183.3267191"},{"key":"ref14","article-title":"A catalogue of java exception handling bad smells and refactorings","author":"coelho","year":"2018","journal-title":"Conference on Pattern Languages of Programs (PLoP)"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.1"},{"key":"ref16","first-page":"11","article-title":"Revisiting exception handling practices with exception flow analysis","author":"p\u00e1dua","year":"2017","journal-title":"SCAM"},{"key":"ref17","doi-asserted-by":"crossref","first-page":"564","DOI":"10.1145\/3196398.3196435","article-title":"Studying the relationship between exception handling practices and post-release defects","author":"de p\u00e1dua","year":"2018","journal-title":"MSR"},{"journal-title":"Studying and assisting the practice of java and c# exception handling","year":"2018","author":"de p\u00e1dua","key":"ref18"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2901739.2901757"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884644"},{"journal-title":"Exception Handling The Case Against","year":"1982","author":"black","key":"ref4"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-65831-5_5"},{"key":"ref3","first-page":"437","article-title":"Response to undesired events in software systems","author":"parnas","year":"1976","journal-title":"ICSE"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/941566.941569"},{"journal-title":"Recommendation of exception handling code in mobile app development","year":"2019","author":"nguyen","key":"ref29"},{"key":"ref5","article-title":"Exception handling: A false sense of security","volume":"6","author":"cargill","year":"1994","journal-title":"C++ Report"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.7"},{"key":"ref7","first-page":"10","article-title":"Analysing exception usage in large Java applications","author":"reimer","year":"0","journal-title":"Proceedings of ECOOP Workshop on Exception Handling in Object-Oriented Systems"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/800022.808315"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2024445.2024456"},{"key":"ref1","first-page":"42","article-title":"A recovery mechanism for modular software","author":"cristian","year":"1979","journal-title":"ICSE"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/3299771.3299785"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2506164"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227157"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2019.00066"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/2973839.2973843"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180222"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.10.032"},{"key":"ref42","first-page":"230","article-title":"Exception-chain analysis: Revealing exception handling architecture in java server applications","author":"fu","year":"2007","journal-title":"ICSE"},{"key":"ref24","first-page":"21","article-title":"The use of c++ exception handling constructs: A comprehensive study","author":"bonifacio","year":"2015","journal-title":"SCAM"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572274"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3182539"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1330017.1330019"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3196398.3196428"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380231007"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.134"}],"event":{"name":"2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)","start":{"date-parts":[[2020,2,18]]},"location":"London, ON, Canada","end":{"date-parts":[[2020,2,21]]}},"container-title":["2020 IEEE 27th International Conference on Software Analysis, Evolution and Reengineering (SANER)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/9040394\/9054788\/09054791.pdf?arnumber=9054791","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,6,28]],"date-time":"2022-06-28T21:52:51Z","timestamp":1656453171000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9054791\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,2]]},"references-count":48,"URL":"https:\/\/doi.org\/10.1109\/saner48275.2020.9054791","relation":{},"subject":[],"published":{"date-parts":[[2020,2]]}}}