{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T18:10:07Z","timestamp":1749060607194,"version":"3.41.0"},"reference-count":43,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"2","license":[{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,6,1]],"date-time":"2025-06-01T00:00:00Z","timestamp":1748736000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62172195"],"award-info":[{"award-number":["62172195"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2025,6]]},"DOI":"10.1109\/tr.2024.3441319","type":"journal-article","created":{"date-parts":[[2024,8,26]],"date-time":"2024-08-26T17:26:48Z","timestamp":1724693208000},"page":"2693-2707","source":"Crossref","is-referenced-by-count":0,"title":["A Two-Stage Algorithm for Identifying Software Failure Regions"],"prefix":"10.1109","volume":"74","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-8178-1205","authenticated-orcid":false,"given":"Chengying","family":"Mao","sequence":"first","affiliation":[{"name":"School of Software and IoT Engineering, Jiangxi University of Finance and Economics, Nanchang, China"}]},{"given":"Zheng","family":"Zhu","sequence":"additional","affiliation":[{"name":"School of Software Technology, Zhejiang University, Ningbo, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3578-0994","authenticated-orcid":false,"given":"Tsong Yueh","family":"Chen","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Software Engineering, Swinburne University of Technology, Hawthorn, VIC, Australia"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0877-4353","authenticated-orcid":false,"given":"Dave","family":"Towey","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Nottingham Ningbo China, Ningbo, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3003-8176","authenticated-orcid":false,"given":"Linlin","family":"Wen","sequence":"additional","affiliation":[{"name":"School of Software and IoT Engineering, Jiangxi University of Finance and Economics, Nanchang, China"}]},{"given":"Jifu","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Software and IoT Engineering, Jiangxi University of Finance and Economics, Nanchang, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1017\/9781316771273"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111518"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(01)00028-0"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.1997.625061"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/581396.581397"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2011.88"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/3019612.3019831"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/32.153381"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/503209.503243"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.03.058"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397349"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/0951-8320(91)90052-9"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2004.7"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1295074.1295091"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.99"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2022.111452"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.02.022"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2911593"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2018.2866040"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.7763\/LNSE.2013.V1.63"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.7763\/LNSE.2014.V2.145"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/TETCI.2020.3013713"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2942921"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.37"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/32.57623"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/32.536956"},{"article-title":"The identification of software failure regions","year":"1990","author":"Bolchoz","key":"ref27"},{"article-title":"Analytical derivation of software failure regions","year":"1991","author":"Shimeall","key":"ref28"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2018.00039"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE55969.2022.00056"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1007\/11527503_26"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2011.31"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/SANER53432.2022.00072"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2844259"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/QRS-C57518.2022.00083"},{"key":"ref36","first-page":"177","article-title":"Efficiently finding minimal failing input in MapReduce programs","volume-title":"Proc. 40th Int. Conf. Softw. Eng. Companion","author":"Ayub","year":"2018"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111043"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380362"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30502-6_23"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1016\/s0003-2670(00)82860-3"},{"volume-title":"Collected Algorithms From ACM","year":"1980","key":"ref41"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1108\/dta-03-2020-0073"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/24\/11023008\/10646213.pdf?arnumber=10646213","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,4]],"date-time":"2025-06-04T17:56:17Z","timestamp":1749059777000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10646213\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,6]]},"references-count":43,"journal-issue":{"issue":"2"},"URL":"https:\/\/doi.org\/10.1109\/tr.2024.3441319","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"type":"print","value":"0018-9529"},{"type":"electronic","value":"1558-1721"}],"subject":[],"published":{"date-parts":[[2025,6]]}}}