{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:14:04Z","timestamp":1759032844158,"version":"3.37.3"},"reference-count":47,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"am","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2017,8,1]],"date-time":"2017-08-01T00:00:00Z","timestamp":1501545600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61303053","61402445","61402303","61521092"],"award-info":[{"award-number":["61303053","61402445","61402303","61521092"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"National High Technology Research and Development Program of China","award":["2015AA011505"],"award-info":[{"award-number":["2015AA011505"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation of United States","doi-asserted-by":"publisher","award":["1533822"],"award-info":[{"award-number":["1533822"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2017,8,1]]},"DOI":"10.1109\/tse.2016.2632122","type":"journal-article","created":{"date-parts":[[2016,11,23]],"date-time":"2016-11-23T20:20:52Z","timestamp":1479932452000},"page":"760-776","source":"Crossref","is-referenced-by-count":10,"title":["Locating Software Faults Based on Minimum Debugging Frontier Set"],"prefix":"10.1109","volume":"43","author":[{"given":"Feng","family":"Li","sequence":"first","affiliation":[]},{"given":"Zhiyuan","family":"Li","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Huo","sequence":"additional","affiliation":[]},{"given":"Xiaobing","family":"Feng","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101949"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368130"},{"key":"ref33","first-page":"319","article-title":"Precise\n dynamic slicing algorithms","author":"zhang","year":"0","journal-title":"Proc 25th Int Conf Softw Eng"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/93542.93576"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-5939-6_17"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390654"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/318774.319248"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/229000.226310"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134002"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/115372.115320"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065014"},{"key":"ref11","first-page":"324","article-title":"Experimental study of minimum cut algorithms","author":"chekuri","year":"0","journal-title":"Proc 8th Annu ACM-SIAM Symp Discrete Algorithms"},{"key":"ref12","first-page":"1","article-title":"Effective fault localization based on minimum debugging frontier set","author":"li","year":"0","journal-title":"Proc Int l Symp Code Generations and Optimization"},{"key":"ref13","first-page":"168","article-title":"A tool for\n checking ANSI-C programs","author":"clarje","year":"0","journal-title":"Proc Int Conf Tools Algorithms Construct Anal Syst"},{"year":"0","key":"ref14"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321746"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884807"},{"year":"0","key":"ref17"},{"year":"0","key":"ref18"},{"year":"0","key":"ref19"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1509"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985811"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.159"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390652"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606573"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.28"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993550"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273489"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/77606.77608"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134324"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/HICSS.1991.183985"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2005.1553577"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491449"},{"year":"0","key":"ref20"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572290"},{"year":"0","key":"ref22"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610400"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.69"},{"key":"ref42","first-page":"255","article-title":"Adaptive bug isolation","author":"nainar","year":"0","journal-title":"Proc 32nd ACM\/IEEE Int Conf Softw Eng"},{"key":"ref24","first-page":"213","article-title":"CIL: Intermediate language and tools for\n analysis and transformation of C programs","author":"necula","year":"0","journal-title":"Proc 11th Int Conf Compiler Construct"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081753"},{"key":"ref23","first-page":"87","article-title":"Symbolic execution of program paths involving pointer and\n structure variables","author":"zhang","year":"0","journal-title":"Proc 4th Int Conf Quality Softw"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831717"},{"key":"ref26","first-page":"253","article-title":"Yesterday, my program worked. Today, it does not. Why?","author":"zeller","year":"0","journal-title":"Proc of the 6th ACM SIGSOFT Intl Symp on Foundations of software engineering"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025136"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587053"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/ieeexplore.ieee.org\/ielaam\/32\/8008872\/7755837-aam.pdf","content-type":"application\/pdf","content-version":"am","intended-application":"syndication"},{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/8008872\/07755837.pdf?arnumber=7755837","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,4,8]],"date-time":"2022-04-08T18:48:20Z","timestamp":1649443700000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7755837\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,1]]},"references-count":47,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tse.2016.2632122","relation":{},"ISSN":["0098-5589","1939-3520"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"}],"subject":[],"published":{"date-parts":[[2017,8,1]]}}}