{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T12:21:45Z","timestamp":1773231705365,"version":"3.50.1"},"reference-count":76,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,3,1]],"date-time":"2019-03-01T00:00:00Z","timestamp":1551398400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2019,3,1]]},"DOI":"10.1109\/tse.2017.2776912","type":"journal-article","created":{"date-parts":[[2017,11,23]],"date-time":"2017-11-23T19:10:10Z","timestamp":1511464210000},"page":"301-318","source":"Crossref","is-referenced-by-count":61,"title":["MSeer\u2014An Advanced Technique for Locating Multiple Bugs in Parallel"],"prefix":"10.1109","volume":"45","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-3258-689X","authenticated-orcid":false,"given":"Ruizhi","family":"Gao","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1021-4753","authenticated-orcid":false,"given":"W. Eric","family":"Wong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.41"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194011005505"},{"key":"ref71","year":"1998","journal-title":"?Suds User's Manual"},{"key":"ref70","year":"2013"},{"key":"ref76","article-title":"An Introduction to the Theory of Statistics","author":"yule","year":"1976","journal-title":"Arnold (New impression edition)"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/21.299710"},{"key":"ref39","author":"mardia","year":"1979","journal-title":"Multivariate Analysis"},{"key":"ref75","first-page":"924","article-title":"Does the failing test execute a single or multiple faults?: an approach to classifying failing tests","author":"yu","year":"2015","journal-title":"Proceedings of the International Conference on Software Engineering ICSE'94"},{"key":"ref38","first-page":"281","article-title":"Some methods for classification and analysis of multivariate observations","author":"macqueen","year":"0","journal-title":"Proc 5th Berkeley Symp Math Statistics Probability"},{"key":"ref33","first-page":"155","article-title":"A fast fuzzy C-means clustering for color image segmentation","volume":"9","author":"lin","year":"2011","journal-title":"Journal of Image and Graphics"},{"key":"ref32","article-title":"Genetic algorithm-based test generation for software product line with the integration of fault localization techniques","author":"li","year":"2016","journal-title":"Empirical Softw Eng"},{"key":"ref31","first-page":"177","article-title":"A learning-to-rank based fault localization approach using likely invariants","author":"le","year":"0","journal-title":"Proc Int Symp Software Testing Anal"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjjip.24.88"},{"key":"ref37","author":"lyman ott","year":"1993","journal-title":"An Introduction to Statistical Methods and Data Analysis"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642983"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.66"},{"key":"ref34","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1109\/TSE.2006.105","article-title":"Statistical debugging: A hypothesis testing-based approach","volume":"32","author":"liu","year":"2006","journal-title":"IEEE Trans Softw Eng"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1007\/BF00404650"},{"key":"ref62","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1016\/j.jss.2009.09.037","article-title":"A family of code coverage-based heuristics for effective fault localization","volume":"83","author":"wong","year":"2010","journal-title":"J Syst Softw"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(94)00098-0"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2285319"},{"key":"ref28","first-page":"733","article-title":"Diagnosing multiple persistent and intermittent faults","author":"de kleer","year":"0","journal-title":"Proc Int Joint Conf Artif Intell"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2011.2172031"},{"key":"ref27","first-page":"1990","author":"kendall","year":"0","journal-title":"Rank Correlation Methods"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2011.2118751"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.67"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931051"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2522920.2522924"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884834"},{"key":"ref69","first-page":"505","article-title":"Distance metric learning, with application to clustering with side-information","author":"xing","year":"0","journal-title":"Proc Adv Neural Inf Process Sys"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.25"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.06.035"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2014.29"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2013.6688893"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TIP.2016.2559803"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101949"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273468"},{"key":"ref26","first-page":"1454","article-title":"Comparison between K-mean and hierarchical algorithm using query redirection","volume":"3","author":"kaur","year":"2013","journal-title":"International Journal of Advanced Research in Computer Science and Software Engineering"},{"key":"ref25","author":"kaufman","year":"1990","journal-title":"Finding Groups in Data An Introduction to Cluster Analysis"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2012.28"},{"key":"ref51","year":"2013"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2521368"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(85)80054-7"},{"key":"ref57","year":"2016","journal-title":"National Vulnerability Database"},{"key":"ref56","year":"2016","journal-title":"National Vulnerability Database"},{"key":"ref55","first-page":"331","article-title":"Less vulnerable confidence and significance procedures for location based on a single sample: Trimming\/Winsorization 1","volume":"25","author":"tukey","year":"1963","journal-title":"STATA Journal"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1277741.1277894"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2016.31"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1037\/1082-989X.8.3.294"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2009.14"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1146"},{"key":"ref40","doi-asserted-by":"crossref","first-page":"608","DOI":"10.1109\/TSE.2006.83","article-title":"Using mutation analysis for assessing and comparing testing coverage criteria","volume":"32","author":"namin","year":"2006","journal-title":"IEEE Trans Softw Eng"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001446"},{"key":"ref13","first-page":"339","article-title":"Find failures by cluster analysis of execution profiles","author":"dickinson","year":"0","journal-title":"Proc 23rd Int Conf Softw Eng"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/BF02922904"},{"key":"ref15","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1109\/TSE.2006.92","article-title":"On the use of mutation faults in empirical assessments of test case prioritization techniques","volume":"32","author":"do","year":"2006","journal-title":"IEEE Trans Softw Eng"},{"key":"ref16","first-page":"226","article-title":"A density-based algorithm for discovering clusters in large spatial databases with noise","author":"ester","year":"0","journal-title":"Proc Int'l Conf Knowledge Discovery and Data Mining"},{"key":"ref17","year":"2016"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227169"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2307\/2346830"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831717"},{"key":"ref3","first-page":"402","article-title":"Is mutation anappropriate tool for testing experiments?","author":"andrews","year":"0","journal-title":"Proc Int Conf Softw Eng"},{"key":"ref6","first-page":"152","article-title":"A kernel density estimate-based approach to component goodness modeling","author":"cardoso","year":"0","journal-title":"Proc 27th AAAI Conf Artif Intell"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025136"},{"key":"ref8","doi-asserted-by":"crossref","first-page":"267","DOI":"10.3233\/IFS-1994-2306","article-title":"Fuzzy model identification based on cluster estimation","volume":"2","author":"chiu","year":"1994","journal-title":"J Intell Fuzzy Syst"},{"key":"ref7","first-page":"241","article-title":"Evaluation and comparison of clustering algorithms in analysing ES cell gene expression data","volume":"12","author":"chen","year":"2002","journal-title":"Statistica Sinica"},{"key":"ref49","year":"2016"},{"key":"ref9","year":"2016"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCB.2009.2019264"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001445"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1007\/s10732-006-7284-z"},{"key":"ref47","article-title":"A novel measure for evaluating and Oradeed list: Application in MicroRNA target prediction","author":"sengupta","year":"0","journal-title":"Proc Int'l Symp Biocomputing"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/227607.227610"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/2000791.2000795"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201224"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2983967"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/8666946\/08119545.pdf?arnumber=8119545","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,13]],"date-time":"2022-07-13T21:14:28Z","timestamp":1657746868000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8119545\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,3,1]]},"references-count":76,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tse.2017.2776912","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,3,1]]}}}