{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,13]],"date-time":"2026-01-13T01:51:22Z","timestamp":1768269082931,"version":"3.49.0"},"reference-count":36,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"7","license":[{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2020,7,1]],"date-time":"2020-07-01T00:00:00Z","timestamp":1593561600000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100018867","name":"Heinz Nixdorf Stiftung","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100018867","id-type":"DOI","asserted-by":"publisher"}]},{"name":"DFG"},{"DOI":"10.13039\/501100000038","name":"Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100000038","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2020,7,1]]},"DOI":"10.1109\/tse.2018.2868349","type":"journal-article","created":{"date-parts":[[2018,9,3]],"date-time":"2018-09-03T22:47:11Z","timestamp":1536014831000},"page":"697-709","source":"Crossref","is-referenced-by-count":12,"title":["Debugging Static Analysis"],"prefix":"10.1109","volume":"46","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3146-7968","authenticated-orcid":false,"given":"Lisa Nguyen Quang","family":"Do","sequence":"first","affiliation":[{"name":"Paderborn University, Paderborn, Germany"}]},{"given":"Stefan","family":"Kr\u00fcger","sequence":"additional","affiliation":[{"name":"Paderborn University, Paderborn, Germany"}]},{"given":"Patrick","family":"Hill","sequence":"additional","affiliation":[{"name":"Paderborn University, Paderborn, Germany"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-5516-1376","authenticated-orcid":false,"given":"Karim","family":"Ali","sequence":"additional","affiliation":[{"name":"University of Alberta, Edmonton, AB, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3470-3647","authenticated-orcid":false,"given":"Eric","family":"Bodden","sequence":"additional","affiliation":[{"name":"Paderborn University &#x0026; Fraunhofer IEM, Paderborn, Germany"}]}],"member":"263","reference":[{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2008.130"},{"key":"ref32","first-page":"151","article-title":"Designing the whyline: A debugging interface for asking questions about program behavior","author":"ko","year":"2004","journal-title":"Proc Conf Human Factors Comput Syst"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1512475.1512488"},{"key":"ref36","article-title":"Eclemma","year":"2018"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950304"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970347"},{"key":"ref10","article-title":"Eclipse","year":"2018"},{"key":"ref11","article-title":"Intellij","year":"2018"},{"key":"ref12","article-title":"Gdb: The gnu project debugger","year":"0"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"18","DOI":"10.1007\/3-540-46423-9_2","article-title":"Optimizing Java bytecode using the Soot framework: Is it feasible?","author":"vall","year":"2000","journal-title":"Proc 9th Int Conf Compiler Construction"},{"key":"ref14","article-title":"Debugging static analysis","author":"lisa","year":"2018"},{"key":"ref15","article-title":"The Encyclopedia of Human-Computer Interaction, 22. Card Sorting","author":"hudson","year":"2014"},{"key":"ref16","article-title":"Observer agreement paradoxes in 2 x 2 tables: Comparison of agreement measures","volume":"14","author":"viswanathan","year":"2014","journal-title":"BMC Medical Research Methodology"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.2307\/2529310"},{"key":"ref18","article-title":"Wala","year":"2018"},{"key":"ref19","article-title":"Llvm","year":"2018"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/3088515.3088521"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/567067.567084"},{"key":"ref27","first-page":"46","article-title":"The one number you need to grow","volume":"81","author":"reichheld","year":"2003","journal-title":"Harvard Business Rev"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/2259051.2259052"},{"key":"ref6","first-page":"2707","article-title":"Evaluating interactive support for secure programming","author":"xie","year":"2012","journal-title":"Proc Conf Human Factors Comput Syst"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591065"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.22"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1124772.1124831"},{"key":"ref7","first-page":"307","article-title":"Just-in-time static analysis","author":"lisa","year":"2017","journal-title":"Proc ACM SIGSOFT Int Symp Softw Testing Analysis"},{"key":"ref2","article-title":"Number of android applications","year":"2018"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.51"},{"key":"ref1","article-title":"How we fought bad apps and malicious developers in 2017","author":"blog","year":"2018"},{"key":"ref20","article-title":"Vim","year":"2018"},{"key":"ref22","article-title":"Debugging backwards in time","author":"lewis","year":"2003","journal-title":"CoRR"},{"key":"ref21","article-title":"Emacs","year":"2018"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSMC.1981.4308636"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-69149-5_18"},{"key":"ref26","article-title":"Ideal: Efficient and precise alias-aware dataflow analysis","author":"sp\u00e4th","year":"2017","journal-title":"Proc Int Conf Object-Oriented Program Lang Appl"},{"key":"ref25","article-title":"Graphstream","year":"2018"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/9141542\/08453858.pdf?arnumber=8453858","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,15]],"date-time":"2024-01-15T21:09:42Z","timestamp":1705352982000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8453858\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,7,1]]},"references-count":36,"journal-issue":{"issue":"7"},"URL":"https:\/\/doi.org\/10.1109\/tse.2018.2868349","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,7,1]]}}}