{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,21]],"date-time":"2026-04-21T14:50:22Z","timestamp":1776783022257,"version":"3.51.2"},"reference-count":77,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2024,3,1]],"date-time":"2024-03-01T00:00:00Z","timestamp":1709251200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100012166","name":"National Key Research and Development Program of China","doi-asserted-by":"publisher","award":["2022YFB4501902"],"award-info":[{"award-number":["2022YFB4501902"]}],"id":[{"id":"10.13039\/501100012166","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62202040"],"award-info":[{"award-number":["62202040"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62161146003"],"award-info":[{"award-number":["62161146003"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"ZTE Industry-University-Institute Cooperation Funds","award":["HC-CN-20210319008"],"award-info":[{"award-number":["HC-CN-20210319008"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2024,3]]},"DOI":"10.1109\/tse.2024.3359969","type":"journal-article","created":{"date-parts":[[2024,1,30]],"date-time":"2024-01-30T18:46:15Z","timestamp":1706640375000},"page":"618-635","source":"Crossref","is-referenced-by-count":8,"title":["Accelerating Patch Validation for Program Repair With Interception-Based Execution Scheduling"],"prefix":"10.1109","volume":"50","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-5673-3831","authenticated-orcid":false,"given":"Yuan-An","family":"Xiao","sequence":"first","affiliation":[{"name":"Key Laboratory of High Confidence Software Technologies (Peking University), Ministry of Education, School of Computer Science, Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5016-7296","authenticated-orcid":false,"given":"Chenyang","family":"Yang","sequence":"additional","affiliation":[{"name":"Peking University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-7944-9182","authenticated-orcid":false,"given":"Bo","family":"Wang","sequence":"additional","affiliation":[{"name":"School of Computer and Information Technology, Beijing Jiaotong University, Beijing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8991-747X","authenticated-orcid":false,"given":"Yingfei","family":"Xiong","sequence":"additional","affiliation":[{"name":"Key Laboratory of High Confidence Software Technologies (Peking University), Ministry of Education, School of Computer Science, Peking University, Beijing, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2016.76"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330577"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070536"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180247"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.24"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606626"},{"issue":"5","key":"ref7","first-page":"427","article-title":"Automated fixing of programs with contracts","volume-title":"Proc. 19th Int. Symp. Softw. Testing Anal.","volume":"40","author":"Wei","year":"2010"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468544"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2021.3071086"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00039"},{"key":"ref11","first-page":"41","article-title":"Precfix: Large-scale patch recommendation by mining defect-patch pairs","volume-title":"Proc. 42nd Int. Conf. Softw. Eng.: Softw. Eng. Pract.","author":"Zhang","year":"2020"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510040"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME52107.2021.00028"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-013-9208-0"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/3368089.3417929"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.104"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380338"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693094"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115674"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3241980"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180245"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE43902.2021.00104"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/3361242.3361245"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2018.00031"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.29"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330559"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468600"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/1830483.1830654"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.37"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/154183.154265"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100138"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568248"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483782"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610388"},{"key":"ref35","article-title":"The replication package for ExpressAPR","author":"Xiao","year":"2024"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1016\/bs.adcom.2018.03.015"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2019.07.100"},{"key":"ref39","article-title":"Mutation testing systems for Java compared","author":"Coles","year":"2021"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.308"},{"key":"ref41","doi-asserted-by":"crossref","DOI":"10.21236\/ADA071795","article-title":"Heuristics for determining equivalence of program mutations","author":"Baldwin","year":"1979"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.103"},{"key":"ref43","article-title":"Using constraints to detect equivalent mutants","author":"Pan","year":"1994"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1002\/stv.430"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595750"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/32.90444"},{"key":"ref47","first-page":"257","article-title":"Mutation testing of software using a MIMD computer","volume-title":"Proc. Int. Conf. Parallel Process. (ICPP)","author":"Offutt","year":"1992"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2016.18"},{"key":"ref49","first-page":"740","article-title":"Topsy-Turvy: A smarter and faster parallelization of mutation analysis","volume-title":"Proc. Int. Conf. Softw. Eng.","author":"Gopinath","year":"2016"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092714"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ASE51524.2021.9678827"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3276487"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3264837"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.4370040104"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2809496"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1982.235571"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/32.286422"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(94)00098-0"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1993.346062"},{"key":"ref60","first-page":"422","article-title":"A novel method of mutation clustering based on domain analysis","volume-title":"Proc. 21st Int. Conf. Softw. Eng. Knowl. Eng. (SEKE)","volume":"9","author":"Ji","year":"2009"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771784"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/504311.504305"},{"key":"ref63","article-title":"Software Foundations, 2010","author":"Pierce","year":"2024"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1640089.1640108"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/1646353.1646374"},{"issue":"3","key":"ref66","first-page":"88","article-title":"Feedback-aware anomaly detection through logs for large-scale software systems","volume":"19","author":"Han","year":"2021","journal-title":"ZTE Commun."},{"issue":"3","key":"ref67","first-page":"85","article-title":"Approach to anomaly detection in microservice system with multi-source data streams","volume":"20","author":"Zhang","year":"2022","journal-title":"ZTE Commun."},{"key":"ref68","article-title":"The Java(R) language specification: Java SE","author":"Gosling","year":"2024"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213871"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3487570"},{"key":"ref72","article-title":"IntroClassJava: A benchmark of 297 small and buggy Java programs","author":"Durieux","year":"2016"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/3533767.3534368"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180182"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837617"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3404362"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/APR52552.2021.00009"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/10473597\/10417068.pdf?arnumber=10417068","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,26]],"date-time":"2024-03-26T13:53:29Z","timestamp":1711461209000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10417068\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,3]]},"references-count":77,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tse.2024.3359969","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2024,3]]}}}