{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,6]],"date-time":"2026-04-06T16:53:51Z","timestamp":1775494431065,"version":"3.50.1"},"reference-count":427,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2016,8,1]],"date-time":"2016-08-01T00:00:00Z","timestamp":1470009600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2016,8,1]]},"DOI":"10.1109\/tse.2016.2521368","type":"journal-article","created":{"date-parts":[[2016,1,25]],"date-time":"2016-01-25T19:10:08Z","timestamp":1453749008000},"page":"707-740","source":"Crossref","is-referenced-by-count":849,"title":["A Survey on Software Fault Localization"],"prefix":"10.1109","volume":"42","author":[{"given":"W. Eric","family":"Wong","sequence":"first","affiliation":[]},{"given":"Ruizhi","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Yihao","family":"Li","sequence":"additional","affiliation":[]},{"given":"Rui","family":"Abreu","sequence":"additional","affiliation":[]},{"given":"Franz","family":"Wotawa","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref275","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70722"},{"key":"ref274","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2013.38"},{"key":"ref277","article-title":"Heuristics for automatic localization of software faults","author":"pan","year":"1992"},{"key":"ref276","article-title":"Software debugging with dynamic instrumentation and test-based knowledge","author":"pan","year":"1993"},{"key":"ref271","article-title":"On the use of constraints in automated program debugging &#x2013; from foundations to empirical results","author":"nica","year":"2010"},{"key":"ref270","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606623"},{"key":"ref170","doi-asserted-by":"publisher","DOI":"10.1145\/1596495.1596502"},{"key":"ref273","doi-asserted-by":"publisher","DOI":"10.1145\/2000799.2000801"},{"key":"ref272","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1142"},{"key":"ref172","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390652"},{"key":"ref171","article-title":"Dynamic state alteration techniques for automatically locating software errors","author":"jeffrey","year":"2009"},{"key":"ref174","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2009.5090029"},{"key":"ref173","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2009.5306303"},{"key":"ref176","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2011.37"},{"key":"ref175","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2010.64"},{"key":"ref178","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.01.006"},{"key":"ref177","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.10.001"},{"key":"ref168","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2008.44"},{"key":"ref169","first-page":"252","article-title":"Toward model-based debugging of spreadsheet programs","author":"jannach","year":"0","journal-title":"Proc Knowledge-Based Software Eng Conf"},{"key":"ref267","doi-asserted-by":"publisher","DOI":"10.1145\/2000791.2000795"},{"key":"ref268","doi-asserted-by":"crossref","first-page":"608","DOI":"10.1109\/TSE.2006.83","article-title":"Using mutation analysis for assessing and comparing testing coverage criteria","volume":"32","author":"namin","year":"2006","journal-title":"IEEE Trans Softw Eng"},{"key":"ref269","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-88582-5_51"},{"key":"ref288","author":"pearl","year":"2000","journal-title":"Causality Models Reasoning and Inference"},{"key":"ref287","first-page":"1335","article-title":"RADAR: A tool for debugging regression problems in C\/C++ software","author":"pastore","year":"0","journal-title":"Proc Int Conf Softw Eng"},{"key":"ref286","article-title":"Automatic diagnosis of software functional faults by means of inferred behavioral models","author":"pastore","year":"2010"},{"key":"ref285","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001445"},{"key":"ref181","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993550"},{"key":"ref284","article-title":"Effective fault localization techniques for concurrent software","author":"park","year":"2014"},{"key":"ref180","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-22110-1_40"},{"key":"ref283","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2492395"},{"key":"ref282","first-page":"25","article-title":"CTrigger: Exposing atomicity violation bugs from their hiding places","author":"park","year":"0","journal-title":"Proc Int Conf Architectural Support Program Language"},{"key":"ref281","first-page":"1","article-title":"Spreadsheet errors: What we know. What we think we can do","author":"panko","year":"0","journal-title":"Proc EuSpRIG"},{"key":"ref185","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101949"},{"key":"ref280","article-title":"Sarbanes-Oxley: What about all the spreadsheets?","author":"panko","year":"0","journal-title":"CoRR"},{"key":"ref184","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273468"},{"key":"ref183","article-title":"Semi-automatic fault localization","author":"jones","year":"2008"},{"key":"ref182","article-title":"Spectral debugging","author":"lee","year":"2011"},{"key":"ref189","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568258"},{"key":"ref188","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.11.1109"},{"key":"ref187","doi-asserted-by":"publisher","DOI":"10.1145\/581396.581397"},{"key":"ref186","first-page":"71","article-title":"Visualization for fault localization","author":"jones","year":"0","journal-title":"Proc Workshop Softw Vis 23rd Int Conf Softw Eng"},{"key":"ref179","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483763"},{"key":"ref278","first-page":"8","article-title":"Facing the problem of spreadsheet errors","volume":"37","author":"panko","year":"2006","journal-title":"Decision Line"},{"key":"ref279","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1999.11518250"},{"key":"ref293","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201224"},{"key":"ref292","article-title":"Dynamic code coverage with progressive detail levels","author":"perez","year":"2012"},{"key":"ref295","article-title":"Semantic analyses to detect and localize software regression errors","author":"qi","year":"2013"},{"key":"ref294","first-page":"273","article-title":"Automated fault localization using potential invariants","author":"pytlik","year":"0","journal-title":"Proc Int Workshop Autom Debugging"},{"key":"ref297","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1363861"},{"key":"ref296","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483785"},{"key":"ref299","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2013.18"},{"key":"ref298","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985451"},{"key":"ref154","first-page":"593","article-title":"Theory of the back-propagation neural network","author":"hecht-nielsen","year":"0","journal-title":"Proc Int Joint Conf Neural Netw"},{"key":"ref153","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24721-0_20"},{"key":"ref156","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985855"},{"key":"ref155","doi-asserted-by":"publisher","DOI":"10.1145\/357172.357173"},{"key":"ref150","first-page":"156","article-title":"Low-overhead memory leak detection using adaptive statistical profiling","author":"hauswirth","year":"0","journal-title":"Proc 6th Int Conf Archit Support Program Lang Oper Syst"},{"key":"ref152","first-page":"267","article-title":"Automated debugging using path-based weakest preconditions","author":"he","year":"0","journal-title":"Proc 8th Int Conf Fundam Approaches Softw Eng"},{"key":"ref291","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.12.036"},{"key":"ref151","article-title":"A fault-based model of fault localization techniques","author":"hays","year":"2014"},{"key":"ref290","doi-asserted-by":"publisher","DOI":"10.1109\/MDT.2006.5"},{"key":"ref146","first-page":"683","article-title":"Eliminating harmful redundancy for testing-based fault localization using test suite reduction: An experimental study","author":"hao","year":"0","journal-title":"Proc Int Conf Softw Maintenance"},{"key":"ref147","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2010.31"},{"key":"ref148","doi-asserted-by":"publisher","DOI":"10.1145\/1868048.1868049"},{"key":"ref149","doi-asserted-by":"publisher","DOI":"10.1002\/1099-1689(200009)10:3<171::AID-STVR209>3.0.CO;2-J"},{"key":"ref289","article-title":"Automated source-level debugging of synthesizable VHDL designs","author":"peischl","year":"2004"},{"key":"ref167","doi-asserted-by":"crossref","DOI":"10.5353\/th_b3883803","article-title":"Automated fault localization: A statistical predicate analysis approach","author":"hu","year":"2006"},{"key":"ref166","article-title":"Simple and effective static analysis to find bugs","author":"hovemeyer","year":"2005"},{"key":"ref165","first-page":"420","article-title":"Spectrum enhanced dynamic slicing for better fault localization","author":"hofer","year":"0","journal-title":"Proc Eur Conf Artif Intell"},{"key":"ref164","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37057-1_6"},{"key":"ref163","article-title":"From fault localization of programs written in 3rd level language to spreadsheets","author":"hofer","year":"2013"},{"key":"ref162","first-page":"79","article-title":"Metrics-based spreadsheet visualization: Support for focused maintenance","author":"hodnigg","year":"0","journal-title":"Proc EuSpRIG Conf Pursuit of Spreadsheet Excellence"},{"key":"ref161","doi-asserted-by":"publisher","DOI":"10.1145\/1538942.1538944"},{"key":"ref160","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.45"},{"key":"ref159","doi-asserted-by":"publisher","DOI":"10.1145\/1151695.1151696"},{"key":"ref157","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227171"},{"key":"ref158","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606575"},{"key":"ref197","article-title":"Extended modeling for automated fault localization in object-oriented software","author":"kob","year":"2005"},{"key":"ref198","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41707-8_16"},{"key":"ref199","article-title":"Fault localization in backbone networks","author":"kompella","year":"2007"},{"key":"ref193","first-page":"733","article-title":"Diagnosing multiple persistent and intermittent faults","author":"de kleer","year":"0","journal-title":"Proc Int Joint Conf Artif Intell"},{"key":"ref194","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(87)90063-4"},{"key":"ref195","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368130"},{"key":"ref196","first-page":"833","article-title":"Introducing alias information into model-based debugging","author":"kob","year":"0","journal-title":"Proc Eur Conf Artif Intell"},{"key":"ref190","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-93900-9_18"},{"key":"ref191","first-page":"346","article-title":"Empirical evaluation of existing algorithms of spectrum based fault localization","author":"kim","year":"0","journal-title":"Int Conf Inf Netw"},{"key":"ref192","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-005-1751-x"},{"key":"ref200","first-page":"91","article-title":"Automated error localization and correction for imperative programs","author":"k\u00f6nighofer","year":"0","journal-title":"Proc Int Conf Formal Methods Comput -Aided Des"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2001.919107"},{"key":"ref100","first-page":"310","article-title":"Automated software testing using a meta-heuristic technique based on Tabu search","author":"diaz","year":"0","journal-title":"Proc Conf Automated Software Eng"},{"key":"ref209","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.42"},{"key":"ref409","first-page":"502","article-title":"Efficient forward computation of dynamic slices using reduced ordered binary decision diagrams","author":"zhang","year":"0","journal-title":"Proc Int Conf Softw Eng"},{"key":"ref407","doi-asserted-by":"publisher","DOI":"10.1002\/spe.795"},{"key":"ref408","first-page":"319","article-title":"Precise dynamic slicing algorithms","author":"zhang","year":"0","journal-title":"Proc Int Conf Softw Eng"},{"key":"ref405","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134324"},{"key":"ref203","doi-asserted-by":"publisher","DOI":"10.1109\/WST.1988.5350"},{"key":"ref406","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-006-9007-3"},{"key":"ref204","doi-asserted-by":"publisher","DOI":"10.1145\/186258.186514"},{"key":"ref403","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591099"},{"key":"ref201","doi-asserted-by":"publisher","DOI":"10.1109\/32.6169"},{"key":"ref404","article-title":"Secure and efficient network fault localization","author":"zhang","year":"2012"},{"key":"ref202","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(88)90054-3"},{"key":"ref401","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"ref207","doi-asserted-by":"publisher","DOI":"10.1023\/A:1014823126938"},{"key":"ref402","author":"zeller","year":"2006","journal-title":"Why Programs Fail A Guide to Systematic Debugging"},{"key":"ref208","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.20"},{"key":"ref205","doi-asserted-by":"publisher","DOI":"10.1023\/B:SQJO.0000039792.93414.a5"},{"key":"ref400","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587053"},{"key":"ref206","article-title":"Data-driven methods for fault localization in process technology","author":"kuhnert","year":"2013"},{"key":"ref211","doi-asserted-by":"publisher","DOI":"10.1109\/3477.809023"},{"key":"ref210","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.52"},{"key":"ref418","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2011.16"},{"key":"ref419","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2012.185"},{"key":"ref414","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.207"},{"key":"ref212","first-page":"501","article-title":"Study of the relationship of bug consistency with respect to performance of spectra metrics","author":"lee","year":"0","journal-title":"Proc Int Conf Comput Inf Technol"},{"key":"ref415","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.09.041"},{"key":"ref213","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2010.26"},{"key":"ref416","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.12.048"},{"key":"ref214","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.9"},{"key":"ref417","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595705"},{"key":"ref215","doi-asserted-by":"publisher","DOI":"10.2307\/2025310"},{"key":"ref410","doi-asserted-by":"publisher","DOI":"10.1145\/1085130.1085135"},{"key":"ref216","author":"lewis","year":"1973","journal-title":"Counterfactuals"},{"key":"ref411","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250782"},{"key":"ref217","first-page":"23","article-title":"Effective fault localization based on minimum debugging frontier set","author":"li","year":"0","journal-title":"Proc Int Symp Code Gener Optimization"},{"key":"ref412","article-title":"Fault Localization via precise dynamic slicing","author":"zhang","year":"2007"},{"key":"ref218","doi-asserted-by":"publisher","DOI":"10.1109\/ICCIS.2012.361"},{"key":"ref413","article-title":"Software debugging through dynamic analysis of program structures","author":"zhang","year":"2009"},{"key":"ref219","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(96)01149-4"},{"key":"ref420","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2009.06.013"},{"key":"ref220","doi-asserted-by":"publisher","DOI":"10.1145\/567793.567796"},{"key":"ref222","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065014"},{"key":"ref221","article-title":"Cooperative bug isolation","author":"liblit","year":"2004"},{"key":"ref229","article-title":"Understanding, detecting, and exposing concurrency bugs","author":"lu","year":"2008"},{"key":"ref228","doi-asserted-by":"crossref","DOI":"10.14711\/thesis-b1487578","article-title":"Automated analysis of energy efficiency and performance for mobile application","author":"liu","year":"2015"},{"key":"ref227","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2007.4362658"},{"key":"ref226","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.66"},{"key":"ref225","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611972757.26"},{"key":"ref224","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181782"},{"key":"ref223","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1109\/TSE.2006.105","article-title":"Statistical debugging: A hypothesis testing-based approach","volume":"32","author":"liu","year":"2006","journal-title":"IEEE Trans Softw Eng"},{"key":"ref127","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982489"},{"key":"ref126","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2010.28"},{"key":"ref125","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2012.22"},{"key":"ref124","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2012.89"},{"key":"ref129","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351683"},{"key":"ref128","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100153"},{"key":"ref130","doi-asserted-by":"publisher","DOI":"10.1109\/VISSOFT.2013.6650539"},{"key":"ref133","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.12.032"},{"key":"ref134","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.421"},{"key":"ref131","article-title":"Logic programs for consistency-based diagnosis","author":"gregory","year":"1994"},{"key":"ref132","article-title":"Debugging software: From verification to repair","author":"griesmayer","year":"2007"},{"key":"ref232","first-page":"127","article-title":"Fusing fault localizers","author":"lucia lo","year":"0","journal-title":"IEEE Int Conf on Auto Soft Eng"},{"key":"ref233","article-title":"Ranking-based approaches for localizing faults","author":"lucia","year":"2014"},{"key":"ref230","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1616"},{"key":"ref231","first-page":"74","article-title":"Are faults localizable?","author":"lucia thung","year":"0","journal-title":"Proc 8th Working Conf Mining Softw Repositories"},{"key":"ref239","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.22"},{"key":"ref238","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2003.1319093"},{"key":"ref235","first-page":"877","article-title":"Automatic program bug location by program slicing","author":"lyle","year":"0","journal-title":"Proc Int Conf Comput Appl"},{"key":"ref234","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2008.33"},{"key":"ref237","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.08.031"},{"key":"ref236","doi-asserted-by":"publisher","DOI":"10.1145\/2501553.2501556"},{"key":"ref136","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44829-2_8"},{"key":"ref135","article-title":"Error explanation and fault localization with distance metrics","author":"groce","year":"2005"},{"key":"ref138","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-27813-9_35"},{"key":"ref137","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-005-0202-0"},{"key":"ref139","first-page":"419","article-title":"A classification of software faults","author":"grottke","year":"0","journal-title":"Proc 16th IEEE Int Symp Softw Rel Eng"},{"key":"ref140","doi-asserted-by":"publisher","DOI":"10.1007\/11688839_7"},{"key":"ref141","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101948"},{"key":"ref142","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48166-4_19"},{"key":"ref143","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.3"},{"key":"ref144","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368120"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.39"},{"key":"ref145","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070561"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2004.29"},{"key":"ref241","first-page":"62","article-title":"JADE - AI support for debugging Java programs","author":"mateis","year":"0","journal-title":"Proc IEEE Int Conf Tools Artif Intell"},{"key":"ref242","first-page":"171","article-title":"Modeling Java programs for diagnosis","author":"mateis","year":"0","journal-title":"Proc Eur Conf Artif Intell"},{"key":"ref243","first-page":"127","article-title":"Prioritizing model-based debugging diagnostic reports","author":"mayer","year":"0","journal-title":"Proc Int Workshop Principles Diagnosis"},{"key":"ref244","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36187-1_10"},{"key":"ref240","doi-asserted-by":"publisher","DOI":"10.1145\/2559932"},{"key":"ref248","first-page":"55","article-title":"Model-based debugging using multiple abstract models","author":"mayer","year":"0","journal-title":"In Proceedings of the International Workshop on Automatic Debugging"},{"key":"ref247","first-page":"471","article-title":"Abstract interpretation of programs for model-based debugging","author":"mayer","year":"0","journal-title":"Proc Int Joint Conf Artif Intell"},{"key":"ref246","first-page":"87","article-title":"Approximate modeling for debugging of program loops","author":"mayer","year":"2004","journal-title":"Proc Int Workshop Principles Diagnosis"},{"key":"ref245","first-page":"119","article-title":"Debugging program exceptions","author":"mayer","year":"0","journal-title":"Proc Int Workshop Principles Diagnosis"},{"key":"ref249","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.12.030"},{"key":"ref109","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-32759-9_17"},{"key":"ref108","year":"0"},{"key":"ref107","doi-asserted-by":"publisher","DOI":"10.1109\/32.908957"},{"key":"ref106","doi-asserted-by":"publisher","DOI":"10.1145\/945465.945468"},{"key":"ref105","article-title":"Method, system, and program for logging statements to monitor execution of a program","author":"edwards","year":"2003"},{"key":"ref104","year":"0"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.92"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001446"},{"key":"ref111","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02658-4_21"},{"key":"ref112","author":"fausett","year":"1994","journal-title":"Fundamentals of Neural Networks Architectures Algorithms and Applications"},{"key":"ref110","doi-asserted-by":"publisher","DOI":"10.1007\/11817963_30"},{"key":"ref250","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.23"},{"key":"ref251","first-page":"417","article-title":"Can AI help to improve debugging substantially? debugging experiences with value-based models","author":"mayer","year":"0","journal-title":"Proc Eur Conf Artif Intell"},{"key":"ref254","article-title":"Identifying coincidental correctness for fault localization clustering test cases","author":"miao","year":"0","journal-title":"Int Conf Software Engineering Knowledge Engineering"},{"key":"ref255","year":"0"},{"key":"ref252","first-page":"422","article-title":"Towards an integrated debugging environment","author":"mayer","year":"0","journal-title":"Proc Eur Conf Artif Intell"},{"key":"ref253","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2007.4362646"},{"key":"ref257","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.2004.1342806"},{"key":"ref256","doi-asserted-by":"publisher","DOI":"10.1145\/2462029.2462034"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.06.035"},{"key":"ref259","article-title":"Effective software fault localization using dynamic program behaviors","author":"moon","year":"2014","journal-title":"Master thesis"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2006.18"},{"key":"ref258","first-page":"234","article-title":"A critical review of &#x2018;automated patch generation learned from human-written patches&#x2019; essay on the problem statement and the evaluation of automatic software repair","author":"monperrus","year":"0","journal-title":"Proc Int Conf Softw Eng"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC.PART.2007.13"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2009.55"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.25"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-014-9236-4"},{"key":"ref118","article-title":"Fault localization using textual similarities","author":"fry","year":"2011"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.11"},{"key":"ref117","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(99)00034-X"},{"key":"ref17","article-title":"Towards automatic debugging of computer program","author":"agrawal","year":"1991"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380230603"},{"key":"ref119","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2013.23"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/52.88940"},{"key":"ref114","doi-asserted-by":"publisher","DOI":"10.1145\/1806596.1806625"},{"key":"ref113","doi-asserted-by":"publisher","DOI":"10.1145\/964001.964023"},{"key":"ref116","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375618"},{"key":"ref115","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.47"},{"key":"ref120","year":"0"},{"key":"ref121","year":"0"},{"key":"ref122","first-page":"30","article-title":"Diversity maximization speedup for fault","author":"gong","year":"0","journal-title":"Proc Int Conf Autom Softw Eng"},{"key":"ref123","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405255"},{"key":"ref260","doi-asserted-by":"publisher","DOI":"10.1109\/32.135775"},{"key":"ref261","first-page":"267","article-title":"Finding and reproducing Heisenbugs in concurrent programs","author":"musuvathi","year":"0","journal-title":"Proc USENIX Symp on Operating System Design and Implementation"},{"key":"ref262","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134018"},{"key":"ref263","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2009.32"},{"key":"ref264","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2013.16"},{"key":"ref265","first-page":"96","article-title":"Spectral debugging: How much better can we do","author":"naish","year":"0","journal-title":"Proc Australian Softw Eng Conf"},{"key":"ref266","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2010.50"},{"key":"ref365","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21323-6_25"},{"key":"ref364","doi-asserted-by":"publisher","DOI":"10.1042\/bst0310603"},{"key":"ref363","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227049"},{"key":"ref362","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.78"},{"key":"ref361","article-title":"Program slicing: formal, psychological, and practical investigations of an automatic program abstraction method","author":"weiser","year":"1979"},{"key":"ref360","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025136"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831717"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806840"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.281"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.06.055"},{"key":"ref359","doi-asserted-by":"publisher","DOI":"10.1109\/SERE-C.2013.18"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2003.1241371"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2004.2"},{"key":"ref357","author":"wasserman","year":"1993","journal-title":"Advanced Methods in Neural Computing"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/LATW.2009.4813783"},{"key":"ref358","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831740"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831715"},{"key":"ref355","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070507"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.31"},{"key":"ref356","doi-asserted-by":"publisher","DOI":"10.1145\/2581122.2544152"},{"key":"ref352","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101966"},{"key":"ref351","article-title":"Post-mortem dynamic analysis for software debugging","author":"wang","year":"2007"},{"key":"ref354","doi-asserted-by":"crossref","DOI":"10.14711\/thesis-b1115493","article-title":"Automatic localization of code omission faults","author":"wang","year":"2010"},{"key":"ref353","first-page":"375","article-title":"Concurrency bug localization using shared memory access pairs","author":"wang","year":"0","journal-title":"Proc 19th ACM SIGPLAN Symp Principles Practices Parallel Program"},{"key":"ref350","first-page":"556","article-title":"Search-based fault localization","author":"wang","year":"0","journal-title":"Proc IEEE\/ACM Int Conf Autom Softw Eng"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100114"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/2338966.2336799"},{"key":"ref29","first-page":"402","article-title":"Is mutation an appropriate tool for testing experiments?","author":"andrews","year":"0","journal-title":"Proc 27th Int l Conf Software Eng"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/93542.93576"},{"key":"ref348","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747172"},{"key":"ref349","doi-asserted-by":"publisher","DOI":"10.1145\/1122971.1122993"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/2.689678"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1995.497652"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-005-6214-x"},{"key":"ref344","first-page":"121","article-title":"A survey of program slicing techniques","volume":"3","author":"tip","year":"1995","journal-title":"J Programming Languages"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2003.1240305"},{"key":"ref345","first-page":"341","article-title":"MemSAT: Checking axiomatic specifications of memory models","author":"torlak","year":"0","journal-title":"Proc ACM SIGPLAN Conf Programming Language Design and Implementation"},{"key":"ref26","article-title":"Localizing state-dependent faults using associated sequence mining","author":"ali","year":"2013"},{"key":"ref346","article-title":"Improving automatic software fault localization","author":"vayani","year":"2007","journal-title":"Master thesis"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.89"},{"key":"ref347","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(85)80054-7"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134299"},{"key":"ref383","article-title":"On the analysis of spectrum-based fault localization","author":"xie","year":"2012"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR.2001.914974"},{"key":"ref382","first-page":"274","article-title":"A statistical model to locate faults at input levels","author":"wu","year":"0","journal-title":"Proc Int Conf Autom Softw Eng"},{"key":"ref381","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-14264-2_3"},{"key":"ref380","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48035-8_72"},{"key":"ref387","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.08.008"},{"key":"ref386","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2011.20"},{"key":"ref385","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2010.45"},{"key":"ref384","doi-asserted-by":"publisher","DOI":"10.1145\/2522920.2522924"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/BF00625279"},{"key":"ref379","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2010.51"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2004.1317470"},{"key":"ref57","first-page":"137","article-title":"Using machine learning to support debugging with tarantula","author":"briand","year":"0","journal-title":"Proc IEEE Symp on Software Rel"},{"key":"ref377","doi-asserted-by":"publisher","DOI":"10.1016\/j.jlap.2012.03.002"},{"key":"ref56","first-page":"85","article-title":"Complexity metrics for spreadsheet models","volume":"3895","author":"bregar","year":"2004","journal-title":"Proc EuSpRIG"},{"key":"ref378","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(01)00161-8"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/155090.155095"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529378"},{"key":"ref53","first-page":"99","article-title":"How well do test case prioritization techniques support statistical fault localization","author":"bo","year":"0","journal-title":"Proc IEEE Conf Computer Software and Appl"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(03)62003-6"},{"key":"ref370","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2012.12"},{"key":"ref372","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2005.39"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.87"},{"key":"ref371","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2285319"},{"key":"ref374","doi-asserted-by":"publisher","DOI":"10.1142\/S021819400900426X"},{"key":"ref373","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2005.06.045"},{"key":"ref376","doi-asserted-by":"publisher","DOI":"10.1023\/A:1012821511498"},{"key":"ref375","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2004.06.026"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/224170.224350"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2006.06.001"},{"key":"ref6","first-page":"1","article-title":"A low-cost approximate minimal hitting set algorithm and its application to model-based diagnosis","author":"abreu","year":"0","journal-title":"Proc Symp Abstraction Reformulation Approximation"},{"key":"ref5","article-title":"Spectrum-based fault localization in embedded software","author":"abreu","year":"2009"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/1363686.1363855"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2011.52"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1868328.1868347"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529374"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.130"},{"key":"ref366","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.09.037"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100150"},{"key":"ref367","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2011.2172031"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100088"},{"key":"ref368","doi-asserted-by":"publisher","DOI":"10.1109\/SSIRI.2010.38"},{"key":"ref47","article-title":"Mitigating the effect of coincidental correctness in spectrum based fault localization","author":"bandyopadhyay","year":"2013"},{"key":"ref369","doi-asserted-by":"publisher","DOI":"10.1109\/TSMCC.2011.2118751"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2012.6405299"},{"key":"ref41","article-title":"Statistical causal analysis for fault localization","author":"baah","year":"2012"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/604131.604140"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/183432.183527"},{"key":"ref320","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070508"},{"key":"ref321","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.29"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572290"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.23"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2008.162"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-35873-9_13"},{"key":"ref318","article-title":"Cost optimizations in runtime testing and diagnosis","author":"sanchez","year":"2011"},{"key":"ref77","first-page":"342","article-title":"Locating causes of program failures","author":"cleve","year":"0","journal-title":"Proc IEEE Int Conf Softw Eng"},{"key":"ref317","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451131"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070506"},{"key":"ref316","article-title":"A novel invariants-based approach for automated software fault localization","author":"sahoo","year":"2013"},{"key":"ref75","first-page":"43","article-title":"A survey of binary similarity and distance measures","volume":"8","author":"choi","year":"2010","journal-title":"J Systemics Cybernetics and Informatics"},{"key":"ref315","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693093"},{"key":"ref314","doi-asserted-by":"publisher","DOI":"10.1145\/774849.774851"},{"key":"ref313","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796800000708"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"ref312","article-title":"A mixed approach to spectrum-based fault localization using information theoretic foundations","author":"roychowdhry","year":"2013"},{"key":"ref79","first-page":"539","article-title":"Towards automatic software fault localization through decision-to-decision path analysis","author":"collofello","year":"0","journal-title":"Proc Nat Comput Conf"},{"key":"ref311","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1998.671118"},{"key":"ref319","article-title":"Change-effects analysis for effective testing and validation of evolving software","author":"santelices","year":"2012"},{"key":"ref310","doi-asserted-by":"publisher","DOI":"10.1145\/143062.143098"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250737"},{"key":"ref62","first-page":"113","article-title":"Partition testing with dynamic partitioning","author":"cai","year":"0","journal-title":"Proc Annu Int Comput Softw Appl Conf"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001447"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693085"},{"key":"ref305","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-63531-9_29"},{"key":"ref64","first-page":"152","article-title":"A kernel density estimate-based approach to component goodness modeling","author":"cardoso","year":"0","journal-title":"Proc 27th AAAI Conf Artif Intell"},{"key":"ref304","article-title":"The Economic Impacts of Inadequate Infrastructure for Software Testing","year":"0"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78137-0_20"},{"key":"ref307","first-page":"309","article-title":"Isolating failure causes through test case generation","author":"r\u00f6","year":"0","journal-title":"Proc Int'l Symp on Softw Testing and Analysis"},{"key":"ref66","first-page":"238","article-title":"Multiple fault localization with data mining","author":"cellier","year":"0","journal-title":"Proc Int Conf on Software Eng Knowledge Eng"},{"key":"ref306","article-title":"Automated source-level debugging of synthesizable verilog designs","author":"riaz","year":"2008"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/1029894.1029908"},{"key":"ref301","doi-asserted-by":"publisher","DOI":"10.1016\/0004-3702(87)90062-2"},{"key":"ref68","article-title":"Automated fault localization for service-oriented software systems","author":"chen","year":"2015"},{"key":"ref300","doi-asserted-by":"publisher","DOI":"10.1257\/aer.100.2.573"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2007.79"},{"key":"ref303","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2003.1240292"},{"key":"ref302","article-title":"A research framework for software-fault localization tools","author":"renieris","year":"2005"},{"key":"ref309","doi-asserted-by":"publisher","DOI":"10.1109\/32.341844"},{"key":"ref308","article-title":"Workload-sensitive timing behavior analysis for fault localization in software systems","author":"rohr","year":"2015"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.10.042"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2010.80"},{"key":"ref93","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982498"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2011.92"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1146"},{"key":"ref342","article-title":"Fault location and avoidance in long-running multithreaded applications","author":"tallam","year":"2007"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2009.14"},{"key":"ref343","doi-asserted-by":"publisher","DOI":"10.1145\/366378.366379"},{"key":"ref340","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606573"},{"key":"ref341","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.1989.65142"},{"key":"ref336","first-page":"440","article-title":"Debugging functional program","author":"stumptner","year":"0","journal-title":"Proc Int Joint Conf Artif Intell"},{"key":"ref335","first-page":"35","article-title":"A survey of intelligent debugging","volume":"11","author":"stumptner","year":"1998","journal-title":"AI Commun"},{"key":"ref334","doi-asserted-by":"publisher","DOI":"10.1145\/1085130.1085134"},{"key":"ref333","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483767"},{"key":"ref98","article-title":"Enhancing automated fault discovery and analysis","author":"demott","year":"2012"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101979"},{"key":"ref339","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00593-0_24"},{"key":"ref96","doi-asserted-by":"publisher","DOI":"10.1145\/229000.226310"},{"key":"ref338","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882324"},{"key":"ref97","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.1997.625061"},{"key":"ref337","article-title":"Automated failure explanation through execution comparison","author":"sumner","year":"2013"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/VLHCC.2010.22"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062533"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1007\/11531142_23"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227239"},{"key":"ref330","first-page":"112","article-title":"Thin slicing","author":"stridharan","year":"0","journal-title":"Proc SIGPLAN Conf Programming Language Design and Implementation"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/53990.54003"},{"key":"ref331","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2009.24"},{"key":"ref332","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2012.28"},{"key":"ref89","article-title":"Towards the automation of program debugging","author":"debroy","year":"2011"},{"key":"ref323","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227208"},{"key":"ref322","doi-asserted-by":"publisher","DOI":"10.1145\/940071.940116"},{"key":"ref325","article-title":"Algorithmic program debugging","author":"shapiro","year":"1982"},{"key":"ref324","doi-asserted-by":"publisher","DOI":"10.1145\/1065944.1065958"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321702"},{"key":"ref327","article-title":"Statistical estimation of software reliability and failure-causing effect","author":"shu","year":"2014"},{"key":"ref86","year":"0"},{"key":"ref326","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.57"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.54"},{"key":"ref329","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882300"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693124"},{"key":"ref328","doi-asserted-by":"publisher","DOI":"10.1016\/j.advengsoft.2011.05.024"},{"key":"ref426","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45875-1_15"},{"key":"ref425","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227210"},{"key":"ref427","year":"0"},{"key":"ref422","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.6.10.1977-1984"},{"key":"ref421","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-16167-4_21"},{"key":"ref424","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.38"},{"key":"ref423","doi-asserted-by":"publisher","DOI":"10.1145\/1143844.1143983"},{"key":"ref399","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368116"},{"key":"ref389","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375611"},{"key":"ref388","first-page":"224","article-title":"Provably optimal and human-competitive results in SBSE for spectrum based fault localization","author":"xie","year":"0","journal-title":"Proc 2nd Int Symp Search Based Software Eng"},{"key":"ref390","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2011.32"},{"key":"ref397","article-title":"No pot of gold at the end of program spectrum rainbow: Greatest risk evaluation formula does not exist","author":"yoo","year":"0"},{"key":"ref398","first-page":"899","article-title":"Statistical fault localization using execution sequence","author":"you","year":"0","journal-title":"Proc Int Conf Mach Learn Cybern"},{"key":"ref395","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2013.22"},{"key":"ref396","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368100"},{"key":"ref393","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194011005505"},{"key":"ref394","doi-asserted-by":"publisher","DOI":"10.1145\/1050849.1050865"},{"key":"ref391","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.08.006"},{"key":"ref392","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065013"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/7542210\/07390282.pdf?arnumber=7390282","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:43:36Z","timestamp":1642005816000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7390282\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,1]]},"references-count":427,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tse.2016.2521368","relation":{},"ISSN":["0098-5589","1939-3520"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,8,1]]}}}