{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:41:54Z","timestamp":1750308114716,"version":"3.41.0"},"reference-count":20,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2005,5,21]],"date-time":"2005-05-21T00:00:00Z","timestamp":1116633600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["SIGSOFT Softw. Eng. Notes"],"published-print":{"date-parts":[[2005,7]]},"abstract":"<jats:p>This paper summarizes six challenges in end-user programming that can impact the debugging efforts of end users. These challenges have been derived through our experiences and empirical investigation of interactive fault localization techniques in the spreadsheet paradigm. Our contributions reveal several insights into debugging techniques for end-user programmers, particularly fault localization techniques, that can help guide the direction of future end-user software engineering research.<\/jats:p>","DOI":"10.1145\/1082983.1083244","type":"journal-article","created":{"date-parts":[[2005,11,7]],"date-time":"2005-11-07T19:28:32Z","timestamp":1131391712000},"page":"1-6","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Six challenges in supporting end-user debugging"],"prefix":"10.1145","volume":"30","author":[{"given":"Joseph R.","family":"Ruthruff","sequence":"first","affiliation":[{"name":"University of Nebraska-Lincoln, Lincoln, Nebraska"}]},{"given":"Margaret","family":"Burnett","sequence":"additional","affiliation":[{"name":"Oregon State University, Corvallis, Oregon"}]}],"member":"320","published-online":{"date-parts":[[2005,5,21]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1995.497652"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/345124.345143"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/795687.797842"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/557000"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.962984"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/968486.968487"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1015864.1015889"},{"key":"e_1_2_1_8_1","first-page":"1548","volume-title":"HCI International","author":"Corritore C.","year":"2001"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/229000.226310"},{"volume-title":"The Washington Post","year":"2003","author":"Hilzenrath D.","key":"e_1_2_1_10_1"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581397"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1153917.1153960"},{"key":"e_1_2_1_13_1","first-page":"877","volume-title":"Proceedings of the 2nd International Conference on Computers and Applications","author":"Lyle J.","year":"1987"},{"volume-title":"Finding spreadsheet errors: Most spreadsheet errors have design flaws that may lead to long-term miscalculation. Information Week, page","year":"1995","author":"Panko R.","key":"e_1_2_1_14_1"},{"volume-title":"Cambridge University Press","year":"1990","author":"Reason J.","key":"e_1_2_1_15_1"},{"volume-title":"Ottawa Citizen","year":"2003","author":"Robertson G.","key":"e_1_2_1_16_1"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/366378.366385"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062523"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2004.07.001"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/642611.642665"}],"container-title":["ACM SIGSOFT Software Engineering Notes"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1082983.1083244","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1082983.1083244","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T16:08:14Z","timestamp":1750262894000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1082983.1083244"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,5,21]]},"references-count":20,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2005,7]]}},"alternative-id":["10.1145\/1082983.1083244"],"URL":"https:\/\/doi.org\/10.1145\/1082983.1083244","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1083231.1083244","asserted-by":"subject"}]},"ISSN":["0163-5948"],"issn-type":[{"type":"print","value":"0163-5948"}],"subject":[],"published":{"date-parts":[[2005,5,21]]},"assertion":[{"value":"2005-05-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}