{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:36:47Z","timestamp":1750307807257,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,7,21]],"date-time":"2008-07-21T00:00:00Z","timestamp":1216598400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001659","name":"Deutsche Forschungsgemeinschaft","doi-asserted-by":"publisher","award":["Ze509\/2-1"],"award-info":[{"award-number":["Ze509\/2-1"]}],"id":[{"id":"10.13039\/501100001659","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,7,21]]},"DOI":"10.1145\/1401827.1401842","type":"proceedings-article","created":{"date-parts":[[2008,8,19]],"date-time":"2008-08-19T12:38:39Z","timestamp":1219149519000},"page":"71-77","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Replaying and isolating failing multi-object interactions"],"prefix":"10.1145","author":[{"given":"Martin","family":"Burger","sequence":"first","affiliation":[{"name":"Saarland University, Saarbr\u00fccken, Germany"}]},{"given":"Andreas","family":"Zeller","sequence":"additional","affiliation":[{"name":"Saarland University, Saarbr\u00fccken, Germany"}]}],"member":"320","published-online":{"date-parts":[[2008,7,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70592-5_23"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062522"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321702"},{"key":"e_1_3_2_1_4_1","unstructured":"Javassist home page. http:\/\/www.csg.is.titech.ac.jp\/~chiba\/javassist\/.  Javassist home page. http:\/\/www.csg.is.titech.ac.jp\/~chiba\/javassist\/."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581397"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2005.28"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321698"},{"volume-title":"Proc. Fifth Int. Workshop on Automated and Algorithmic Debugging (AADEBUG)","year":"2003","author":"Lewis B.","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","series-title":"LNI","first-page":"169","volume-title":"Software Engineering","author":"Neuhaus S.","year":"2007"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1138912.1138915"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1083246.1083251"},{"key":"e_1_3_2_1_12_1","first-page":"82","volume-title":"IEEE International Conference on Software Maintenance","author":"Rountev A.","year":"2004"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101927"},{"key":"e_1_3_2_1_14_1","unstructured":"F. Tip. A Survey of Program Slicing Techniques. Centrum voor Wiskunde en Informatica 1994.  F. Tip. A Survey of Program Slicing Techniques. Centrum voor Wiskunde en Informatica 1994."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"A. Zeller. Why Programs Fail: A Guide to Systematic Debugging. Morgan Kaufmann 1st edition 2005.   A. Zeller. Why Programs Fail: A Guide to Systematic Debugging. Morgan Kaufmann 1st edition 2005.","DOI":"10.1016\/B978-155860866-5\/50008-4"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/249094.249108"}],"event":{"name":"ISSTA '08: International Symposium on Software Testing and Analysis","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Seattle Washington","acronym":"ISSTA '08"},"container-title":["Proceedings of the 2008 international workshop on dynamic analysis: held in conjunction with the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2008)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1401827.1401842","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1401827.1401842","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T13:56:40Z","timestamp":1750255000000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1401827.1401842"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,7,21]]},"references-count":17,"alternative-id":["10.1145\/1401827.1401842","10.1145\/1401827"],"URL":"https:\/\/doi.org\/10.1145\/1401827.1401842","relation":{},"subject":[],"published":{"date-parts":[[2008,7,21]]},"assertion":[{"value":"2008-07-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}