{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,24]],"date-time":"2025-06-24T06:27:10Z","timestamp":1750746430460,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2008,10,9]],"date-time":"2008-10-09T00:00:00Z","timestamp":1223510400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2008,10,9]]},"DOI":"10.1145\/1414004.1414038","type":"proceedings-article","created":{"date-parts":[[2008,10,14]],"date-time":"2008-10-14T17:49:52Z","timestamp":1224006592000},"page":"206-212","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":15,"title":["Iterative identification of fault-prone binaries using in-process metrics"],"prefix":"10.1145","author":[{"given":"Lucas","family":"Layman","sequence":"first","affiliation":[{"name":"North Carolina State University, Raleigh, NC, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Gunnar","family":"Kudrjavets","sequence":"additional","affiliation":[{"name":"Microsoft Corporation, Redmond, WA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Nachiappan","family":"Nagappan","sequence":"additional","affiliation":[{"name":"Microsoft Corporation, Redmond, WA, USA"}],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"320","published-online":{"date-parts":[[2008,10,9]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Compilers Principles, Techniques, and Tools","author":"Aho Ravi Sethi","year":"1986","unstructured":"Alfred V. Aho , Ravi Sethi , and J. D. Ullman , Compilers Principles, Techniques, and Tools . Reading, MA : Addison-Wesley , 1986 . Alfred V. Aho, Ravi Sethi, and J. D. Ullman, Compilers Principles, Techniques, and Tools. Reading, MA: Addison-Wesley, 1986."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.544352"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(99)00102-8"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302654"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.935855"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.859533"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","DOI":"10.1002\/0471725331","volume-title":"A User's Guide to Principal Components","author":"Jackson","year":"1991","unstructured":"J. E. Jackson , A User's Guide to Principal Components . New York : Wiley , 1991 . J. E. Jackson, A User's Guide to Principal Components. New York: Wiley, 1991."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062506"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062514"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2006.50"},{"key":"e_1_3_2_1_12_1","first-page":"69","volume-title":"IEEE Aerospace Conference","author":"Ohlsson Mayrhauser","year":"1999","unstructured":"M. C. Ohlsson , von Mayrhauser , A. , McGuire , B. , Wohlin , C. , \"Code Decay Analysis of Legacy Software through Successive Releases ,\" in IEEE Aerospace Conference , 1999 , pp. 69 -- 81 . M. C. Ohlsson, von Mayrhauser, A., McGuire, B., Wohlin, C., \"Code Decay Analysis of Legacy Software through Successive Releases,\" in IEEE Aerospace Conference, 1999, pp. 69--81."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007524"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1191795"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/520792.823979"},{"key":"e_1_3_2_1_16_1","first-page":"513","volume-title":"CASCON '93","author":"Vouk Tai","year":"1993","unstructured":"M. A. Vouk , Tai , K. C. , \"Multi-Phase Coverage- and Risk- Based Software Reliability Modeling ,\" in CASCON '93 , 1993 , pp. 513 -- 523 . M. A. Vouk, Tai, K. C., \"Multi-Phase Coverage- and Risk-Based Software Reliability Modeling,\" in CASCON '93, 1993, pp. 513--523."}],"event":{"name":"ESEM '08: 2008 ACM-IEEE International Symposium on Empirical Software Engineering and Measurement","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Kaiserslautern Germany","acronym":"ESEM '08"},"container-title":["Proceedings of the Second ACM-IEEE international symposium on Empirical software engineering and measurement"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1414004.1414038","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1414004.1414038","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:47:12Z","timestamp":1750258032000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1414004.1414038"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2008,10,9]]},"references-count":16,"alternative-id":["10.1145\/1414004.1414038","10.1145\/1414004"],"URL":"https:\/\/doi.org\/10.1145\/1414004.1414038","relation":{},"subject":[],"published":{"date-parts":[[2008,10,9]]},"assertion":[{"value":"2008-10-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}