{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:28:45Z","timestamp":1750307325490,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,9,9]],"date-time":"2011-09-09T00:00:00Z","timestamp":1315526400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,9,9]]},"DOI":"10.1145\/2025113.2025137","type":"proceedings-article","created":{"date-parts":[[2011,9,6]],"date-time":"2011-09-06T15:10:46Z","timestamp":1315321846000},"page":"157-167","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":21,"title":["Fault localization for data-centric programs"],"prefix":"10.1145","author":[{"given":"Diptikalyan","family":"Saha","sequence":"first","affiliation":[{"name":"IBM Research - India, New Delhi, India"}]},{"given":"Mangala Gowri","family":"Nanda","sequence":"additional","affiliation":[{"name":"IBM Research - India, New Delhi, India"}]},{"given":"Pankaj","family":"Dhoolia","sequence":"additional","affiliation":[{"name":"IBM Research - India, New Delhi, India"}]},{"given":"V. Krishna","family":"Nandivada","sequence":"additional","affiliation":[{"name":"IBM Research - India, Bangalore, India"}]},{"given":"Vibha","family":"Sinha","sequence":"additional","affiliation":[{"name":"IBM Research - India, New Delhi, India"}]},{"given":"Satish","family":"Chandra","sequence":"additional","affiliation":[{"name":"IBM T. J. Watson Research Center, New York, USA"}]}],"member":"320","published-online":{"date-parts":[[2011,9,9]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/93548.93576"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1995.497652"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.83"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/604131.604140"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-30232-2_6"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985811"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609724"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2008.38"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.66"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.92"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390644"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1767111.1767119"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1002\/1099-1689(200009)10:3<171::AID-STVR209>3.0.CO;2-J"},{"key":"e_1_3_2_1_14_1","first-page":"877","volume-title":"2nd International Conference on Computers And Applications","author":"Lyle M. W.","year":"1987","unstructured":"M. W. James R. Lyle . Automatic program bug location by program slicing . In 2nd International Conference on Computers And Applications , pages 877 -- 882 , 1987 . M. W. James R. Lyle. Automatic program bug location by program slicing. In 2nd International Conference on Computers And Applications, pages 877--882, 1987."},{"key":"e_1_3_2_1_15_1","first-page":"445","volume-title":"Proceedings of the TACAS","author":"Jin H.","year":"2002","unstructured":"H. Jin , K. Ravi , and F. Somenzi . Fate and free will in error traces . In Proceedings of the TACAS , pages 445 -- 459 , London, UK, UK , 2002 . Springer-Verlag. H. Jin, K. Ravi, and F. Somenzi. Fate and free will in error traces. In Proceedings of the TACAS, pages 445--459, London, UK, UK, 2002. Springer-Verlag."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101949"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/646448.692459"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(88)90054-3"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882334"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.105"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859039"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2003.1240292"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/267895.267925"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/647540.730011"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/113445.113455"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/605466.605468"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996855"},{"key":"e_1_3_2_1_29_1","first-page":"319","volume-title":"Proceedings of ICSE","author":"Zhang X.","year":"2003","unstructured":"X. Zhang , R. Gupta , and Y. Zhang . Precise dynamic slicing algorithms . In Proceedings of ICSE , pages 319 -- 329 , Washington, DC, USA , 2003 . IEEE Computer Society. X. Zhang, R. Gupta, and Y. Zhang. Precise dynamic slicing algorithms. In Proceedings of ICSE, pages 319--329, Washington, DC, USA, 2003. IEEE Computer Society."}],"event":{"name":"ESEC\/FSE'11: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Szeged Hungary","acronym":"ESEC\/FSE'11"},"container-title":["Proceedings of the 19th ACM SIGSOFT symposium and the 13th European conference on Foundations of software engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2025113.2025137","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2025113.2025137","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:06:00Z","timestamp":1750244760000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2025113.2025137"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9,9]]},"references-count":28,"alternative-id":["10.1145\/2025113.2025137","10.1145\/2025113"],"URL":"https:\/\/doi.org\/10.1145\/2025113.2025137","relation":{},"subject":[],"published":{"date-parts":[[2011,9,9]]},"assertion":[{"value":"2011-09-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}