{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:51:28Z","timestamp":1750308688348,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2591062.2591122","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"512-515","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["On failure classification: the impact of \"getting it wrong\""],"prefix":"10.1145","author":[{"given":"Davide","family":"Falessi","sequence":"first","affiliation":[{"name":"Fraunhofer CESE, USA"}]},{"given":"Bill","family":"Kidwell","sequence":"additional","affiliation":[{"name":"University of Kentucky, USA"}]},{"given":"Jane","family":"Huffman Hayes","sequence":"additional","affiliation":[{"name":"University of Kentucky, USA"}]},{"given":"Forrest","family":"Shull","sequence":"additional","affiliation":[{"name":"SEI, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"volume-title":"Fraunhofer IESE, IESE-report No. 072.01\/E","year":"2001","author":"Freimut B.","key":"e_1_3_2_1_1_1"},{"volume-title":"Heidelberg: Springer Berlin Heidelberg","year":"2013","author":"Felderer M.","key":"e_1_3_2_1_2_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"crossref","unstructured":"L. Miller S. Mirsky and J. H. Hayes \u201cGuidelines for the Verification and Validation of Expert System Software and Conventional Software \u201d 1995.  L. Miller S. Mirsky and J. H. Hayes \u201cGuidelines for the Verification and Validation of Expert System Software and Conventional Software \u201d 1995.","DOI":"10.2172\/42511"},{"volume-title":"Guide to Advanced Empirical Software Engineering","year":"2008","author":"Mockus A.","key":"e_1_3_2_1_4_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1370788.1370799"},{"key":"e_1_3_2_1_6_1","first-page":"152","volume-title":"Software and Data Technologies","author":"Falessi D.","year":"2008"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1049\/ic.2012.0025"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/851015.856131"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1018434.1021569"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1463788.1463819"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882308"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486840"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491418"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2010.37"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985859"}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."],"location":"Hyderabad India","acronym":"ICSE '14"},"container-title":["Companion Proceedings of the 36th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2591062.2591122","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2591062.2591122","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T20:01:14Z","timestamp":1750276874000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2591062.2591122"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":15,"alternative-id":["10.1145\/2591062.2591122","10.1145\/2591062"],"URL":"https:\/\/doi.org\/10.1145\/2591062.2591122","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}