{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,8]],"date-time":"2026-03-08T00:47:57Z","timestamp":1772930877831,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,11,11]],"date-time":"2014-11-11T00:00:00Z","timestamp":1415664000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,11,11]]},"DOI":"10.1145\/2635868.2635873","type":"proceedings-article","created":{"date-parts":[[2014,11,4]],"date-time":"2014-11-04T21:44:36Z","timestamp":1415137476000},"page":"64-74","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":49,"title":["Automatically generated patches as debugging aids: a human study"],"prefix":"10.1145","author":[{"given":"Yida","family":"Tao","sequence":"first","affiliation":[{"name":"Hong Kong University of Science and Technology, China"}]},{"given":"Jindae","family":"Kim","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, China"}]},{"given":"Sunghun","family":"Kim","sequence":"additional","affiliation":[{"name":"Hong Kong University of Science and Technology, China"}]},{"given":"Chang","family":"Xu","sequence":"additional","affiliation":[{"name":"Nanjing University, China"}]}],"member":"320","published-online":{"date-parts":[[2014,11,11]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Amazon mechanical turk. https:\/\/www.mturk.com\/mturk\/.  Amazon mechanical turk. https:\/\/www.mturk.com\/mturk\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1117696.1117704"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070530"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070550"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025119"},{"key":"e_1_3_2_1_6_1","volume-title":"Proceedings of the 2013 International Conference on Software Engineering, ICSE \u201913","author":"Carzaniga A.","unstructured":"A. Carzaniga , A. Gorla , A. Mattavelli , N. Perino , and M. Pezz\u00e8 . Automatic recovery from runtime failures . In Proceedings of the 2013 International Conference on Software Engineering, ICSE \u201913 . A. Carzaniga, A. Gorla, A. Mattavelli, N. Perino, and M. Pezz\u00e8. Automatic recovery from runtime failures. In Proceedings of the 2013 International Conference on Software Engineering, ICSE \u201913."},{"key":"e_1_3_2_1_7_1","first-page":"462","volume-title":"ICSE\u201912","author":"Ceccato M.","unstructured":"M. Ceccato , A. Marchetto , L. Mariani , C. Nguyen , and P. Tonella . An empirical study about the effectiveness of debugging when random test cases are used . In ICSE\u201912 , pages 452\u2013 462 . M. Ceccato, A. Marchetto, L. Mariani, C. Nguyen, and P. Tonella. An empirical study about the effectiveness of debugging when random test cases are used. In ICSE\u201912, pages 452\u2013462."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.15"},{"key":"e_1_3_2_1_9_1","first-page":"276","volume-title":"ICSE\u201912","author":"Duala-Ekoko E.","unstructured":"E. Duala-Ekoko and M. P. Robillard . Asking and answering questions about unfamiliar APIs: an exploratory study . ICSE\u201912 , pages 266\u2013 276 . E. Duala-Ekoko and M. P. Robillard. Asking and answering questions about unfamiliar APIs: an exploratory study. ICSE\u201912, pages 266\u2013276."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.113"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1037\/h0031619"},{"key":"e_1_3_2_1_12_1","volume-title":"Applied regression analysis, linear models, and related methods","author":"Fox J.","year":"1997","unstructured":"J. Fox . Applied regression analysis, linear models, and related methods . Sage , 1997 . J. Fox. Applied regression analysis, linear models, and related methods. Sage, 1997."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336775"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609691"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806812"},{"key":"e_1_3_2_1_16_1","unstructured":"J.Nielsen. Time budgets for usability sessions. http:\/\/www.useit.com\/alertbox\/usability sessions.html.  J.Nielsen. Time budgets for usability sessions. http:\/\/www.useit.com\/alertbox\/usability sessions.html."},{"key":"e_1_3_2_1_17_1","volume-title":"Proceedings of the 2013 International Conference on Software Engineering, ICSE\u201913","author":"Kim D.","unstructured":"D. Kim , J. Nam , J. Song , and S. Kim . Automatic patch generation learned from human-written patches . In Proceedings of the 2013 International Conference on Software Engineering, ICSE\u201913 . D. Kim, J. Nam, J. Song, and S. Kim. Automatic patch generation learned from human-written patches. In Proceedings of the 2013 International Conference on Software Engineering, ICSE\u201913."},{"key":"e_1_3_2_1_18_1","unstructured":"A. Ko and B. Uttl. Individual differences in program comprehension strategies in unfamiliar programming systems. In IWPC\u201903.   A. Ko and B. Uttl. Individual differences in program comprehension strategies in unfamiliar programming systems. In IWPC\u201903."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.116"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/1841406"},{"key":"e_1_3_2_1_21_1","unstructured":"C. Le Goues M. Dewey-Vogt S. Forrest and W. Weimer. A systematic study of automated program repair: fixing 55 out of 105 bugs for $8 each. ICSE\u201912.   C. Le Goues M. Dewey-Vogt S. Forrest and W. Weimer. A systematic study of automated program repair: fixing 55 out of 105 bugs for $8 each. ICSE\u201912."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-013-9208-0"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1518\/001872006777724408"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568324"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181778"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 2013 International Conference on Software Engineering, ICSE\u201913","author":"Nguyen H. D. T.","unstructured":"H. D. T. Nguyen , D. Qi , A. Roychoudhury , and S. Chandra . SemFix: program repair via semantic analysis . In Proceedings of the 2013 International Conference on Software Engineering, ICSE\u201913 . H. D. T. Nguyen, D. Qi, A. Roychoudhury, and S. Chandra. SemFix: program repair via semantic analysis. In Proceedings of the 2013 International Conference on Software Engineering, ICSE\u201913."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080814"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001445"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483785"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985830"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1753846.1753873"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831716"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070536"}],"event":{"name":"SIGSOFT\/FSE'14: 22nd ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Hong Kong China","acronym":"SIGSOFT\/FSE'14","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2635868.2635873","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2635868.2635873","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T19:03:44Z","timestamp":1750273424000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2635868.2635873"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11,11]]},"references-count":34,"alternative-id":["10.1145\/2635868.2635873","10.1145\/2635868"],"URL":"https:\/\/doi.org\/10.1145\/2635868.2635873","relation":{},"subject":[],"published":{"date-parts":[[2014,11,11]]},"assertion":[{"value":"2014-11-11","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}