{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:17:30Z","timestamp":1750306650785,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,15]],"date-time":"2014-09-15T00:00:00Z","timestamp":1410739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100006112","name":"Microsoft Research","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006112","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100004316","name":"International Business Machines Corporation","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100004316","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CCF-0964647","CCF-1320783","CCF-1161821"],"award-info":[{"award-number":["CCF-0964647","CCF-1320783","CCF-1161821"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100006785","name":"Google","doi-asserted-by":"publisher","id":[{"id":"10.13039\/100006785","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,15]]},"DOI":"10.1145\/2642937.2643014","type":"proceedings-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T14:22:41Z","timestamp":1410963761000},"page":"815-826","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":16,"title":["MIMIC"],"prefix":"10.1145","author":[{"given":"Daniele","family":"Zuddas","sequence":"first","affiliation":[{"name":"University of Milano - Bicocca, Milan, Italy"}]},{"given":"Wei","family":"Jin","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]},{"given":"Fabrizio","family":"Pastore","sequence":"additional","affiliation":[{"name":"University of Milano - Bicocca, Milan, Italy"}]},{"given":"Leonardo","family":"Mariani","sequence":"additional","affiliation":[{"name":"University of Milano - Bicocca, Milan, Italy"}]},{"given":"Alessandro","family":"Orso","sequence":"additional","affiliation":[{"name":"Georgia Institute of Technology, Atlanta, GA, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,9,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Coreutils. http:\/\/www.gnu.org\/software\/coreutils\/.  Coreutils. http:\/\/www.gnu.org\/software\/coreutils\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2006.18"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806840"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572300"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1337691.1338380"},{"key":"e_1_3_2_1_6_1","unstructured":"CoreUtils. Fault in Mknod. http:\/\/lists.gnu.org\/archive\/html\/bug-coreutils\/2008-03\/msg00224.html.  CoreUtils. Fault in Mknod. http:\/\/lists.gnu.org\/archive\/html\/bug-coreutils\/2008-03\/msg00224.html."},{"key":"e_1_3_2_1_7_1","unstructured":"CoreUtils. Fault in OD. http:\/\/lists.gnu.org\/archive\/html\/bug-coreutils\/2007-08\/msg00034.html.  CoreUtils. Fault in OD. http:\/\/lists.gnu.org\/archive\/html\/bug-coreutils\/2007-08\/msg00034.html."},{"key":"e_1_3_2_1_8_1","unstructured":"CoreUtils. Fault in PR. http:\/\/lists.gnu.org\/archive\/html\/bug-coreutils\/2008-04\/msg00177.html.  CoreUtils. Fault in PR. http:\/\/lists.gnu.org\/archive\/html\/bug-coreutils\/2008-04\/msg00177.html."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134435"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1348250.1348254"},{"key":"e_1_3_2_1_11_1","unstructured":"Davide Libenzi. XMail. http:\/\/www.xmailserver.org\/.  Davide Libenzi. XMail. http:\/\/www.xmailserver.org\/."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1508244.1508252"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.908957"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025179"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337279"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483763"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581397"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.29"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065014"},{"key":"e_1_3_2_1_20_1","unstructured":"Lincoln University of Nebraska. Software-artifact Infrastructure Repository. http:\/\/sir.unl.edu\/.  Lincoln University of Nebraska. Software-artifact Infrastructure Repository. http:\/\/sir.unl.edu\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081753"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2008.48"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.93"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001445"},{"key":"e_1_3_2_1_25_1","first-page":"1335","volume-title":"Proceedings of the International Conference on Software Engineering","author":"Pastore F.","year":"2013","unstructured":"F. Pastore , L. Mariani , and A. Goffi . RADAR: A tool for debugging regression problems in C\/C++ software . In Proceedings of the International Conference on Software Engineering , pages 1335 -- 1338 , 2013 . F. Pastore, L. Mariani, and A. Goffi. RADAR: A tool for debugging regression problems in C\/C++ software. In Proceedings of the International Conference on Software Engineering, pages 1335--1338, 2013."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2012.9"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2003.1240292"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336790"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2451116.2451131"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287632"},{"key":"e_1_3_2_1_31_1","first-page":"40","volume-title":"Proceedings of the International Conference on Automated Software Engineering","author":"Xie T.","year":"2003","unstructured":"T. Xie and D. Notkin . Tool-assisted Unit Test Selection based on Operational Violations . In Proceedings of the International Conference on Automated Software Engineering , pages 40 -- 48 , 2003 . T. Xie and D. Notkin. Tool-assisted Unit Test Selection based on Operational Violations. In Proceedings of the International Conference on Automated Software Engineering, pages 40--48, 2003."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368116"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134324"}],"event":{"name":"ASE '14: ACM\/IEEE International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","M\u00e4lardalen University M\u00e4lardalen University","IEEE CS"],"location":"Vasteras Sweden","acronym":"ASE '14"},"container-title":["Proceedings of the 29th ACM\/IEEE International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642937.2643014","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2642937.2643014","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:09Z","timestamp":1750229769000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642937.2643014"}},"subtitle":["locating and understanding bugs by analyzing mimicked executions"],"short-title":[],"issued":{"date-parts":[[2014,9,15]]},"references-count":34,"alternative-id":["10.1145\/2642937.2643014","10.1145\/2642937"],"URL":"https:\/\/doi.org\/10.1145\/2642937.2643014","relation":{},"subject":[],"published":{"date-parts":[[2014,9,15]]},"assertion":[{"value":"2014-09-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}