{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,10]],"date-time":"2026-04-10T17:43:29Z","timestamp":1775843009679,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T00:00:00Z","timestamp":1499644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"UT Dallas start-up fund"},{"name":"CNS","award":["1239498"],"award-info":[{"award-number":["1239498"]}]},{"name":"CCF","award":["1319688,1566589"],"award-info":[{"award-number":["1319688,1566589"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,10]]},"DOI":"10.1145\/3092703.3092731","type":"proceedings-article","created":{"date-parts":[[2017,7,11]],"date-time":"2017-07-11T20:17:18Z","timestamp":1499804238000},"page":"261-272","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":109,"title":["Boosting spectrum-based fault localization using PageRank"],"prefix":"10.1145","author":[{"given":"Mengshi","family":"Zhang","sequence":"first","affiliation":[{"name":"University of Texas at Austin, USA"}]},{"given":"Xia","family":"Li","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, USA"}]},{"given":"Lingming","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, USA"}]},{"given":"Sarfraz","family":"Khurshid","sequence":"additional","affiliation":[{"name":"University of Texas at Austin, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"ASM Java bytecode manipulation and analysis framework. (2017). http: \/\/asm.ow2.org\/ Accessed: 01-30-2017","year":"2017","unstructured":"2017. ASM Java bytecode manipulation and analysis framework. (2017). http: \/\/asm.ow2.org\/ Accessed: 01-30-2017 . 2017 . Github a web-based version control repository and Internet hosting service. (2017). https:\/\/github.com\/ Accessed: 01-30-2017. 2017. Java programming language agents. (2017). https:\/\/docs.oracle.com\/javase\/ 7\/docs\/api\/java\/lang\/instrument\/package-summary.html Accessed: 01-30-2017. 2017. Numpy package for scientific computing with Python. (2017). http: \/\/www.numpy.org\/ Accessed: 01-30-2017. 2017. PIT mutation testing tool. (2017). http:\/\/http:\/\/pitest.org\/ Accessed : 01-30-2017. 2017. ASM Java bytecode manipulation and analysis framework. (2017). http: \/\/asm.ow2.org\/ Accessed: 01-30-2017. 2017. Github a web-based version control repository and Internet hosting service. (2017). https:\/\/github.com\/ Accessed: 01-30-2017. 2017. Java programming language agents. (2017). https:\/\/docs.oracle.com\/javase\/ 7\/docs\/api\/java\/lang\/instrument\/package-summary.html Accessed: 01-30-2017. 2017. Numpy package for scientific computing with Python. (2017). http: \/\/www.numpy.org\/ Accessed: 01-30-2017. 2017. PIT mutation testing tool. (2017). http:\/\/http:\/\/pitest.org\/ Accessed: 01-30-2017."},{"key":"e_1_3_2_1_2_1","volume-title":"Testing: Academic and Industrial Conference Practice and Research Techniques-MUTATION, 2007","author":"Abreu Rui","year":"2007","unstructured":"Rui Abreu , Peter Zoeteweij , and Arjan JC Van Gemund . 2007 . On the accuracy of spectrum-based fault localization . In Testing: Academic and Industrial Conference Practice and Research Techniques-MUTATION, 2007 . TAICPART-MUTATION 2007. Rui Abreu, Peter Zoeteweij, and Arjan JC Van Gemund. 2007. On the accuracy of spectrum-based fault localization. In Testing: Academic and Industrial Conference Practice and Research Techniques-MUTATION, 2007. TAICPART-MUTATION 2007."},{"key":"e_1_3_2_1_3_1","unstructured":"IEEE 89\u201398.  IEEE 89\u201398."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338966.2336799"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100114"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062530"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931049"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337273"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693085"},{"key":"e_1_3_2_1_10_1","volume-title":"Assessing and Comparing Mutation-based Fault Localization Techniques. arXiv preprint arXiv:1607.05512","author":"Chekam Thierry Titcheu","year":"2016","unstructured":"Thierry Titcheu Chekam , Mike Papadakis , and Yves Le Traon . 2016. Assessing and Comparing Mutation-based Fault Localization Techniques. arXiv preprint arXiv:1607.05512 ( 2016 ). Thierry Titcheu Chekam, Mike Papadakis, and Yves Le Traon. 2016. Assessing and Comparing Mutation-based Fault Localization Techniques. arXiv preprint arXiv:1607.05512 (2016)."},{"key":"e_1_3_2_1_11_1","volume-title":"Towards physical laws for software architecture. arXiv preprint arXiv:1003.5455","author":"Chepelianskii Alexei D","year":"2010","unstructured":"Alexei D Chepelianskii . 2010. Towards physical laws for software architecture. arXiv preprint arXiv:1003.5455 ( 2010 ). Alexei D Chepelianskii. 2010. Towards physical laws for software architecture. arXiv preprint arXiv:1003.5455 (2010)."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085130.1085143"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.29"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/646153.679523"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593735.2593740"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2007.01.015"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806672.1806688"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1137\/140976649"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101948"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.14"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581397"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635929"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2494232.2465753"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931051"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970308"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332502"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786880"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.104"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065014"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786811"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1616"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2747476.2747526"},{"key":"e_1_3_2_1_34_1","volume-title":"Automatic repair of real bugs in Java: A large-scale experiment on the Defects4J dataset. Empirical Software Engineering","author":"Martinez Matias","year":"2016","unstructured":"Matias Martinez , Thomas Durieux , Romain Sommerard , Jifeng Xuan , and Martin Monperrus . 2016. Automatic repair of real bugs in Java: A large-scale experiment on the Defects4J dataset. Empirical Software Engineering ( 2016 ), 1\u201329. Matias Martinez, Thomas Durieux, Romain Sommerard, Jifeng Xuan, and Martin Monperrus. 2016. Automatic repair of real bugs in Java: A large-scale experiment on the Defects4J dataset. Empirical Software Engineering (2016), 1\u201329."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2371458"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.28"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000791.2000795"},{"key":"e_1_3_2_1_38_1","volume-title":"Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence. AAAI Press, 1294\u20131301","author":"Nath Aniruddh","year":"2016","unstructured":"Aniruddh Nath and Pedro Domingos . 2016 . Learning tractable probabilistic models for fault localization . In Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence. AAAI Press, 1294\u20131301 . Aniruddh Nath and Pedro Domingos. 2016. Learning tractable probabilistic models for fault localization. In Proceedings of the Thirtieth AAAI Conference on Artificial Intelligence. AAAI Press, 1294\u20131301."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.83"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/SCAM.2013.6648189"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.159"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554978"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1509"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001445"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.62"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568254"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070821.2070823"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.86"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572291"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483767"},{"key":"e_1_3_2_1_52_1","volume-title":"The economic impacts of inadequate infrastructure for software testing","author":"Tassey Gregory","year":"2002","unstructured":"Gregory Tassey . 2002. The economic impacts of inadequate infrastructure for software testing . National Institute of Standards and Technology , RTI Project 7007, 011 ( 2002 ). Gregory Tassey. 2002. The economic impacts of inadequate infrastructure for software testing. National Institute of Standards and Technology, RTI Project 7007, 011 (2002)."},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771797"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2285319"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2521368"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39742-4_17"},{"key":"e_1_3_2_1_57_1","volume-title":"Thomas Durieux, Daniel Le Berre, and Martin Monperrus.","author":"Xuan Jifeng","year":"2017","unstructured":"Jifeng Xuan , Matias Martinez , Favio Demarco , Maxime Cl\u00e9ment , Sebastian Lamelas Marcote , Thomas Durieux, Daniel Le Berre, and Martin Monperrus. 2017 . Jifeng Xuan, Matias Martinez, Favio Demarco, Maxime Cl\u00e9ment, Sebastian Lamelas Marcote, Thomas Durieux, Daniel Le Berre, and Martin Monperrus. 2017."},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2560811"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.41"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635906"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33119-0_18"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/1982185.1982490"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509551"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134324"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.5555\/1276842.1276844"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-006-9007-3"}],"event":{"name":"ISSTA '17: International Symposium on Software Testing and Analysis","location":"Santa Barbara CA USA","acronym":"ISSTA '17","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3092703.3092731","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3092703.3092731","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:27Z","timestamp":1750217847000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3092703.3092731"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,10]]},"references-count":65,"alternative-id":["10.1145\/3092703.3092731","10.1145\/3092703"],"URL":"https:\/\/doi.org\/10.1145\/3092703.3092731","relation":{},"subject":[],"published":{"date-parts":[[2017,7,10]]},"assertion":[{"value":"2017-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}