{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,11]],"date-time":"2025-10-11T08:24:07Z","timestamp":1760171047500,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":31,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,21]],"date-time":"2017-08-21T00:00:00Z","timestamp":1503273600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8750-14-2-0270 and FA8750-14-2-0270"],"award-info":[{"award-number":["FA8750-14-2-0270 and FA8750-14-2-0270"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1217582, CCF-1318489, and CCF-1420866"],"award-info":[{"award-number":["CCF-1217582, CCF-1318489, and CCF-1420866"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"A gift from Rajiv and Ritu Batra"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,8,21]]},"DOI":"10.1145\/3106237.3106280","type":"proceedings-article","created":{"date-parts":[[2017,8,2]],"date-time":"2017-08-02T19:36:18Z","timestamp":1501702578000},"page":"511-522","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["The care and feeding of wild-caught mutants"],"prefix":"10.1145","author":[{"given":"David Bingham","family":"Brown","sequence":"first","affiliation":[{"name":"University of Wisconsin-Madison, USA"}]},{"given":"Michael","family":"Vaughn","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, USA"}]},{"given":"Ben","family":"Liblit","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, USA"}]},{"given":"Thomas","family":"Reps","sequence":"additional","affiliation":[{"name":"University of Wisconsin-Madison, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,8,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062530"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2008.4658076"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00625279"},{"key":"e_1_3_2_1_4_1","volume-title":"Bugzilla :: bugzilla.org. (May","author":"Home Bugzilla","year":"2016","unstructured":"Bugzilla development team. 2016. Home :: Bugzilla :: bugzilla.org. (May 2016 ). https:\/\/www.bugzilla.org\/ Bugzilla development team. 2016. Home :: Bugzilla :: bugzilla.org. (May 2016). https:\/\/www.bugzilla.org\/"},{"key":"e_1_3_2_1_5_1","volume-title":"PIT Mutation Testing. (2017). {Online","author":"Coles Henry","year":"2017","unstructured":"Henry Coles . 2017. PIT Mutation Testing. (2017). {Online ; accessed Jun. 2017 }. Henry Coles. 2017. PIT Mutation Testing. (2017). {Online; accessed Jun. 2017}."},{"volume-title":"Proceedings of the 25th International Conference on Software Engineering (ICSE \u201903)","author":"\u010cubrani\u0107 Davor","key":"e_1_3_2_1_6_1","unstructured":"Davor \u010cubrani\u0107 and Gail C. Murphy . 2003. Hipikat: Recommending Pertinent Software Development Artifacts . In Proceedings of the 25th International Conference on Software Engineering (ICSE \u201903) . IEEE Computer Society, Washington, DC, USA, 408\u2013418. http:\/\/dl.acm.org\/citation.cfm?id=776816.776866 Davor \u010cubrani\u0107 and Gail C. Murphy. 2003. Hipikat: Recommending Pertinent Software Development Artifacts. In Proceedings of the 25th International Conference on Software Engineering (ICSE \u201903). IEEE Computer Society, Washington, DC, USA, 408\u2013418. http:\/\/dl.acm.org\/citation.cfm?id=776816.776866"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-005-3861-2"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/942800.943568"},{"key":"e_1_3_2_1_10_1","unstructured":"943568  943568"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.231145"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628053"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635929"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287633"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2010.31"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270354"},{"key":"e_1_3_2_1_17_1","volume-title":"2016 IEEE 23rd International Conference on","volume":"1","author":"Le Xuan-Bach D.","year":"2016","unstructured":"Xuan-Bach D. Le , David Lo , and Claire Le Goues . 2016 . History driven program repair. In Software Analysis, Evolution, and Reengineering (SANER) , 2016 IEEE 23rd International Conference on , Vol. 1 . IEEE Computer Society, Suita, Osaka, Japan, 213\u2013224. Xuan-Bach D. Le, David Lo, and Claire Le Goues. 2016. History driven program repair. In Software Analysis, Evolution, and Reengineering (SANER), 2016 IEEE 23rd International Conference on, Vol. 1. IEEE Computer Society, Suita, Osaka, Japan, 213\u2013224."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/272991.272995"},{"key":"e_1_3_2_1_19_1","unstructured":"272995  272995"},{"key":"e_1_3_2_1_20_1","unstructured":"memcached community. 2017. Memcached. (Jan. 2017). https:\/\/github.com\/ memcached\/memcached  memcached community. 2017. Memcached. (Jan. 2017). https:\/\/github.com\/ memcached\/memcached"},{"key":"e_1_3_2_1_21_1","article-title":"Docker: Lightweight Linux Containers for Consistent Development and Deployment","volume":"2014","author":"Merkel Dirk","year":"2014","unstructured":"Dirk Merkel . 2014 . Docker: Lightweight Linux Containers for Consistent Development and Deployment . Linux Journal 2014 , 239, Article 2 (March 2014), 16 pages. http:\/\/dl.acm.org\/citation.cfm?id=2600239.2600241 Dirk Merkel. 2014. Docker: Lightweight Linux Containers for Consistent Development and Deployment. Linux Journal 2014, 239, Article 2 (March 2014), 16 pages. http:\/\/dl.acm.org\/citation.cfm?id=2600239.2600241","journal-title":"Linux Journal"},{"volume-title":"Proceedings of the International Conference on Software Maintenance (ICSM\u201900)","author":"Mockus Audris","key":"e_1_3_2_1_22_1","unstructured":"Audris Mockus and Lawrence G. Votta . 2000. Identifying Reasons for Software Changes Using Historic Databases . In Proceedings of the International Conference on Software Maintenance (ICSM\u201900) (ICSM \u201900). IEEE Computer Society, Washington, DC, USA, 120\u2013. http:\/\/dl.acm.org\/citation.cfm?id=850948.853410 Audris Mockus and Lawrence G. Votta. 2000. Identifying Reasons for Software Changes Using Historic Databases. In Proceedings of the International Conference on Software Maintenance (ICSM\u201900) (ICSM \u201900). IEEE Computer Society, Washington, DC, USA, 120\u2013. http:\/\/dl.acm.org\/citation.cfm?id=850948.853410"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.57"},{"key":"e_1_3_2_1_24_1","volume-title":"Proceedings of the 1996 Annual Conference on Computer Assurance. IEEE Computer Society","author":"Jefferson Offutt A.","year":"1996","unstructured":"A. Jefferson Offutt and Jie Pan . 1996 . Detecting Equivalent Mutants and the Feasible Path Problem . In Proceedings of the 1996 Annual Conference on Computer Assurance. IEEE Computer Society , Gaithersburg, Maryland, 224\u2013236. A. Jefferson Offutt and Jie Pan. 1996. Detecting Equivalent Mutants and the Feasible Path Problem. In Proceedings of the 1996 Annual Conference on Computer Assurance. IEEE Computer Society, Gaithersburg, Maryland, 224\u2013236."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1215995.1216005"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1739230.1739250"},{"key":"e_1_3_2_1_27_1","unstructured":"Salvatore Sanfilippo. 2017. Redis. (Feb. 2017). https:\/\/github.com\/antirez\/redis  Salvatore Sanfilippo. 2017. Redis. (Feb. 2017). https:\/\/github.com\/antirez\/redis"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1082983.1083147"},{"key":"e_1_3_2_1_29_1","volume-title":"Linux kernel. (Feb","author":"Torvals Linus","year":"2017","unstructured":"Linus Torvals . 2017. Linux kernel. (Feb . 2017 ). https:\/\/github.com\/torvalds\/linux Linus Torvals. 2017. Linux kernel. (Feb. 2017). https:\/\/github.com\/torvalds\/linux"},{"key":"e_1_3_2_1_30_1","volume-title":"Empirical Evaluation of the Textual Differencing Regression Testing Technique. In 1998 International Conference on Software Maintenance, ICSM 1998","author":"Filippos","year":"1998","unstructured":"Filippos I. Vokolos and Phyllis G. Frankl. 1998 . Empirical Evaluation of the Textual Differencing Regression Testing Technique. In 1998 International Conference on Software Maintenance, ICSM 1998 , Bethesda, Maryland, USA , November 16-19, 1998 . Filippos I. Vokolos and Phyllis G. Frankl. 1998. Empirical Evaluation of the Textual Differencing Regression Testing Technique. In 1998 International Conference on Software Maintenance, ICSM 1998, Bethesda, Maryland, USA, November 16-19, 1998."},{"key":"e_1_3_2_1_31_1","unstructured":"IEEE Computer Society Washington DC USA 44\u201353. ICSM.1998.738488  IEEE Computer Society Washington DC USA 44\u201353. ICSM.1998.738488"}],"event":{"name":"ESEC\/FSE'17: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Paderborn Germany","acronym":"ESEC\/FSE'17"},"container-title":["Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3106280","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106237.3106280","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3106237.3106280","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:30:37Z","timestamp":1750217437000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3106237.3106280"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,8,21]]},"references-count":31,"alternative-id":["10.1145\/3106237.3106280","10.1145\/3106237"],"URL":"https:\/\/doi.org\/10.1145\/3106237.3106280","relation":{},"subject":[],"published":{"date-parts":[[2017,8,21]]},"assertion":[{"value":"2017-08-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}