{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,9]],"date-time":"2026-04-09T14:02:01Z","timestamp":1775743321524,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,27]],"date-time":"2018-05-27T00:00:00Z","timestamp":1527379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Nederlandse Organisatie voor Wetenschappelijk Onderzoek","award":["016.133.324"],"award-info":[{"award-number":["016.133.324"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,27]]},"DOI":"10.1145\/3180155.3180175","type":"proceedings-article","created":{"date-parts":[[2018,12,13]],"date-time":"2018-12-13T15:45:16Z","timestamp":1544715916000},"page":"572-583","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":58,"title":["On the dichotomy of debugging behavior among programmers"],"prefix":"10.1145","author":[{"given":"Moritz","family":"Beller","sequence":"first","affiliation":[{"name":"Delft University of Technology, The Netherlands"}]},{"given":"Niels","family":"Spruit","sequence":"additional","affiliation":[{"name":"Delft University of Technology, The Netherlands"}]},{"given":"Diomidis","family":"Spinellis","sequence":"additional","affiliation":[{"name":"Athens University of Economics and Business Greece"}]},{"given":"Andy","family":"Zaidman","sequence":"additional","affiliation":[{"name":"Delft University of Technology, The Netherlands"}]}],"member":"320","published-online":{"date-parts":[[2018,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.5555\/3066420"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1788374.1788388"},{"key":"e_1_3_2_1_3_1","volume-title":"Brian W.","author":"Kernighan B. W.","year":"1978","unstructured":"B. W. Kernighan and P. J. Plauger, \"The elements of programming style,\" The elements of programming style, by Kernighan, Brian W.; Plauger, PJ New York: McGraw-Hill, c1978., 1978."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1718010"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW.2014.36"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(89)90040-X"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000791.2000795"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985811"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831716"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.65"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/248448.248455"},{"key":"e_1_3_2_1_12_1","volume-title":"Debugging with GDB","author":"Stallman R.","year":"2011","unstructured":"R. Stallman, R. Pesch, S. Shebs et al., Debugging with GDB, 10th ed. Free Software Foundation, 2011.","edition":"10"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1199184"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/10747.10750"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1457534"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/800007.808031"},{"key":"e_1_3_2_1_17_1","volume-title":"Debugging with dbx,\" in UNIX Programmer's Supplementary Documents","author":"Tuthill B.","year":"1986","unstructured":"B. Tuthill and K. J. Dunlap, \"Debugging with dbx,\" in UNIX Programmer's Supplementary Documents, Volume 1. Berkeley, California 94720: Computer Systems Research Group, Department of Electrical Engineering and Computer Science, University of California, Apr. 1986, 4.3 Berkeley Software Distribution."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/249094.249108"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368130"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1016\/0001-6918(91)90009-O"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587053"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/1888258.1888293"},{"key":"e_1_3_2_1_23_1","first-page":"127","volume-title":"Software fault localization using elastic net: A new statistical approach,\" in Advances in Software Engineering","author":"Parsa S.","year":"2009","unstructured":"S. Parsa, M. Vahidi-Asl, S. Arabi, and B. Minaei-Bidgoli, \"Software fault localization using elastic net: A new statistical approach,\" in Advances in Software Engineering. Springer, 2009, pp. 127--134."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/1600267.1600268"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.8.3.603-616"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336790"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.9"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2008623.2008655"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSMR-WCRE.2014.6747215"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351681"},{"key":"e_1_3_2_1_31_1","volume-title":"Are we there yet?\" https:\/\/www.youtube.com\/ watch?v=WJHQnzLpVXk&feature=youtu.be","author":"Orso A.","year":"2014","unstructured":"A. Orso, \"Automated debugging: Are we there yet?\" https:\/\/www.youtube.com\/ watch?v=WJHQnzLpVXk&feature=youtu.be, 2014, {Online; accessed 11 July 2016}."},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-015-9294-2"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.105"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-010-9104-9"},{"key":"e_1_3_2_1_35_1","first-page":"383","volume-title":"2013 ACM\/IEEE International Symposium on. IEEE","author":"Layman L.","year":"2013","unstructured":"L. Layman, M. Diep, M. Nagappan, J. Singer, R. Deline, and G. Venolia, \"Debugging revisited: Toward understanding the debugging needs of contemporary software developers,\" in Empirical Software Engineering and Measurement, 2013 ACM\/IEEE International Symposium on. IEEE, 2013, pp. 383--392."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2015.7332447"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2470654.2466418"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.94"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","unstructured":"M. B\u00f6hme E. O. Soremekun S. Chattopadhyay E. Ugherughe and A. Zeller \"Where is the bug and how is it fixed? an experiment with practitioners \" in Proceedings of the 11th Joint Meeting of the European Software Engineering Conference and Symopsium on the Foundations of Software Engineering (ESEC\/FSE). IEEE 2017 pp. ??--?? 10.1145\/3106237.3106255","DOI":"10.1145\/3106237.3106255"},{"key":"e_1_3_2_1_40_1","first-page":"1","volume-title":"ACM","author":"Petrillo F.","year":"2016","unstructured":"F. Petrillo, Z. Soh, F. Khomh, M. Pimenta, C. Freitas, and Y.-G. Gu\u00c3l'h\u00c3l'neuc, \"Understanding interactive debugging with swarm debug infrastructure,\" in Proceedings of the 24th International Conference on Program Comprehension. ACM, 2016, pp. 1--4."},{"key":"e_1_3_2_1_41_1","first-page":"124","volume-title":"A study of visual studio usage in practice,\" in 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER)","author":"Amann S.","year":"2016","unstructured":"S. Amann, S. Proksch, S. Nadi, and M. Mezini, \"A study of visual studio usage in practice,\" in 23rd International Conference on Software Analysis, Evolution, and Reengineering (SANER), vol. 1. IEEE, 2016, pp. 124--134."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810339"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39038-8_23"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2013.69"},{"key":"e_1_3_2_1_45_1","volume-title":"NJ","author":"Kernighan B. W.","year":"1978","unstructured":"B. W. Kernighan, UNIX for Beginners. Bell Laboratories Murray Hill, NJ, 1978."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.70"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/1942032"},{"key":"e_1_3_2_1_48_1","volume-title":"Rosenfeld Media","author":"Spencer D.","year":"2009","unstructured":"D. Spencer, Card sorting: Designing usable categories. Rosenfeld Media, 2009."},{"key":"e_1_3_2_1_49_1","volume-title":"A guide to chi-squared testing","author":"Greenwood P. E.","year":"1996","unstructured":"P. E. Greenwood and M. S. Nikulin, A guide to chi-squared testing. John Wiley & Sons, 1996, vol. 280."},{"key":"e_1_3_2_1_50_1","volume-title":"Duxbury","author":"Devore J. L.","year":"1999","unstructured":"J. L. Devore and N. Farnum, Applied Statistics for Engineers and Scientists. Duxbury, 1999."},{"key":"e_1_3_2_1_51_1","volume-title":"A new view of statistics","author":"Hopkins W. G.","year":"1997","unstructured":"W. G. Hopkins, A new view of statistics, 1997, http:\/\/newstatsi.org, Accessed 16 March 2015."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.5555\/599894"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337280"},{"key":"e_1_3_2_1_54_1","first-page":"102","volume-title":"The moldable debugger: A framework for developing domain-specific debuggers,\" in International Conference on Software Language Engineering","author":"Chi\u015f A.","year":"2014","unstructured":"A. Chi\u015f, T. G\u00eerba, and O. Nierstrasz, \"The moldable debugger: A framework for developing domain-specific debuggers,\" in International Conference on Software Language Engineering. Springer, 2014, pp. 102--121."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/381641.381656"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2776152"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786843"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.5555\/2819009.2819101"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897022.2897027"},{"key":"e_1_3_2_1_60_1","unstructured":"Organisation for Economic Co-Operation and Development \"Average annual hours actually worked per worker \" http:\/\/stats.oecd.org\/index.aspx? DataSetCode=ANHRS 2015 {Online; accessed 11 July 2016}."},{"key":"e_1_3_2_1_61_1","volume-title":"A SLOC counting standard,\" in COCOMO II Forum","author":"Nguyen V.","year":"2007","unstructured":"V. Nguyen, S. Deeds-Rubin, T. Tan, and B. Boehm, \"A SLOC counting standard,\" in COCOMO II Forum, vol. 2007, 2007."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3052939"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/533100"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2010.10.007"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2009.169"},{"key":"e_1_3_2_1_66_1","volume-title":"a DVR for Java,\" http:\/\/chrononsystems.com\/","author":"Systems C.","year":"2015","unstructured":"C. Systems, \"Chronon, a DVR for Java,\" http:\/\/chrononsystems.com\/, 2015, {Online; accessed 24 August 2016}."},{"key":"e_1_3_2_1_67_1","unstructured":"A. Inc. \"Xcode 8 \" https:\/\/developer.apple.com\/xcode\/ 2015 {Online; accessed 24 August 2016}."},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.chb.2010.10.023"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.5555\/2820282.2820289"}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","location":"Gothenburg Sweden","acronym":"ICSE '18","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"]},"container-title":["Proceedings of the 40th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3180155.3180175","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3180155.3180175","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:18Z","timestamp":1750208898000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3180155.3180175"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,5,27]]},"references-count":69,"alternative-id":["10.1145\/3180155.3180175","10.1145\/3180155"],"URL":"https:\/\/doi.org\/10.1145\/3180155.3180175","relation":{},"subject":[],"published":{"date-parts":[[2018,5,27]]},"assertion":[{"value":"2018-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}