{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,28]],"date-time":"2026-04-28T01:01:54Z","timestamp":1777338114671,"version":"3.51.4"},"publisher-location":"New York, NY, USA","reference-count":92,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T00:00:00Z","timestamp":1562716800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Shenzhen Peacock Plan","award":["KQTD2016112514355531"],"award-info":[{"award-number":["KQTD2016112514355531"]}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1566589,CCF-1763906"],"award-info":[{"award-number":["CCF-1566589,CCF-1763906"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Science and Technology Innovation Committee Foundation of Shenzhen","award":["JCYJ20170817110848086"],"award-info":[{"award-number":["JCYJ20170817110848086"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,10]]},"DOI":"10.1145\/3293882.3330574","type":"proceedings-article","created":{"date-parts":[[2019,7,11]],"date-time":"2019-07-11T12:13:31Z","timestamp":1562847211000},"page":"169-180","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":274,"title":["DeepFL: integrating multiple fault diagnosis dimensions for deep fault localization"],"prefix":"10.1145","author":[{"given":"Xia","family":"Li","sequence":"first","affiliation":[{"name":"University of Texas at Dallas, USA"}]},{"given":"Wei","family":"Li","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, China"}]},{"given":"Yuqun","family":"Zhang","sequence":"additional","affiliation":[{"name":"Southern University of Science and Technology, China"}]},{"given":"Lingming","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"The economic impacts of inadequate infrastructure for software testing","author":"Planning S.","year":"2002","unstructured":"S. Planning , \u201c The economic impacts of inadequate infrastructure for software testing ,\u201d 2002 . S. Planning, \u201cThe economic impacts of inadequate infrastructure for software testing,\u201d 2002."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080769"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085130.1085135"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1276842.1276844"},{"key":"e_1_3_2_1_5_1","first-page":"98","volume-title":"Testing: Academic and Industrial Conference Practice and Research Techniques-MUTATION, 2007","author":"Abreu R.","year":"2007","unstructured":"R. Abreu , P. Zoeteweij , and A. J. Van Gemund , \u201c On the accuracy of spectrumbased fault localization ,\u201d in Testing: Academic and Industrial Conference Practice and Research Techniques-MUTATION, 2007 . TAICPART-MUTATION 2007 . IEEE, 2007, pp. 89\u2013 98 . R. Abreu, P. Zoeteweij, and A. J. Van Gemund, \u201cOn the accuracy of spectrumbased fault localization,\u201d in Testing: Academic and Industrial Conference Practice and Research Techniques-MUTATION, 2007. TAICPART-MUTATION 2007. IEEE, 2007, pp. 89\u201398."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931051"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49052-6_6"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931049"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.41"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.62"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330559"},{"key":"e_1_3_2_1_12_1","volume-title":"Automatic repair of real bugs: An experience report on the defects4j dataset","author":"Martinez M.","year":"2015","unstructured":"M. Martinez , T. Durieux , J. Xuan , R. Sommerard , and M. Monperrus , \u201c Automatic repair of real bugs: An experience report on the defects4j dataset ,\u201d arXiv preprint arXiv:1505.07002, 2015 . M. Martinez, T. Durieux, J. Xuan, R. Sommerard, and M. Monperrus, \u201cAutomatic repair of real bugs: An experience report on the defects4j dataset,\u201d arXiv preprint arXiv:1505.07002, 2015."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2948705"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337225"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486890"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106262"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-C.2017.76"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2521368"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101949"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2006.18"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2012.12"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000791.2000795"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.28"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.159"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554978"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1509"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509551"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133916"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1561\/1500000016"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092717"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884804"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2017.29"},{"key":"e_1_3_2_1_34_1","volume-title":"Tensorflow website","year":"2018","unstructured":"\u201c Tensorflow website ,\u201d 2018 . {Online}. Available: https:\/\/www.tensorflow.org\/ \u201cTensorflow website,\u201d 2018. {Online}. Available: https:\/\/www.tensorflow.org\/"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2007.109"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065014"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1616"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/QRS.2017.22"},{"key":"e_1_3_2_1_40_1","volume-title":"Proceedings of ICSE 2001 Workshop on Software Visualization","author":"Jones J. A.","year":"2001","unstructured":"J. A. Jones , M. J. Harrold , and J. T. Stasko , \u201c Visualization for fault localization ,\u201d in in Proceedings of ICSE 2001 Workshop on Software Visualization , 2001 . J. A. Jones, M. J. Harrold, and J. T. Stasko, \u201cVisualization for fault localization,\u201d in in Proceedings of ICSE 2001 Workshop on Software Visualization, 2001."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.60"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180247"},{"key":"e_1_3_2_1_43_1","volume-title":"Dagstuhl Reports","author":"Kim S.","unstructured":"S. Kim , C. Le Goues , M. Pradel , and A. Roychoudhury , \u201c Automated program repair (dagstuhl seminar 17022) ,\u201d in Dagstuhl Reports , vol. 7 , no. 1. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 2017. S. Kim, C. Le Goues, M. Pradel, and A. Roychoudhury, \u201cAutomated program repair (dagstuhl seminar 17022),\u201d in Dagstuhl Reports, vol. 7, no. 1. Schloss Dagstuhl-Leibniz-Zentrum fuer Informatik, 2017."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568303"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609672"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-016-9332-8"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2892102"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1155\/2016\/1820454"},{"key":"e_1_3_2_1_49_1","first-page":"146","volume-title":"Software Reliability, 2007. ISSRE\u201907. The 18th IEEE International Symposium on. IEEE","author":"Briand L. C.","year":"2007","unstructured":"L. C. Briand , Y. Labiche , and X. Liu , \u201c Using machine learning to support debugging with tarantula ,\u201d in Software Reliability, 2007. ISSRE\u201907. The 18th IEEE International Symposium on. IEEE , 2007 , pp. 137\u2013 146 . L. C. Briand, Y. Labiche, and X. Liu, \u201cUsing machine learning to support debugging with tarantula,\u201d in Software Reliability, 2007. ISSRE\u201907. The 18th IEEE International Symposium on. IEEE, 2007, pp. 137\u2013146."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.2017EDL8143"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1142\/S021819400900426X"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.9"},{"key":"e_1_3_2_1_53_1","volume-title":"Reducing the dimensionality of data with neural networks","author":"Hinton G. E.","unstructured":"G. E. Hinton and R. R. Salakhutdinov , \u201c Reducing the dimensionality of data with neural networks ,\u201d science, vol. 313 , no. 5786, pp. 504\u2013507, 2006. G. E. Hinton and R. R. Salakhutdinov, \u201cReducing the dimensionality of data with neural networks,\u201d science, vol. 313, no. 5786, pp. 504\u2013507, 2006."},{"issue":"3","key":"e_1_3_2_1_54_1","first-page":"1","article-title":"Learning representations by back-propagating errors","volume":"5","author":"Rumelhart D. E.","year":"1988","unstructured":"D. E. Rumelhart , G. E. Hinton , R. J. Williams ., \u201c Learning representations by back-propagating errors ,\u201d Cognitive modeling , vol. 5 , no. 3 , p. 1 , 1988 . D. E. Rumelhart, G. E. Hinton, R. J. Williams et al., \u201cLearning representations by back-propagating errors,\u201d Cognitive modeling, vol. 5, no. 3, p. 1, 1988.","journal-title":"Cognitive modeling"},{"key":"e_1_3_2_1_56_1","first-page":"3","article-title":"\u201cRecurrent neural network based language model","volume":"2","author":"Mikolov T.","year":"2010","unstructured":"T. Mikolov , M. Karafi\u00e1t , L. Burget , J. Cernock`y, and S. Khudanpur , \u201cRecurrent neural network based language model .\u201d in Interspeech , vol. 2 , 2010 , p. 3 . ISSTA \u201919, July 15\u201319, 2019, Beijing, China Xia Li, Wei Li, Yuqun Zhang, and Lingming Zhang T. Mikolov, M. Karafi\u00e1t, L. Burget, J. Cernock`y, and S. Khudanpur, \u201cRecurrent neural network based language model.\u201d in Interspeech, vol. 2, 2010, p. 3. ISSTA \u201919, July 15\u201319, 2019, Beijing, China Xia Li, Wei Li, Yuqun Zhang, and Lingming Zhang","journal-title":"Interspeech"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.5555\/1639537.1639542"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/72.279181"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1162\/neco.1997.9.8.1735"},{"key":"e_1_3_2_1_60_1","first-page":"1105","volume-title":"Advances in neural information processing systems","author":"Krizhevsky A.","year":"2012","unstructured":"A. Krizhevsky , I. Sutskever , and G. E. Hinton , \u201c Imagenet classification with deep convolutional neural networks ,\u201d in Advances in neural information processing systems , 2012 , pp. 1097\u2013 1105 . A. Krizhevsky, I. Sutskever, and G. E. Hinton, \u201cImagenet classification with deep convolutional neural networks,\u201d in Advances in neural information processing systems, 2012, pp. 1097\u20131105."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2522920.2522924"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-39742-4_17"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-03969-0_21"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-010-0069-5"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1043"},{"key":"e_1_3_2_1_66_1","volume-title":"Elements of software science","author":"Halstead M. H.","year":"1977","unstructured":"M. H. Halstead , Elements of software science . Elsevier New York , 1977 , vol. 7 . M. H. Halstead, Elements of software science. Elsevier New York, 1977, vol. 7."},{"key":"e_1_3_2_1_67_1","volume-title":"Asm java bytecode manipulation and analysis framework","year":"2018","unstructured":"\u201c Asm java bytecode manipulation and analysis framework ,\u201d 2018 . {Online}. Available: http:\/\/asm.ow2.org\/ \u201cAsm java bytecode manipulation and analysis framework,\u201d 2018. {Online}. Available: http:\/\/asm.ow2.org\/"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2010.04.002"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693093"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337226"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771797"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.14.0309"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1108\/eb026526"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10479-005-5724-z"},{"key":"e_1_3_2_1_75_1","first-page":"323","volume-title":"Y. Lan, Z. ming Ma, and H. Li, \u201cRanking measures and loss functions in learning to rank","author":"Chen W.","year":"2009","unstructured":"W. Chen , T. yan Liu , Y. Lan, Z. ming Ma, and H. Li, \u201cRanking measures and loss functions in learning to rank ,\u201d in Advances in Neural Information Processing Systems 22, Y. Bengio, D. Schuurmans, J. D. Lafferty, C. K. I. Williams, and A. Culotta, Eds. Curran Associates, Inc ., 2009 , pp. 315\u2013 323 . {Online}. Available: http:\/\/papers.nips.cc\/paper\/3708-ranking-measures-andloss-functions-in-learning-to-rank.pdf W. Chen, T. yan Liu, Y. Lan, Z. ming Ma, and H. Li, \u201cRanking measures and loss functions in learning to rank,\u201d in Advances in Neural Information Processing Systems 22, Y. Bengio, D. Schuurmans, J. D. Lafferty, C. K. I. Williams, and A. Culotta, Eds. Curran Associates, Inc., 2009, pp. 315\u2013323. {Online}. Available: http:\/\/papers.nips.cc\/paper\/3708-ranking-measures-andloss-functions-in-learning-to-rank.pdf"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-7908-2604-3_16"},{"key":"e_1_3_2_1_77_1","volume-title":"Core Louvain-la-Neuve","author":"Nesterov Y.","year":"2007","unstructured":"Y. Nesterov , \u201c Gradient methods for minimizing composite objective function .\u201d Core Louvain-la-Neuve , 2007 . Y. Nesterov et al., \u201cGradient methods for minimizing composite objective function.\u201d Core Louvain-la-Neuve, 2007."},{"key":"e_1_3_2_1_78_1","volume-title":"Adam: A method for stochastic optimization","author":"Kingma D.","year":"2014","unstructured":"D. Kingma and J. Ba , \u201c Adam: A method for stochastic optimization ,\u201d arXiv preprint arXiv:1412.6980, 2014 . D. Kingma and J. Ba, \u201cAdam: A method for stochastic optimization,\u201d arXiv preprint arXiv:1412.6980, 2014."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092731"},{"key":"e_1_3_2_1_80_1","volume-title":"Java programming language agents","year":"2018","unstructured":"\u201c Java programming language agents ,\u201d 2018 . {Online}. Available: https:\/\/docs. oracle.com\/javase\/7\/docs\/api\/java\/lang\/instrument\/package-summary.html \u201cJava programming language agents,\u201d 2018. {Online}. Available: https:\/\/docs. oracle.com\/javase\/7\/docs\/api\/java\/lang\/instrument\/package-summary.html"},{"key":"e_1_3_2_1_81_1","volume-title":"Pit mutation testing system","year":"2018","unstructured":"\u201c Pit mutation testing system ,\u201d 2018 . {Online}. Available: http:\/\/pitest.org\/ \u201cPit mutation testing system,\u201d 2018. {Online}. Available: http:\/\/pitest.org\/"},{"key":"e_1_3_2_1_82_1","volume-title":"Jhawk website","year":"2018","unstructured":"\u201c Jhawk website ,\u201d 2018 . {Online}. Available: http:\/\/www.virtualmachinery.com\/ jhawkprod.htm \u201cJhawk website,\u201d 2018. {Online}. Available: http:\/\/www.virtualmachinery.com\/ jhawkprod.htm"},{"key":"e_1_3_2_1_83_1","volume-title":"Indri website","year":"2018","unstructured":"\u201c Indri website ,\u201d 2018 . {Online}. Available: https:\/\/www.lemurproject.org\/indri. php \u201cIndri website,\u201d 2018. {Online}. Available: https:\/\/www.lemurproject.org\/indri. php"},{"key":"e_1_3_2_1_84_1","volume-title":"Libsvm website","year":"2018","unstructured":"\u201c Libsvm website ,\u201d 2018 . {Online}. Available: https:\/\/www.csie.ntu.edu.tw\/~cjlin\/ libsvm\/ \u201cLibsvm website,\u201d 2018. {Online}. Available: https:\/\/www.csie.ntu.edu.tw\/~cjlin\/ libsvm\/"},{"key":"e_1_3_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001445"},{"key":"e_1_3_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155642"},{"key":"e_1_3_2_1_87_1","first-page":"224","volume-title":"2016 IEEE 23rd International Conference on","volume":"1","author":"Le X. B. D.","year":"2016","unstructured":"X. B. D. Le , D. Lo , and C. Le Goues , \u201c History driven program repair,\u201d in Software Analysis, Evolution, and Reengineering (SANER) , 2016 IEEE 23rd International Conference on , vol. 1 , 2016 , pp. 213\u2013 224 . X. B. D. Le, D. Lo, and C. Le Goues, \u201cHistory driven program repair,\u201d in Software Analysis, Evolution, and Reengineering (SANER), 2016 IEEE 23rd International Conference on, vol. 1, 2016, pp. 213\u2013224."},{"key":"e_1_3_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786880"},{"key":"e_1_3_2_1_89_1","volume-title":"AT&amp;T Labs {Online}. Available: http:\/\/yann. lecun. com\/exdb\/mnist","author":"LeCun Y.","year":"2010","unstructured":"Y. LeCun , C. Cortes , and C. Burges , \u201c Mnist handwritten digit database ,\u201d AT&amp;T Labs {Online}. Available: http:\/\/yann. lecun. com\/exdb\/mnist , vol. 2 , 2010 . Y. LeCun, C. Cortes, and C. Burges, \u201cMnist handwritten digit database,\u201d AT&amp;T Labs {Online}. Available: http:\/\/yann. lecun. com\/exdb\/mnist, vol. 2, 2010."},{"key":"e_1_3_2_1_90_1","volume-title":"Deepfl website","year":"2019","unstructured":"\u201c Deepfl website ,\u201d 2019 . {Online}. Available: https:\/\/github.com\/DeepFL\/ DeepFaultLocalization.git \u201cDeepfl website,\u201d 2019. {Online}. Available: https:\/\/github.com\/DeepFL\/ DeepFaultLocalization.git"},{"key":"e_1_3_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.2307\/3001968"},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1961.10482090"},{"key":"e_1_3_2_1_93_1","volume-title":"Effect size","year":"2016","unstructured":"\u201c Effect size ,\u201d 2016 . {Online}. Available: https:\/\/www.ncbi.nlm.nih.gov\/pmc\/ articles\/PMC5122517\/ \u201cEffect size,\u201d 2016. {Online}. Available: https:\/\/www.ncbi.nlm.nih.gov\/pmc\/ articles\/PMC5122517\/"},{"key":"e_1_3_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635920"}],"event":{"name":"ISSTA '19: 28th ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Beijing China","acronym":"ISSTA '19","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3293882.3330574","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3293882.3330574","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3293882.3330574","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:51Z","timestamp":1750207431000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3293882.3330574"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,10]]},"references-count":92,"alternative-id":["10.1145\/3293882.3330574","10.1145\/3293882"],"URL":"https:\/\/doi.org\/10.1145\/3293882.3330574","relation":{},"subject":[],"published":{"date-parts":[[2019,7,10]]},"assertion":[{"value":"2019-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}