{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T05:38:06Z","timestamp":1769751486013,"version":"3.49.0"},"publisher-location":"New York, NY, USA","reference-count":68,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,7,10]],"date-time":"2019-07-10T00:00:00Z","timestamp":1562716800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"the National Key Research and Development Program of China","award":["No.2017YFB1001803"],"award-info":[{"award-number":["No.2017YFB1001803"]}]},{"name":"the National Natural Science Foundation of China","award":["No. 61872008 and 61861130363"],"award-info":[{"award-number":["No. 61872008 and 61861130363"]}]},{"name":"ational Science Foundation","award":["CCF-1566589, CCF-1763906"],"award-info":[{"award-number":["CCF-1566589, CCF-1763906"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,7,10]]},"DOI":"10.1145\/3293882.3330578","type":"proceedings-article","created":{"date-parts":[[2019,7,11]],"date-time":"2019-07-11T12:13:31Z","timestamp":1562847211000},"page":"43-54","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":40,"title":["History-driven build failure fixing: how far are we?"],"prefix":"10.1145","author":[{"given":"Yiling","family":"Lou","sequence":"first","affiliation":[{"name":"Peking University, China"}]},{"given":"Junjie","family":"Chen","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"given":"Lingming","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Texas at Dallas, USA"}]},{"given":"Dan","family":"Hao","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"given":"Lu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Peking University, China"}]}],"member":"320","published-online":{"date-parts":[[2019,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Android Gradle DSL 2019","year":"2019","unstructured":"2019. Android Gradle DSL 2019 . Ant. http:\/\/ant.apache.org 2019 . Github SNAPSHOT. https:\/\/www.Github.com,accessonJan$31^{st}$2018. 2019. Gradle. https:\/\/gradle.org 2019. Gradle Central Repository 2019. Gradle DSL Document 2019. GROOVY AST API. http:\/\/docs.groovy-lang.org\/2.4.7\/html\/api\/org\/ codehaus\/groovy\/ast\/package-summary.html 2019. Manual Patch of Mockito\/db8a3f3. https:\/\/github.com\/mockito\/mockito\/ compare\/db8a3f3\ufffd2e4.4752e4fb0772 2019. Maven. http:\/\/maven.apache.org 2019. Travis. https:\/\/travis-ci.org 2019. Android Gradle DSL 2019. Ant. http:\/\/ant.apache.org 2019. Github SNAPSHOT. https:\/\/www.Github.com,accessonJan$31^{st}$2018. 2019. Gradle. https:\/\/gradle.org 2019. Gradle Central Repository 2019. Gradle DSL Document 2019. GROOVY AST API. http:\/\/docs.groovy-lang.org\/2.4.7\/html\/api\/org\/ codehaus\/groovy\/ast\/package-summary.html 2019. Manual Patch of Mockito\/db8a3f3. https:\/\/github.com\/mockito\/mockito\/ compare\/db8a3f3\ufffd2e4.4752e4fb0772 2019. Maven. http:\/\/maven.apache.org 2019. Travis. https:\/\/travis-ci.org"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2007.4362624"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591135"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635898"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.24"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693085"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985811"},{"key":"e_1_3_2_1_8_1","volume-title":"Proceedings of the 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. ACM.","author":"Chen Junjie","year":"2019","unstructured":"Junjie Chen , Jiaqi Han , Peiyi Sun , Lingming Zhang , Dan Hao , and Lu Zhang . 2019 . Compiler Bug Isolation via E\ufffdective Witness Test Program Generation . In Proceedings of the 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. ACM. to appear. Junjie Chen, Jiaqi Han, Peiyi Sun, Lingming Zhang, Dan Hao, and Lu Zhang. 2019. Compiler Bug Isolation via E\ufffdective Witness Test Program Generation. In Proceedings of the 27th ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering. ACM. to appear."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155642"},{"key":"e_1_3_2_1_10_1","unstructured":"Timo Wolf Adrian Schr\u00f6ter Daniela Damian and Thanh Nguyen. {n.d.}. Predicting Build Failures using Social Network Analysis on Developer Communication. ({n. d.}).  Timo Wolf Adrian Schr\u00f6ter Daniela Damian and Thanh Nguyen. {n.d.}. Predicting Build Failures using Social Network Analysis on Developer Communication. ({n. d.})."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831734"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330559"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568303"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180181"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-017-9355-3"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180245"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.30"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213871"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486893"},{"key":"e_1_3_2_1_21_1","volume-title":"Fixminer: Mining relevant \ufffdx patterns for automated program repair. arXiv preprint arXiv:1810.01791","author":"Koyuncu Anil","year":"2018","unstructured":"Anil Koyuncu , Kui Liu , Tegawend\u00e9 F Bissyand\u00e9 , Dongsun Kim , Jacques Klein , Martin Monperrus , and Yves Le Traon . 2018 . Fixminer: Mining relevant \ufffdx patterns for automated program repair. arXiv preprint arXiv:1810.01791 (2018). Anil Koyuncu, Kui Liu, Tegawend\u00e9 F Bissyand\u00e9, Dongsun Kim, Jacques Klein, Martin Monperrus, and Yves Le Traon. 2018. Fixminer: Mining relevant \ufffdx patterns for automated program repair. arXiv preprint arXiv:1810.01791 (2018)."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3098225"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106309"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.66"},{"key":"e_1_3_2_1_25_1","unstructured":"Xuan-Bach D Le David Lo and Claire Le Goues. 2016. History driven automated program repair. In SANER.  Xuan-Bach D Le David Lo and Claire Le Goues. 2016. History driven automated program repair. In SANER."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337225"},{"key":"e_1_3_2_1_27_1","volume-title":"Soviet physics doklady","author":"Levenshtein Vladimir I","unstructured":"Vladimir I Levenshtein . 1966. Binary codes capable of correcting deletions, insertions, and reversals . In Soviet physics doklady , Vol. 10 . 707\u2013710. Vladimir I Levenshtein. 1966. Binary codes capable of correcting deletions, insertions, and reversals. In Soviet physics doklady, Vol. 10. 707\u2013710."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330574"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133916"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238198"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.43"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635881"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786811"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837617"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635920"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2018.8330201"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.3115\/v1\/P14-5010"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884807"},{"key":"e_1_3_2_1_39_1","volume-title":"Proceedings of the 35th International Conference on Software Engineering (ICSE). IEEE, 772\u2013781","author":"Thien Nguyen Hoang Duong","year":"2013","unstructured":"Hoang Duong Thien Nguyen , Dawei Qi , Abhik Roychoudhury , and Satish Chandra . 2013 . Sem\ufffdx: Program repair via semantic analysis . In Proceedings of the 35th International Conference on Software Engineering (ICSE). IEEE, 772\u2013781 . Hoang Duong Thien Nguyen, Dawei Qi, Abhik Roychoudhury, and Satish Chandra. 2013. Sem\ufffdx: Program repair via semantic analysis. In Proceedings of the 35th International Conference on Software Engineering (ICSE). IEEE, 772\u2013781."},{"key":"e_1_3_2_1_40_1","volume-title":"Principles of program analysis","author":"Nielson Flemming","unstructured":"Flemming Nielson , Hanne R Nielson , and Chris Hankin . 2015. Principles of program analysis . Springer . Flemming Nielson, Hanne R Nielson, and Chris Hankin. 2015. Principles of program analysis. Springer."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.62"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2017.9"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568254"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483785"},{"key":"e_1_3_2_1_45_1","volume-title":"Conference on Empirical Methods in Natural Language Processing.","author":"Ratnaparkhi Adwait","year":"1996","unstructured":"Adwait Ratnaparkhi . 1996 . A maximum entropy model for part-of-speech tagging . In Conference on Empirical Methods in Natural Language Processing. Adwait Ratnaparkhi. 1996. A maximum entropy model for part-of-speech tagging. In Conference on Empirical Methods in Natural Language Processing."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2017.54"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.5555\/3155562.3155643"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568255"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786825"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250748"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236063"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/3001878.3001882"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351749"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.1838"},{"key":"e_1_3_2_1_55_1","volume-title":"Martin White, and Denys Poshyvanyk.","author":"Tufano Michele","year":"2018","unstructured":"Michele Tufano , Cody Watson , Gabriele Bavota , Massimiliano Di Penta , Martin White, and Denys Poshyvanyk. 2018 . Learning How to Mutate Source Code from Bug-Fixes . arXiv preprint arXiv:1812.10772 (2018). Michele Tufano, Cody Watson, Gabriele Bavota, Massimiliano Di Penta, Martin White, and Denys Poshyvanyk. 2018. Learning How to Mutate Source Code from Bug-Fixes. arXiv preprint arXiv:1812.10772 (2018)."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831716"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693094"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180233"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070503"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.45"},{"key":"e_1_3_2_1_61_1","unstructured":"Tianyin Xu Xinxin Jin Peng Huang Yuanyuan Zhou Shan Lu Long Jin and Shankar Pasupathy. 2016. Early Detection of Con\ufffdguration Errors to Reduce Failure Damage.. In OSDI. 619\u2013634.   Tianyin Xu Xinxin Jin Peng Huang Yuanyuan Zhou Shan Lu Long Jin and Shankar Pasupathy. 2016. Early Detection of Con\ufffdguration Errors to Reduce Failure Damage.. In OSDI. 619\u2013634."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106262"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3182517"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-017-9578-1"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080769"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609672"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509551"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092731"}],"event":{"name":"ISSTA '19: 28th ACM SIGSOFT International Symposium on Software Testing and Analysis","location":"Beijing China","acronym":"ISSTA '19","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3293882.3330578","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3293882.3330578","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:43:51Z","timestamp":1750207431000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3293882.3330578"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,7,10]]},"references-count":68,"alternative-id":["10.1145\/3293882.3330578","10.1145\/3293882"],"URL":"https:\/\/doi.org\/10.1145\/3293882.3330578","relation":{},"subject":[],"published":{"date-parts":[[2019,7,10]]},"assertion":[{"value":"2019-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}