{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:30:16Z","timestamp":1750221016260,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T00:00:00Z","timestamp":1550102400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,14]]},"DOI":"10.1145\/3299771.3299785","type":"proceedings-article","created":{"date-parts":[[2019,2,8]],"date-time":"2019-02-08T13:27:45Z","timestamp":1549632465000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Modeling and Coverage Analysis of Programs with Exception Handling"],"prefix":"10.1145","author":[{"given":"E. S. F.","family":"Najumudheen","sequence":"first","affiliation":[{"name":"Irtifa Technologies, Chennai, TamilNadu, India"}]},{"given":"Rajib","family":"Mall","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Kharagpur, West Bengal, India"}]},{"given":"Debasis","family":"Samanta","sequence":"additional","affiliation":[{"name":"Indian Institute of Technology, Kharagpur, West Bengal, India"}]}],"member":"320","published-online":{"date-parts":[[2019,2,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2018. ANother Tool for Language Recognition. http:\/\/www.antlr.org\/."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/777388.777394"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/236337.236371"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/316158.316171"},{"volume-title":"Revisiting Exception Handling Practices with Exception Flow Analysis. In 2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM). 11--20","author":"Guilherme","key":"e_1_3_2_1_5_1","unstructured":"Guilherme B. de P\u00e1dua and Weiyi Shang. 2017. Revisiting Exception Handling Practices with Exception Flow Analysis. In 2017 IEEE 17th International Working Conference on Source Code Analysis and Manipulation (SCAM). 11--20."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/2794082.2794106"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2005.51"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.35"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1036643"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/1296214"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(03)00057-8"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/2124243.2124258"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ITNG.2009.284"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5381\/jot.2010.9.4.a1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.479"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/11423331_7"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/941566.941569"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/941566.941569"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2016.13"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1454268.1454277"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/519621.853364"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.877846"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/998675.999438"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.5555\/523265"},{"key":"e_1_3_2_1_26_1","unstructured":"Bill Vernners. 1998. Designing with Exceptions: When and How to Use Exceptions. JavaWorld.com."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2004.11.013"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1330017.1330019"},{"key":"e_1_3_2_1_29_1","unstructured":"Sharon Zakhour et al. 2007. The Java Tutorial: A Short Course on the Basics (4 ed.). Prentice Hall. (Sun Microsystems)."}],"event":{"name":"ISEC'19: 12th Innovations in Software Engineering Conference","sponsor":["iSOFT iSOFT","ACM Association for Computing Machinery","Microsoft Microsoft","ACM India ACM India"],"location":"Pune India","acronym":"ISEC'19"},"container-title":["Proceedings of the 12th Innovations in Software Engineering Conference (formerly known as India Software Engineering Conference)"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3299771.3299785","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3299771.3299785","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:26:13Z","timestamp":1750206373000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3299771.3299785"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,14]]},"references-count":28,"alternative-id":["10.1145\/3299771.3299785","10.1145\/3299771"],"URL":"https:\/\/doi.org\/10.1145\/3299771.3299785","relation":{},"subject":[],"published":{"date-parts":[[2019,2,14]]},"assertion":[{"value":"2019-02-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}