{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:24:41Z","timestamp":1773192281851,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":65,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"National Science Foundation","award":["CCF-1763906, CCF-1942430"],"award-info":[{"award-number":["CCF-1763906, CCF-1942430"]}]},{"name":"Alibaba"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416566","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:39:02Z","timestamp":1611790742000},"page":"907-918","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":33,"title":["On the effectiveness of unified debugging"],"prefix":"10.1145","author":[{"given":"Samuel","family":"Benton","sequence":"first","affiliation":[{"name":"The University of Texas at Dallas"}]},{"given":"Xia","family":"Li","sequence":"additional","affiliation":[{"name":"Kennesaw State University"}]},{"given":"Yiling","family":"Lou","sequence":"additional","affiliation":[{"name":"Peking University"}]},{"given":"Lingming","family":"Zhang","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"2020. Tricentis reports. https:\/\/www.tricentis.com\/resources\/software-fail-watch-5th-edition\/"},{"key":"e_1_3_2_1_2_1","unstructured":"2020. Unified Debugging Website. https:\/\/github.com\/ProdigyXable\/UnifiedDebuggingStudy"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC.2006.18"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1308173.1308264"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1995.497652"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931049"},{"key":"e_1_3_2_1_7_1","unstructured":"CO Boulder. 2013. University of Cambridge Study: Failure to Adopt Reverse Debugging Costs Global Economy $41 Billion Annually. https:\/\/www.roguewave.com\/company\/news\/2013\/university-of-cambridge-reverse-debugging-study. Accessed: Jan. 8 2019."},{"key":"e_1_3_2_1_8_1","volume-title":"Fast and Precise On-the-fly Patch Validation for All. arXiv preprint arXiv:2007.11449","author":"Chen Lingchao","year":"2020","unstructured":"Lingchao Chen and Lingming Zhang. 2020. Fast and Precise On-the-fly Patch Validation for All. arXiv preprint arXiv:2007.11449 (2020)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2896921.2896931"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330559"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/3318162"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00033"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/3213846.3213871"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101949"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.66"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931051"},{"key":"e_1_3_2_1_19_1","volume-title":"Fixminer: Mining relevantfix patterns for automated program repair. Empirical Software Engineering","author":"Koyuncu Anil","year":"2020","unstructured":"Anil Koyuncu, Kui Liu, Tegawend\u00e9 F Bissyand\u00e9, Dongsun Kim, Jacques Klein, Martin Monperrus, and Yves Le Traon. 2020. Fixminer: Mining relevantfix patterns for automated program repair. Empirical Software Engineering (2020), 1--45."},{"key":"e_1_3_2_1_20_1","volume-title":"Genprog: A generic method for automatic software repair. Ieee transactions on software engineering 38, 1","author":"Goues Claire Le","year":"2011","unstructured":"Claire Le Goues, ThanhVu Nguyen, Stephanie Forrest, and Westley Weimer. 2011. Genprog: A generic method for automatic software repair. Ieee transactions on software engineering 38, 1 (2011), 54--72."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330574"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133916"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065014"},{"key":"e_1_3_2_1_24_1","volume-title":"2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST). 102--113","author":"Liu K.","unstructured":"K. Liu, A. Koyuncu, T. F. Bissyand\u00e9, D. Kim, J. Klein, and Y. Le Traon. 2019. You Cannot Fix What You Cannot Find! An Investigation of Fault Localization Bias in Benchmarking Automated Program Repair Systems. In 2019 12th IEEE Conference on Software Testing, Validation and Verification (ICST). 102--113."},{"key":"e_1_3_2_1_25_1","volume-title":"Bissyand\u00e9","author":"Liu Kui","year":"2019","unstructured":"Kui Liu, Anil Koyuncu, Dongsun Kim, and Tegawend\u00e9 F. Bissyand\u00e9. 2019. AVATAR: Fixing Semantic Bugs with Fix Patterns of Static Analysis Violations. In SANER. 456--467."},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. 31--42","author":"Liu Kui","unstructured":"Kui Liu, Anil Koyuncu, Dongsun Kim, and Tegawend\u00e9 F. Bissyand\u00e9. 2019. TBar: Revisiting Template-Based Automated Program Repair. In Proceedings of the 28th ACM SIGSOFT International Symposium on Software Testing and Analysis. 31--42."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3377811.3380338"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106253"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786811"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884872"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2837614.2837617"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/3293882.3330578"},{"key":"e_1_3_2_1_33_1","volume-title":"Can Automated Program Repair Refine Fault Localization? arXiv preprint arXiv:1910.01270","author":"Lou Yiling","year":"2019","unstructured":"Yiling Lou, Ali Ghanbari, Xia Li, Lingming Zhang, Dan Hao, and Lu Zhang. 2019. Can Automated Program Repair Refine Fault Localization? arXiv preprint arXiv:1910.01270 (2019)."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3395363.3397351"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2948705"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Matias Martinez and Martin Monperrus. 2018. Ultra-Large Repair Search Space with Automatically Mined Templates: The Cardumen Mode of Astor. In SSBSE. 65--86.","DOI":"10.1007\/978-3-319-99241-9_3"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3105906"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.28"},{"key":"e_1_3_2_1_39_1","volume-title":"Hua Jie Lee, and Kotagiri Ramamohanarao","author":"Naish Lee","year":"2011","unstructured":"Lee Naish, Hua Jie Lee, and Kotagiri Ramamohanarao. 2011. A model for spectra-based software diagnosis. ACM Transactions on software engineering and methodology (TOSEM) 20, 3 (2011), 1--32."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1509"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001445"},{"key":"e_1_3_2_1_42_1","volume-title":"Notes on Regression and Inheritance in the Case of Two Parents Proceedings of the Royal Society of London, 58","author":"Pearson K","year":"1895","unstructured":"K Pearson. 1895. Notes on Regression and Inheritance in the Case of Two Parents Proceedings of the Royal Society of London, 58, 240--242."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771791"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2003.1240292"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115675"},{"key":"e_1_3_2_1_46_1","volume-title":"2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). IEEE, 13--24","author":"Seemanta","unstructured":"Seemanta Saha et al. 2019. Harnessing evolution for multi-hunk program repair. In 2019 IEEE\/ACM 41st International Conference on Software Engineering (ICSE). IEEE, 13--24."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070508"},{"key":"e_1_3_2_1_48_1","volume-title":"Accessed","author":"Software Undo","year":"2016","unstructured":"Undo Software. 2016. Increasing software development productivity with reversible debugging. https:\/\/undo.io\/media\/uploads\/files\/Undo_ReversibleDebugging_Whitepaper.pdf. Accessed: Jan. 21, 2019."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092717"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180250"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416590"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831716"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070536"},{"key":"e_1_3_2_1_54_1","volume-title":"Historical Spectrum based Fault Localization","author":"Wen Ming","year":"2020","unstructured":"Ming Wen, Junjie Chen, Yongqiang Tian, Rongxin Wu, Dan Hao, Shi Han, and Shing-Chi Cheung. 2020. Historical Spectrum based Fault Localization. IEEE Transactions on Software Engineering (TSE) (2020)."},{"key":"e_1_3_2_1_55_1","volume-title":"Context-Aware Patch Generation for Better Automated Program Repair. In 2018 IEEE\/ACM 40th International Conference on Software Engineering (ICSE). 1--11","author":"Wen M.","unstructured":"M. Wen, J. Chen, R. Wu, D. Hao, and S. Cheung. 2018. Context-Aware Patch Generation for Better Automated Program Repair. In 2018 IEEE\/ACM 40th International Conference on Software Engineering (ICSE). 1--11."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2521368"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00075"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.45"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2560811"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.41"},{"key":"e_1_3_2_1_61_1","volume-title":"ARJA: Automated repair of java programs via multi-objective genetic programming","author":"Yuan Yuan","year":"2018","unstructured":"Yuan Yuan and Wolfgang Banzhaf. 2018. ARJA: Automated repair of java programs via multi-objective genetic programming. IEEE Transactions on Software Engineering (2018)."},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080769"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Lingming Zhang Lu Zhang and Sarfraz Khurshid. 2013. Injecting Mechanical Faults to Localize Developer Faults for Evolving Software. In OOPSLA. 765--784.","DOI":"10.1145\/2509136.2509551"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092731"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227210"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","location":"Virtual Event Australia","acronym":"ASE '20","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416566","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416566","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416566","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:01:38Z","timestamp":1750197698000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416566"}},"subtitle":["an extensive study on 16 program repair systems"],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":65,"alternative-id":["10.1145\/3324884.3416566","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416566","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}