{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,25]],"date-time":"2026-01-25T13:30:37Z","timestamp":1769347837099,"version":"3.49.0"},"reference-count":85,"publisher":"Association for Computing Machinery (ACM)","issue":"4","license":[{"start":{"date-parts":[[2019,10,9]],"date-time":"2019-10-09T00:00:00Z","timestamp":1570579200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["NRF-2017M3C4A7068177, NRF-2017M3C4A7068179, NRF-2019R1A2B5B01069865, NRF-2017R1D1A1B03035851, NRF-2018R1A5A1059921"],"award-info":[{"award-number":["NRF-2017M3C4A7068177, NRF-2017M3C4A7068179, NRF-2019R1A2B5B01069865, NRF-2017R1D1A1B03035851, NRF-2018R1A5A1059921"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2019,10,31]]},"abstract":"<jats:p>\n            Finding the root cause of a bug requires a significant effort from developers. Automated fault localization techniques seek to reduce this cost by computing the suspiciousness scores (i.e., the likelihood of program entities being faulty). Existing techniques have been developed by utilizing input features of specific types for the computation of suspiciousness scores, such as program spectrum or mutation analysis results. This article presents a novel learn-to-rank fault localization technique called\n            <jats:italic>PRecise machINe-learning-based fault loCalization tEchnique (PRINCE).<\/jats:italic>\n            PRINCE uses genetic programming (GP) to combine multiple sets of localization input features that have been studied separately until now. For dynamic features, PRINCE encompasses both Spectrum Based Fault Localization (SBFL) and Mutation Based Fault Localization (MBFL) techniques. It also uses static features, such as dependency information and structural complexity of program entities. All such information is used by GP to train a ranking model for fault localization. The empirical evaluation on 65 real-world faults from CoREBench, 84 artificial faults from SIR, and 310 real-world faults from Defects4J shows that PRINCE outperforms the state-of-the-art SBFL, MBFL, and learn-to-rank techniques significantly. PRINCE localizes a fault after reviewing 2.4% of the executed statements on average (4.2 and 3.0 times more precise than the best of the compared SBFL and MBFL techniques, respectively). Also, PRINCE ranks 52.9% of the target faults within the top ten suspicious statements.\n          <\/jats:p>","DOI":"10.1145\/3345628","type":"journal-article","created":{"date-parts":[[2019,10,10]],"date-time":"2019-10-10T13:13:05Z","timestamp":1570713185000},"page":"1-34","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":45,"title":["Precise Learn-to-Rank Fault Localization Using Dynamic and Static Features of Target Programs"],"prefix":"10.1145","volume":"28","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-6366-6916","authenticated-orcid":false,"given":"Yunho","family":"Kim","sequence":"first","affiliation":[{"name":"School of Computing, KAIST, Daehakro, Daejeon, South Korea"}]},{"given":"Seokhyeon","family":"Mun","sequence":"additional","affiliation":[{"name":"School of Computing, KAIST, Daehakro, Daejeon, South Korea"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0836-6993","authenticated-orcid":false,"given":"Shin","family":"Yoo","sequence":"additional","affiliation":[{"name":"School of Computing, KAIST, Daehakro, Daejeon, South Korea"}]},{"given":"Moonzoo","family":"Kim","sequence":"additional","affiliation":[{"name":"School of Computing, KAIST, Daehakro, Daejeon, South Korea"}]}],"member":"320","published-online":{"date-parts":[[2019,10,9]]},"reference":[{"key":"e_1_2_1_1_1","unstructured":"[n.d.]. Docker. Retrieved from https:\/\/www.docker.com\/.  [n.d.]. Docker. Retrieved from https:\/\/www.docker.com\/."},{"key":"e_1_2_1_2_1","volume-title":"The Proceedings of the 12th Pacific Rim International Symposium on Dependable Computing (PRDC\u201906)","author":"Abreu Rui","unstructured":"Rui Abreu , Peter Zoeteweij , and Arjan J. C . van Gemund. 2006. An evaluation of similarity coefficients for software fault localization . In The Proceedings of the 12th Pacific Rim International Symposium on Dependable Computing (PRDC\u201906) . IEEE, 39--46. Rui Abreu, Peter Zoeteweij, and Arjan J. C. van Gemund. 2006. An evaluation of similarity coefficients for software fault localization. In The Proceedings of the 12th Pacific Rim International Symposium on Dependable Computing (PRDC\u201906). IEEE, 39--46."},{"key":"e_1_2_1_4_1","volume-title":"IFIP Congress (1)","volume":"71","author":"Akiyama Fumio","year":"1971","unstructured":"Fumio Akiyama . 1971 . An example of software system debugging . In IFIP Congress (1) , Vol. 71 . 353--359. Fumio Akiyama. 1971. An example of software system debugging. In IFIP Congress (1), Vol. 71. 353--359."},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931049"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628058"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966463"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985811"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.295895"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062522"},{"key":"e_1_2_1_12_1","volume-title":"Support-vector networks. Mach. Learn. 20, 3 (1","author":"Cortes Corinna","year":"1995","unstructured":"Corinna Cortes and Vladimir Vapnik . 1995. Support-vector networks. Mach. Learn. 20, 3 (1 Sep 1995 ), 273--297. DOI:https:\/\/doi.org\/10.1023\/A:1022627411411 10.1023\/A:1022627411411 Corinna Cortes and Vladimir Vapnik. 1995. Support-vector networks. Mach. Learn. 20, 3 (1 Sep 1995), 273--297. DOI:https:\/\/doi.org\/10.1023\/A:1022627411411"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085130.1085143"},{"key":"e_1_2_1_14_1","volume-title":"Evaluating defect prediction approaches: A benchmark and an extensive comparison. Emp. Softw. Eng. 17, 4 (1","author":"D\u2019Ambros Marco","year":"2012","unstructured":"Marco D\u2019Ambros , Michele Lanza , and Romain Robbes . 2012. Evaluating defect prediction approaches: A benchmark and an extensive comparison. Emp. Softw. Eng. 17, 4 (1 Aug. 2012 ), 531--577. https:\/\/doi.org\/10.1007\/s10664-011-9173-9 10.1007\/s10664-011-9173-9 Marco D\u2019Ambros, Michele Lanza, and Romain Robbes. 2012. Evaluating defect prediction approaches: A benchmark and an extensive comparison. Emp. Softw. Eng. 17, 4 (1 Aug. 2012), 531--577. https:\/\/doi.org\/10.1007\/s10664-011-9173-9"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1973.10482433"},{"key":"e_1_2_1_16_1","volume-title":"Supporting controlled experimentation with testing techniques: An infrastructure and its potential impact. Emp. Softw. Eng. 10, 4 (1","author":"Do Hyunsook","year":"2005","unstructured":"Hyunsook Do , Sebastian Elbaum , and Gregg Rothermel . 2005. Supporting controlled experimentation with testing techniques: An infrastructure and its potential impact. Emp. Softw. Eng. 10, 4 (1 Oct. 2005 ), 405--435. DOI:https:\/\/doi.org\/10.1007\/s10664-005-3861-2 10.1007\/s10664-005-3861-2 Hyunsook Do, Sebastian Elbaum, and Gregg Rothermel. 2005. Supporting controlled experimentation with testing techniques: An infrastructure and its potential impact. Emp. Softw. Eng. 10, 4 (1 Oct. 2005), 405--435. DOI:https:\/\/doi.org\/10.1007\/s10664-005-3861-2"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(94)90099-X"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2019.00014"},{"key":"e_1_2_1_19_1","volume-title":"LIBLINEAR: A library for large linear classification. J. Mach. Learn. Res. 9 (Jun.","author":"Fan Rong-En","year":"2008","unstructured":"Rong-En Fan , Kai-Wei Chang , Cho-Jui Hsieh , Xiang-Rui Wang , and Chih-Jen Lin . 2008 . LIBLINEAR: A library for large linear classification. J. Mach. Learn. Res. 9 (Jun. 2008), 1871--1874. http:\/\/dl.acm.org\/citation.cfm?id&equals;1390681.1442794. Rong-En Fan, Kai-Wei Chang, Cho-Jui Hsieh, Xiang-Rui Wang, and Chih-Jen Lin. 2008. LIBLINEAR: A library for large linear classification. J. Mach. Learn. Res. 9 (Jun. 2008), 1871--1874. http:\/\/dl.acm.org\/citation.cfm?id&equals;1390681.1442794."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2015.7107448"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351683"},{"key":"e_1_2_1_22_1","volume-title":"An introduction to variable and feature selection. J. Mach. Learn. Res. 3 (Mar","author":"Guyon Isabelle","year":"2003","unstructured":"Isabelle Guyon and Andr\u00e9 Elisseeff . 2003. An introduction to variable and feature selection. J. Mach. Learn. Res. 3 (Mar . 2003 ), 1157--1182. http:\/\/dl.acm.org\/citation.cfm?id=944919.944968 Isabelle Guyon and Andr\u00e9 Elisseeff. 2003. An introduction to variable and feature selection. J. Mach. Learn. Res. 3 (Mar. 2003), 1157--1182. http:\/\/dl.acm.org\/citation.cfm?id=944919.944968"},{"key":"e_1_2_1_23_1","volume-title":"Elements of Software Science (Operating and Programming Systems Series)","author":"Halstead Maurice H.","unstructured":"Maurice H. Halstead . 1977. Elements of Software Science (Operating and Programming Systems Series) . Elsevier Science Inc ., New York, NY. Maurice H. Halstead. 1977. Elements of Software Science (Operating and Programming Systems Series). Elsevier Science Inc., New York, NY."},{"key":"e_1_2_1_24_1","volume-title":"Halstead et al","author":"Maurice","year":"1977","unstructured":"Maurice H. Halstead et al . 1977 . Elements of Software Science (Operating and Programming Systems Series). Elsevier Science Inc ., New York, NY. Maurice H. Halstead et al. 1977. Elements of Software Science (Operating and Programming Systems Series). Elsevier Science Inc., New York, NY."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.10.002"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.14"},{"key":"e_1_2_1_27_1","first-page":"547","article-title":"\u00c9tude comparative de la distribution florale dans une portion des Alpes et des","volume":"37","author":"Jaccard Paul","year":"1901","unstructured":"Paul Jaccard . 1901 . \u00c9tude comparative de la distribution florale dans une portion des Alpes et des Jura. Bull. Soc. vaud. Sci. nat 37 (1901), 547 -- 579 . Paul Jaccard. 1901. \u00c9tude comparative de la distribution florale dans une portion des Alpes et des Jura. Bull. Soc. vaud. Sci. nat 37 (1901), 547--579.","journal-title":"Sci. nat"},{"key":"e_1_2_1_28_1","volume-title":"Proceedings of the 2009 IEEE\/ACM International Conference on Automated Software Engineering (ASE\u201909)","author":"Janssen Tom","unstructured":"Tom Janssen , Rui Abreu , and Arjan J. C . van Gemund. 2009. Zoltar: A toolset for automatic fault localization . In Proceedings of the 2009 IEEE\/ACM International Conference on Automated Software Engineering (ASE\u201909) . IEEE Computer Society, Washington, DC, 662--664. Tom Janssen, Rui Abreu, and Arjan J. C. van Gemund. 2009. Zoltar: A toolset for automatic fault localization. In Proceedings of the 2009 IEEE\/ACM International Conference on Automated Software Engineering (ASE\u201909). IEEE Computer Society, Washington, DC, 662--664."},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390652"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC-PART.2008.18"},{"key":"e_1_2_1_31_1","volume-title":"Proceedings of the 20th IEEE\/ACM International Conference on Automated Software Engineering (ASE\u201905)","author":"James","year":"1908","unstructured":"James A. Jones and Mary Jean Harrold. 2005. Empirical evaluation of the Tarantula automatic fault-localization technique . In Proceedings of the 20th IEEE\/ACM International Conference on Automated Software Engineering (ASE\u201905) . ACM, New York, NY, 273--282. DOI:https:\/\/doi.org\/10.1145\/110 1908 .1101949 10.1145\/1101908.1101949 James A. Jones and Mary Jean Harrold. 2005. Empirical evaluation of the Tarantula automatic fault-localization technique. In Proceedings of the 20th IEEE\/ACM International Conference on Automated Software Engineering (ASE\u201905). ACM, New York, NY, 273--282. DOI:https:\/\/doi.org\/10.1145\/1101908.1101949"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628053"},{"key":"e_1_2_1_33_1","volume-title":"Proceedings of the 2014 International Symposium on Software Testing and Analysis (ISSTA\u201914)","author":"Just Ren\u00e9","unstructured":"Ren\u00e9 Just , Darioush Jalali , and Michael D. Ernst . 2014. Defects4J: A database of existing faults to enable controlled testing studies for Java programs . In Proceedings of the 2014 International Symposium on Software Testing and Analysis (ISSTA\u201914) . ACM, New York, NY, 437--440. DOI:https:\/\/doi.org\/10.1145\/2610384.2628055 10.1145\/2610384.2628055 Ren\u00e9 Just, Darioush Jalali, and Michael D. Ernst. 2014. Defects4J: A database of existing faults to enable controlled testing studies for Java programs. In Proceedings of the 2014 International Symposium on Software Testing and Analysis (ISSTA\u201914). ACM, New York, NY, 437--440. DOI:https:\/\/doi.org\/10.1145\/2610384.2628055"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.114"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180253"},{"key":"e_1_2_1_36_1","doi-asserted-by":"crossref","unstructured":"Yunho Kim and Shin Hong. 2019. DeMiner: Test generation for high test coverage through mutant exploration. (submitted).  Yunho Kim and Shin Hong. 2019. DeMiner: Test generation for high test coverage through mutant exploration. (submitted).","DOI":"10.1002\/stvr.1715"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338934"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2018.00032"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693109"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00024"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.39"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1162\/NECO_a_00571"},{"key":"e_1_2_1_43_1","volume-title":"Article 94 (Dec.","author":"Li Jundong","year":"2017","unstructured":"Jundong Li , Kewei Cheng , Suhang Wang , Fred Morstatter , Robert P. Trevino , Jiliang Tang , and Huan Liu . 2017. Feature selection: A data perspective. ACM Comput. Surv. 50, 6 , Article 94 (Dec. 2017 ), 45 pages. DOI:https:\/\/doi.org\/10.1145\/3136625 10.1145\/3136625 Jundong Li, Kewei Cheng, Suhang Wang, Fred Morstatter, Robert P. Trevino, Jiliang Tang, and Huan Liu. 2017. Feature selection: A data perspective. ACM Comput. Surv. 50, 6, Article 94 (Dec. 2017), 45 pages. DOI:https:\/\/doi.org\/10.1145\/3136625"},{"key":"e_1_2_1_44_1","volume-title":"Briand","author":"Liu Bing","year":"2019","unstructured":"Bing Liu , Shiva Nejati , Lucia, and Lionel C . Briand . 2019 . Effective fault localization of automotive Simulink models: Achieving the trade-off between test oracle effort and fault localization accuracy. Emp. Softw. Eng . 24, 1 (1 Feb. 2019), 444--490. DOI:https:\/\/doi.org\/10.1007\/s10664-018-9611-z 10.1007\/s10664-018-9611-z Bing Liu, Shiva Nejati, Lucia, and Lionel C. Briand. 2019. Effective fault localization of automotive Simulink models: Achieving the trade-off between test oracle effort and fault localization accuracy. Emp. Softw. Eng. 24, 1 (1 Feb. 2019), 444--490. DOI:https:\/\/doi.org\/10.1007\/s10664-018-9611-z"},{"key":"e_1_2_1_45_1","volume-title":"Sandra C. P. F. Fabbri, Adenilso da Silva Sim\u00e3o, Tatiana Sugeta, Auri Marcelo Rizzo Vincenzi, and Paulo Cesar Masiero.","author":"Maldonado Jos\u00e9 Carlos","year":"2001","unstructured":"Jos\u00e9 Carlos Maldonado , M\u00e1rcio Eduardo Delamaro , Sandra C. P. F. Fabbri, Adenilso da Silva Sim\u00e3o, Tatiana Sugeta, Auri Marcelo Rizzo Vincenzi, and Paulo Cesar Masiero. 2001 . Proteum : A family of tools to support specification and program testing based on mutation. In Mutation Testing for the New Century, W. Eric Wong (Ed.). Springer US , Boston, MA, 113--116. DOI:https:\/\/doi.org\/10.1007\/978-1-4757-5939-6_19 10.1007\/978-1-4757-5939-6_19 Jos\u00e9 Carlos Maldonado, M\u00e1rcio Eduardo Delamaro, Sandra C. P. F. Fabbri, Adenilso da Silva Sim\u00e3o, Tatiana Sugeta, Auri Marcelo Rizzo Vincenzi, and Paulo Cesar Masiero. 2001. Proteum: A family of tools to support specification and program testing based on mutation. In Mutation Testing for the New Century, W. Eric Wong (Ed.). Springer US, Boston, MA, 113--116. DOI:https:\/\/doi.org\/10.1007\/978-1-4757-5939-6_19"},{"key":"e_1_2_1_46_1","volume-title":"Introduction to Information Retrieval","author":"Manning Christopher D.","unstructured":"Christopher D. Manning , Prabhakar Raghavan , and Hinrich Sch\u00fctze . 2008. Introduction to Information Retrieval . Cambridge University Press , New York, NY . Christopher D. Manning, Prabhakar Raghavan, and Hinrich Sch\u00fctze. 2008. Introduction to Information Retrieval. Cambridge University Press, New York, NY."},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2004.1357820"},{"key":"e_1_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.28"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000791.2000795"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.2331\/suisan.22.526"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884845"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.159"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1509"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001445"},{"key":"e_1_2_1_56_1","first-page":"347","article-title":"Note on regression and inheritance in the case of two parents","volume":"58","author":"Pearson Karl","year":"1895","unstructured":"Karl Pearson . 1895 . Note on regression and inheritance in the case of two parents . Proc. Roy. Soc. Lond. 58 , 347 -- 352 (1895), 240--242. Karl Pearson. 1895. Note on regression and inheritance in the case of two parents. Proc. Roy. Soc. Lond. 58, 347--352 (1895), 240--242.","journal-title":"Proc. Roy. Soc. Lond."},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.62"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2017.9"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.66"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2018.00026"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.02.009"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10462-017-9563-5"},{"key":"e_1_2_1_63_1","volume-title":"Proceedings of the 18th IEEE International Conference on Automated Software Engineering (ASE\u201903)","author":"Renieris Manos","year":"2003","unstructured":"Manos Renieris and Steven P. Reiss . 2003. Fault localization with nearest neighbor queries . In Proceedings of the 18th IEEE International Conference on Automated Software Engineering (ASE\u201903) . IEEE Press, Piscataway, NJ, 30--39. DOI:https:\/\/doi.org\/10.1109\/ASE. 2003 .1240292 10.1109\/ASE.2003.1240292 Manos Renieris and Steven P. Reiss. 2003. Fault localization with nearest neighbor queries. In Proceedings of the 18th IEEE International Conference on Automated Software Engineering (ASE\u201903). IEEE Press, Piscataway, NJ, 30--39. DOI:https:\/\/doi.org\/10.1109\/ASE.2003.1240292"},{"key":"e_1_2_1_64_1","first-page":"153","article-title":"On habitat and association of species of anopheline larvae in South-eastern Madras","volume":"3","author":"Russell Paul F.","year":"1940","unstructured":"Paul F. Russell and T. Ramachandra Rao . 1940 . On habitat and association of species of anopheline larvae in South-eastern Madras . J. Malar. Inst. India 3 , 1 (1940), 153 -- 178 . Paul F. Russell and T. Ramachandra Rao. 1940. On habitat and association of species of anopheline larvae in South-eastern Madras. J. Malar. Inst. India 3, 1 (1940), 153--178.","journal-title":"J. Malar. Inst. India"},{"key":"e_1_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070508"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2017.12.034"},{"key":"e_1_2_1_67_1","volume-title":"Alternate and learn: Finding witnesses without looking all over","author":"Sinha Nishant","unstructured":"Nishant Sinha , Nimit Singhania , Satish Chandra , and Manu Sridharan . 2012. Alternate and learn: Finding witnesses without looking all over . In Computer Aided Verification, P. Madhusudan and Sanjit A. Seshia (Eds.). Springer , Berlin , 599--615. Nishant Sinha, Nimit Singhania, Satish Chandra, and Manu Sridharan. 2012. Alternate and learn: Finding witnesses without looking all over. In Computer Aided Verification, P. Madhusudan and Sanjit A. Seshia (Eds.). Springer, Berlin, 599--615."},{"key":"e_1_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092717"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483767"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950295"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-7373(85)80054-7"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.2307\/3001968"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2285319"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2521368"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2007.109"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.67"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1145\/2522920.2522924"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1562"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2011.21"},{"key":"e_1_2_1_80_1","volume-title":"Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE\u201910)","author":"Xu Zhihong","year":"1882","unstructured":"Zhihong Xu , Yunho Kim , Moonzoo Kim , Gregg Rothermel , and Myra B. Cohen . 2010. Directed test suite augmentation: Techniques and tradeoffs . In Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE\u201910) . ACM, New York, NY, 257--266. DOI:https:\/\/doi.org\/10.1145\/ 1882 291.1882330 10.1145\/1882291.1882330 Zhihong Xu, Yunho Kim, Moonzoo Kim, Gregg Rothermel, and Myra B. Cohen. 2010. Directed test suite augmentation: Techniques and tradeoffs. In Proceedings of the 18th ACM SIGSOFT International Symposium on Foundations of Software Engineering (FSE\u201910). ACM, New York, NY, 257--266. DOI:https:\/\/doi.org\/10.1145\/1882291.1882330"},{"key":"e_1_2_1_81_1","volume-title":"Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME\u201914)","author":"Xuan Jifeng","year":"2014","unstructured":"Jifeng Xuan and M. Monperrus . 2014. Learning to combine multiple ranking metrics for fault localization . In Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME\u201914) . 191--200. DOI:https:\/\/doi.org\/10.1109\/ICSME. 2014 .41 10.1109\/ICSME.2014.41 Jifeng Xuan and M. Monperrus. 2014. Learning to combine multiple ranking metrics for fault localization. In Proceedings of the IEEE International Conference on Software Maintenance and Evolution (ICSME\u201914). 191--200. DOI:https:\/\/doi.org\/10.1109\/ICSME.2014.41"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33119-0_18"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/3078840"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587053"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509551"},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134324"}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3345628","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3345628","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:13:19Z","timestamp":1750201999000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3345628"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10,9]]},"references-count":85,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,10,31]]}},"alternative-id":["10.1145\/3345628"],"URL":"https:\/\/doi.org\/10.1145\/3345628","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"value":"1049-331X","type":"print"},{"value":"1557-7392","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,10,9]]},"assertion":[{"value":"2018-07-01","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-07-01","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2019-10-09","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}