{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,9]],"date-time":"2025-10-09T20:58:18Z","timestamp":1760043498128,"version":"3.41.0"},"reference-count":76,"publisher":"Association for Computing Machinery (ACM)","issue":"2","license":[{"start":{"date-parts":[[2023,3,30]],"date-time":"2023-03-30T00:00:00Z","timestamp":1680134400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"crossref","award":["62032010, 62102176"],"award-info":[{"award-number":["62032010, 62102176"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"crossref","award":["BK20191247"],"award-info":[{"award-number":["BK20191247"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000001","name":"US National Science Foundation","doi-asserted-by":"crossref","award":["CNS-1613023, CNS-1703598, CNS-1763172, CNS-2006437, CNS-2007737, CNS-2106838"],"award-info":[{"award-number":["CNS-1613023, CNS-1703598, CNS-1763172, CNS-2006437, CNS-2007737, CNS-2106838"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"crossref"}]},{"DOI":"10.13039\/100000006","name":"US Office of Naval Research","doi-asserted-by":"crossref","award":["N00014-16-1-2913, N00014-18-1-2037"],"award-info":[{"award-number":["N00014-16-1-2913, N00014-18-1-2037"]}],"id":[{"id":"10.13039\/100000006","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Trans. Softw. Eng. Methodol."],"published-print":{"date-parts":[[2023,4,30]]},"abstract":"<jats:p>Debugging is known to be a notoriously painstaking and time-consuming task. As one major family of automated debugging, statistical debugging approaches have been well investigated over the past decade, which collect failing and passing executions and apply statistical techniques to identify discriminative elements as potential bug causes. Most of the existing approaches instrument the entire program to produce execution profiles for debugging, thus incurring hefty instrumentation and analysis cost. However, as in fact a major part of the program code is error-free, full-scale program instrumentation is wasteful and unnecessary.<\/jats:p>\n          <jats:p>This article presents a systematic abstraction refinement-based pruning technique for statistical debugging. Our technique only needs to instrument and analyze the code partially. While guided by a mathematically rigorous analysis, our technique is guaranteed to produce the same debugging results as an exhaustive analysis in deterministic settings. With the help of the effective and safe pruning, our technique greatly saves the cost of failure diagnosis without sacrificing any debugging capability.<\/jats:p>\n          <jats:p>We apply this technique to two different statistical debugging scenarios: in-house and production-run statistical debugging. The comprehensive evaluations validate that our technique can significantly improve the efficiency of statistical debugging in both scenarios, while without jeopardizing the debugging capability.<\/jats:p>","DOI":"10.1145\/3544790","type":"journal-article","created":{"date-parts":[[2022,6,23]],"date-time":"2022-06-23T09:01:15Z","timestamp":1655974875000},"page":"1-38","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Toward More Efficient Statistical Debugging with Abstraction Refinement"],"prefix":"10.1145","volume":"32","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-7104-9918","authenticated-orcid":false,"given":"Zhiqiang","family":"Zuo","sequence":"first","affiliation":[{"name":"State Key Laboratory for Novel Software Technology at Nanjing University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5786-0894","authenticated-orcid":false,"given":"Xintao","family":"Niu","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology at Nanjing University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7441-3700","authenticated-orcid":false,"given":"Siyi","family":"Zhang","sequence":"additional","affiliation":[{"name":"State Key Laboratory for Novel Software Technology at Nanjing University, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1451-354X","authenticated-orcid":false,"given":"Lu","family":"Fang","sequence":"additional","affiliation":[{"name":"University of California, Irvine, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-8502-1892","authenticated-orcid":false,"given":"Siau Cheng","family":"Khoo","sequence":"additional","affiliation":[{"name":"National University of Singapore, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0757-4600","authenticated-orcid":false,"given":"Shan","family":"Lu","sequence":"additional","affiliation":[{"name":"University of Chicago, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0862-2491","authenticated-orcid":false,"given":"Chengnian","family":"Sun","sequence":"additional","affiliation":[{"name":"University of Waterloo, Canada"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4737-2146","authenticated-orcid":false,"given":"Guoqing Harry","family":"Xu","sequence":"additional","affiliation":[{"name":"UCLA, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,3,30]]},"reference":[{"key":"e_1_3_2_2_2","first-page":"88","volume-title":"ASE","author":"Abreu Rui","year":"2009","unstructured":"Rui Abreu, Peter Zoeteweij, and Arjan J. C. van Gemund. 2009. Spectrum-based multiple fault localization. In ASE. 88\u201399."},{"key":"e_1_3_2_3_2","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.06.035"},{"key":"e_1_3_2_4_2","first-page":"39","volume-title":"PRDC","author":"Abreu Rui","year":"2006","unstructured":"Rui Abreu, Peter Zoeteweij, and Arjan J. C. van Gemund. 2006. An evaluation of similarity coefficients for software fault localization. In PRDC. IEEE, 39\u201346."},{"key":"e_1_3_2_5_2","first-page":"89","volume-title":"TAICPART-MUTATION","author":"Abreu Rui","year":"2007","unstructured":"Rui Abreu, Peter Zoeteweij, and Arjan J. C. van Gemund. 2007. On the accuracy of spectrum-based fault localization. In TAICPART-MUTATION. IEEE Computer Society, 89\u201398."},{"key":"e_1_3_2_6_2","doi-asserted-by":"crossref","first-page":"168","DOI":"10.1145\/378795.378832","volume-title":"PLDI","author":"Arnold Matthew","year":"2001","unstructured":"Matthew Arnold and Barbara G. Ryder. 2001. A framework for reducing the cost of instrumented code. In PLDI. 168\u2013179."},{"key":"e_1_3_2_7_2","first-page":"101","volume-title":"ASPLOS","author":"Arulraj Joy","year":"2013","unstructured":"Joy Arulraj, Po-Chun Chang, Guoliang Jin, and Shan Lu. 2013. Production-run software failure diagnosis via hardware performance counters. In ASPLOS. 101\u2013112."},{"key":"e_1_3_2_8_2","first-page":"207","volume-title":"ASPLOS","author":"Arulraj Joy","year":"2014","unstructured":"Joy Arulraj, Guoliang Jin, and Shan Lu. 2014. Leveraging the short-term memory of hardware to diagnose production-run software failures. In ASPLOS. 207\u2013222."},{"key":"e_1_3_2_9_2","volume-title":"Applications of Static Analysis and Program Structure in Statistical Debugging","author":"Nainar Piramanayagam Arumuga","year":"2012","unstructured":"Piramanayagam Arumuga Nainar. 2012. Applications of Static Analysis and Program Structure in Statistical Debugging. Ph.D. Dissertation. University of Wisconsin \u2013 Madison."},{"key":"e_1_3_2_10_2","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1145\/1273463.1273467","volume-title":"ISSTA","author":"Nainar Piramanayagam Arumuga","year":"2007","unstructured":"Piramanayagam Arumuga Nainar, Ting Chen, Jake Rosin, and Ben Liblit. 2007. Statistical debugging using compound Boolean predicates. In ISSTA. 5\u201315."},{"key":"e_1_3_2_11_2","first-page":"255","volume-title":"ICSE","author":"Nainar Piramanayagam Arumuga","year":"2010","unstructured":"Piramanayagam Arumuga Nainar and Ben Liblit. 2010. Adaptive bug isolation. In ICSE. 255\u2013264."},{"key":"e_1_3_2_12_2","doi-asserted-by":"publisher","DOI":"10.1109\/LATW.2009.4813783"},{"key":"e_1_3_2_13_2","first-page":"73","volume-title":"ISSTA","author":"Baah George K.","year":"2010","unstructured":"George K. Baah, Andy Podgurski, and Mary Jean Harrold. 2010. Causal inference for statistical fault localization. In ISSTA. 73\u201384."},{"key":"e_1_3_2_14_2","first-page":"146","volume-title":"FSE","author":"Baah George K.","year":"2011","unstructured":"George K. Baah, Andy Podgurski, and Mary Jean Harrold. 2011. Mitigating the confounding effects of program dependences for effective fault localization. In FSE. 146\u2013156."},{"key":"e_1_3_2_15_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2007.31"},{"key":"e_1_3_2_16_2","first-page":"141","volume-title":"ISSTA","author":"Cheng Hong","year":"2009","unstructured":"Hong Cheng, David Lo, Yang Zhou, Xiaoyin Wang, and Xifeng Yan. 2009. Identifying bug signatures using discriminative graph mining. In ISSTA. 141\u2013152."},{"key":"e_1_3_2_17_2","first-page":"34","volume-title":"ICSE","author":"Chilimbi Trishul M.","year":"2009","unstructured":"Trishul M. Chilimbi, Ben Liblit, Krishna Mehra, Aditya V. Nori, and Kapil Vaswani. 2009. HOLMES: Effective statistical debugging via efficient path profiling. In ICSE. 34\u201344."},{"key":"e_1_3_2_18_2","first-page":"154","volume-title":"CAV","author":"Clarke Edmund M.","year":"2000","unstructured":"Edmund M. Clarke, Orna Grumberg, Somesh Jha, Yuan Lu, and Helmut Veith. 2000. Counterexample-guided abstraction refinement. In CAV. 154\u2013169."},{"key":"e_1_3_2_19_2","first-page":"261","volume-title":"ICSE","author":"Clause James","year":"2007","unstructured":"James Clause and Alessandro Orso. 2007. A technique for enabling and supporting debugging of field failures. In ICSE. 261\u2013270."},{"key":"e_1_3_2_20_2","first-page":"342","volume-title":"ICSE","author":"Cleve Holger","year":"2005","unstructured":"Holger Cleve and Andreas Zeller. 2005. Locating causes of program failures. In ICSE. 342\u2013351."},{"key":"e_1_3_2_21_2","first-page":"528","volume-title":"ECOOP","author":"Dallmeier Valentin","year":"2005","unstructured":"Valentin Dallmeier, Christian Lindig, and Andreas Zeller. 2005. Lightweight defect localization for Java. In ECOOP. 528\u2013550."},{"key":"e_1_3_2_22_2","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-005-3861-2"},{"key":"e_1_3_2_23_2","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2017.10"},{"key":"e_1_3_2_24_2","first-page":"492","volume-title":"ASE","author":"Gore Ross","year":"2011","unstructured":"Ross Gore, Paul F. Reynolds, and David Kamensky. 2011. Statistical debugging with elastic predicates. In ASE. 492\u2013495."},{"key":"e_1_3_2_25_2","first-page":"463","volume-title":"ICSE","author":"Gore Ross","year":"2012","unstructured":"Ross Gore and Paul F. Reynolds, Jr.2012. Reducing confounding bias in predicate-level statistical debugging metrics. In ICSE. 463\u2013473."},{"key":"e_1_3_2_26_2","first-page":"263","volume-title":"ASE","author":"Gupta Neelam","year":"2005","unstructured":"Neelam Gupta, Haifeng He, Xiangyu Zhang, and Rajiv Gupta. 2005. Locating faulty code using failure-inducing chops. In ASE. 263\u2013272."},{"key":"e_1_3_2_27_2","first-page":"439","volume-title":"ASE","author":"Hsu Hwa-You","year":"2008","unstructured":"Hwa-You Hsu, J. A. Jones, and A. Orso. 2008. Rapid: Identifying bug signatures to support debugging activities. In ASE. 439\u2013442."},{"key":"e_1_3_2_28_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00054"},{"key":"e_1_3_2_29_2","first-page":"184","volume-title":"ASE","author":"Jiang Lingxiao","year":"2007","unstructured":"Lingxiao Jiang and Zhendong Su. 2007. Context-aware statistical debugging: From bug predictors to faulty control flow paths. In ASE. 184\u2013193."},{"key":"e_1_3_2_30_2","first-page":"241","volume-title":"OOPSLA","author":"Jin Guoliang","year":"2010","unstructured":"Guoliang Jin, Aditya Thakur, Ben Liblit, and Shan Lu. 2010. Instrumentation and sampling strategies for cooperative concurrency bug isolation. In OOPSLA. 241\u2013255."},{"key":"e_1_3_2_31_2","first-page":"474","volume-title":"ICSE","author":"Jin Wei","year":"2012","unstructured":"Wei Jin and Alessandro Orso. 2012. BugRedux: Reproducing field failures for in-house debugging. In ICSE. 474\u2013484."},{"key":"e_1_3_2_32_2","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483763"},{"key":"e_1_3_2_33_2","doi-asserted-by":"crossref","first-page":"16","DOI":"10.1145\/1273463.1273468","volume-title":"ISSTA","author":"Jones James A.","year":"2007","unstructured":"James A. Jones, James F. Bowring, and Mary Jean Harrold. 2007. Debugging in parallel. In ISSTA. 16\u201326."},{"key":"e_1_3_2_34_2","first-page":"273","volume-title":"ASE","author":"Jones James A.","year":"2005","unstructured":"James A. Jones and Mary Jean Harrold. 2005. Empirical evaluation of the tarantula automatic fault-localization technique. In ASE. 273\u2013282."},{"key":"e_1_3_2_35_2","first-page":"467","volume-title":"ICSE","author":"Jones James A.","year":"2002","unstructured":"James A. Jones, Mary Jean Harrold, and John Stasko. 2002. Visualization of test information to assist fault localization. In ICSE. 467\u2013477."},{"key":"e_1_3_2_36_2","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"e_1_3_2_37_2","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931051"},{"key":"e_1_3_2_38_2","doi-asserted-by":"crossref","first-page":"141","DOI":"10.1145\/781131.781148","volume-title":"PLDI","author":"Liblit Ben","year":"2003","unstructured":"Ben Liblit, Alex Aiken, Alice X. Zheng, and Michael I. Jordan. 2003. Bug isolation via remote program sampling. In PLDI. 141\u2013154."},{"key":"e_1_3_2_39_2","doi-asserted-by":"crossref","first-page":"15","DOI":"10.1145\/1065010.1065014","volume-title":"PLDI","author":"Liblit Ben","year":"2005","unstructured":"Ben Liblit, Mayur Naik, Alice X. Zheng, Alex Aiken, and Michael I. Jordan. 2005. Scalable statistical bug isolation. In PLDI. 15\u201326."},{"key":"e_1_3_2_40_2","doi-asserted-by":"publisher","DOI":"10.5555\/1123677"},{"key":"e_1_3_2_41_2","first-page":"286","volume-title":"FSE","author":"Liu Chao","year":"2005","unstructured":"Chao Liu, Xifeng Yan, Long Fei, Jiawei Han, and Samuel P. Midkiff. 2005. SOBER: Statistical model-based bug localization. In FSE. 286\u2013295."},{"key":"e_1_3_2_42_2","first-page":"1","volume-title":"ICSM","year":"2010","unstructured":"Lucia, David Lo, Lingxiao Jiang, and Aditya Budi. 2010. Comprehensive evaluation of association measures for fault localization. In ICSM. 1\u201310."},{"key":"e_1_3_2_43_2","first-page":"877","volume-title":"CSAE","author":"Lyle J. R.","year":"1987","unstructured":"J. R. Lyle and M. Weiser1987. Automatic program bug location by program slicing. In CSAE. 877\u2013883."},{"key":"e_1_3_2_44_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.28"},{"key":"e_1_3_2_45_2","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511804564","volume-title":"Counterfactuals and Causal Inference: Methods and Principles for Social Research,","author":"Morgan Stephen L.","year":"2007","unstructured":"Stephen L. Morgan and Christopher Winship. 2007. Counterfactuals and Causal Inference: Methods and Principles for Social Research, (1st ed.). Cambridge University Press."},{"key":"e_1_3_2_46_2","doi-asserted-by":"publisher","DOI":"10.1145\/2000791.2000795"},{"key":"e_1_3_2_47_2","first-page":"13","volume-title":"PLDI","author":"Neamtiu Iulian","year":"2009","unstructured":"Iulian Neamtiu and Michael Hicks. 2009. Safe and timely updates to multi-threaded programs. In PLDI. 13\u201324."},{"key":"e_1_3_2_48_2","doi-asserted-by":"publisher","DOI":"10.2331\/suisan.22.526"},{"key":"e_1_3_2_49_2","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1509"},{"key":"e_1_3_2_50_2","first-page":"245","volume-title":"ICSE","author":"Park Sangmin","year":"2010","unstructured":"Sangmin Park, Richard W. Vuduc, and Mary Jean Harrold. 2010. Falcon: Fault localization in concurrent programs. In ICSE. 245\u2013254."},{"issue":"3","key":"e_1_3_2_51_2","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1002\/stvr.1523","article-title":"Unicorn: A unified approach for localizing non-deadlock concurrency bugs","volume":"25","author":"Park Sangmin","year":"2014","unstructured":"Sangmin Park, Richard W. Vuduc, and Mary Jean Harrold. 2014. Unicorn: A unified approach for localizing non-deadlock concurrency bugs. Softw. Test. Verif. Reliab. 25, 3 (2014), 167\u2013190.","journal-title":"Softw. Test. Verif. Reliab."},{"key":"e_1_3_2_52_2","first-page":"199","volume-title":"ISSTA","author":"Parnin Chris","year":"2011","unstructured":"Chris Parnin and Alessandro Orso. 2011. Are automated debugging techniques actually helping programmers? In ISSTA. 199\u2013209."},{"key":"e_1_3_2_53_2","volume-title":"Causality: Models, Reasoning, and Inference","author":"Pearl Judea","year":"2000","unstructured":"Judea Pearl. 2000. Causality: Models, Reasoning, and Inference. Cambridge University Press."},{"key":"e_1_3_2_54_2","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.62"},{"key":"e_1_3_2_55_2","doi-asserted-by":"publisher","DOI":"10.5555\/152181"},{"key":"e_1_3_2_56_2","volume-title":"A Research Framework for Software-fault Localization Tools","author":"Renieris Emmanuel","year":"2005","unstructured":"Emmanuel Renieris. 2005. A Research Framework for Software-fault Localization Tools. Ph.D. Dissertation. Providence, RI."},{"key":"e_1_3_2_57_2","first-page":"30","volume-title":"ASE","author":"Renieris Manos","year":"2003","unstructured":"Manos Renieris and Steven P. Reiss. 2003. Fault localization with nearest neighbor queries. In ASE. 30\u201339."},{"key":"e_1_3_2_58_2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693093"},{"key":"e_1_3_2_59_2","first-page":"56","volume-title":"ICSE","author":"Santelices Raul","year":"2009","unstructured":"Raul Santelices, James A. Jones, Yanbing Yu, and Mary Jean Harrold. 2009. Lightweight fault-localization using multiple coverage types. In ICSE. 56\u201366."},{"key":"e_1_3_2_60_2","first-page":"561","volume-title":"OOPSLA","author":"Song Linhai","year":"2014","unstructured":"Linhai Song and Shan Lu. 2014. Statistical debugging for real-world performance problems. In OOPSLA. 561\u2013578."},{"key":"e_1_3_2_61_2","first-page":"1","volume-title":"PLDI","author":"Subramanian Suriya","year":"2009","unstructured":"Suriya Subramanian, Michael Hicks, and Kathryn S. McKinley. 2009. Dynamic software updates: A VM-centric approach. In PLDI. 1\u201312."},{"key":"e_1_3_2_62_2","first-page":"576","volume-title":"FSE","author":"Sun Chengnian","year":"2013","unstructured":"Chengnian Sun and Siau-Cheng Khoo. 2013. Mining succinct predicated bug signatures. In FSE. 576\u2013586."},{"key":"e_1_3_2_63_2","doi-asserted-by":"publisher","DOI":"10.1145\/358557.358577"},{"key":"e_1_3_2_64_2","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970359"},{"key":"e_1_3_2_65_2","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2013.2285319"},{"key":"e_1_3_2_66_2","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2011.2172031"},{"key":"e_1_3_2_67_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2521368"},{"key":"e_1_3_2_68_2","doi-asserted-by":"publisher","DOI":"10.1142\/S021819400900426X"},{"key":"e_1_3_2_69_2","first-page":"253","volume-title":"FSE","author":"Zeller Andreas","year":"1999","unstructured":"Andreas Zeller. 1999. Yesterday, my program worked. Today, it does not. Why? In FSE. 253\u2013267."},{"key":"e_1_3_2_70_2","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"e_1_3_2_71_2","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-014-5241-2"},{"key":"e_1_3_2_72_2","doi-asserted-by":"crossref","first-page":"272","DOI":"10.1145\/1134285.1134324","volume-title":"ICSE","author":"Zhang Xiangyu","year":"2006","unstructured":"Xiangyu Zhang, Neelam Gupta, and Rajiv Gupta. 2006. Locating faults through automated predicate switching. In ICSE. 272\u2013281."},{"key":"e_1_3_2_73_2","doi-asserted-by":"crossref","first-page":"33","DOI":"10.1145\/1085130.1085135","volume-title":"AADEBUG","author":"Zhang Xiangyu","year":"2005","unstructured":"Xiangyu Zhang, Haifeng He, Neelam Gupta, and Rajiv Gupta. 2005. Experimental evaluation of using dynamic slices for fault location. In AADEBUG. 33\u201342."},{"key":"e_1_3_2_74_2","doi-asserted-by":"crossref","unstructured":"Jian Zhou Hongyu Zhang and David Lo. 2012. Where should the bugs be fixed? More accurate information retrieval-based bug localization based on bug reports. In ICSE. IEEE Press 14\u201324.","DOI":"10.1109\/ICSE.2012.6227210"},{"key":"e_1_3_2_75_2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2892102"},{"key":"e_1_3_2_76_2","doi-asserted-by":"publisher","DOI":"10.1145\/2983990.2984005"},{"key":"e_1_3_2_77_2","first-page":"215","volume-title":"ISSTA","author":"Zuo Zhiqiang","year":"2014","unstructured":"Zhiqiang Zuo, Siau-Cheng Khoo, and Chengnian Sun. 2014. Efficient predicated bug signature mining via hierarchical instrumentation. In ISSTA. 215\u2013224."}],"container-title":["ACM Transactions on Software Engineering and Methodology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544790","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3544790","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:46:25Z","timestamp":1750178785000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3544790"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,3,30]]},"references-count":76,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2023,4,30]]}},"alternative-id":["10.1145\/3544790"],"URL":"https:\/\/doi.org\/10.1145\/3544790","relation":{},"ISSN":["1049-331X","1557-7392"],"issn-type":[{"type":"print","value":"1049-331X"},{"type":"electronic","value":"1557-7392"}],"subject":[],"published":{"date-parts":[[2023,3,30]]},"assertion":[{"value":"2021-01-14","order":0,"name":"received","label":"Received","group":{"name":"publication_history","label":"Publication History"}},{"value":"2022-05-25","order":1,"name":"accepted","label":"Accepted","group":{"name":"publication_history","label":"Publication History"}},{"value":"2023-03-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}