{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:15:32Z","timestamp":1775873732069,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":102,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,10,10]],"date-time":"2022-10-10T00:00:00Z","timestamp":1665360000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,10,10]]},"DOI":"10.1145\/3551349.3556952","type":"proceedings-article","created":{"date-parts":[[2023,1,5]],"date-time":"2023-01-05T20:43:54Z","timestamp":1672951434000},"page":"1-13","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":10,"title":["Inline Tests"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0697-663X","authenticated-orcid":false,"given":"Yu","family":"Liu","sequence":"first","affiliation":[{"name":"The University of Texas at Austin, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1529-3216","authenticated-orcid":false,"given":"Pengyu","family":"Nie","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5631-4816","authenticated-orcid":false,"given":"Owolabi","family":"Legunsen","sequence":"additional","affiliation":[{"name":"Cornell University, USA"}]},{"given":"Milos","family":"Gligoric","sequence":"additional","affiliation":[{"name":"The University of Texas at Austin, United States"}]}],"member":"320","published-online":{"date-parts":[[2023,1,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/93548.93576"},{"key":"e_1_3_2_1_2_1","unstructured":"Hiralal Agrawal Joseph\u00a0R Horgan Saul London and W\u00a0Eric Wong. 1995. Fault localization using execution slices and dataflow tests. In ISSRE. 143\u2013151."},{"key":"e_1_3_2_1_3_1","volume-title":"Test driven development: A practical guide","author":"Astels Dave","unstructured":"Dave Astels. 2003. Test driven development: A practical guide. Prentice Hall Professional Technical Reference."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Sammie Bae. 2019. Bit manipulation. In JavaScript Data Structures and Algorithms. 339\u2013349.","DOI":"10.1007\/978-1-4842-3988-9_20"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","unstructured":"Herman Banken Erik Meijer and Georgios Gousios. 2018. Debugging data flows in reactive programs. In ICSE. 752\u2013763.","DOI":"10.1145\/3180155.3180156"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Detlef Bartetzko Clemens Fischer Michael M\u00f6ller and Heike Wehrheim. 2001. Jass\u2014Java with assertions. In RV. 103\u2013117.","DOI":"10.1016\/S1571-0661(04)00247-6"},{"key":"e_1_3_2_1_7_1","volume-title":"Test-driven development: By example","author":"Beck Kent","unstructured":"Kent Beck. 2003. Test-driven development: By example. Addison-Wesley Professional."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Jon Bell Owolabi Legunsen Michael Hilton Lamyaa Eloussi Tifany Yung and Darko Marinov. 2018. DeFlaker: Automatically detecting flaky tests. In ICSE. 433\u2013444.","DOI":"10.1145\/3180155.3180164"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"crossref","unstructured":"Moritz Beller Georgios Gousios Annibale Panichella and Andy Zaidman. 2015. When how and why developers (do not) test in their IDEs. In ESEC\/FSE. 179\u2013190.","DOI":"10.1145\/2786805.2786843"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Moritz Beller Niels Spruit Diomidis Spinellis and Andy Zaidman. 2018. On the dichotomy of debugging behavior among programmers. In ICSE. 572\u2013583.","DOI":"10.1145\/3180155.3180175"},{"key":"e_1_3_2_1_11_1","unstructured":"Nathan Broadbent. 2022. git-remove-debug. https:\/\/github.com\/ndbroadbent\/git-remove-debug."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"crossref","unstructured":"Carl Chapman and Kathryn\u00a0T Stolee. 2016. Exploring regular expression usage and context in Python. In ISSTA. 282\u2013293.","DOI":"10.1145\/2931037.2931073"},{"key":"e_1_3_2_1_13_1","unstructured":"Luis Couto. 2022. grunt-groundskeeper. https:\/\/github.com\/Couto\/grunt-groundskeeper."},{"key":"e_1_3_2_1_14_1","unstructured":"Cyril. 2022. Regex Tester. https:\/\/extendsclass.com\/regex-tester.html."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Ermira Daka and Gordon Fraser. 2014. A survey on unit testing practices and problems. In ISSRE. 201\u2013211.","DOI":"10.1109\/ISSRE.2014.11"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"crossref","unstructured":"James\u00a0C Davis Christy\u00a0A Coghlan Francisco Servant and Dongyoon Lee. 2018. The impact of regular expression denial of service (ReDoS) in practice: An empirical study at the ecosystem scale. In ESEC\/FSE. 246\u2013256.","DOI":"10.1145\/3236024.3236027"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","unstructured":"James\u00a0C Davis Daniel Moyer Ayaan\u00a0M Kazerouni and Dongyoon Lee. 2019. Testing regex generalizability and its implications: A large-scale many-language measurement study. In ASE. 427\u2013439.","DOI":"10.1109\/ASE.2019.00048"},{"key":"e_1_3_2_1_18_1","unstructured":"Java developers. 2022. Java stream API. https:\/\/docs.oracle.com\/javase\/8\/docs\/api\/java\/util\/stream\/Stream.html."},{"key":"e_1_3_2_1_19_1","unstructured":"Firas Dib. 2022. RegEx101. https:\/\/regex101.com."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"crossref","unstructured":"Aryaz Eghbali and Michael Pradel. 2020. No strings attached: An empirical study of string-related software bugs. In ASE. 956\u2013967.","DOI":"10.1145\/3324884.3416576"},{"key":"e_1_3_2_1_21_1","first-page":"14","article-title":"A systematic review on regression test selection techniques","volume":"52","author":"Engstr\u00f6m Emelie","year":"2010","unstructured":"Emelie Engstr\u00f6m, Per Runeson, and Mats Skoglund. 2010. A systematic review on regression test selection techniques. IST 52, 1 (2010), 14\u201330.","journal-title":"IST"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"Robert\u00a0W Floyd. 1993. Assigning meanings to programs. In Program Verification. 65\u201381.","DOI":"10.1007\/978-94-011-1793-7_4"},{"key":"e_1_3_2_1_23_1","unstructured":"Apache\u00a0Software Foundation. 2022. Flink. https:\/\/github.com\/apache\/flink."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.87281"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2506375"},{"key":"e_1_3_2_1_26_1","unstructured":"GitHub. 2022. Github commits containing \u2018Remove Debug\u2019. https:\/\/github.com\/search?q=remove+debug&type=commits."},{"key":"e_1_3_2_1_27_1","volume-title":"Ekstazi: Lightweight test selection. In ICSE-Demo. 713\u2013716.","author":"Gligoric Milos","year":"2015","unstructured":"Milos Gligoric, Lamyaa Eloussi, and Darko Marinov. 2015. Ekstazi: Lightweight test selection. In ICSE-Demo. 713\u2013716."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"crossref","unstructured":"Milos Gligoric Lamyaa Eloussi and Darko Marinov. 2015. Practical regression test selection with dynamic file dependencies. In ISSTA. 211\u2013222.","DOI":"10.1145\/2771783.2771784"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"crossref","unstructured":"Milos Gligoric Stas Negara Owolabi Legunsen and Darko Marinov. 2014. An empirical evaluation and comparison of manual and automated test selection. In ASE. 361\u2013372.","DOI":"10.1145\/2642937.2643019"},{"key":"e_1_3_2_1_30_1","unstructured":"Google. 2022. Guava. https:\/\/github.com\/google\/guava."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"crossref","unstructured":"Siegfried Grabner Dieter Kranzlm\u00fcller and Jens Volkert. 1995. Debugging parallel programs using ATEMPT. In SC. 235\u2013240.","DOI":"10.1007\/BFb0046633"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"crossref","unstructured":"Mark Grechanik and Gurudev Devanla. 2019. Generating integration tests automatically using frequent patterns of method execution sequences. In SEKE. 209\u2013280.","DOI":"10.18293\/SEKE2019-001"},{"key":"e_1_3_2_1_33_1","unstructured":"greenDAO Team. 2022. greenDAO. https:\/\/github.com\/greenrobot\/greenDAO."},{"key":"e_1_3_2_1_34_1","first-page":"576","article-title":"An axiomatic basis for computer programming","volume":"12","author":"Antony\u00a0Richard Hoare Charles","year":"1969","unstructured":"Charles Antony\u00a0Richard Hoare. 1969. An axiomatic basis for computer programming. Communications 12, 10 (1969), 576\u2013580.","journal-title":"Communications"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/MAHC.2003.1203056"},{"key":"e_1_3_2_1_36_1","first-page":"331","article-title":"Performance profiling and debugging on the k computer","volume":"48","author":"Ida Keiichi","year":"2012","unstructured":"Keiichi Ida, Yasuyuki Ohno, Shunsuke Inoue, and Kazuo Minami. 2012. Performance profiling and debugging on the k computer. FSTJ 48, 3 (2012), 331\u2013339.","journal-title":"FSTJ"},{"key":"e_1_3_2_1_37_1","unstructured":"JetBrains. 2022. IntelliJ IDEA regular expression syntax reference. https:\/\/www.jetbrains.com\/help\/idea\/regular-expression-syntax-reference.html#tips-tricks."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Arthur\u00a0V Kamienski Luisa Palechor Cor-Paul Bezemer and Abram Hindle. 2021. PySStuBs: Characterizing single-statement bugs in popular open-source Python projects. In MSR. 520\u2013524.","DOI":"10.1109\/MSR52588.2021.00066"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"crossref","unstructured":"Rafael-Michael Karampatsis and Charles Sutton. 2020. How often do single-statement bugs occur? The ManySStuBs4J dataset. In MSR. 573\u2013577.","DOI":"10.1145\/3379597.3387491"},{"key":"e_1_3_2_1_40_1","unstructured":"Andrew Kovalyov. 2022. Debug Statements Fixers. https:\/\/github.com\/akovalyov\/DebugStatementsFixers."},{"key":"e_1_3_2_1_41_1","unstructured":"Holger Krekel and pytest-dev team. 2022. pytest. https:\/\/docs.pytest.org."},{"key":"e_1_3_2_1_42_1","unstructured":"Nate Kushman and Regina Barzilay. 2013. Using semantic unification to generate regular expressions from natural language. In NAACL. 826\u2013836."},{"key":"e_1_3_2_1_43_1","unstructured":"Facebook AI\u00a0Research lab. 2022. PyTorch. https:\/\/github.com\/pytorch\/pytorch."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"crossref","unstructured":"Wing Lam Patrice Godefroid Suman Nath Anirudh Santhiar and Suresh Thummalapenta. 2019. Root causing flaky tests in a large-scale industrial setting. In ISSTA. 101\u2013111.","DOI":"10.1145\/3293882.3330570"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"crossref","unstructured":"Wing Lam K\u0131van\u00e7 Mu\u015flu Hitesh Sajnani and Suresh Thummalapenta. 2020. A study on the lifecycle of flaky tests. In ICSE. 1471\u20131482.","DOI":"10.1145\/3377811.3381749"},{"key":"e_1_3_2_1_46_1","unstructured":"Eric Larson and Todd Austin. 2003. High coverage detection of input-related security faults. In USENIX Security."},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"crossref","unstructured":"Jasmine Latendresse Rabe Abdalkareem Diego\u00a0Elias Costa and Emad Shihab. 2021. How effective is continuous integration in indicating single-statement bugs?. In MSR. 500\u2013504.","DOI":"10.1109\/MSR52588.2021.00062"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"crossref","unstructured":"Thomas\u00a0D LaToza and Brad\u00a0A Myers. 2011. Designing useful tools for developers. In PLATEAU. 45\u201350.","DOI":"10.1145\/2089155.2089166"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"crossref","unstructured":"Thomas\u00a0D LaToza Gina Venolia and Robert DeLine. 2006. Maintaining mental models: A study of developer work habits. In ICSE. 492\u2013501.","DOI":"10.1145\/1134285.1134355"},{"key":"e_1_3_2_1_50_1","volume-title":"JML: A notation for detailed design. In Behavioral Specifications of Businesses and Systems. 175\u2013188.","author":"Leavens T","year":"1999","unstructured":"Gary\u00a0T Leavens, Albert\u00a0L Baker, and Clyde Ruby. 1999. JML: A notation for detailed design. In Behavioral Specifications of Businesses and Systems. 175\u2013188."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"crossref","unstructured":"Wonyeol Lee Rahul Sharma and Alex Aiken. 2016. Verifying bit-manipulations of floating-point. In PLDI. 70\u201384.","DOI":"10.1145\/2908080.2908107"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"crossref","unstructured":"Owolabi Legunsen Farah Hariri August Shi Yafeng Lu Lingming Zhang and Darko Marinov. 2016. An extensive study of static regression test selection in modern software evolution. In FSE. 583\u2013594.","DOI":"10.1145\/2950290.2950361"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2017.0026"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"Hareton\u00a0KN Leung and Lee White. 1990. A study of integration testing and software regression at the integration level. In ICSM. 290\u2013301.","DOI":"10.1109\/ICSM.1990.131377"},{"key":"e_1_3_2_1_55_1","volume-title":"Medic: Metaprogramming and trace-oriented debugging. In FPW. 7\u201314.","author":"Li Xiangqi","year":"2015","unstructured":"Xiangqi Li and Matthew Flatt. 2015. Medic: Metaprogramming and trace-oriented debugging. In FPW. 7\u201314."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065014"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"crossref","unstructured":"Qingzhou Luo Farah Hariri Lamyaa Eloussi and Darko Marinov. 2014. An empirical analysis of flaky tests. In ESEC\/FSE. 643\u2013653.","DOI":"10.1145\/2635868.2635920"},{"key":"e_1_3_2_1_58_1","unstructured":"Eswar Malla. 2022. DebugPurge. https:\/\/github.com\/eswarm\/DebugPurge."},{"key":"e_1_3_2_1_59_1","volume-title":"Covrig: A framework for the analysis of code, test, and coverage evolution in real software. In ISSTA. 93\u2013104.","author":"Marinescu Paul","year":"2014","unstructured":"Paul Marinescu, Petr Hosek, and Cristian Cadar. 2014. Covrig: A framework for the analysis of code, test, and coverage evolution in real software. In ISSTA. 93\u2013104."},{"key":"e_1_3_2_1_60_1","unstructured":"Glen McCluskey. 2022. Using Java reflection. https:\/\/www.oracle.com\/technical-resources\/articles\/java\/javareflection.html."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/2.161279"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"crossref","unstructured":"Louis\u00a0G Michael James Donohue James\u00a0C Davis Dongyoon Lee and Francisco Servant. 2019. Regexes are hard: Decision-making difficulties and risks in programming regular expressions. In ASE. 415\u2013426.","DOI":"10.1109\/ASE.2019.00047"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"crossref","unstructured":"Aleksandar Milicevic Derek Rayside Kuat Yessenov and Daniel Jackson. 2011. Unifying execution of imperative and declarative code. In ICSE. 511\u2013520.","DOI":"10.1145\/1985793.1985863"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"crossref","unstructured":"Christian Murphy Gail Kaiser Ian Vo and Matt Chu. 2009. Quality assurance of software applications using the In Vivo testing approach. In ICST. 111\u2013120.","DOI":"10.1109\/ICST.2009.18"},{"key":"e_1_3_2_1_65_1","first-page":"1","article-title":"Unifying execution of imperative generators and declarative specifications","volume":"217","author":"Nie Pengyu","year":"2020","unstructured":"Pengyu Nie, Marinela Parovic, Zhiqiang Zang, Sarfraz Khurshid, Aleksandar Milicevic, and Milos Gligoric. 2020. Unifying execution of imperative generators and declarative specifications. In OOPSLA. 217:1\u2013217:26.","journal-title":"OOPSLA."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"crossref","unstructured":"Pengyu Nie Rishabh Rai Junyi\u00a0Jessy Li Sarfraz Khurshid Raymond\u00a0J Mooney and Milos Gligoric. 2019. A framework for writing trigger-action todo comments in executable format. In ESEC\/FSE. 385\u2013396.","DOI":"10.1145\/3338906.3338965"},{"key":"e_1_3_2_1_67_1","unstructured":"Oracle. 2022. Chapter 4. The class file format. https:\/\/docs.oracle.com\/javase\/specs\/jvms\/se8\/html\/jvms-4.html#jvms-4.7.3."},{"key":"e_1_3_2_1_68_1","unstructured":"Oracle. 2022. Programming with assertions. https:\/\/docs.oracle.com\/javase\/7\/docs\/technotes\/guides\/language\/assert.html."},{"key":"e_1_3_2_1_69_1","unstructured":"Alessandro Orso. 1998. Integration testing of object-oriented software. (1998) 119."},{"key":"e_1_3_2_1_70_1","unstructured":"Jaroslaw Pawlak. 2022. Bad practices of testing. https:\/\/github.com\/Jarcionek\/Bad-Practices-of-Testing\/blob\/master\/src\/java\/presentation\/_09_test_verifying_implementation_rather_than_behaviour\/description.md."},{"key":"e_1_3_2_1_71_1","unstructured":"Michael Peacock. 2022. A case for using the @VisibleForTesting annotation. https:\/\/michael-peacock.com\/a-case-for-using-the-visiblefortesting-annotation."},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"crossref","unstructured":"Spencer Pearson Jos\u00e9 Campos Ren\u00e9 Just Gordon Fraser Rui Abreu Michael\u00a0D Ernst Deric Pang and Benjamin Keller. 2017. Evaluating and improving fault localization. In ICSE. 609\u2013620.","DOI":"10.1109\/ICSE.2017.62"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-015-9294-2"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/1317471.1317478"},{"key":"e_1_3_2_1_75_1","unstructured":"pytest-html team. 2022. pytest-html plugin. https:\/\/github.com\/pytest-dev\/pytest-html."},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.341844"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.91"},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09907-7"},{"key":"e_1_3_2_1_79_1","unstructured":"Phillip Schanely. 2022. Crosshair. https:\/\/github.com\/pschanely\/CrossHair."},{"key":"e_1_3_2_1_80_1","unstructured":"August Shi Alex Gyori Owolabi Legunsen and Darko Marinov. 2016. Detecting assumptions on deterministic implementations of non-deterministic specifications. In ICST. 80\u201390."},{"key":"e_1_3_2_1_81_1","first-page":"1","article-title":"Reflection-aware static regression test selection","volume":"187","author":"Shi August","year":"2019","unstructured":"August Shi, Milica Hadzi-Tanovic, Lingming Zhang, Darko Marinov, and Owolabi Legunsen. 2019. Reflection-aware static regression test selection. In OOPSLA. 187:1\u2013187:29.","journal-title":"OOPSLA."},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"crossref","unstructured":"Friedrich Steimann Marcus Frenkel and Rui Abreu. 2013. Threats to the validity and value of empirical assessments of the accuracy of coverage-based fault locators. In ISSTA. 314\u2013324.","DOI":"10.1145\/2483760.2483767"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/954127.954139"},{"key":"e_1_3_2_1_84_1","unstructured":"CPython team. 2022. Doctest. https:\/\/docs.python.org\/3\/library\/doctest.html."},{"key":"e_1_3_2_1_85_1","unstructured":"CPython team. 2022. Python AST library. https:\/\/github.com\/python\/cpython\/blob\/main\/Lib\/ast.py."},{"key":"e_1_3_2_1_86_1","unstructured":"DeDRM Team. 2022. DeDRM tools. https:\/\/github.com\/apprenticeharper\/DeDRM_tools."},{"key":"e_1_3_2_1_87_1","unstructured":"Javaparser team. 2022. Javaparser library. https:\/\/github.com\/javaparser\/javaparser."},{"key":"e_1_3_2_1_88_1","unstructured":"JUnit team. 2022. JUnit. https:\/\/junit.org."},{"key":"e_1_3_2_1_89_1","unstructured":"Parquery Team. 2022. icontract. https:\/\/github.com\/Parquery\/icontract."},{"key":"e_1_3_2_1_90_1","unstructured":"PyContracts Team. 2022. PyContracts. https:\/\/github.com\/AndreaCensi\/contracts."},{"key":"e_1_3_2_1_91_1","unstructured":"Python 3.10.5\u00a0Documentation Team. 2022. Simple statements. https:\/\/docs.python.org\/3\/reference\/simple_stmts.html#the-assert-statement."},{"key":"e_1_3_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095430.1081749"},{"key":"e_1_3_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.117"},{"key":"e_1_3_2_1_94_1","unstructured":"Serge Toarca. 2022. debuggex. https:\/\/www.debuggex.com."},{"key":"e_1_3_2_1_95_1","unstructured":"Fabian Trautsch. 2019. An analysis of the differences between unit and integration tests. Ph.\u00a0D. Dissertation."},{"key":"e_1_3_2_1_96_1","unstructured":"W.T. Tsai Xiaoying Bai R. Paul Weiguang Shao and V. Agarwal. 2001. End-to-end integration testing design. In COMPSAC. 166\u2013171."},{"key":"e_1_3_2_1_97_1","unstructured":"Jeffrey\u00a0M Voas and Keith\u00a0W Miller. 1994. Putting assertions in their place. In ISSRE. 152\u2013157."},{"key":"e_1_3_2_1_98_1","volume-title":"Program slices: Formal, psychological, and practical investigations of an automatic program abstraction method","author":"Weiser Mark\u00a0David","unstructured":"Mark\u00a0David Weiser. 1979. Program slices: Formal, psychological, and practical investigations of an automatic program abstraction method. University of Michigan."},{"key":"e_1_3_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2521368"},{"key":"e_1_3_2_1_100_1","doi-asserted-by":"crossref","unstructured":"Rahulkrishna Yandrapally and Ali Mesbah. 2021. Mutation analysis for assessing end-to-end web tests. In ICSME. 183\u2013194.","DOI":"10.1109\/ICSME52107.2021.00023"},{"key":"e_1_3_2_1_101_1","doi-asserted-by":"crossref","unstructured":"Zexuan Zhong Jiaqi Guo Wei Yang Tao Xie Jian-Guang Lou Ting Liu and Dongmei Zhang. 2018. Generating regular expressions from natural language specifications: Are we there yet?. In AAAI. 791\u2013794.","DOI":"10.18653\/v1\/D18-1189"},{"key":"e_1_3_2_1_102_1","doi-asserted-by":"crossref","unstructured":"Chenguang Zhu Owolabi Legunsen August Shi and Milos Gligoric. 2019. A framework for checking regression test selection tools. In ICSE. 430\u2013441.","DOI":"10.1109\/ICSE.2019.00056"}],"event":{"name":"ASE '22: 37th IEEE\/ACM International Conference on Automated Software Engineering","location":"Rochester MI USA","acronym":"ASE '22"},"container-title":["Proceedings of the 37th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3556952","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3551349.3556952","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,8,22]],"date-time":"2025-08-22T07:56:36Z","timestamp":1755849396000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3551349.3556952"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,10,10]]},"references-count":102,"alternative-id":["10.1145\/3551349.3556952","10.1145\/3551349"],"URL":"https:\/\/doi.org\/10.1145\/3551349.3556952","relation":{},"subject":[],"published":{"date-parts":[[2022,10,10]]},"assertion":[{"value":"2023-01-05","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}