{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,26]],"date-time":"2026-02-26T05:24:01Z","timestamp":1772083441015,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":59,"publisher":"ACM","license":[{"start":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T00:00:00Z","timestamp":1701302400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF (National Science Foundation)","doi-asserted-by":"publisher","award":["CCF-1845446, 2238133, and 2200621"],"award-info":[{"award-number":["CCF-1845446, 2238133, and 2200621"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2023,11,30]]},"DOI":"10.1145\/3611643.3613884","type":"proceedings-article","created":{"date-parts":[[2023,11,30]],"date-time":"2023-11-30T23:14:38Z","timestamp":1701386078000},"page":"1774-1785","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Triggering Modes in Spectrum-Based Multi-location Fault Localization"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0009-0006-6015-2358","authenticated-orcid":false,"given":"Tung","family":"Dao","sequence":"first","affiliation":[{"name":"Cvent, McLean, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-0230-5524","authenticated-orcid":false,"given":"Na","family":"Meng","sequence":"additional","affiliation":[{"name":"Virginia Tech, Blacksburg, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4255-4592","authenticated-orcid":false,"given":"ThanhVu","family":"Nguyen","sequence":"additional","affiliation":[{"name":"George Mason University, Fairfax, USA"}]}],"member":"320","published-online":{"date-parts":[[2023,11,30]]},"reference":[{"key":"e_1_3_2_2_1_1","unstructured":"2020. Defects4J. http:\/\/fault-localization.cs.washington.edu"},{"key":"e_1_3_2_2_2_1","unstructured":"2023. Clover. https:\/\/openclover.org\/"},{"key":"e_1_3_2_2_3_1","unstructured":"2023. Cobertura. https:\/\/cobertura.github.io\/cobertura\/"},{"key":"e_1_3_2_2_4_1","unstructured":"2023. fault-localization. https:\/\/fault-localization.cs.washington.edu\/"},{"key":"e_1_3_2_2_5_1","unstructured":"2023. IFLM. https:\/\/github.com\/idf-icst\/sbfl-study"},{"key":"e_1_3_2_2_6_1","unstructured":"2023. Jacoco. https:\/\/www.jacoco.org\/jacoco\/trunk\/doc\/index.html"},{"key":"e_1_3_2_2_7_1","unstructured":"2023. JUnit. https:\/\/junit.org\/junit5\/"},{"key":"e_1_3_2_2_8_1","unstructured":"2023. Maven. https:\/\/maven.apache.org\/"},{"key":"e_1_3_2_2_9_1","unstructured":"2023. SonarQube. https:\/\/www.sonarsource.com\/products\/sonarqube\/"},{"key":"e_1_3_2_2_10_1","unstructured":"2023. TestNG. https:\/\/testng.org\/doc\/"},{"key":"e_1_3_2_2_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.06.035"},{"key":"e_1_3_2_2_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC.PART.2007.13"},{"key":"e_1_3_2_2_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.11.915"},{"key":"e_1_3_2_2_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC.PART.2007.13"},{"key":"e_1_3_2_2_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831715"},{"key":"e_1_3_2_2_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00013"},{"key":"e_1_3_2_2_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054820"},{"key":"e_1_3_2_2_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416667"},{"key":"e_1_3_2_2_19_1","first-page":"43","article-title":"A Survey of Binary Similarity and Distance Measures","volume":"8","author":"Choi Seung-Seok","year":"2010","unstructured":"Seung-Seok Choi, Sung-Hyuk Cha, and Charles C. Tappert. 2010. A Survey of Binary Similarity and Distance Measures. Journal on Systemics, Cybernetics and Informatics, 8 (2010), 43\u201348. https:\/\/api.semanticscholar.org\/CorpusID:15289045","journal-title":"Journal on Systemics, Cybernetics and Informatics"},{"key":"e_1_3_2_2_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1085130.1085143"},{"key":"e_1_3_2_2_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST49551.2021.00052"},{"key":"e_1_3_2_2_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSACW.2011.92"},{"key":"e_1_3_2_2_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/SATE.2016.17"},{"key":"e_1_3_2_2_24_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2021.106512"},{"key":"e_1_3_2_2_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST46399.2020.00012"},{"key":"e_1_3_2_2_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-9995-0_1"},{"key":"e_1_3_2_2_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2020.2965139"},{"key":"e_1_3_2_2_28_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.2703"},{"key":"e_1_3_2_2_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101949"},{"key":"e_1_3_2_2_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581397"},{"key":"e_1_3_2_2_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"e_1_3_2_2_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642997"},{"key":"e_1_3_2_2_33_1","first-page":"1","article-title":"The cost of poor software quality in the US: A 2020 report. Proc. Consortium","author":"Krasner Herb","year":"2021","unstructured":"Herb Krasner. 2021. The cost of poor software quality in the US: A 2020 report. Proc. Consortium Inf. Softw. QualityTM (CISQTM), 1\u201346.","journal-title":"Inf. Softw. QualityTM (CISQTM)"},{"key":"e_1_3_2_2_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-49052-6_6"},{"key":"e_1_3_2_2_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609542"},{"key":"e_1_3_2_2_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2559932"},{"key":"e_1_3_2_2_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2013.16"},{"key":"e_1_3_2_2_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2000791.2000795"},{"key":"e_1_3_2_2_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693093"},{"key":"e_1_3_2_2_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2022.3144079"},{"key":"e_1_3_2_2_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME46990.2020.00076"},{"key":"e_1_3_2_2_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483767"},{"key":"e_1_3_2_2_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/VST50071.2020.9051638"},{"key":"e_1_3_2_2_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER50967.2021.00041"},{"key":"e_1_3_2_2_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054803"},{"key":"e_1_3_2_2_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/SANER48275.2020.9054803"},{"key":"e_1_3_2_2_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771797"},{"key":"e_1_3_2_2_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2521368"},{"key":"e_1_3_2_2_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2521368"},{"key":"e_1_3_2_2_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2014.41"},{"key":"e_1_3_2_2_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-33119-0_18"},{"key":"e_1_3_2_2_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491509.2491513"},{"key":"e_1_3_2_2_53_1","volume-title":"Tsong Yueh Chen, and Mark Harman","author":"Yoo Shin","year":"2014","unstructured":"Shin Yoo, Xiaoyuan Xie, Fei-Ching Kuo, Tsong Yueh Chen, and Mark Harman. 2014. No Pot of Gold at the End of Program Spectrum Rainbow: Greatest Risk Evaluation Formula Does Not Exist. University College London and Swinburn University."},{"key":"e_1_3_2_2_54_1","volume-title":"2008 ACM\/IEEE 30th International Conference on Software Engineering. 201\u2013210","author":"Yu Y.","unstructured":"Y. Yu, J. Jones, and M. J. Harrold. 2008. An empirical study of the effects of test-suite reduction on fault localization. In 2008 ACM\/IEEE 30th International Conference on Software Engineering. 201\u2013210."},{"key":"e_1_3_2_2_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2020.106312"},{"key":"e_1_3_2_2_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.array.2019.100008"},{"key":"e_1_3_2_2_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME55016.2022.00026"},{"key":"e_1_3_2_2_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227210"},{"key":"e_1_3_2_2_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2892102"}],"event":{"name":"ESEC\/FSE '23: 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering","location":"San Francisco CA USA","acronym":"ESEC\/FSE '23","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 31st ACM Joint European Software Engineering Conference and Symposium on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3613884","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3611643.3613884","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T16:37:10Z","timestamp":1750178230000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3611643.3613884"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11,30]]},"references-count":59,"alternative-id":["10.1145\/3611643.3613884","10.1145\/3611643"],"URL":"https:\/\/doi.org\/10.1145\/3611643.3613884","relation":{},"subject":[],"published":{"date-parts":[[2023,11,30]]},"assertion":[{"value":"2023-11-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}