{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T06:08:40Z","timestamp":1725602920954},"reference-count":0,"publisher":"KSI Research Inc.","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022,7,1]]},"DOI":"10.18293\/seke2022-159","type":"proceedings-article","created":{"date-parts":[[2022,9,5]],"date-time":"2022-09-05T03:29:03Z","timestamp":1662348543000},"page":"243-248","source":"Crossref","is-referenced-by-count":0,"title":["Visualization of automated program repair focusing on suspiciousness values"],"prefix":"10.18293","volume":"2022","author":[{"given":"Naoki","family":"Tane","sequence":"first","affiliation":[]},{"given":"Yusaku","family":"Ito","sequence":"additional","affiliation":[]},{"given":"Hrionori","family":"Washizaki","sequence":"additional","affiliation":[]},{"given":"Yoshiaki","family":"Fukazawa","sequence":"additional","affiliation":[]}],"member":"7672","published-online":{"date-parts":[[2022,7,1]]},"event":{"name":"The 34th International Conference on Software Engineering and Knowledge Engineering","acronym":"SEKE2022"},"container-title":["International Conferences on Software Engineering and Knowledge Engineering","Proceedings of the 34th International Conference on Software Engineering and Knowledge Engineering"],"original-title":[],"deposited":{"date-parts":[[2022,9,11]],"date-time":"2022-09-11T00:48:33Z","timestamp":1662857313000},"score":1,"resource":{"primary":{"URL":"http:\/\/ksiresearchorg.ipage.com\/seke\/seke22paper\/paper159.pdf"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,7,1]]},"references-count":0,"URL":"https:\/\/doi.org\/10.18293\/seke2022-159","relation":{},"ISSN":["2325-9000"],"issn-type":[{"type":"print","value":"2325-9000"}],"subject":[],"published":{"date-parts":[[2022,7,1]]}}}