{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T14:23:24Z","timestamp":1742912604885,"version":"3.40.3"},"publisher-location":"Cham","reference-count":20,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030042714"},{"type":"electronic","value":"9783030042721"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-030-04272-1_2","type":"book-chapter","created":{"date-parts":[[2018,11,19]],"date-time":"2018-11-19T01:02:36Z","timestamp":1542589356000},"page":"20-32","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Software Bug Localization Based on Key Range Invariants"],"prefix":"10.1007","author":[{"given":"Lin","family":"Ma","sequence":"first","affiliation":[]},{"given":"Zuohua","family":"Ding","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,11,20]]},"reference":[{"issue":"8","key":"2_CR1","doi-asserted-by":"publisher","first-page":"1411","DOI":"10.3724\/SP.J.1016.2011.01411","volume":"34","author":"K Yu","year":"2011","unstructured":"Yu, K., Lin, M.X.: Advances in automatic fault localization techniques. Chin. J. Comput. 34(8), 1411\u20131422 (2011)","journal-title":"Chin. J. Comput."},{"key":"2_CR2","unstructured":"Patterson, D., et al.: Recovery oriented computing (ROC): motivation, definition, techniques, and case studies. Berkeley Computer Science, vol. 9, no. 2, pp. 14\u201316 (2002)"},{"issue":"5","key":"2_CR3","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1109\/TSE.2003.1199075","volume":"29","author":"M Xie","year":"2003","unstructured":"Xie, M., Yang, B.: A study of the effect of imperfect debugging on software development cost. IEEE Trans. Softw. Eng. TSE 29(5), 471\u2013473 (2003)","journal-title":"IEEE Trans. Softw. Eng. TSE"},{"key":"2_CR4","doi-asserted-by":"publisher","unstructured":"Santelices, R., Jones, J.A., Yu, Y., Harrold, M.J.: Lightweight fault-localization using multiple coverage types. In: International Conference on Software Engineering, ICSE 2009, pp. 56\u201366. IEEE, Vancouver (2009). \n https:\/\/doi.org\/10.1109\/ICSE.2009.5070508","DOI":"10.1109\/ICSE.2009.5070508"},{"issue":"2","key":"2_CR5","first-page":"1","volume":"41","author":"HL Cao","year":"2014","unstructured":"Cao, H.L., Jiang, S.J., Ju, X.L.: Survey of software fault localization. Comput. Sci. 41(2), 1\u20136 (2014)","journal-title":"Comput. Sci."},{"key":"2_CR6","unstructured":"Liu, X.: Research on optimization of fault localization with range invariant. Harbin Institute of Technology (2016)"},{"issue":"2","key":"2_CR7","doi-asserted-by":"publisher","first-page":"99","DOI":"10.1109\/32.908957","volume":"27","author":"MD Ernst","year":"2000","unstructured":"Ernst, M.D., Notkin, D.: Dynamically discovering likely program invariants. IEEE Trans. Softw. Eng. 27(2), 99\u2013123 (2000)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"30","key":"2_CR8","first-page":"233","volume":"22","author":"SK Liu","year":"2006","unstructured":"Liu, S.K., Yang, X.H., Luo, J.Q., Liu, J.: Dynamically discovering likely program invariants based on the contract. Microcomput. Inf. 22(30), 233\u2013235 (2006)","journal-title":"Microcomput. Inf."},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Racunas, P., Constantinides, K., Manne, S., Mukherjee, S.S.: Perturbation-based fault screening. In: High Performance Computer Architecture, HPCA 2007, Scottsdale, AZ, USA, pp. 169\u2013180. IEEE Computer Society (2007). \n https:\/\/doi.org\/10.1109\/HPCA.2007.346195","DOI":"10.1109\/HPCA.2007.346195"},{"key":"2_CR10","doi-asserted-by":"publisher","unstructured":"Hangal, S., Lam, M.S.: Tracking down software bugs using automatic anomaly detection. In: International Conference on Software Engineering, ICSE 2002, Orlando, FL, USA, pp. 291\u2013301. IEEE (2002). \n https:\/\/doi.org\/10.1145\/581376.581377","DOI":"10.1145\/581376.581377"},{"key":"2_CR11","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-14819-4_5","volume-title":"Evaluation of Novel Approaches to Software Engineering","author":"R Abreu","year":"2010","unstructured":"Abreu, R., Gonz\u00e1lez, A., Zoeteweij, P., van Gemund, A.J.C.: Using fault screeners for software error detection. In: Maciaszek, L.A., Gonz\u00e1lez-P\u00e9rez, C., Jablonski, S. (eds.) ENASE 2008. CCIS, vol. 69, pp. 60\u201374. Springer, Heidelberg (2010). \n https:\/\/doi.org\/10.1007\/978-3-642-14819-4_5"},{"key":"2_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1007\/978-3-642-34691-0_16","volume-title":"Testing Software and Systems","author":"J Santos","year":"2012","unstructured":"Santos, J., Abreu, R.: Lightweight automatic error detection by monitoring collar variables. In: Nielsen, B., Weise, C. (eds.) ICTSS 2012. LNCS, vol. 7641, pp. 215\u2013230. Springer, Heidelberg (2012). \n https:\/\/doi.org\/10.1007\/978-3-642-34691-0_16"},{"issue":"2","key":"2_CR13","doi-asserted-by":"publisher","first-page":"425","DOI":"10.1109\/TR.2017.2681107","volume":"66","author":"R Wang","year":"2017","unstructured":"Wang, R., Ding, Z., Gui, N., Liu, Y.: Detecting bugs of concurrent programs with program invariants. IEEE Trans. Reliab. 66(2), 425\u2013439 (2017)","journal-title":"IEEE Trans. Reliab."},{"key":"2_CR14","doi-asserted-by":"publisher","unstructured":"Le, T.D.B., Lo, D., Goues, C.L., Grunske, L.: A learning-to-rank based fault localization approach using likely invariants. In: International Symposium on Software Testing and Analysis 2016, pp. 177\u2013188. ACM, New York (2016). \n https:\/\/doi.org\/10.1145\/2931037.2931049","DOI":"10.1145\/2931037.2931049"},{"key":"2_CR15","doi-asserted-by":"publisher","unstructured":"Rui, A., Zoeteweij, P., van Gemund, A.J.C.: Automatic software fault localization using generic program invariants. In: ACM Symposium on Applied Computing 2008, Fortaleza, Ceara, Brazil, pp. 712\u2013717. ACM (2008). \n https:\/\/doi.org\/10.1145\/1363686.1363855","DOI":"10.1145\/1363686.1363855"},{"key":"2_CR16","unstructured":"Pytlik, B., Renieris, M., Krishnamurthi, S., Reiss, S.P.: Automated fault localization using potential invariants. Computer Science, pp. 273\u2013276 (2003)"},{"issue":"1","key":"2_CR17","doi-asserted-by":"publisher","first-page":"139","DOI":"10.1145\/2499368.2451131","volume":"41","author":"SK Sahoo","year":"2013","unstructured":"Sahoo, S.K., Criswell, J., Geigle, C., Adve, V.: Using likely invariants for automated software fault localization. ACM SIGPLAN Not. 41(1), 139\u2013152 (2013)","journal-title":"ACM SIGPLAN Not."},{"issue":"1","key":"2_CR18","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2007.37","volume":"40","author":"T Menzies","year":"2007","unstructured":"Menzies, T., Owen, D., Richardson, J.: The strangest thing about software. Computer 40(1), 54\u201360 (2007)","journal-title":"Computer"},{"key":"2_CR19","doi-asserted-by":"publisher","unstructured":"Masri, W., Assi, R.A.: Cleansing test suites from coincidental correctness to enhance fault-localization. In: Third International Conference on Software Testing, Verification and Validation 2010, Paris, France, pp. 165\u2013174. IEEE (2010). \n https:\/\/doi.org\/10.1109\/ICST.2010.22","DOI":"10.1109\/ICST.2010.22"},{"issue":"8","key":"2_CR20","first-page":"1993","volume":"27","author":"FF Zong","year":"2016","unstructured":"Zong, F.F., Huang, H.Y., Ding, Z.H.: Software fault location based on double-times-locating strategy. J. Softw. 27(8), 1993\u20132007 (2016)","journal-title":"J. Softw."}],"container-title":["Lecture Notes in Computer Science","Software Analysis, Testing, and Evolution"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-04272-1_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,20]],"date-time":"2019-05-20T05:14:21Z","timestamp":1558329261000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-04272-1_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783030042714","9783030042721"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-04272-1_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"20 November 2018","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"SATE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Software Analysis, Testing, and Evolution","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Shenzheng","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"China","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23 November 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24 November 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"satev2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/xiongyingfei.github.io\/confs\/sate18\/index_en.html","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}