{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,8,22]],"date-time":"2023-08-22T15:54:34Z","timestamp":1692719674351},"reference-count":62,"publisher":"Elsevier","license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1016\/bs.adcom.2015.05.001","type":"book-chapter","created":{"date-parts":[[2015,6,12]],"date-time":"2015-06-12T07:06:49Z","timestamp":1434092809000},"page":"103-156","source":"Crossref","is-referenced-by-count":8,"title":["Automated Fault Localization"],"prefix":"10.1016","author":[{"given":"Wes","family":"Masri","sequence":"first","affiliation":[]}],"member":"78","reference":[{"issue":"1","key":"10.1016\/bs.adcom.2015.05.001_bb0005","doi-asserted-by":"crossref","first-page":"54","DOI":"10.1109\/TSE.2011.104","article-title":"GenProg: a generic method for automated software repair","volume":"38","author":"Le Goues","year":"2012","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/bs.adcom.2015.05.001_bb0010","first-page":"173","article-title":"Specification-based program repair using SAT","author":"Gopinath","year":"2011"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0015","first-page":"61","article-title":"Automated fixing of programs with contracts","author":"Wei","year":"2010"},{"issue":"2","key":"10.1016\/bs.adcom.2015.05.001_bb0020","doi-asserted-by":"crossref","DOI":"10.1145\/1571629.1571631","article-title":"Measuring the strength of information flows in programs","volume":"19","author":"Masri","year":"2009","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"10.1016\/bs.adcom.2015.05.001_bb0025","first-page":"73","article-title":"An empirical study of the relationship between information flow and program dependence","author":"Masri","year":"2006"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0030","article-title":"Identifying failure-correlated dependence chains","author":"Abou-Assi","year":"2011"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0035","doi-asserted-by":"crossref","first-page":"395","DOI":"10.1016\/j.infsof.2008.05.008","article-title":"Algorithms and tool support for dynamic information flow analysis","volume":"51","author":"Masri","year":"2009","journal-title":"Inf. Softw. Technol."},{"key":"10.1016\/bs.adcom.2015.05.001_bb0040","first-page":"23","article-title":"Memorized forward computational program slices","author":"Masri","year":"2006"},{"issue":"1","key":"10.1016\/bs.adcom.2015.05.001_bb0045","doi-asserted-by":"crossref","DOI":"10.1145\/2133382.2133383","article-title":"Leveraging strength-based dynamic information flow analysis to enhance data value prediction","volume":"9","author":"Ghandour","year":"2012","journal-title":"ACM Trans. Archit. Code Optim."},{"key":"10.1016\/bs.adcom.2015.05.001_bb0050","first-page":"46","article-title":"Efficient path profiling","author":"Ball","year":"1996"},{"issue":"7","key":"10.1016\/bs.adcom.2015.05.001_bb0055","doi-asserted-by":"crossref","first-page":"454","DOI":"10.1109\/TSE.2007.1020","article-title":"An empirical study of test case filtering techniques based on exercising information flows","volume":"33","author":"Masri","year":"2007","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/bs.adcom.2015.05.001_bb0060","first-page":"141","article-title":"Bug isolation via remote program sampling","author":"Liblit","year":"2003"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0065","first-page":"15","article-title":"Scalable statistical bug isolation","author":"Liblit","year":"2005"},{"issue":"10","key":"10.1016\/bs.adcom.2015.05.001_bb0070","doi-asserted-by":"crossref","first-page":"831","DOI":"10.1109\/TSE.2006.105","article-title":"Statistical debugging: a hypothesis testing-based approach","volume":"32","author":"Liu","year":"2006","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"10.1016\/bs.adcom.2015.05.001_bb0075","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1002\/stvr.1563","article-title":"Reducing execution profiles: techniques and benefits","volume":"25","author":"Farjo","year":"2014","journal-title":"J. Softw. Test. Verif. Rel."},{"key":"10.1016\/bs.adcom.2015.05.001_bb0080","doi-asserted-by":"crossref","DOI":"10.1145\/1555860.1555862","article-title":"An empirical study of the factors that reduce the effectiveness of coverage-based fault localization","author":"Masri","year":"2009"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0085","first-page":"199","article-title":"Are automated debugging techniques actually helping programmers?","author":"Parnin","year":"2011"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0090","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1214\/09-SS057","article-title":"Causal inference in statistics: an overview","volume":"3","author":"Pearl","year":"2009","journal-title":"Stat. Surv."},{"key":"10.1016\/bs.adcom.2015.05.001_bb0095","series-title":"Causality: Models, Reasoning, and Inference","author":"Pearl","year":"2000"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0100","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1214\/ss\/1177012031","article-title":"On the application of probability theory to agricultural experiments. Essay on principles","volume":"5","author":"Neyman","year":"1923","journal-title":"Stat. Sci."},{"key":"10.1016\/bs.adcom.2015.05.001_bb0105","doi-asserted-by":"crossref","first-page":"688","DOI":"10.1037\/h0037350","article-title":"Estimating causal effects of treatments in randomized and nonrandomized studies","volume":"66","author":"Rubin","year":"1974","journal-title":"J. Educ. Psychol."},{"key":"10.1016\/bs.adcom.2015.05.001_bb0110","first-page":"97","article-title":"From symptom to cause: localizing errors in counterexample traces","author":"Ball","year":"2003"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0115","series-title":"A Survey of Software Fault Localization","author":"Wong","year":"2009"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0120","first-page":"467","article-title":"Visualization of test information to assist fault localization","author":"Jones","year":"2001"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0125","first-page":"16","article-title":"Debugging in parallel","author":"Jones","year":"2007"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0130","first-page":"396","article-title":"Data mining and crosschecking of execution traces","author":"Denmat","year":"2005"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0135","first-page":"73","article-title":"Causal inference for statistical fault localization","author":"Baah","year":"2010"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0140","first-page":"39","article-title":"An evaluation of similarity coefficients for software fault localization","author":"Abreu","year":"2006"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0145","first-page":"30","article-title":"Fault localization with nearest-neighbor queries","author":"Renieris","year":"2003"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0150","first-page":"342","article-title":"Locating causes of program failures","author":"Cleve","year":"2005"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0155","doi-asserted-by":"crossref","first-page":"188","DOI":"10.1016\/j.jss.2009.09.037","article-title":"A family of code coverage-based heuristics for effective fault localization","volume":"83","author":"Wong","year":"2010","journal-title":"J. Syst. Softw."},{"key":"10.1016\/bs.adcom.2015.05.001_bb0160","doi-asserted-by":"crossref","DOI":"10.1109\/ICSTW.2014.37","article-title":"State profiling of internal variables","author":"Masri","year":"2014"},{"issue":"8","key":"10.1016\/bs.adcom.2015.05.001_bb0165","doi-asserted-by":"crossref","first-page":"717","DOI":"10.1109\/32.153381","article-title":"PIE: a dynamic failure-based technique","volume":"18","author":"Voas","year":"1992","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"10.1016\/bs.adcom.2015.05.001_bb0170","doi-asserted-by":"crossref","first-page":"8","DOI":"10.1145\/2559932","article-title":"Prevalence of coincidental correctness and mitigation of its impact on fault-localization","volume":"23","author":"Masri","year":"2014","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"10.1016\/bs.adcom.2015.05.001_bb0175","first-page":"146","article-title":"Mitigating the confounding effects of program dependences for effective fault localization","author":"Baah","year":"2011"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0180","first-page":"124","article-title":"MFL: method-level fault localization with causal inference","author":"Shu","year":"2013"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0185","doi-asserted-by":"crossref","DOI":"10.1109\/ICST.2015.7102597","article-title":"NUMFL: localizing faults in numerical software using a value-based causal model","author":"Bai","year":"2015"},{"issue":"2","key":"10.1016\/bs.adcom.2015.05.001_bb0190","doi-asserted-by":"crossref","first-page":"121","DOI":"10.1002\/stvr.409","article-title":"Fault localization based on information flow coverage","volume":"20","author":"Masri","year":"2010","journal-title":"J. Softw. Test. Verif. Rel."},{"key":"10.1016\/bs.adcom.2015.05.001_bb0195","doi-asserted-by":"crossref","DOI":"10.1109\/ICST.2010.22","article-title":"Cleansing test suites from coincidental correctness to enhance fault-localization","author":"Masri","year":"2010"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0200","article-title":"Isolating failure causes through test case generation","author":"R\u00f6\u00dfler","year":"2012"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0205","first-page":"31","article-title":"Evolutionary generation of whole test suites","author":"Fraser","year":"2011"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0210","first-page":"52","article-title":"Test case purification for improving fault localization","author":"Xuan","year":"2014"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0215","first-page":"474","article-title":"BugRedux: reproducing field failures for in-house debugging","author":"Jin","year":"2012"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0220","first-page":"213","article-title":"F3: fault localization for field failures","author":"Jin","year":"2013"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0225","first-page":"64","article-title":"An observation-based model for fault localization","author":"Abreu","year":"2008"},{"issue":"3","key":"10.1016\/bs.adcom.2015.05.001_bb0230","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1145\/2491509.2491513","article-title":"Fault localization prioritization: comparing information-theoretic and coverage-based approaches","volume":"22","author":"Yoo","year":"2013","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"10.1016\/bs.adcom.2015.05.001_bb0235","first-page":"439","article-title":"Program slicing","author":"Weiser","year":"1981"},{"issue":"3","key":"10.1016\/bs.adcom.2015.05.001_bb0240","first-page":"121","article-title":"A survey of program slicing techniques","volume":"3","author":"Tip","year":"1995","journal-title":"J. Program. Lang."},{"issue":"6","key":"10.1016\/bs.adcom.2015.05.001_bb0245","doi-asserted-by":"crossref","first-page":"246","DOI":"10.1145\/93548.93576","article-title":"Dynamic program slicing","volume":"25","author":"Agrawal","year":"1990","journal-title":"ACM SIGPLAN Not."},{"key":"10.1016\/bs.adcom.2015.05.001_bb0250","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1007\/s10664-008-9071-y","article-title":"Exploiting the empirical characteristics of program dependences for improved forward computation of dynamic slice","volume":"13","author":"Masri","year":"2008","journal-title":"Empir. Softw. Eng."},{"key":"10.1016\/bs.adcom.2015.05.001_bb0255","first-page":"143","article-title":"Fault localization using execution slices and dataflow sets","author":"Agrawal","year":"1995"},{"issue":"2","key":"10.1016\/bs.adcom.2015.05.001_bb0260","doi-asserted-by":"crossref","DOI":"10.1145\/1217295.1217297","article-title":"An empirical study of static program slice size","volume":"16","author":"Binkley","year":"2007","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"10.1016\/bs.adcom.2015.05.001_bb0265","unstructured":"Wisconsin Program-Slicing Tool 1.1 Reference Manual, Wisconsin Alumni Research Foundation. http:\/\/www.cs.wisc.edu\/wpis\/slicing_tool\/slicing-manual.ps, November 2000."},{"issue":"1","key":"10.1016\/bs.adcom.2015.05.001_bb0270","doi-asserted-by":"crossref","first-page":"7","DOI":"10.1109\/TSE.2009.66","article-title":"Better debugging via output tracing and callstack-sensitive slicing","volume":"36","author":"Horwitz","year":"2010","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"8","key":"10.1016\/bs.adcom.2015.05.001_bb0275","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1109\/32.624306","article-title":"Semantics guided regression test cost reduction","volume":"23","author":"Binkley","year":"1997","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"10.1016\/bs.adcom.2015.05.001_bb0280","doi-asserted-by":"crossref","first-page":"26","DOI":"10.1145\/77606.77608","article-title":"David Binkley: interprocedural slicing using dependence graphs","volume":"12","author":"Horwitz","year":"1990","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"10.1016\/bs.adcom.2015.05.001_bb0285","doi-asserted-by":"crossref","DOI":"10.1109\/ICSE.2013.6606695","article-title":"Quantitative program slicing: separating statements by relevance","author":"Santelices","year":"2013"},{"issue":"2","key":"10.1016\/bs.adcom.2015.05.001_bb0290","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1109\/32.988498","article-title":"Simplifying and isolating failure-inducing input","volume":"28","author":"Zeller","year":"2002","journal-title":"IEEE Trans. Softw. Eng."},{"key":"10.1016\/bs.adcom.2015.05.001_bb0295","first-page":"1","article-title":"Isolating cause-effect chains from computer programs","author":"Zeller","year":"2002"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0300","first-page":"191","article-title":"Visualizing memory graphs","author":"Zimmermann","year":"2001"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0305","doi-asserted-by":"crossref","DOI":"10.1145\/2001420.2001447","article-title":"Minimizing reproduction of software failures","author":"Burger","year":"2011"},{"key":"10.1016\/bs.adcom.2015.05.001_bb0310","first-page":"437","article-title":"Cause clue clauses: error localization using maximum satisfiability","author":"Jose","year":"2011"}],"container-title":["Advances in Computers"],"original-title":[],"link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0065245815000339?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S0065245815000339?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,8,26]],"date-time":"2019-08-26T16:12:37Z","timestamp":1566835957000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S0065245815000339"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"references-count":62,"URL":"https:\/\/doi.org\/10.1016\/bs.adcom.2015.05.001","relation":{},"ISSN":["0065-2458"],"issn-type":[{"value":"0065-2458","type":"print"}],"subject":[],"published":{"date-parts":[[2015]]}}}