{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,24]],"date-time":"2025-03-24T08:21:32Z","timestamp":1742804492295,"version":"3.28.0"},"reference-count":39,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,10,1]],"date-time":"2019-10-01T00:00:00Z","timestamp":1569888000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,10]]},"DOI":"10.1109\/issre.2019.00019","type":"proceedings-article","created":{"date-parts":[[2020,2,11]],"date-time":"2020-02-11T02:50:16Z","timestamp":1581389416000},"page":"93-103","source":"Crossref","is-referenced-by-count":18,"title":["Spotting Problematic Code Lines using Nonintrusive Programmers' Biofeedback"],"prefix":"10.1109","author":[{"given":"Ricardo","family":"Couceiro","sequence":"first","affiliation":[]},{"given":"Paulo","family":"Carvalho","sequence":"additional","affiliation":[]},{"given":"Miguel","family":"Castelo Branco","sequence":"additional","affiliation":[]},{"given":"Henrique","family":"Madeira","sequence":"additional","affiliation":[]},{"given":"Raul","family":"Barbosa","sequence":"additional","affiliation":[]},{"given":"Joao","family":"Duraes","sequence":"additional","affiliation":[]},{"given":"Goncalo","family":"Duarte","sequence":"additional","affiliation":[]},{"given":"Joao","family":"Castelhano","sequence":"additional","affiliation":[]},{"given":"Catarina","family":"Duarte","sequence":"additional","affiliation":[]},{"given":"Cesar","family":"Teixeira","sequence":"additional","affiliation":[]},{"given":"Nuno","family":"Laranjeiro","sequence":"additional","affiliation":[]},{"given":"Julio","family":"Medeiros","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"Emulating representative software vulnerabilities using field data in Computing","year":"2018","author":"barbosa","key":"ref39"},{"journal-title":"Compilers Principles Techniques and Tools","year":"2006","author":"aho","key":"ref38"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1007\/s10439-009-9757-3"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.5194\/npg-13-151-2006"},{"key":"ref31","article-title":"Eye tracking analysis of computer program comprehension in programmers with dyslexia","author":"mcchesney","year":"2018","journal-title":"Empirical Software Engineering"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2632320.2632344"},{"key":"ref37","article-title":"Maximum Entropy Spectral Analysis","author":"burg","year":"1967","journal-title":"Proc of the 37th meeting of the society of exploration geophysicists"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1155\/2012\/578785"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/968363.968381"},{"key":"ref34","first-page":"117","article-title":"Reconstruction of pupil dilation signal during eye blinking events","author":"onorati","year":"2012","journal-title":"Proceeding of the 7th International Workshop on Biosignal Interpretation"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.124"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2016.41"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591098"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.24"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568252"},{"key":"ref15","article-title":"A Look into Programmers' Heads","author":"peitek","year":"2018","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref16","article-title":"The Role of the Insula in Intuitive Expert Bug Detection in Computer Code: An fMRI Study","author":"castelhano","year":"2018","journal-title":"Brain Imaging and Behavior"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884803"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1126\/science.143.3611.1190"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1037\/0033-2909.91.2.276"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2015.53"},{"key":"ref4","article-title":"A Taxonomy System to Identify Human Error Causes for Software Defects","author":"fuqun huang","year":"2012","journal-title":"18th ISSAT Int Conf on Reliability and Quality in Design"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/3145904"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9781139062367"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2019.00018"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1987856.1987872"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.5772\/intechopen.68392"},{"key":"ref8","article-title":"Generation of an Error Set that Emulates SW Faults","author":"christmansson","year":"0","journal-title":"Proc 26th Symposium on Fault-Tolerant Computing FTCS-26"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00069"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.07.006"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.113"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/2961111.2962641"},{"key":"ref20","article-title":"The pupillary system","volume":"2","author":"beatty","year":"2000","journal-title":"Handbook of Psychophysiology"},{"key":"ref22","first-page":"130","article-title":"The coupling of emotion and cognition in the eye: Introducing the pupil old\/new effect","volume":"45","author":"v\u00f5","year":"2008","journal-title":"Psychophysiology"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/wcs.1323"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/968363.968381"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/S0042-6989(98)00081-9"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.ijpsycho.2015.04.019"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/IEMBS.1998.746146"}],"event":{"name":"2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE)","start":{"date-parts":[[2019,10,28]]},"location":"Berlin, Germany","end":{"date-parts":[[2019,10,31]]}},"container-title":["2019 IEEE 30th International Symposium on Software Reliability Engineering (ISSRE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8967509\/8987436\/08987556.pdf?arnumber=8987556","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,18]],"date-time":"2022-07-18T14:48:08Z","timestamp":1658155688000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8987556\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,10]]},"references-count":39,"URL":"https:\/\/doi.org\/10.1109\/issre.2019.00019","relation":{},"subject":[],"published":{"date-parts":[[2019,10]]}}}