{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,8,12]],"date-time":"2024-08-12T14:31:25Z","timestamp":1723473085435},"reference-count":80,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"11","license":[{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,11,1]],"date-time":"2023-11-01T00:00:00Z","timestamp":1698796800000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100004063","name":"Knut och Alice Wallenbergs Stiftelse","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100004063","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Swedish Foundation for Strategic Research"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2023,11]]},"DOI":"10.1109\/tse.2023.3324258","type":"journal-article","created":{"date-parts":[[2023,10,13]],"date-time":"2023-10-13T17:57:21Z","timestamp":1697219841000},"page":"4988-5007","source":"Crossref","is-referenced-by-count":2,"title":["Augmenting Diffs With Runtime Information"],"prefix":"10.1109","volume":"49","author":[{"ORCID":"http:\/\/orcid.org\/0000-0003-2183-9633","authenticated-orcid":false,"given":"Khashayar","family":"Etemadi","sequence":"first","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2263-7902","authenticated-orcid":false,"given":"Aman","family":"Sharma","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-2048-7648","authenticated-orcid":false,"given":"Fernanda","family":"Madeiral","sequence":"additional","affiliation":[{"name":"Vrije Universiteit Amsterdam, Amsterdam, HV, The Netherlands"}]},{"ORCID":"http:\/\/orcid.org\/0000-0003-3505-3383","authenticated-orcid":false,"given":"Martin","family":"Monperrus","sequence":"additional","affiliation":[{"name":"KTH Royal Institute of Technology, Stockholm, Sweden"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1145\/3183519.3183525","article-title":"Modern code review: A case study at google","volume-title":"Proc. 40th Int. Conf. Softw. Eng., Softw. Eng. Pract.","author":"Sadowski","year":"2018"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2017.8115626"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00026"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238190"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606588"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP52600.2021.00040"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2020.3038681"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568250"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-11933-5_13"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/3524610.3527877"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/605466.605468"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2017.12"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287638"},{"key":"ref15","article-title":"Understanding differences among executions with variational traces","author":"Meinicke","year":"2018"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1273444.1254769"},{"key":"ref17","article-title":"Deep learning for bug localization and program repair","author":"Gupta","year":"2020"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491448"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2004.1357787"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2018.00023"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2018.00031"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.4304\/jsw.8.3.603-616"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606695"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/BF01840446"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359650"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-020-09920-w"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2019.00068"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2714064.2660209"},{"issue":"9","key":"ref29","doi-asserted-by":"crossref","first-page":"1155","DOI":"10.1002\/spe.2346","article-title":"Spoon: A library for implementing analyses and transformations of Java source code","volume":"46","author":"Pawlak","year":"Sep. 2015","journal-title":"Softw., Pract. Experience"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09692-y"},{"key":"ref31","article-title":"Debugging backwards in time","author":"Lewis","year":"2003"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2597008.2597803"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2021.102630"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/3468737.3494086"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1002\/spe.3146"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/3464971.3468420"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/3464971.3468416"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-03596-9_58"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2017.14"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/TC.1972.5009015"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/VISSOFT52517.2021.00010"},{"key":"ref42","first-page":"72","article-title":"Log-based behavioural differencing applied to an industrial case","author":"Deknop","year":"2021","journal-title":"Proc. 1st Early Career Researchers Workshop Collocated ECCS"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2017.36"},{"key":"ref44","article-title":"Scalable comparison of JavaScript V8 bytecode traces","author":"Cabrera-Arteaga","year":"2019","journal-title":"Proc. SPLASH Workshop Virtual Mach. Lang. Implementations"},{"key":"ref45","article-title":"Reducing code navigation effort with differential code coverage","author":"Sherwood","year":"2008"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-019-09794-7"},{"key":"ref47","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1145\/3377811.3380377","article-title":"Causal testing: Understanding defects\u2019 root causes","volume-title":"Proc. ACM\/IEEE 42nd Int. Conf. Softw. Eng.","author":"Johnson","year":"2020"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2012.14"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/11688839_7"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2949568"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.46"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-10070-w"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/MSR52588.2021.00038"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/CVPR.2005.202"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2005.1553577"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/318774.318946"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351681"},{"key":"ref59","article-title":"Observation-based slicing","author":"Binkley","year":"2013"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606573"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134307"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199702)27:2<185::AID-SPE79>3.0.CO;2-D"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1007\/BF00132573"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1851476.1851491"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2013.86"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1002\/spe.932"},{"key":"ref67","article-title":"DUCT: An interactive define-use chain navigation tool for relative debugging","author":"Searle","year":"2003"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.42"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/VISSOFT51673.2020.00008"},{"key":"ref70","article-title":"Supporting software integration activities with first-class code changes","author":"Dias","year":"2015"},{"key":"ref71","article-title":"Diff text documents online with mergely, an editor and html5 JavaScript library","year":"2022"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642982"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70731"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2226"},{"key":"ref75","article-title":"Abagames\/literate-diff-viewer: Show source code description with literate diff way","year":"2022"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1016\/j.jvlc.2018.10.001"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1109\/SANER.2017.7884626"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338926"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00102"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1145\/1529282.1529378"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/10320136\/10285584.pdf?arnumber=10285584","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,2]],"date-time":"2024-03-02T09:36:17Z","timestamp":1709372177000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10285584\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,11]]},"references-count":80,"journal-issue":{"issue":"11"},"URL":"https:\/\/doi.org\/10.1109\/tse.2023.3324258","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"value":"0098-5589","type":"print"},{"value":"1939-3520","type":"electronic"},{"value":"2326-3881","type":"electronic"}],"subject":[],"published":{"date-parts":[[2023,11]]}}}