{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T13:23:14Z","timestamp":1726060994724},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,8,30]],"date-time":"2015-08-30T00:00:00Z","timestamp":1440892800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"DARPA","award":["FA8650-11-C-7192"]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,8,30]]},"DOI":"10.1145\/2786805.2786811","type":"proceedings-article","created":{"date-parts":[[2015,8,26]],"date-time":"2015-08-26T16:48:13Z","timestamp":1440607693000},"update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":228,"title":["Staged program repair with condition synthesis"],"prefix":"10.1145","author":[{"given":"Fan","family":"Long","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]},{"given":"Martin","family":"Rinard","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]}],"member":"320","published-online":{"date-parts":[[2015,8,30]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"clang: a C language family frontend for LLVM. http:\/\/clang.llvm.org\/. clang: a C language family frontend for LLVM. http:\/\/clang.llvm.org\/."},{"key":"e_1_3_2_1_2_1","unstructured":"GenProg | Evolutionary Program Repair - Univeristy of Virginia. http:\/\/dijkstra.cs.virginia.edu\/genprog\/. GenProg | Evolutionary Program Repair - Univeristy of Virginia. http:\/\/dijkstra.cs.virginia.edu\/genprog\/."},{"key":"e_1_3_2_1_3_1","unstructured":"PHP\n : DatePeriod:: construct - Manual. http: \/\/php.net\/manual\/en\/dateperiod.construct.php. PHP: DatePeriod:: construct - Manual. http: \/\/php.net\/manual\/en\/dateperiod.construct.php."},{"key":"e_1_3_2_1_4_1","first-page":"224","volume-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, OSDI\u201908","author":"Cadar C.","year":"2008","unstructured":"C. Cadar , D. Dunbar , and D. Engler . Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs . In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, OSDI\u201908 , pages 209\u2013 224 , Berkeley, CA, USA , 2008 . USENIX Association. C. Cadar, D. Dunbar, and D. Engler. Klee: Unassisted and automatic generation of high-coverage tests for complex systems programs. In Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, OSDI\u201908, pages 209\u2013224, Berkeley, CA, USA, 2008. USENIX Association."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985811"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.66"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593735.2593740"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146266"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/949305.949314"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2006.122"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2008.59"},{"key":"e_1_3_2_1_12_1","volume-title":"Automatic repair of real bugs: An experience report on the defects4j dataset. CoRR, abs\/1505.07002","author":"Durieux T.","year":"2015","unstructured":"T. Durieux , M. Martinez , M. Monperrus , R. Sommerard , and J. Xuan . Automatic repair of real bugs: An experience report on the defects4j dataset. CoRR, abs\/1505.07002 , 2015 . T. Durieux, M. Martinez, M. Monperrus, R. Sommerard, and J. Xuan. Automatic repair of real bugs: An experience report on the defects4j dataset. CoRR, abs\/1505.07002, 2015."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254099"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568303"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993550"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568258"},{"key":"e_1_3_2_1_17_1","first-page":"811","volume-title":"Proceedings of the 2013 International Conference on Software Engineering, ICSE \u201913\u2019","author":"Kim D.","unstructured":"D. Kim , J. Nam , J. Song , and S. Kim . Automatic patch generation learned from human-written patches . In Proceedings of the 2013 International Conference on Software Engineering, ICSE \u201913\u2019 , pages 802\u2013 811 . IEEE Press, 2013. D. Kim, J. Nam, J. Song, and S. Kim. Automatic patch generation learned from human-written patches. In Proceedings of the 2013 International Conference on Software Engineering, ICSE \u201913\u2019, pages 802\u2013811. IEEE Press, 2013."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384648"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-21668-3_13"},{"key":"e_1_3_2_1_20_1","first-page":"13","volume-title":"Proceedings of the 2012 International Conference on Software Engineering, ICSE 2012","author":"Le Goues C.","unstructured":"C. Le Goues , M. Dewey-Vogt , S. Forrest , and W. Weimer . A systematic study of automated program repair: Fixing 55 out of 105 bugs for $8 each . In Proceedings of the 2012 International Conference on Software Engineering, ICSE 2012 , pages 3\u2013 13 . IEEE Press, 2012. C. Le Goues, M. Dewey-Vogt, S. Forrest, and W. Weimer. A systematic study of automated program repair: Fixing 55 out of 105 bugs for $8 each. In Proceedings of the 2012 International Conference on Software Engineering, ICSE 2012, pages 3\u201313. IEEE Press, 2012."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594337"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9282-8"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568324"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486890"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/1296907.1296912"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568257"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2014.2312918"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568254"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771791"},{"key":"e_1_3_2_1_33_1","first-page":"316","volume-title":"OSDI","author":"Rinard M.","year":"2004","unstructured":"M. Rinard , C. Cadar , D. Dumitran , D. M. Roy , T. Leu , and W. S. Beebee . Enhancing server availability and security through failure-oblivious computing . In OSDI , pages 303\u2013 316 , 2004 . M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, T. Leu, and W. S. Beebee. Enhancing server availability and security through failure-oblivious computing. In OSDI, pages 303\u2013316, 2004."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737988"},{"key":"e_1_3_2_1_35_1","first-page":"2003","volume-title":"Proceedings of the 12th International Conference on Parallel Architectures and Compilation Techniques, PACT \u201903\u2019","author":"Wang N.","unstructured":"N. Wang , M. Fertig , and S. Patel . Y-branches: When you come to a fork in the road, take it . In Proceedings of the 12th International Conference on Parallel Architectures and Compilation Techniques, PACT \u201903\u2019 , pages 56\u2013, Washington, DC, USA, 2003 . IEEE Computer Society. N. Wang, M. Fertig, and S. Patel. Y-branches: When you come to a fork in the road, take it. In Proceedings of the 12th International Conference on Parallel Architectures and Compilation Techniques, PACT \u201903\u2019, pages 56\u2013, Washington, DC, USA, 2003. IEEE Computer Society."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831716"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693094"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070536"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"}],"event":{"name":"ESEC\/FSE'15: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Bergamo Italy","acronym":"ESEC\/FSE'15","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2786805.2786811","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T03:09:50Z","timestamp":1673492990000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2786805.2786811"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,8,30]]},"references-count":37,"alternative-id":["10.1145\/2786805.2786811","10.1145\/2786805"],"URL":"https:\/\/doi.org\/10.1145\/2786805.2786811","relation":{},"subject":[],"published":{"date-parts":[[2015,8,30]]},"assertion":[{"value":"2015-08-30","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}