{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T03:48:03Z","timestamp":1729655283561,"version":"3.28.0"},"reference-count":38,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/icse.2012.6227211","type":"proceedings-article","created":{"date-parts":[[2012,7,9]],"date-time":"2012-07-09T21:24:04Z","timestamp":1341869044000},"page":"3-13","source":"Crossref","is-referenced-by-count":261,"title":["A systematic study of automated program repair: Fixing 55 out of 105 bugs for $8 each"],"prefix":"10.1109","author":[{"given":"Claire","family":"Le Goues","sequence":"first","affiliation":[]},{"given":"Michael","family":"Dewey-Vogt","sequence":"additional","affiliation":[]},{"given":"Stephanie","family":"Forrest","sequence":"additional","affiliation":[]},{"given":"Westley","family":"Weimer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","first-page":"121","article-title":"Fair and balanced? Bias in bugfix datasets","author":"bird","year":"2009","journal-title":"Foundations of Software Engineering"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/1569901.1570042"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1162\/evco.1996.4.2.113"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.66"},{"key":"18","first-page":"2","article-title":"Uniform crossover in genetic algorithms","author":"syswerda","year":"1989","journal-title":"International Conference on Genetic Algorithms"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595766"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/2001576.2001768"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2008.4630793"},{"journal-title":"Genetic Programming On the Programming of Computers by Means of Natural Selection","year":"1992","author":"koza","key":"16"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1830483.1830654"},{"key":"14","article-title":"Gen-Prog: A generic method for automated software repair","volume":"38","author":"le goues","year":"0","journal-title":"Transactions on Software Engineering"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2010.2083669"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070536"},{"key":"38","doi-asserted-by":"publisher","DOI":"10.1109\/FOSE.2007.29"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1569901.1570031"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48166-4_16"},{"key":"20","first-page":"1","article-title":"DiffX: An algorithm to detect changes in multi-version XML documents","author":"al-ekram","year":"2005","journal-title":"Conference of the Centre for Advanced Studies on Collaborative research"},{"key":"22","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375599"},{"journal-title":"Workshop on Mining Software Repositories May 2007","article-title":"How long will it take to fix this bug?","year":"0","author":"wei\ufffd","key":"23"},{"journal-title":"Rational Software Developer Conference Jun 2008","article-title":"IBM Rational software analyzer: Beyond source code","year":"0","author":"williamson","key":"24"},{"key":"25","doi-asserted-by":"publisher","DOI":"10.1145\/1173706.1173734"},{"key":"26","first-page":"33","article-title":"On parameter tuning in search based software engineering","author":"arcuri","year":"0","journal-title":"International Symposium on Search Based Software Engineering 2011"},{"journal-title":"European Conference on Object Oriented Programming 2011","article-title":"Detecting and escaping infinite loops with jolt","year":"0","author":"carbin","key":"27"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146266"},{"journal-title":"Network and Distributed System Security Symposium 2005","article-title":"Dira: Automatic detection, identification and repair of control-hijacking attacks","year":"0","author":"smirnov","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101949"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134336"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993544"},{"journal-title":"Modernizing Legacy Systems Software Technologies Engineering Process and Business Practices","year":"2003","author":"seacord","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/MSP.2005.144"},{"key":"7","first-page":"67","article-title":"Dynamic test generation to find integer bugs in x86 binary linux programs","author":"molnar","year":"0","journal-title":"USENIX Security Symposium 2009"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065014"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1109\/ICPC.2009.5090029"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025121"},{"key":"31","doi-asserted-by":"crossref","first-page":"267","DOI":"10.1007\/978-3-540-24721-0_20","article-title":"Automated debugging using path-based weakest preconditions","author":"he","year":"2004","journal-title":"Fundamental Approaches to Software Engineering"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025137"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831716"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"}],"event":{"name":"2012 34th International Conference on Software Engineering (ICSE 2012)","start":{"date-parts":[[2012,6,2]]},"location":"Zurich","end":{"date-parts":[[2012,6,9]]}},"container-title":["2012 34th International Conference on Software Engineering (ICSE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6218989\/6227015\/06227211.pdf?arnumber=6227211","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T21:08:03Z","timestamp":1497992883000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6227211\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":38,"URL":"http:\/\/dx.doi.org\/10.1109\/icse.2012.6227211","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}