{ "response" : { "header" : { "query" : { "$" : "(oaftype exact result) and (resulttypeid exact publication) and (resultauthor exact \"monperrus\")" }, "locale" : { "$" : "en_US" }, "size" : { "$" : 10 }, "page" : { "$" : 1 }, "total" : { "$" : 433 }, "fields" : null }, "results" : { "result" : [ { "header" : { "dri:objIdentifier" : { "$" : "doi_dedup___::6a429d55b4f276915ded5dfabf59d183" }, "dri:dateOfCollection" : { "$" : "2025-12-20T13:50:33.621665567" }, "dri:dateOfTransformation" : null }, "metadata" : { "oaf:entity" : { "@xsi:schemaLocation" : "http://namespace.openaire.eu/oaf https://www.openaire.eu/schema/1.0/oaf-1.0.xsd", "oaf:result" : { "collectedfrom" : [ { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" } ], "originalId" : [ { "$" : "50|datacite____::6a429d55b4f276915ded5dfabf59d183" }, { "$" : "10.48550/arxiv.1502.00821" }, { "$" : "oai:arXiv.org:1502.00821" }, { "$" : "50|od________18::b778390608b1380543a25a8bfb5d8380" } ], "pid" : [ { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.48550/arxiv.1502.00821" }, { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : 1502.00821 } ], "measure" : [ { "@id" : "influence", "@score" : "2.5152056E-9", "@class" : "C5" }, { "@id" : "popularity", "@score" : "7.353146E-10", "@class" : "C5" }, { "@id" : "influence_alt", "@score" : "0", "@class" : "C5" }, { "@id" : "popularity_alt", "@score" : "0.0", "@class" : "C5" }, { "@id" : "impulse", "@score" : "0", "@class" : "C5" } ], "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "Software that Learns from its Own Failures" }, "bestaccessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "creator" : { "@rank" : "1", "@name" : "Martin", "@surname" : "Monperrus", "$" : "Monperrus, Martin" }, "dateofacceptance" : { "$" : "2015-01-01" }, "description" : { "$" : "All non-trivial software systems suffer from unanticipated production failures. However, those systems are passive with respect to failures and do not take advantage of them in order to improve their future behavior: they simply wait for them to happen and trigger hard-coded failure recovery strategies. Instead, I propose a new paradigm in which software systems learn from their own failures. By using an advanced monitoring system they have a constant awareness of their own state and health. They are designed in order to automatically explore alternative recovery strategies inferred from past successful and failed executions. Their recovery capabilities are assessed by self-injection of controlled failures; this process produces knowledge in prevision of future unanticipated failures." }, "embargoenddate" : { "$" : "2015-01-01" }, "subject" : [ { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "$" : "Software Engineering (cs.SE)" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "$" : "FOS: Computer and information sciences" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "Computer Science - Software Engineering" }, { "@classid" : "FOS", "@classname" : "Fields of Science and Technology classification", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : true, "@inferenceprovenance" : "update", "@provenanceaction" : "subject:fos", "$" : "0202 electrical engineering, electronic engineering, information engineering" }, { "@classid" : "FOS", "@classname" : "Fields of Science and Technology classification", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : true, "@inferenceprovenance" : "update", "@provenanceaction" : "subject:fos", "$" : "02 engineering and technology" } ], "language" : { "@classid" : "und", "@classname" : "Undetermined", "@schemeid" : "dnet:languages", "@schemename" : "dnet:languages" }, "relevantdate" : [ { "@classid" : "submitted", "@classname" : "submitted", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2015-02-03" }, { "@classid" : "updated", "@classname" : "updated", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2015-02-04" }, { "@classid" : "available", "@classname" : "available", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2015-01-01" }, { "@classid" : "issued", "@classname" : "issued", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2015-01-01" } ], "publisher" : { "$" : "arXiv" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "resourcetype" : { "@classid" : "UNKNOWN", "@classname" : "UNKNOWN", "@schemeid" : "dnet:dataCite_resource", "@schemename" : "dnet:dataCite_resource" }, "isgreen" : { "$" : true }, "isindiamondjournal" : { "$" : false }, "publiclyfunded" : { "$" : false }, "datainfo" : { "inferred" : { "$" : true }, "deletedbyinference" : { "$" : false }, "trust" : { "$" : "0.8" }, "inferenceprovenance" : { "$" : "dedup-result-decisiontree-v4" }, "provenanceaction" : { "@classid" : "sysimport:dedup", "@classname" : "Inferred by OpenAIRE", "@schemeid" : "dnet:provenanceActions", "@schemename" : "dnet:provenanceActions" } }, "rels" : null, "children" : { "result" : [ { "@objidentifier" : "arXiv_______::c90e23fd416f76289402f14de0aedf7a", "description" : { "$" : "All non-trivial software systems suffer from unanticipated production failures. However, those systems are passive with respect to failures and do not take advantage of them in order to improve their future behavior: they simply wait for them to happen and trigger hard-coded failure recovery strategies. Instead, I propose a new paradigm in which software systems learn from their own failures. By using an advanced monitoring system they have a constant awareness of their own state and health. The" }, "pid" : { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : 1502.00821 }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "Software that Learns from its Own Failures" }, "collectedfrom" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "creator" : { "$" : "Monperrus, Martin" }, "dateofacceptance" : { "$" : "2015-02-03" }, "instance" : { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "dateofacceptance" : { "$" : "2015-02-03" }, "instancetype" : { "@classid" : "0016", "@classname" : "Preprint", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "http://arxiv.org/abs/1502.00821" }, "webresource" : { "url" : { "$" : "http://arxiv.org/abs/1502.00821" } } }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" } }, { "@objidentifier" : "doi_________::6a429d55b4f276915ded5dfabf59d183", "description" : { "$" : "All non-trivial software systems suffer from unanticipated production failures. However, those systems are passive with respect to failures and do not take advantage of them in order to improve their future behavior: they simply wait for them to happen and trigger hard-coded failure recovery strategies. Instead, I propose a new paradigm in which software systems learn from their own failures. By using an advanced monitoring system they have a constant awareness of their own state and health. The" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.48550/arxiv.1502.00821" }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "Software that Learns from its Own Failures" }, "creator" : { "$" : "Monperrus, Martin" }, "publisher" : { "$" : "arXiv" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "dateofacceptance" : { "$" : "2015-01-01" }, "collectedfrom" : { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, "instance" : { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "dateofacceptance" : { "$" : "2015-01-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "arXiv Non-Exclusive Distribution" }, "url" : { "$" : "https://dx.doi.org/10.48550/arxiv.1502.00821" }, "webresource" : { "url" : { "$" : "https://dx.doi.org/10.48550/arxiv.1502.00821" } } } } ], "instance" : [ { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "hostedby" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "dateofacceptance" : { "$" : "2015-02-03" }, "instancetype" : { "@classid" : "0016", "@classname" : "Preprint", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "pid" : { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : 1502.00821 }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "webresource" : { "url" : { "$" : "http://arxiv.org/abs/1502.00821" } } }, { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "dateofacceptance" : { "$" : "2015-01-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.48550/arxiv.1502.00821" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "arXiv Non-Exclusive Distribution" }, "webresource" : { "url" : { "$" : "https://doi.org/10.48550/arxiv.1502.00821" } } } ] } }, "extraInfo" : [ { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "Russell J Abbott. “Resourceful systems for fault tolerance, reliability, and safety”. In: ACM Computing Surveys (CSUR) 22.1 (1990), pp. 35- 68." } }, { "@position" : "2", "rawText" : { "$" : "[2] P.E. Ammann and J.C. Knight. “Data diversity: an approach to software fault tolerance”. In: IEEE Transactions on Computers 37.4 (1988), pp. 418 -425." } }, { "@position" : "3", "rawText" : { "$" : "Algirdas Avizienis et al. “Basic Concepts and Taxonomy of Dependable and Secure Computing”. In: IEEE Transactions on Dependable and Secure Computing 1.1 (2004)." } }, { "@position" : "4", "rawText" : { "$" : "[4] Benoit Cornu, Lionel Seinturier, and Martin Monperrus. “Exception Handling Analysis and Transformation Using Fault Injection: Study of Resilience Against Unanticipated Exceptions”. In: Information and Software Technology (2014)." } }, { "@position" : "5", "rawText" : { "$" : "[5] K. Cwalina and B. Abrams. Framework Design Guidelines: Conventions, Idioms, and Patterns for Reuseable .NET Libraries. Addison-Wesley, 2008." } }, { "@position" : "6", "rawText" : { "$" : "[6] Valentin Dallmeier, Andreas Zeller, and Bertrand Meyer. “Generating Fixes from Object Behavior Anomalies”. In: Proceedings of ASE. 2009." } }, { "@position" : "7", "rawText" : { "$" : "[7] B. Demsky and M. Rinard. “Automatic detection and repair of errors in data structures”. In: ACM SIGPLAN Notices 38.11 (2003), pp. 78-95." }, "id" : { "@value" : "doi_________::4562550671370f41f24bac2889074dbf", "@type" : "openaire", "@trustLevel" : "0.6859471" } }, { "@position" : "8", "rawText" : { "$" : "In: Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security. 2007, pp. 22-33." } }, { "@position" : "9", "rawText" : { "$" : "[9] Philip Koopman. Elements of the Self-Healing System Problem Space. Tech. rep. Carnegie Mellon University, 2003." } }, { "@position" : "10", "rawText" : { "$" : "[10] Sergey Mechtaev, Jooyong Yi, and Abhik Roychoudhury. “DirectFix: Looking for Simple Program Repairs”. In: Proceedings of ICSE. 2015." } }, { "@position" : "11", "rawText" : { "$" : "[11] [12] [13] Martin Monperrus. “A Critical Review of \"Automatic Patch Generation Learned from Human-Written Patches\": Essay on the Problem Statement and the Evaluation of Automatic Software Repair”. In: Proceedings of ICSE. 2014." } }, { "@position" : "12", "rawText" : { "$" : "Martin Monperrus. Principles of Antifragile Software. Arxiv 1404.3056." } }, { "@position" : "13", "rawText" : { "$" : "Martin Monperrus et al. Challenging Analytical Knowledge On ExceptionHandling: An Empirical Study of 32 Java Software Packages. Tech. rep." } }, { "@position" : "14", "rawText" : { "$" : "Laboratoire d'Informatique Fondamentale de Lille, 2014." } }, { "@position" : "15", "rawText" : { "$" : "[14] Jeff H. Perkins et al. “Automatically Patching Errors in Deployed Software”. In: Proceedings of SOSP. 2009." } }, { "@position" : "16", "rawText" : { "$" : "[15] S. Sidiroglou et al. “Assure: Automatic Software Self-healing using Rescue Points”. In: Proceedings of ASPLOS. 2009." }, "id" : { "@value" : "doi_________::ec6dde575127c1d62f201a872c29242a", "@type" : "openaire", "@trustLevel" : "0.6153334" } }, { "@position" : "17", "rawText" : { "$" : "[16] S. Sidiroglou et al. “Building a reactive immune system for software services”. In: Proceedings of the USENIX Annual Technical Conference. Vol. 161. 2oo5,(6). 2005." }, "id" : { "@value" : "doi_________::4eb844e9aa12dd1ed0342b635ed0513d", "@type" : "openaire", "@trustLevel" : "0.5950085" } }, { "@position" : "18", "rawText" : { "$" : "[17] Nassim Nicholas Taled. Antifragile. Random House, 2012." } }, { "@position" : "19", "rawText" : { "$" : "[18] Enyi Tang et al. “Perturbing Numerical Calculations for Statistical Analysis of Floating-point Program (in) Stability”. In: Proceedings of ISSTA. 2010." } }, { "@position" : "20", "rawText" : { "$" : "[19] [20] David James Taylor, David Ernest Morgan, and James P Black. “Redundancy in data structures: Improving software fault tolerance”. In: IEEE Transactions on Software Engineering 6 (1980), pp. 585-594." } }, { "@position" : "21", "rawText" : { "$" : "Westley Weimer et al. “Automatic program repair with evolutionary computation”. In: Communications of the ACM 53.5 (May 2010), p. 109." } } ] } }, { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "Russell J Abbott. “Resourceful systems for fault tolerance, reliability, and safety”. In: ACM Computing Surveys (CSUR) 22.1 (1990), pp. 35- 68." } }, { "@position" : "2", "rawText" : { "$" : "[2] P.E. Ammann and J.C. Knight. “Data diversity: an approach to software fault tolerance”. In: IEEE Transactions on Computers 37.4 (1988), pp. 418 -425." } }, { "@position" : "3", "rawText" : { "$" : "Algirdas Avizienis et al. “Basic Concepts and Taxonomy of Dependable and Secure Computing”. In: IEEE Transactions on Dependable and Secure Computing 1.1 (2004)." } }, { "@position" : "4", "rawText" : { "$" : "[4] Benoit Cornu, Lionel Seinturier, and Martin Monperrus. “Exception Handling Analysis and Transformation Using Fault Injection: Study of Resilience Against Unanticipated Exceptions”. In: Information and Software Technology (2014)." } }, { "@position" : "5", "rawText" : { "$" : "[5] K. Cwalina and B. Abrams. Framework Design Guidelines: Conventions, Idioms, and Patterns for Reuseable .NET Libraries. Addison-Wesley, 2008." } }, { "@position" : "6", "rawText" : { "$" : "[6] Valentin Dallmeier, Andreas Zeller, and Bertrand Meyer. “Generating Fixes from Object Behavior Anomalies”. In: Proceedings of ASE. 2009." } }, { "@position" : "7", "rawText" : { "$" : "[7] B. Demsky and M. Rinard. “Automatic detection and repair of errors in data structures”. In: ACM SIGPLAN Notices 38.11 (2003), pp. 78-95." }, "id" : { "@value" : "doi_________::4562550671370f41f24bac2889074dbf", "@type" : "openaire", "@trustLevel" : "0.6859471" } }, { "@position" : "8", "rawText" : { "$" : "In: Fourth International Conference on Mathematical Methods, Models, and Architectures for Computer Network Security. 2007, pp. 22-33." } }, { "@position" : "9", "rawText" : { "$" : "[9] Philip Koopman. Elements of the Self-Healing System Problem Space. Tech. rep. Carnegie Mellon University, 2003." } }, { "@position" : "10", "rawText" : { "$" : "[10] Sergey Mechtaev, Jooyong Yi, and Abhik Roychoudhury. “DirectFix: Looking for Simple Program Repairs”. In: Proceedings of ICSE. 2015." } }, { "@position" : "11", "rawText" : { "$" : "[11] [12] [13] Martin Monperrus. “A Critical Review of \"Automatic Patch Generation Learned from Human-Written Patches\": Essay on the Problem Statement and the Evaluation of Automatic Software Repair”. In: Proceedings of ICSE. 2014." } }, { "@position" : "12", "rawText" : { "$" : "Martin Monperrus. Principles of Antifragile Software. Arxiv 1404.3056." } }, { "@position" : "13", "rawText" : { "$" : "Martin Monperrus et al. Challenging Analytical Knowledge On ExceptionHandling: An Empirical Study of 32 Java Software Packages. Tech. rep." } }, { "@position" : "14", "rawText" : { "$" : "Laboratoire d'Informatique Fondamentale de Lille, 2014." } }, { "@position" : "15", "rawText" : { "$" : "[14] Jeff H. Perkins et al. “Automatically Patching Errors in Deployed Software”. In: Proceedings of SOSP. 2009." } }, { "@position" : "16", "rawText" : { "$" : "[15] S. Sidiroglou et al. “Assure: Automatic Software Self-healing using Rescue Points”. In: Proceedings of ASPLOS. 2009." }, "id" : { "@value" : "doi_________::ec6dde575127c1d62f201a872c29242a", "@type" : "openaire", "@trustLevel" : "0.6153334" } }, { "@position" : "17", "rawText" : { "$" : "[16] S. Sidiroglou et al. “Building a reactive immune system for software services”. In: Proceedings of the USENIX Annual Technical Conference. Vol. 161. 2oo5,(6). 2005." }, "id" : { "@value" : "doi_________::4eb844e9aa12dd1ed0342b635ed0513d", "@type" : "openaire", "@trustLevel" : "0.5950085" } }, { "@position" : "18", "rawText" : { "$" : "[17] Nassim Nicholas Taled. Antifragile. Random House, 2012." } }, { "@position" : "19", "rawText" : { "$" : "[18] Enyi Tang et al. “Perturbing Numerical Calculations for Statistical Analysis of Floating-point Program (in) Stability”. In: Proceedings of ISSTA. 2010." } }, { "@position" : "20", "rawText" : { "$" : "[19] [20] David James Taylor, David Ernest Morgan, and James P Black. “Redundancy in data structures: Improving software fault tolerance”. In: IEEE Transactions on Software Engineering 6 (1980), pp. 585-594." } }, { "@position" : "21", "rawText" : { "$" : "Westley Weimer et al. “Automatic program repair with evolutionary computation”. In: Communications of the ACM 53.5 (May 2010), p. 109." } } ] } } ] } } }, { "header" : { "dri:objIdentifier" : { "$" : "doi_dedup___::ae7791b0a5a8377dd822b3ab58ba52ed" }, "dri:dateOfCollection" : { "$" : "2025-12-20T13:51:18.449637680" }, "dri:dateOfTransformation" : null }, "metadata" : { "oaf:entity" : { "@xsi:schemaLocation" : "http://namespace.openaire.eu/oaf https://www.openaire.eu/schema/1.0/oaf-1.0.xsd", "oaf:result" : { "collectedfrom" : [ { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" }, { "@name" : "UnpayWall", "@id" : "openaire____::8ac8380272269217cb09a928c8caa993" }, { "@name" : "HAL - Université de Lille", "@id" : "opendoar____::29c0c0ee223856f336d7ea8052057753" }, { "@name" : "Crossref", "@id" : "openaire____::081b82f96300b6a6e3d282bad31cb6e2" }, { "@name" : "Microsoft Academic Graph", "@id" : "openaire____::5f532a3fc4f1ea403f37070f59a7a53a" }, { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" }, { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" } ], "originalId" : [ { "$" : "10.1145/3079368.3079412" }, { "$" : "10.1145/3079368" }, { "$" : "50|doiboost____|ae7791b0a5a8377dd822b3ab58ba52ed" }, { "$" : "50|datacite____::a21c6085e2628c93af715bc9a1980c8a" }, { "$" : "10.48550/arxiv.1404.3056" }, { "$" : "oai:arXiv.org:1404.3056" }, { "$" : "50|od________18::973c2b344736f2af46743e374280910f" }, { "$" : "oai:HAL:hal-00978310v1" }, { "$" : "50|inria2______::01c6e1c935a3ada3efab1e454eb03ab0" }, { "$" : "3101324655" }, { "$" : "2097809170" }, { "$" : "50|od______4254::01c6e1c935a3ada3efab1e454eb03ab0" }, { "$" : "50|od_______165::01c6e1c935a3ada3efab1e454eb03ab0" } ], "pid" : [ { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/3079368.3079412" }, { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.48550/arxiv.1404.3056" }, { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : 1404.3056 } ], "measure" : [ { "@id" : "influence", "@score" : "3.3071927E-9", "@class" : "C4" }, { "@id" : "popularity", "@score" : "7.673213E-9", "@class" : "C4" }, { "@id" : "influence_alt", "@score" : "15", "@class" : "C4" }, { "@id" : "popularity_alt", "@score" : "2.4533377", "@class" : "C4" }, { "@id" : "impulse", "@score" : "7", "@class" : "C4" } ], "title" : [ { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "Principles of Antifragile Software" }, { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "principles of antifragile software" } ], "bestaccessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "creator" : { "@rank" : "1", "@name" : "Martin", "@surname" : "Monperrus", "@orcid" : "0000-0003-3505-3383", "$" : "Monperrus, Martin" }, "contributor" : { "$" : "Monperrus, Martin" }, "dateofacceptance" : { "$" : "2017-04-03" }, "description" : [ { "$" : "see https://refuses.github.io/" }, { "$" : "The goal of this paper is to study and define the concept of \"antifragile software\". For this, I start from Taleb's statement that antifragile systems love errors, and discuss whether traditional software dependability fits into this class. The answer is somewhat negative, although adaptive fault tolerance is antifragile: the system learns something when an error happens, and always imrpoves. Automatic runtime bug fixing is changing the code in response to errors, fault injection in production means injecting errors in business critical software. I claim that both correspond to antifragility. Finally, I hypothesize that antifragile development processes are better at producing antifragile software systems." } ], "embargoenddate" : { "$" : "2014-01-01" }, "subject" : [ { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "$" : "Software Engineering (cs.SE)" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "$" : "FOS: Computer and information sciences" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "Computer Science - Software Engineering" }, { "@classid" : "SDG", "@classname" : "Sustainable Development Goals", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : true, "@inferenceprovenance" : "update", "@provenanceaction" : "subject:sdg", "$" : "13. Climate action" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "[INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE]" }, { "@classid" : "FOS", "@classname" : "Fields of Science and Technology classification", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : true, "@inferenceprovenance" : "update", "@provenanceaction" : "subject:fos", "$" : "0202 electrical engineering, electronic engineering, information engineering" }, { "@classid" : "FOS", "@classname" : "Fields of Science and Technology classification", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : true, "@inferenceprovenance" : "update", "@provenanceaction" : "subject:fos", "$" : "02 engineering and technology" } ], "language" : { "@classid" : "und", "@classname" : "Undetermined", "@schemeid" : "dnet:languages", "@schemename" : "dnet:languages" }, "relevantdate" : [ { "@classid" : "created", "@classname" : "created", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2017-08-02" }, { "@classid" : "published-online", "@classname" : "published-online", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2017-04-03" }, { "@classid" : "published-print", "@classname" : "published-print", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2017-04-03" }, { "@classid" : "submitted", "@classname" : "submitted", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2014-04-11" }, { "@classid" : "updated", "@classname" : "updated", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2014-04-14" }, { "@classid" : "submitted", "@classname" : "submitted", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2014-09-29" }, { "@classid" : "updated", "@classname" : "updated", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2014-09-30" }, { "@classid" : "submitted", "@classname" : "submitted", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2017-06-07" }, { "@classid" : "updated", "@classname" : "updated", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2021-08-18" }, { "@classid" : "available", "@classname" : "available", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2014-01-01" }, { "@classid" : "issued", "@classname" : "issued", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2014-01-01" }, { "@classid" : "UNKNOWN", "@classname" : "UNKNOWN", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2014-04-14" }, { "@classid" : "updated", "@classname" : "updated", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2025-02-26" }, { "@classid" : "available", "@classname" : "available", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2014-04-14" }, { "@classid" : "issued", "@classname" : "issued", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2017-01-01" }, { "@classid" : "updated", "@classname" : "updated", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2025-10-27" } ], "publisher" : { "$" : "ACM" }, "source" : { "$" : "Crossref" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "resourcetype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "isgreen" : { "$" : true }, "isindiamondjournal" : { "$" : false }, "publiclyfunded" : { "$" : false }, "journal" : { "@ep" : "4", "@sp" : "1", "$" : "Companion to the first International Conference on the Art, Science and Engineering of Programming" }, "context" : [ { "@id" : "knowmad", "@label" : "Knowmad Institut", "@type" : "community" }, { "@id" : "inria", "@label" : "INRIA", "@type" : "community" } ], "datainfo" : { "inferred" : { "$" : true }, "deletedbyinference" : { "$" : false }, "trust" : { "$" : "0.8" }, "inferenceprovenance" : { "$" : "dedup-result-decisiontree-v4" }, "provenanceaction" : { "@classid" : "sysimport:dedup", "@classname" : "Inferred by OpenAIRE", "@schemeid" : "dnet:provenanceActions", "@schemename" : "dnet:provenanceActions" } }, "rels" : { "rel" : [ { "@inferred" : true, "@trust" : "1.0", "@inferenceprovenance" : "openaire:affiliation:graph", "@provenanceaction" : "result:organization:openaireinference", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "openorgs____::a7d9dc62bc79f067b8c0f3f683320ab6" }, "legalshortname" : { "$" : "USTL" }, "websiteurl" : { "$" : "https://www.univ-lille.fr/" }, "country" : { "@classid" : "FR", "@classname" : "France", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "legalname" : { "$" : "University of Lille" } }, { "@inferred" : true, "@trust" : "0.9", "@inferenceprovenance" : "iis::document_similarities_standard", "@provenanceaction" : "iis", "to" : { "@class" : "IsAmongTopNSimilarDocuments", "@scheme" : "dnet:result_result_relations", "@type" : "publication", "$" : "doi_dedup___::76f533ee7ff1a8df86db209ce705497d" }, "creator" : [ { "$" : "Chris J. Backhouse" }, { "$" : "Ayham Jaaron" } ], "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "Building antifragility in service organisations: going beyond resilience" }, "instance" : [ { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://dx.doi.org/10.1504/ijsom.2014.065671" }, "webresource" : { "url" : { "$" : "https://dx.doi.org/10.1504/ijsom.2014.065671" } } }, { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "International Journal of Services and Operations Management", "@id" : "issn___print::693acb0ee7215389f840b5498fb126c3" }, "dateofacceptance" : { "$" : "2014-01-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0001", "@classname" : "peerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://doi.org/10.1504/ijsom.2014.065671" }, "webresource" : { "url" : { "$" : "https://doi.org/10.1504/ijsom.2014.065671" } } } ], "dateofacceptance" : { "$" : "2014-01-01" }, "publisher" : { "$" : "Inderscience Publishers" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1504/ijsom.2014.065671" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "collectedfrom" : [ { "@name" : "Crossref", "@id" : "openaire____::081b82f96300b6a6e3d282bad31cb6e2" }, { "@name" : "Microsoft Academic Graph", "@id" : "openaire____::5f532a3fc4f1ea403f37070f59a7a53a" } ], "description" : { "$" : "To maintain organisational growth in a turbulent environment, organisations must build highly effective learning systems to innovate and develop from threats and stressors. This has been termed by Taleb (2012) as ‘antifragility’. This paper explores the benefits of applying a systems approach to service delivery design in order to build an ‘antifragile’ organisation that can learn from disruptions. Two exploratory case studies were conducted in the UK insurance sector using in-depth interviews s" } }, { "@inferred" : true, "@trust" : "0.9", "@inferenceprovenance" : "iis::document_similarities_standard", "@provenanceaction" : "iis", "to" : { "@class" : "IsAmongTopNSimilarDocuments", "@scheme" : "dnet:result_result_relations", "@type" : "publication", "$" : "doi_dedup___::e4ecee4114960a1747590a0ee2bca106" }, "description" : { "$" : "Organizations operate in a socio-economic context, and alignment with this context is key for business success. The rate of change and impact of these changes on the operating model of the organization appears to be increasing. Major trends are the aftermath of the financial crisis of 2008, the “VUCA” aspects (volatility, uncertainty, complexity, ambiguity), and the Covid-pandemic. The challenge for organizations is to become resilient or even antifragile to survive (unexpected) external stresso" }, "dateofacceptance" : { "$" : "2021-09-01" }, "instance" : [ { "accessright" : { "@classid" : "CLOSED", "@classname" : "Closed Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "HBO Kennisbank", "@id" : "openaire____::dbb60e141c9bb21abc177737f8f72909" }, "dateofacceptance" : { "$" : "2021-09-02" }, "instancetype" : { "@classid" : "0004", "@classname" : "Conference object", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://doi.org/10.1109/cbi52690.2021.00017" }, "webresource" : { "url" : { "$" : "https://doi.org/10.1109/cbi52690.2021.00017" } } }, { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://dx.doi.org/10.1109/cbi52690.2021.00017" }, "webresource" : { "url" : { "$" : "https://dx.doi.org/10.1109/cbi52690.2021.00017" } } }, { "accessright" : { "@classid" : "CLOSED", "@classname" : "Closed Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "dateofacceptance" : { "$" : "2021-09-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0001", "@classname" : "peerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "STM Policy #29" }, "url" : { "$" : "https://doi.org/10.1109/cbi52690.2021.00017" }, "webresource" : { "url" : { "$" : "https://doi.org/10.1109/cbi52690.2021.00017" } } } ], "collectedfrom" : [ { "@name" : "HBO Kennisbank", "@id" : "openaire____::dbb60e141c9bb21abc177737f8f72909" }, { "@name" : "Crossref", "@id" : "openaire____::081b82f96300b6a6e3d282bad31cb6e2" }, { "@name" : "Microsoft Academic Graph", "@id" : "openaire____::5f532a3fc4f1ea403f37070f59a7a53a" } ], "creator" : [ { "$" : "Mulder, Hans" }, { "$" : "Gils, Bas van" }, { "$" : "Berg, Martin van den" }, { "$" : "Botjes, Edzo" } ], "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1109/cbi52690.2021.00017" }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "Attributes relevant to antifragile organizations" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "publisher" : { "$" : "IEEE" } }, { "@inferred" : true, "@trust" : "0.9", "@inferenceprovenance" : "iis::document_similarities_standard", "@provenanceaction" : "iis", "to" : { "@class" : "IsAmongTopNSimilarDocuments", "@scheme" : "dnet:result_result_relations", "@type" : "publication", "$" : "doi_dedup___::3167041f252a5e101176ca3278868540" }, "dateofacceptance" : { "$" : "2021-01-01" }, "description" : { "$" : "  This dissertation takes an interdisciplinary approach to understanding what makes states antifragile and why this matters by constructing a parsimonious, first of its kind agent-based model. The model focuses on the key elements of state antifragility that reside along a spectrum of fragility and transverse bidirectionally from fragile to resilient to antifragile given a certain set of environmental conditions.  First coined by Nicholas Nassim Taleb and applied to economics, antifragility is a" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.25777/yhmw-7n49" }, "instance" : [ { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "dateofacceptance" : { "$" : "2021-01-01" }, "instancetype" : { "@classid" : "0006", "@classname" : "Doctoral thesis", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://dx.doi.org/10.25777/yhmw-7n49" }, "webresource" : { "url" : { "$" : "https://dx.doi.org/10.25777/yhmw-7n49" } } }, { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Old Dominion University: ODU Digital Commons", "@id" : "opendoar____::d8a4e572d866aa45da78418d9d2ff9f9" }, "dateofacceptance" : { "$" : "2021-07-01" }, "instancetype" : { "@classid" : "0006", "@classname" : "Doctoral thesis", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "fulltext" : { "$" : "https://digitalcommons.odu.edu/gpis_etds/139" }, "url" : { "$" : "https://doi.org/https://doi.org/10.25777/yhmw-7n49" }, "webresource" : { "url" : { "$" : "https://doi.org/https://doi.org/10.25777/yhmw-7n49" } } }, { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "instancetype" : { "@classid" : "0038", "@classname" : "Other literature type", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://dx.doi.org/10.25777/yhmw-7n49" }, "webresource" : { "url" : { "$" : "https://dx.doi.org/10.25777/yhmw-7n49" } } } ], "collectedfrom" : [ { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, { "@name" : "Bielefeld Academic Search Engine (BASE)", "@id" : "openaire____::df45502607927471ecf8a6ae83683ff5" }, { "@name" : "Microsoft Academic Graph", "@id" : "openaire____::5f532a3fc4f1ea403f37070f59a7a53a" } ], "publisher" : { "$" : "Old Dominion University Libraries" }, "creator" : { "$" : "Law, Rebecca Lee" }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "State Antifragility: An Agent-Based Modeling Approach to Understanding State Behavior" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" } }, { "@inferred" : true, "@trust" : "1.0", "@inferenceprovenance" : "openaire:affiliation:graph", "@provenanceaction" : "result:organization:openaireinference", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "openorgs____::b1a28649a82b98ae497d5c7782656740" }, "country" : { "@classid" : "FR", "@classname" : "France", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "legalname" : { "$" : "French Institute for Research in Computer Science and Automation" }, "legalshortname" : { "$" : "INRIA" }, "websiteurl" : { "$" : "http://www.inria.fr/en/" } }, { "@inferred" : true, "@trust" : "0.9", "@inferenceprovenance" : "iis::document_similarities_standard", "@provenanceaction" : "iis", "to" : { "@class" : "IsAmongTopNSimilarDocuments", "@scheme" : "dnet:result_result_relations", "@type" : "publication", "$" : "doi_dedup___::8ecbe7116f8897704c01692b02ec0cce" }, "publisher" : { "$" : "BDC. Bollettino Del Centro Calza Bini" }, "collectedfrom" : [ { "@name" : "Archivio della ricerca - Università degli studi di Napoli Federico II", "@id" : "opendoar____::d8c24ca8f23c562a5600876ca2a550ce" }, { "@name" : "FEDOA - IRIS Università degli Studi Napoli Federico II", "@id" : "eurocrisdris::2a2cfa6d4b4188dfbaee90f0e2e43a88" }, { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, { "@name" : "Microsoft Academic Graph", "@id" : "openaire____::5f532a3fc4f1ea403f37070f59a7a53a" } ], "description" : { "$" : "Le condizioni di fragilità del territorio e l’incremento delle catastrofi (si ricorda il recente crollo del ponte Morandi a Genova), di origine naturale ed antropica, invocano un cambio di approccio alla pianificazione che possa convivere con le condizioni della “città panico”. La teoria culturale del rischio di Douglas negli anni ’80 poneva l’accento sul rapporto tra consenso sociale e sapere tecnico rivelando la necessità di integrazione delle due componenti. La teoria dell’antifragilità che p" }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "LA PIANIFICAZIONE “ANTIFRAGILE” PER IL SISTEMA DEI TRASPORTI: L’APPLICAZIONE DEL GEODESIGN COME STRUMENTO OPERATIVO" }, "instance" : [ { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "dateofacceptance" : { "$" : "2018-06-30" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "CC BY" }, "url" : { "$" : "https://dx.doi.org/10.6092/2284-4732/6051" }, "webresource" : { "url" : { "$" : "https://dx.doi.org/10.6092/2284-4732/6051" } } }, { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "FEDOA - IRIS Università degli Studi Napoli Federico II", "@id" : "eurocrisdris::2a2cfa6d4b4188dfbaee90f0e2e43a88" }, "dateofacceptance" : { "$" : "2018-01-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : [ { "$" : "http://hdl.handle.net/11588/748727" }, { "$" : "http://www.serena.unina.it/index.php/bdc/article/view/6051" } ], "webresource" : [ { "url" : { "$" : "http://hdl.handle.net/11588/748727" } }, { "url" : { "$" : "http://www.serena.unina.it/index.php/bdc/article/view/6051" } } ] }, { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Archivio della ricerca - Università degli studi di Napoli Federico II", "@id" : "opendoar____::d8c24ca8f23c562a5600876ca2a550ce" }, "dateofacceptance" : { "$" : "2018-01-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "CC BY NC ND" }, "fulltext" : { "$" : "https://www.iris.unina.it/bitstream/11588/748727/2/articolo_ACIERNO_BdC_La%20pianificazione%20antifragile.pdf" }, "url" : [ { "$" : "https://hdl.handle.net/11588/748727" }, { "$" : "http://www.serena.unina.it/index.php/bdc/article/view/6051" }, { "$" : "https://doi.org/10.6092/2284-4732/6051" } ], "webresource" : [ { "url" : { "$" : "https://hdl.handle.net/11588/748727" } }, { "url" : { "$" : "http://www.serena.unina.it/index.php/bdc/article/view/6051" } }, { "url" : { "$" : "https://doi.org/10.6092/2284-4732/6051" } } ] }, { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "instancetype" : { "@classid" : "0038", "@classname" : "Other literature type", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://dx.doi.org/10.6092/2284-4732/6051" }, "webresource" : { "url" : { "$" : "https://dx.doi.org/10.6092/2284-4732/6051" } } } ], "creator" : [ { "$" : "Lanzi G." }, { "$" : "Acierno A." } ], "dateofacceptance" : { "$" : "2018-01-01" }, "pid" : [ { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.6092/2284-4732/6051" }, { "@classid" : "handle", "@classname" : "Handle", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "11588/748727" } ], "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" } }, { "@inferred" : true, "@trust" : "1.0", "@inferenceprovenance" : "openaire:affiliation:graph", "@provenanceaction" : "result:organization:openaireinference", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "openorgs____::7fbdf9cd4423c4604745a16afe728bc7" }, "country" : { "@classid" : "FR", "@classname" : "France", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "legalshortname" : { "$" : "CNRS" }, "legalname" : { "$" : "French National Centre for Scientific Research" }, "websiteurl" : { "$" : "http://www.cnrs.fr/index.php" } } ] }, "children" : { "result" : [ { "@objidentifier" : "od______4254::01c6e1c935a3ada3efab1e454eb03ab0", "instance" : { "accessright" : { "@classid" : "CLOSED", "@classname" : "Closed Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "HAL - Université de Lille", "@id" : "opendoar____::29c0c0ee223856f336d7ea8052057753" }, "dateofacceptance" : { "$" : "2017-01-01" }, "instancetype" : { "@classid" : "0004", "@classname" : "Conference object", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "CC BY SA" }, "url" : [ { "$" : "https://doi.org/10.1145/3079368.3079412" }, { "$" : "https://hal.science/hal-00978310v1" } ], "webresource" : [ { "url" : { "$" : "https://doi.org/10.1145/3079368.3079412" } }, { "url" : { "$" : "https://hal.science/hal-00978310v1" } } ] }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "Principles of Antifragile Software" }, "description" : { "$" : "The goal of this paper is to study and define the concept of \"antifragile software\". For this, I start from Taleb's statement that antifragile systems love errors, and discuss whether traditional software dependability fits into this class. The answer is somewhat negative, although adaptive fault tolerance is antifragile: the system learns something when an error happens, and always imrpoves. Automatic runtime bug fixing is changing the code in response to errors, fault injection in production m" }, "creator" : { "$" : "Monperrus, Martin" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "collectedfrom" : { "@name" : "HAL - Université de Lille", "@id" : "opendoar____::29c0c0ee223856f336d7ea8052057753" }, "dateofacceptance" : { "$" : "2017-01-01" } }, { "@objidentifier" : "doi_________::a21c6085e2628c93af715bc9a1980c8a", "description" : { "$" : "The goal of this paper is to study and define the concept of \"antifragile software\". For this, I start from Taleb's statement that antifragile systems love errors, and discuss whether traditional software dependability fits into this class. The answer is somewhat negative, although adaptive fault tolerance is antifragile: the system learns something when an error happens, and always imrpoves. Automatic runtime bug fixing is changing the code in response to errors, fault injection in production m" }, "creator" : { "$" : "Monperrus, Martin" }, "publisher" : { "$" : "arXiv" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.48550/arxiv.1404.3056" }, "instance" : { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "dateofacceptance" : { "$" : "2014-01-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "arXiv Non-Exclusive Distribution" }, "url" : { "$" : "https://dx.doi.org/10.48550/arxiv.1404.3056" }, "webresource" : { "url" : { "$" : "https://dx.doi.org/10.48550/arxiv.1404.3056" } } }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "Principles of Antifragile Software" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "dateofacceptance" : { "$" : "2014-01-01" }, "collectedfrom" : { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" } }, { "@objidentifier" : "arXiv_______::91167fc5d7e3e941029b1102c16ba83a", "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "Principles of Antifragile Software" }, "description" : { "$" : "The goal of this paper is to study and define the concept of \"antifragile software\". For this, I start from Taleb's statement that antifragile systems love errors, and discuss whether traditional software dependability fits into this class. The answer is somewhat negative, although adaptive fault tolerance is antifragile: the system learns something when an error happens, and always imrpoves. Automatic runtime bug fixing is changing the code in response to errors, fault injection in production m" }, "collectedfrom" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "creator" : { "$" : "Monperrus, Martin" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "pid" : { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : 1404.3056 }, "dateofacceptance" : { "$" : "2014-04-11" }, "instance" : { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "dateofacceptance" : { "$" : "2014-04-11" }, "instancetype" : { "@classid" : "0016", "@classname" : "Preprint", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "http://arxiv.org/abs/1404.3056" }, "webresource" : { "url" : { "$" : "http://arxiv.org/abs/1404.3056" } } } }, { "@objidentifier" : "od_______165::01c6e1c935a3ada3efab1e454eb03ab0", "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "Principles of Antifragile Software" }, "description" : { "$" : "The goal of this paper is to study and define the concept of \"antifragile software\". For this, I start from Taleb's statement that antifragile systems love errors, and discuss whether traditional software dependability fits into this class. The answer is somewhat negative, although adaptive fault tolerance is antifragile: the system learns something when an error happens, and always imrpoves. Automatic runtime bug fixing is changing the code in response to errors, fault injection in production m" }, "instance" : { "accessright" : { "@classid" : "CLOSED", "@classname" : "Closed Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" }, "dateofacceptance" : { "$" : "2017-01-01" }, "instancetype" : { "@classid" : "0004", "@classname" : "Conference object", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "CC BY SA" }, "url" : [ { "$" : "https://doi.org/10.1145/3079368.3079412" }, { "$" : "https://hal.science/hal-00978310v1" } ], "webresource" : [ { "url" : { "$" : "https://doi.org/10.1145/3079368.3079412" } }, { "url" : { "$" : "https://hal.science/hal-00978310v1" } } ] }, "creator" : { "$" : "Monperrus, Martin" }, "collectedfrom" : { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "dateofacceptance" : { "$" : "2017-01-01" } }, { "@objidentifier" : "inria2______::01c6e1c935a3ada3efab1e454eb03ab0", "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "Principles of Antifragile Software" }, "instance" : { "accessright" : { "@classid" : "CLOSED", "@classname" : "Closed Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" }, "dateofacceptance" : { "$" : "2017-01-01" }, "instancetype" : { "@classid" : "0004", "@classname" : "Conference object", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "CC BY SA" }, "url" : [ { "$" : "https://doi.org/10.1145/3079368.3079412" }, { "$" : "https://hal.science/hal-00978310v1" } ], "webresource" : [ { "url" : { "$" : "https://doi.org/10.1145/3079368.3079412" } }, { "url" : { "$" : "https://hal.science/hal-00978310v1" } } ] }, "description" : { "$" : "The goal of this paper is to study and define the concept of \"antifragile software\". For this, I start from Taleb's statement that antifragile systems love errors, and discuss whether traditional software dependability fits into this class. The answer is somewhat negative, although adaptive fault tolerance is antifragile: the system learns something when an error happens, and always imrpoves. Automatic runtime bug fixing is changing the code in response to errors, fault injection in production m" }, "creator" : { "$" : "Monperrus, Martin" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "dateofacceptance" : { "$" : "2017-01-01" }, "collectedfrom" : { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" } }, { "@objidentifier" : "doi_________::ae7791b0a5a8377dd822b3ab58ba52ed", "dateofacceptance" : { "$" : "2017-04-03" }, "instance" : [ { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "http://arxiv.org/pdf/1404.3056" }, "webresource" : { "url" : { "$" : "http://arxiv.org/pdf/1404.3056" } } }, { "accessright" : { "@classid" : "CLOSED", "@classname" : "Closed Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "dateofacceptance" : { "$" : "2017-04-03" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0001", "@classname" : "peerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "https://www.acm.org/publications/policies/copyright_policy#Background" }, "url" : { "$" : "https://doi.org/10.1145/3079368.3079412" }, "webresource" : { "url" : { "$" : "https://doi.org/10.1145/3079368.3079412" } } } ], "publisher" : { "$" : "ACM" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/3079368.3079412" }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "Principles of Antifragile Software" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "collectedfrom" : [ { "@name" : "Crossref", "@id" : "openaire____::081b82f96300b6a6e3d282bad31cb6e2" }, { "@name" : "UnpayWall", "@id" : "openaire____::8ac8380272269217cb09a928c8caa993" } ], "creator" : { "$" : "Martin Monperrus" } } ], "instance" : [ { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "hostedby" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "dateofacceptance" : { "$" : "2014-04-11" }, "instancetype" : { "@classid" : "0016", "@classname" : "Preprint", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "pid" : { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : 1404.3056 }, "alternateidentifier" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/3079368.3079412" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "webresource" : { "url" : { "$" : "http://arxiv.org/abs/1404.3056" } } }, { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : { "@name" : "UnpayWall", "@id" : "openaire____::8ac8380272269217cb09a928c8caa993" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/3079368.3079412" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "webresource" : { "url" : { "$" : "http://arxiv.org/pdf/1404.3056" } } }, { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "dateofacceptance" : { "$" : "2014-01-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.48550/arxiv.1404.3056" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "arXiv Non-Exclusive Distribution" }, "webresource" : { "url" : { "$" : "https://doi.org/10.48550/arxiv.1404.3056" } } }, { "accessright" : { "@classid" : "CLOSED", "@classname" : "Closed Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : [ { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" }, { "@name" : "Microsoft Academic Graph", "@id" : "openaire____::5f532a3fc4f1ea403f37070f59a7a53a" }, { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" }, { "@name" : "HAL - Université de Lille", "@id" : "opendoar____::29c0c0ee223856f336d7ea8052057753" }, { "@name" : "Crossref", "@id" : "openaire____::081b82f96300b6a6e3d282bad31cb6e2" } ], "hostedby" : [ { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" }, { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" }, { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, { "@name" : "HAL - Université de Lille", "@id" : "opendoar____::29c0c0ee223856f336d7ea8052057753" } ], "dateofacceptance" : [ { "$" : "2017-01-01" }, { "$" : "2017-04-03" } ], "instancetype" : [ { "@classid" : "0004", "@classname" : "Conference object", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, { "@classid" : "0038", "@classname" : "Other literature type", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" } ], "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/3079368.3079412" }, "alternateidentifier" : [ { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : 1404.3056 }, { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : 1404.3056 }, { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/3079368.3079412" }, { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/3079368.3079412" }, { "@classid" : "mag_id", "@classname" : "Microsoft Academic Graph Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : 2097809170 }, { "@classid" : "mag_id", "@classname" : "Microsoft Academic Graph Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : 3101324655 }, { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/3079368.3079412" }, { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/3079368.3079412" }, { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : 1404.3056 } ], "refereed" : { "@classid" : "0001", "@classname" : "peerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : [ { "$" : "CC BY SA" }, { "$" : "https://www.acm.org/publications/policies/copyright_policy#Background" } ], "webresource" : { "url" : { "$" : "https://doi.org/10.1145/3079368.3079412" } } } ] } }, "extraInfo" : [ { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "[1] J. Allspaw. Fault injection in production. Communications of the ACM, 55(10):48-52, 2012." }, "id" : { "@value" : "doi_________::8ca81d4ac3da8d048907b7e0f7ab4035", "@type" : "openaire", "@trustLevel" : "0.70644873" } }, { "@position" : "2", "rawText" : { "$" : "[4] R. de Lemos. ICSE 2003 WADS panel: Fault tolerance and self-healing. http://www.cs.kent.ac.uk/events/conf/ 2003/wads/panelReportWADS2003.pdf, 2003." } }, { "@position" : "3", "rawText" : { "$" : "[11] M. Monperrus. A critical review of \"automatic patch generation learned from human-written patches\": Essay on the problem statement and the evaluation of automatic software repair. In Proceedings of the International Conference on Software Engineering, 2014." }, "id" : { "@value" : "doi_________::47c5b1938a809d4b8aa09b923057e705", "@type" : "openaire", "@trustLevel" : "0.7117538" } }, { "@position" : "4", "rawText" : { "$" : "[10] L. Mikhajlov and E. Sekerinski. A study of the fragile base class problem. In Proceedings of the European Conference on Object-oriented Programming, pages 355-382. Springer, 1998." }, "id" : { "@value" : "doi_________::2e5d5f073993667464b82325f2d0e11a", "@type" : "openaire", "@trustLevel" : "0.68565786" } }, { "@position" : "5", "rawText" : { "$" : "[20] S. Yau and R. Cheung. Design of self-checking software. In ACM SIGPLAN Notices, volume 10, pages 450-455. ACM, 1975." }, "id" : { "@value" : "doi_________::c90e55a2427be6ac1e9721156328a130", "@type" : "openaire", "@trustLevel" : "0.6595268" } }, { "@position" : "6", "rawText" : { "$" : "[5] B. Demsky and M. Rinard. Automatic detection and repair of errors in data structures. ACM SIGPLAN Notices, 38(11):78-95, 2003." }, "id" : { "@value" : "doi_________::5a28f750b5c6e22991fde60aeb5dee41", "@type" : "openaire", "@trustLevel" : "0.69021076" } }, { "@position" : "7", "rawText" : { "$" : "[6] Y. Izrailevsky and A. Tseitlin. The Netflix simian army. http://techblog.netflix.com/ 2011/07/netflix-simian-army.html, 2011." } }, { "@position" : "8", "rawText" : { "$" : "[7] Z. T. Kalbarczyk, R. K. Iyer, S. Bagchi, and K. Whisnant. Chameleon: A software infrastructure for adaptive fault tolerance. IEEE Transactions on Parallel and Distributed Systems, 10(6):560-579, 1999." } }, { "@position" : "9", "rawText" : { "$" : "[8] C. Lewis and J. Whitehead. Repairing games at runtime or, how we learned to stop worrying and love emergence. IEEE Software, 28(5), 2011." } }, { "@position" : "10", "rawText" : { "$" : "[13] B. Randell. System structure for software fault tolerance. IEEE Transactions on Software Engineering, SE-1(2):220 -232, june 1975." }, "id" : { "@value" : "doi_________::265e575335f9998cf7b95357b2904db2", "@type" : "openaire", "@trustLevel" : "0.7037726" } }, { "@position" : "11", "rawText" : { "$" : "[14] E. S. Raymond et al. The jargon file. http: //catb.org/jargon/, last accessed Jan. 2014, -." } }, { "@position" : "12", "rawText" : { "$" : "[15] M. Shaw. Self-healing: softening precision to avoid brittleness. In Proceedings of the first workshop on self-healing systems, 2002." } }, { "@position" : "13", "rawText" : { "$" : "[16] N. N. Taled. Antifragile. Random House, 2012." } }, { "@position" : "14", "rawText" : { "$" : "[17] A. Tseitlin. The antifragile organization. Commun. ACM, 56(8):40-44, Aug. 2013." }, "id" : { "@value" : "doi_________::e65ddf7ac5ab9367cc1fd3de2837cda3", "@type" : "openaire", "@trustLevel" : "0.71158093" } }, { "@position" : "15", "rawText" : { "$" : "[9] M. E. Locasto, S. Sidiroglou, and A. D. Keromytis. Software self-healing using collab- [19] G. M. Weinberg. The psychology of computer orative application communities. In Proceedings programming. Van Nostrand Reinhold New of the Symposium on Network and Distributed York, 1971. Systems Security, 2006." } } ] } }, { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "[1] J. Allspaw. Fault injection in production. Communications of the ACM, 55(10):48-52, 2012." }, "id" : { "@value" : "doi_________::8ca81d4ac3da8d048907b7e0f7ab4035", "@type" : "openaire", "@trustLevel" : "0.70644873" } }, { "@position" : "2", "rawText" : { "$" : "[4] R. de Lemos. ICSE 2003 WADS panel: Fault tolerance and self-healing. http://www.cs.kent.ac.uk/events/conf/ 2003/wads/panelReportWADS2003.pdf, 2003." } }, { "@position" : "3", "rawText" : { "$" : "[11] M. Monperrus. A critical review of \"automatic patch generation learned from human-written patches\": Essay on the problem statement and the evaluation of automatic software repair. In Proceedings of the International Conference on Software Engineering, 2014." }, "id" : { "@value" : "doi_________::47c5b1938a809d4b8aa09b923057e705", "@type" : "openaire", "@trustLevel" : "0.7117538" } }, { "@position" : "4", "rawText" : { "$" : "[10] L. Mikhajlov and E. Sekerinski. A study of the fragile base class problem. In Proceedings of the European Conference on Object-oriented Programming, pages 355-382. Springer, 1998." }, "id" : { "@value" : "doi_________::2e5d5f073993667464b82325f2d0e11a", "@type" : "openaire", "@trustLevel" : "0.68565786" } }, { "@position" : "5", "rawText" : { "$" : "[20] S. Yau and R. Cheung. Design of self-checking software. In ACM SIGPLAN Notices, volume 10, pages 450-455. ACM, 1975." }, "id" : { "@value" : "doi_________::c90e55a2427be6ac1e9721156328a130", "@type" : "openaire", "@trustLevel" : "0.6595268" } }, { "@position" : "6", "rawText" : { "$" : "[5] B. Demsky and M. Rinard. Automatic detection and repair of errors in data structures. ACM SIGPLAN Notices, 38(11):78-95, 2003." }, "id" : { "@value" : "doi_________::5a28f750b5c6e22991fde60aeb5dee41", "@type" : "openaire", "@trustLevel" : "0.69021076" } }, { "@position" : "7", "rawText" : { "$" : "[6] Y. Izrailevsky and A. Tseitlin. The Netflix simian army. http://techblog.netflix.com/ 2011/07/netflix-simian-army.html, 2011." } }, { "@position" : "8", "rawText" : { "$" : "[7] Z. T. Kalbarczyk, R. K. Iyer, S. Bagchi, and K. Whisnant. Chameleon: A software infrastructure for adaptive fault tolerance. IEEE Transactions on Parallel and Distributed Systems, 10(6):560-579, 1999." } }, { "@position" : "9", "rawText" : { "$" : "[8] C. Lewis and J. Whitehead. Repairing games at runtime or, how we learned to stop worrying and love emergence. IEEE Software, 28(5), 2011." } }, { "@position" : "10", "rawText" : { "$" : "[13] B. Randell. System structure for software fault tolerance. IEEE Transactions on Software Engineering, SE-1(2):220 -232, june 1975." }, "id" : { "@value" : "doi_________::265e575335f9998cf7b95357b2904db2", "@type" : "openaire", "@trustLevel" : "0.7037726" } }, { "@position" : "11", "rawText" : { "$" : "[14] E. S. Raymond et al. The jargon file. http: //catb.org/jargon/, last accessed Jan. 2014, -." } }, { "@position" : "12", "rawText" : { "$" : "[15] M. Shaw. Self-healing: softening precision to avoid brittleness. In Proceedings of the first workshop on self-healing systems, 2002." } }, { "@position" : "13", "rawText" : { "$" : "[16] N. N. Taled. Antifragile. Random House, 2012." } }, { "@position" : "14", "rawText" : { "$" : "[17] A. Tseitlin. The antifragile organization. Commun. ACM, 56(8):40-44, Aug. 2013." }, "id" : { "@value" : "doi_________::e65ddf7ac5ab9367cc1fd3de2837cda3", "@type" : "openaire", "@trustLevel" : "0.71158093" } }, { "@position" : "15", "rawText" : { "$" : "[9] M. E. Locasto, S. Sidiroglou, and A. D. Keromytis. Software self-healing using collab- [19] G. M. Weinberg. The psychology of computer orative application communities. In Proceedings programming. Van Nostrand Reinhold New of the Symposium on Network and Distributed York, 1971. Systems Security, 2006." } } ] } } ] } } }, { "header" : { "dri:objIdentifier" : { "$" : "doi_dedup___::2e5785727700768d4f44863834b9cf63" }, "dri:dateOfCollection" : { "$" : "2025-12-20T13:46:41.988015132" }, "dri:dateOfTransformation" : null }, "metadata" : { "oaf:entity" : { "@xsi:schemaLocation" : "http://namespace.openaire.eu/oaf https://www.openaire.eu/schema/1.0/oaf-1.0.xsd", "oaf:result" : { "collectedfrom" : [ { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" } ], "originalId" : [ { "$" : "50|datacite____::2e5785727700768d4f44863834b9cf63" }, { "$" : "10.48550/arxiv.2511.12274" }, { "$" : "50|od________18::4bcaaffad4affbda3dfee7c1ccea1fda" }, { "$" : "oai:arXiv.org:2511.12274" } ], "pid" : [ { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.48550/arxiv.2511.12274" }, { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : 2511.12274 } ], "measure" : [ { "@id" : "influence", "@score" : "2.5152056E-9", "@class" : "C5" }, { "@id" : "popularity", "@score" : "2.8097327E-9", "@class" : "C5" }, { "@id" : "influence_alt", "@score" : "0", "@class" : "C5" }, { "@id" : "popularity_alt", "@score" : "0.0", "@class" : "C5" }, { "@id" : "impulse", "@score" : "0", "@class" : "C5" } ], "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "Software Supply Chain Security of Web3" }, "bestaccessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "creator" : { "@rank" : "1", "@name" : "Martin", "@surname" : "Monperrus", "$" : "Monperrus, Martin" }, "dateofacceptance" : { "$" : "2025-01-01" }, "description" : { "$" : "Web3 applications, built on blockchain technology, manage billions of dollars in digital assets through decentralized applications (dApps) and smart contracts. These systems rely on complex, software supply chains that introduce significant security vulnerabilities. This paper examines the software supply chain security challenges unique to the Web3 ecosystem, where traditional Web2 software supply chain problems intersect with the immutable and high-stakes nature of blockchain technology. We analyze the threat landscape and propose mitigation strategies to strengthen the security posture of Web3 systems." }, "embargoenddate" : { "$" : "2025-01-01" }, "subject" : [ { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "$" : "Software Engineering (cs.SE)" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "$" : "FOS: Computer and information sciences" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "Cryptography and Security" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "Software Engineering" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "$" : "Cryptography and Security (cs.CR)" } ], "language" : { "@classid" : "und", "@classname" : "Undetermined", "@schemeid" : "dnet:languages", "@schemename" : "dnet:languages" }, "relevantdate" : [ { "@classid" : "submitted", "@classname" : "submitted", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2025-11-15" }, { "@classid" : "updated", "@classname" : "updated", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2025-11-18" }, { "@classid" : "available", "@classname" : "available", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2025-01-01" }, { "@classid" : "issued", "@classname" : "issued", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2025-01-01" } ], "publisher" : { "$" : "arXiv" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "resourcetype" : { "@classid" : "UNKNOWN", "@classname" : "UNKNOWN", "@schemeid" : "dnet:dataCite_resource", "@schemename" : "dnet:dataCite_resource" }, "datainfo" : { "inferred" : { "$" : true }, "deletedbyinference" : { "$" : false }, "trust" : { "$" : "0.8" }, "inferenceprovenance" : { "$" : "dedup-result-decisiontree-v4" }, "provenanceaction" : { "@classid" : "sysimport:dedup", "@classname" : "Inferred by OpenAIRE", "@schemeid" : "dnet:provenanceActions", "@schemename" : "dnet:provenanceActions" } }, "rels" : null, "children" : { "result" : [ { "@objidentifier" : "doi_________::2e5785727700768d4f44863834b9cf63", "description" : { "$" : "Web3 applications, built on blockchain technology, manage billions of dollars in digital assets through decentralized applications (dApps) and smart contracts. These systems rely on complex, software supply chains that introduce significant security vulnerabilities. This paper examines the software supply chain security challenges unique to the Web3 ecosystem, where traditional Web2 software supply chain problems intersect with the immutable and high-stakes nature of blockchain technology. We an" }, "dateofacceptance" : { "$" : "2025-01-01" }, "creator" : { "$" : "Monperrus, Martin" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.48550/arxiv.2511.12274" }, "publisher" : { "$" : "arXiv" }, "instance" : { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "dateofacceptance" : { "$" : "2025-01-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "arXiv Non-Exclusive Distribution" }, "url" : { "$" : "https://dx.doi.org/10.48550/arxiv.2511.12274" }, "webresource" : { "url" : { "$" : "https://dx.doi.org/10.48550/arxiv.2511.12274" } } }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "collectedfrom" : { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "Software Supply Chain Security of Web3" } }, { "@objidentifier" : "arXiv_______::c35aedc179c5decdd41bcf9c09d9bcd6", "description" : { "$" : "Web3 applications, built on blockchain technology, manage billions of dollars in digital assets through decentralized applications (dApps) and smart contracts. These systems rely on complex, software supply chains that introduce significant security vulnerabilities. This paper examines the software supply chain security challenges unique to the Web3 ecosystem, where traditional Web2 software supply chain problems intersect with the immutable and high-stakes nature of blockchain technology. We an" }, "instance" : { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "dateofacceptance" : { "$" : "2025-11-15" }, "instancetype" : { "@classid" : "0016", "@classname" : "Preprint", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "http://arxiv.org/abs/2511.12274" }, "webresource" : { "url" : { "$" : "http://arxiv.org/abs/2511.12274" } } }, "collectedfrom" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "creator" : { "$" : "Monperrus, Martin" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "dateofacceptance" : { "$" : "2025-11-15" }, "pid" : { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : 2511.12274 }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "Software Supply Chain Security of Web3" } } ], "instance" : [ { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "dateofacceptance" : { "$" : "2025-01-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.48550/arxiv.2511.12274" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "arXiv Non-Exclusive Distribution" }, "webresource" : { "url" : { "$" : "https://doi.org/10.48550/arxiv.2511.12274" } } }, { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "hostedby" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "dateofacceptance" : { "$" : "2025-11-15" }, "instancetype" : { "@classid" : "0016", "@classname" : "Preprint", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "pid" : { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : 2511.12274 }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "webresource" : { "url" : { "$" : "http://arxiv.org/abs/2511.12274" } } } ] } } } } }, { "header" : { "dri:objIdentifier" : { "$" : "a9ac50f576aa::60220ed87186ceac5387a18a7e788199" }, "dri:dateOfCollection" : { "$" : "2025-12-20T13:45:00.950801611" }, "dri:dateOfTransformation" : { "$" : "2025-05-01T04:32:02.036Z" } }, "metadata" : { "oaf:entity" : { "@xsi:schemaLocation" : "http://namespace.openaire.eu/oaf https://www.openaire.eu/schema/1.0/oaf-1.0.xsd", "oaf:result" : { "collectedfrom" : { "@name" : "Hal", "@id" : "openaire____::39e33d59918c2cb40d10ae244f1fe019" }, "originalId" : [ { "$" : "oai:HAL:hal-01956501v6" }, { "$" : "50|a9ac50f576aa::60220ed87186ceac5387a18a7e788199" } ], "measure" : [ { "@id" : "influence", "@score" : "2.5152056E-9", "@class" : "C5" }, { "@id" : "popularity", "@score" : "1.0586096E-9", "@class" : "C5" }, { "@id" : "influence_alt", "@score" : "0", "@class" : "C5" }, { "@id" : "popularity_alt", "@score" : "0.0", "@class" : "C5" }, { "@id" : "impulse", "@score" : "0", "@class" : "C5" } ], "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "The Living Review on Automated Program Repair" }, "bestaccessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "creator" : { "@rank" : "1", "@name" : "Martin", "@surname" : "Monperrus", "@orcid_pending" : "0000-0003-3505-3383", "$" : "Monperrus, Martin" }, "contributor" : { "$" : "Monperrus, Martin" }, "dateofacceptance" : { "$" : "2018-01-01" }, "description" : { "$" : "Concept This paper is a living review on automatic program repair 1. Compared to a traditional survey, a living review evolves over time. I use a concise bullet-list style meant to be easily accessible by the greatest number of readers, in particular students and practitioners. Within a section, all papers are ordered in a reverse chronological order, so as to easily get the research timeline. The references are sorted chronologically and years are explicitly stated inline to easily grasp the most recent references. Inclusion criteria The inclusion criteria are that the considered papers 1) must be about automatic repair with some kind of patch generation (runtime repair without patch generation is excluded 2); 2) must contain a reasonable amount of material (at least 4 double-column pages); 3) are stored on an durable site (notable publisher, arXiv, Zenodo). There is no restriction about whether the paper has been formally peer-reviewed or not. Originality Compared to formal surveys [132, 125], this living review contains very recent references and continues to evolve. It uses a bullet-list concise style that is not typical academic writing. Notification To get notified with new versions, click here. Feedback Do not hesitate to report a mistake, a confusing statement or a missing paper," }, "subject" : { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "[INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE]" }, "language" : { "@classid" : "eng", "@classname" : "English", "@schemeid" : "dnet:languages", "@schemename" : "dnet:languages" }, "relevantdate" : [ { "@classid" : "UNKNOWN", "@classname" : "UNKNOWN", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2023-09-12" }, { "@classid" : "updated", "@classname" : "updated", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2023-09-14" }, { "@classid" : "available", "@classname" : "available", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2023-09-13" }, { "@classid" : "issued", "@classname" : "issued", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2018-01-01" } ], "format" : { "$" : "application/pdf" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "resourcetype" : { "@classid" : "technical report", "@classname" : "technical report", "@schemeid" : "dnet:dataCite_resource", "@schemename" : "dnet:dataCite_resource" }, "isgreen" : { "$" : true }, "isindiamondjournal" : { "$" : false }, "publiclyfunded" : { "$" : false }, "context" : { "@id" : "uarctic", "@label" : "UArctic", "@type" : "ri" }, "datainfo" : { "inferred" : { "$" : false }, "deletedbyinference" : { "$" : false }, "trust" : { "$" : "0.9" }, "inferenceprovenance" : { "$" : "null" }, "provenanceaction" : { "@classid" : "sysimport:crosswalk:repository", "@classname" : "Harvested", "@schemeid" : "dnet:provenanceActions", "@schemename" : "dnet:provenanceActions" } }, "rels" : { "rel" : { "@inferred" : true, "@trust" : "0.8944271909999159", "@inferenceprovenance" : "openaire:affiliation:graph", "@provenanceaction" : "result:organization:openaireinference", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "openorgs____::7501d66d2297a963ebfb075c43fff88e" }, "legalname" : { "$" : "Royal Institute of Technology" }, "legalshortname" : { "$" : "KTH" }, "country" : { "@classid" : "SE", "@classname" : "Sweden", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "websiteurl" : { "$" : "http://www.kth.se/en" } } }, "children" : { "instance" : { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : { "@name" : "Hal", "@id" : "openaire____::39e33d59918c2cb40d10ae244f1fe019" }, "hostedby" : { "@name" : "Hal", "@id" : "openaire____::39e33d59918c2cb40d10ae244f1fe019" }, "dateofacceptance" : { "$" : "2018-01-01" }, "instancetype" : { "@classid" : "0009", "@classname" : "External research report", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "webresource" : { "url" : { "$" : "https://hal.science/hal-01956501v6" } } } } } } } }, { "header" : { "dri:objIdentifier" : { "$" : "doi_dedup___::77d423a71d2d28a3680d23ae4cff9f04" }, "dri:dateOfCollection" : { "$" : "2025-12-20T13:44:03.939135600" }, "dri:dateOfTransformation" : null }, "metadata" : { "oaf:entity" : { "@xsi:schemaLocation" : "http://namespace.openaire.eu/oaf https://www.openaire.eu/schema/1.0/oaf-1.0.xsd", "oaf:result" : { "collectedfrom" : { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, "originalId" : [ { "$" : "50|datacite____::77d423a71d2d28a3680d23ae4cff9f04" }, { "$" : "10.5281/zenodo.14885766" }, { "$" : "50|datacite____::a8721f186ca0a6f2951b120adc3b7713" }, { "$" : "10.5281/zenodo.14885765" } ], "pid" : [ { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.5281/zenodo.14885766" }, { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.5281/zenodo.14885765" } ], "measure" : [ { "@id" : "influence", "@score" : "2.5152056E-9", "@class" : "C5" }, { "@id" : "popularity", "@score" : "2.8097327E-9", "@class" : "C5" }, { "@id" : "influence_alt", "@score" : "0", "@class" : "C5" }, { "@id" : "popularity_alt", "@score" : "0.0", "@class" : "C5" }, { "@id" : "impulse", "@score" : "0", "@class" : "C5" } ], "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "Most Cited Papers in Software Engineering 2013-2023" }, "bestaccessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "creator" : { "@rank" : "1", "@name" : "Martin", "@surname" : "Monperrus", "@orcid_pending" : "0000-0003-3505-3383", "$" : "Monperrus, Martin" }, "dateofacceptance" : { "$" : "2025-02-18" }, "description" : { "$" : "This compilation presents a list of the most cited research papers in software engineering from 2013 to 2023, published in leading academic venues. By leveraging APIs from CrossRef and Semantic Scholar, we systematically gather and rank influential works based on citation metrics, providing a valuable resource for researchers, educators, and industry professionals to understand the field. This document can also serve for individuals to strengthen their academic credits with impact facts. Full bibliometric data is accessible in the accompanying repository.  @techreport{mostcitedse20132023,  title= {Most Cited Papers in Software Engineering 2013-2023},  author= {Martin Monperrus},  year = {2025},  number = {14885766},  institution = {Zenodo},  url = {https://zenodo.org/records/14885766/files/main.pdf},  doi = {https://doi.org/10.5281/zenodo.14885765}}" }, "language" : { "@classid" : "und", "@classname" : "Undetermined", "@schemeid" : "dnet:languages", "@schemename" : "dnet:languages" }, "relevantdate" : { "@classid" : "issued", "@classname" : "issued", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2025-02-18" }, "publisher" : { "$" : "Zenodo" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "resourcetype" : { "@classid" : "UNKNOWN", "@classname" : "UNKNOWN", "@schemeid" : "dnet:dataCite_resource", "@schemename" : "dnet:dataCite_resource" }, "isgreen" : { "$" : false }, "isindiamondjournal" : { "$" : false }, "publiclyfunded" : { "$" : false }, "context" : [ { "@id" : "eosc", "@label" : "EOSC", "@type" : "ri" }, { "@id" : "uarctic", "@label" : "UArctic", "@type" : "ri" } ], "datainfo" : { "inferred" : { "$" : true }, "deletedbyinference" : { "$" : false }, "trust" : { "$" : "0.8" }, "inferenceprovenance" : { "$" : "dedup-result-decisiontree-v4" }, "provenanceaction" : { "@classid" : "sysimport:dedup", "@classname" : "Inferred by OpenAIRE", "@schemeid" : "dnet:provenanceActions", "@schemename" : "dnet:provenanceActions" } }, "rels" : { "rel" : { "@inferred" : true, "@trust" : "1.0", "@inferenceprovenance" : "openaire:affiliation:datacite", "@provenanceaction" : "result:organization:openaireinference", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "openorgs____::7501d66d2297a963ebfb075c43fff88e" }, "legalname" : { "$" : "Royal Institute of Technology" }, "legalshortname" : { "$" : "KTH" }, "country" : { "@classid" : "SE", "@classname" : "Sweden", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "websiteurl" : { "$" : "http://www.kth.se/en" } } }, "children" : { "result" : [ { "@objidentifier" : "doi_________::77d423a71d2d28a3680d23ae4cff9f04", "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "Most Cited Papers in Software Engineering 2013-2023" }, "instance" : { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "ZENODO", "@id" : "opendoar____::358aee4cc897452c00244351e4d91f69" }, "dateofacceptance" : { "$" : "2025-02-18" }, "instancetype" : { "@classid" : "0016", "@classname" : "Preprint", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "CC BY" }, "url" : { "$" : "https://dx.doi.org/10.5281/zenodo.14885766" }, "webresource" : { "url" : { "$" : "https://dx.doi.org/10.5281/zenodo.14885766" } } }, "description" : { "$" : "This compilation presents a list of the most cited research papers in software engineering from 2013 to 2023, published in leading academic venues. By leveraging APIs from CrossRef and Semantic Scholar, we systematically gather and rank influential works based on citation metrics, providing a valuable resource for researchers, educators, and industry professionals to understand the field. This document can also serve for individuals to strengthen their academic credits with impact facts. Full bi" }, "publisher" : { "$" : "Zenodo" }, "dateofacceptance" : { "$" : "2025-02-18" }, "creator" : { "$" : "Monperrus, Martin" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.5281/zenodo.14885766" }, "collectedfrom" : { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" } }, { "@objidentifier" : "doi_________::a8721f186ca0a6f2951b120adc3b7713", "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "Most Cited Papers in Software Engineering 2013-2023" }, "description" : { "$" : "This compilation presents a list of the most cited research papers in software engineering from 2013 to 2023, published in leading academic venues. By leveraging APIs from CrossRef and Semantic Scholar, we systematically gather and rank influential works based on citation metrics, providing a valuable resource for researchers, educators, and industry professionals to understand the field. This document can also serve for individuals to strengthen their academic credits with impact facts. Full bi" }, "publisher" : { "$" : "Zenodo" }, "dateofacceptance" : { "$" : "2025-02-18" }, "creator" : { "$" : "Monperrus, Martin" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.5281/zenodo.14885765" }, "collectedfrom" : { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, "instance" : { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "ZENODO", "@id" : "opendoar____::358aee4cc897452c00244351e4d91f69" }, "dateofacceptance" : { "$" : "2025-02-18" }, "instancetype" : { "@classid" : "0016", "@classname" : "Preprint", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "CC BY" }, "url" : { "$" : "https://dx.doi.org/10.5281/zenodo.14885765" }, "webresource" : { "url" : { "$" : "https://dx.doi.org/10.5281/zenodo.14885765" } } } } ], "instance" : [ { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, "hostedby" : { "@name" : "ZENODO", "@id" : "opendoar____::358aee4cc897452c00244351e4d91f69" }, "dateofacceptance" : { "$" : "2025-02-18" }, "instancetype" : { "@classid" : "0016", "@classname" : "Preprint", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.5281/zenodo.14885766" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "CC BY" }, "webresource" : { "url" : { "$" : "https://doi.org/10.5281/zenodo.14885766" } } }, { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, "hostedby" : { "@name" : "ZENODO", "@id" : "opendoar____::358aee4cc897452c00244351e4d91f69" }, "dateofacceptance" : { "$" : "2025-02-18" }, "instancetype" : { "@classid" : "0016", "@classname" : "Preprint", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.5281/zenodo.14885765" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "CC BY" }, "webresource" : { "url" : { "$" : "https://doi.org/10.5281/zenodo.14885765" } } } ] } } } } }, { "header" : { "dri:objIdentifier" : { "$" : "doi_dedup___::7f1cf953584ddd360f75fc96d35bf580" }, "dri:dateOfCollection" : { "$" : "2025-12-20T13:46:44.435629102" }, "dri:dateOfTransformation" : null }, "metadata" : { "oaf:entity" : { "@xsi:schemaLocation" : "http://namespace.openaire.eu/oaf https://www.openaire.eu/schema/1.0/oaf-1.0.xsd", "oaf:result" : { "collectedfrom" : [ { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, { "@name" : "UnpayWall", "@id" : "openaire____::8ac8380272269217cb09a928c8caa993" }, { "@name" : "Crossref", "@id" : "openaire____::081b82f96300b6a6e3d282bad31cb6e2" }, { "@name" : "Microsoft Academic Graph", "@id" : "openaire____::5f532a3fc4f1ea403f37070f59a7a53a" }, { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" } ], "originalId" : [ { "$" : "10.1109/botse.2019.00010" }, { "$" : "50|doiboost____|7f1cf953584ddd360f75fc96d35bf580" }, { "$" : "50|datacite____::824756684c9b381a8edebc0f39995e6e" }, { "$" : "10.48550/arxiv.1905.02597" }, { "$" : "50|od________18::e2ba51ec21b14cade5c2fb795524c853" }, { "$" : "oai:arXiv.org:1905.02597" }, { "$" : "2944697551" }, { "$" : "3103028135" } ], "pid" : [ { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1109/botse.2019.00010" }, { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.48550/arxiv.1905.02597" }, { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : 1905.02597 } ], "measure" : [ { "@id" : "influence", "@score" : "5.3578093E-9", "@class" : "C4" }, { "@id" : "popularity", "@score" : "2.2085546E-8", "@class" : "C4" }, { "@id" : "influence_alt", "@score" : "36", "@class" : "C4" }, { "@id" : "popularity_alt", "@score" : "9.225216", "@class" : "C4" }, { "@id" : "impulse", "@score" : "23", "@class" : "C4" } ], "title" : [ { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "Explainable Software Bot Contributions: Case Study of Automated Bug Fixes" }, { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "explainable software bot contributions case study of automated bug fixes" } ], "bestaccessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "creator" : { "@rank" : "1", "@name" : "Martin", "@surname" : "Monperrus", "@orcid" : "0000-0003-3505-3383", "$" : "Monperrus, Martin" }, "dateofacceptance" : { "$" : "2019-05-01" }, "description" : { "$" : "In a software project, esp. in open-source, a contribution is a valuable piece of work made to the project: writing code, reporting bugs, translating, improving documentation, creating graphics, etc. We are now at the beginning of an exciting era where software bots will make contributions that are of similar nature than those by humans. Dry contributions, with no explanation, are often ignored or rejected, because the contribution is not understandable per se, because they are not put into a larger context, because they are not grounded on idioms shared by the core community of developers. We have been operating a program repair bot called Repairnator for 2 years and noticed the problem of \"dry patches\": a patch that does not say which bug it fixes, or that does not explain the effects of the patch on the system. We envision program repair systems that produce an \"explainable bug fix\": an integrated package of at least 1) a patch, 2) its explanation in natural or controlled language, and 3) a highlight of the behavioral difference with examples. In this paper, we generalize and suggest that software bot contributions must explainable, that they must be put into the context of the global software development conversation." }, "embargoenddate" : { "$" : "2019-01-01" }, "subject" : [ { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "$" : "Software Engineering (cs.SE)" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "$" : "FOS: Computer and information sciences" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "Computer Science - Software Engineering" }, { "@classid" : "FOS", "@classname" : "Fields of Science and Technology classification", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : true, "@inferenceprovenance" : "update", "@provenanceaction" : "subject:fos", "$" : "0202 electrical engineering, electronic engineering, information engineering" }, { "@classid" : "FOS", "@classname" : "Fields of Science and Technology classification", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : true, "@inferenceprovenance" : "update", "@provenanceaction" : "subject:fos", "$" : "02 engineering and technology" } ], "language" : { "@classid" : "und", "@classname" : "Undetermined", "@schemeid" : "dnet:languages", "@schemename" : "dnet:languages" }, "relevantdate" : [ { "@classid" : "created", "@classname" : "created", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2019-09-05" }, { "@classid" : "published-print", "@classname" : "published-print", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2019-05-01" }, { "@classid" : "submitted", "@classname" : "submitted", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2019-05-07" }, { "@classid" : "updated", "@classname" : "updated", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2019-06-20" }, { "@classid" : "available", "@classname" : "available", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2019-01-01" }, { "@classid" : "issued", "@classname" : "issued", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2019-01-01" } ], "publisher" : { "$" : "IEEE" }, "source" : { "$" : "Crossref" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "resourcetype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "isgreen" : { "$" : true }, "isindiamondjournal" : { "$" : false }, "publiclyfunded" : { "$" : false }, "journal" : { "$" : "2019 IEEE/ACM 1st International Workshop on Bots in Software Engineering (BotSE)" }, "context" : { "@id" : "uarctic", "@label" : "UArctic", "@type" : "ri" }, "datainfo" : { "inferred" : { "$" : true }, "deletedbyinference" : { "$" : false }, "trust" : { "$" : "0.8" }, "inferenceprovenance" : { "$" : "dedup-result-decisiontree-v4" }, "provenanceaction" : { "@classid" : "sysimport:dedup", "@classname" : "Inferred by OpenAIRE", "@schemeid" : "dnet:provenanceActions", "@schemename" : "dnet:provenanceActions" } }, "rels" : { "rel" : [ { "@inferred" : true, "@trust" : "1.0", "@inferenceprovenance" : "openaire:affiliation:rawaff", "@provenanceaction" : "result:organization:openaireinference", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "openorgs____::7501d66d2297a963ebfb075c43fff88e" }, "legalname" : { "$" : "Royal Institute of Technology" }, "legalshortname" : { "$" : "KTH" }, "country" : { "@classid" : "SE", "@classname" : "Sweden", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "websiteurl" : { "$" : "http://www.kth.se/en" } }, { "@inferred" : true, "@trust" : "0.72", "@inferenceprovenance" : "iis::document_software_url", "@provenanceaction" : "iis", "to" : { "@class" : "IsRelatedTo", "@scheme" : "dnet:result_result_relations", "@type" : "software", "$" : "openaire____::f89a58b5886b46b6250f9df81ee99e69" }, "collectedfrom" : [ { "@name" : "Software Heritage", "@id" : "openaire____::dbfd07503aaa1ed31beed7dec942f3f4" }, { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" } ], "description" : { "$" : "Odoo. Open Source Apps To Grow Your Business." }, "instance" : [ { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/odoo/odoo" }, "webresource" : { "url" : { "$" : "https://github.com/odoo/odoo" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Software Heritage", "@id" : "openaire____::dbfd07503aaa1ed31beed7dec942f3f4" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/odoo/odoo" }, "webresource" : { "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/odoo/odoo" } } } ], "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "odoo software on GitHub" }, "resulttype" : { "@classid" : "software", "@classname" : "software", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" } }, { "@inferred" : true, "@trust" : "0.72", "@inferenceprovenance" : "iis::document_software_url", "@provenanceaction" : "iis", "to" : { "@class" : "IsRelatedTo", "@scheme" : "dnet:result_result_relations", "@type" : "software", "$" : "dedup_wf_002::920f25694682b60d03f52ac2966e4cdb" }, "instance" : [ { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Software Heritage", "@id" : "openaire____::dbfd07503aaa1ed31beed7dec942f3f4" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/nemo8130/Chromnum" }, "webresource" : { "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/nemo8130/Chromnum" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/chromium/chromium/commit/673ce95d481ea9368c4d4d43ac756ba1d6d9e608" }, "webresource" : { "url" : { "$" : "https://github.com/chromium/chromium/commit/673ce95d481ea9368c4d4d43ac756ba1d6d9e608" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/chromium/chromium" }, "webresource" : { "url" : { "$" : "https://github.com/chromium/chromium" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/chromium/chromium/blob/master/components/variations/net" }, "webresource" : { "url" : { "$" : "https://github.com/chromium/chromium/blob/master/components/variations/net" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/chromium/chromium/blob/7073a66a6f227ed904b53c353d1340e4a322f3f2/sandbox/constants.h" }, "webresource" : { "url" : { "$" : "https://github.com/chromium/chromium/blob/7073a66a6f227ed904b53c353d1340e4a322f3f2/sandbox/constants.h" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Software Heritage", "@id" : "openaire____::dbfd07503aaa1ed31beed7dec942f3f4" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/chromium/chromium" }, "webresource" : { "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/chromium/chromium" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/nemo8130/Chromnum" }, "webresource" : { "url" : { "$" : "https://github.com/nemo8130/Chromnum" } } } ], "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "chromium software on GitHub" }, "collectedfrom" : [ { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, { "@name" : "Software Heritage", "@id" : "openaire____::dbfd07503aaa1ed31beed7dec942f3f4" } ], "description" : { "$" : "Chromatic Number of a graph: The minimal number of non-degenerate set of colors by which all nodes of a 'undirected' graph is colorable, such that no two adjascent nodes share the same color." }, "resulttype" : { "@classid" : "software", "@classname" : "software", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" } }, { "@inferred" : true, "@trust" : "0.72", "@inferenceprovenance" : "iis::document_software_url", "@provenanceaction" : "iis", "to" : { "@class" : "IsRelatedTo", "@scheme" : "dnet:result_result_relations", "@type" : "software", "$" : "openaire____::17fcd025b0654fdf492509be97fc8e76" }, "collectedfrom" : [ { "@name" : "Software Heritage", "@id" : "openaire____::dbfd07503aaa1ed31beed7dec942f3f4" }, { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" } ], "instance" : [ { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/torvalds/linux" }, "webresource" : { "url" : { "$" : "https://github.com/torvalds/linux" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Software Heritage", "@id" : "openaire____::dbfd07503aaa1ed31beed7dec942f3f4" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/torvalds/linux" }, "webresource" : { "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/torvalds/linux" } } } ], "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "linux software on GitHub" }, "resulttype" : { "@classid" : "software", "@classname" : "software", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "description" : { "$" : "Linux kernel source tree" } }, { "@inferred" : true, "@trust" : "0.72", "@inferenceprovenance" : "iis::document_software_url", "@provenanceaction" : "iis", "to" : { "@class" : "IsRelatedTo", "@scheme" : "dnet:result_result_relations", "@type" : "software", "$" : "openaire____::d83912cff0cef1d20a48c3879ab1bb41" }, "instance" : [ { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/Homebrew/homebrew-core" }, "webresource" : { "url" : { "$" : "https://github.com/Homebrew/homebrew-core" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Software Heritage", "@id" : "openaire____::dbfd07503aaa1ed31beed7dec942f3f4" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/homebrew/homebrew-core" }, "webresource" : { "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/homebrew/homebrew-core" } } } ], "collectedfrom" : [ { "@name" : "Software Heritage", "@id" : "openaire____::dbfd07503aaa1ed31beed7dec942f3f4" }, { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" } ], "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "homebrew-core software on GitHub" }, "resulttype" : { "@classid" : "software", "@classname" : "software", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" } }, { "@inferred" : true, "@trust" : "0.72", "@inferenceprovenance" : "iis::document_software_url", "@provenanceaction" : "iis", "to" : { "@class" : "IsRelatedTo", "@scheme" : "dnet:result_result_relations", "@type" : "software", "$" : "dedup_wf_002::fe15788d05c02940749bb3e979e5e3ec" }, "instance" : [ { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Software Heritage", "@id" : "openaire____::dbfd07503aaa1ed31beed7dec942f3f4" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/WebKit/WebKit" }, "webresource" : { "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/WebKit/WebKit" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/WebKit/webkit/tree/master/PerformanceTests/JetStream2" }, "webresource" : { "url" : { "$" : "https://github.com/WebKit/webkit/tree/master/PerformanceTests/JetStream2" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/WebKit/webkit/blob/master/Source/WebCore/html" }, "webresource" : { "url" : { "$" : "https://github.com/WebKit/webkit/blob/master/Source/WebCore/html" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/WebKit/webkit/tree/master/Source/JavaScriptCore" }, "webresource" : { "url" : { "$" : "https://github.com/WebKit/webkit/tree/master/Source/JavaScriptCore" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/stasinopoulos/webkit/commit/557d41ba23781cd53" }, "webresource" : { "url" : { "$" : "https://github.com/stasinopoulos/webkit/commit/557d41ba23781cd53" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/WebKit/WebKit" }, "webresource" : { "url" : { "$" : "https://github.com/WebKit/WebKit" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Software Heritage", "@id" : "openaire____::dbfd07503aaa1ed31beed7dec942f3f4" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/stasinopoulos/webkit" }, "webresource" : { "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/stasinopoulos/webkit" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/WebKit/WebKit/tree/main/PerformanceTests/SunSpider/tests/sunspider-1.0.2" }, "webresource" : { "url" : { "$" : "https://github.com/WebKit/WebKit/tree/main/PerformanceTests/SunSpider/tests/sunspider-1.0.2" } } } ], "collectedfrom" : [ { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, { "@name" : "Software Heritage", "@id" : "openaire____::dbfd07503aaa1ed31beed7dec942f3f4" } ], "description" : { "$" : "An open source web browser engine." }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "webkit software on GitHub" }, "resulttype" : { "@classid" : "software", "@classname" : "software", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" } }, { "@inferred" : true, "@trust" : "0.72", "@inferenceprovenance" : "iis::document_software_url", "@provenanceaction" : "iis", "to" : { "@class" : "IsRelatedTo", "@scheme" : "dnet:result_result_relations", "@type" : "software", "$" : "openaire____::e8c5b50b798572a41cb1c6fea214a49b" }, "instance" : [ { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Software Heritage", "@id" : "openaire____::dbfd07503aaa1ed31beed7dec942f3f4" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/LibreOffice/core" }, "webresource" : { "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/LibreOffice/core" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/LibreOffice/core" }, "webresource" : { "url" : { "$" : "https://github.com/LibreOffice/core" } } } ], "collectedfrom" : [ { "@name" : "Software Heritage", "@id" : "openaire____::dbfd07503aaa1ed31beed7dec942f3f4" }, { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" } ], "description" : { "$" : "Read-only LibreOffice core repo - no pull request (use gerrit instead <a href=\"https://gerrit.libreoffice.org/\" rel=\"nofollow\">https://gerrit.libreoffice.org/</a>) - don't download zip, use <a href=\"https://dev-www.libreoffice.org/bundles/\" rel=\"nofollow\">https://dev-www.libreoffice.org/bundles/</a> instead" }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "core software on GitHub" }, "resulttype" : { "@classid" : "software", "@classname" : "software", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" } }, { "@inferred" : true, "@trust" : "0.72", "@inferenceprovenance" : "iis::document_software_url", "@provenanceaction" : "iis", "to" : { "@class" : "IsRelatedTo", "@scheme" : "dnet:result_result_relations", "@type" : "software", "$" : "dedup_wf_002::4225fe81ca0cef36cf38c8583fdfa944" }, "collectedfrom" : [ { "@name" : "Software Heritage", "@id" : "openaire____::dbfd07503aaa1ed31beed7dec942f3f4" }, { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" } ], "instance" : [ { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/NixOS/nixpkgs/issues/6567" }, "webresource" : { "url" : { "$" : "https://github.com/NixOS/nixpkgs/issues/6567" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Software Heritage", "@id" : "openaire____::dbfd07503aaa1ed31beed7dec942f3f4" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/nixos/nixpkgs" }, "webresource" : { "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/nixos/nixpkgs" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/NixOS/nixpkgs/tree/master/nixos/tests" }, "webresource" : { "url" : { "$" : "https://github.com/NixOS/nixpkgs/tree/master/nixos/tests" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/NixOS/nixpkgs" }, "webresource" : { "url" : { "$" : "https://github.com/NixOS/nixpkgs" } } } ], "resulttype" : { "@classid" : "software", "@classname" : "software", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "nixpkgs software on GitHub" } }, { "@inferred" : true, "@trust" : "0.72", "@inferenceprovenance" : "iis::document_software_url", "@provenanceaction" : "iis", "to" : { "@class" : "IsRelatedTo", "@scheme" : "dnet:result_result_relations", "@type" : "software", "$" : "dedup_wf_002::61b8a7dd8503b435372f1af8fe71d3c1" }, "instance" : [ { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Software Heritage", "@id" : "openaire____::dbfd07503aaa1ed31beed7dec942f3f4" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/mozilla/gecko-dev" }, "webresource" : { "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/mozilla/gecko-dev" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/mozilla/gecko-dev/tree/5d30f398bd39d63e9938165f9def84e2218c8589" }, "webresource" : { "url" : { "$" : "https://github.com/mozilla/gecko-dev/tree/5d30f398bd39d63e9938165f9def84e2218c8589" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://web.archive.org/web/20200523100411/https://github.com/mozilla/gecko-dev" }, "webresource" : { "url" : { "$" : "https://web.archive.org/web/20200523100411/https://github.com/mozilla/gecko-dev" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/mozilla/gecko-dev/commit" }, "webresource" : { "url" : { "$" : "https://github.com/mozilla/gecko-dev/commit" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/mozilla/gecko-dev" }, "webresource" : { "url" : { "$" : "https://github.com/mozilla/gecko-dev" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/mozilla/gecko-dev/blob/a20620423a5363cf7afdac81e062bc687c29366a/xpcom/base" }, "webresource" : { "url" : { "$" : "https://github.com/mozilla/gecko-dev/blob/a20620423a5363cf7afdac81e062bc687c29366a/xpcom/base" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/nkdxczh/gecko-dev/tree/deterfox" }, "webresource" : { "url" : { "$" : "https://github.com/nkdxczh/gecko-dev/tree/deterfox" } } } ], "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "gecko-dev software on GitHub" }, "description" : { "$" : "Read-only Git mirror of the Mercurial gecko repositories at <a href=\"https://web.archive.org/web/20200523100411/https://hg.mozilla.org/\" rel=\"nofollow\">https://hg.mozilla.org</a>. How to contribute: <a href=\"https://web.archive.org/web/20200523100411/http://bit.ly/contribute-code\" rel=\"nofollow\">http://bit.ly/contribute-code</a>" }, "collectedfrom" : [ { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, { "@name" : "Software Heritage", "@id" : "openaire____::dbfd07503aaa1ed31beed7dec942f3f4" } ], "resulttype" : { "@classid" : "software", "@classname" : "software", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" } } ] }, "children" : { "result" : [ { "@objidentifier" : "doi_________::7f1cf953584ddd360f75fc96d35bf580", "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "Explainable Software Bot Contributions: Case Study of Automated Bug Fixes" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1109/botse.2019.00010" }, "instance" : [ { "accessright" : { "@classid" : "CLOSED", "@classname" : "Closed Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "dateofacceptance" : { "$" : "2019-05-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0001", "@classname" : "peerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "IEEE Copyright" }, "url" : { "$" : "https://doi.org/10.1109/botse.2019.00010" }, "webresource" : { "url" : { "$" : "https://doi.org/10.1109/botse.2019.00010" } } }, { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "http://arxiv.org/pdf/1905.02597" }, "webresource" : { "url" : { "$" : "http://arxiv.org/pdf/1905.02597" } } } ], "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "collectedfrom" : [ { "@name" : "Crossref", "@id" : "openaire____::081b82f96300b6a6e3d282bad31cb6e2" }, { "@name" : "UnpayWall", "@id" : "openaire____::8ac8380272269217cb09a928c8caa993" } ], "creator" : { "$" : "Martin Monperrus" }, "dateofacceptance" : { "$" : "2019-05-01" }, "publisher" : { "$" : "IEEE" } }, { "@objidentifier" : "arXiv_______::aab5eb5eda63904540a0f5178e637c3e", "dateofacceptance" : { "$" : "2019-05-07" }, "collectedfrom" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "creator" : { "$" : "Monperrus, Martin" }, "pid" : { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : 1905.02597 }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "instance" : { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "dateofacceptance" : { "$" : "2019-05-07" }, "instancetype" : { "@classid" : "0016", "@classname" : "Preprint", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "http://arxiv.org/abs/1905.02597" }, "webresource" : { "url" : { "$" : "http://arxiv.org/abs/1905.02597" } } }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "Explainable Software Bot Contributions: Case Study of Automated Bug Fixes" }, "description" : { "$" : "In a software project, esp. in open-source, a contribution is a valuable piece of work made to the project: writing code, reporting bugs, translating, improving documentation, creating graphics, etc. We are now at the beginning of an exciting era where software bots will make contributions that are of similar nature than those by humans. Dry contributions, with no explanation, are often ignored or rejected, because the contribution is not understandable per se, because they are not put into a la" } }, { "@objidentifier" : "doi_________::824756684c9b381a8edebc0f39995e6e", "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "Explainable Software Bot Contributions: Case Study of Automated Bug Fixes" }, "dateofacceptance" : { "$" : "2019-01-01" }, "creator" : { "$" : "Monperrus, Martin" }, "publisher" : { "$" : "arXiv" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.48550/arxiv.1905.02597" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "instance" : { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "dateofacceptance" : { "$" : "2019-01-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "arXiv Non-Exclusive Distribution" }, "url" : { "$" : "https://dx.doi.org/10.48550/arxiv.1905.02597" }, "webresource" : { "url" : { "$" : "https://dx.doi.org/10.48550/arxiv.1905.02597" } } }, "collectedfrom" : { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, "description" : { "$" : "In a software project, esp. in open-source, a contribution is a valuable piece of work made to the project: writing code, reporting bugs, translating, improving documentation, creating graphics, etc. We are now at the beginning of an exciting era where software bots will make contributions that are of similar nature than those by humans. Dry contributions, with no explanation, are often ignored or rejected, because the contribution is not understandable per se, because they are not put into a la" } } ], "instance" : [ { "accessright" : { "@classid" : "CLOSED", "@classname" : "Closed Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : [ { "@name" : "Microsoft Academic Graph", "@id" : "openaire____::5f532a3fc4f1ea403f37070f59a7a53a" }, { "@name" : "Crossref", "@id" : "openaire____::081b82f96300b6a6e3d282bad31cb6e2" } ], "hostedby" : [ { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" } ], "dateofacceptance" : { "$" : "2019-05-01" }, "instancetype" : [ { "@classid" : "0038", "@classname" : "Other literature type", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" } ], "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1109/botse.2019.00010" }, "alternateidentifier" : [ { "@classid" : "mag_id", "@classname" : "Microsoft Academic Graph Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : 2944697551 }, { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1109/botse.2019.00010" }, { "@classid" : "mag_id", "@classname" : "Microsoft Academic Graph Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : 3103028135 } ], "refereed" : { "@classid" : "0001", "@classname" : "peerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "IEEE Copyright" }, "webresource" : { "url" : { "$" : "https://doi.org/10.1109/botse.2019.00010" } } }, { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "dateofacceptance" : { "$" : "2019-01-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.48550/arxiv.1905.02597" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "arXiv Non-Exclusive Distribution" }, "webresource" : { "url" : { "$" : "https://doi.org/10.48550/arxiv.1905.02597" } } }, { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "hostedby" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "dateofacceptance" : { "$" : "2019-05-07" }, "instancetype" : { "@classid" : "0016", "@classname" : "Preprint", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "pid" : { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : 1905.02597 }, "alternateidentifier" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1109/botse.2019.00010" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "webresource" : { "url" : { "$" : "http://arxiv.org/abs/1905.02597" } } }, { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : { "@name" : "UnpayWall", "@id" : "openaire____::8ac8380272269217cb09a928c8caa993" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1109/botse.2019.00010" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "webresource" : { "url" : { "$" : "http://arxiv.org/pdf/1905.02597" } } } ] } }, "extraInfo" : [ { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "[1] L. F. Cortés-Coy, M. Linares-Vásquez, J. Aponte, and D. Poshyvanyk. On automatically generating commit messages via summarization of source code changes. In Source Code Analysis and Manipulation (SCAM), 2014 IEEE 14th International Working Conference on, pages 275-284. IEEE, 2014." } }, { "@position" : "2", "rawText" : { "$" : "[2] M. D'Ambros, M. Lanza, and R. Robbes. Commit 2.0. In Proceedings of the 1st Workshop on Web 2.0 for Software Engineering, Web2SE '10, 2010." } }, { "@position" : "3", "rawText" : { "$" : "[3] D. Gunning. Explainable artificial intelligence (xai). Defense Advanced Research Projects Agency (DARPA), 2017." } }, { "@position" : "4", "rawText" : { "$" : "[4] S. Jiang, A. Armaly, and C. McMillan. Automatically generating commit messages from diffs using neural machine translation. In Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, pages 135-146, 2017." } }, { "@position" : "5", "rawText" : { "$" : "[5] C. Lebeuf, M. Storey, and A. Zagalsky. Software bots. IEEE Software, 2018." } }, { "@position" : "6", "rawText" : { "$" : "[6] Z. Liu, X. Xia, A. E. Hassan, D. Lo, Z. Xing, and X. Wang. Neuralmachine-translation-based commit message generation: how far are we? In Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, pages 373-384. ACM, 2018." } }, { "@position" : "7", "rawText" : { "$" : "[7] P. D. Marinescu and C. Cadar. Katch: high-coverage testing of software patches. In Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, pages 235-245. ACM, 2013." }, "id" : { "@value" : "od______1032::351115435eb69e41d4927c7503d39b40", "@type" : "openaire", "@trustLevel" : "0.68238765" } }, { "@position" : "8", "rawText" : { "$" : "[8] M. Monperrus. Automatic Software Repair: a Bibliography. ACM Computing Surveys, 51:1-24, 2017." } }, { "@position" : "9", "rawText" : { "$" : "[9] M. Monperrus, S. Urli, T. Durieux, M. Martinez, B. Baudry, and L. Seinturier. Human-competitive patches in automatic program repair with repairnator. Technical Report 1810.05806, arXiv, 2018." } }, { "@position" : "10", "rawText" : { "$" : "[10] D. Shriver, S. Elbaum, and K. T. Stolee. At the end of synthesis: Narrowing program candidates. In Proceedings of the 39th International Conference on Software Engineering: New Ideas and Emerging Results Track, 2017." }, "id" : { "@value" : "doi_________::cc7433c3328f477dbdda8bb4067169f6", "@type" : "openaire", "@trustLevel" : "0.6432261" } }, { "@position" : "11", "rawText" : { "$" : "[11] S. Urli, Z. Yu, L. Seinturier, and M. Monperrus. How to Design a Program Repair Bot? Insights from the Repairnator Project. In 40th International Conference on Software Engineering, Track Software Engineering in Practice, pages 95-104, 2018." }, "id" : { "@value" : "arXiv_______::21efd1b7108aa8e985b0dec1b446e25a", "@type" : "openaire", "@trustLevel" : "0.68692446" } } ] } }, { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "[1] L. F. Cortés-Coy, M. Linares-Vásquez, J. Aponte, and D. Poshyvanyk. On automatically generating commit messages via summarization of source code changes. In Source Code Analysis and Manipulation (SCAM), 2014 IEEE 14th International Working Conference on, pages 275-284. IEEE, 2014." } }, { "@position" : "2", "rawText" : { "$" : "[2] M. D'Ambros, M. Lanza, and R. Robbes. Commit 2.0. In Proceedings of the 1st Workshop on Web 2.0 for Software Engineering, Web2SE '10, 2010." } }, { "@position" : "3", "rawText" : { "$" : "[3] D. Gunning. Explainable artificial intelligence (xai). Defense Advanced Research Projects Agency (DARPA), 2017." } }, { "@position" : "4", "rawText" : { "$" : "[4] S. Jiang, A. Armaly, and C. McMillan. Automatically generating commit messages from diffs using neural machine translation. In Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, pages 135-146, 2017." } }, { "@position" : "5", "rawText" : { "$" : "[5] C. Lebeuf, M. Storey, and A. Zagalsky. Software bots. IEEE Software, 2018." } }, { "@position" : "6", "rawText" : { "$" : "[6] Z. Liu, X. Xia, A. E. Hassan, D. Lo, Z. Xing, and X. Wang. Neuralmachine-translation-based commit message generation: how far are we? In Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, pages 373-384. ACM, 2018." } }, { "@position" : "7", "rawText" : { "$" : "[7] P. D. Marinescu and C. Cadar. Katch: high-coverage testing of software patches. In Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, pages 235-245. ACM, 2013." }, "id" : { "@value" : "od______1032::351115435eb69e41d4927c7503d39b40", "@type" : "openaire", "@trustLevel" : "0.68238765" } }, { "@position" : "8", "rawText" : { "$" : "[8] M. Monperrus. Automatic Software Repair: a Bibliography. ACM Computing Surveys, 51:1-24, 2017." } }, { "@position" : "9", "rawText" : { "$" : "[9] M. Monperrus, S. Urli, T. Durieux, M. Martinez, B. Baudry, and L. Seinturier. Human-competitive patches in automatic program repair with repairnator. Technical Report 1810.05806, arXiv, 2018." } }, { "@position" : "10", "rawText" : { "$" : "[10] D. Shriver, S. Elbaum, and K. T. Stolee. At the end of synthesis: Narrowing program candidates. In Proceedings of the 39th International Conference on Software Engineering: New Ideas and Emerging Results Track, 2017." }, "id" : { "@value" : "doi_________::cc7433c3328f477dbdda8bb4067169f6", "@type" : "openaire", "@trustLevel" : "0.6432261" } }, { "@position" : "11", "rawText" : { "$" : "[11] S. Urli, Z. Yu, L. Seinturier, and M. Monperrus. How to Design a Program Repair Bot? Insights from the Repairnator Project. In 40th International Conference on Software Engineering, Track Software Engineering in Practice, pages 95-104, 2018." }, "id" : { "@value" : "arXiv_______::18e279a1c9fa77e57349608d305bcc36", "@type" : "openaire", "@trustLevel" : "0.68692446" } } ] } }, { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "[1] L. F. Cortés-Coy, M. Linares-Vásquez, J. Aponte, and D. Poshyvanyk. On automatically generating commit messages via summarization of source code changes. In Source Code Analysis and Manipulation (SCAM), 2014 IEEE 14th International Working Conference on, pages 275-284. IEEE, 2014." } }, { "@position" : "2", "rawText" : { "$" : "[2] M. D'Ambros, M. Lanza, and R. Robbes. Commit 2.0. In Proceedings of the 1st Workshop on Web 2.0 for Software Engineering, Web2SE '10, 2010." } }, { "@position" : "3", "rawText" : { "$" : "[3] D. Gunning. Explainable artificial intelligence (xai). Defense Advanced Research Projects Agency (DARPA), 2017." } }, { "@position" : "4", "rawText" : { "$" : "[4] S. Jiang, A. Armaly, and C. McMillan. Automatically generating commit messages from diffs using neural machine translation. In Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, pages 135-146, 2017." } }, { "@position" : "5", "rawText" : { "$" : "[5] C. Lebeuf, M. Storey, and A. Zagalsky. Software bots. IEEE Software, 2018." } }, { "@position" : "6", "rawText" : { "$" : "[6] Z. Liu, X. Xia, A. E. Hassan, D. Lo, Z. Xing, and X. Wang. Neuralmachine-translation-based commit message generation: how far are we? In Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, pages 373-384. ACM, 2018." } }, { "@position" : "7", "rawText" : { "$" : "[7] P. D. Marinescu and C. Cadar. Katch: high-coverage testing of software patches. In Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, pages 235-245. ACM, 2013." }, "id" : { "@value" : "od______1032::351115435eb69e41d4927c7503d39b40", "@type" : "openaire", "@trustLevel" : "0.68238765" } }, { "@position" : "8", "rawText" : { "$" : "[8] M. Monperrus. Automatic Software Repair: a Bibliography. ACM Computing Surveys, 51:1-24, 2017." } }, { "@position" : "9", "rawText" : { "$" : "[9] M. Monperrus, S. Urli, T. Durieux, M. Martinez, B. Baudry, and L. Seinturier. Human-competitive patches in automatic program repair with repairnator. Technical Report 1810.05806, arXiv, 2018." } }, { "@position" : "10", "rawText" : { "$" : "[10] D. Shriver, S. Elbaum, and K. T. Stolee. At the end of synthesis: Narrowing program candidates. In Proceedings of the 39th International Conference on Software Engineering: New Ideas and Emerging Results Track, 2017." }, "id" : { "@value" : "doi_________::cc7433c3328f477dbdda8bb4067169f6", "@type" : "openaire", "@trustLevel" : "0.6432261" } }, { "@position" : "11", "rawText" : { "$" : "[11] S. Urli, Z. Yu, L. Seinturier, and M. Monperrus. How to Design a Program Repair Bot? Insights from the Repairnator Project. In 40th International Conference on Software Engineering, Track Software Engineering in Practice, pages 95-104, 2018." }, "id" : { "@value" : "arXiv_______::21efd1b7108aa8e985b0dec1b446e25a", "@type" : "openaire", "@trustLevel" : "0.68692446" } } ] } }, { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "[1] L. F. Cortés-Coy, M. Linares-Vásquez, J. Aponte, and D. Poshyvanyk. On automatically generating commit messages via summarization of source code changes. In Source Code Analysis and Manipulation (SCAM), 2014 IEEE 14th International Working Conference on, pages 275-284. IEEE, 2014." } }, { "@position" : "2", "rawText" : { "$" : "[2] M. D'Ambros, M. Lanza, and R. Robbes. Commit 2.0. In Proceedings of the 1st Workshop on Web 2.0 for Software Engineering, Web2SE '10, 2010." } }, { "@position" : "3", "rawText" : { "$" : "[3] D. Gunning. Explainable artificial intelligence (xai). Defense Advanced Research Projects Agency (DARPA), 2017." } }, { "@position" : "4", "rawText" : { "$" : "[4] S. Jiang, A. Armaly, and C. McMillan. Automatically generating commit messages from diffs using neural machine translation. In Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering, pages 135-146, 2017." } }, { "@position" : "5", "rawText" : { "$" : "[5] C. Lebeuf, M. Storey, and A. Zagalsky. Software bots. IEEE Software, 2018." } }, { "@position" : "6", "rawText" : { "$" : "[6] Z. Liu, X. Xia, A. E. Hassan, D. Lo, Z. Xing, and X. Wang. Neuralmachine-translation-based commit message generation: how far are we? In Proceedings of the 33rd ACM/IEEE International Conference on Automated Software Engineering, pages 373-384. ACM, 2018." } }, { "@position" : "7", "rawText" : { "$" : "[7] P. D. Marinescu and C. Cadar. Katch: high-coverage testing of software patches. In Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, pages 235-245. ACM, 2013." }, "id" : { "@value" : "od______1032::351115435eb69e41d4927c7503d39b40", "@type" : "openaire", "@trustLevel" : "0.68238765" } }, { "@position" : "8", "rawText" : { "$" : "[8] M. Monperrus. Automatic Software Repair: a Bibliography. ACM Computing Surveys, 51:1-24, 2017." } }, { "@position" : "9", "rawText" : { "$" : "[9] M. Monperrus, S. Urli, T. Durieux, M. Martinez, B. Baudry, and L. Seinturier. Human-competitive patches in automatic program repair with repairnator. Technical Report 1810.05806, arXiv, 2018." } }, { "@position" : "10", "rawText" : { "$" : "[10] D. Shriver, S. Elbaum, and K. T. Stolee. At the end of synthesis: Narrowing program candidates. In Proceedings of the 39th International Conference on Software Engineering: New Ideas and Emerging Results Track, 2017." }, "id" : { "@value" : "doi_________::cc7433c3328f477dbdda8bb4067169f6", "@type" : "openaire", "@trustLevel" : "0.6432261" } }, { "@position" : "11", "rawText" : { "$" : "[11] S. Urli, Z. Yu, L. Seinturier, and M. Monperrus. How to Design a Program Repair Bot? Insights from the Repairnator Project. In 40th International Conference on Software Engineering, Track Software Engineering in Practice, pages 95-104, 2018." }, "id" : { "@value" : "arXiv_______::18e279a1c9fa77e57349608d305bcc36", "@type" : "openaire", "@trustLevel" : "0.68692446" } } ] } } ] } } }, { "header" : { "dri:objIdentifier" : { "$" : "dedup_wf_002::297ee0ac7d23a613474544f10cccd8c3" }, "dri:dateOfCollection" : { "$" : "2025-12-20T13:44:37.856631984" }, "dri:dateOfTransformation" : null }, "metadata" : { "oaf:entity" : { "@xsi:schemaLocation" : "http://namespace.openaire.eu/oaf https://www.openaire.eu/schema/1.0/oaf-1.0.xsd", "oaf:result" : { "collectedfrom" : [ { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" }, { "@name" : "HAL - Université de Lille", "@id" : "opendoar____::29c0c0ee223856f336d7ea8052057753" }, { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" } ], "originalId" : [ { "$" : "oai:HAL:tel-01321718v1" }, { "$" : "50|inria2______::d1149be291783494a67f07ada06a2d37" }, { "$" : "50|od______4254::d1149be291783494a67f07ada06a2d37" }, { "$" : "50|od_______165::d1149be291783494a67f07ada06a2d37" } ], "measure" : [ { "@id" : "influence", "@score" : "2.5152056E-9", "@class" : "C5" }, { "@id" : "popularity", "@score" : "8.2636725E-10", "@class" : "C5" }, { "@id" : "influence_alt", "@score" : "0", "@class" : "C5" }, { "@id" : "popularity_alt", "@score" : "0.0", "@class" : "C5" }, { "@id" : "impulse", "@score" : "0", "@class" : "C5" } ], "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "On Oracles for Automated Diagnosis and Repair of Software Bugs" }, "bestaccessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "creator" : { "@rank" : "1", "@name" : "Martin", "@surname" : "Monperrus", "@orcid_pending" : "0000-0003-3505-3383", "$" : "Monperrus, Martin" }, "contributor" : { "$" : "Monperrus, Martin" }, "dateofacceptance" : { "$" : "2016-01-01" }, "description" : { "$" : "This HDR focuses on my work on automatic diagnosis and repair done over the past years. Among my past publications, it highlights three contributions on this topic, respectively published in ACM Transactions on Software Engineering and Methodology (TOSEM), IEEE Transactions on Software Engineering (TSE) and Elsevier Information & Software Technology (IST). My goal is to show that those three contributions share something deep, that they are founded on a unifying concept, which is the one of oracle. The first contribution is about statistical oracles. In the context of object-oriented software, we have defined a notion of context and normality that is specific to a fault class: missing method calls. Those inferred regularities act as oracle and their violations are considered as bugs. The second contribution is about test case based oracles for automatic repair. We describe an automatic repair system that fixes failing test cases by generating a patch. It is founded on the idea of refining the knowledge given by the violation of the oracle of the failing test case into finer-grain information, which we call a “micro-oracle”. By considering micro-oracles, we are capable of obtaining at the same time a precise fault localization diagnostic and a well-formed input-output specification to be used for program synthesis in order to repair a bug. The third contribution discusses a novel generic oracle in the context of exception handling. A generic oracle states properties that hold for many domains. Our technique verifies the compliance to this new oracle using test suite execution and exception injection. This document concludes with a research agenda about the future of engineering ultra-dependable and antifragile software systems." }, "subject" : [ { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "debug" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "repair" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "génie logiciel" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "[INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE]" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "dynamic analysis" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "software engineering" } ], "language" : { "@classid" : "eng", "@classname" : "English", "@schemeid" : "dnet:languages", "@schemename" : "dnet:languages" }, "relevantdate" : [ { "@classid" : "UNKNOWN", "@classname" : "UNKNOWN", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2016-05-26" }, { "@classid" : "updated", "@classname" : "updated", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2025-02-26" }, { "@classid" : "available", "@classname" : "available", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2016-05-26" }, { "@classid" : "issued", "@classname" : "issued", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2016-01-01" }, { "@classid" : "updated", "@classname" : "updated", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2025-10-27" } ], "format" : { "$" : "application/pdf" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "resourcetype" : { "@classid" : "doctoral thesis", "@classname" : "doctoral thesis", "@schemeid" : "dnet:dataCite_resource", "@schemename" : "dnet:dataCite_resource" }, "isgreen" : { "$" : true }, "isindiamondjournal" : { "$" : false }, "publiclyfunded" : { "$" : false }, "context" : { "@id" : "inria", "@label" : "INRIA", "@type" : "community" }, "datainfo" : { "inferred" : { "$" : true }, "deletedbyinference" : { "$" : false }, "trust" : { "$" : "0.8" }, "inferenceprovenance" : { "$" : "dedup-result-decisiontree-v4" }, "provenanceaction" : { "@classid" : "sysimport:dedup", "@classname" : "Inferred by OpenAIRE", "@schemeid" : "dnet:provenanceActions", "@schemename" : "dnet:provenanceActions" } }, "rels" : { "rel" : [ { "@inferred" : true, "@trust" : "1.0", "@inferenceprovenance" : "openaire:affiliation:graph", "@provenanceaction" : "result:organization:openaireinference", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "openorgs____::a7d9dc62bc79f067b8c0f3f683320ab6" }, "legalshortname" : { "$" : "USTL" }, "websiteurl" : { "$" : "https://www.univ-lille.fr/" }, "country" : { "@classid" : "FR", "@classname" : "France", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "legalname" : { "$" : "University of Lille" } }, { "@inferred" : true, "@trust" : "1.0", "@inferenceprovenance" : "openaire:affiliation:graph", "@provenanceaction" : "result:organization:openaireinference", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "openorgs____::7fbdf9cd4423c4604745a16afe728bc7" }, "country" : { "@classid" : "FR", "@classname" : "France", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "legalshortname" : { "$" : "CNRS" }, "legalname" : { "$" : "French National Centre for Scientific Research" }, "websiteurl" : { "$" : "http://www.cnrs.fr/index.php" } }, { "@inferred" : true, "@trust" : "0.72", "@inferenceprovenance" : "iis::document_software_url", "@provenanceaction" : "iis", "to" : { "@class" : "IsRelatedTo", "@scheme" : "dnet:result_result_relations", "@type" : "software", "$" : "openaire____::d051a7ee6be011a9fb9395ec748d8252" }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "nopol software on GitHub" }, "collectedfrom" : [ { "@name" : "Software Heritage", "@id" : "openaire____::dbfd07503aaa1ed31beed7dec942f3f4" }, { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" } ], "instance" : [ { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "GitHub", "@id" : "openaire____::d3b7c913cd04ebfec0e9ec32cb6fd58c" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://github.com/SpoonLabs/nopol" }, "webresource" : { "url" : { "$" : "https://github.com/SpoonLabs/nopol" } } }, { "accessright" : { "@classid" : "OPEN SOURCE", "@classname" : "Open Source", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Software Heritage", "@id" : "openaire____::dbfd07503aaa1ed31beed7dec942f3f4" }, "instancetype" : { "@classid" : "0029", "@classname" : "Software", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/SpoonLabs/nopol" }, "webresource" : { "url" : { "$" : "https://archive.softwareheritage.org/browse/origin/https://github.com/SpoonLabs/nopol" } } } ], "resulttype" : { "@classid" : "software", "@classname" : "software", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "description" : { "$" : "The source code of the Nopol automatic repair and patch generation system for Java developed at the University of Lille and Inria" } }, { "@inferred" : true, "@trust" : "1.0", "@inferenceprovenance" : "openaire:affiliation:graph", "@provenanceaction" : "result:organization:openaireinference", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "openorgs____::b1a28649a82b98ae497d5c7782656740" }, "country" : { "@classid" : "FR", "@classname" : "France", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "legalname" : { "$" : "French Institute for Research in Computer Science and Automation" }, "legalshortname" : { "$" : "INRIA" }, "websiteurl" : { "$" : "http://www.inria.fr/en/" } } ] }, "children" : { "result" : [ { "@objidentifier" : "od_______165::d1149be291783494a67f07ada06a2d37", "instance" : { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" }, "dateofacceptance" : { "$" : "2016-01-01" }, "instancetype" : { "@classid" : "0006", "@classname" : "Doctoral thesis", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://theses.hal.science/tel-01321718v1" }, "webresource" : { "url" : { "$" : "https://theses.hal.science/tel-01321718v1" } } }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "On Oracles for Automated Diagnosis and Repair of Software Bugs" }, "dateofacceptance" : { "$" : "2016-01-01" }, "creator" : { "$" : "Monperrus, Martin" }, "collectedfrom" : { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "description" : { "$" : "This HDR focuses on my work on automatic diagnosis and repair done over the past years. Among my past publications, it highlights three contributions on this topic, respectively published in ACM Transactions on Software Engineering and Methodology (TOSEM), IEEE Transactions on Software Engineering (TSE) and Elsevier Information & Software Technology (IST). My goal is to show that those three contributions share something deep, that they are founded on a unifying concept, which is the one of orac" } }, { "@objidentifier" : "inria2______::d1149be291783494a67f07ada06a2d37", "instance" : { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" }, "dateofacceptance" : { "$" : "2016-01-01" }, "instancetype" : { "@classid" : "0006", "@classname" : "Doctoral thesis", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://theses.hal.science/tel-01321718v1" }, "webresource" : { "url" : { "$" : "https://theses.hal.science/tel-01321718v1" } } }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "On Oracles for Automated Diagnosis and Repair of Software Bugs" }, "dateofacceptance" : { "$" : "2016-01-01" }, "creator" : { "$" : "Monperrus, Martin" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "collectedfrom" : { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" }, "description" : { "$" : "This HDR focuses on my work on automatic diagnosis and repair done over the past years. Among my past publications, it highlights three contributions on this topic, respectively published in ACM Transactions on Software Engineering and Methodology (TOSEM), IEEE Transactions on Software Engineering (TSE) and Elsevier Information & Software Technology (IST). My goal is to show that those three contributions share something deep, that they are founded on a unifying concept, which is the one of orac" } }, { "@objidentifier" : "od______4254::d1149be291783494a67f07ada06a2d37", "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "On Oracles for Automated Diagnosis and Repair of Software Bugs" }, "dateofacceptance" : { "$" : "2016-01-01" }, "creator" : { "$" : "Monperrus, Martin" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "collectedfrom" : { "@name" : "HAL - Université de Lille", "@id" : "opendoar____::29c0c0ee223856f336d7ea8052057753" }, "instance" : { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "HAL - Université de Lille", "@id" : "opendoar____::29c0c0ee223856f336d7ea8052057753" }, "dateofacceptance" : { "$" : "2016-01-01" }, "instancetype" : { "@classid" : "0006", "@classname" : "Doctoral thesis", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://theses.hal.science/tel-01321718v1" }, "webresource" : { "url" : { "$" : "https://theses.hal.science/tel-01321718v1" } } }, "description" : { "$" : "This HDR focuses on my work on automatic diagnosis and repair done over the past years. Among my past publications, it highlights three contributions on this topic, respectively published in ACM Transactions on Software Engineering and Methodology (TOSEM), IEEE Transactions on Software Engineering (TSE) and Elsevier Information & Software Technology (IST). My goal is to show that those three contributions share something deep, that they are founded on a unifying concept, which is the one of orac" } } ], "instance" : { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : [ { "@name" : "HAL - Université de Lille", "@id" : "opendoar____::29c0c0ee223856f336d7ea8052057753" }, { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" }, { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" } ], "hostedby" : [ { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" }, { "@name" : "HAL - Université de Lille", "@id" : "opendoar____::29c0c0ee223856f336d7ea8052057753" }, { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" } ], "dateofacceptance" : { "$" : "2016-01-01" }, "instancetype" : { "@classid" : "0006", "@classname" : "Doctoral thesis", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "webresource" : { "url" : { "$" : "https://theses.hal.science/tel-01321718v1" } } } } }, "extraInfo" : [ { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "1 Introduction 7 1.1 Focus of this Manuscript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.2 Core Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1.3 Overview of My Other Work on Automatic Diagnosis and Repair . . . . . . . . . 10 1.4 Research Supervision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12" } }, { "@position" : "2", "rawText" : { "$" : "The last column of Table 4.1 gives the number of stretchable try-catch blocks out of the number of source-independent try-catch blocks. For instance, in commons-lang, we have found 18 candidates source-independent try-catch blocks. Sixteen (16/18) of them can be safely stretched: Beyond Three Contributions . . . . . . . . . . . . . . . . . . . . . . 79 Perspectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 5.2.1 Recovery against Unanticipated Failures . . . . . . . . . . . . . . . . . 81 5.2.2 Automatic exploration of the recovery space . . . . . . . . . . . . . . . 83 5.2.3 Constant Assessment of Recovery Capabilities with Injected Perturbations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Last Words . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 5.1 [1] [2] [5] [6] [7] [14] J. Chen and R. J. Patton. Robust model-based fault diagnosis for dynamic systems. Vol. 3. Springer Science & Business Media, 2012." } }, { "@position" : "3", "rawText" : { "$" : "D. R. Cok. “jSMTLIB: Tutorial, validation and adapter tools for SMT-LIBv2”. In: NASA Formal Methods. Springer, 2011, pp. 480-486." } }, { "@position" : "4", "rawText" : { "$" : "[16] B. Cornu, E. T. Barr, L. Seinturier, and M. Monperrus. Casper: Debugging Null Dereferences with Dynamic Causality Traces. Tech. rep. hal-01113988. Inria Lille, 2015." } }, { "@position" : "5", "rawText" : { "$" : "[17] B. Cornu, T. Durieux, L. Seinturier, and M. Monperrus. NPEFix: Automatic Runtime Repair of Null Pointer Exceptions in Java. Technical Report 1512.07423. Arxiv, 2015." } }, { "@position" : "6", "rawText" : { "$" : "[18] B. Cornu, L. Seinturier, and M. Monperrus. “Exception Handling Analysis and Transformation Using Fault Injection: Study of Resilience Against Unanticipated Exceptions”. In: Information and Software Technology 57 (2015), pp. 66-76." }, "id" : { "@value" : "doi_________::7f2c9178211b4d9123bf9d0d238d3ea8", "@type" : "openaire", "@trustLevel" : "0.69015485" } }, { "@position" : "7", "rawText" : { "$" : "C. Csallner, Y. Smaragdakis, and T. Xie. “DSD-Crasher: A hybrid analysis tool for bug finding”. In: ACM Trans. Softw. Eng. Methodol. 17.2 (2008), pp. 1-37." } }, { "@position" : "8", "rawText" : { "$" : "html. Accessed: 2014-12-01." } }, { "@position" : "9", "rawText" : { "$" : "[32] S. Ghosh and J. L. Kelly. “Bytecode fault injection for Java software”. In: Journal of Systems and Software 81.11 (2008), pp. 2034-2043." } }, { "@position" : "10", "rawText" : { "$" : "[34] J. B. Goodenough. “Exception Handling: Issues and a Proposed Notation”. In: Commun. ACM 18.12 (1975), pp. 683-696." } }, { "@position" : "11", "rawText" : { "$" : "[35] J. Gosling, B. Joy, G. Steele, and G. Bracha. Java Language Specification. 3rd. AddisonWesley, 2005." } }, { "@position" : "12", "rawText" : { "$" : "[36] D. Kim, J. Nam, J. Song, and S. Kim. “Automatic Patch Generation Learned From Human-Written Patches”. In: Proceedings of ICSE. 2013." } }, { "@position" : "13", "rawText" : { "$" : "M. Monperrus. Automatic Software Repair: a Bibliography. Tech. rep. hal-01206501. University of Lille, 2015." } }, { "@position" : "14", "rawText" : { "$" : "Y. Pei, C. A. Furia, M. Nordio, Y. Wei, B. Meyer, and A. Zeller. “Automated Fixing of Programs with Contracts”. In: IEEE Transactions on Software Engineering 40.5 (2014), pp. 427-449." } }, { "@position" : "15", "rawText" : { "$" : "[97] J. Xuan, M. Matias, F. DeMarco, L. Sebastian, D. Thomas, D. Le Berre, and M. Monperrus. Nopol: Automatic Repair of Conditional Statement Bugs in Large-Scale ObjectOriented Programs. Underreview at IEEE Transactions on Software Engineering." } } ] } }, { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "1 Introduction 7 1.1 Focus of this Manuscript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.2 Core Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1.3 Overview of My Other Work on Automatic Diagnosis and Repair . . . . . . . . . 10 1.4 Research Supervision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12" } }, { "@position" : "2", "rawText" : { "$" : "The last column of Table 4.1 gives the number of stretchable try-catch blocks out of the number of source-independent try-catch blocks. For instance, in commons-lang, we have found 18 candidates source-independent try-catch blocks. Sixteen (16/18) of them can be safely stretched: Beyond Three Contributions . . . . . . . . . . . . . . . . . . . . . . 79 Perspectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 5.2.1 Recovery against Unanticipated Failures . . . . . . . . . . . . . . . . . 81 5.2.2 Automatic exploration of the recovery space . . . . . . . . . . . . . . . 83 5.2.3 Constant Assessment of Recovery Capabilities with Injected Perturbations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Last Words . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 5.1 [1] [2] [5] [6] [7] [14] J. Chen and R. J. Patton. Robust model-based fault diagnosis for dynamic systems. Vol. 3. Springer Science & Business Media, 2012." } }, { "@position" : "3", "rawText" : { "$" : "D. R. Cok. “jSMTLIB: Tutorial, validation and adapter tools for SMT-LIBv2”. In: NASA Formal Methods. Springer, 2011, pp. 480-486." } }, { "@position" : "4", "rawText" : { "$" : "[16] B. Cornu, E. T. Barr, L. Seinturier, and M. Monperrus. Casper: Debugging Null Dereferences with Dynamic Causality Traces. Tech. rep. hal-01113988. Inria Lille, 2015." } }, { "@position" : "5", "rawText" : { "$" : "[17] B. Cornu, T. Durieux, L. Seinturier, and M. Monperrus. NPEFix: Automatic Runtime Repair of Null Pointer Exceptions in Java. Technical Report 1512.07423. Arxiv, 2015." } }, { "@position" : "6", "rawText" : { "$" : "[18] B. Cornu, L. Seinturier, and M. Monperrus. “Exception Handling Analysis and Transformation Using Fault Injection: Study of Resilience Against Unanticipated Exceptions”. In: Information and Software Technology 57 (2015), pp. 66-76." }, "id" : { "@value" : "doi_________::7f2c9178211b4d9123bf9d0d238d3ea8", "@type" : "openaire", "@trustLevel" : "0.69015485" } }, { "@position" : "7", "rawText" : { "$" : "C. Csallner, Y. Smaragdakis, and T. Xie. “DSD-Crasher: A hybrid analysis tool for bug finding”. In: ACM Trans. Softw. Eng. Methodol. 17.2 (2008), pp. 1-37." } }, { "@position" : "8", "rawText" : { "$" : "html. Accessed: 2014-12-01." } }, { "@position" : "9", "rawText" : { "$" : "[32] S. Ghosh and J. L. Kelly. “Bytecode fault injection for Java software”. In: Journal of Systems and Software 81.11 (2008), pp. 2034-2043." } }, { "@position" : "10", "rawText" : { "$" : "[34] J. B. Goodenough. “Exception Handling: Issues and a Proposed Notation”. In: Commun. ACM 18.12 (1975), pp. 683-696." } }, { "@position" : "11", "rawText" : { "$" : "[35] J. Gosling, B. Joy, G. Steele, and G. Bracha. Java Language Specification. 3rd. AddisonWesley, 2005." } }, { "@position" : "12", "rawText" : { "$" : "[36] D. Kim, J. Nam, J. Song, and S. Kim. “Automatic Patch Generation Learned From Human-Written Patches”. In: Proceedings of ICSE. 2013." } }, { "@position" : "13", "rawText" : { "$" : "M. Monperrus. Automatic Software Repair: a Bibliography. Tech. rep. hal-01206501. University of Lille, 2015." } }, { "@position" : "14", "rawText" : { "$" : "Y. Pei, C. A. Furia, M. Nordio, Y. Wei, B. Meyer, and A. Zeller. “Automated Fixing of Programs with Contracts”. In: IEEE Transactions on Software Engineering 40.5 (2014), pp. 427-449." } }, { "@position" : "15", "rawText" : { "$" : "[97] J. Xuan, M. Matias, F. DeMarco, L. Sebastian, D. Thomas, D. Le Berre, and M. Monperrus. Nopol: Automatic Repair of Conditional Statement Bugs in Large-Scale ObjectOriented Programs. Underreview at IEEE Transactions on Software Engineering." } } ] } }, { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "1 Introduction 7 1.1 Focus of this Manuscript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.2 Core Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1.3 Overview of My Other Work on Automatic Diagnosis and Repair . . . . . . . . . 10 1.4 Research Supervision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12" } }, { "@position" : "2", "rawText" : { "$" : "The last column of Table 4.1 gives the number of stretchable try-catch blocks out of the number of source-independent try-catch blocks. For instance, in commons-lang, we have found 18 candidates source-independent try-catch blocks. Sixteen (16/18) of them can be safely stretched: Beyond Three Contributions . . . . . . . . . . . . . . . . . . . . . . 79 Perspectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 5.2.1 Recovery against Unanticipated Failures . . . . . . . . . . . . . . . . . 81 5.2.2 Automatic exploration of the recovery space . . . . . . . . . . . . . . . 83 5.2.3 Constant Assessment of Recovery Capabilities with Injected Perturbations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Last Words . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 5.1 [1] [2] [5] [6] [7] [14] J. Chen and R. J. Patton. Robust model-based fault diagnosis for dynamic systems. Vol. 3. Springer Science & Business Media, 2012." } }, { "@position" : "3", "rawText" : { "$" : "D. R. Cok. “jSMTLIB: Tutorial, validation and adapter tools for SMT-LIBv2”. In: NASA Formal Methods. Springer, 2011, pp. 480-486." } }, { "@position" : "4", "rawText" : { "$" : "[16] B. Cornu, E. T. Barr, L. Seinturier, and M. Monperrus. Casper: Debugging Null Dereferences with Dynamic Causality Traces. Tech. rep. hal-01113988. Inria Lille, 2015." } }, { "@position" : "5", "rawText" : { "$" : "[17] B. Cornu, T. Durieux, L. Seinturier, and M. Monperrus. NPEFix: Automatic Runtime Repair of Null Pointer Exceptions in Java. Technical Report 1512.07423. Arxiv, 2015." } }, { "@position" : "6", "rawText" : { "$" : "[18] B. Cornu, L. Seinturier, and M. Monperrus. “Exception Handling Analysis and Transformation Using Fault Injection: Study of Resilience Against Unanticipated Exceptions”. In: Information and Software Technology 57 (2015), pp. 66-76." }, "id" : { "@value" : "doi_________::7f2c9178211b4d9123bf9d0d238d3ea8", "@type" : "openaire", "@trustLevel" : "0.69015485" } }, { "@position" : "7", "rawText" : { "$" : "C. Csallner, Y. Smaragdakis, and T. Xie. “DSD-Crasher: A hybrid analysis tool for bug finding”. In: ACM Trans. Softw. Eng. Methodol. 17.2 (2008), pp. 1-37." } }, { "@position" : "8", "rawText" : { "$" : "html. Accessed: 2014-12-01." } }, { "@position" : "9", "rawText" : { "$" : "[32] S. Ghosh and J. L. Kelly. “Bytecode fault injection for Java software”. In: Journal of Systems and Software 81.11 (2008), pp. 2034-2043." } }, { "@position" : "10", "rawText" : { "$" : "[34] J. B. Goodenough. “Exception Handling: Issues and a Proposed Notation”. In: Commun. ACM 18.12 (1975), pp. 683-696." } }, { "@position" : "11", "rawText" : { "$" : "[35] J. Gosling, B. Joy, G. Steele, and G. Bracha. Java Language Specification. 3rd. AddisonWesley, 2005." } }, { "@position" : "12", "rawText" : { "$" : "[36] D. Kim, J. Nam, J. Song, and S. Kim. “Automatic Patch Generation Learned From Human-Written Patches”. In: Proceedings of ICSE. 2013." } }, { "@position" : "13", "rawText" : { "$" : "M. Monperrus. Automatic Software Repair: a Bibliography. Tech. rep. hal-01206501. University of Lille, 2015." } }, { "@position" : "14", "rawText" : { "$" : "Y. Pei, C. A. Furia, M. Nordio, Y. Wei, B. Meyer, and A. Zeller. “Automated Fixing of Programs with Contracts”. In: IEEE Transactions on Software Engineering 40.5 (2014), pp. 427-449." } }, { "@position" : "15", "rawText" : { "$" : "[97] J. Xuan, M. Matias, F. DeMarco, L. Sebastian, D. Thomas, D. Le Berre, and M. Monperrus. Nopol: Automatic Repair of Conditional Statement Bugs in Large-Scale ObjectOriented Programs. Underreview at IEEE Transactions on Software Engineering." } } ] } }, { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "1 Introduction 7 1.1 Focus of this Manuscript . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 7 1.2 Core Definitions . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 8 1.3 Overview of My Other Work on Automatic Diagnosis and Repair . . . . . . . . . 10 1.4 Research Supervision . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 12" } }, { "@position" : "2", "rawText" : { "$" : "The last column of Table 4.1 gives the number of stretchable try-catch blocks out of the number of source-independent try-catch blocks. For instance, in commons-lang, we have found 18 candidates source-independent try-catch blocks. Sixteen (16/18) of them can be safely stretched: Beyond Three Contributions . . . . . . . . . . . . . . . . . . . . . . 79 Perspectives . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 81 5.2.1 Recovery against Unanticipated Failures . . . . . . . . . . . . . . . . . 81 5.2.2 Automatic exploration of the recovery space . . . . . . . . . . . . . . . 83 5.2.3 Constant Assessment of Recovery Capabilities with Injected Perturbations . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 84 Last Words . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . . 86 5.1 [1] [2] [5] [6] [7] [14] J. Chen and R. J. Patton. Robust model-based fault diagnosis for dynamic systems. Vol. 3. Springer Science & Business Media, 2012." } }, { "@position" : "3", "rawText" : { "$" : "D. R. Cok. “jSMTLIB: Tutorial, validation and adapter tools for SMT-LIBv2”. In: NASA Formal Methods. Springer, 2011, pp. 480-486." } }, { "@position" : "4", "rawText" : { "$" : "[16] B. Cornu, E. T. Barr, L. Seinturier, and M. Monperrus. Casper: Debugging Null Dereferences with Dynamic Causality Traces. Tech. rep. hal-01113988. Inria Lille, 2015." } }, { "@position" : "5", "rawText" : { "$" : "[17] B. Cornu, T. Durieux, L. Seinturier, and M. Monperrus. NPEFix: Automatic Runtime Repair of Null Pointer Exceptions in Java. Technical Report 1512.07423. Arxiv, 2015." } }, { "@position" : "6", "rawText" : { "$" : "[18] B. Cornu, L. Seinturier, and M. Monperrus. “Exception Handling Analysis and Transformation Using Fault Injection: Study of Resilience Against Unanticipated Exceptions”. In: Information and Software Technology 57 (2015), pp. 66-76." }, "id" : { "@value" : "doi_________::7f2c9178211b4d9123bf9d0d238d3ea8", "@type" : "openaire", "@trustLevel" : "0.69015485" } }, { "@position" : "7", "rawText" : { "$" : "C. Csallner, Y. Smaragdakis, and T. Xie. “DSD-Crasher: A hybrid analysis tool for bug finding”. In: ACM Trans. Softw. Eng. Methodol. 17.2 (2008), pp. 1-37." } }, { "@position" : "8", "rawText" : { "$" : "html. Accessed: 2014-12-01." } }, { "@position" : "9", "rawText" : { "$" : "[32] S. Ghosh and J. L. Kelly. “Bytecode fault injection for Java software”. In: Journal of Systems and Software 81.11 (2008), pp. 2034-2043." } }, { "@position" : "10", "rawText" : { "$" : "[34] J. B. Goodenough. “Exception Handling: Issues and a Proposed Notation”. In: Commun. ACM 18.12 (1975), pp. 683-696." } }, { "@position" : "11", "rawText" : { "$" : "[35] J. Gosling, B. Joy, G. Steele, and G. Bracha. Java Language Specification. 3rd. AddisonWesley, 2005." } }, { "@position" : "12", "rawText" : { "$" : "[36] D. Kim, J. Nam, J. Song, and S. Kim. “Automatic Patch Generation Learned From Human-Written Patches”. In: Proceedings of ICSE. 2013." } }, { "@position" : "13", "rawText" : { "$" : "M. Monperrus. Automatic Software Repair: a Bibliography. Tech. rep. hal-01206501. University of Lille, 2015." } }, { "@position" : "14", "rawText" : { "$" : "Y. Pei, C. A. Furia, M. Nordio, Y. Wei, B. Meyer, and A. Zeller. “Automated Fixing of Programs with Contracts”. In: IEEE Transactions on Software Engineering 40.5 (2014), pp. 427-449." } }, { "@position" : "15", "rawText" : { "$" : "[97] J. Xuan, M. Matias, F. DeMarco, L. Sebastian, D. Thomas, D. Le Berre, and M. Monperrus. Nopol: Automatic Repair of Conditional Statement Bugs in Large-Scale ObjectOriented Programs. Underreview at IEEE Transactions on Software Engineering." } } ] } } ] } } }, { "header" : { "dri:objIdentifier" : { "$" : "doi_dedup___::201f83ac78c62bf7e5d3f623033c343e" }, "dri:dateOfCollection" : { "$" : "2025-12-20T13:43:41.488144873" }, "dri:dateOfTransformation" : null }, "metadata" : { "oaf:entity" : { "@xsi:schemaLocation" : "http://namespace.openaire.eu/oaf https://www.openaire.eu/schema/1.0/oaf-1.0.xsd", "oaf:result" : { "collectedfrom" : [ { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, { "@name" : "Bielefeld Academic Search Engine (BASE)", "@id" : "openaire____::df45502607927471ecf8a6ae83683ff5" }, { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" }, { "@name" : "UnpayWall", "@id" : "openaire____::8ac8380272269217cb09a928c8caa993" }, { "@name" : "HAL - Université de Lille", "@id" : "opendoar____::29c0c0ee223856f336d7ea8052057753" }, { "@name" : "Crossref", "@id" : "openaire____::081b82f96300b6a6e3d282bad31cb6e2" }, { "@name" : "Microsoft Academic Graph", "@id" : "openaire____::5f532a3fc4f1ea403f37070f59a7a53a" }, { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" }, { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" } ], "originalId" : [ { "$" : "10.1145/3105906" }, { "$" : "50|doiboost____|201f83ac78c62bf7e5d3f623033c343e" }, { "$" : "50|datacite____::79d4287d4bd1283bb41220e049aee4c7" }, { "$" : "10.48550/arxiv.1807.00515" }, { "$" : "50|od________18::b253df43efb093bdffdb756cf6f58718" }, { "$" : "oai:arXiv.org:1807.00515" }, { "$" : "50|inria2______::bf3defeeebd643f743bfa93894652924" }, { "$" : "oai:HAL:hal-01206501v1" }, { "$" : "3122945969" }, { "$" : "1946412544" }, { "$" : "50|od______4254::bf3defeeebd643f743bfa93894652924" }, { "$" : "50|od_______165::bf3defeeebd643f743bfa93894652924" }, { "$" : "50|base_oa_____::fa5920112ed98af02b571f75bbb4ef1e" }, { "$" : "ftunivlille3:oai:HAL:hal-01206501v1" } ], "pid" : [ { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/3105906" }, { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.48550/arxiv.1807.00515" }, { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : 1807.00515 } ], "measure" : [ { "@id" : "influence", "@score" : "2.2420982E-8", "@class" : "C3" }, { "@id" : "popularity", "@score" : "1.8679098E-7", "@class" : "C2" }, { "@id" : "influence_alt", "@score" : "281", "@class" : "C3" }, { "@id" : "popularity_alt", "@score" : "100.99335", "@class" : "C2" }, { "@id" : "impulse", "@score" : "114", "@class" : "C2" } ], "title" : [ { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "Automatic Software Repair" }, { "@classid" : "subtitle", "@classname" : "subtitle", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "A Bibliography" }, { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "Automatic Software Repair: a Bibliography" }, { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "automatic software repair a bibliography" } ], "bestaccessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "creator" : { "@rank" : "1", "@name" : "Martin", "@surname" : "Monperrus", "@orcid" : "0000-0003-3505-3383", "$" : "Monperrus, Martin" }, "contributor" : [ { "$" : "Monperrus, Martin" }, { "$" : "Self-adaptation for distributed services and large software systems (SPIRALS)" }, { "$" : "Inria Lille - Nord Europe" }, { "$" : "Institut National de Recherche en Informatique et en Automatique (Inria)-Institut National de Recherche en Informatique et en Automatique (Inria)-Centre de Recherche en Informatique, Signal et Automatique de Lille - UMR 9189 (CRIStAL)" }, { "$" : "Centrale Lille-Université de Lille-Centre National de la Recherche Scientifique (CNRS)-Centrale Lille-Université de Lille-Centre National de la Recherche Scientifique (CNRS)" }, { "$" : "Université de Lille, Sciences et Technologies" } ], "dateofacceptance" : { "$" : "2018-01-23" }, "description" : { "$" : "<jats:p>This article presents a survey on automatic software repair. Automatic software repair consists of automatically finding a solution to software bugs without human intervention. This article considers all kinds of repairs. First, it discusses behavioral repair where test suites, contracts, models, and crashing inputs are taken as oracle. Second, it discusses state repair, also known as runtime repair or runtime recovery, with techniques such as checkpoint and restart, reconfiguration, and invariant restoration. The uniqueness of this article is that it spans the research communities that contribute to this body of knowledge: software engineering, dependability, operating systems, programming languages, and security. It provides a novel and structured overview of the diversity of bug oracles and repair operators used in the literature.</jats:p>" }, "embargoenddate" : { "$" : "2018-01-01" }, "subject" : [ { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "$" : "Software Engineering (cs.SE)" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "$" : "FOS: Computer and information sciences" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "Computer Science - Software Engineering" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "Computer Science - Cryptography and Security" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "Computer Science - Programming Languages" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "[INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE]" }, { "@classid" : "FOS", "@classname" : "Fields of Science and Technology classification", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : true, "@inferenceprovenance" : "update", "@provenanceaction" : "subject:fos", "$" : "0202 electrical engineering, electronic engineering, information engineering" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:aggregator", "@trust" : "0.89", "$" : "[INFO.INFO-SE]Computer Science [cs]/Software Engineering [cs.SE]" }, { "@classid" : "FOS", "@classname" : "Fields of Science and Technology classification", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : true, "@inferenceprovenance" : "update", "@provenanceaction" : "subject:fos", "$" : "02 engineering and technology" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "$" : "Cryptography and Security (cs.CR)" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:aggregator", "@trust" : "0.89", "$" : "004" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "$" : "Programming Languages (cs.PL)" } ], "language" : { "@classid" : "eng", "@classname" : "English", "@schemeid" : "dnet:languages", "@schemename" : "dnet:languages" }, "relevantdate" : [ { "@classid" : "created", "@classname" : "created", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2018-01-23" }, { "@classid" : "published-online", "@classname" : "published-online", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2018-01-23" }, { "@classid" : "published-print", "@classname" : "published-print", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2019-01-31" }, { "@classid" : "submitted", "@classname" : "submitted", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2018-07-02" }, { "@classid" : "updated", "@classname" : "updated", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2022-04-26" }, { "@classid" : "available", "@classname" : "available", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2018-01-01" }, { "@classid" : "issued", "@classname" : "issued", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2018-01-01" }, { "@classid" : "UNKNOWN", "@classname" : "UNKNOWN", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2015-09-29" }, { "@classid" : "updated", "@classname" : "updated", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2025-02-26" }, { "@classid" : "available", "@classname" : "available", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2017-08-21" }, { "@classid" : "issued", "@classname" : "issued", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2017-01-01" }, { "@classid" : "updated", "@classname" : "updated", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2025-10-27" } ], "publisher" : { "$" : "Association for Computing Machinery (ACM)" }, "source" : { "$" : "Crossref" }, "format" : { "$" : "application/pdf" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "resourcetype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "isgreen" : { "$" : true }, "openaccesscolor" : { "$" : "bronze" }, "isindiamondjournal" : { "$" : false }, "publiclyfunded" : { "$" : false }, "journal" : { "@issn" : "0360-0300", "@eissn" : "1557-7341", "@ep" : "24", "@sp" : "1", "@vol" : "51", "$" : "ACM Computing Surveys" }, "context" : { "@id" : "inria", "@label" : "INRIA", "@type" : "community" }, "datainfo" : { "inferred" : { "$" : true }, "deletedbyinference" : { "$" : false }, "trust" : { "$" : "0.8" }, "inferenceprovenance" : { "$" : "dedup-result-decisiontree-v4" }, "provenanceaction" : { "@classid" : "sysimport:dedup", "@classname" : "Inferred by OpenAIRE", "@schemeid" : "dnet:provenanceActions", "@schemename" : "dnet:provenanceActions" } }, "rels" : { "rel" : [ { "@inferred" : true, "@trust" : "1.0", "@inferenceprovenance" : "openaire:affiliation:graph", "@provenanceaction" : "result:organization:openaireinference", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "openorgs____::7fbdf9cd4423c4604745a16afe728bc7" }, "country" : { "@classid" : "FR", "@classname" : "France", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "legalshortname" : { "$" : "CNRS" }, "legalname" : { "$" : "French National Centre for Scientific Research" }, "websiteurl" : { "$" : "http://www.cnrs.fr/index.php" } }, { "@inferred" : true, "@trust" : "1.0", "@inferenceprovenance" : "openaire:affiliation:graph", "@provenanceaction" : "result:organization:openaireinference", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "openorgs____::b1a28649a82b98ae497d5c7782656740" }, "country" : { "@classid" : "FR", "@classname" : "France", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "legalname" : { "$" : "French Institute for Research in Computer Science and Automation" }, "legalshortname" : { "$" : "INRIA" }, "websiteurl" : { "$" : "http://www.inria.fr/en/" } }, { "@inferred" : true, "@trust" : "0.85", "@inferenceprovenance" : "propagation", "@provenanceaction" : "result:organization:instrepo", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "pending_org_::0ad9b0587bb4fc32e9fc01047590ebda" }, "country" : { "@classid" : "FR", "@classname" : "France", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "legalshortname" : { "$" : "Université de Lille III (Charles-de-Gaulle)" }, "legalname" : { "$" : "Université de Lille III (Charles-de-Gaulle)" } }, { "@inferred" : true, "@trust" : "1.0", "@inferenceprovenance" : "openaire:affiliation:crossref", "@provenanceaction" : "result:organization:openaireinference", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "openorgs____::a7d9dc62bc79f067b8c0f3f683320ab6" }, "legalshortname" : { "$" : "USTL" }, "websiteurl" : { "$" : "https://www.univ-lille.fr/" }, "country" : { "@classid" : "FR", "@classname" : "France", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "legalname" : { "$" : "University of Lille" } } ] }, "children" : { "result" : [ { "@objidentifier" : "inria2______::bf3defeeebd643f743bfa93894652924", "description" : { "$" : "This article presents an annotated bibliography on automatic software repair. Automatic software repair consists of automatically finding a solution to software bugs, without human intervention. The uniqueness of this article is that it spans the research communities that contribute to this body of knowledge: software engineering, dependability, operating systems, programming languages and security. Furthermore, it provides a novel and structured overview of the diversity of bug oracles and repa" }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "Automatic Software Repair: a Bibliography" }, "creator" : { "$" : "Monperrus, Martin" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "dateofacceptance" : { "$" : "2017-01-01" }, "collectedfrom" : { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" }, "instance" : { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" }, "dateofacceptance" : { "$" : "2017-01-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : [ { "$" : "https://hal.science/hal-01206501v1" }, { "$" : "https://doi.org/10.1145/3105906" }, { "$" : "https://hal.science/hal-01206501v1/document" } ], "webresource" : [ { "url" : { "$" : "https://hal.science/hal-01206501v1" } }, { "url" : { "$" : "https://doi.org/10.1145/3105906" } }, { "url" : { "$" : "https://hal.science/hal-01206501v1/document" } } ] } }, { "@objidentifier" : "od_______165::bf3defeeebd643f743bfa93894652924", "instance" : { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" }, "dateofacceptance" : { "$" : "2017-01-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : [ { "$" : "https://hal.science/hal-01206501v1" }, { "$" : "https://doi.org/10.1145/3105906" }, { "$" : "https://hal.science/hal-01206501v1/document" } ], "webresource" : [ { "url" : { "$" : "https://hal.science/hal-01206501v1" } }, { "url" : { "$" : "https://doi.org/10.1145/3105906" } }, { "url" : { "$" : "https://hal.science/hal-01206501v1/document" } } ] }, "description" : { "$" : "This article presents an annotated bibliography on automatic software repair. Automatic software repair consists of automatically finding a solution to software bugs, without human intervention. The uniqueness of this article is that it spans the research communities that contribute to this body of knowledge: software engineering, dependability, operating systems, programming languages and security. Furthermore, it provides a novel and structured overview of the diversity of bug oracles and repa" }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "Automatic Software Repair: a Bibliography" }, "creator" : { "$" : "Monperrus, Martin" }, "collectedfrom" : { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "dateofacceptance" : { "$" : "2017-01-01" } }, { "@objidentifier" : "arXiv_______::62f5ed19b642803c8b528345b5ba50fa", "pid" : { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : 1807.00515 }, "instance" : { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "dateofacceptance" : { "$" : "2018-07-02" }, "instancetype" : { "@classid" : "0016", "@classname" : "Preprint", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "http://arxiv.org/abs/1807.00515" }, "webresource" : { "url" : { "$" : "http://arxiv.org/abs/1807.00515" } } }, "collectedfrom" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "Automatic Software Repair: a Bibliography" }, "creator" : { "$" : "Monperrus, Martin" }, "description" : { "$" : "This article presents a survey on automatic software repair. Automatic software repair consists of automatically finding a solution to software bugs without human intervention. This article considers all kinds of repairs. First, it discusses behavioral repair where test suites, contracts, models, and crashing inputs are taken as oracle. Second, it discusses state repair, also known as runtime repair or runtime recovery, with techniques such as checkpoint and restart, reconfiguration, and invaria" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "dateofacceptance" : { "$" : "2018-07-02" } }, { "@objidentifier" : "doi_________::201f83ac78c62bf7e5d3f623033c343e", "instance" : [ { "accessright" : { "@classid" : "CLOSED", "@classname" : "Closed Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "ACM Computing Surveys", "@id" : "issn___print::11feb70fbec161f538106f58ea98775e" }, "dateofacceptance" : { "$" : "2018-01-23" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0001", "@classname" : "peerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "https://www.acm.org/publications/policies/copyright_policy#Background" }, "url" : { "$" : "https://doi.org/10.1145/3105906" }, "webresource" : { "url" : { "$" : "https://doi.org/10.1145/3105906" } } }, { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "ACM Computing Surveys", "@id" : "issn___print::11feb70fbec161f538106f58ea98775e" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "http://arxiv.org/pdf/1807.00515" }, "webresource" : { "url" : { "$" : "http://arxiv.org/pdf/1807.00515" } } } ], "publisher" : { "$" : "Association for Computing Machinery (ACM)" }, "description" : { "$" : "<jats:p>This article presents a survey on automatic software repair. Automatic software repair consists of automatically finding a solution to software bugs without human intervention. This article considers all kinds of repairs. First, it discusses behavioral repair where test suites, contracts, models, and crashing inputs are taken as oracle. Second, it discusses state repair, also known as runtime repair or runtime recovery, with techniques such as checkpoint and restart, reconfiguration, and" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "collectedfrom" : [ { "@name" : "Crossref", "@id" : "openaire____::081b82f96300b6a6e3d282bad31cb6e2" }, { "@name" : "UnpayWall", "@id" : "openaire____::8ac8380272269217cb09a928c8caa993" } ], "dateofacceptance" : { "$" : "2018-01-23" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/3105906" }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "Automatic Software Repair" }, "creator" : { "$" : "Martin Monperrus" } }, { "@objidentifier" : "od______4254::bf3defeeebd643f743bfa93894652924", "instance" : { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "HAL - Université de Lille", "@id" : "opendoar____::29c0c0ee223856f336d7ea8052057753" }, "dateofacceptance" : { "$" : "2017-01-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : [ { "$" : "https://hal.science/hal-01206501v1" }, { "$" : "https://doi.org/10.1145/3105906" }, { "$" : "https://hal.science/hal-01206501v1/document" } ], "webresource" : [ { "url" : { "$" : "https://hal.science/hal-01206501v1" } }, { "url" : { "$" : "https://doi.org/10.1145/3105906" } }, { "url" : { "$" : "https://hal.science/hal-01206501v1/document" } } ] }, "description" : { "$" : "This article presents an annotated bibliography on automatic software repair. Automatic software repair consists of automatically finding a solution to software bugs, without human intervention. The uniqueness of this article is that it spans the research communities that contribute to this body of knowledge: software engineering, dependability, operating systems, programming languages and security. Furthermore, it provides a novel and structured overview of the diversity of bug oracles and repa" }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "Automatic Software Repair: a Bibliography" }, "creator" : { "$" : "Monperrus, Martin" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "collectedfrom" : { "@name" : "HAL - Université de Lille", "@id" : "opendoar____::29c0c0ee223856f336d7ea8052057753" }, "dateofacceptance" : { "$" : "2017-01-01" } }, { "@objidentifier" : "doi_________::79d4287d4bd1283bb41220e049aee4c7", "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "Automatic Software Repair: a Bibliography" }, "creator" : { "$" : "Monperrus, Martin" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.48550/arxiv.1807.00515" }, "description" : { "$" : "This article presents a survey on automatic software repair. Automatic software repair consists of automatically finding a solution to software bugs without human intervention. This article considers all kinds of repairs. First, it discusses behavioral repair where test suites, contracts, models, and crashing inputs are taken as oracle. Second, it discusses state repair, also known as runtime repair or runtime recovery, with techniques such as checkpoint and restart, reconfiguration, and invaria" }, "publisher" : { "$" : "arXiv" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "instance" : { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "dateofacceptance" : { "$" : "2018-01-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "arXiv Non-Exclusive Distribution" }, "url" : { "$" : "https://dx.doi.org/10.48550/arxiv.1807.00515" }, "webresource" : { "url" : { "$" : "https://dx.doi.org/10.48550/arxiv.1807.00515" } } }, "dateofacceptance" : { "$" : "2018-01-01" }, "collectedfrom" : { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" } } ], "instance" : [ { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "dateofacceptance" : { "$" : "2018-01-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.48550/arxiv.1807.00515" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "arXiv Non-Exclusive Distribution" }, "webresource" : { "url" : { "$" : "https://doi.org/10.48550/arxiv.1807.00515" } } }, { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : [ { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" }, { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" }, { "@name" : "HAL - Université de Lille", "@id" : "opendoar____::29c0c0ee223856f336d7ea8052057753" } ], "hostedby" : [ { "@name" : "HAL - Université de Lille", "@id" : "opendoar____::29c0c0ee223856f336d7ea8052057753" }, { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" }, { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" } ], "dateofacceptance" : { "$" : "2017-01-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "alternateidentifier" : [ { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/3105906" }, { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/3105906" }, { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/3105906" } ], "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "webresource" : { "url" : { "$" : "https://hal.science/hal-01206501v1" } } }, { "accessright" : { "@classid" : "CLOSED", "@classname" : "Closed Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : [ { "@name" : "Microsoft Academic Graph", "@id" : "openaire____::5f532a3fc4f1ea403f37070f59a7a53a" }, { "@name" : "Microsoft Academic Graph", "@id" : "openaire____::5f532a3fc4f1ea403f37070f59a7a53a" }, { "@name" : "Crossref", "@id" : "openaire____::081b82f96300b6a6e3d282bad31cb6e2" } ], "hostedby" : [ { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, { "@name" : "ACM Computing Surveys", "@id" : "issn___print::11feb70fbec161f538106f58ea98775e" } ], "dateofacceptance" : { "$" : "2018-01-23" }, "instancetype" : [ { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, { "@classid" : "0038", "@classname" : "Other literature type", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" } ], "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/3105906" }, "alternateidentifier" : [ { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/3105906" }, { "@classid" : "mag_id", "@classname" : "Microsoft Academic Graph Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : 1946412544 }, { "@classid" : "mag_id", "@classname" : "Microsoft Academic Graph Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : 3122945969 }, { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/3105906" } ], "refereed" : { "@classid" : "0001", "@classname" : "peerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "https://www.acm.org/publications/policies/copyright_policy#Background" }, "webresource" : { "url" : { "$" : "https://doi.org/10.1145/3105906" } } }, { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : { "@name" : "Bielefeld Academic Search Engine (BASE)", "@id" : "openaire____::df45502607927471ecf8a6ae83683ff5" }, "hostedby" : { "@name" : "Université de Lille 3 - Sciences Humaines et Sociales: HAL", "@id" : "opendoar____::24ec8468b67314c2013d215b77034476" }, "dateofacceptance" : { "$" : "2017-01-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "alternateidentifier" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/3105906" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "webresource" : { "url" : { "$" : "https://doi.org/https://doi.org/10.1145/3105906" } } }, { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "hostedby" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "dateofacceptance" : { "$" : "2018-07-02" }, "instancetype" : { "@classid" : "0016", "@classname" : "Preprint", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "pid" : { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : 1807.00515 }, "alternateidentifier" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/3105906" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "webresource" : { "url" : { "$" : "http://arxiv.org/abs/1807.00515" } } }, { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : { "@name" : "UnpayWall", "@id" : "openaire____::8ac8380272269217cb09a928c8caa993" }, "hostedby" : { "@name" : "ACM Computing Surveys", "@id" : "issn___print::11feb70fbec161f538106f58ea98775e" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/3105906" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "webresource" : { "url" : { "$" : "http://arxiv.org/pdf/1807.00515" } } } ] } }, "extraInfo" : [ { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "[1] R. Abraham and M. Erwig. “Goal-Directed Debugging of Spreadsheets”. In: Proceedings of the 2005 IEEE Symposium on Visual Languages and Human-Centric Computing. 2005, pp. 37-44." } }, { "@position" : "2", "rawText" : { "$" : "[2] E. Aftandilian, R. Sauciuc, S. Priya, and S. Krishnan. “Building Useful Program Analysis Tools Using An Extensible Java Compiler”. In: International Working Conference on Source Code Analysis and Manipulation (SCAM). 2012, pp. 14-23." } }, { "@position" : "3", "rawText" : { "$" : "[3] P. E. Ammann and J. C. Knight. “Data Diversity: An Approach to Software Fault Tolerance”. In: Ieee transactions on computers 37.4 (1988), pp. 418-425." } }, { "@position" : "4", "rawText" : { "$" : "[4] J. Andersen and J. L. Lawall. “Generic Patch Inference”. In: Automated software engineering 17.2 (2010), pp. 119-148." }, "id" : { "@value" : "doi_________::61a2268b8ef05235ab26bf7f86a575b8", "@type" : "openaire", "@trustLevel" : "0.6860426" } }, { "@position" : "5", "rawText" : { "$" : "[5] A. Arcuri. “Automatic Software Generation and Improvement Through Search Based Techniques”. PhD thesis. The University of Birmingham, 2009." } }, { "@position" : "6", "rawText" : { "$" : "[6] A. Arcuri. “Evolutionary Repair of Faulty Software”. In: Applied soft computing 11.4 (2011), pp. 3494-3514." } }, { "@position" : "7", "rawText" : { "$" : "[7] A. Arcuri and X. Yao. “A Novel Co-evolutionary Approach to Automatic Software Bug Fixing”. In: Proceedings of the IEEE Congress on Evolutionary Computation. 2008, pp. 162-168." } }, { "@position" : "8", "rawText" : { "$" : "[8] A. Avizienis. “The N-version Approach to Fault-tolerant Software”. In: Ieee transactions on software engineering 11.12 (1985), pp. 1491-1501." }, "id" : { "@value" : "doi_________::cdc8356ee2e21ef9bcac6c9fb2cb0d63", "@type" : "openaire", "@trustLevel" : "0.6642342" } }, { "@position" : "9", "rawText" : { "$" : "[9] A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. “Basic Concepts and Taxonomy of Dependable and Secure Computing”. In: Ieee transactions on dependable and secure computing 1.1 (2004), pp. 11-33." } }, { "@position" : "10", "rawText" : { "$" : "[10] T. Azim, I. Neamtiu, and L. Marvel. “Towards Self-healing Smartphone Software via Automated Patching”. In: Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering. 2014, pp. 623-628." }, "id" : { "@value" : "doi_________::d712ef4e8d4ec5be89f3dcab74866c56", "@type" : "openaire", "@trustLevel" : "0.61199635" } }, { "@position" : "11", "rawText" : { "$" : "[11] E. Barr, M. Harman, P. McMinn, M. Shahbaz, and S. Yoo. “The Oracle Problem in Software Testing: a Survey”. In: Ieee transactions on software engineering 41.5 (2015), pp. 507-525." }, "id" : { "@value" : "od_______322::8a2eb300b73cf67f9060f8acb68f582d", "@type" : "openaire", "@trustLevel" : "0.6956351" } }, { "@position" : "12", "rawText" : { "$" : "[12] E. T. Barr, Y. Brun, P. T. Devanbu, M. Harman, and F. Sarro. “The Plastic Surgery Hypothesis”. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. 2014, pp. 306-317." } }, { "@position" : "13", "rawText" : { "$" : "[13] E. D. Berger and B. G. Zorn. “DieHard: Probabilistic Memory Safety for Unsafe Languages”. In: Acm sigplan notices 41.6 (2006), pp. 158-168." } }, { "@position" : "14", "rawText" : { "$" : "[14] R. Bodik and B. Jobstmann. “Algorithmic Program Synthesis: Introduction”. In: International journal on software tools for technology transfer 15.5 (2013), pp. 397- 411." } }, { "@position" : "15", "rawText" : { "$" : "[15] M. Brodie, S. Ma, G. Lohman, L. Mignet, M. Wilding, J. Champlin, and P. Sohn. “Quickly Finding Known Software Problems via Automated Symptom Matching”. In: Proceedings of the International Conference on Autonomic Computing. 2005, pp. 101-110." } }, { "@position" : "16", "rawText" : { "$" : "[16] Y. Brun, E. Barr, M. Xiao, C. Le Goues, and P. Devanbu. Evolution Vs. Intelligent Design in Program Patching. Tech. rep. UC Davis, 2013." } }, { "@position" : "17", "rawText" : { "$" : "[17] Y. Cai and L. Cao. “Fixing Deadlocks via Lock Pre-acquisitions”. In: Proceedings of the 38th international conference on software engineering. ACM. 2016, pp. 1109- 1120." } }, { "@position" : "18", "rawText" : { "$" : "[18] G. Candea and A. Fox. “Crash-only Software”. In: Proceedings of the 9th Conference on Hot Topics in Operating Systems. 2003, pp. 12-12." } }, { "@position" : "19", "rawText" : { "$" : "[19] G. Candea and A. Fox. “Recursive Restartability: Turning the Reboot Sledgehammer Into a Scalpel”. In: Proceedings of the 8th Workshop on Hot Topics in Operating Systems. 2001, pp. 125-130." } }, { "@position" : "20", "rawText" : { "$" : "[20] G. Candea, E. Kiciman, S. Zhang, P. Keyani, and A. Fox. “JAGR: An Autonomous Self-recovering Application Server”. In: Proceedings of the Workshop on Active Middleware Services. 2003, pp. 168-177." } }, { "@position" : "21", "rawText" : { "$" : "[21] G. Candea, S. Kawamoto, Y. Fujiki, G. Friedman, and A. Fox. “Microreboot: a Technique for Cheap Recovery”. In: Proceedings of the 6th Conference on Symposium on Operating Systems Design & Implementation. 2004, pp. 3-3." } }, { "@position" : "22", "rawText" : { "$" : "[22] M. Carbin, S. Misailovic, M. Kling, and M. C. Rinard. “Detecting and Escaping Infinite Loops with Jolt”. In: Procceedings of ECOOP. 2011, pp. 609-633." }, "id" : { "@value" : "od________88::c094ddae3d97799f82f7b81ed61b428d", "@type" : "openaire", "@trustLevel" : "0.6704617" } }, { "@position" : "23", "rawText" : { "$" : "[23] A. Carzaniga, A. Gorla, A. Mattavelli, N. Perino, and M. Pezzè. “Automatic Recovery From Runtime Failures”. In: Proceedings of the International Conference on Software Engineering. 2013." }, "id" : { "@value" : "erc_________::a644ed3d5d0bf211431055edec3a2edf", "@type" : "openaire", "@trustLevel" : "0.70273936" } }, { "@position" : "24", "rawText" : { "$" : "[24] A. Carzaniga, A. Gorla, N. Perino, and M. Pezzè. “Automatic Workarounds for Web Applications”. In: Proceedings of the Foundations of Software Engineering Conference. 2010, pp. 237-246." }, "id" : { "@value" : "doi_________::3ba8db866f56f3a0e66ac3068786c073", "@type" : "openaire", "@trustLevel" : "0.6666673" } }, { "@position" : "25", "rawText" : { "$" : "[25] S. Chandra, E. Torlak, S. Barman, and R. Bodik. “Angelic Debugging”. In: Proceeding of the International Conference on Software Engineering. 2011, pp. 121-130." } }, { "@position" : "26", "rawText" : { "$" : "[26] S.-W. Cheng, D. Garlan, B. R. Schmerl, J. P. Sousa, B. Spitnagel, and P. Steenkiste. “Using Architectural Style As a Basis for System Self-repair”. In: Proceedings of the IFIP 17th World Computer Congress / 3rd IEEE/IFIP Conference on Software Architecture: System Design, Development and Maintenance. 2002, pp. 45-59." } }, { "@position" : "27", "rawText" : { "$" : "[27] Z. Coker and M. Hafiz. “Program Transformations to Fix C Integers”. In: Proceedings of the International Conference on Software Engineering. 2013, pp. 792-801." } }, { "@position" : "28", "rawText" : { "$" : "[28] B. Cornu, L. Seinturier, and M. Monperrus. “Exception Handling Analysis and Transformation Using Fault Injection: Study of Resilience Against Unanticipated Exceptions”. In: Information and Software Technology 57 (Jan. 2015), pp. 66-76." }, "id" : { "@value" : "doi_________::7f2c9178211b4d9123bf9d0d238d3ea8", "@type" : "openaire", "@trustLevel" : "0.69015485" } }, { "@position" : "29", "rawText" : { "$" : "[29] M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. “Vigilante: End-to-end Containment of Internet Worms”. In: ACM SIGOPS Operating Systems Review. Vol. 39. 5. 2005, pp. 133-147." } }, { "@position" : "30", "rawText" : { "$" : "[30] L. D'Antoni, R. Samanta, and R. Singh. “Qlose: Program Repair with Quantitative Objectives”. In: International conference on computer aided verification. Springer. 2016, pp. 383-401." } }, { "@position" : "31", "rawText" : { "$" : "[31] V. Dallmeier, A. Zeller, and B. Meyer. “Generating Fixes From Object Behavior Anomalies”. In: Proceedings of the International Conference on Automated Software Engineering. 2009." }, "id" : { "@value" : "doi_________::d9ac7ad5a76f49bacb512cbc80e9accc", "@type" : "openaire", "@trustLevel" : "0.64358836" } }, { "@position" : "32", "rawText" : { "$" : "[32] B. Daniel, V. Jagannath, D. Dig, and D. Marinov. “ReAssert: Suggesting Repairs for Broken Unit Tests”. In: Proceedings of the 24th IEEE/ACM International Conference on Automated Software Engineering. 2009, pp. 433-444." } }, { "@position" : "33", "rawText" : { "$" : "[33] V. Debroy and W. Wong. “Using Mutation to Automatically Suggest Fixes for Faulty Programs”. In: Proceedings of the International Conference on Software Testing, Verification and Validation. 2010, pp. 65-74." } }, { "@position" : "34", "rawText" : { "$" : "[34] F. Demarco, J. Xuan, D. Le Berre, and M. Monperrus. “Automatic Repair of Buggy If Conditions and Missing Preconditions with SMT”. In: Proceedings of the 6th International Workshop on Constraints in Software Testing, Verification, and Analysis (CSTVA 2014). Hyderabad, India, 2014." } }, { "@position" : "35", "rawText" : { "$" : "[35] B. Demsky and M. Rinard. “Automatic Detection and Repair of Errors in Data Structures”. In: Acm sigplan notices 38.11 (2003), pp. 78-95." }, "id" : { "@value" : "doi_________::831ce490dd2b26b411d0a3dfad3192c0", "@type" : "openaire", "@trustLevel" : "0.6797866" } }, { "@position" : "36", "rawText" : { "$" : "[36] B. Demsky and A. Dash. “Bristlecone: a Language for Robust Software Systems”. In: Proceedings of ECOOP. 2008, pp. 490-515." }, "id" : { "@value" : "doi_________::3cdeb8c61016145a5f1f9ffded00cf5f", "@type" : "openaire", "@trustLevel" : "0.65308636" } }, { "@position" : "37", "rawText" : { "$" : "[37] G. Denaro, M. Pezzè, and D. Tosi. “Ensuring Interoperable Service-oriented Systems Through Engineered Self-healing”. In: Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. 2009, pp. 253-262." }, "id" : { "@value" : "od______1299::d88b26167c1fc51ae91d2750dec1cb80", "@type" : "openaire", "@trustLevel" : "0.67078865" } }, { "@position" : "38", "rawText" : { "$" : "[38] L. A. Dennis, R. Monroy, and P. Nogueira. “Proof-directed Debugging and Repair”. In: Seventh Symposium on Trends in Functional Programming. 2006, pp. 131-140." } }, { "@position" : "39", "rawText" : { "$" : "[39] A. Dhar, R. Purandare, M. Dhawan, and S. Rangaswamy. “CLOTHO: Saving Programs from Malformed Strings and Incorrect String-handling”. In: Foundations of software engineering. ACM. 2015, pp. 555-566." }, "id" : { "@value" : "doi_________::bb0b5a79cc6ce658c7b653d02eb825ed", "@type" : "openaire", "@trustLevel" : "0.6466234" } }, { "@position" : "40", "rawText" : { "$" : "[40] K. Dobolyi and W. Weimer. “Changing Java's Semantics for Handling Null Pointer Exceptions”. In: 19th International Symposium on Software Reliability Engineering. 2008, pp. 47-56." }, "id" : { "@value" : "doi_________::94c20394972b238b716eaf27a21aa995", "@type" : "openaire", "@trustLevel" : "0.6879837" } }, { "@position" : "41", "rawText" : { "$" : "[41] J. Duraes and H. Madeira. “Emulation of Software Faults: a Field Data Study and a Practical Approach”. In: Ieee transactions on software engineering 32.11 (2006), pp. 849-867." }, "id" : { "@value" : "doi_________::de928d93db7d4cc0a0f10e4a39e7751f", "@type" : "openaire", "@trustLevel" : "0.6419633" } }, { "@position" : "42", "rawText" : { "$" : "[42] M. Eisenstadt. “My Hairiest Bug War Stories”. In: Communications of the acm 40.4 (1997), pp. 30-37." }, "id" : { "@value" : "doi_________::24d27bafdd755a229c6a8f8e46be25e6", "@type" : "openaire", "@trustLevel" : "0.6089758" } }, { "@position" : "43", "rawText" : { "$" : "[43] B. Elkarablieh, I. Garcia, Y. Suen, and S. Khurshid. “Assertion-based Repair of Complex Data Structures”. In: Proceedings of the Twenty-second IEEE/ACM International Conference on Automated Software Engineering. 2007, pp. 64-73." } }, { "@position" : "44", "rawText" : { "$" : "[44] H. ETO and K. Yoda. “Propolice: Improved Stacksmashing Attack Detection”. In: Ipsj sig notes 75 (2001), pp. 181-188." } }, { "@position" : "45", "rawText" : { "$" : "[45] S. Forrest, T. Nguyen, W. Weimer, and C. Le Goues. “A Genetic Programming Approach to Automated Software Repair”. In: Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation. 2009, pp. 947-954." } }, { "@position" : "46", "rawText" : { "$" : "[46] G. Friedrich, M. Fugini, E. Mussi, B. Pernici, and G. Tagni. “Exception Handling for Repair in Service-Based Processes”. In: Ieee transactions on software engineering 36.2 (2010), pp. 198-215." } }, { "@position" : "47", "rawText" : { "$" : "[47] Z. P. Fry, B. Landau, and W. Weimer. “A Human Study of Patch Maintainability”. In: Proceedings of the International Symposium on Software Testing and Analysis. 2012, pp. 177-187." } }, { "@position" : "48", "rawText" : { "$" : "[48] R. P. Gabriel and R. Goldman. “Conscientious Software”. In: Acm Sigplan Notices. Vol. 41. 10. 2006, pp. 433-450." } }, { "@position" : "49", "rawText" : { "$" : "[49] Q. Gao, Y. Xiong, Y. Mi, L. Zhang, W. Yang, Z. Zhou, B. Xie, and H. Mei. “Safe Memory-leak Fixing for C Programs”. In: Proceedings of the 37th International Conference on Software Engineering. 2015, pp. 459-470." } }, { "@position" : "50", "rawText" : { "$" : "[50] Q. Gao, H. Zhang, J. Wang, Y. Xiong, L. Zhang, and H. Mei. “Fixing Recurring Crash Bugs via Analyzing Q&A Sites”. In: Proceedings of the 30th ieee/acm international conference on automated software engineering. ACM, 2015." } }, { "@position" : "51", "rawText" : { "$" : "[51] Z. Gao, Z. Chen, Y. Zou, and A. Memon. “SITAR: GUI Test Script Repair”. In: Ieee transactions on software engineering (2015)." } }, { "@position" : "52", "rawText" : { "$" : "[52] D. Garlan, S.-W. Cheng, and B. Schmerl. “Increasing System Dependability Through Architecture-based Self-repair”. In: Architecting Dependable Systems. 2003, pp. 61- 89." }, "id" : { "@value" : "doi_________::d85625277be9d18e919bcb5b0e882cce", "@type" : "openaire", "@trustLevel" : "0.6333976" } }, { "@position" : "53", "rawText" : { "$" : "[53] B. J. Garvin, M. B. Cohen, and M. B. Dwyer. “Using Feature Locality: Can We Leverage History to Avoid Failures During Reconfiguration?” In: Proceedings of the 8th Workshop on Assurances for Self-adaptive Systems. 2011, pp. 24-33." } }, { "@position" : "54", "rawText" : { "$" : "[54] S. George, D. Evans, and S. Marchette. “A Biological Programming Model for SelfHealing”. In: Proceedings of SSRS. 2013." } }, { "@position" : "55", "rawText" : { "$" : "[55] D. Ghosh, R. Sharman, H. Raghav Rao, and S. Upadhyaya. “Self-healing Systems-survey and Synthesis”. In: Decision support systems 42.4 (2007), pp. 2164- 2185." } }, { "@position" : "56", "rawText" : { "$" : "[56] D. Gopinath, S. Khurshid, D. Saha, and S. Chandra. “Data-guided Repair of Selection Statements”. In: Proceedings of the 36th International Conference on Software Engineering. 2014, pp. 243-253." } }, { "@position" : "57", "rawText" : { "$" : "[57] D. Gopinath, M. Z. Malik, and S. Khurshid. “Specification-based Program Repair Using SAT”. In: Proceedings of the International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 2011." } }, { "@position" : "58", "rawText" : { "$" : "[58] A. Griesmayer, R. Bloem, and B. Cook. “Repair of Boolean Programs with An Application to C”. In: Computer Aided Verification. 2006, pp. 358-371." }, "id" : { "@value" : "doi_________::548cdecf229ac417a54d97bd6927711e", "@type" : "openaire", "@trustLevel" : "0.6535551" } }, { "@position" : "59", "rawText" : { "$" : "[59] R. Gupta, S. Pal, A. Kanade, and S. Shevade. “DeepFix: Fixing Common C Language Errors by Deep Learning”. In: Proceedings of the aaai conference on artificial intelligence. 2017." } }, { "@position" : "60", "rawText" : { "$" : "[60] B. Hartmann, D. MacDougall, J. Brandt, and S. R. Klemmer. “What Would Other Programmers Do: Suggesting Solutions to Error Messages”. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 2010, pp. 1019-1028." } }, { "@position" : "61", "rawText" : { "$" : "[61] H. He and N. Gupta. “Automated Debugging Using Path-Based Weakest Preconditions”. In: FASE. 2004, pp. 267-280." } }, { "@position" : "62", "rawText" : { "$" : "[62] P. Hosek and C. Cadar. “Safe Software Updates via Multi-version Execution”. In: Proceedings of the International Conference on Software Engineering. 2013, pp. 612- 621." }, "id" : { "@value" : "doi_________::95023b71791957385eba9b2bc7b6b0e5", "@type" : "openaire", "@trustLevel" : "0.77703565" } }, { "@position" : "63", "rawText" : { "$" : "[63] D. Hovemeyer and W. Pugh. “Finding Bugs Is Easy”. In: Acm sigplan notices 39.12 (2004)." }, "id" : { "@value" : "doi_________::98bdf4bc886d9538280ce8467742014f", "@type" : "openaire", "@trustLevel" : "0.68069535" } }, { "@position" : "64", "rawText" : { "$" : "[64] Y. Huang, C. Kintala, N. Kolettis, and N. Fulton. “Software Rejuvenation: Analysis, Module and Applications”. In: Proceedings of the International Symposium on FaultTolerant Computing. 1995, pp. 381-390." } }, { "@position" : "65", "rawText" : { "$" : "[65] D. Jackson and M. Vaziri. “Finding Bugs with a Constraint Solver”. In: Proceedings of the 2000 ACM SIGSOFT International Symposium on Software Testing and Analysis. 2000, pp. 14-25." } }, { "@position" : "66", "rawText" : { "$" : "[66] D. Jeffrey, M. Feng, N. Gupta, and R. Gupta. “BugFix: a Learning-based Tool to Assist Developers in Fixing Bugs”. In: ICPC. 2009, pp. 70-79." } }, { "@position" : "67", "rawText" : { "$" : "[67] D. Jeffrey, N. Gupta, and R. Gupta. “Fault Localization Using Value Replacement”. In: Proceedings of the International Symposium on Software Testing and Analysis. 2008, pp. 167-178." } }, { "@position" : "68", "rawText" : { "$" : "[68] S. Jha, S. Gulwani, S. A. Seshia, and A. Tiwari. “Oracle-guided Component-based Program Synthesis”. In: Proceedings of the International Conference on Software Engineering. Vol. 1. 2010, pp. 215-224." } }, { "@position" : "69", "rawText" : { "$" : "[69] M. Jiang, T. Y. Chen, F.-C. Kuo, D. Towey, and Z. Ding. “A Metamorphic Testing Approach for Supporting Program Repair without the Need for a Test Oracle”. In: Journal of systems and software (2016)." } }, { "@position" : "70", "rawText" : { "$" : "[70] G. Jin, L. Song, W. Zhang, S. Lu, and B. Liblit. “Automated Atomicity-violation Fixing”. In: Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation. 2011, pp. 389-400." } }, { "@position" : "71", "rawText" : { "$" : "[71] B. Jobstmann, A. Griesmayer, and R. Bloem. “Program Repair As a Game”. In: Computer Aided Verification. 2005, pp. 226-238." }, "id" : { "@value" : "c2b0b933574d::fbadc2a0228cc04ee6c81e36fefaae33", "@type" : "openaire", "@trustLevel" : "0.68398625" } }, { "@position" : "72", "rawText" : { "$" : "[72] H. Jula, D. Tralamazza, C. Zamfir, and G. Candea. “Deadlock Immunity: Enabling Systems to Defend Against Deadlocks”. In: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation. 2008, pp. 295-308." }, "id" : { "@value" : "snsf_p3_pubs::fb0b54b74e1cbedb111b95a531c14cf1", "@type" : "openaire", "@trustLevel" : "0.60978603" } }, { "@position" : "73", "rawText" : { "$" : "[73] S. Kaleeswaran, V. Tulsian, A. Kanade, and A. Orso. “Minthint: Automated Synthesis of Repair Hints”. In: Proceedings of the International Conference on Software Engineering. 2014, pp. 266-276." } }, { "@position" : "74", "rawText" : { "$" : "[74] S. Kalvala and R. Warburton. “A Formal Approach to Fixing Bugs”. In: Formal Methods, Foundations and Applications. 2011, pp. 172-187." }, "id" : { "@value" : "doi_________::d00dd2d207fdd41a5344650907ff0c85", "@type" : "openaire", "@trustLevel" : "0.67734885" } }, { "@position" : "75", "rawText" : { "$" : "[75] A. Kalyanpur, B. Parsia, E. Sirin, and B. Cuenca-Grau. “Repairing Unsatisfiable Concepts in OWL Ontologies”. In: The Semantic Web: Research and Applications. Vol. 4011. 2006, pp. 170-184." }, "id" : { "@value" : "dris___01025::c7c5bc96ddfd02c346496e368c8db542", "@type" : "openaire", "@trustLevel" : "0.66630703" } }, { "@position" : "76", "rawText" : { "$" : "[76] M. Kasbekar, C. Narayanan, and C. Das. “Selective Checkpointing and Rollbacks in Multi-threaded Object-oriented Environment”. In: Ieee transactions on reliability 48.4 (1999), pp. 325-337." } }, { "@position" : "77", "rawText" : { "$" : "[77] Y. Ke, K. T. Stolee, C. Le Goues, and Y. Brun. “Repairing Programs with Semantic Code Search”. In: Proceedings of the International Conference on Automated Software Engineering. 2015." } }, { "@position" : "78", "rawText" : { "$" : "[78] C. Kern and J. Esparza. “Automatic Error Correction of Java Programs”. In: Formal Methods for Industrial Critical Systems. 2010, pp. 67-81." } }, { "@position" : "79", "rawText" : { "$" : "[79] D. Kim, J. Nam, J. Song, and S. Kim. “Automatic Patch Generation Learned From Human-Written Patches”. In: Proceedings of ICSE. 2013." } }, { "@position" : "80", "rawText" : { "$" : "[80] E. Kneuss, M. Koukoutos, and V. Kuncak. “Deductive Program Repair”. In: International conference on computer aided verification. Springer. 2015, pp. 217-233." }, "id" : { "@value" : "doi_________::b9fabffd1bc6c55238a566f0d289f01c", "@type" : "openaire", "@trustLevel" : "0.6627885" } }, { "@position" : "81", "rawText" : { "$" : "[81] D. E. Knuth. “The Errors of TEX”. In: Softw., pract. exper. 19.7 (1989), pp. 607-685." } }, { "@position" : "82", "rawText" : { "$" : "[82] X. Kong, L. Zhang, W. E. Wong, and B. Li. “Experience report: how do techniques, programs, and tests impact automated program repair?” In: International symposium on software reliability engineering. IEEE. 2015, pp. 194-204." } }, { "@position" : "83", "rawText" : { "$" : "[83] R. Könighofer and R. Bloem. “Automated Error Localization and Correction for Imperative Programs”. In: Formal Methods in Computer-Aided Design (FMCAD), 2011. 2011, pp. 91-100." } }, { "@position" : "84", "rawText" : { "$" : "[84] R. Könighofer and R. Bloem. “Repair with On-the-fly Program Analysis”. In: Hardware and Software: Verification and Testing. 2013, pp. 56-71." }, "id" : { "@value" : "doi_________::436a81a296b9e029d48a820dfd54516b", "@type" : "openaire", "@trustLevel" : "0.6695329" } }, { "@position" : "85", "rawText" : { "$" : "[85] R. Koo and S. Toueg. “Checkpointing and Rollback-recovery for Distributed Systems”. In: Ieee transactions on software engineering 1 (1987), pp. 23-31." } }, { "@position" : "86", "rawText" : { "$" : "[86] M. Lake. Epic Failures: 11 Infamous Software Bugs. http://www.computerworld. com/article/2515483/enterprise- applications/epic- failures-- 11- infamous- softwarebugs.html. 2010." } }, { "@position" : "87", "rawText" : { "$" : "[87] S. Lamelas and M. Monperrus. Automatic Repair of Infinite Loops. Technical Report hal-01144026. University of Lille, 2015." }, "id" : { "@value" : "od______4254::ee2a07f66a42e1ac390285d653661004", "@type" : "openaire", "@trustLevel" : "0.6853216" } }, { "@position" : "88", "rawText" : { "$" : "[88] J. L. Lawall, J. Brunel, N. Palix, R. R. Hansen, H. Stuart, and G. Muller. “WYSIWIB: a Declarative Approach to Finding API Protocols and Bugs in Linux Code”. In: International Conference on Dependable Systems & Networks. 2009, pp. 43-52." } }, { "@position" : "89", "rawText" : { "$" : "[89] N. Lazaar, A. Gotlieb, and Y. Lebbah. “A Framework for the Automatic Correction of Constraint Programs”. In: Proceedings of the International Conference on Software Testing, Verification and Validation. 2011, pp. 319-326." }, "id" : { "@value" : "doi_________::01f4566cd3c811cf918e796095b98159", "@type" : "openaire", "@trustLevel" : "0.67730725" } }, { "@position" : "90", "rawText" : { "$" : "[90] C. Le Goues, M. Dewey-Vogt, S. Forrest, and W. Weimer. “A Systematic Study of Automated Program Repair: Fixing 55 Out of 105 Bugs for $8 Each”. In: Proceedings of the International Conference on Software Engineering. 2012, pp. 3-13." } }, { "@position" : "91", "rawText" : { "$" : "[91] C. Le Goues, S. Forrest, and W. Weimer. “Current Challenges in Automatic Software Repair”. In: Software quality journal 21.3 (2013), pp. 421-443." }, "id" : { "@value" : "doi_________::9bc22c7f896fc815d34331fc8ca130ad", "@type" : "openaire", "@trustLevel" : "0.6842719" } }, { "@position" : "92", "rawText" : { "$" : "[92] C. Le Goues, N. Holtschulte, E. K. Smith, Y. Brun, P. Devanbu, S. Forrest, and W. Weimer. “The ManyBugs and IntroClass Benchmarks for Automated Repair of C Programs”. In: Ieee transactions on software engineering (tse), in press (2015)." }, "id" : { "@value" : "doi_________::cf3f3afaded86d7d82fb50ca40925607", "@type" : "openaire", "@trustLevel" : "0.62086505" } }, { "@position" : "93", "rawText" : { "$" : "[93] C. Le Goues, T. Nguyen, S. Forrest, and W. Weimer. “GenProg: a Generic Method for Automatic Software Repair”. In: Ieee transactions on software engineering 38 (2012), pp. 54-72." } }, { "@position" : "94", "rawText" : { "$" : "[94] X. B. D. Le, D. Lo, and C. L. Goues. “History Driven Program Repair”. In: Proceedings of the 23rd international conference on software analysis, evolution, and reengineering (saner). 2016, pp. 213-224." } }, { "@position" : "95", "rawText" : { "$" : "[95] M. Leotta, D. Clerissi, F. Ricca, and C. Spadaro. “Repairing Selenium Test Cases: an Industrial Case Study about Web Page Element Localization”. In: International conference on software testing, verification and validation. IEEE. 2013, pp. 487-488." }, "id" : { "@value" : "doi_________::80d6db949a21f0405a94330ae97a5028", "@type" : "openaire", "@trustLevel" : "0.67532986" } }, { "@position" : "96", "rawText" : { "$" : "[96] R. Levinson. “Unified Planning and Execution for Autonomous Software Repair”. In: Workshop on Plan Execution: a Reality Check. 2005." } }, { "@position" : "97", "rawText" : { "$" : "[97] C. Lewis and J. Whitehead. “Runtime Repair of Software Faults Using Event-driven Monitoring”. In: Proceedings of the 32nd acm/ieee international conference on software engineering - icse '10 2 (2010), p. 275." } }, { "@position" : "98", "rawText" : { "$" : "[98] Z. Liang and R. Sekar. “Fast and Automated Generation of Attack Signatures: a Basis for Building Self-protecting Servers”. In: Proceedings of the 12th ACM Conference on Computer and Communications Security. 2005, pp. 213-222." }, "id" : { "@value" : "doi_________::8f8b11d6ced6a501e5c5c8cc0f889f06", "@type" : "openaire", "@trustLevel" : "0.6710854" } }, { "@position" : "99", "rawText" : { "$" : "[99] Y. Lin and S. Kulkarni. “Automatic Repair for Multi-threaded Programs with Deadlock/Livelock Using Maximum Satisfiability”. In: Proceedings of the 2014 international symposium on software testing and analysis. ACM. 2014, pp. 237-247." } }, { "@position" : "100", "rawText" : { "$" : "[100] Z. Lin, X. Jiang, D. Xu, B. Mao, and L. Xie. “AutoPaG: Towards Automated Software Patch Generation with Source Code Root Cause Identification and Repair”. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. 2007, pp. 329-340." } }, { "@position" : "101", "rawText" : { "$" : "[101] C. Liu, J. Yang, L. Tan, and M. Hafiz. “R2Fix: Automatically Generating Bug Fixes From Bug Reports”. In: Proceedings of the International Conference on Software Testing, Verification and Validation (ICST). 2013, pp. 282-291." } }, { "@position" : "102", "rawText" : { "$" : "[102] H. Liu, Y. Chen, and S. Lu. “Understanding and Generating High Quality Patches for Concurrency bugs”. In: Proceedings of the 2016 24th acm sigsoft international symposium on foundations of software engineering. ACM. 2016, pp. 715-726." } }, { "@position" : "103", "rawText" : { "$" : "[103] P. Liu and C. Zhang. “Axis: Automatically Fixing Atomicity Violations Through Solving Control Constraints”. In: Proceedings of the 2012 International Conference on Software Engineering. 2012, pp. 299-309." } }, { "@position" : "104", "rawText" : { "$" : "[104] M. E. Locasto, S. Sidiroglou, and A. D. Keromytis. “Software Self-Healing Using Collaborative Application Communities”. In: Proceedings of the Network and Distributed System Security Symposium. 2006." }, "id" : { "@value" : "doi_________::6e539f0301aa67945ea78037c50f8cac", "@type" : "openaire", "@trustLevel" : "0.6636007" } }, { "@position" : "105", "rawText" : { "$" : "[105] F. Logozzo and T. Ball. “Modular and Verified Automatic Program Repair”. In: Proceedings of the 27th ACM International Conference on Object Oriented Programming Systems Languages and Applications. 2012." }, "id" : { "@value" : "doi_________::d4c79c47b10fe4a7677a642634719536", "@type" : "openaire", "@trustLevel" : "0.6743879" } }, { "@position" : "106", "rawText" : { "$" : "[106] F. Logozzo and M. Martel. “Automatic Repair of Overflowing Expressions with Abstract Interpretation”. In: Semantics, Abstract Interpretation, and Reasoning About Programs: Essays Dedicated to David A. Schmidt on the Occasion of His Sixtieth Birthday. Vol. 129. 2013, pp. 341-357." }, "id" : { "@value" : "arXiv_______::5e5896e3999c1c0a6190974d22f9694a", "@type" : "openaire", "@trustLevel" : "0.73015213" } }, { "@position" : "107", "rawText" : { "$" : "[107] F. Long, V. Ganesh, M. Carbin, S. Sidiroglou, and M. Rinard. “Automatic Input Rectification”. In: Proceedings of ICSE. 2012." } }, { "@position" : "108", "rawText" : { "$" : "[108] F. Long and M. C. Rinard. “Prophet: Automatic Patch Generation via Learning From Successful Patches”. In: Proceedings of the Symposium on Principles of Programming Languages. 2016." } }, { "@position" : "109", "rawText" : { "$" : "[109] F. Long and M. C. Rinard. “Staged Program Repair with Condition Synthesis”. In: Proceedings of ESEC/FSE. 2015." } }, { "@position" : "110", "rawText" : { "$" : "[110] F. Long, S. Sidiroglou-Douskos, D. Kim, and M. Rinard. “Sound Input Filter Generation for Integer Overflow Errors”. In: Acm sigplan notices 49.1 (2014), pp. 439- 452." } }, { "@position" : "111", "rawText" : { "$" : "[111] F. Long, S. Sidiroglou-Douskos, and M. C. Rinard. “Automatic Runtime Error Repair and Containment via Recovery Shepherding”. In: ACM SIGPLAN Conference on Programming Language Design and Implementation. 2014." }, "id" : { "@value" : "od________88::0be88c19cf018a64e73bc16f959a0eba", "@type" : "openaire", "@trustLevel" : "0.6835259" } }, { "@position" : "112", "rawText" : { "$" : "[112] M. Malik, J. Siddiqi, and S. Khurshid. “Constraint-Based Program Debugging Using Data Structure Repair”. In: International Conference on Software Testing, Verification and Validation (ICST). 2011, pp. 190-199." } }, { "@position" : "113", "rawText" : { "$" : "[113] M. Martinez, T. Durieux, R. Sommerard, J. Xuan, and M. Monperrus. “Automatic Repair of Real Bugs in Java: A Large-Scale Experiment on the Defects4J Dataset”. In: Empirical Software Engineering 22.4 (2017), pp. 1936-1964." }, "id" : { "@value" : "od______4254::dc65421c6a852c7f73e37b6357446a33", "@type" : "openaire", "@trustLevel" : "0.7200749" } }, { "@position" : "114", "rawText" : { "$" : "[114] M. Martinez and M. Monperrus. “Mining Software Repair Models for Reasoning on the Search Space of Automated Program Fixing”. In: Empirical Software Engineering 20.1 (2015), pp. 176-205." } }, { "@position" : "115", "rawText" : { "$" : "[115] M. Martinez, W. Weimer, and M. Monperrus. “Do the Fix Ingredients Already Exist? An Empirical Inquiry into the Redundancy Assumptions of Program Repair Approaches”. In: ICSE - 36th IEEE International Conference on Software Engineering. Hyderabad, India, June 2014." } }, { "@position" : "116", "rawText" : { "$" : "[116] S. Mechtaev, J. Yi, and A. Roychoudhury. “Angelix: Scalable Multiline Program Patch Synthesis via Symbolic Analysis”. In: Proceedings of the 38th international conference on software engineering. 2016, pp. 691-701." } }, { "@position" : "117", "rawText" : { "$" : "[117] S. Mechtaev, J. Yi, and A. Roychoudhury. “DirectFix: Looking for Simple Program Repairs”. In: Proceedings of the 37th International Conference on Software Engineering. 2015." } }, { "@position" : "118", "rawText" : { "$" : "[118] I. Medeiros, N. F. Neves, and M. Correia. “Automatic detection and correction of web application vulnerabilities using data mining to predict false positives”. In: Proceedings of the 23rd international conference on world wide web. ACM. 2014, pp. 63- 74." } }, { "@position" : "119", "rawText" : { "$" : "[119] A. M. Memon. “Automatically Repairing Event Sequence-based GUI Test Suites for Regression Testing”. In: Acm transactions on software engineering and methodology 18.2 (2008), p. 4." } }, { "@position" : "120", "rawText" : { "$" : "[120] N. Meng, M. Kim, and K. S. McKinley. “LASE: Locating and Applying Systematic Edits by Learning From Examples”. In: Proceedings of the International Conference on Software Engineering. 2013, pp. 502-511." } }, { "@position" : "121", "rawText" : { "$" : "[121] N. Meng, M. Kim, and K. S. McKinley. “Systematic Editing: Generating Program Transformations From An Example”. In: Proceedings of the 32Nd ACM SIGPLAN Conference on Programming Language Design and Implementation. 2011, pp. 329- 342." } }, { "@position" : "122", "rawText" : { "$" : "[122] M. G. Merideth. “Enhancing Survivability with Proactive Fault-containment”. In: The 2003 International Conference on Dependable Systems and Networks. 2003." } }, { "@position" : "123", "rawText" : { "$" : "[123] B. Meyer. “Applying 'design by Contract'”. In: Computer 25.10 (1992), pp. 40-51." } }, { "@position" : "124", "rawText" : { "$" : "[124] M. Monperrus. “A Critical Review of ”Automatic Patch Generation Learned from Human-Written Patches”: Essay on the Problem Statement and the Evaluation of Automatic Software Repair”. In: International Conference on Software Engineering. Hyderabad, India, 2014, pp. 234-242." }, "id" : { "@value" : "inria2______::8a02d9f0b27d01a6be15d5b3a0c0fbec", "@type" : "openaire", "@trustLevel" : "0.6732154" } }, { "@position" : "125", "rawText" : { "$" : "[125] M. Monperrus. “Principles of Antifragile Software”. In: Proceedings of the Salon des Refusés 2017. Brussels, Belgium, 2017." }, "id" : { "@value" : "doi_________::ae7791b0a5a8377dd822b3ab58ba52ed", "@type" : "openaire", "@trustLevel" : "0.7049398" } }, { "@position" : "126", "rawText" : { "$" : "[126] P. Muntean, V. K. Kommanapalli, A. Ibing, and C. Eckert. “Automated Generation of Buffer Overflows Quick Fixes Using Symbolic Execution and SMT”. In: International Conference on Computer Safety, Reliability & Security (SAFECOMP'15). 2015." } }, { "@position" : "127", "rawText" : { "$" : "[127] C. Nentwich, W. Emmerich, and A. Finkelstein. “Consistency Management with Repair Actions”. In: Proceedings of the 25th International Conference on Software Engineering. 2003, pp. 455-464." } }, { "@position" : "128", "rawText" : { "$" : "[128] H. D. T. Nguyen, D. Qi, A. Roychoudhury, and S. Chandra. “SemFix: Program Repair via Semantic Analysis”. In: Proceedings of the International Conference on Software Engineering. 2013." } }, { "@position" : "129", "rawText" : { "$" : "[129] H. H. Nguyen and M. Rinard. “Detecting and Eliminating Memory Leaks Using Cyclic Memory Allocation”. In: Proceedings of the 6th International Symposium on Memory Management. 2007, pp. 15-30." } }, { "@position" : "130", "rawText" : { "$" : "[130] M. Nica, S. Nica, and F. Wotawa. “On the Use of Mutations and Testing for Debugging”. In: Software: practice and experience 43.9 (2013), pp. 1121-1142." } }, { "@position" : "131", "rawText" : { "$" : "[131] G. Novark, E. Berger, and B. Zorn. “Exterminator: Automatically Correcting Memory Errors with High Probability”. In: Acm sigplan notices 42.6 (2007), pp. 1-11." } }, { "@position" : "132", "rawText" : { "$" : "[132] V. Oliveira, E. Souza, C. Le Goues, and C. G. Camilo. “Improved Crossover Operators for Genetic Programming for Program Repair”. In: Proceedings of the 8th international symposium on search based software engineering. 2016." } }, { "@position" : "133", "rawText" : { "$" : "[133] Y. Padioleau, J. Lawall, R. Hansen, and G. Muller. “Documenting and Automating Collateral Evolutions in Linux Device Drivers”. In: Acm sigops operating systems review 42.4 (2008), pp. 247-260." } }, { "@position" : "134", "rawText" : { "$" : "[134] J. H. Perkins, G. Sullivan, W.-F. Wong, Y. Zibin, M. D. Ernst, M. Rinard, S. Kim, S. Larsen, S. Amarasinghe, J. Bachrach, M. Carbin, C. Pacheco, F. Sherwood, and S. Sidiroglou. “Automatically Patching Errors in Deployed Software”. In: Proceedings of the Symposium on Operating Systems Principles (2009), p. 87." } }, { "@position" : "135", "rawText" : { "$" : "[135] B. Pernici and A. M. Rosati. “Automatic Learning of Repair Strategies for Web Services”. In: Proceedings of the Fifth European Conference on Web Services. 2007, pp. 119-128." }, "id" : { "@value" : "doi_________::2d71ded40760d2ffa471bd4ef19231bf", "@type" : "openaire", "@trustLevel" : "0.6622441" } }, { "@position" : "136", "rawText" : { "$" : "[136] M. Pezzè, M. C. Rinard, W. Weimer, and A. Zeller. Self-Repairing Programs, Report From Dagstuhl Seminar. Tech. rep. 11062. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2011." } }, { "@position" : "137", "rawText" : { "$" : "[137] Y. Qi, X. Mao, and Y. Lei. “Efficient Automated Program Repair Through FaultRecorded Testing Prioritization”. In: Proceedings of ICSM. 2013." } }, { "@position" : "138", "rawText" : { "$" : "[138] Y. Qi, X. Mao, and Y. Lei. “Program Repair As Sound Optimization of Broken Programs”. In: International Symposium on Theoretical Aspects of Software Engineering. 2009." } }, { "@position" : "139", "rawText" : { "$" : "[139] Y. Qi, X. Mao, Y. Lei, Z. Dai, and C. Wang. “The Strength of Random Search on Automated Program Repair”. In: Proceedings of the 36th International Conference on Software Engineering. 2014, pp. 254-265." } }, { "@position" : "140", "rawText" : { "$" : "[140] Z. Qi, F. Long, S. Achour, and M. Rinard. “An Analysis of Patch Plausibility and Correctness for Generate-And-Validate Patch Generation Systems”. In: Proceedings of ISSTA. 2015." } }, { "@position" : "141", "rawText" : { "$" : "[141] F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou. “Rx: Treating Bugs As Allergies-a Safe Method to Survive Software Failures”. In: Acm sigops operating systems review 39.5 (2005), pp. 235-248." } }, { "@position" : "142", "rawText" : { "$" : "[142] B. Randell. “System Structure for Software Fault Tolerance”. In: Ieee transactions on software engineering 2 (1975), pp. 220-232." }, "id" : { "@value" : "doi_________::265e575335f9998cf7b95357b2904db2", "@type" : "openaire", "@trustLevel" : "0.7009199" } }, { "@position" : "143", "rawText" : { "$" : "[143] M. Rinard, C. Cadar, D. Dumitran, D. Roy, T. Leu, and W. Beebee Jr. “Enhancing Server Availability and Security Through Failure-oblivious Computing”. In: Proceedings of the 6th Conference on Symposium on Operating Systems, Design & Implementation. 2004, pp. 21-21." } }, { "@position" : "144", "rawText" : { "$" : "[144] M. Rinard, M. Ernst, and J. Perkins. Collaborative Learning for Security and Repair in Application Communities. Tech. rep. Massachusetts Institute of Technology, 2011." } }, { "@position" : "145", "rawText" : { "$" : "[145] M. Rinard. “Acceptability-oriented Computing”. In: Acm sigplan notices 38.12 (2003), pp. 57-75." }, "id" : { "@value" : "doi_________::bffaa22ee4c97423c1326667eb32d531", "@type" : "openaire", "@trustLevel" : "0.68851733" } }, { "@position" : "146", "rawText" : { "$" : "[146] M. C. Rinard. Survival Techniques for Computer Programs. Tech. rep. MIT, 2006." } }, { "@position" : "147", "rawText" : { "$" : "[147] M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, and T. Leu. “A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)”. In: Proceedings of the 20th Annual Computer Security Applications Conference. 2004, pp. 82-90." } }, { "@position" : "148", "rawText" : { "$" : "[148] J. Rohr. “STAREX Self-repair Routines: Software Recovery in the JPL-STAR Computer”. In: Proceedings of FTCS. 1973." } }, { "@position" : "149", "rawText" : { "$" : "[149] R. Samanta, O. Olivo, and E. A. Emerson. “Cost-aware Automatic Program Repair”. In: International static analysis symposium. Springer. 2014, pp. 268-284." } }, { "@position" : "150", "rawText" : { "$" : "[150] H. Samimi, M. Schäfer, S. Artzi, T. D. Millstein, F. Tip, and L. J. Hendren. “Automated Repair of HTML Generation Errors in PHP Applications Using String Constraint Solving”. In: Proceedings of ICSE. 2012, pp. 277-287." } }, { "@position" : "151", "rawText" : { "$" : "[151] E. Schulte, S. Forrest, and W. Weimer. “Automated Program Repair Through the Evolution of Assembly Code”. In: Proceedings of the IEEE/ACM International Conference on Automated Software Engineering. 2010, pp. 313-316." } }, { "@position" : "152", "rawText" : { "$" : "[152] A. Sethi et al. “A Survey of Fault Localization Techniques in Computer Networks”. In: Science of computer programming 53.2 (2004), pp. 165-194." }, "id" : { "@value" : "core_ac_uk__::06fb1e690cfcc685a35abf56d4e29a48", "@type" : "openaire", "@trustLevel" : "0.6542762" } }, { "@position" : "153", "rawText" : { "$" : "[153] A. Shaw, D. Doggett, and M. Hafiz. “Automatically Fixing C Buffer Overflows Using Program Transformations”. In: International Conference on Dependable Systems and Networks. 2014, pp. 124-135." } }, { "@position" : "154", "rawText" : { "$" : "[154] M. Shaw. “Self-healing: Softening Precision to Avoid Brittleness”. In: Proceedings of the First Workshop on Self-healing Systems. 2002, pp. 111-114." } }, { "@position" : "155", "rawText" : { "$" : "[155] S. Sicard, F. Boyer, and N. De Palma. “Using Components for Architecture-based Management: the Self-repair Case”. In: Proceedings of the 30th International Conference on Software Engineering. 2008, pp. 101-110." }, "id" : { "@value" : "doi_________::af483ea4528178bb1be30995589415b6", "@type" : "openaire", "@trustLevel" : "0.64197457" } }, { "@position" : "156", "rawText" : { "$" : "[156] S. Sidiroglou-Douskos, E. Lahtinen, F. Long, and M. Rinard. “Automatic Error Elimination by Horizontal Code Transfer Across Multiple Applications”. In: Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation. 2015, pp. 43-54." }, "id" : { "@value" : "doi_________::e495eb0ff86f5eb4d9e0e20a871c0e00", "@type" : "openaire", "@trustLevel" : "0.6810099" } }, { "@position" : "157", "rawText" : { "$" : "[157] S. Sidiroglou-Douskos, S. Misailovic, H. Hoffmann, and M. Rinard. “Managing Performance Vs. Accuracy Trade-offs with Loop Perforation”. In: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering. 2011, pp. 124-134." } }, { "@position" : "158", "rawText" : { "$" : "[158] S. Sidiroglou and A. Keromytis. “Countering Network Worms Through Automatic Patch Generation”. In: Security & privacy 3.6 (2005), pp. 41-49." } }, { "@position" : "159", "rawText" : { "$" : "[159] S. Sidiroglou, O. Laadan, C. Perez, N. Viennot, J. Nieh, and A. Keromytis. “Assure: Automatic Software Self-healing Using Rescue Points”. In: Acm sigplan notices 44.3 (2009), pp. 37-48." } }, { "@position" : "160", "rawText" : { "$" : "[160] S. Sidiroglou, M. Locasto, S. Boyd, and A. Keromytis. “Building a Reactive Immune System for Software Services”. In: Proceedings of the USENIX Annual Technical Conference. Vol. 161. 2005." }, "id" : { "@value" : "doi_________::5d0807395219894b44b9153330b32a0d", "@type" : "openaire", "@trustLevel" : "0.6067748" } }, { "@position" : "161", "rawText" : { "$" : "[161] J. Silva. “A Survey on Algorithmic Debugging Strategies”. In: Advances in engineering software 42.11 (2011), pp. 976-991." } }, { "@position" : "162", "rawText" : { "$" : "[162] M. A. A. da Silva, A. Mougenot, X. Blanc, and R. Bendraou. “Towards Automated Inconsistency Handling in Design Models”. In: Proceedings of the 22nd International Conference on Advanced Information Systems Engineering. 2010, pp. 348-362." } }, { "@position" : "163", "rawText" : { "$" : "[163] R. Singh, S. Gulwani, and A. Solar-Lezama. “Automated Feedback Generation for Introductory Programming Assignments”. In: ACM SIGPLAN Notices. Vol. 48. 6. 2013, pp. 15-26." }, "id" : { "@value" : "core_ac_uk__::1ddb459a7dd1dcbd334e1e499aad44a3", "@type" : "openaire", "@trustLevel" : "0.6201375" } }, { "@position" : "164", "rawText" : { "$" : "[164] A. Smirnov and T. Chiueh. “DIRA: Automatic Detection, Identification, and Repair of Control-hijacking Attacks”. In: The 12th Annual Network and Distributed System Security Symposium. 2005." } }, { "@position" : "165", "rawText" : { "$" : "[165] E. K. Smith, E. Barr, C. Le Goues, and Y. Brun. “Is the Cure Worse Than the Disease? Overfitting in Automated Program Repair”. In: Proceedings of the 10th Joint Meeting of the European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE). 2015." } }, { "@position" : "166", "rawText" : { "$" : "[166] A. Somayaji, S. Hofmeyr, and S. Forrest. “Principles of a Computer Immune System”. In: Proceedings of the 1997 Workshop on New Security Paradigms. 1998, pp. 75-82." } }, { "@position" : "167", "rawText" : { "$" : "[167] S. Son, K. S. McKinley, and V. Shmatikov. “Fix Me Up: Repairing Access-Control Bugs in Web Applications.” In: Proceedings of the Network and Distributed System Security Symposium. 2013." } }, { "@position" : "168", "rawText" : { "$" : "[168] H. Sözer, B. Tekinerdoğan, and M. Akşit. “FLORA: a Framework for Decomposing Software Architecture to Introduce Local Recovery”. In: Software: practice and experience 39.10 (2009), pp. 869-889." }, "id" : { "@value" : "dris___02403::8da03926fa2fe2d1661efec2a1289aab", "@type" : "openaire", "@trustLevel" : "0.7063425" } }, { "@position" : "169", "rawText" : { "$" : "[169] M. Staats, M. W. Whalen, and M. P. E. Heimdahl. “Programs, Tests, and Oracles: the Foundations of Testing Revisited”. In: Proceedings of the International Conference on Software Engineering. 2011, pp. 391-400." }, "id" : { "@value" : "od______2658::42c4de37eec902824c6f729b200a4560", "@type" : "openaire", "@trustLevel" : "0.7283477" } }, { "@position" : "170", "rawText" : { "$" : "[170] M. Stumptner and F. Wotawa. “A Model-based Approach to Software Debugging”. In: Proceedings on the Seventh International Workshop on Principles of Diagnosis. 1996." } }, { "@position" : "171", "rawText" : { "$" : "[171] B. Sun, R. Chang, X. Chen, and A. Podgurski. “Automated Support for Propagating Bug Fixes”. In: Proceedings of the International Symposium on Software Reliability Engineering. 2008, pp. 187-196." } }, { "@position" : "172", "rawText" : { "$" : "[172] B. Sun, G. Shu, A. Podgurski, S. Li, S. Zhang, and J. Yang. “Propagating Bug Fixes with Fast Subgraph Matching”. In: Proceedings of the International Symposium on Software Reliability Engineering. 2010, pp. 21-30." } }, { "@position" : "173", "rawText" : { "$" : "[173] G. J. Sussman. Building Robust Systems An Essay. 2007." } }, { "@position" : "174", "rawText" : { "$" : "[174] S. Tallam, C. Tian, R. Gupta, and X. Zhang. “Avoiding Program Failures Through Safe Execution Perturbations”. In: International Conference on Computer Software and Applications. 2008." }, "id" : { "@value" : "doi_________::3379f8dc9a918e60ef40c0beb473885f", "@type" : "openaire", "@trustLevel" : "0.6666087" } }, { "@position" : "175", "rawText" : { "$" : "[175] S. H. Tan and A. Roychoudhury. “Relifix: Automated Repair of Software Regressions”. In: Proceedings of ICSE. 2015." } }, { "@position" : "176", "rawText" : { "$" : "[176] Y. Tao, J. Kim, S. Kim, and C. Xu. “Automatically Generated Patches As Debugging Aids: a Human Study”. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. 2014, pp. 64-74." } }, { "@position" : "177", "rawText" : { "$" : "[177] S. Thomas and L. Williams. “Using Automated Fix Generation to Secure SQL Statements”. In: Proceedings of the Third International Workshop on Software Engineering for Secure Systems. 2007, p. 9." } }, { "@position" : "178", "rawText" : { "$" : "[178] W. Torres-Pomales et al. Software Fault Tolerance: a Tutorial. Tech. rep. NASA2000-tm210616. NASA, 2000." } }, { "@position" : "179", "rawText" : { "$" : "[179] J. Tran, M. Godfrey, E. Lee, and R. Holt. “Architectural Repair of Open Source Software”. In: Proceedings of the International Workshop on Program Comprehension. 2000, pp. 48-59." } }, { "@position" : "180", "rawText" : { "$" : "[180] K. Tsipenyuk, B. Chess, and G. McGraw. “Seven Pernicious Kingdoms: a Taxonomy of Software Security Errors”. In: Security & privacy 3.6 (2005), pp. 81-84." } }, { "@position" : "181", "rawText" : { "$" : "[181] F. Wang and C.-H. Cheng. “Program Repair Suggestions From Graphical StateTransition Specifications”. In: Proceedings of FORTE 2008. 2008." } }, { "@position" : "182", "rawText" : { "$" : "[182] T. Wang, C. Song, and W. Lee. “Diagnosis and Emergency Patch Generation for Integer Overflow Exploits”. In: Detection of Intrusions and Malware, and Vulnerability Assessment. 2014, pp. 255-275." } }, { "@position" : "183", "rawText" : { "$" : "[183] X. Wang, L. Zhang, T. Xie, Y. Xiong, and H. Mei. “Automating presentation changes in dynamic web applications via collaborative hybrid analysis”. In: Proceedings of the acm sigsoft international symposium on the foundations of software engineering. ACM. 2012, p. 16." } }, { "@position" : "184", "rawText" : { "$" : "[184] Y. Wang, Y. Huang, and C. Kintala. “Progressive Retry for Software Failure Recovery in Message-passing Applications”. In: Ieee transactions on computers 46.10 (1997), pp. 1137-1141." } }, { "@position" : "185", "rawText" : { "$" : "[185] Y. Wei, Y. Pei, C. A. Furia, L. S. Silva, S. Buchholz, B. Meyer, and A. Zeller. “Automated Fixing of Programs with Contracts”. In: Proceedings of the International Symposium on Software Testing and Analysis. 2010." } }, { "@position" : "186", "rawText" : { "$" : "[186] W. Weimer, T. Nguyen, C. Le Goues, and S. Forrest. “Automatically Finding Patches Using Genetic Programming”. In: Proceedings of the International Conference on Software Engineering. 2009." } }, { "@position" : "187", "rawText" : { "$" : "[187] W. Weimer. “Patches As Better Bug Reports”. In: Proceedings of the International Conference on Generative Programming and Component Engineering. 2006." } }, { "@position" : "188", "rawText" : { "$" : "[188] W. Weimer, S. Forrest, C. Le Goues, and T. Nguyen. “Automatic Program Repair with Evolutionary Computation”. In: Communications of the acm 53.5 (2010), p. 109." } }, { "@position" : "189", "rawText" : { "$" : "[189] W. Weimer, Z. P. Fry, and S. Forrest. “Leveraging program equivalence for adaptive program repair: models and first results”. In: International conference on automated software engineering. 2013, pp. 356-366." } }, { "@position" : "190", "rawText" : { "$" : "[190] W. Wong and V. Debroy. “A Survey on Software Fault Localization”. In: University of texas at dallas, tech. rep. utdcs-45-09 (2009)." } }, { "@position" : "191", "rawText" : { "$" : "[191] Y. Xiong, Z. Hu, H. Zhao, H. Song, M. Takeichi, and H. Mei. “Supporting Automatic Model Inconsistency Fixing”. In: 7th joint meeting of the european software engineering conference and the acm sigsoft symposium on the foundations of software engineering. ACM. 2009, pp. 315-324." } }, { "@position" : "192", "rawText" : { "$" : "[192] Y. Xiong, H. Zhang, A. Hubaux, S. She, J. Wang, and K. Czarnecki. “Range Fixes: Interactive Error Resolution for Software Configuration”. In: Ieee transactions on software engineering 41.6 (2015), pp. 603-619." } }, { "@position" : "193", "rawText" : { "$" : "[193] A. Zeller, Y. Wei, B. Meyer, M. Nordio, C. A. Furia, and Y. Pei. “Automated Fixing of Programs with Contracts”. In: Ieee transactions on software engineering 40.5 (2014), pp. 427-449." } }, { "@position" : "194", "rawText" : { "$" : "[194] X. Zhang, N. Gupta, and R. Gupta. “Locating Faults Through Automated Predicate Switching”. In: Proceedings of the 28th International Conference on Software Engineering. 2006, pp. 272-281." } }, { "@position" : "195", "rawText" : { "$" : "[195] Y. Zhang and Y. Ding. “CTL Model Update for System Modifications”. In: Journal of artificial intelligence research 31.1 (2008), pp. 113-155." } }, { "@position" : "196", "rawText" : { "$" : "[196] H. Zhong and Z. Su. “An Empirical Study on Real Bug Fixes”. In: Proceedings of the 37th International Conference on Software Engineering. 2015." } }, { "@position" : "197", "rawText" : { "$" : "[197] F. Zhou, J. Condit, Z. Anderson, I. Bagrak, R. Ennals, M. Harren, G. Necula, and E. Brewer. “SafeDrive: Safe and Recoverable Extensions Using Language-based Techniques”. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation. 2006, pp. 45-60." } } ] } }, { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "[1] R. Abraham and M. Erwig. “Goal-Directed Debugging of Spreadsheets”. In: Proceedings of the 2005 IEEE Symposium on Visual Languages and Human-Centric Computing. 2005, pp. 37-44." } }, { "@position" : "2", "rawText" : { "$" : "[2] E. Aftandilian, R. Sauciuc, S. Priya, and S. Krishnan. “Building Useful Program Analysis Tools Using An Extensible Java Compiler”. In: International Working Conference on Source Code Analysis and Manipulation (SCAM). 2012, pp. 14-23." } }, { "@position" : "3", "rawText" : { "$" : "[3] P. E. Ammann and J. C. Knight. “Data Diversity: An Approach to Software Fault Tolerance”. In: Ieee transactions on computers 37.4 (1988), pp. 418-425." } }, { "@position" : "4", "rawText" : { "$" : "[4] J. Andersen and J. L. Lawall. “Generic Patch Inference”. In: Automated software engineering 17.2 (2010), pp. 119-148." }, "id" : { "@value" : "doi_________::61a2268b8ef05235ab26bf7f86a575b8", "@type" : "openaire", "@trustLevel" : "0.6860426" } }, { "@position" : "5", "rawText" : { "$" : "[5] A. Arcuri. “Automatic Software Generation and Improvement Through Search Based Techniques”. PhD thesis. The University of Birmingham, 2009." } }, { "@position" : "6", "rawText" : { "$" : "[6] A. Arcuri. “Evolutionary Repair of Faulty Software”. In: Applied soft computing 11.4 (2011), pp. 3494-3514." } }, { "@position" : "7", "rawText" : { "$" : "[7] A. Arcuri and X. Yao. “A Novel Co-evolutionary Approach to Automatic Software Bug Fixing”. In: Proceedings of the IEEE Congress on Evolutionary Computation. 2008, pp. 162-168." } }, { "@position" : "8", "rawText" : { "$" : "[8] A. Avizienis. “The N-version Approach to Fault-tolerant Software”. In: Ieee transactions on software engineering 11.12 (1985), pp. 1491-1501." }, "id" : { "@value" : "doi_________::cdc8356ee2e21ef9bcac6c9fb2cb0d63", "@type" : "openaire", "@trustLevel" : "0.6642342" } }, { "@position" : "9", "rawText" : { "$" : "[9] A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. “Basic Concepts and Taxonomy of Dependable and Secure Computing”. In: Ieee transactions on dependable and secure computing 1.1 (2004), pp. 11-33." } }, { "@position" : "10", "rawText" : { "$" : "[10] T. Azim, I. Neamtiu, and L. Marvel. “Towards Self-healing Smartphone Software via Automated Patching”. In: Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering. 2014, pp. 623-628." }, "id" : { "@value" : "doi_________::d712ef4e8d4ec5be89f3dcab74866c56", "@type" : "openaire", "@trustLevel" : "0.61199635" } }, { "@position" : "11", "rawText" : { "$" : "[11] E. T. Barr, Y. Brun, P. T. Devanbu, M. Harman, and F. Sarro. “The Plastic Surgery Hypothesis”. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. 2014, pp. 306-317." } }, { "@position" : "12", "rawText" : { "$" : "[12] E. Barr, M. Harman, P. McMinn, M. Shahbaz, and S. Yoo. “The Oracle Problem in Software Testing: a Survey”. In: Ieee transactions on software engineering 41.5 (2015), pp. 507-525." }, "id" : { "@value" : "od_______322::8a2eb300b73cf67f9060f8acb68f582d", "@type" : "openaire", "@trustLevel" : "0.6956351" } }, { "@position" : "13", "rawText" : { "$" : "[13] E. D. Berger and B. G. Zorn. “DieHard: Probabilistic Memory Safety for Unsafe Languages”. In: Acm sigplan notices 41.6 (2006), pp. 158-168." } }, { "@position" : "14", "rawText" : { "$" : "[14] R. Bodik and B. Jobstmann. “Algorithmic Program Synthesis: Introduction”. In: International journal on software tools for technology transfer 15.5 (2013), pp. 397- 411." } }, { "@position" : "15", "rawText" : { "$" : "[15] M. Brodie, S. Ma, G. Lohman, L. Mignet, M. Wilding, J. Champlin, and P. Sohn. “Quickly Finding Known Software Problems via Automated Symptom Matching”. In: Proceedings of the International Conference on Autonomic Computing. 2005, pp. 101-110." } }, { "@position" : "16", "rawText" : { "$" : "[16] Y. Brun, E. Barr, M. Xiao, C. Le Goues, and P. Devanbu. Evolution Vs. Intelligent Design in Program Patching. Tech. rep. UC Davis, 2013." } }, { "@position" : "17", "rawText" : { "$" : "[17] Y. Cai and L. Cao. “Fixing Deadlocks via Lock Pre-acquisitions”. In: Proceedings of the 38th international conference on software engineering. ACM. 2016, pp. 1109- 1120." } }, { "@position" : "18", "rawText" : { "$" : "[18] G. Candea and A. Fox. “Crash-only Software”. In: Proceedings of the 9th Conference on Hot Topics in Operating Systems. 2003, pp. 12-12." } }, { "@position" : "19", "rawText" : { "$" : "[19] G. Candea and A. Fox. “Recursive Restartability: Turning the Reboot Sledgehammer Into a Scalpel”. In: Proceedings of the 8th Workshop on Hot Topics in Operating Systems. 2001, pp. 125-130." } }, { "@position" : "20", "rawText" : { "$" : "[20] G. Candea, E. Kiciman, S. Zhang, P. Keyani, and A. Fox. “JAGR: An Autonomous Self-recovering Application Server”. In: Proceedings of the Workshop on Active Middleware Services. 2003, pp. 168-177." } }, { "@position" : "21", "rawText" : { "$" : "[21] G. Candea, S. Kawamoto, Y. Fujiki, G. Friedman, and A. Fox. “Microreboot: a Technique for Cheap Recovery”. In: Proceedings of the 6th Conference on Symposium on Operating Systems Design & Implementation. 2004, pp. 3-3." } }, { "@position" : "22", "rawText" : { "$" : "[22] M. Carbin, S. Misailovic, M. Kling, and M. C. Rinard. “Detecting and Escaping Infinite Loops with Jolt”. In: Procceedings of ECOOP. 2011, pp. 609-633." }, "id" : { "@value" : "od________88::c094ddae3d97799f82f7b81ed61b428d", "@type" : "openaire", "@trustLevel" : "0.6704617" } }, { "@position" : "23", "rawText" : { "$" : "[23] A. Carzaniga, A. Gorla, A. Mattavelli, N. Perino, and M. Pezzè. “Automatic Recovery From Runtime Failures”. In: Proceedings of the International Conference on Software Engineering. 2013." }, "id" : { "@value" : "erc_________::a644ed3d5d0bf211431055edec3a2edf", "@type" : "openaire", "@trustLevel" : "0.70273936" } }, { "@position" : "24", "rawText" : { "$" : "[24] A. Carzaniga, A. Gorla, N. Perino, and M. Pezzè. “Automatic Workarounds for Web Applications”. In: Proceedings of the Foundations of Software Engineering Conference. 2010, pp. 237-246." }, "id" : { "@value" : "doi_________::3ba8db866f56f3a0e66ac3068786c073", "@type" : "openaire", "@trustLevel" : "0.6666673" } }, { "@position" : "25", "rawText" : { "$" : "[25] S. Chandra, E. Torlak, S. Barman, and R. Bodik. “Angelic Debugging”. In: Proceeding of the International Conference on Software Engineering. 2011, pp. 121-130." } }, { "@position" : "26", "rawText" : { "$" : "[26] S.-W. Cheng, D. Garlan, B. R. Schmerl, J. P. Sousa, B. Spitnagel, and P. Steenkiste. “Using Architectural Style As a Basis for System Self-repair”. In: Proceedings of the IFIP 17th World Computer Congress / 3rd IEEE/IFIP Conference on Software Architecture: System Design, Development and Maintenance. 2002, pp. 45-59." } }, { "@position" : "27", "rawText" : { "$" : "[27] Z. Coker and M. Hafiz. “Program Transformations to Fix C Integers”. In: Proceedings of the International Conference on Software Engineering. 2013, pp. 792-801." } }, { "@position" : "28", "rawText" : { "$" : "[28] B. Cornu, L. Seinturier, and M. Monperrus. “Exception Handling Analysis and Transformation Using Fault Injection: Study of Resilience Against Unanticipated Exceptions”. In: Information and Software Technology 57 (2015), pp. 66-76." }, "id" : { "@value" : "doi_________::7f2c9178211b4d9123bf9d0d238d3ea8", "@type" : "openaire", "@trustLevel" : "0.69015485" } }, { "@position" : "29", "rawText" : { "$" : "[29] M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. “Vigilante: End-to-end Containment of Internet Worms”. In: ACM SIGOPS Operating Systems Review. Vol. 39. 5. 2005, pp. 133-147." } }, { "@position" : "30", "rawText" : { "$" : "[30] V. Dallmeier, A. Zeller, and B. Meyer. “Generating Fixes From Object Behavior Anomalies”. In: Proceedings of the International Conference on Automated Software Engineering. 2009." }, "id" : { "@value" : "doi_________::d9ac7ad5a76f49bacb512cbc80e9accc", "@type" : "openaire", "@trustLevel" : "0.6434098" } }, { "@position" : "31", "rawText" : { "$" : "[31] B. Daniel, V. Jagannath, D. Dig, and D. Marinov. “ReAssert: Suggesting Repairs for Broken Unit Tests”. In: Proceedings of the 24th IEEE/ACM International Conference on Automated Software Engineering. 2009, pp. 433-444." } }, { "@position" : "32", "rawText" : { "$" : "[32] L. D'Antoni, R. Samanta, and R. Singh. “Qlose: Program Repair with Quantitative Objectives”. In: International conference on computer aided verification. Springer. 2016, pp. 383-401." } }, { "@position" : "33", "rawText" : { "$" : "[33] V. Debroy and W. Wong. “Using Mutation to Automatically Suggest Fixes for Faulty Programs”. In: Proceedings of the International Conference on Software Testing, Verification and Validation. 2010, pp. 65-74." } }, { "@position" : "34", "rawText" : { "$" : "[34] F. DeMarco, J. Xuan, D. Le Berre, and M. Monperrus. “Automatic Repair of Buggy If Conditions and Missing Preconditions with SMT”. In: Proceedings of the 6th international workshop on constraints in software testing, verification, and analysis (cstva 2014). 2014." } }, { "@position" : "35", "rawText" : { "$" : "[35] B. Demsky and M. Rinard. “Automatic Detection and Repair of Errors in Data Structures”. In: Acm sigplan notices 38.11 (2003), pp. 78-95." }, "id" : { "@value" : "doi_________::831ce490dd2b26b411d0a3dfad3192c0", "@type" : "openaire", "@trustLevel" : "0.6797866" } }, { "@position" : "36", "rawText" : { "$" : "[36] B. Demsky and A. Dash. “Bristlecone: a Language for Robust Software Systems”. In: Proceedings of ECOOP. 2008, pp. 490-515." }, "id" : { "@value" : "doi_________::3cdeb8c61016145a5f1f9ffded00cf5f", "@type" : "openaire", "@trustLevel" : "0.65308636" } }, { "@position" : "37", "rawText" : { "$" : "[37] G. Denaro, M. Pezzè, and D. Tosi. “Ensuring Interoperable Service-oriented Systems Through Engineered Self-healing”. In: Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. 2009, pp. 253-262." }, "id" : { "@value" : "od______1299::d88b26167c1fc51ae91d2750dec1cb80", "@type" : "openaire", "@trustLevel" : "0.67078865" } }, { "@position" : "38", "rawText" : { "$" : "[38] L. A. Dennis, R. Monroy, and P. Nogueira. “Proof-directed Debugging and Repair”. In: Seventh Symposium on Trends in Functional Programming. 2006, pp. 131-140." } }, { "@position" : "39", "rawText" : { "$" : "[39] A. Dhar, R. Purandare, M. Dhawan, and S. Rangaswamy. “CLOTHO: Saving Programs from Malformed Strings and Incorrect String-handling”. In: Foundations of software engineering. ACM. 2015, pp. 555-566." }, "id" : { "@value" : "doi_________::bb0b5a79cc6ce658c7b653d02eb825ed", "@type" : "openaire", "@trustLevel" : "0.6466234" } }, { "@position" : "40", "rawText" : { "$" : "[40] K. Dobolyi and W. Weimer. “Changing Java's Semantics for Handling Null Pointer Exceptions”. In: 19th International Symposium on Software Reliability Engineering. 2008, pp. 47-56." }, "id" : { "@value" : "doi_________::94c20394972b238b716eaf27a21aa995", "@type" : "openaire", "@trustLevel" : "0.6879837" } }, { "@position" : "41", "rawText" : { "$" : "[41] J. Duraes and H. Madeira. “Emulation of Software Faults: a Field Data Study and a Practical Approach”. In: Ieee transactions on software engineering 32.11 (2006), pp. 849-867." }, "id" : { "@value" : "doi_________::de928d93db7d4cc0a0f10e4a39e7751f", "@type" : "openaire", "@trustLevel" : "0.6419633" } }, { "@position" : "42", "rawText" : { "$" : "[42] M. Eisenstadt. “My Hairiest Bug War Stories”. In: Communications of the acm 40.4 (1997), pp. 30-37." }, "id" : { "@value" : "doi_________::24d27bafdd755a229c6a8f8e46be25e6", "@type" : "openaire", "@trustLevel" : "0.6089758" } }, { "@position" : "43", "rawText" : { "$" : "[43] B. Elkarablieh, I. Garcia, Y. Suen, and S. Khurshid. “Assertion-based Repair of Complex Data Structures”. In: Proceedings of the Twenty-second IEEE/ACM International Conference on Automated Software Engineering. 2007, pp. 64-73." } }, { "@position" : "44", "rawText" : { "$" : "[44] H. ETO and K. Yoda. “Propolice: Improved Stacksmashing Attack Detection”. In: Ipsj sig notes 75 (2001), pp. 181-188." } }, { "@position" : "45", "rawText" : { "$" : "[45] S. Forrest, T. Nguyen, W. Weimer, and C. Le Goues. “A Genetic Programming Approach to Automated Software Repair”. In: Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation. 2009, pp. 947-954." } }, { "@position" : "46", "rawText" : { "$" : "[46] G. Friedrich, M. Fugini, E. Mussi, B. Pernici, and G. Tagni. “Exception Handling for Repair in Service-Based Processes”. In: Ieee transactions on software engineering 36.2 (2010), pp. 198-215." } }, { "@position" : "47", "rawText" : { "$" : "[47] Z. P. Fry, B. Landau, and W. Weimer. “A Human Study of Patch Maintainability”. In: Proceedings of the International Symposium on Software Testing and Analysis. 2012, pp. 177-187." } }, { "@position" : "48", "rawText" : { "$" : "[48] R. P. Gabriel and R. Goldman. “Conscientious Software”. In: Acm Sigplan Notices. Vol. 41. 10. 2006, pp. 433-450." } }, { "@position" : "49", "rawText" : { "$" : "[49] Q. Gao, Y. Xiong, Y. Mi, L. Zhang, W. Yang, Z. Zhou, B. Xie, and H. Mei. “Safe Memory-leak Fixing for C Programs”. In: Proceedings of the 37th International Conference on Software Engineering. 2015, pp. 459-470." } }, { "@position" : "50", "rawText" : { "$" : "[50] Q. Gao, H. Zhang, J. Wang, Y. Xiong, L. Zhang, and H. Mei. “Fixing Recurring Crash Bugs via Analyzing Q&A Sites”. In: Proceedings of the 30th ieee/acm international conference on automated software engineering. ACM, 2015." } }, { "@position" : "51", "rawText" : { "$" : "[51] Z. Gao, Z. Chen, Y. Zou, and A. Memon. “SITAR: GUI Test Script Repair”. In: Ieee transactions on software engineering (2015)." } }, { "@position" : "52", "rawText" : { "$" : "[52] D. Garlan, S.-W. Cheng, and B. Schmerl. “Increasing System Dependability Through Architecture-based Self-repair”. In: Architecting Dependable Systems. 2003, pp. 61- 89." }, "id" : { "@value" : "doi_________::d85625277be9d18e919bcb5b0e882cce", "@type" : "openaire", "@trustLevel" : "0.6333976" } }, { "@position" : "53", "rawText" : { "$" : "[53] B. J. Garvin, M. B. Cohen, and M. B. Dwyer. “Using Feature Locality: Can We Leverage History to Avoid Failures During Reconfiguration?” In: Proceedings of the 8th Workshop on Assurances for Self-adaptive Systems. 2011, pp. 24-33." } }, { "@position" : "54", "rawText" : { "$" : "[54] S. George, D. Evans, and S. Marchette. “A Biological Programming Model for SelfHealing”. In: Proceedings of SSRS. 2013." } }, { "@position" : "55", "rawText" : { "$" : "[55] D. Ghosh, R. Sharman, H. Raghav Rao, and S. Upadhyaya. “Self-healing Systems-survey and Synthesis”. In: Decision support systems 42.4 (2007), pp. 2164- 2185." } }, { "@position" : "56", "rawText" : { "$" : "[56] D. Gopinath, S. Khurshid, D. Saha, and S. Chandra. “Data-guided Repair of Selection Statements”. In: Proceedings of the 36th International Conference on Software Engineering. 2014, pp. 243-253." } }, { "@position" : "57", "rawText" : { "$" : "[57] D. Gopinath, M. Z. Malik, and S. Khurshid. “Specification-based Program Repair Using SAT”. In: Proceedings of the International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 2011." } }, { "@position" : "58", "rawText" : { "$" : "[58] A. Griesmayer, R. Bloem, and B. Cook. “Repair of Boolean Programs with An Application to C”. In: Computer Aided Verification. 2006, pp. 358-371." }, "id" : { "@value" : "doi_________::548cdecf229ac417a54d97bd6927711e", "@type" : "openaire", "@trustLevel" : "0.6535551" } }, { "@position" : "59", "rawText" : { "$" : "[59] R. Gupta, S. Pal, A. Kanade, and S. Shevade. “DeepFix: Fixing Common C Language Errors by Deep Learning”. In: Proceedings of the aaai conference on artificial intelligence. 2017." } }, { "@position" : "60", "rawText" : { "$" : "[60] B. Hartmann, D. MacDougall, J. Brandt, and S. R. Klemmer. “What Would Other Programmers Do: Suggesting Solutions to Error Messages”. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 2010, pp. 1019-1028." } }, { "@position" : "61", "rawText" : { "$" : "[61] H. He and N. Gupta. “Automated Debugging Using Path-Based Weakest Preconditions”. In: FASE. 2004, pp. 267-280." } }, { "@position" : "62", "rawText" : { "$" : "[62] P. Hosek and C. Cadar. “Safe Software Updates via Multi-version Execution”. In: Proceedings of the International Conference on Software Engineering. 2013, pp. 612- 621." }, "id" : { "@value" : "doi_________::95023b71791957385eba9b2bc7b6b0e5", "@type" : "openaire", "@trustLevel" : "0.77703565" } }, { "@position" : "63", "rawText" : { "$" : "[63] D. Hovemeyer and W. Pugh. “Finding Bugs Is Easy”. In: Acm sigplan notices 39.12 (2004)." }, "id" : { "@value" : "doi_________::98bdf4bc886d9538280ce8467742014f", "@type" : "openaire", "@trustLevel" : "0.68069535" } }, { "@position" : "64", "rawText" : { "$" : "[64] Y. Huang, C. Kintala, N. Kolettis, and N. Fulton. “Software Rejuvenation: Analysis, Module and Applications”. In: Proceedings of the International Symposium on FaultTolerant Computing. 1995, pp. 381-390." } }, { "@position" : "65", "rawText" : { "$" : "[65] D. Jackson and M. Vaziri. “Finding Bugs with a Constraint Solver”. In: Proceedings of the 2000 ACM SIGSOFT International Symposium on Software Testing and Analysis. 2000, pp. 14-25." } }, { "@position" : "66", "rawText" : { "$" : "[66] D. Jeffrey, M. Feng, N. Gupta, and R. Gupta. “BugFix: a Learning-based Tool to Assist Developers in Fixing Bugs”. In: ICPC. 2009, pp. 70-79." } }, { "@position" : "67", "rawText" : { "$" : "[67] D. Jeffrey, N. Gupta, and R. Gupta. “Fault Localization Using Value Replacement”. In: Proceedings of the International Symposium on Software Testing and Analysis. 2008, pp. 167-178." } }, { "@position" : "68", "rawText" : { "$" : "[68] S. Jha, S. Gulwani, S. A. Seshia, and A. Tiwari. “Oracle-guided Component-based Program Synthesis”. In: Proceedings of the International Conference on Software Engineering. Vol. 1. 2010, pp. 215-224." } }, { "@position" : "69", "rawText" : { "$" : "[69] M. Jiang, T. Y. Chen, F.-C. Kuo, D. Towey, and Z. Ding. “A Metamorphic Testing Approach for Supporting Program Repair without the Need for a Test Oracle”. In: Journal of systems and software (2016)." } }, { "@position" : "70", "rawText" : { "$" : "[70] G. Jin, L. Song, W. Zhang, S. Lu, and B. Liblit. “Automated Atomicity-violation Fixing”. In: Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation. 2011, pp. 389-400." } }, { "@position" : "71", "rawText" : { "$" : "[71] B. Jobstmann, A. Griesmayer, and R. Bloem. “Program Repair As a Game”. In: Computer Aided Verification. 2005, pp. 226-238." }, "id" : { "@value" : "doi_________::a0796bb2ee00e1738f887ecc5a129263", "@type" : "openaire", "@trustLevel" : "0.6640217" } }, { "@position" : "72", "rawText" : { "$" : "[72] H. Jula, D. Tralamazza, C. Zamfir, and G. Candea. “Deadlock Immunity: Enabling Systems to Defend Against Deadlocks”. In: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation. 2008, pp. 295-308." }, "id" : { "@value" : "snsf_p3_pubs::fb0b54b74e1cbedb111b95a531c14cf1", "@type" : "openaire", "@trustLevel" : "0.60978603" } }, { "@position" : "73", "rawText" : { "$" : "[73] S. Kaleeswaran, V. Tulsian, A. Kanade, and A. Orso. “Minthint: Automated Synthesis of Repair Hints”. In: Proceedings of the International Conference on Software Engineering. 2014, pp. 266-276." } }, { "@position" : "74", "rawText" : { "$" : "[74] S. Kalvala and R. Warburton. “A Formal Approach to Fixing Bugs”. In: Formal Methods, Foundations and Applications. 2011, pp. 172-187." }, "id" : { "@value" : "doi_________::d00dd2d207fdd41a5344650907ff0c85", "@type" : "openaire", "@trustLevel" : "0.67734885" } }, { "@position" : "75", "rawText" : { "$" : "[75] A. Kalyanpur, B. Parsia, E. Sirin, and B. Cuenca-Grau. “Repairing Unsatisfiable Concepts in OWL Ontologies”. In: The Semantic Web: Research and Applications. Vol. 4011. 2006, pp. 170-184." }, "id" : { "@value" : "od______3818::c7c5bc96ddfd02c346496e368c8db542", "@type" : "openaire", "@trustLevel" : "0.66630703" } }, { "@position" : "76", "rawText" : { "$" : "[76] M. Kasbekar, C. Narayanan, and C. Das. “Selective Checkpointing and Rollbacks in Multi-threaded Object-oriented Environment”. In: Ieee transactions on reliability 48.4 (1999), pp. 325-337." } }, { "@position" : "77", "rawText" : { "$" : "[77] Y. Ke, K. T. Stolee, C. Le Goues, and Y. Brun. “Repairing Programs with Semantic Code Search”. In: Proceedings of the International Conference on Automated Software Engineering. 2015." } }, { "@position" : "78", "rawText" : { "$" : "[78] C. Kern and J. Esparza. “Automatic Error Correction of Java Programs”. In: Formal Methods for Industrial Critical Systems. 2010, pp. 67-81." } }, { "@position" : "79", "rawText" : { "$" : "[79] D. Kim, J. Nam, J. Song, and S. Kim. “Automatic Patch Generation Learned From Human-Written Patches”. In: Proceedings of ICSE. 2013." } }, { "@position" : "80", "rawText" : { "$" : "[80] E. Kneuss, M. Koukoutos, and V. Kuncak. “Deductive Program Repair”. In: International conference on computer aided verification. Springer. 2015, pp. 217-233." }, "id" : { "@value" : "doi_________::b9fabffd1bc6c55238a566f0d289f01c", "@type" : "openaire", "@trustLevel" : "0.6627885" } }, { "@position" : "81", "rawText" : { "$" : "[81] D. E. Knuth. “The Errors of TEX”. In: Softw., pract. exper. 19.7 (1989), pp. 607-685." } }, { "@position" : "82", "rawText" : { "$" : "[82] X. Kong, L. Zhang, W. E. Wong, and B. Li. “Experience report: how do techniques, programs, and tests impact automated program repair?” In: International symposium on software reliability engineering. IEEE. 2015, pp. 194-204." } }, { "@position" : "83", "rawText" : { "$" : "[83] R. Könighofer and R. Bloem. “Automated Error Localization and Correction for Imperative Programs”. In: Formal Methods in Computer-Aided Design (FMCAD), 2011. 2011, pp. 91-100." } }, { "@position" : "84", "rawText" : { "$" : "[84] R. Könighofer and R. Bloem. “Repair with On-the-fly Program Analysis”. In: Hardware and Software: Verification and Testing. 2013, pp. 56-71." }, "id" : { "@value" : "doi_________::436a81a296b9e029d48a820dfd54516b", "@type" : "openaire", "@trustLevel" : "0.6695329" } }, { "@position" : "85", "rawText" : { "$" : "[85] R. Koo and S. Toueg. “Checkpointing and Rollback-recovery for Distributed Systems”. In: Ieee transactions on software engineering 1 (1987), pp. 23-31." } }, { "@position" : "86", "rawText" : { "$" : "[86] M. Lake. Epic Failures: 11 Infamous Software Bugs. http://www.computerworld. com/article/2515483/enterprise- applications/epic- failures-- 11- infamous- softwarebugs.html. 2010." } }, { "@position" : "87", "rawText" : { "$" : "[87] J. L. Lawall, J. Brunel, N. Palix, R. R. Hansen, H. Stuart, and G. Muller. “WYSIWIB: a Declarative Approach to Finding API Protocols and Bugs in Linux Code”. In: International Conference on Dependable Systems & Networks. 2009, pp. 43-52." } }, { "@position" : "88", "rawText" : { "$" : "[88] N. Lazaar, A. Gotlieb, and Y. Lebbah. “A Framework for the Automatic Correction of Constraint Programs”. In: Proceedings of the International Conference on Software Testing, Verification and Validation. 2011, pp. 319-326." }, "id" : { "@value" : "doi_________::01f4566cd3c811cf918e796095b98159", "@type" : "openaire", "@trustLevel" : "0.67730725" } }, { "@position" : "89", "rawText" : { "$" : "[89] C. Le Goues, M. Dewey-Vogt, S. Forrest, and W. Weimer. “A Systematic Study of Automated Program Repair: Fixing 55 Out of 105 Bugs for $8 Each”. In: Proceedings of the International Conference on Software Engineering. 2012, pp. 3-13." } }, { "@position" : "90", "rawText" : { "$" : "[90] C. Le Goues, S. Forrest, and W. Weimer. “Current Challenges in Automatic Software Repair”. In: Software quality journal 21.3 (2013), pp. 421-443." }, "id" : { "@value" : "doi_________::9bc22c7f896fc815d34331fc8ca130ad", "@type" : "openaire", "@trustLevel" : "0.6842719" } }, { "@position" : "91", "rawText" : { "$" : "[91] C. Le Goues, N. Holtschulte, E. K. Smith, Y. Brun, P. Devanbu, S. Forrest, and W. Weimer. “The ManyBugs and IntroClass Benchmarks for Automated Repair of C Programs”. In: Ieee transactions on software engineering (tse), in press (2015)." }, "id" : { "@value" : "doi_________::cf3f3afaded86d7d82fb50ca40925607", "@type" : "openaire", "@trustLevel" : "0.62086505" } }, { "@position" : "92", "rawText" : { "$" : "[92] C. Le Goues, T. Nguyen, S. Forrest, and W. Weimer. “GenProg: a Generic Method for Automatic Software Repair”. In: Ieee transactions on software engineering 38 (2012), pp. 54-72." }, "id" : { "@value" : "doi_________::0061eafa8f13e1c2815be279e13c9f58", "@type" : "openaire", "@trustLevel" : "0.6592393" } }, { "@position" : "93", "rawText" : { "$" : "[93] X. B. D. Le, D. Lo, and C. L. Goues. “History Driven Program Repair”. In: Proceedings of the 23rd international conference on software analysis, evolution, and reengineering (saner). 2016, pp. 213-224." } }, { "@position" : "94", "rawText" : { "$" : "[94] M. Leotta, D. Clerissi, F. Ricca, and C. Spadaro. “Repairing Selenium Test Cases: an Industrial Case Study about Web Page Element Localization”. In: International conference on software testing, verification and validation. IEEE. 2013, pp. 487-488." }, "id" : { "@value" : "doi_________::80d6db949a21f0405a94330ae97a5028", "@type" : "openaire", "@trustLevel" : "0.67532986" } }, { "@position" : "95", "rawText" : { "$" : "[95] R. Levinson. “Unified Planning and Execution for Autonomous Software Repair”. In: Workshop on Plan Execution: a Reality Check. 2005." } }, { "@position" : "96", "rawText" : { "$" : "[96] C. Lewis and J. Whitehead. “Runtime Repair of Software Faults Using Event-driven Monitoring”. In: Proceedings of the 32nd acm/ieee international conference on software engineering - icse '10 2 (2010), p. 275." } }, { "@position" : "97", "rawText" : { "$" : "[97] Z. Liang and R. Sekar. “Fast and Automated Generation of Attack Signatures: a Basis for Building Self-protecting Servers”. In: Proceedings of the 12th ACM Conference on Computer and Communications Security. 2005, pp. 213-222." } }, { "@position" : "98", "rawText" : { "$" : "[98] Y. Lin and S. Kulkarni. “Automatic Repair for Multi-threaded Programs with Deadlock/Livelock Using Maximum Satisfiability”. In: Proceedings of the 2014 international symposium on software testing and analysis. ACM. 2014, pp. 237-247." } }, { "@position" : "99", "rawText" : { "$" : "[99] Z. Lin, X. Jiang, D. Xu, B. Mao, and L. Xie. “AutoPaG: Towards Automated Software Patch Generation with Source Code Root Cause Identification and Repair”. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. 2007, pp. 329-340." } }, { "@position" : "100", "rawText" : { "$" : "[100] C. Liu, J. Yang, L. Tan, and M. Hafiz. “R2Fix: Automatically Generating Bug Fixes From Bug Reports”. In: Proceedings of the International Conference on Software Testing, Verification and Validation (ICST). 2013, pp. 282-291." } }, { "@position" : "101", "rawText" : { "$" : "[101] H. Liu, Y. Chen, and S. Lu. “Understanding and Generating High Quality Patches for Concurrency bugs”. In: Proceedings of the 2016 24th acm sigsoft international symposium on foundations of software engineering. ACM. 2016, pp. 715-726." } }, { "@position" : "102", "rawText" : { "$" : "[102] P. Liu and C. Zhang. “Axis: Automatically Fixing Atomicity Violations Through Solving Control Constraints”. In: Proceedings of the 2012 International Conference on Software Engineering. 2012, pp. 299-309." } }, { "@position" : "103", "rawText" : { "$" : "[103] M. E. Locasto, S. Sidiroglou, and A. D. Keromytis. “Software Self-Healing Using Collaborative Application Communities”. In: Proceedings of the Network and Distributed System Security Symposium. 2006." }, "id" : { "@value" : "doi_________::6e539f0301aa67945ea78037c50f8cac", "@type" : "openaire", "@trustLevel" : "0.6636007" } }, { "@position" : "104", "rawText" : { "$" : "[104] F. Logozzo and T. Ball. “Modular and Verified Automatic Program Repair”. In: Proceedings of the 27th ACM International Conference on Object Oriented Programming Systems Languages and Applications. 2012." }, "id" : { "@value" : "doi_________::d4c79c47b10fe4a7677a642634719536", "@type" : "openaire", "@trustLevel" : "0.6743879" } }, { "@position" : "105", "rawText" : { "$" : "[105] F. Logozzo and M. Martel. “Automatic Repair of Overflowing Expressions with Abstract Interpretation”. In: Semantics, Abstract Interpretation, and Reasoning About Programs: Essays Dedicated to David A. Schmidt on the Occasion of His Sixtieth Birthday. Vol. 129. 2013, pp. 341-357." }, "id" : { "@value" : "arXiv_______::053a118d1a1e41678005a2da74b776e1", "@type" : "openaire", "@trustLevel" : "0.73015213" } }, { "@position" : "106", "rawText" : { "$" : "[106] F. Long, V. Ganesh, M. Carbin, S. Sidiroglou, and M. Rinard. “Automatic Input Rectification”. In: Proceedings of ICSE. 2012." } }, { "@position" : "107", "rawText" : { "$" : "[107] F. Long and M. C. Rinard. “Prophet: Automatic Patch Generation via Learning From Successful Patches”. In: Proceedings of the Symposium on Principles of Programming Languages. 2016." } }, { "@position" : "108", "rawText" : { "$" : "[108] F. Long and M. C. Rinard. “Staged Program Repair with Condition Synthesis”. In: Proceedings of ESEC/FSE. 2015." } }, { "@position" : "109", "rawText" : { "$" : "[109] F. Long, S. Sidiroglou-Douskos, D. Kim, and M. Rinard. “Sound Input Filter Generation for Integer Overflow Errors”. In: Acm sigplan notices 49.1 (2014), pp. 439- 452." } }, { "@position" : "110", "rawText" : { "$" : "[110] F. Long, S. Sidiroglou-Douskos, and M. C. Rinard. “Automatic Runtime Error Repair and Containment via Recovery Shepherding”. In: ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014." }, "id" : { "@value" : "od________88::0be88c19cf018a64e73bc16f959a0eba", "@type" : "openaire", "@trustLevel" : "0.6835259" } }, { "@position" : "111", "rawText" : { "$" : "[111] M. Malik, J. Siddiqi, and S. Khurshid. “Constraint-Based Program Debugging Using Data Structure Repair”. In: International Conference on Software Testing, Verification and Validation (ICST). 2011, pp. 190-199." } }, { "@position" : "112", "rawText" : { "$" : "[112] S. L. Marcote and M. Monperrus. Automatic Repair of Infinite Loops. Tech. rep. 1504.05078. Arxiv, 2015." } }, { "@position" : "113", "rawText" : { "$" : "[113] M. Martinez, T. Durieux, R. Sommerard, J. Xuan, and M. Monperrus. “Automatic Repair of Real Bugs in Java: A Large-Scale Experiment on the Defects4J Dataset”. In: Springer empirical software engineering (2016)." } }, { "@position" : "114", "rawText" : { "$" : "[114] M. Martinez and M. Monperrus. “Mining Software Repair Models for Reasoning on the Search Space of Automated Program Fixing”. In: Empirical Software Engineering 20.1 (2013), pp. 176-205." }, "id" : { "@value" : "doi_________::20a481dc781e009ed40ab895ff4455b9", "@type" : "openaire", "@trustLevel" : "0.7182879" } }, { "@position" : "115", "rawText" : { "$" : "[115] M. Martinez, W. Weimer, and M. Monperrus. “Do the Fix Ingredients Already Exist? An Empirical Inquiry into the Redundancy Assumptions of Program Repair Approaches”. In: Proceedings of the international conference on software engineering, track on new ideas and emerging results. 2014." } }, { "@position" : "116", "rawText" : { "$" : "[116] S. Mechtaev, J. Yi, and A. Roychoudhury. “Angelix: Scalable Multiline Program Patch Synthesis via Symbolic Analysis”. In: Proceedings of the 38th international conference on software engineering. 2016, pp. 691-701." } }, { "@position" : "117", "rawText" : { "$" : "[117] S. Mechtaev, J. Yi, and A. Roychoudhury. “DirectFix: Looking for Simple Program Repairs”. In: Proceedings of the 37th International Conference on Software Engineering. 2015." } }, { "@position" : "118", "rawText" : { "$" : "[118] I. Medeiros, N. F. Neves, and M. Correia. “Automatic detection and correction of web application vulnerabilities using data mining to predict false positives”. In: Proceedings of the 23rd international conference on world wide web. ACM. 2014, pp. 63- 74." } }, { "@position" : "119", "rawText" : { "$" : "[119] A. M. Memon. “Automatically Repairing Event Sequence-based GUI Test Suites for Regression Testing”. In: Acm transactions on software engineering and methodology 18.2 (2008), p. 4." } }, { "@position" : "120", "rawText" : { "$" : "[120] N. Meng, M. Kim, and K. S. McKinley. “LASE: Locating and Applying Systematic Edits by Learning From Examples”. In: Proceedings of the International Conference on Software Engineering. 2013, pp. 502-511." } }, { "@position" : "121", "rawText" : { "$" : "[121] N. Meng, M. Kim, and K. S. McKinley. “Systematic Editing: Generating Program Transformations From An Example”. In: Proceedings of the 32Nd ACM SIGPLAN Conference on Programming Language Design and Implementation. 2011, pp. 329- 342." } }, { "@position" : "122", "rawText" : { "$" : "[122] M. G. Merideth. “Enhancing Survivability with Proactive Fault-containment”. In: The 2003 International Conference on Dependable Systems and Networks. 2003." } }, { "@position" : "123", "rawText" : { "$" : "[123] B. Meyer. “Applying 'design by Contract'”. In: Computer 25.10 (1992), pp. 40-51." } }, { "@position" : "124", "rawText" : { "$" : "[124] M. Monperrus. “A Critical Review of \"Automatic Patch Generation Learned from Human-Written Patches\": Essay on the Problem Statement and the Evaluation of Automatic Software Repair”. In: Proceedings of the international conference on software engineering. 2014, pp. 234-242." } }, { "@position" : "125", "rawText" : { "$" : "[125] M. Monperrus. Principles of antifragile software. Tech. rep. 1404.3056. Arxiv, 2014." } }, { "@position" : "126", "rawText" : { "$" : "[126] P. Muntean, V. K. Kommanapalli, A. Ibing, and C. Eckert. “Automated Generation of Buffer Overflows Quick Fixes Using Symbolic Execution and SMT”. In: International Conference on Computer Safety, Reliability & Security (SAFECOMP'15). 2015." } }, { "@position" : "127", "rawText" : { "$" : "[127] C. Nentwich, W. Emmerich, and A. Finkelstein. “Consistency Management with Repair Actions”. In: Proceedings of the 25th International Conference on Software Engineering. 2003, pp. 455-464." } }, { "@position" : "128", "rawText" : { "$" : "[128] H. D. T. Nguyen, D. Qi, A. Roychoudhury, and S. Chandra. “SemFix: Program Repair via Semantic Analysis”. In: Proceedings of the International Conference on Software Engineering. 2013." } }, { "@position" : "129", "rawText" : { "$" : "[129] H. H. Nguyen and M. Rinard. “Detecting and Eliminating Memory Leaks Using Cyclic Memory Allocation”. In: Proceedings of the 6th International Symposium on Memory Management. 2007, pp. 15-30." } }, { "@position" : "130", "rawText" : { "$" : "[130] M. Nica, S. Nica, and F. Wotawa. “On the Use of Mutations and Testing for Debugging”. In: Software: practice and experience 43.9 (2013), pp. 1121-1142." } }, { "@position" : "131", "rawText" : { "$" : "[131] G. Novark, E. Berger, and B. Zorn. “Exterminator: Automatically Correcting Memory Errors with High Probability”. In: Acm sigplan notices 42.6 (2007), pp. 1-11." } }, { "@position" : "132", "rawText" : { "$" : "[132] V. Oliveira, E. Souza, C. Le Goues, and C. G. Camilo. “Improved Crossover Operators for Genetic Programming for Program Repair”. In: Proceedings of the 8th international symposium on search based software engineering. 2016." } }, { "@position" : "133", "rawText" : { "$" : "[133] Y. Padioleau, J. Lawall, R. Hansen, and G. Muller. “Documenting and Automating Collateral Evolutions in Linux Device Drivers”. In: Acm sigops operating systems review 42.4 (2008), pp. 247-260." } }, { "@position" : "134", "rawText" : { "$" : "[134] J. H. Perkins, G. Sullivan, W.-F. Wong, Y. Zibin, M. D. Ernst, M. Rinard, S. Kim, S. Larsen, S. Amarasinghe, J. Bachrach, M. Carbin, C. Pacheco, F. Sherwood, and S. Sidiroglou. “Automatically Patching Errors in Deployed Software”. In: Proceedings of the Symposium on Operating Systems Principles (2009), p. 87." } }, { "@position" : "135", "rawText" : { "$" : "[135] B. Pernici and A. M. Rosati. “Automatic Learning of Repair Strategies for Web Services”. In: Proceedings of the Fifth European Conference on Web Services. 2007, pp. 119-128." }, "id" : { "@value" : "doi_________::2d71ded40760d2ffa471bd4ef19231bf", "@type" : "openaire", "@trustLevel" : "0.6622441" } }, { "@position" : "136", "rawText" : { "$" : "[136] M. Pezzè, M. C. Rinard, W. Weimer, and A. Zeller. Self-Repairing Programs, Report From Dagstuhl Seminar. Tech. rep. 11062. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2011." } }, { "@position" : "137", "rawText" : { "$" : "[137] Y. Qi, X. Mao, and Y. Lei. “Efficient Automated Program Repair Through FaultRecorded Testing Prioritization”. In: Proceedings of ICSM. 2013." } }, { "@position" : "138", "rawText" : { "$" : "[138] Y. Qi, X. Mao, and Y. Lei. “Program Repair As Sound Optimization of Broken Programs”. In: International Symposium on Theoretical Aspects of Software Engineering. 2009." } }, { "@position" : "139", "rawText" : { "$" : "[139] Y. Qi, X. Mao, Y. Lei, Z. Dai, and C. Wang. “The Strength of Random Search on Automated Program Repair”. In: Proceedings of the 36th International Conference on Software Engineering. 2014, pp. 254-265." } }, { "@position" : "140", "rawText" : { "$" : "[140] Z. Qi, F. Long, S. Achour, and M. Rinard. “An Analysis of Patch Plausibility and Correctness for Generate-And-Validate Patch Generation Systems”. In: Proceedings of ISSTA. 2015." } }, { "@position" : "141", "rawText" : { "$" : "[141] F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou. “Rx: Treating Bugs As Allergies-a Safe Method to Survive Software Failures”. In: Acm sigops operating systems review 39.5 (2005), pp. 235-248." } }, { "@position" : "142", "rawText" : { "$" : "[142] B. Randell. “System Structure for Software Fault Tolerance”. In: Ieee transactions on software engineering 2 (1975), pp. 220-232." }, "id" : { "@value" : "doi_________::265e575335f9998cf7b95357b2904db2", "@type" : "openaire", "@trustLevel" : "0.7009199" } }, { "@position" : "143", "rawText" : { "$" : "[143] M. Rinard, C. Cadar, D. Dumitran, D. Roy, T. Leu, and W. Beebee Jr. “Enhancing Server Availability and Security Through Failure-oblivious Computing”. In: Proceedings of the 6th Conference on Symposium on Operating Systems, Design & Implementation. 2004, pp. 21-21." } }, { "@position" : "144", "rawText" : { "$" : "[144] M. Rinard, M. Ernst, and J. Perkins. Collaborative Learning for Security and Repair in Application Communities. Tech. rep. Massachusetts Institute of Technology, 2011." } }, { "@position" : "145", "rawText" : { "$" : "[145] M. Rinard. “Acceptability-oriented Computing”. In: Acm sigplan notices 38.12 (2003), pp. 57-75." }, "id" : { "@value" : "doi_________::bffaa22ee4c97423c1326667eb32d531", "@type" : "openaire", "@trustLevel" : "0.68851733" } }, { "@position" : "146", "rawText" : { "$" : "[146] M. C. Rinard. Survival Techniques for Computer Programs. Tech. rep. MIT, 2006." } }, { "@position" : "147", "rawText" : { "$" : "[147] M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, and T. Leu. “A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)”. In: Proceedings of the 20th Annual Computer Security Applications Conference. 2004, pp. 82-90." } }, { "@position" : "148", "rawText" : { "$" : "[148] J. Rohr. “STAREX Self-repair Routines: Software Recovery in the JPL-STAR Computer”. In: Proceedings of FTCS. 1973." } }, { "@position" : "149", "rawText" : { "$" : "[149] R. Samanta, O. Olivo, and E. A. Emerson. “Cost-aware Automatic Program Repair”. In: International static analysis symposium. Springer. 2014, pp. 268-284." } }, { "@position" : "150", "rawText" : { "$" : "[150] H. Samimi, M. Schäfer, S. Artzi, T. D. Millstein, F. Tip, and L. J. Hendren. “Automated Repair of HTML Generation Errors in PHP Applications Using String Constraint Solving”. In: Proceedings of ICSE. 2012, pp. 277-287." } }, { "@position" : "151", "rawText" : { "$" : "[151] E. Schulte, S. Forrest, and W. Weimer. “Automated Program Repair Through the Evolution of Assembly Code”. In: Proceedings of the IEEE/ACM International Conference on Automated Software Engineering. 2010, pp. 313-316." } }, { "@position" : "152", "rawText" : { "$" : "[152] A. Sethi et al. “A Survey of Fault Localization Techniques in Computer Networks”. In: Science of computer programming 53.2 (2004), pp. 165-194." }, "id" : { "@value" : "core_ac_uk__::06fb1e690cfcc685a35abf56d4e29a48", "@type" : "openaire", "@trustLevel" : "0.6542762" } }, { "@position" : "153", "rawText" : { "$" : "[153] A. Shaw, D. Doggett, and M. Hafiz. “Automatically Fixing C Buffer Overflows Using Program Transformations”. In: International Conference on Dependable Systems and Networks. 2014, pp. 124-135." } }, { "@position" : "154", "rawText" : { "$" : "[154] M. Shaw. “Self-healing: Softening Precision to Avoid Brittleness”. In: Proceedings of the First Workshop on Self-healing Systems. 2002, pp. 111-114." } }, { "@position" : "155", "rawText" : { "$" : "[155] S. Sicard, F. Boyer, and N. De Palma. “Using Components for Architecture-based Management: the Self-repair Case”. In: Proceedings of the 30th International Conference on Software Engineering. 2008, pp. 101-110." } }, { "@position" : "156", "rawText" : { "$" : "[156] S. Sidiroglou and A. Keromytis. “Countering Network Worms Through Automatic Patch Generation”. In: Security & privacy 3.6 (2005), pp. 41-49." } }, { "@position" : "157", "rawText" : { "$" : "[157] S. Sidiroglou, O. Laadan, C. Perez, N. Viennot, J. Nieh, and A. Keromytis. “Assure: Automatic Software Self-healing Using Rescue Points”. In: Acm sigplan notices 44.3 (2009), pp. 37-48." } }, { "@position" : "158", "rawText" : { "$" : "[158] S. Sidiroglou, M. Locasto, S. Boyd, and A. Keromytis. “Building a Reactive Immune System for Software Services”. In: Proceedings of the USENIX Annual Technical Conference. Vol. 161. 2005." }, "id" : { "@value" : "doi_________::5d0807395219894b44b9153330b32a0d", "@type" : "openaire", "@trustLevel" : "0.6067748" } }, { "@position" : "159", "rawText" : { "$" : "[159] S. Sidiroglou-Douskos, E. Lahtinen, F. Long, and M. Rinard. “Automatic Error Elimination by Horizontal Code Transfer Across Multiple Applications”. In: Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation. 2015, pp. 43-54." }, "id" : { "@value" : "doi_________::e495eb0ff86f5eb4d9e0e20a871c0e00", "@type" : "openaire", "@trustLevel" : "0.6810099" } }, { "@position" : "160", "rawText" : { "$" : "[160] S. Sidiroglou-Douskos, S. Misailovic, H. Hoffmann, and M. Rinard. “Managing Performance Vs. Accuracy Trade-offs with Loop Perforation”. In: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering. 2011, pp. 124-134." }, "id" : { "@value" : "doi_________::8abf90b4cccb7108a46f60ab0cc9a4d2", "@type" : "openaire", "@trustLevel" : "0.688946" } }, { "@position" : "161", "rawText" : { "$" : "[161] J. Silva. “A Survey on Algorithmic Debugging Strategies”. In: Advances in engineering software 42.11 (2011), pp. 976-991." } }, { "@position" : "162", "rawText" : { "$" : "[162] M. A. A. da Silva, A. Mougenot, X. Blanc, and R. Bendraou. “Towards Automated Inconsistency Handling in Design Models”. In: Proceedings of the 22nd International Conference on Advanced Information Systems Engineering. 2010, pp. 348-362." } }, { "@position" : "163", "rawText" : { "$" : "[163] R. Singh, S. Gulwani, and A. Solar-Lezama. “Automated Feedback Generation for Introductory Programming Assignments”. In: ACM SIGPLAN Notices. Vol. 48. 6. 2013, pp. 15-26." }, "id" : { "@value" : "core_ac_uk__::1ddb459a7dd1dcbd334e1e499aad44a3", "@type" : "openaire", "@trustLevel" : "0.6201375" } }, { "@position" : "164", "rawText" : { "$" : "[164] A. Smirnov and T. Chiueh. “DIRA: Automatic Detection, Identification, and Repair of Control-hijacking Attacks”. In: The 12th Annual Network and Distributed System Security Symposium. 2005." } }, { "@position" : "165", "rawText" : { "$" : "[165] E. K. Smith, E. Barr, C. Le Goues, and Y. Brun. “Is the Cure Worse Than the Disease? Overfitting in Automated Program Repair”. In: Proceedings of the 10th Joint Meeting of the European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE). 2015." } }, { "@position" : "166", "rawText" : { "$" : "[166] A. Somayaji, S. Hofmeyr, and S. Forrest. “Principles of a Computer Immune System”. In: Proceedings of the 1997 Workshop on New Security Paradigms. 1998, pp. 75-82." } }, { "@position" : "167", "rawText" : { "$" : "[167] S. Son, K. S. McKinley, and V. Shmatikov. “Fix Me Up: Repairing Access-Control Bugs in Web Applications.” In: Proceedings of the Network and Distributed System Security Symposium. 2013." } }, { "@position" : "168", "rawText" : { "$" : "[168] H. Sözer, B. Tekinerdoğan, and M. Akşit. “FLORA: a Framework for Decomposing Software Architecture to Introduce Local Recovery”. In: Software: practice and experience 39.10 (2009), pp. 869-889." }, "id" : { "@value" : "dris___02403::8da03926fa2fe2d1661efec2a1289aab", "@type" : "openaire", "@trustLevel" : "0.7063425" } }, { "@position" : "169", "rawText" : { "$" : "[169] M. Staats, M. W. Whalen, and M. P. E. Heimdahl. “Programs, Tests, and Oracles: the Foundations of Testing Revisited”. In: Proceedings of the International Conference on Software Engineering. 2011, pp. 391-400." }, "id" : { "@value" : "od______2658::42c4de37eec902824c6f729b200a4560", "@type" : "openaire", "@trustLevel" : "0.7283477" } }, { "@position" : "170", "rawText" : { "$" : "[170] M. Stumptner and F. Wotawa. “A Model-based Approach to Software Debugging”. In: Proceedings on the Seventh International Workshop on Principles of Diagnosis. 1996." } }, { "@position" : "171", "rawText" : { "$" : "[171] B. Sun, R. Chang, X. Chen, and A. Podgurski. “Automated Support for Propagating Bug Fixes”. In: Proceedings of the International Symposium on Software Reliability Engineering. 2008, pp. 187-196." } }, { "@position" : "172", "rawText" : { "$" : "[172] B. Sun, G. Shu, A. Podgurski, S. Li, S. Zhang, and J. Yang. “Propagating Bug Fixes with Fast Subgraph Matching”. In: Proceedings of the International Symposium on Software Reliability Engineering. 2010, pp. 21-30." } }, { "@position" : "173", "rawText" : { "$" : "[173] G. J. Sussman. Building Robust Systems An Essay. 2007." } }, { "@position" : "174", "rawText" : { "$" : "[174] S. Tallam, C. Tian, R. Gupta, and X. Zhang. “Avoiding Program Failures Through Safe Execution Perturbations”. In: International Conference on Computer Software and Applications. 2008." }, "id" : { "@value" : "doi_________::3379f8dc9a918e60ef40c0beb473885f", "@type" : "openaire", "@trustLevel" : "0.6666087" } }, { "@position" : "175", "rawText" : { "$" : "[175] S. H. Tan and A. Roychoudhury. “Relifix: Automated Repair of Software Regressions”. In: Proceedings of ICSE. 2015." } }, { "@position" : "176", "rawText" : { "$" : "[176] Y. Tao, J. Kim, S. Kim, and C. Xu. “Automatically Generated Patches As Debugging Aids: a Human Study”. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. 2014, pp. 64-74." } }, { "@position" : "177", "rawText" : { "$" : "[177] S. Thomas and L. Williams. “Using Automated Fix Generation to Secure SQL Statements”. In: Proceedings of the Third International Workshop on Software Engineering for Secure Systems. 2007, p. 9." } }, { "@position" : "178", "rawText" : { "$" : "[178] W. Torres-Pomales et al. Software Fault Tolerance: a Tutorial. Tech. rep. NASA2000-tm210616. NASA, 2000." } }, { "@position" : "179", "rawText" : { "$" : "[179] J. Tran, M. Godfrey, E. Lee, and R. Holt. “Architectural Repair of Open Source Software”. In: Proceedings of the International Workshop on Program Comprehension. 2000, pp. 48-59." } }, { "@position" : "180", "rawText" : { "$" : "[180] K. Tsipenyuk, B. Chess, and G. McGraw. “Seven Pernicious Kingdoms: a Taxonomy of Software Security Errors”. In: Security & privacy 3.6 (2005), pp. 81-84." } }, { "@position" : "181", "rawText" : { "$" : "[181] F. Wang and C.-H. Cheng. “Program Repair Suggestions From Graphical StateTransition Specifications”. In: Proceedings of FORTE 2008. 2008." } }, { "@position" : "182", "rawText" : { "$" : "[182] T. Wang, C. Song, and W. Lee. “Diagnosis and Emergency Patch Generation for Integer Overflow Exploits”. In: Detection of Intrusions and Malware, and Vulnerability Assessment. 2014, pp. 255-275." } }, { "@position" : "183", "rawText" : { "$" : "[183] X. Wang, L. Zhang, T. Xie, Y. Xiong, and H. Mei. “Automating presentation changes in dynamic web applications via collaborative hybrid analysis”. In: Proceedings of the acm sigsoft international symposium on the foundations of software engineering. ACM. 2012, p. 16." } }, { "@position" : "184", "rawText" : { "$" : "[184] Y. Wang, Y. Huang, and C. Kintala. “Progressive Retry for Software Failure Recovery in Message-passing Applications”. In: Ieee transactions on computers 46.10 (1997), pp. 1137-1141." } }, { "@position" : "185", "rawText" : { "$" : "[185] Y. Wei, Y. Pei, C. A. Furia, L. S. Silva, S. Buchholz, B. Meyer, and A. Zeller. “Automated Fixing of Programs with Contracts”. In: Proceedings of the International Symposium on Software Testing and Analysis. 2010." } }, { "@position" : "186", "rawText" : { "$" : "[186] W. Weimer, T. Nguyen, C. Le Goues, and S. Forrest. “Automatically Finding Patches Using Genetic Programming”. In: Proceedings of the International Conference on Software Engineering. 2009." } }, { "@position" : "187", "rawText" : { "$" : "[187] W. Weimer. “Patches As Better Bug Reports”. In: Proceedings of the International Conference on Generative Programming and Component Engineering. 2006." } }, { "@position" : "188", "rawText" : { "$" : "[188] W. Weimer, S. Forrest, C. Le Goues, and T. Nguyen. “Automatic Program Repair with Evolutionary Computation”. In: Communications of the acm 53.5 (2010), p. 109." } }, { "@position" : "189", "rawText" : { "$" : "[189] W. Weimer, Z. P. Fry, and S. Forrest. “Leveraging program equivalence for adaptive program repair: models and first results”. In: International conference on automated software engineering. 2013, pp. 356-366." } }, { "@position" : "190", "rawText" : { "$" : "[190] W. Wong and V. Debroy. “A Survey on Software Fault Localization”. In: University of texas at dallas, tech. rep. utdcs-45-09 (2009)." } }, { "@position" : "191", "rawText" : { "$" : "[191] Y. Xiong, Z. Hu, H. Zhao, H. Song, M. Takeichi, and H. Mei. “Supporting Automatic Model Inconsistency Fixing”. In: 7th joint meeting of the european software engineering conference and the acm sigsoft symposium on the foundations of software engineering. ACM. 2009, pp. 315-324." } }, { "@position" : "192", "rawText" : { "$" : "[192] Y. Xiong, H. Zhang, A. Hubaux, S. She, J. Wang, and K. Czarnecki. “Range Fixes: Interactive Error Resolution for Software Configuration”. In: Ieee transactions on software engineering 41.6 (2015), pp. 603-619." } }, { "@position" : "193", "rawText" : { "$" : "[193] A. Zeller, Y. Wei, B. Meyer, M. Nordio, C. A. Furia, and Y. Pei. “Automated Fixing of Programs with Contracts”. In: Ieee transactions on software engineering 40.5 (2014), pp. 427-449." } }, { "@position" : "194", "rawText" : { "$" : "[194] X. Zhang, N. Gupta, and R. Gupta. “Locating Faults Through Automated Predicate Switching”. In: Proceedings of the 28th International Conference on Software Engineering. 2006, pp. 272-281." } }, { "@position" : "195", "rawText" : { "$" : "[195] Y. Zhang and Y. Ding. “CTL Model Update for System Modifications”. In: Journal of artificial intelligence research 31.1 (2008), pp. 113-155." } }, { "@position" : "196", "rawText" : { "$" : "[196] H. Zhong and Z. Su. “An Empirical Study on Real Bug Fixes”. In: Proceedings of the 37th International Conference on Software Engineering. 2015." } }, { "@position" : "197", "rawText" : { "$" : "[197] F. Zhou, J. Condit, Z. Anderson, I. Bagrak, R. Ennals, M. Harren, G. Necula, and E. Brewer. “SafeDrive: Safe and Recoverable Extensions Using Language-based Techniques”. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation. 2006, pp. 45-60." } } ] } }, { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "[1] R. Abraham and M. Erwig. “Goal-Directed Debugging of Spreadsheets”. In: Proceedings of the 2005 IEEE Symposium on Visual Languages and Human-Centric Computing. 2005, pp. 37-44." } }, { "@position" : "2", "rawText" : { "$" : "[2] E. Aftandilian, R. Sauciuc, S. Priya, and S. Krishnan. “Building Useful Program Analysis Tools Using An Extensible Java Compiler”. In: International Working Conference on Source Code Analysis and Manipulation (SCAM). 2012, pp. 14-23." } }, { "@position" : "3", "rawText" : { "$" : "[3] P. E. Ammann and J. C. Knight. “Data Diversity: An Approach to Software Fault Tolerance”. In: Ieee transactions on computers 37.4 (1988), pp. 418-425." } }, { "@position" : "4", "rawText" : { "$" : "[4] J. Andersen and J. L. Lawall. “Generic Patch Inference”. In: Automated software engineering 17.2 (2010), pp. 119-148." }, "id" : { "@value" : "doi_________::61a2268b8ef05235ab26bf7f86a575b8", "@type" : "openaire", "@trustLevel" : "0.6860426" } }, { "@position" : "5", "rawText" : { "$" : "[5] A. Arcuri. “Automatic Software Generation and Improvement Through Search Based Techniques”. PhD thesis. The University of Birmingham, 2009." } }, { "@position" : "6", "rawText" : { "$" : "[6] A. Arcuri. “Evolutionary Repair of Faulty Software”. In: Applied soft computing 11.4 (2011), pp. 3494-3514." } }, { "@position" : "7", "rawText" : { "$" : "[7] A. Arcuri and X. Yao. “A Novel Co-evolutionary Approach to Automatic Software Bug Fixing”. In: Proceedings of the IEEE Congress on Evolutionary Computation. 2008, pp. 162-168." } }, { "@position" : "8", "rawText" : { "$" : "[8] A. Avizienis. “The N-version Approach to Fault-tolerant Software”. In: Ieee transactions on software engineering 11.12 (1985), pp. 1491-1501." }, "id" : { "@value" : "doi_________::cdc8356ee2e21ef9bcac6c9fb2cb0d63", "@type" : "openaire", "@trustLevel" : "0.6642342" } }, { "@position" : "9", "rawText" : { "$" : "[9] A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. “Basic Concepts and Taxonomy of Dependable and Secure Computing”. In: Ieee transactions on dependable and secure computing 1.1 (2004), pp. 11-33." } }, { "@position" : "10", "rawText" : { "$" : "[10] T. Azim, I. Neamtiu, and L. Marvel. “Towards Self-healing Smartphone Software via Automated Patching”. In: Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering. 2014, pp. 623-628." }, "id" : { "@value" : "doi_________::d712ef4e8d4ec5be89f3dcab74866c56", "@type" : "openaire", "@trustLevel" : "0.61199635" } }, { "@position" : "11", "rawText" : { "$" : "[11] E. T. Barr, Y. Brun, P. T. Devanbu, M. Harman, and F. Sarro. “The Plastic Surgery Hypothesis”. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. 2014, pp. 306-317." } }, { "@position" : "12", "rawText" : { "$" : "[12] E. Barr, M. Harman, P. McMinn, M. Shahbaz, and S. Yoo. “The Oracle Problem in Software Testing: a Survey”. In: Ieee transactions on software engineering 41.5 (2015), pp. 507-525." }, "id" : { "@value" : "od_______322::8a2eb300b73cf67f9060f8acb68f582d", "@type" : "openaire", "@trustLevel" : "0.6956351" } }, { "@position" : "13", "rawText" : { "$" : "[13] E. D. Berger and B. G. Zorn. “DieHard: Probabilistic Memory Safety for Unsafe Languages”. In: Acm sigplan notices 41.6 (2006), pp. 158-168." } }, { "@position" : "14", "rawText" : { "$" : "[14] R. Bodik and B. Jobstmann. “Algorithmic Program Synthesis: Introduction”. In: International journal on software tools for technology transfer 15.5 (2013), pp. 397- 411." } }, { "@position" : "15", "rawText" : { "$" : "[15] M. Brodie, S. Ma, G. Lohman, L. Mignet, M. Wilding, J. Champlin, and P. Sohn. “Quickly Finding Known Software Problems via Automated Symptom Matching”. In: Proceedings of the International Conference on Autonomic Computing. 2005, pp. 101-110." } }, { "@position" : "16", "rawText" : { "$" : "[16] Y. Brun, E. Barr, M. Xiao, C. Le Goues, and P. Devanbu. Evolution Vs. Intelligent Design in Program Patching. Tech. rep. UC Davis, 2013." } }, { "@position" : "17", "rawText" : { "$" : "[17] Y. Cai and L. Cao. “Fixing Deadlocks via Lock Pre-acquisitions”. In: Proceedings of the 38th international conference on software engineering. ACM. 2016, pp. 1109- 1120." } }, { "@position" : "18", "rawText" : { "$" : "[18] G. Candea and A. Fox. “Crash-only Software”. In: Proceedings of the 9th Conference on Hot Topics in Operating Systems. 2003, pp. 12-12." } }, { "@position" : "19", "rawText" : { "$" : "[19] G. Candea and A. Fox. “Recursive Restartability: Turning the Reboot Sledgehammer Into a Scalpel”. In: Proceedings of the 8th Workshop on Hot Topics in Operating Systems. 2001, pp. 125-130." } }, { "@position" : "20", "rawText" : { "$" : "[20] G. Candea, E. Kiciman, S. Zhang, P. Keyani, and A. Fox. “JAGR: An Autonomous Self-recovering Application Server”. In: Proceedings of the Workshop on Active Middleware Services. 2003, pp. 168-177." } }, { "@position" : "21", "rawText" : { "$" : "[21] G. Candea, S. Kawamoto, Y. Fujiki, G. Friedman, and A. Fox. “Microreboot: a Technique for Cheap Recovery”. In: Proceedings of the 6th Conference on Symposium on Operating Systems Design & Implementation. 2004, pp. 3-3." } }, { "@position" : "22", "rawText" : { "$" : "[22] M. Carbin, S. Misailovic, M. Kling, and M. C. Rinard. “Detecting and Escaping Infinite Loops with Jolt”. In: Procceedings of ECOOP. 2011, pp. 609-633." }, "id" : { "@value" : "od________88::c094ddae3d97799f82f7b81ed61b428d", "@type" : "openaire", "@trustLevel" : "0.6704617" } }, { "@position" : "23", "rawText" : { "$" : "[23] A. Carzaniga, A. Gorla, A. Mattavelli, N. Perino, and M. Pezzè. “Automatic Recovery From Runtime Failures”. In: Proceedings of the International Conference on Software Engineering. 2013." }, "id" : { "@value" : "erc_________::a644ed3d5d0bf211431055edec3a2edf", "@type" : "openaire", "@trustLevel" : "0.70273936" } }, { "@position" : "24", "rawText" : { "$" : "[24] A. Carzaniga, A. Gorla, N. Perino, and M. Pezzè. “Automatic Workarounds for Web Applications”. In: Proceedings of the Foundations of Software Engineering Conference. 2010, pp. 237-246." }, "id" : { "@value" : "doi_________::3ba8db866f56f3a0e66ac3068786c073", "@type" : "openaire", "@trustLevel" : "0.6666673" } }, { "@position" : "25", "rawText" : { "$" : "[25] S. Chandra, E. Torlak, S. Barman, and R. Bodik. “Angelic Debugging”. In: Proceeding of the International Conference on Software Engineering. 2011, pp. 121-130." } }, { "@position" : "26", "rawText" : { "$" : "[26] S.-W. Cheng, D. Garlan, B. R. Schmerl, J. P. Sousa, B. Spitnagel, and P. Steenkiste. “Using Architectural Style As a Basis for System Self-repair”. In: Proceedings of the IFIP 17th World Computer Congress / 3rd IEEE/IFIP Conference on Software Architecture: System Design, Development and Maintenance. 2002, pp. 45-59." } }, { "@position" : "27", "rawText" : { "$" : "[27] Z. Coker and M. Hafiz. “Program Transformations to Fix C Integers”. In: Proceedings of the International Conference on Software Engineering. 2013, pp. 792-801." } }, { "@position" : "28", "rawText" : { "$" : "[28] B. Cornu, L. Seinturier, and M. Monperrus. “Exception Handling Analysis and Transformation Using Fault Injection: Study of Resilience Against Unanticipated Exceptions”. In: Information and Software Technology 57 (2015), pp. 66-76." }, "id" : { "@value" : "doi_________::7f2c9178211b4d9123bf9d0d238d3ea8", "@type" : "openaire", "@trustLevel" : "0.69015485" } }, { "@position" : "29", "rawText" : { "$" : "[29] M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. “Vigilante: End-to-end Containment of Internet Worms”. In: ACM SIGOPS Operating Systems Review. Vol. 39. 5. 2005, pp. 133-147." } }, { "@position" : "30", "rawText" : { "$" : "[30] V. Dallmeier, A. Zeller, and B. Meyer. “Generating Fixes From Object Behavior Anomalies”. In: Proceedings of the International Conference on Automated Software Engineering. 2009." }, "id" : { "@value" : "doi_________::d9ac7ad5a76f49bacb512cbc80e9accc", "@type" : "openaire", "@trustLevel" : "0.6434098" } }, { "@position" : "31", "rawText" : { "$" : "[31] B. Daniel, V. Jagannath, D. Dig, and D. Marinov. “ReAssert: Suggesting Repairs for Broken Unit Tests”. In: Proceedings of the 24th IEEE/ACM International Conference on Automated Software Engineering. 2009, pp. 433-444." } }, { "@position" : "32", "rawText" : { "$" : "[32] L. D'Antoni, R. Samanta, and R. Singh. “Qlose: Program Repair with Quantitative Objectives”. In: International conference on computer aided verification. Springer. 2016, pp. 383-401." } }, { "@position" : "33", "rawText" : { "$" : "[33] V. Debroy and W. Wong. “Using Mutation to Automatically Suggest Fixes for Faulty Programs”. In: Proceedings of the International Conference on Software Testing, Verification and Validation. 2010, pp. 65-74." } }, { "@position" : "34", "rawText" : { "$" : "[34] F. DeMarco, J. Xuan, D. Le Berre, and M. Monperrus. “Automatic Repair of Buggy If Conditions and Missing Preconditions with SMT”. In: Proceedings of the 6th international workshop on constraints in software testing, verification, and analysis (cstva 2014). 2014." } }, { "@position" : "35", "rawText" : { "$" : "[35] B. Demsky and M. Rinard. “Automatic Detection and Repair of Errors in Data Structures”. In: Acm sigplan notices 38.11 (2003), pp. 78-95." }, "id" : { "@value" : "doi_________::831ce490dd2b26b411d0a3dfad3192c0", "@type" : "openaire", "@trustLevel" : "0.6797866" } }, { "@position" : "36", "rawText" : { "$" : "[36] B. Demsky and A. Dash. “Bristlecone: a Language for Robust Software Systems”. In: Proceedings of ECOOP. 2008, pp. 490-515." }, "id" : { "@value" : "doi_________::3cdeb8c61016145a5f1f9ffded00cf5f", "@type" : "openaire", "@trustLevel" : "0.65308636" } }, { "@position" : "37", "rawText" : { "$" : "[37] G. Denaro, M. Pezzè, and D. Tosi. “Ensuring Interoperable Service-oriented Systems Through Engineered Self-healing”. In: Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. 2009, pp. 253-262." }, "id" : { "@value" : "od______1299::d88b26167c1fc51ae91d2750dec1cb80", "@type" : "openaire", "@trustLevel" : "0.67078865" } }, { "@position" : "38", "rawText" : { "$" : "[38] L. A. Dennis, R. Monroy, and P. Nogueira. “Proof-directed Debugging and Repair”. In: Seventh Symposium on Trends in Functional Programming. 2006, pp. 131-140." } }, { "@position" : "39", "rawText" : { "$" : "[39] A. Dhar, R. Purandare, M. Dhawan, and S. Rangaswamy. “CLOTHO: Saving Programs from Malformed Strings and Incorrect String-handling”. In: Foundations of software engineering. ACM. 2015, pp. 555-566." }, "id" : { "@value" : "doi_________::bb0b5a79cc6ce658c7b653d02eb825ed", "@type" : "openaire", "@trustLevel" : "0.6466234" } }, { "@position" : "40", "rawText" : { "$" : "[40] K. Dobolyi and W. Weimer. “Changing Java's Semantics for Handling Null Pointer Exceptions”. In: 19th International Symposium on Software Reliability Engineering. 2008, pp. 47-56." }, "id" : { "@value" : "doi_________::94c20394972b238b716eaf27a21aa995", "@type" : "openaire", "@trustLevel" : "0.6879837" } }, { "@position" : "41", "rawText" : { "$" : "[41] J. Duraes and H. Madeira. “Emulation of Software Faults: a Field Data Study and a Practical Approach”. In: Ieee transactions on software engineering 32.11 (2006), pp. 849-867." }, "id" : { "@value" : "doi_________::de928d93db7d4cc0a0f10e4a39e7751f", "@type" : "openaire", "@trustLevel" : "0.6419633" } }, { "@position" : "42", "rawText" : { "$" : "[42] M. Eisenstadt. “My Hairiest Bug War Stories”. In: Communications of the acm 40.4 (1997), pp. 30-37." }, "id" : { "@value" : "doi_________::24d27bafdd755a229c6a8f8e46be25e6", "@type" : "openaire", "@trustLevel" : "0.6089758" } }, { "@position" : "43", "rawText" : { "$" : "[43] B. Elkarablieh, I. Garcia, Y. Suen, and S. Khurshid. “Assertion-based Repair of Complex Data Structures”. In: Proceedings of the Twenty-second IEEE/ACM International Conference on Automated Software Engineering. 2007, pp. 64-73." } }, { "@position" : "44", "rawText" : { "$" : "[44] H. ETO and K. Yoda. “Propolice: Improved Stacksmashing Attack Detection”. In: Ipsj sig notes 75 (2001), pp. 181-188." } }, { "@position" : "45", "rawText" : { "$" : "[45] S. Forrest, T. Nguyen, W. Weimer, and C. Le Goues. “A Genetic Programming Approach to Automated Software Repair”. In: Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation. 2009, pp. 947-954." } }, { "@position" : "46", "rawText" : { "$" : "[46] G. Friedrich, M. Fugini, E. Mussi, B. Pernici, and G. Tagni. “Exception Handling for Repair in Service-Based Processes”. In: Ieee transactions on software engineering 36.2 (2010), pp. 198-215." } }, { "@position" : "47", "rawText" : { "$" : "[47] Z. P. Fry, B. Landau, and W. Weimer. “A Human Study of Patch Maintainability”. In: Proceedings of the International Symposium on Software Testing and Analysis. 2012, pp. 177-187." } }, { "@position" : "48", "rawText" : { "$" : "[48] R. P. Gabriel and R. Goldman. “Conscientious Software”. In: Acm Sigplan Notices. Vol. 41. 10. 2006, pp. 433-450." } }, { "@position" : "49", "rawText" : { "$" : "[49] Q. Gao, Y. Xiong, Y. Mi, L. Zhang, W. Yang, Z. Zhou, B. Xie, and H. Mei. “Safe Memory-leak Fixing for C Programs”. In: Proceedings of the 37th International Conference on Software Engineering. 2015, pp. 459-470." } }, { "@position" : "50", "rawText" : { "$" : "[50] Q. Gao, H. Zhang, J. Wang, Y. Xiong, L. Zhang, and H. Mei. “Fixing Recurring Crash Bugs via Analyzing Q&A Sites”. In: Proceedings of the 30th ieee/acm international conference on automated software engineering. ACM, 2015." } }, { "@position" : "51", "rawText" : { "$" : "[51] Z. Gao, Z. Chen, Y. Zou, and A. Memon. “SITAR: GUI Test Script Repair”. In: Ieee transactions on software engineering (2015)." } }, { "@position" : "52", "rawText" : { "$" : "[52] D. Garlan, S.-W. Cheng, and B. Schmerl. “Increasing System Dependability Through Architecture-based Self-repair”. In: Architecting Dependable Systems. 2003, pp. 61- 89." }, "id" : { "@value" : "doi_________::d85625277be9d18e919bcb5b0e882cce", "@type" : "openaire", "@trustLevel" : "0.6333976" } }, { "@position" : "53", "rawText" : { "$" : "[53] B. J. Garvin, M. B. Cohen, and M. B. Dwyer. “Using Feature Locality: Can We Leverage History to Avoid Failures During Reconfiguration?” In: Proceedings of the 8th Workshop on Assurances for Self-adaptive Systems. 2011, pp. 24-33." } }, { "@position" : "54", "rawText" : { "$" : "[54] S. George, D. Evans, and S. Marchette. “A Biological Programming Model for SelfHealing”. In: Proceedings of SSRS. 2013." } }, { "@position" : "55", "rawText" : { "$" : "[55] D. Ghosh, R. Sharman, H. Raghav Rao, and S. Upadhyaya. “Self-healing Systems-survey and Synthesis”. In: Decision support systems 42.4 (2007), pp. 2164- 2185." } }, { "@position" : "56", "rawText" : { "$" : "[56] D. Gopinath, S. Khurshid, D. Saha, and S. Chandra. “Data-guided Repair of Selection Statements”. In: Proceedings of the 36th International Conference on Software Engineering. 2014, pp. 243-253." } }, { "@position" : "57", "rawText" : { "$" : "[57] D. Gopinath, M. Z. Malik, and S. Khurshid. “Specification-based Program Repair Using SAT”. In: Proceedings of the International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 2011." } }, { "@position" : "58", "rawText" : { "$" : "[58] A. Griesmayer, R. Bloem, and B. Cook. “Repair of Boolean Programs with An Application to C”. In: Computer Aided Verification. 2006, pp. 358-371." }, "id" : { "@value" : "doi_________::548cdecf229ac417a54d97bd6927711e", "@type" : "openaire", "@trustLevel" : "0.6535551" } }, { "@position" : "59", "rawText" : { "$" : "[59] R. Gupta, S. Pal, A. Kanade, and S. Shevade. “DeepFix: Fixing Common C Language Errors by Deep Learning”. In: Proceedings of the aaai conference on artificial intelligence. 2017." } }, { "@position" : "60", "rawText" : { "$" : "[60] B. Hartmann, D. MacDougall, J. Brandt, and S. R. Klemmer. “What Would Other Programmers Do: Suggesting Solutions to Error Messages”. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 2010, pp. 1019-1028." } }, { "@position" : "61", "rawText" : { "$" : "[61] H. He and N. Gupta. “Automated Debugging Using Path-Based Weakest Preconditions”. In: FASE. 2004, pp. 267-280." } }, { "@position" : "62", "rawText" : { "$" : "[62] P. Hosek and C. Cadar. “Safe Software Updates via Multi-version Execution”. In: Proceedings of the International Conference on Software Engineering. 2013, pp. 612- 621." }, "id" : { "@value" : "doi_________::95023b71791957385eba9b2bc7b6b0e5", "@type" : "openaire", "@trustLevel" : "0.77703565" } }, { "@position" : "63", "rawText" : { "$" : "[63] D. Hovemeyer and W. Pugh. “Finding Bugs Is Easy”. In: Acm sigplan notices 39.12 (2004)." }, "id" : { "@value" : "doi_________::98bdf4bc886d9538280ce8467742014f", "@type" : "openaire", "@trustLevel" : "0.68069535" } }, { "@position" : "64", "rawText" : { "$" : "[64] Y. Huang, C. Kintala, N. Kolettis, and N. Fulton. “Software Rejuvenation: Analysis, Module and Applications”. In: Proceedings of the International Symposium on FaultTolerant Computing. 1995, pp. 381-390." } }, { "@position" : "65", "rawText" : { "$" : "[65] D. Jackson and M. Vaziri. “Finding Bugs with a Constraint Solver”. In: Proceedings of the 2000 ACM SIGSOFT International Symposium on Software Testing and Analysis. 2000, pp. 14-25." } }, { "@position" : "66", "rawText" : { "$" : "[66] D. Jeffrey, M. Feng, N. Gupta, and R. Gupta. “BugFix: a Learning-based Tool to Assist Developers in Fixing Bugs”. In: ICPC. 2009, pp. 70-79." } }, { "@position" : "67", "rawText" : { "$" : "[67] D. Jeffrey, N. Gupta, and R. Gupta. “Fault Localization Using Value Replacement”. In: Proceedings of the International Symposium on Software Testing and Analysis. 2008, pp. 167-178." } }, { "@position" : "68", "rawText" : { "$" : "[68] S. Jha, S. Gulwani, S. A. Seshia, and A. Tiwari. “Oracle-guided Component-based Program Synthesis”. In: Proceedings of the International Conference on Software Engineering. Vol. 1. 2010, pp. 215-224." } }, { "@position" : "69", "rawText" : { "$" : "[69] M. Jiang, T. Y. Chen, F.-C. Kuo, D. Towey, and Z. Ding. “A Metamorphic Testing Approach for Supporting Program Repair without the Need for a Test Oracle”. In: Journal of systems and software (2016)." } }, { "@position" : "70", "rawText" : { "$" : "[70] G. Jin, L. Song, W. Zhang, S. Lu, and B. Liblit. “Automated Atomicity-violation Fixing”. In: Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation. 2011, pp. 389-400." } }, { "@position" : "71", "rawText" : { "$" : "[71] B. Jobstmann, A. Griesmayer, and R. Bloem. “Program Repair As a Game”. In: Computer Aided Verification. 2005, pp. 226-238." }, "id" : { "@value" : "doi_________::a0796bb2ee00e1738f887ecc5a129263", "@type" : "openaire", "@trustLevel" : "0.6640217" } }, { "@position" : "72", "rawText" : { "$" : "[72] H. Jula, D. Tralamazza, C. Zamfir, and G. Candea. “Deadlock Immunity: Enabling Systems to Defend Against Deadlocks”. In: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation. 2008, pp. 295-308." }, "id" : { "@value" : "snsf_p3_pubs::fb0b54b74e1cbedb111b95a531c14cf1", "@type" : "openaire", "@trustLevel" : "0.60978603" } }, { "@position" : "73", "rawText" : { "$" : "[73] S. Kaleeswaran, V. Tulsian, A. Kanade, and A. Orso. “Minthint: Automated Synthesis of Repair Hints”. In: Proceedings of the International Conference on Software Engineering. 2014, pp. 266-276." } }, { "@position" : "74", "rawText" : { "$" : "[74] S. Kalvala and R. Warburton. “A Formal Approach to Fixing Bugs”. In: Formal Methods, Foundations and Applications. 2011, pp. 172-187." }, "id" : { "@value" : "doi_________::d00dd2d207fdd41a5344650907ff0c85", "@type" : "openaire", "@trustLevel" : "0.67734885" } }, { "@position" : "75", "rawText" : { "$" : "[75] A. Kalyanpur, B. Parsia, E. Sirin, and B. Cuenca-Grau. “Repairing Unsatisfiable Concepts in OWL Ontologies”. In: The Semantic Web: Research and Applications. Vol. 4011. 2006, pp. 170-184." }, "id" : { "@value" : "od______3818::c7c5bc96ddfd02c346496e368c8db542", "@type" : "openaire", "@trustLevel" : "0.66630703" } }, { "@position" : "76", "rawText" : { "$" : "[76] M. Kasbekar, C. Narayanan, and C. Das. “Selective Checkpointing and Rollbacks in Multi-threaded Object-oriented Environment”. In: Ieee transactions on reliability 48.4 (1999), pp. 325-337." } }, { "@position" : "77", "rawText" : { "$" : "[77] Y. Ke, K. T. Stolee, C. Le Goues, and Y. Brun. “Repairing Programs with Semantic Code Search”. In: Proceedings of the International Conference on Automated Software Engineering. 2015." } }, { "@position" : "78", "rawText" : { "$" : "[78] C. Kern and J. Esparza. “Automatic Error Correction of Java Programs”. In: Formal Methods for Industrial Critical Systems. 2010, pp. 67-81." } }, { "@position" : "79", "rawText" : { "$" : "[79] D. Kim, J. Nam, J. Song, and S. Kim. “Automatic Patch Generation Learned From Human-Written Patches”. In: Proceedings of ICSE. 2013." } }, { "@position" : "80", "rawText" : { "$" : "[80] E. Kneuss, M. Koukoutos, and V. Kuncak. “Deductive Program Repair”. In: International conference on computer aided verification. Springer. 2015, pp. 217-233." }, "id" : { "@value" : "doi_________::b9fabffd1bc6c55238a566f0d289f01c", "@type" : "openaire", "@trustLevel" : "0.6627885" } }, { "@position" : "81", "rawText" : { "$" : "[81] D. E. Knuth. “The Errors of TEX”. In: Softw., pract. exper. 19.7 (1989), pp. 607-685." } }, { "@position" : "82", "rawText" : { "$" : "[82] X. Kong, L. Zhang, W. E. Wong, and B. Li. “Experience report: how do techniques, programs, and tests impact automated program repair?” In: International symposium on software reliability engineering. IEEE. 2015, pp. 194-204." } }, { "@position" : "83", "rawText" : { "$" : "[83] R. Könighofer and R. Bloem. “Automated Error Localization and Correction for Imperative Programs”. In: Formal Methods in Computer-Aided Design (FMCAD), 2011. 2011, pp. 91-100." } }, { "@position" : "84", "rawText" : { "$" : "[84] R. Könighofer and R. Bloem. “Repair with On-the-fly Program Analysis”. In: Hardware and Software: Verification and Testing. 2013, pp. 56-71." }, "id" : { "@value" : "doi_________::436a81a296b9e029d48a820dfd54516b", "@type" : "openaire", "@trustLevel" : "0.6695329" } }, { "@position" : "85", "rawText" : { "$" : "[85] R. Koo and S. Toueg. “Checkpointing and Rollback-recovery for Distributed Systems”. In: Ieee transactions on software engineering 1 (1987), pp. 23-31." } }, { "@position" : "86", "rawText" : { "$" : "[86] M. Lake. Epic Failures: 11 Infamous Software Bugs. http://www.computerworld. com/article/2515483/enterprise- applications/epic- failures-- 11- infamous- softwarebugs.html. 2010." } }, { "@position" : "87", "rawText" : { "$" : "[87] J. L. Lawall, J. Brunel, N. Palix, R. R. Hansen, H. Stuart, and G. Muller. “WYSIWIB: a Declarative Approach to Finding API Protocols and Bugs in Linux Code”. In: International Conference on Dependable Systems & Networks. 2009, pp. 43-52." } }, { "@position" : "88", "rawText" : { "$" : "[88] N. Lazaar, A. Gotlieb, and Y. Lebbah. “A Framework for the Automatic Correction of Constraint Programs”. In: Proceedings of the International Conference on Software Testing, Verification and Validation. 2011, pp. 319-326." }, "id" : { "@value" : "doi_________::01f4566cd3c811cf918e796095b98159", "@type" : "openaire", "@trustLevel" : "0.67730725" } }, { "@position" : "89", "rawText" : { "$" : "[89] C. Le Goues, M. Dewey-Vogt, S. Forrest, and W. Weimer. “A Systematic Study of Automated Program Repair: Fixing 55 Out of 105 Bugs for $8 Each”. In: Proceedings of the International Conference on Software Engineering. 2012, pp. 3-13." } }, { "@position" : "90", "rawText" : { "$" : "[90] C. Le Goues, S. Forrest, and W. Weimer. “Current Challenges in Automatic Software Repair”. In: Software quality journal 21.3 (2013), pp. 421-443." }, "id" : { "@value" : "doi_________::9bc22c7f896fc815d34331fc8ca130ad", "@type" : "openaire", "@trustLevel" : "0.6842719" } }, { "@position" : "91", "rawText" : { "$" : "[91] C. Le Goues, N. Holtschulte, E. K. Smith, Y. Brun, P. Devanbu, S. Forrest, and W. Weimer. “The ManyBugs and IntroClass Benchmarks for Automated Repair of C Programs”. In: Ieee transactions on software engineering (tse), in press (2015)." }, "id" : { "@value" : "doi_________::cf3f3afaded86d7d82fb50ca40925607", "@type" : "openaire", "@trustLevel" : "0.62086505" } }, { "@position" : "92", "rawText" : { "$" : "[92] C. Le Goues, T. Nguyen, S. Forrest, and W. Weimer. “GenProg: a Generic Method for Automatic Software Repair”. In: Ieee transactions on software engineering 38 (2012), pp. 54-72." }, "id" : { "@value" : "doi_________::0061eafa8f13e1c2815be279e13c9f58", "@type" : "openaire", "@trustLevel" : "0.6592393" } }, { "@position" : "93", "rawText" : { "$" : "[93] X. B. D. Le, D. Lo, and C. L. Goues. “History Driven Program Repair”. In: Proceedings of the 23rd international conference on software analysis, evolution, and reengineering (saner). 2016, pp. 213-224." } }, { "@position" : "94", "rawText" : { "$" : "[94] M. Leotta, D. Clerissi, F. Ricca, and C. Spadaro. “Repairing Selenium Test Cases: an Industrial Case Study about Web Page Element Localization”. In: International conference on software testing, verification and validation. IEEE. 2013, pp. 487-488." }, "id" : { "@value" : "doi_________::80d6db949a21f0405a94330ae97a5028", "@type" : "openaire", "@trustLevel" : "0.67532986" } }, { "@position" : "95", "rawText" : { "$" : "[95] R. Levinson. “Unified Planning and Execution for Autonomous Software Repair”. In: Workshop on Plan Execution: a Reality Check. 2005." } }, { "@position" : "96", "rawText" : { "$" : "[96] C. Lewis and J. Whitehead. “Runtime Repair of Software Faults Using Event-driven Monitoring”. In: Proceedings of the 32nd acm/ieee international conference on software engineering - icse '10 2 (2010), p. 275." } }, { "@position" : "97", "rawText" : { "$" : "[97] Z. Liang and R. Sekar. “Fast and Automated Generation of Attack Signatures: a Basis for Building Self-protecting Servers”. In: Proceedings of the 12th ACM Conference on Computer and Communications Security. 2005, pp. 213-222." } }, { "@position" : "98", "rawText" : { "$" : "[98] Y. Lin and S. Kulkarni. “Automatic Repair for Multi-threaded Programs with Deadlock/Livelock Using Maximum Satisfiability”. In: Proceedings of the 2014 international symposium on software testing and analysis. ACM. 2014, pp. 237-247." } }, { "@position" : "99", "rawText" : { "$" : "[99] Z. Lin, X. Jiang, D. Xu, B. Mao, and L. Xie. “AutoPaG: Towards Automated Software Patch Generation with Source Code Root Cause Identification and Repair”. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. 2007, pp. 329-340." } }, { "@position" : "100", "rawText" : { "$" : "[100] C. Liu, J. Yang, L. Tan, and M. Hafiz. “R2Fix: Automatically Generating Bug Fixes From Bug Reports”. In: Proceedings of the International Conference on Software Testing, Verification and Validation (ICST). 2013, pp. 282-291." } }, { "@position" : "101", "rawText" : { "$" : "[101] H. Liu, Y. Chen, and S. Lu. “Understanding and Generating High Quality Patches for Concurrency bugs”. In: Proceedings of the 2016 24th acm sigsoft international symposium on foundations of software engineering. ACM. 2016, pp. 715-726." } }, { "@position" : "102", "rawText" : { "$" : "[102] P. Liu and C. Zhang. “Axis: Automatically Fixing Atomicity Violations Through Solving Control Constraints”. In: Proceedings of the 2012 International Conference on Software Engineering. 2012, pp. 299-309." } }, { "@position" : "103", "rawText" : { "$" : "[103] M. E. Locasto, S. Sidiroglou, and A. D. Keromytis. “Software Self-Healing Using Collaborative Application Communities”. In: Proceedings of the Network and Distributed System Security Symposium. 2006." }, "id" : { "@value" : "doi_________::6e539f0301aa67945ea78037c50f8cac", "@type" : "openaire", "@trustLevel" : "0.6636007" } }, { "@position" : "104", "rawText" : { "$" : "[104] F. Logozzo and T. Ball. “Modular and Verified Automatic Program Repair”. In: Proceedings of the 27th ACM International Conference on Object Oriented Programming Systems Languages and Applications. 2012." }, "id" : { "@value" : "doi_________::d4c79c47b10fe4a7677a642634719536", "@type" : "openaire", "@trustLevel" : "0.6743879" } }, { "@position" : "105", "rawText" : { "$" : "[105] F. Logozzo and M. Martel. “Automatic Repair of Overflowing Expressions with Abstract Interpretation”. In: Semantics, Abstract Interpretation, and Reasoning About Programs: Essays Dedicated to David A. Schmidt on the Occasion of His Sixtieth Birthday. Vol. 129. 2013, pp. 341-357." }, "id" : { "@value" : "arXiv_______::053a118d1a1e41678005a2da74b776e1", "@type" : "openaire", "@trustLevel" : "0.73015213" } }, { "@position" : "106", "rawText" : { "$" : "[106] F. Long, V. Ganesh, M. Carbin, S. Sidiroglou, and M. Rinard. “Automatic Input Rectification”. In: Proceedings of ICSE. 2012." } }, { "@position" : "107", "rawText" : { "$" : "[107] F. Long and M. C. Rinard. “Prophet: Automatic Patch Generation via Learning From Successful Patches”. In: Proceedings of the Symposium on Principles of Programming Languages. 2016." } }, { "@position" : "108", "rawText" : { "$" : "[108] F. Long and M. C. Rinard. “Staged Program Repair with Condition Synthesis”. In: Proceedings of ESEC/FSE. 2015." } }, { "@position" : "109", "rawText" : { "$" : "[109] F. Long, S. Sidiroglou-Douskos, D. Kim, and M. Rinard. “Sound Input Filter Generation for Integer Overflow Errors”. In: Acm sigplan notices 49.1 (2014), pp. 439- 452." } }, { "@position" : "110", "rawText" : { "$" : "[110] F. Long, S. Sidiroglou-Douskos, and M. C. Rinard. “Automatic Runtime Error Repair and Containment via Recovery Shepherding”. In: ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014." }, "id" : { "@value" : "od________88::0be88c19cf018a64e73bc16f959a0eba", "@type" : "openaire", "@trustLevel" : "0.6835259" } }, { "@position" : "111", "rawText" : { "$" : "[111] M. Malik, J. Siddiqi, and S. Khurshid. “Constraint-Based Program Debugging Using Data Structure Repair”. In: International Conference on Software Testing, Verification and Validation (ICST). 2011, pp. 190-199." } }, { "@position" : "112", "rawText" : { "$" : "[112] S. L. Marcote and M. Monperrus. Automatic Repair of Infinite Loops. Tech. rep. 1504.05078. Arxiv, 2015." } }, { "@position" : "113", "rawText" : { "$" : "[113] M. Martinez, T. Durieux, R. Sommerard, J. Xuan, and M. Monperrus. “Automatic Repair of Real Bugs in Java: A Large-Scale Experiment on the Defects4J Dataset”. In: Springer empirical software engineering (2016)." } }, { "@position" : "114", "rawText" : { "$" : "[114] M. Martinez and M. Monperrus. “Mining Software Repair Models for Reasoning on the Search Space of Automated Program Fixing”. In: Empirical Software Engineering 20.1 (2013), pp. 176-205." }, "id" : { "@value" : "doi_________::20a481dc781e009ed40ab895ff4455b9", "@type" : "openaire", "@trustLevel" : "0.7182879" } }, { "@position" : "115", "rawText" : { "$" : "[115] M. Martinez, W. Weimer, and M. Monperrus. “Do the Fix Ingredients Already Exist? An Empirical Inquiry into the Redundancy Assumptions of Program Repair Approaches”. In: Proceedings of the international conference on software engineering, track on new ideas and emerging results. 2014." } }, { "@position" : "116", "rawText" : { "$" : "[116] S. Mechtaev, J. Yi, and A. Roychoudhury. “Angelix: Scalable Multiline Program Patch Synthesis via Symbolic Analysis”. In: Proceedings of the 38th international conference on software engineering. 2016, pp. 691-701." } }, { "@position" : "117", "rawText" : { "$" : "[117] S. Mechtaev, J. Yi, and A. Roychoudhury. “DirectFix: Looking for Simple Program Repairs”. In: Proceedings of the 37th International Conference on Software Engineering. 2015." } }, { "@position" : "118", "rawText" : { "$" : "[118] I. Medeiros, N. F. Neves, and M. Correia. “Automatic detection and correction of web application vulnerabilities using data mining to predict false positives”. In: Proceedings of the 23rd international conference on world wide web. ACM. 2014, pp. 63- 74." } }, { "@position" : "119", "rawText" : { "$" : "[119] A. M. Memon. “Automatically Repairing Event Sequence-based GUI Test Suites for Regression Testing”. In: Acm transactions on software engineering and methodology 18.2 (2008), p. 4." } }, { "@position" : "120", "rawText" : { "$" : "[120] N. Meng, M. Kim, and K. S. McKinley. “LASE: Locating and Applying Systematic Edits by Learning From Examples”. In: Proceedings of the International Conference on Software Engineering. 2013, pp. 502-511." } }, { "@position" : "121", "rawText" : { "$" : "[121] N. Meng, M. Kim, and K. S. McKinley. “Systematic Editing: Generating Program Transformations From An Example”. In: Proceedings of the 32Nd ACM SIGPLAN Conference on Programming Language Design and Implementation. 2011, pp. 329- 342." } }, { "@position" : "122", "rawText" : { "$" : "[122] M. G. Merideth. “Enhancing Survivability with Proactive Fault-containment”. In: The 2003 International Conference on Dependable Systems and Networks. 2003." } }, { "@position" : "123", "rawText" : { "$" : "[123] B. Meyer. “Applying 'design by Contract'”. In: Computer 25.10 (1992), pp. 40-51." } }, { "@position" : "124", "rawText" : { "$" : "[124] M. Monperrus. “A Critical Review of \"Automatic Patch Generation Learned from Human-Written Patches\": Essay on the Problem Statement and the Evaluation of Automatic Software Repair”. In: Proceedings of the international conference on software engineering. 2014, pp. 234-242." } }, { "@position" : "125", "rawText" : { "$" : "[125] M. Monperrus. Principles of antifragile software. Tech. rep. 1404.3056. Arxiv, 2014." } }, { "@position" : "126", "rawText" : { "$" : "[126] P. Muntean, V. K. Kommanapalli, A. Ibing, and C. Eckert. “Automated Generation of Buffer Overflows Quick Fixes Using Symbolic Execution and SMT”. In: International Conference on Computer Safety, Reliability & Security (SAFECOMP'15). 2015." } }, { "@position" : "127", "rawText" : { "$" : "[127] C. Nentwich, W. Emmerich, and A. Finkelstein. “Consistency Management with Repair Actions”. In: Proceedings of the 25th International Conference on Software Engineering. 2003, pp. 455-464." } }, { "@position" : "128", "rawText" : { "$" : "[128] H. D. T. Nguyen, D. Qi, A. Roychoudhury, and S. Chandra. “SemFix: Program Repair via Semantic Analysis”. In: Proceedings of the International Conference on Software Engineering. 2013." } }, { "@position" : "129", "rawText" : { "$" : "[129] H. H. Nguyen and M. Rinard. “Detecting and Eliminating Memory Leaks Using Cyclic Memory Allocation”. In: Proceedings of the 6th International Symposium on Memory Management. 2007, pp. 15-30." } }, { "@position" : "130", "rawText" : { "$" : "[130] M. Nica, S. Nica, and F. Wotawa. “On the Use of Mutations and Testing for Debugging”. In: Software: practice and experience 43.9 (2013), pp. 1121-1142." } }, { "@position" : "131", "rawText" : { "$" : "[131] G. Novark, E. Berger, and B. Zorn. “Exterminator: Automatically Correcting Memory Errors with High Probability”. In: Acm sigplan notices 42.6 (2007), pp. 1-11." } }, { "@position" : "132", "rawText" : { "$" : "[132] V. Oliveira, E. Souza, C. Le Goues, and C. G. Camilo. “Improved Crossover Operators for Genetic Programming for Program Repair”. In: Proceedings of the 8th international symposium on search based software engineering. 2016." } }, { "@position" : "133", "rawText" : { "$" : "[133] Y. Padioleau, J. Lawall, R. Hansen, and G. Muller. “Documenting and Automating Collateral Evolutions in Linux Device Drivers”. In: Acm sigops operating systems review 42.4 (2008), pp. 247-260." } }, { "@position" : "134", "rawText" : { "$" : "[134] J. H. Perkins, G. Sullivan, W.-F. Wong, Y. Zibin, M. D. Ernst, M. Rinard, S. Kim, S. Larsen, S. Amarasinghe, J. Bachrach, M. Carbin, C. Pacheco, F. Sherwood, and S. Sidiroglou. “Automatically Patching Errors in Deployed Software”. In: Proceedings of the Symposium on Operating Systems Principles (2009), p. 87." } }, { "@position" : "135", "rawText" : { "$" : "[135] B. Pernici and A. M. Rosati. “Automatic Learning of Repair Strategies for Web Services”. In: Proceedings of the Fifth European Conference on Web Services. 2007, pp. 119-128." }, "id" : { "@value" : "doi_________::2d71ded40760d2ffa471bd4ef19231bf", "@type" : "openaire", "@trustLevel" : "0.6622441" } }, { "@position" : "136", "rawText" : { "$" : "[136] M. Pezzè, M. C. Rinard, W. Weimer, and A. Zeller. Self-Repairing Programs, Report From Dagstuhl Seminar. Tech. rep. 11062. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2011." } }, { "@position" : "137", "rawText" : { "$" : "[137] Y. Qi, X. Mao, and Y. Lei. “Efficient Automated Program Repair Through FaultRecorded Testing Prioritization”. In: Proceedings of ICSM. 2013." } }, { "@position" : "138", "rawText" : { "$" : "[138] Y. Qi, X. Mao, and Y. Lei. “Program Repair As Sound Optimization of Broken Programs”. In: International Symposium on Theoretical Aspects of Software Engineering. 2009." } }, { "@position" : "139", "rawText" : { "$" : "[139] Y. Qi, X. Mao, Y. Lei, Z. Dai, and C. Wang. “The Strength of Random Search on Automated Program Repair”. In: Proceedings of the 36th International Conference on Software Engineering. 2014, pp. 254-265." } }, { "@position" : "140", "rawText" : { "$" : "[140] Z. Qi, F. Long, S. Achour, and M. Rinard. “An Analysis of Patch Plausibility and Correctness for Generate-And-Validate Patch Generation Systems”. In: Proceedings of ISSTA. 2015." } }, { "@position" : "141", "rawText" : { "$" : "[141] F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou. “Rx: Treating Bugs As Allergies-a Safe Method to Survive Software Failures”. In: Acm sigops operating systems review 39.5 (2005), pp. 235-248." } }, { "@position" : "142", "rawText" : { "$" : "[142] B. Randell. “System Structure for Software Fault Tolerance”. In: Ieee transactions on software engineering 2 (1975), pp. 220-232." }, "id" : { "@value" : "doi_________::265e575335f9998cf7b95357b2904db2", "@type" : "openaire", "@trustLevel" : "0.7009199" } }, { "@position" : "143", "rawText" : { "$" : "[143] M. Rinard, C. Cadar, D. Dumitran, D. Roy, T. Leu, and W. Beebee Jr. “Enhancing Server Availability and Security Through Failure-oblivious Computing”. In: Proceedings of the 6th Conference on Symposium on Operating Systems, Design & Implementation. 2004, pp. 21-21." } }, { "@position" : "144", "rawText" : { "$" : "[144] M. Rinard, M. Ernst, and J. Perkins. Collaborative Learning for Security and Repair in Application Communities. Tech. rep. Massachusetts Institute of Technology, 2011." } }, { "@position" : "145", "rawText" : { "$" : "[145] M. Rinard. “Acceptability-oriented Computing”. In: Acm sigplan notices 38.12 (2003), pp. 57-75." }, "id" : { "@value" : "doi_________::bffaa22ee4c97423c1326667eb32d531", "@type" : "openaire", "@trustLevel" : "0.68851733" } }, { "@position" : "146", "rawText" : { "$" : "[146] M. C. Rinard. Survival Techniques for Computer Programs. Tech. rep. MIT, 2006." } }, { "@position" : "147", "rawText" : { "$" : "[147] M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, and T. Leu. “A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)”. In: Proceedings of the 20th Annual Computer Security Applications Conference. 2004, pp. 82-90." } }, { "@position" : "148", "rawText" : { "$" : "[148] J. Rohr. “STAREX Self-repair Routines: Software Recovery in the JPL-STAR Computer”. In: Proceedings of FTCS. 1973." } }, { "@position" : "149", "rawText" : { "$" : "[149] R. Samanta, O. Olivo, and E. A. Emerson. “Cost-aware Automatic Program Repair”. In: International static analysis symposium. Springer. 2014, pp. 268-284." } }, { "@position" : "150", "rawText" : { "$" : "[150] H. Samimi, M. Schäfer, S. Artzi, T. D. Millstein, F. Tip, and L. J. Hendren. “Automated Repair of HTML Generation Errors in PHP Applications Using String Constraint Solving”. In: Proceedings of ICSE. 2012, pp. 277-287." } }, { "@position" : "151", "rawText" : { "$" : "[151] E. Schulte, S. Forrest, and W. Weimer. “Automated Program Repair Through the Evolution of Assembly Code”. In: Proceedings of the IEEE/ACM International Conference on Automated Software Engineering. 2010, pp. 313-316." } }, { "@position" : "152", "rawText" : { "$" : "[152] A. Sethi et al. “A Survey of Fault Localization Techniques in Computer Networks”. In: Science of computer programming 53.2 (2004), pp. 165-194." }, "id" : { "@value" : "core_ac_uk__::06fb1e690cfcc685a35abf56d4e29a48", "@type" : "openaire", "@trustLevel" : "0.6542762" } }, { "@position" : "153", "rawText" : { "$" : "[153] A. Shaw, D. Doggett, and M. Hafiz. “Automatically Fixing C Buffer Overflows Using Program Transformations”. In: International Conference on Dependable Systems and Networks. 2014, pp. 124-135." } }, { "@position" : "154", "rawText" : { "$" : "[154] M. Shaw. “Self-healing: Softening Precision to Avoid Brittleness”. In: Proceedings of the First Workshop on Self-healing Systems. 2002, pp. 111-114." } }, { "@position" : "155", "rawText" : { "$" : "[155] S. Sicard, F. Boyer, and N. De Palma. “Using Components for Architecture-based Management: the Self-repair Case”. In: Proceedings of the 30th International Conference on Software Engineering. 2008, pp. 101-110." } }, { "@position" : "156", "rawText" : { "$" : "[156] S. Sidiroglou and A. Keromytis. “Countering Network Worms Through Automatic Patch Generation”. In: Security & privacy 3.6 (2005), pp. 41-49." } }, { "@position" : "157", "rawText" : { "$" : "[157] S. Sidiroglou, O. Laadan, C. Perez, N. Viennot, J. Nieh, and A. Keromytis. “Assure: Automatic Software Self-healing Using Rescue Points”. In: Acm sigplan notices 44.3 (2009), pp. 37-48." } }, { "@position" : "158", "rawText" : { "$" : "[158] S. Sidiroglou, M. Locasto, S. Boyd, and A. Keromytis. “Building a Reactive Immune System for Software Services”. In: Proceedings of the USENIX Annual Technical Conference. Vol. 161. 2005." }, "id" : { "@value" : "doi_________::5d0807395219894b44b9153330b32a0d", "@type" : "openaire", "@trustLevel" : "0.6067748" } }, { "@position" : "159", "rawText" : { "$" : "[159] S. Sidiroglou-Douskos, E. Lahtinen, F. Long, and M. Rinard. “Automatic Error Elimination by Horizontal Code Transfer Across Multiple Applications”. In: Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation. 2015, pp. 43-54." }, "id" : { "@value" : "doi_________::e495eb0ff86f5eb4d9e0e20a871c0e00", "@type" : "openaire", "@trustLevel" : "0.6810099" } }, { "@position" : "160", "rawText" : { "$" : "[160] S. Sidiroglou-Douskos, S. Misailovic, H. Hoffmann, and M. Rinard. “Managing Performance Vs. Accuracy Trade-offs with Loop Perforation”. In: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering. 2011, pp. 124-134." }, "id" : { "@value" : "doi_________::8abf90b4cccb7108a46f60ab0cc9a4d2", "@type" : "openaire", "@trustLevel" : "0.688946" } }, { "@position" : "161", "rawText" : { "$" : "[161] J. Silva. “A Survey on Algorithmic Debugging Strategies”. In: Advances in engineering software 42.11 (2011), pp. 976-991." } }, { "@position" : "162", "rawText" : { "$" : "[162] M. A. A. da Silva, A. Mougenot, X. Blanc, and R. Bendraou. “Towards Automated Inconsistency Handling in Design Models”. In: Proceedings of the 22nd International Conference on Advanced Information Systems Engineering. 2010, pp. 348-362." } }, { "@position" : "163", "rawText" : { "$" : "[163] R. Singh, S. Gulwani, and A. Solar-Lezama. “Automated Feedback Generation for Introductory Programming Assignments”. In: ACM SIGPLAN Notices. Vol. 48. 6. 2013, pp. 15-26." }, "id" : { "@value" : "core_ac_uk__::1ddb459a7dd1dcbd334e1e499aad44a3", "@type" : "openaire", "@trustLevel" : "0.6201375" } }, { "@position" : "164", "rawText" : { "$" : "[164] A. Smirnov and T. Chiueh. “DIRA: Automatic Detection, Identification, and Repair of Control-hijacking Attacks”. In: The 12th Annual Network and Distributed System Security Symposium. 2005." } }, { "@position" : "165", "rawText" : { "$" : "[165] E. K. Smith, E. Barr, C. Le Goues, and Y. Brun. “Is the Cure Worse Than the Disease? Overfitting in Automated Program Repair”. In: Proceedings of the 10th Joint Meeting of the European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE). 2015." } }, { "@position" : "166", "rawText" : { "$" : "[166] A. Somayaji, S. Hofmeyr, and S. Forrest. “Principles of a Computer Immune System”. In: Proceedings of the 1997 Workshop on New Security Paradigms. 1998, pp. 75-82." } }, { "@position" : "167", "rawText" : { "$" : "[167] S. Son, K. S. McKinley, and V. Shmatikov. “Fix Me Up: Repairing Access-Control Bugs in Web Applications.” In: Proceedings of the Network and Distributed System Security Symposium. 2013." } }, { "@position" : "168", "rawText" : { "$" : "[168] H. Sözer, B. Tekinerdoğan, and M. Akşit. “FLORA: a Framework for Decomposing Software Architecture to Introduce Local Recovery”. In: Software: practice and experience 39.10 (2009), pp. 869-889." }, "id" : { "@value" : "dris___02403::8da03926fa2fe2d1661efec2a1289aab", "@type" : "openaire", "@trustLevel" : "0.7063425" } }, { "@position" : "169", "rawText" : { "$" : "[169] M. Staats, M. W. Whalen, and M. P. E. Heimdahl. “Programs, Tests, and Oracles: the Foundations of Testing Revisited”. In: Proceedings of the International Conference on Software Engineering. 2011, pp. 391-400." }, "id" : { "@value" : "od______2658::42c4de37eec902824c6f729b200a4560", "@type" : "openaire", "@trustLevel" : "0.7283477" } }, { "@position" : "170", "rawText" : { "$" : "[170] M. Stumptner and F. Wotawa. “A Model-based Approach to Software Debugging”. In: Proceedings on the Seventh International Workshop on Principles of Diagnosis. 1996." } }, { "@position" : "171", "rawText" : { "$" : "[171] B. Sun, R. Chang, X. Chen, and A. Podgurski. “Automated Support for Propagating Bug Fixes”. In: Proceedings of the International Symposium on Software Reliability Engineering. 2008, pp. 187-196." } }, { "@position" : "172", "rawText" : { "$" : "[172] B. Sun, G. Shu, A. Podgurski, S. Li, S. Zhang, and J. Yang. “Propagating Bug Fixes with Fast Subgraph Matching”. In: Proceedings of the International Symposium on Software Reliability Engineering. 2010, pp. 21-30." } }, { "@position" : "173", "rawText" : { "$" : "[173] G. J. Sussman. Building Robust Systems An Essay. 2007." } }, { "@position" : "174", "rawText" : { "$" : "[174] S. Tallam, C. Tian, R. Gupta, and X. Zhang. “Avoiding Program Failures Through Safe Execution Perturbations”. In: International Conference on Computer Software and Applications. 2008." }, "id" : { "@value" : "doi_________::3379f8dc9a918e60ef40c0beb473885f", "@type" : "openaire", "@trustLevel" : "0.6666087" } }, { "@position" : "175", "rawText" : { "$" : "[175] S. H. Tan and A. Roychoudhury. “Relifix: Automated Repair of Software Regressions”. In: Proceedings of ICSE. 2015." } }, { "@position" : "176", "rawText" : { "$" : "[176] Y. Tao, J. Kim, S. Kim, and C. Xu. “Automatically Generated Patches As Debugging Aids: a Human Study”. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. 2014, pp. 64-74." } }, { "@position" : "177", "rawText" : { "$" : "[177] S. Thomas and L. Williams. “Using Automated Fix Generation to Secure SQL Statements”. In: Proceedings of the Third International Workshop on Software Engineering for Secure Systems. 2007, p. 9." } }, { "@position" : "178", "rawText" : { "$" : "[178] W. Torres-Pomales et al. Software Fault Tolerance: a Tutorial. Tech. rep. NASA2000-tm210616. NASA, 2000." } }, { "@position" : "179", "rawText" : { "$" : "[179] J. Tran, M. Godfrey, E. Lee, and R. Holt. “Architectural Repair of Open Source Software”. In: Proceedings of the International Workshop on Program Comprehension. 2000, pp. 48-59." } }, { "@position" : "180", "rawText" : { "$" : "[180] K. Tsipenyuk, B. Chess, and G. McGraw. “Seven Pernicious Kingdoms: a Taxonomy of Software Security Errors”. In: Security & privacy 3.6 (2005), pp. 81-84." } }, { "@position" : "181", "rawText" : { "$" : "[181] F. Wang and C.-H. Cheng. “Program Repair Suggestions From Graphical StateTransition Specifications”. In: Proceedings of FORTE 2008. 2008." } }, { "@position" : "182", "rawText" : { "$" : "[182] T. Wang, C. Song, and W. Lee. “Diagnosis and Emergency Patch Generation for Integer Overflow Exploits”. In: Detection of Intrusions and Malware, and Vulnerability Assessment. 2014, pp. 255-275." } }, { "@position" : "183", "rawText" : { "$" : "[183] X. Wang, L. Zhang, T. Xie, Y. Xiong, and H. Mei. “Automating presentation changes in dynamic web applications via collaborative hybrid analysis”. In: Proceedings of the acm sigsoft international symposium on the foundations of software engineering. ACM. 2012, p. 16." } }, { "@position" : "184", "rawText" : { "$" : "[184] Y. Wang, Y. Huang, and C. Kintala. “Progressive Retry for Software Failure Recovery in Message-passing Applications”. In: Ieee transactions on computers 46.10 (1997), pp. 1137-1141." } }, { "@position" : "185", "rawText" : { "$" : "[185] Y. Wei, Y. Pei, C. A. Furia, L. S. Silva, S. Buchholz, B. Meyer, and A. Zeller. “Automated Fixing of Programs with Contracts”. In: Proceedings of the International Symposium on Software Testing and Analysis. 2010." } }, { "@position" : "186", "rawText" : { "$" : "[186] W. Weimer, T. Nguyen, C. Le Goues, and S. Forrest. “Automatically Finding Patches Using Genetic Programming”. In: Proceedings of the International Conference on Software Engineering. 2009." } }, { "@position" : "187", "rawText" : { "$" : "[187] W. Weimer. “Patches As Better Bug Reports”. In: Proceedings of the International Conference on Generative Programming and Component Engineering. 2006." } }, { "@position" : "188", "rawText" : { "$" : "[188] W. Weimer, S. Forrest, C. Le Goues, and T. Nguyen. “Automatic Program Repair with Evolutionary Computation”. In: Communications of the acm 53.5 (2010), p. 109." } }, { "@position" : "189", "rawText" : { "$" : "[189] W. Weimer, Z. P. Fry, and S. Forrest. “Leveraging program equivalence for adaptive program repair: models and first results”. In: International conference on automated software engineering. 2013, pp. 356-366." } }, { "@position" : "190", "rawText" : { "$" : "[190] W. Wong and V. Debroy. “A Survey on Software Fault Localization”. In: University of texas at dallas, tech. rep. utdcs-45-09 (2009)." } }, { "@position" : "191", "rawText" : { "$" : "[191] Y. Xiong, Z. Hu, H. Zhao, H. Song, M. Takeichi, and H. Mei. “Supporting Automatic Model Inconsistency Fixing”. In: 7th joint meeting of the european software engineering conference and the acm sigsoft symposium on the foundations of software engineering. ACM. 2009, pp. 315-324." } }, { "@position" : "192", "rawText" : { "$" : "[192] Y. Xiong, H. Zhang, A. Hubaux, S. She, J. Wang, and K. Czarnecki. “Range Fixes: Interactive Error Resolution for Software Configuration”. In: Ieee transactions on software engineering 41.6 (2015), pp. 603-619." } }, { "@position" : "193", "rawText" : { "$" : "[193] A. Zeller, Y. Wei, B. Meyer, M. Nordio, C. A. Furia, and Y. Pei. “Automated Fixing of Programs with Contracts”. In: Ieee transactions on software engineering 40.5 (2014), pp. 427-449." } }, { "@position" : "194", "rawText" : { "$" : "[194] X. Zhang, N. Gupta, and R. Gupta. “Locating Faults Through Automated Predicate Switching”. In: Proceedings of the 28th International Conference on Software Engineering. 2006, pp. 272-281." } }, { "@position" : "195", "rawText" : { "$" : "[195] Y. Zhang and Y. Ding. “CTL Model Update for System Modifications”. In: Journal of artificial intelligence research 31.1 (2008), pp. 113-155." } }, { "@position" : "196", "rawText" : { "$" : "[196] H. Zhong and Z. Su. “An Empirical Study on Real Bug Fixes”. In: Proceedings of the 37th International Conference on Software Engineering. 2015." } }, { "@position" : "197", "rawText" : { "$" : "[197] F. Zhou, J. Condit, Z. Anderson, I. Bagrak, R. Ennals, M. Harren, G. Necula, and E. Brewer. “SafeDrive: Safe and Recoverable Extensions Using Language-based Techniques”. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation. 2006, pp. 45-60." } } ] } }, { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "[1] R. Abraham and M. Erwig. “Goal-Directed Debugging of Spreadsheets”. In: Proceedings of the 2005 IEEE Symposium on Visual Languages and Human-Centric Computing. 2005, pp. 37-44." } }, { "@position" : "2", "rawText" : { "$" : "[2] E. Aftandilian, R. Sauciuc, S. Priya, and S. Krishnan. “Building Useful Program Analysis Tools Using An Extensible Java Compiler”. In: International Working Conference on Source Code Analysis and Manipulation (SCAM). 2012, pp. 14-23." } }, { "@position" : "3", "rawText" : { "$" : "[3] P. E. Ammann and J. C. Knight. “Data Diversity: An Approach to Software Fault Tolerance”. In: Ieee transactions on computers 37.4 (1988), pp. 418-425." } }, { "@position" : "4", "rawText" : { "$" : "[4] J. Andersen and J. L. Lawall. “Generic Patch Inference”. In: Automated software engineering 17.2 (2010), pp. 119-148." }, "id" : { "@value" : "doi_________::61a2268b8ef05235ab26bf7f86a575b8", "@type" : "openaire", "@trustLevel" : "0.6860426" } }, { "@position" : "5", "rawText" : { "$" : "[5] A. Arcuri. “Automatic Software Generation and Improvement Through Search Based Techniques”. PhD thesis. The University of Birmingham, 2009." } }, { "@position" : "6", "rawText" : { "$" : "[6] A. Arcuri. “Evolutionary Repair of Faulty Software”. In: Applied soft computing 11.4 (2011), pp. 3494-3514." } }, { "@position" : "7", "rawText" : { "$" : "[7] A. Arcuri and X. Yao. “A Novel Co-evolutionary Approach to Automatic Software Bug Fixing”. In: Proceedings of the IEEE Congress on Evolutionary Computation. 2008, pp. 162-168." } }, { "@position" : "8", "rawText" : { "$" : "[8] A. Avizienis. “The N-version Approach to Fault-tolerant Software”. In: Ieee transactions on software engineering 11.12 (1985), pp. 1491-1501." }, "id" : { "@value" : "doi_________::cdc8356ee2e21ef9bcac6c9fb2cb0d63", "@type" : "openaire", "@trustLevel" : "0.6642342" } }, { "@position" : "9", "rawText" : { "$" : "[9] A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. “Basic Concepts and Taxonomy of Dependable and Secure Computing”. In: Ieee transactions on dependable and secure computing 1.1 (2004), pp. 11-33." } }, { "@position" : "10", "rawText" : { "$" : "[10] T. Azim, I. Neamtiu, and L. Marvel. “Towards Self-healing Smartphone Software via Automated Patching”. In: Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering. 2014, pp. 623-628." }, "id" : { "@value" : "doi_________::d712ef4e8d4ec5be89f3dcab74866c56", "@type" : "openaire", "@trustLevel" : "0.61199635" } }, { "@position" : "11", "rawText" : { "$" : "[11] E. Barr, M. Harman, P. McMinn, M. Shahbaz, and S. Yoo. “The Oracle Problem in Software Testing: a Survey”. In: Ieee transactions on software engineering 41.5 (2015), pp. 507-525." }, "id" : { "@value" : "od_______322::8a2eb300b73cf67f9060f8acb68f582d", "@type" : "openaire", "@trustLevel" : "0.6956351" } }, { "@position" : "12", "rawText" : { "$" : "[12] E. T. Barr, Y. Brun, P. T. Devanbu, M. Harman, and F. Sarro. “The Plastic Surgery Hypothesis”. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. 2014, pp. 306-317." } }, { "@position" : "13", "rawText" : { "$" : "[13] E. D. Berger and B. G. Zorn. “DieHard: Probabilistic Memory Safety for Unsafe Languages”. In: Acm sigplan notices 41.6 (2006), pp. 158-168." } }, { "@position" : "14", "rawText" : { "$" : "[14] R. Bodik and B. Jobstmann. “Algorithmic Program Synthesis: Introduction”. In: International journal on software tools for technology transfer 15.5 (2013), pp. 397- 411." } }, { "@position" : "15", "rawText" : { "$" : "[15] M. Brodie, S. Ma, G. Lohman, L. Mignet, M. Wilding, J. Champlin, and P. Sohn. “Quickly Finding Known Software Problems via Automated Symptom Matching”. In: Proceedings of the International Conference on Autonomic Computing. 2005, pp. 101-110." } }, { "@position" : "16", "rawText" : { "$" : "[16] Y. Brun, E. Barr, M. Xiao, C. Le Goues, and P. Devanbu. Evolution Vs. Intelligent Design in Program Patching. Tech. rep. UC Davis, 2013." } }, { "@position" : "17", "rawText" : { "$" : "[17] Y. Cai and L. Cao. “Fixing Deadlocks via Lock Pre-acquisitions”. In: Proceedings of the 38th international conference on software engineering. ACM. 2016, pp. 1109- 1120." } }, { "@position" : "18", "rawText" : { "$" : "[18] G. Candea and A. Fox. “Crash-only Software”. In: Proceedings of the 9th Conference on Hot Topics in Operating Systems. 2003, pp. 12-12." } }, { "@position" : "19", "rawText" : { "$" : "[19] G. Candea and A. Fox. “Recursive Restartability: Turning the Reboot Sledgehammer Into a Scalpel”. In: Proceedings of the 8th Workshop on Hot Topics in Operating Systems. 2001, pp. 125-130." } }, { "@position" : "20", "rawText" : { "$" : "[20] G. Candea, E. Kiciman, S. Zhang, P. Keyani, and A. Fox. “JAGR: An Autonomous Self-recovering Application Server”. In: Proceedings of the Workshop on Active Middleware Services. 2003, pp. 168-177." } }, { "@position" : "21", "rawText" : { "$" : "[21] G. Candea, S. Kawamoto, Y. Fujiki, G. Friedman, and A. Fox. “Microreboot: a Technique for Cheap Recovery”. In: Proceedings of the 6th Conference on Symposium on Operating Systems Design & Implementation. 2004, pp. 3-3." } }, { "@position" : "22", "rawText" : { "$" : "[22] M. Carbin, S. Misailovic, M. Kling, and M. C. Rinard. “Detecting and Escaping Infinite Loops with Jolt”. In: Procceedings of ECOOP. 2011, pp. 609-633." }, "id" : { "@value" : "od________88::c094ddae3d97799f82f7b81ed61b428d", "@type" : "openaire", "@trustLevel" : "0.6704617" } }, { "@position" : "23", "rawText" : { "$" : "[23] A. Carzaniga, A. Gorla, A. Mattavelli, N. Perino, and M. Pezzè. “Automatic Recovery From Runtime Failures”. In: Proceedings of the International Conference on Software Engineering. 2013." }, "id" : { "@value" : "erc_________::a644ed3d5d0bf211431055edec3a2edf", "@type" : "openaire", "@trustLevel" : "0.70273936" } }, { "@position" : "24", "rawText" : { "$" : "[24] A. Carzaniga, A. Gorla, N. Perino, and M. Pezzè. “Automatic Workarounds for Web Applications”. In: Proceedings of the Foundations of Software Engineering Conference. 2010, pp. 237-246." }, "id" : { "@value" : "doi_________::3ba8db866f56f3a0e66ac3068786c073", "@type" : "openaire", "@trustLevel" : "0.6666673" } }, { "@position" : "25", "rawText" : { "$" : "[25] S. Chandra, E. Torlak, S. Barman, and R. Bodik. “Angelic Debugging”. In: Proceeding of the International Conference on Software Engineering. 2011, pp. 121-130." } }, { "@position" : "26", "rawText" : { "$" : "[26] S.-W. Cheng, D. Garlan, B. R. Schmerl, J. P. Sousa, B. Spitnagel, and P. Steenkiste. “Using Architectural Style As a Basis for System Self-repair”. In: Proceedings of the IFIP 17th World Computer Congress / 3rd IEEE/IFIP Conference on Software Architecture: System Design, Development and Maintenance. 2002, pp. 45-59." } }, { "@position" : "27", "rawText" : { "$" : "[27] Z. Coker and M. Hafiz. “Program Transformations to Fix C Integers”. In: Proceedings of the International Conference on Software Engineering. 2013, pp. 792-801." } }, { "@position" : "28", "rawText" : { "$" : "[28] B. Cornu, L. Seinturier, and M. Monperrus. “Exception Handling Analysis and Transformation Using Fault Injection: Study of Resilience Against Unanticipated Exceptions”. In: Information and Software Technology 57 (Jan. 2015), pp. 66-76." }, "id" : { "@value" : "doi_________::7f2c9178211b4d9123bf9d0d238d3ea8", "@type" : "openaire", "@trustLevel" : "0.69015485" } }, { "@position" : "29", "rawText" : { "$" : "[29] M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. “Vigilante: End-to-end Containment of Internet Worms”. In: ACM SIGOPS Operating Systems Review. Vol. 39. 5. 2005, pp. 133-147." } }, { "@position" : "30", "rawText" : { "$" : "[30] L. D'Antoni, R. Samanta, and R. Singh. “Qlose: Program Repair with Quantitative Objectives”. In: International conference on computer aided verification. Springer. 2016, pp. 383-401." } }, { "@position" : "31", "rawText" : { "$" : "[31] V. Dallmeier, A. Zeller, and B. Meyer. “Generating Fixes From Object Behavior Anomalies”. In: Proceedings of the International Conference on Automated Software Engineering. 2009." }, "id" : { "@value" : "doi_________::d9ac7ad5a76f49bacb512cbc80e9accc", "@type" : "openaire", "@trustLevel" : "0.64358836" } }, { "@position" : "32", "rawText" : { "$" : "[32] B. Daniel, V. Jagannath, D. Dig, and D. Marinov. “ReAssert: Suggesting Repairs for Broken Unit Tests”. In: Proceedings of the 24th IEEE/ACM International Conference on Automated Software Engineering. 2009, pp. 433-444." } }, { "@position" : "33", "rawText" : { "$" : "[33] V. Debroy and W. Wong. “Using Mutation to Automatically Suggest Fixes for Faulty Programs”. In: Proceedings of the International Conference on Software Testing, Verification and Validation. 2010, pp. 65-74." } }, { "@position" : "34", "rawText" : { "$" : "[34] F. Demarco, J. Xuan, D. Le Berre, and M. Monperrus. “Automatic Repair of Buggy If Conditions and Missing Preconditions with SMT”. In: Proceedings of the 6th International Workshop on Constraints in Software Testing, Verification, and Analysis (CSTVA 2014). Hyderabad, India, 2014." } }, { "@position" : "35", "rawText" : { "$" : "[35] B. Demsky and M. Rinard. “Automatic Detection and Repair of Errors in Data Structures”. In: Acm sigplan notices 38.11 (2003), pp. 78-95." }, "id" : { "@value" : "doi_________::831ce490dd2b26b411d0a3dfad3192c0", "@type" : "openaire", "@trustLevel" : "0.6797866" } }, { "@position" : "36", "rawText" : { "$" : "[36] B. Demsky and A. Dash. “Bristlecone: a Language for Robust Software Systems”. In: Proceedings of ECOOP. 2008, pp. 490-515." }, "id" : { "@value" : "doi_________::3cdeb8c61016145a5f1f9ffded00cf5f", "@type" : "openaire", "@trustLevel" : "0.65308636" } }, { "@position" : "37", "rawText" : { "$" : "[37] G. Denaro, M. Pezzè, and D. Tosi. “Ensuring Interoperable Service-oriented Systems Through Engineered Self-healing”. In: Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. 2009, pp. 253-262." }, "id" : { "@value" : "od______1299::d88b26167c1fc51ae91d2750dec1cb80", "@type" : "openaire", "@trustLevel" : "0.67078865" } }, { "@position" : "38", "rawText" : { "$" : "[38] L. A. Dennis, R. Monroy, and P. Nogueira. “Proof-directed Debugging and Repair”. In: Seventh Symposium on Trends in Functional Programming. 2006, pp. 131-140." } }, { "@position" : "39", "rawText" : { "$" : "[39] A. Dhar, R. Purandare, M. Dhawan, and S. Rangaswamy. “CLOTHO: Saving Programs from Malformed Strings and Incorrect String-handling”. In: Foundations of software engineering. ACM. 2015, pp. 555-566." }, "id" : { "@value" : "doi_________::bb0b5a79cc6ce658c7b653d02eb825ed", "@type" : "openaire", "@trustLevel" : "0.6466234" } }, { "@position" : "40", "rawText" : { "$" : "[40] K. Dobolyi and W. Weimer. “Changing Java's Semantics for Handling Null Pointer Exceptions”. In: 19th International Symposium on Software Reliability Engineering. 2008, pp. 47-56." }, "id" : { "@value" : "doi_________::94c20394972b238b716eaf27a21aa995", "@type" : "openaire", "@trustLevel" : "0.6879837" } }, { "@position" : "41", "rawText" : { "$" : "[41] J. Duraes and H. Madeira. “Emulation of Software Faults: a Field Data Study and a Practical Approach”. In: Ieee transactions on software engineering 32.11 (2006), pp. 849-867." }, "id" : { "@value" : "doi_________::de928d93db7d4cc0a0f10e4a39e7751f", "@type" : "openaire", "@trustLevel" : "0.6419633" } }, { "@position" : "42", "rawText" : { "$" : "[42] M. Eisenstadt. “My Hairiest Bug War Stories”. In: Communications of the acm 40.4 (1997), pp. 30-37." }, "id" : { "@value" : "doi_________::24d27bafdd755a229c6a8f8e46be25e6", "@type" : "openaire", "@trustLevel" : "0.6089758" } }, { "@position" : "43", "rawText" : { "$" : "[43] B. Elkarablieh, I. Garcia, Y. Suen, and S. Khurshid. “Assertion-based Repair of Complex Data Structures”. In: Proceedings of the Twenty-second IEEE/ACM International Conference on Automated Software Engineering. 2007, pp. 64-73." } }, { "@position" : "44", "rawText" : { "$" : "[44] H. ETO and K. Yoda. “Propolice: Improved Stacksmashing Attack Detection”. In: Ipsj sig notes 75 (2001), pp. 181-188." } }, { "@position" : "45", "rawText" : { "$" : "[45] S. Forrest, T. Nguyen, W. Weimer, and C. Le Goues. “A Genetic Programming Approach to Automated Software Repair”. In: Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation. 2009, pp. 947-954." } }, { "@position" : "46", "rawText" : { "$" : "[46] G. Friedrich, M. Fugini, E. Mussi, B. Pernici, and G. Tagni. “Exception Handling for Repair in Service-Based Processes”. In: Ieee transactions on software engineering 36.2 (2010), pp. 198-215." } }, { "@position" : "47", "rawText" : { "$" : "[47] Z. P. Fry, B. Landau, and W. Weimer. “A Human Study of Patch Maintainability”. In: Proceedings of the International Symposium on Software Testing and Analysis. 2012, pp. 177-187." } }, { "@position" : "48", "rawText" : { "$" : "[48] R. P. Gabriel and R. Goldman. “Conscientious Software”. In: Acm Sigplan Notices. Vol. 41. 10. 2006, pp. 433-450." } }, { "@position" : "49", "rawText" : { "$" : "[49] Q. Gao, Y. Xiong, Y. Mi, L. Zhang, W. Yang, Z. Zhou, B. Xie, and H. Mei. “Safe Memory-leak Fixing for C Programs”. In: Proceedings of the 37th International Conference on Software Engineering. 2015, pp. 459-470." } }, { "@position" : "50", "rawText" : { "$" : "[50] Q. Gao, H. Zhang, J. Wang, Y. Xiong, L. Zhang, and H. Mei. “Fixing Recurring Crash Bugs via Analyzing Q&A Sites”. In: Proceedings of the 30th ieee/acm international conference on automated software engineering. ACM, 2015." } }, { "@position" : "51", "rawText" : { "$" : "[51] Z. Gao, Z. Chen, Y. Zou, and A. Memon. “SITAR: GUI Test Script Repair”. In: Ieee transactions on software engineering (2015)." } }, { "@position" : "52", "rawText" : { "$" : "[52] D. Garlan, S.-W. Cheng, and B. Schmerl. “Increasing System Dependability Through Architecture-based Self-repair”. In: Architecting Dependable Systems. 2003, pp. 61- 89." }, "id" : { "@value" : "doi_________::d85625277be9d18e919bcb5b0e882cce", "@type" : "openaire", "@trustLevel" : "0.6333976" } }, { "@position" : "53", "rawText" : { "$" : "[53] B. J. Garvin, M. B. Cohen, and M. B. Dwyer. “Using Feature Locality: Can We Leverage History to Avoid Failures During Reconfiguration?” In: Proceedings of the 8th Workshop on Assurances for Self-adaptive Systems. 2011, pp. 24-33." } }, { "@position" : "54", "rawText" : { "$" : "[54] S. George, D. Evans, and S. Marchette. “A Biological Programming Model for SelfHealing”. In: Proceedings of SSRS. 2013." } }, { "@position" : "55", "rawText" : { "$" : "[55] D. Ghosh, R. Sharman, H. Raghav Rao, and S. Upadhyaya. “Self-healing Systems-survey and Synthesis”. In: Decision support systems 42.4 (2007), pp. 2164- 2185." } }, { "@position" : "56", "rawText" : { "$" : "[56] D. Gopinath, S. Khurshid, D. Saha, and S. Chandra. “Data-guided Repair of Selection Statements”. In: Proceedings of the 36th International Conference on Software Engineering. 2014, pp. 243-253." } }, { "@position" : "57", "rawText" : { "$" : "[57] D. Gopinath, M. Z. Malik, and S. Khurshid. “Specification-based Program Repair Using SAT”. In: Proceedings of the International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 2011." } }, { "@position" : "58", "rawText" : { "$" : "[58] A. Griesmayer, R. Bloem, and B. Cook. “Repair of Boolean Programs with An Application to C”. In: Computer Aided Verification. 2006, pp. 358-371." }, "id" : { "@value" : "doi_________::548cdecf229ac417a54d97bd6927711e", "@type" : "openaire", "@trustLevel" : "0.6535551" } }, { "@position" : "59", "rawText" : { "$" : "[59] R. Gupta, S. Pal, A. Kanade, and S. Shevade. “DeepFix: Fixing Common C Language Errors by Deep Learning”. In: Proceedings of the aaai conference on artificial intelligence. 2017." } }, { "@position" : "60", "rawText" : { "$" : "[60] B. Hartmann, D. MacDougall, J. Brandt, and S. R. Klemmer. “What Would Other Programmers Do: Suggesting Solutions to Error Messages”. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 2010, pp. 1019-1028." } }, { "@position" : "61", "rawText" : { "$" : "[61] H. He and N. Gupta. “Automated Debugging Using Path-Based Weakest Preconditions”. In: FASE. 2004, pp. 267-280." } }, { "@position" : "62", "rawText" : { "$" : "[62] P. Hosek and C. Cadar. “Safe Software Updates via Multi-version Execution”. In: Proceedings of the International Conference on Software Engineering. 2013, pp. 612- 621." }, "id" : { "@value" : "doi_________::95023b71791957385eba9b2bc7b6b0e5", "@type" : "openaire", "@trustLevel" : "0.77703565" } }, { "@position" : "63", "rawText" : { "$" : "[63] D. Hovemeyer and W. Pugh. “Finding Bugs Is Easy”. In: Acm sigplan notices 39.12 (2004)." }, "id" : { "@value" : "doi_________::98bdf4bc886d9538280ce8467742014f", "@type" : "openaire", "@trustLevel" : "0.68069535" } }, { "@position" : "64", "rawText" : { "$" : "[64] Y. Huang, C. Kintala, N. Kolettis, and N. Fulton. “Software Rejuvenation: Analysis, Module and Applications”. In: Proceedings of the International Symposium on FaultTolerant Computing. 1995, pp. 381-390." } }, { "@position" : "65", "rawText" : { "$" : "[65] D. Jackson and M. Vaziri. “Finding Bugs with a Constraint Solver”. In: Proceedings of the 2000 ACM SIGSOFT International Symposium on Software Testing and Analysis. 2000, pp. 14-25." } }, { "@position" : "66", "rawText" : { "$" : "[66] D. Jeffrey, M. Feng, N. Gupta, and R. Gupta. “BugFix: a Learning-based Tool to Assist Developers in Fixing Bugs”. In: ICPC. 2009, pp. 70-79." } }, { "@position" : "67", "rawText" : { "$" : "[67] D. Jeffrey, N. Gupta, and R. Gupta. “Fault Localization Using Value Replacement”. In: Proceedings of the International Symposium on Software Testing and Analysis. 2008, pp. 167-178." } }, { "@position" : "68", "rawText" : { "$" : "[68] S. Jha, S. Gulwani, S. A. Seshia, and A. Tiwari. “Oracle-guided Component-based Program Synthesis”. In: Proceedings of the International Conference on Software Engineering. Vol. 1. 2010, pp. 215-224." } }, { "@position" : "69", "rawText" : { "$" : "[69] M. Jiang, T. Y. Chen, F.-C. Kuo, D. Towey, and Z. Ding. “A Metamorphic Testing Approach for Supporting Program Repair without the Need for a Test Oracle”. In: Journal of systems and software (2016)." } }, { "@position" : "70", "rawText" : { "$" : "[70] G. Jin, L. Song, W. Zhang, S. Lu, and B. Liblit. “Automated Atomicity-violation Fixing”. In: Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation. 2011, pp. 389-400." } }, { "@position" : "71", "rawText" : { "$" : "[71] B. Jobstmann, A. Griesmayer, and R. Bloem. “Program Repair As a Game”. In: Computer Aided Verification. 2005, pp. 226-238." }, "id" : { "@value" : "c2b0b933574d::fbadc2a0228cc04ee6c81e36fefaae33", "@type" : "openaire", "@trustLevel" : "0.68398625" } }, { "@position" : "72", "rawText" : { "$" : "[72] H. Jula, D. Tralamazza, C. Zamfir, and G. Candea. “Deadlock Immunity: Enabling Systems to Defend Against Deadlocks”. In: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation. 2008, pp. 295-308." }, "id" : { "@value" : "snsf_p3_pubs::fb0b54b74e1cbedb111b95a531c14cf1", "@type" : "openaire", "@trustLevel" : "0.60978603" } }, { "@position" : "73", "rawText" : { "$" : "[73] S. Kaleeswaran, V. Tulsian, A. Kanade, and A. Orso. “Minthint: Automated Synthesis of Repair Hints”. In: Proceedings of the International Conference on Software Engineering. 2014, pp. 266-276." } }, { "@position" : "74", "rawText" : { "$" : "[74] S. Kalvala and R. Warburton. “A Formal Approach to Fixing Bugs”. In: Formal Methods, Foundations and Applications. 2011, pp. 172-187." }, "id" : { "@value" : "doi_________::d00dd2d207fdd41a5344650907ff0c85", "@type" : "openaire", "@trustLevel" : "0.67734885" } }, { "@position" : "75", "rawText" : { "$" : "[75] A. Kalyanpur, B. Parsia, E. Sirin, and B. Cuenca-Grau. “Repairing Unsatisfiable Concepts in OWL Ontologies”. In: The Semantic Web: Research and Applications. Vol. 4011. 2006, pp. 170-184." }, "id" : { "@value" : "dris___01025::c7c5bc96ddfd02c346496e368c8db542", "@type" : "openaire", "@trustLevel" : "0.66630703" } }, { "@position" : "76", "rawText" : { "$" : "[76] M. Kasbekar, C. Narayanan, and C. Das. “Selective Checkpointing and Rollbacks in Multi-threaded Object-oriented Environment”. In: Ieee transactions on reliability 48.4 (1999), pp. 325-337." } }, { "@position" : "77", "rawText" : { "$" : "[77] Y. Ke, K. T. Stolee, C. Le Goues, and Y. Brun. “Repairing Programs with Semantic Code Search”. In: Proceedings of the International Conference on Automated Software Engineering. 2015." } }, { "@position" : "78", "rawText" : { "$" : "[78] C. Kern and J. Esparza. “Automatic Error Correction of Java Programs”. In: Formal Methods for Industrial Critical Systems. 2010, pp. 67-81." } }, { "@position" : "79", "rawText" : { "$" : "[79] D. Kim, J. Nam, J. Song, and S. Kim. “Automatic Patch Generation Learned From Human-Written Patches”. In: Proceedings of ICSE. 2013." } }, { "@position" : "80", "rawText" : { "$" : "[80] E. Kneuss, M. Koukoutos, and V. Kuncak. “Deductive Program Repair”. In: International conference on computer aided verification. Springer. 2015, pp. 217-233." }, "id" : { "@value" : "doi_________::b9fabffd1bc6c55238a566f0d289f01c", "@type" : "openaire", "@trustLevel" : "0.6627885" } }, { "@position" : "81", "rawText" : { "$" : "[81] D. E. Knuth. “The Errors of TEX”. In: Softw., pract. exper. 19.7 (1989), pp. 607-685." } }, { "@position" : "82", "rawText" : { "$" : "[82] X. Kong, L. Zhang, W. E. Wong, and B. Li. “Experience report: how do techniques, programs, and tests impact automated program repair?” In: International symposium on software reliability engineering. IEEE. 2015, pp. 194-204." } }, { "@position" : "83", "rawText" : { "$" : "[83] R. Könighofer and R. Bloem. “Automated Error Localization and Correction for Imperative Programs”. In: Formal Methods in Computer-Aided Design (FMCAD), 2011. 2011, pp. 91-100." } }, { "@position" : "84", "rawText" : { "$" : "[84] R. Könighofer and R. Bloem. “Repair with On-the-fly Program Analysis”. In: Hardware and Software: Verification and Testing. 2013, pp. 56-71." }, "id" : { "@value" : "doi_________::436a81a296b9e029d48a820dfd54516b", "@type" : "openaire", "@trustLevel" : "0.6695329" } }, { "@position" : "85", "rawText" : { "$" : "[85] R. Koo and S. Toueg. “Checkpointing and Rollback-recovery for Distributed Systems”. In: Ieee transactions on software engineering 1 (1987), pp. 23-31." } }, { "@position" : "86", "rawText" : { "$" : "[86] M. Lake. Epic Failures: 11 Infamous Software Bugs. http://www.computerworld. com/article/2515483/enterprise- applications/epic- failures-- 11- infamous- softwarebugs.html. 2010." } }, { "@position" : "87", "rawText" : { "$" : "[87] S. Lamelas and M. Monperrus. Automatic Repair of Infinite Loops. Technical Report hal-01144026. University of Lille, 2015." }, "id" : { "@value" : "od______4254::ee2a07f66a42e1ac390285d653661004", "@type" : "openaire", "@trustLevel" : "0.6853216" } }, { "@position" : "88", "rawText" : { "$" : "[88] J. L. Lawall, J. Brunel, N. Palix, R. R. Hansen, H. Stuart, and G. Muller. “WYSIWIB: a Declarative Approach to Finding API Protocols and Bugs in Linux Code”. In: International Conference on Dependable Systems & Networks. 2009, pp. 43-52." } }, { "@position" : "89", "rawText" : { "$" : "[89] N. Lazaar, A. Gotlieb, and Y. Lebbah. “A Framework for the Automatic Correction of Constraint Programs”. In: Proceedings of the International Conference on Software Testing, Verification and Validation. 2011, pp. 319-326." }, "id" : { "@value" : "doi_________::01f4566cd3c811cf918e796095b98159", "@type" : "openaire", "@trustLevel" : "0.67730725" } }, { "@position" : "90", "rawText" : { "$" : "[90] C. Le Goues, M. Dewey-Vogt, S. Forrest, and W. Weimer. “A Systematic Study of Automated Program Repair: Fixing 55 Out of 105 Bugs for $8 Each”. In: Proceedings of the International Conference on Software Engineering. 2012, pp. 3-13." } }, { "@position" : "91", "rawText" : { "$" : "[91] C. Le Goues, S. Forrest, and W. Weimer. “Current Challenges in Automatic Software Repair”. In: Software quality journal 21.3 (2013), pp. 421-443." }, "id" : { "@value" : "doi_________::9bc22c7f896fc815d34331fc8ca130ad", "@type" : "openaire", "@trustLevel" : "0.6842719" } }, { "@position" : "92", "rawText" : { "$" : "[92] C. Le Goues, N. Holtschulte, E. K. Smith, Y. Brun, P. Devanbu, S. Forrest, and W. Weimer. “The ManyBugs and IntroClass Benchmarks for Automated Repair of C Programs”. In: Ieee transactions on software engineering (tse), in press (2015)." }, "id" : { "@value" : "doi_________::cf3f3afaded86d7d82fb50ca40925607", "@type" : "openaire", "@trustLevel" : "0.62086505" } }, { "@position" : "93", "rawText" : { "$" : "[93] C. Le Goues, T. Nguyen, S. Forrest, and W. Weimer. “GenProg: a Generic Method for Automatic Software Repair”. In: Ieee transactions on software engineering 38 (2012), pp. 54-72." } }, { "@position" : "94", "rawText" : { "$" : "[94] X. B. D. Le, D. Lo, and C. L. Goues. “History Driven Program Repair”. In: Proceedings of the 23rd international conference on software analysis, evolution, and reengineering (saner). 2016, pp. 213-224." } }, { "@position" : "95", "rawText" : { "$" : "[95] M. Leotta, D. Clerissi, F. Ricca, and C. Spadaro. “Repairing Selenium Test Cases: an Industrial Case Study about Web Page Element Localization”. In: International conference on software testing, verification and validation. IEEE. 2013, pp. 487-488." }, "id" : { "@value" : "doi_________::80d6db949a21f0405a94330ae97a5028", "@type" : "openaire", "@trustLevel" : "0.67532986" } }, { "@position" : "96", "rawText" : { "$" : "[96] R. Levinson. “Unified Planning and Execution for Autonomous Software Repair”. In: Workshop on Plan Execution: a Reality Check. 2005." } }, { "@position" : "97", "rawText" : { "$" : "[97] C. Lewis and J. Whitehead. “Runtime Repair of Software Faults Using Event-driven Monitoring”. In: Proceedings of the 32nd acm/ieee international conference on software engineering - icse '10 2 (2010), p. 275." } }, { "@position" : "98", "rawText" : { "$" : "[98] Z. Liang and R. Sekar. “Fast and Automated Generation of Attack Signatures: a Basis for Building Self-protecting Servers”. In: Proceedings of the 12th ACM Conference on Computer and Communications Security. 2005, pp. 213-222." }, "id" : { "@value" : "doi_________::8f8b11d6ced6a501e5c5c8cc0f889f06", "@type" : "openaire", "@trustLevel" : "0.6710854" } }, { "@position" : "99", "rawText" : { "$" : "[99] Y. Lin and S. Kulkarni. “Automatic Repair for Multi-threaded Programs with Deadlock/Livelock Using Maximum Satisfiability”. In: Proceedings of the 2014 international symposium on software testing and analysis. ACM. 2014, pp. 237-247." } }, { "@position" : "100", "rawText" : { "$" : "[100] Z. Lin, X. Jiang, D. Xu, B. Mao, and L. Xie. “AutoPaG: Towards Automated Software Patch Generation with Source Code Root Cause Identification and Repair”. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. 2007, pp. 329-340." } }, { "@position" : "101", "rawText" : { "$" : "[101] C. Liu, J. Yang, L. Tan, and M. Hafiz. “R2Fix: Automatically Generating Bug Fixes From Bug Reports”. In: Proceedings of the International Conference on Software Testing, Verification and Validation (ICST). 2013, pp. 282-291." } }, { "@position" : "102", "rawText" : { "$" : "[102] H. Liu, Y. Chen, and S. Lu. “Understanding and Generating High Quality Patches for Concurrency bugs”. In: Proceedings of the 2016 24th acm sigsoft international symposium on foundations of software engineering. ACM. 2016, pp. 715-726." } }, { "@position" : "103", "rawText" : { "$" : "[103] P. Liu and C. Zhang. “Axis: Automatically Fixing Atomicity Violations Through Solving Control Constraints”. In: Proceedings of the 2012 International Conference on Software Engineering. 2012, pp. 299-309." } }, { "@position" : "104", "rawText" : { "$" : "[104] M. E. Locasto, S. Sidiroglou, and A. D. Keromytis. “Software Self-Healing Using Collaborative Application Communities”. In: Proceedings of the Network and Distributed System Security Symposium. 2006." }, "id" : { "@value" : "doi_________::6e539f0301aa67945ea78037c50f8cac", "@type" : "openaire", "@trustLevel" : "0.6636007" } }, { "@position" : "105", "rawText" : { "$" : "[105] F. Logozzo and T. Ball. “Modular and Verified Automatic Program Repair”. In: Proceedings of the 27th ACM International Conference on Object Oriented Programming Systems Languages and Applications. 2012." }, "id" : { "@value" : "doi_________::d4c79c47b10fe4a7677a642634719536", "@type" : "openaire", "@trustLevel" : "0.6743879" } }, { "@position" : "106", "rawText" : { "$" : "[106] F. Logozzo and M. Martel. “Automatic Repair of Overflowing Expressions with Abstract Interpretation”. In: Semantics, Abstract Interpretation, and Reasoning About Programs: Essays Dedicated to David A. Schmidt on the Occasion of His Sixtieth Birthday. Vol. 129. 2013, pp. 341-357." }, "id" : { "@value" : "arXiv_______::5e5896e3999c1c0a6190974d22f9694a", "@type" : "openaire", "@trustLevel" : "0.73015213" } }, { "@position" : "107", "rawText" : { "$" : "[107] F. Long, V. Ganesh, M. Carbin, S. Sidiroglou, and M. Rinard. “Automatic Input Rectification”. In: Proceedings of ICSE. 2012." } }, { "@position" : "108", "rawText" : { "$" : "[108] F. Long and M. C. Rinard. “Prophet: Automatic Patch Generation via Learning From Successful Patches”. In: Proceedings of the Symposium on Principles of Programming Languages. 2016." } }, { "@position" : "109", "rawText" : { "$" : "[109] F. Long and M. C. Rinard. “Staged Program Repair with Condition Synthesis”. In: Proceedings of ESEC/FSE. 2015." } }, { "@position" : "110", "rawText" : { "$" : "[110] F. Long, S. Sidiroglou-Douskos, D. Kim, and M. Rinard. “Sound Input Filter Generation for Integer Overflow Errors”. In: Acm sigplan notices 49.1 (2014), pp. 439- 452." } }, { "@position" : "111", "rawText" : { "$" : "[111] F. Long, S. Sidiroglou-Douskos, and M. C. Rinard. “Automatic Runtime Error Repair and Containment via Recovery Shepherding”. In: ACM SIGPLAN Conference on Programming Language Design and Implementation. 2014." }, "id" : { "@value" : "od________88::0be88c19cf018a64e73bc16f959a0eba", "@type" : "openaire", "@trustLevel" : "0.6835259" } }, { "@position" : "112", "rawText" : { "$" : "[112] M. Malik, J. Siddiqi, and S. Khurshid. “Constraint-Based Program Debugging Using Data Structure Repair”. In: International Conference on Software Testing, Verification and Validation (ICST). 2011, pp. 190-199." } }, { "@position" : "113", "rawText" : { "$" : "[113] M. Martinez, T. Durieux, R. Sommerard, J. Xuan, and M. Monperrus. “Automatic Repair of Real Bugs in Java: A Large-Scale Experiment on the Defects4J Dataset”. In: Empirical Software Engineering 22.4 (2017), pp. 1936-1964." }, "id" : { "@value" : "od______4254::dc65421c6a852c7f73e37b6357446a33", "@type" : "openaire", "@trustLevel" : "0.7200749" } }, { "@position" : "114", "rawText" : { "$" : "[114] M. Martinez and M. Monperrus. “Mining Software Repair Models for Reasoning on the Search Space of Automated Program Fixing”. In: Empirical Software Engineering 20.1 (2015), pp. 176-205." } }, { "@position" : "115", "rawText" : { "$" : "[115] M. Martinez, W. Weimer, and M. Monperrus. “Do the Fix Ingredients Already Exist? An Empirical Inquiry into the Redundancy Assumptions of Program Repair Approaches”. In: ICSE - 36th IEEE International Conference on Software Engineering. Hyderabad, India, June 2014." } }, { "@position" : "116", "rawText" : { "$" : "[116] S. Mechtaev, J. Yi, and A. Roychoudhury. “Angelix: Scalable Multiline Program Patch Synthesis via Symbolic Analysis”. In: Proceedings of the 38th international conference on software engineering. 2016, pp. 691-701." } }, { "@position" : "117", "rawText" : { "$" : "[117] S. Mechtaev, J. Yi, and A. Roychoudhury. “DirectFix: Looking for Simple Program Repairs”. In: Proceedings of the 37th International Conference on Software Engineering. 2015." } }, { "@position" : "118", "rawText" : { "$" : "[118] I. Medeiros, N. F. Neves, and M. Correia. “Automatic detection and correction of web application vulnerabilities using data mining to predict false positives”. In: Proceedings of the 23rd international conference on world wide web. ACM. 2014, pp. 63- 74." } }, { "@position" : "119", "rawText" : { "$" : "[119] A. M. Memon. “Automatically Repairing Event Sequence-based GUI Test Suites for Regression Testing”. In: Acm transactions on software engineering and methodology 18.2 (2008), p. 4." } }, { "@position" : "120", "rawText" : { "$" : "[120] N. Meng, M. Kim, and K. S. McKinley. “LASE: Locating and Applying Systematic Edits by Learning From Examples”. In: Proceedings of the International Conference on Software Engineering. 2013, pp. 502-511." } }, { "@position" : "121", "rawText" : { "$" : "[121] N. Meng, M. Kim, and K. S. McKinley. “Systematic Editing: Generating Program Transformations From An Example”. In: Proceedings of the 32Nd ACM SIGPLAN Conference on Programming Language Design and Implementation. 2011, pp. 329- 342." } }, { "@position" : "122", "rawText" : { "$" : "[122] M. G. Merideth. “Enhancing Survivability with Proactive Fault-containment”. In: The 2003 International Conference on Dependable Systems and Networks. 2003." } }, { "@position" : "123", "rawText" : { "$" : "[123] B. Meyer. “Applying 'design by Contract'”. In: Computer 25.10 (1992), pp. 40-51." } }, { "@position" : "124", "rawText" : { "$" : "[124] M. Monperrus. “A Critical Review of ”Automatic Patch Generation Learned from Human-Written Patches”: Essay on the Problem Statement and the Evaluation of Automatic Software Repair”. In: International Conference on Software Engineering. Hyderabad, India, 2014, pp. 234-242." }, "id" : { "@value" : "inria2______::8a02d9f0b27d01a6be15d5b3a0c0fbec", "@type" : "openaire", "@trustLevel" : "0.6732154" } }, { "@position" : "125", "rawText" : { "$" : "[125] M. Monperrus. “Principles of Antifragile Software”. In: Proceedings of the Salon des Refusés 2017. Brussels, Belgium, 2017." }, "id" : { "@value" : "doi_________::ae7791b0a5a8377dd822b3ab58ba52ed", "@type" : "openaire", "@trustLevel" : "0.7049398" } }, { "@position" : "126", "rawText" : { "$" : "[126] P. Muntean, V. K. Kommanapalli, A. Ibing, and C. Eckert. “Automated Generation of Buffer Overflows Quick Fixes Using Symbolic Execution and SMT”. In: International Conference on Computer Safety, Reliability & Security (SAFECOMP'15). 2015." } }, { "@position" : "127", "rawText" : { "$" : "[127] C. Nentwich, W. Emmerich, and A. Finkelstein. “Consistency Management with Repair Actions”. In: Proceedings of the 25th International Conference on Software Engineering. 2003, pp. 455-464." } }, { "@position" : "128", "rawText" : { "$" : "[128] H. D. T. Nguyen, D. Qi, A. Roychoudhury, and S. Chandra. “SemFix: Program Repair via Semantic Analysis”. In: Proceedings of the International Conference on Software Engineering. 2013." } }, { "@position" : "129", "rawText" : { "$" : "[129] H. H. Nguyen and M. Rinard. “Detecting and Eliminating Memory Leaks Using Cyclic Memory Allocation”. In: Proceedings of the 6th International Symposium on Memory Management. 2007, pp. 15-30." } }, { "@position" : "130", "rawText" : { "$" : "[130] M. Nica, S. Nica, and F. Wotawa. “On the Use of Mutations and Testing for Debugging”. In: Software: practice and experience 43.9 (2013), pp. 1121-1142." } }, { "@position" : "131", "rawText" : { "$" : "[131] G. Novark, E. Berger, and B. Zorn. “Exterminator: Automatically Correcting Memory Errors with High Probability”. In: Acm sigplan notices 42.6 (2007), pp. 1-11." } }, { "@position" : "132", "rawText" : { "$" : "[132] V. Oliveira, E. Souza, C. Le Goues, and C. G. Camilo. “Improved Crossover Operators for Genetic Programming for Program Repair”. In: Proceedings of the 8th international symposium on search based software engineering. 2016." } }, { "@position" : "133", "rawText" : { "$" : "[133] Y. Padioleau, J. Lawall, R. Hansen, and G. Muller. “Documenting and Automating Collateral Evolutions in Linux Device Drivers”. In: Acm sigops operating systems review 42.4 (2008), pp. 247-260." } }, { "@position" : "134", "rawText" : { "$" : "[134] J. H. Perkins, G. Sullivan, W.-F. Wong, Y. Zibin, M. D. Ernst, M. Rinard, S. Kim, S. Larsen, S. Amarasinghe, J. Bachrach, M. Carbin, C. Pacheco, F. Sherwood, and S. Sidiroglou. “Automatically Patching Errors in Deployed Software”. In: Proceedings of the Symposium on Operating Systems Principles (2009), p. 87." } }, { "@position" : "135", "rawText" : { "$" : "[135] B. Pernici and A. M. Rosati. “Automatic Learning of Repair Strategies for Web Services”. In: Proceedings of the Fifth European Conference on Web Services. 2007, pp. 119-128." }, "id" : { "@value" : "doi_________::2d71ded40760d2ffa471bd4ef19231bf", "@type" : "openaire", "@trustLevel" : "0.6622441" } }, { "@position" : "136", "rawText" : { "$" : "[136] M. Pezzè, M. C. Rinard, W. Weimer, and A. Zeller. Self-Repairing Programs, Report From Dagstuhl Seminar. Tech. rep. 11062. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2011." } }, { "@position" : "137", "rawText" : { "$" : "[137] Y. Qi, X. Mao, and Y. Lei. “Efficient Automated Program Repair Through FaultRecorded Testing Prioritization”. In: Proceedings of ICSM. 2013." } }, { "@position" : "138", "rawText" : { "$" : "[138] Y. Qi, X. Mao, and Y. Lei. “Program Repair As Sound Optimization of Broken Programs”. In: International Symposium on Theoretical Aspects of Software Engineering. 2009." } }, { "@position" : "139", "rawText" : { "$" : "[139] Y. Qi, X. Mao, Y. Lei, Z. Dai, and C. Wang. “The Strength of Random Search on Automated Program Repair”. In: Proceedings of the 36th International Conference on Software Engineering. 2014, pp. 254-265." } }, { "@position" : "140", "rawText" : { "$" : "[140] Z. Qi, F. Long, S. Achour, and M. Rinard. “An Analysis of Patch Plausibility and Correctness for Generate-And-Validate Patch Generation Systems”. In: Proceedings of ISSTA. 2015." } }, { "@position" : "141", "rawText" : { "$" : "[141] F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou. “Rx: Treating Bugs As Allergies-a Safe Method to Survive Software Failures”. In: Acm sigops operating systems review 39.5 (2005), pp. 235-248." } }, { "@position" : "142", "rawText" : { "$" : "[142] B. Randell. “System Structure for Software Fault Tolerance”. In: Ieee transactions on software engineering 2 (1975), pp. 220-232." }, "id" : { "@value" : "doi_________::265e575335f9998cf7b95357b2904db2", "@type" : "openaire", "@trustLevel" : "0.7009199" } }, { "@position" : "143", "rawText" : { "$" : "[143] M. Rinard, C. Cadar, D. Dumitran, D. Roy, T. Leu, and W. Beebee Jr. “Enhancing Server Availability and Security Through Failure-oblivious Computing”. In: Proceedings of the 6th Conference on Symposium on Operating Systems, Design & Implementation. 2004, pp. 21-21." } }, { "@position" : "144", "rawText" : { "$" : "[144] M. Rinard, M. Ernst, and J. Perkins. Collaborative Learning for Security and Repair in Application Communities. Tech. rep. Massachusetts Institute of Technology, 2011." } }, { "@position" : "145", "rawText" : { "$" : "[145] M. Rinard. “Acceptability-oriented Computing”. In: Acm sigplan notices 38.12 (2003), pp. 57-75." }, "id" : { "@value" : "doi_________::bffaa22ee4c97423c1326667eb32d531", "@type" : "openaire", "@trustLevel" : "0.68851733" } }, { "@position" : "146", "rawText" : { "$" : "[146] M. C. Rinard. Survival Techniques for Computer Programs. Tech. rep. MIT, 2006." } }, { "@position" : "147", "rawText" : { "$" : "[147] M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, and T. Leu. “A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)”. In: Proceedings of the 20th Annual Computer Security Applications Conference. 2004, pp. 82-90." } }, { "@position" : "148", "rawText" : { "$" : "[148] J. Rohr. “STAREX Self-repair Routines: Software Recovery in the JPL-STAR Computer”. In: Proceedings of FTCS. 1973." } }, { "@position" : "149", "rawText" : { "$" : "[149] R. Samanta, O. Olivo, and E. A. Emerson. “Cost-aware Automatic Program Repair”. In: International static analysis symposium. Springer. 2014, pp. 268-284." } }, { "@position" : "150", "rawText" : { "$" : "[150] H. Samimi, M. Schäfer, S. Artzi, T. D. Millstein, F. Tip, and L. J. Hendren. “Automated Repair of HTML Generation Errors in PHP Applications Using String Constraint Solving”. In: Proceedings of ICSE. 2012, pp. 277-287." } }, { "@position" : "151", "rawText" : { "$" : "[151] E. Schulte, S. Forrest, and W. Weimer. “Automated Program Repair Through the Evolution of Assembly Code”. In: Proceedings of the IEEE/ACM International Conference on Automated Software Engineering. 2010, pp. 313-316." } }, { "@position" : "152", "rawText" : { "$" : "[152] A. Sethi et al. “A Survey of Fault Localization Techniques in Computer Networks”. In: Science of computer programming 53.2 (2004), pp. 165-194." }, "id" : { "@value" : "core_ac_uk__::06fb1e690cfcc685a35abf56d4e29a48", "@type" : "openaire", "@trustLevel" : "0.6542762" } }, { "@position" : "153", "rawText" : { "$" : "[153] A. Shaw, D. Doggett, and M. Hafiz. “Automatically Fixing C Buffer Overflows Using Program Transformations”. In: International Conference on Dependable Systems and Networks. 2014, pp. 124-135." } }, { "@position" : "154", "rawText" : { "$" : "[154] M. Shaw. “Self-healing: Softening Precision to Avoid Brittleness”. In: Proceedings of the First Workshop on Self-healing Systems. 2002, pp. 111-114." } }, { "@position" : "155", "rawText" : { "$" : "[155] S. Sicard, F. Boyer, and N. De Palma. “Using Components for Architecture-based Management: the Self-repair Case”. In: Proceedings of the 30th International Conference on Software Engineering. 2008, pp. 101-110." }, "id" : { "@value" : "doi_________::af483ea4528178bb1be30995589415b6", "@type" : "openaire", "@trustLevel" : "0.64197457" } }, { "@position" : "156", "rawText" : { "$" : "[156] S. Sidiroglou-Douskos, E. Lahtinen, F. Long, and M. Rinard. “Automatic Error Elimination by Horizontal Code Transfer Across Multiple Applications”. In: Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation. 2015, pp. 43-54." }, "id" : { "@value" : "doi_________::e495eb0ff86f5eb4d9e0e20a871c0e00", "@type" : "openaire", "@trustLevel" : "0.6810099" } }, { "@position" : "157", "rawText" : { "$" : "[157] S. Sidiroglou-Douskos, S. Misailovic, H. Hoffmann, and M. Rinard. “Managing Performance Vs. Accuracy Trade-offs with Loop Perforation”. In: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering. 2011, pp. 124-134." } }, { "@position" : "158", "rawText" : { "$" : "[158] S. Sidiroglou and A. Keromytis. “Countering Network Worms Through Automatic Patch Generation”. In: Security & privacy 3.6 (2005), pp. 41-49." } }, { "@position" : "159", "rawText" : { "$" : "[159] S. Sidiroglou, O. Laadan, C. Perez, N. Viennot, J. Nieh, and A. Keromytis. “Assure: Automatic Software Self-healing Using Rescue Points”. In: Acm sigplan notices 44.3 (2009), pp. 37-48." } }, { "@position" : "160", "rawText" : { "$" : "[160] S. Sidiroglou, M. Locasto, S. Boyd, and A. Keromytis. “Building a Reactive Immune System for Software Services”. In: Proceedings of the USENIX Annual Technical Conference. Vol. 161. 2005." }, "id" : { "@value" : "doi_________::5d0807395219894b44b9153330b32a0d", "@type" : "openaire", "@trustLevel" : "0.6067748" } }, { "@position" : "161", "rawText" : { "$" : "[161] J. Silva. “A Survey on Algorithmic Debugging Strategies”. In: Advances in engineering software 42.11 (2011), pp. 976-991." } }, { "@position" : "162", "rawText" : { "$" : "[162] M. A. A. da Silva, A. Mougenot, X. Blanc, and R. Bendraou. “Towards Automated Inconsistency Handling in Design Models”. In: Proceedings of the 22nd International Conference on Advanced Information Systems Engineering. 2010, pp. 348-362." } }, { "@position" : "163", "rawText" : { "$" : "[163] R. Singh, S. Gulwani, and A. Solar-Lezama. “Automated Feedback Generation for Introductory Programming Assignments”. In: ACM SIGPLAN Notices. Vol. 48. 6. 2013, pp. 15-26." }, "id" : { "@value" : "core_ac_uk__::1ddb459a7dd1dcbd334e1e499aad44a3", "@type" : "openaire", "@trustLevel" : "0.6201375" } }, { "@position" : "164", "rawText" : { "$" : "[164] A. Smirnov and T. Chiueh. “DIRA: Automatic Detection, Identification, and Repair of Control-hijacking Attacks”. In: The 12th Annual Network and Distributed System Security Symposium. 2005." } }, { "@position" : "165", "rawText" : { "$" : "[165] E. K. Smith, E. Barr, C. Le Goues, and Y. Brun. “Is the Cure Worse Than the Disease? Overfitting in Automated Program Repair”. In: Proceedings of the 10th Joint Meeting of the European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE). 2015." } }, { "@position" : "166", "rawText" : { "$" : "[166] A. Somayaji, S. Hofmeyr, and S. Forrest. “Principles of a Computer Immune System”. In: Proceedings of the 1997 Workshop on New Security Paradigms. 1998, pp. 75-82." } }, { "@position" : "167", "rawText" : { "$" : "[167] S. Son, K. S. McKinley, and V. Shmatikov. “Fix Me Up: Repairing Access-Control Bugs in Web Applications.” In: Proceedings of the Network and Distributed System Security Symposium. 2013." } }, { "@position" : "168", "rawText" : { "$" : "[168] H. Sözer, B. Tekinerdoğan, and M. Akşit. “FLORA: a Framework for Decomposing Software Architecture to Introduce Local Recovery”. In: Software: practice and experience 39.10 (2009), pp. 869-889." }, "id" : { "@value" : "dris___02403::8da03926fa2fe2d1661efec2a1289aab", "@type" : "openaire", "@trustLevel" : "0.7063425" } }, { "@position" : "169", "rawText" : { "$" : "[169] M. Staats, M. W. Whalen, and M. P. E. Heimdahl. “Programs, Tests, and Oracles: the Foundations of Testing Revisited”. In: Proceedings of the International Conference on Software Engineering. 2011, pp. 391-400." }, "id" : { "@value" : "od______2658::42c4de37eec902824c6f729b200a4560", "@type" : "openaire", "@trustLevel" : "0.7283477" } }, { "@position" : "170", "rawText" : { "$" : "[170] M. Stumptner and F. Wotawa. “A Model-based Approach to Software Debugging”. In: Proceedings on the Seventh International Workshop on Principles of Diagnosis. 1996." } }, { "@position" : "171", "rawText" : { "$" : "[171] B. Sun, R. Chang, X. Chen, and A. Podgurski. “Automated Support for Propagating Bug Fixes”. In: Proceedings of the International Symposium on Software Reliability Engineering. 2008, pp. 187-196." } }, { "@position" : "172", "rawText" : { "$" : "[172] B. Sun, G. Shu, A. Podgurski, S. Li, S. Zhang, and J. Yang. “Propagating Bug Fixes with Fast Subgraph Matching”. In: Proceedings of the International Symposium on Software Reliability Engineering. 2010, pp. 21-30." } }, { "@position" : "173", "rawText" : { "$" : "[173] G. J. Sussman. Building Robust Systems An Essay. 2007." } }, { "@position" : "174", "rawText" : { "$" : "[174] S. Tallam, C. Tian, R. Gupta, and X. Zhang. “Avoiding Program Failures Through Safe Execution Perturbations”. In: International Conference on Computer Software and Applications. 2008." }, "id" : { "@value" : "doi_________::3379f8dc9a918e60ef40c0beb473885f", "@type" : "openaire", "@trustLevel" : "0.6666087" } }, { "@position" : "175", "rawText" : { "$" : "[175] S. H. Tan and A. Roychoudhury. “Relifix: Automated Repair of Software Regressions”. In: Proceedings of ICSE. 2015." } }, { "@position" : "176", "rawText" : { "$" : "[176] Y. Tao, J. Kim, S. Kim, and C. Xu. “Automatically Generated Patches As Debugging Aids: a Human Study”. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. 2014, pp. 64-74." } }, { "@position" : "177", "rawText" : { "$" : "[177] S. Thomas and L. Williams. “Using Automated Fix Generation to Secure SQL Statements”. In: Proceedings of the Third International Workshop on Software Engineering for Secure Systems. 2007, p. 9." } }, { "@position" : "178", "rawText" : { "$" : "[178] W. Torres-Pomales et al. Software Fault Tolerance: a Tutorial. Tech. rep. NASA2000-tm210616. NASA, 2000." } }, { "@position" : "179", "rawText" : { "$" : "[179] J. Tran, M. Godfrey, E. Lee, and R. Holt. “Architectural Repair of Open Source Software”. In: Proceedings of the International Workshop on Program Comprehension. 2000, pp. 48-59." } }, { "@position" : "180", "rawText" : { "$" : "[180] K. Tsipenyuk, B. Chess, and G. McGraw. “Seven Pernicious Kingdoms: a Taxonomy of Software Security Errors”. In: Security & privacy 3.6 (2005), pp. 81-84." } }, { "@position" : "181", "rawText" : { "$" : "[181] F. Wang and C.-H. Cheng. “Program Repair Suggestions From Graphical StateTransition Specifications”. In: Proceedings of FORTE 2008. 2008." } }, { "@position" : "182", "rawText" : { "$" : "[182] T. Wang, C. Song, and W. Lee. “Diagnosis and Emergency Patch Generation for Integer Overflow Exploits”. In: Detection of Intrusions and Malware, and Vulnerability Assessment. 2014, pp. 255-275." } }, { "@position" : "183", "rawText" : { "$" : "[183] X. Wang, L. Zhang, T. Xie, Y. Xiong, and H. Mei. “Automating presentation changes in dynamic web applications via collaborative hybrid analysis”. In: Proceedings of the acm sigsoft international symposium on the foundations of software engineering. ACM. 2012, p. 16." } }, { "@position" : "184", "rawText" : { "$" : "[184] Y. Wang, Y. Huang, and C. Kintala. “Progressive Retry for Software Failure Recovery in Message-passing Applications”. In: Ieee transactions on computers 46.10 (1997), pp. 1137-1141." } }, { "@position" : "185", "rawText" : { "$" : "[185] Y. Wei, Y. Pei, C. A. Furia, L. S. Silva, S. Buchholz, B. Meyer, and A. Zeller. “Automated Fixing of Programs with Contracts”. In: Proceedings of the International Symposium on Software Testing and Analysis. 2010." } }, { "@position" : "186", "rawText" : { "$" : "[186] W. Weimer, T. Nguyen, C. Le Goues, and S. Forrest. “Automatically Finding Patches Using Genetic Programming”. In: Proceedings of the International Conference on Software Engineering. 2009." } }, { "@position" : "187", "rawText" : { "$" : "[187] W. Weimer. “Patches As Better Bug Reports”. In: Proceedings of the International Conference on Generative Programming and Component Engineering. 2006." } }, { "@position" : "188", "rawText" : { "$" : "[188] W. Weimer, S. Forrest, C. Le Goues, and T. Nguyen. “Automatic Program Repair with Evolutionary Computation”. In: Communications of the acm 53.5 (2010), p. 109." } }, { "@position" : "189", "rawText" : { "$" : "[189] W. Weimer, Z. P. Fry, and S. Forrest. “Leveraging program equivalence for adaptive program repair: models and first results”. In: International conference on automated software engineering. 2013, pp. 356-366." } }, { "@position" : "190", "rawText" : { "$" : "[190] W. Wong and V. Debroy. “A Survey on Software Fault Localization”. In: University of texas at dallas, tech. rep. utdcs-45-09 (2009)." } }, { "@position" : "191", "rawText" : { "$" : "[191] Y. Xiong, Z. Hu, H. Zhao, H. Song, M. Takeichi, and H. Mei. “Supporting Automatic Model Inconsistency Fixing”. In: 7th joint meeting of the european software engineering conference and the acm sigsoft symposium on the foundations of software engineering. ACM. 2009, pp. 315-324." } }, { "@position" : "192", "rawText" : { "$" : "[192] Y. Xiong, H. Zhang, A. Hubaux, S. She, J. Wang, and K. Czarnecki. “Range Fixes: Interactive Error Resolution for Software Configuration”. In: Ieee transactions on software engineering 41.6 (2015), pp. 603-619." } }, { "@position" : "193", "rawText" : { "$" : "[193] A. Zeller, Y. Wei, B. Meyer, M. Nordio, C. A. Furia, and Y. Pei. “Automated Fixing of Programs with Contracts”. In: Ieee transactions on software engineering 40.5 (2014), pp. 427-449." } }, { "@position" : "194", "rawText" : { "$" : "[194] X. Zhang, N. Gupta, and R. Gupta. “Locating Faults Through Automated Predicate Switching”. In: Proceedings of the 28th International Conference on Software Engineering. 2006, pp. 272-281." } }, { "@position" : "195", "rawText" : { "$" : "[195] Y. Zhang and Y. Ding. “CTL Model Update for System Modifications”. In: Journal of artificial intelligence research 31.1 (2008), pp. 113-155." } }, { "@position" : "196", "rawText" : { "$" : "[196] H. Zhong and Z. Su. “An Empirical Study on Real Bug Fixes”. In: Proceedings of the 37th International Conference on Software Engineering. 2015." } }, { "@position" : "197", "rawText" : { "$" : "[197] F. Zhou, J. Condit, Z. Anderson, I. Bagrak, R. Ennals, M. Harren, G. Necula, and E. Brewer. “SafeDrive: Safe and Recoverable Extensions Using Language-based Techniques”. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation. 2006, pp. 45-60." } } ] } }, { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "[1] R. Abraham and M. Erwig. “Goal-Directed Debugging of Spreadsheets”. In: Proceedings of the 2005 IEEE Symposium on Visual Languages and Human-Centric Computing. 2005, pp. 37-44." } }, { "@position" : "2", "rawText" : { "$" : "[2] E. Aftandilian, R. Sauciuc, S. Priya, and S. Krishnan. “Building Useful Program Analysis Tools Using An Extensible Java Compiler”. In: International Working Conference on Source Code Analysis and Manipulation (SCAM). 2012, pp. 14-23." } }, { "@position" : "3", "rawText" : { "$" : "[3] P. E. Ammann and J. C. Knight. “Data Diversity: An Approach to Software Fault Tolerance”. In: Ieee transactions on computers 37.4 (1988), pp. 418-425." } }, { "@position" : "4", "rawText" : { "$" : "[4] J. Andersen and J. L. Lawall. “Generic Patch Inference”. In: Automated software engineering 17.2 (2010), pp. 119-148." }, "id" : { "@value" : "doi_________::61a2268b8ef05235ab26bf7f86a575b8", "@type" : "openaire", "@trustLevel" : "0.6860426" } }, { "@position" : "5", "rawText" : { "$" : "[5] A. Arcuri. “Automatic Software Generation and Improvement Through Search Based Techniques”. PhD thesis. The University of Birmingham, 2009." } }, { "@position" : "6", "rawText" : { "$" : "[6] A. Arcuri. “Evolutionary Repair of Faulty Software”. In: Applied soft computing 11.4 (2011), pp. 3494-3514." } }, { "@position" : "7", "rawText" : { "$" : "[7] A. Arcuri and X. Yao. “A Novel Co-evolutionary Approach to Automatic Software Bug Fixing”. In: Proceedings of the IEEE Congress on Evolutionary Computation. 2008, pp. 162-168." } }, { "@position" : "8", "rawText" : { "$" : "[8] A. Avizienis. “The N-version Approach to Fault-tolerant Software”. In: Ieee transactions on software engineering 11.12 (1985), pp. 1491-1501." }, "id" : { "@value" : "doi_________::cdc8356ee2e21ef9bcac6c9fb2cb0d63", "@type" : "openaire", "@trustLevel" : "0.6642342" } }, { "@position" : "9", "rawText" : { "$" : "[9] A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. “Basic Concepts and Taxonomy of Dependable and Secure Computing”. In: Ieee transactions on dependable and secure computing 1.1 (2004), pp. 11-33." } }, { "@position" : "10", "rawText" : { "$" : "[10] T. Azim, I. Neamtiu, and L. Marvel. “Towards Self-healing Smartphone Software via Automated Patching”. In: Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering. 2014, pp. 623-628." }, "id" : { "@value" : "doi_________::d712ef4e8d4ec5be89f3dcab74866c56", "@type" : "openaire", "@trustLevel" : "0.61199635" } }, { "@position" : "11", "rawText" : { "$" : "[11] E. T. Barr, Y. Brun, P. T. Devanbu, M. Harman, and F. Sarro. “The Plastic Surgery Hypothesis”. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. 2014, pp. 306-317." } }, { "@position" : "12", "rawText" : { "$" : "[12] E. Barr, M. Harman, P. McMinn, M. Shahbaz, and S. Yoo. “The Oracle Problem in Software Testing: a Survey”. In: Ieee transactions on software engineering 41.5 (2015), pp. 507-525." }, "id" : { "@value" : "od_______322::8a2eb300b73cf67f9060f8acb68f582d", "@type" : "openaire", "@trustLevel" : "0.6956351" } }, { "@position" : "13", "rawText" : { "$" : "[13] E. D. Berger and B. G. Zorn. “DieHard: Probabilistic Memory Safety for Unsafe Languages”. In: Acm sigplan notices 41.6 (2006), pp. 158-168." } }, { "@position" : "14", "rawText" : { "$" : "[14] R. Bodik and B. Jobstmann. “Algorithmic Program Synthesis: Introduction”. In: International journal on software tools for technology transfer 15.5 (2013), pp. 397- 411." } }, { "@position" : "15", "rawText" : { "$" : "[15] M. Brodie, S. Ma, G. Lohman, L. Mignet, M. Wilding, J. Champlin, and P. Sohn. “Quickly Finding Known Software Problems via Automated Symptom Matching”. In: Proceedings of the International Conference on Autonomic Computing. 2005, pp. 101-110." } }, { "@position" : "16", "rawText" : { "$" : "[16] Y. Brun, E. Barr, M. Xiao, C. Le Goues, and P. Devanbu. Evolution Vs. Intelligent Design in Program Patching. Tech. rep. UC Davis, 2013." } }, { "@position" : "17", "rawText" : { "$" : "[17] Y. Cai and L. Cao. “Fixing Deadlocks via Lock Pre-acquisitions”. In: Proceedings of the 38th international conference on software engineering. ACM. 2016, pp. 1109- 1120." } }, { "@position" : "18", "rawText" : { "$" : "[18] G. Candea and A. Fox. “Crash-only Software”. In: Proceedings of the 9th Conference on Hot Topics in Operating Systems. 2003, pp. 12-12." } }, { "@position" : "19", "rawText" : { "$" : "[19] G. Candea and A. Fox. “Recursive Restartability: Turning the Reboot Sledgehammer Into a Scalpel”. In: Proceedings of the 8th Workshop on Hot Topics in Operating Systems. 2001, pp. 125-130." } }, { "@position" : "20", "rawText" : { "$" : "[20] G. Candea, E. Kiciman, S. Zhang, P. Keyani, and A. Fox. “JAGR: An Autonomous Self-recovering Application Server”. In: Proceedings of the Workshop on Active Middleware Services. 2003, pp. 168-177." } }, { "@position" : "21", "rawText" : { "$" : "[21] G. Candea, S. Kawamoto, Y. Fujiki, G. Friedman, and A. Fox. “Microreboot: a Technique for Cheap Recovery”. In: Proceedings of the 6th Conference on Symposium on Operating Systems Design & Implementation. 2004, pp. 3-3." } }, { "@position" : "22", "rawText" : { "$" : "[22] M. Carbin, S. Misailovic, M. Kling, and M. C. Rinard. “Detecting and Escaping Infinite Loops with Jolt”. In: Procceedings of ECOOP. 2011, pp. 609-633." }, "id" : { "@value" : "od________88::c094ddae3d97799f82f7b81ed61b428d", "@type" : "openaire", "@trustLevel" : "0.6704617" } }, { "@position" : "23", "rawText" : { "$" : "[23] A. Carzaniga, A. Gorla, A. Mattavelli, N. Perino, and M. Pezzè. “Automatic Recovery From Runtime Failures”. In: Proceedings of the International Conference on Software Engineering. 2013." }, "id" : { "@value" : "erc_________::a644ed3d5d0bf211431055edec3a2edf", "@type" : "openaire", "@trustLevel" : "0.70273936" } }, { "@position" : "24", "rawText" : { "$" : "[24] A. Carzaniga, A. Gorla, N. Perino, and M. Pezzè. “Automatic Workarounds for Web Applications”. In: Proceedings of the Foundations of Software Engineering Conference. 2010, pp. 237-246." }, "id" : { "@value" : "doi_________::3ba8db866f56f3a0e66ac3068786c073", "@type" : "openaire", "@trustLevel" : "0.6666673" } }, { "@position" : "25", "rawText" : { "$" : "[25] S. Chandra, E. Torlak, S. Barman, and R. Bodik. “Angelic Debugging”. In: Proceeding of the International Conference on Software Engineering. 2011, pp. 121-130." } }, { "@position" : "26", "rawText" : { "$" : "[26] S.-W. Cheng, D. Garlan, B. R. Schmerl, J. P. Sousa, B. Spitnagel, and P. Steenkiste. “Using Architectural Style As a Basis for System Self-repair”. In: Proceedings of the IFIP 17th World Computer Congress / 3rd IEEE/IFIP Conference on Software Architecture: System Design, Development and Maintenance. 2002, pp. 45-59." } }, { "@position" : "27", "rawText" : { "$" : "[27] Z. Coker and M. Hafiz. “Program Transformations to Fix C Integers”. In: Proceedings of the International Conference on Software Engineering. 2013, pp. 792-801." } }, { "@position" : "28", "rawText" : { "$" : "[28] B. Cornu, L. Seinturier, and M. Monperrus. “Exception Handling Analysis and Transformation Using Fault Injection: Study of Resilience Against Unanticipated Exceptions”. In: Information and Software Technology 57 (2015), pp. 66-76." }, "id" : { "@value" : "doi_________::7f2c9178211b4d9123bf9d0d238d3ea8", "@type" : "openaire", "@trustLevel" : "0.69015485" } }, { "@position" : "29", "rawText" : { "$" : "[29] M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. “Vigilante: End-to-end Containment of Internet Worms”. In: ACM SIGOPS Operating Systems Review. Vol. 39. 5. 2005, pp. 133-147." } }, { "@position" : "30", "rawText" : { "$" : "[30] V. Dallmeier, A. Zeller, and B. Meyer. “Generating Fixes From Object Behavior Anomalies”. In: Proceedings of the International Conference on Automated Software Engineering. 2009." }, "id" : { "@value" : "doi_________::d9ac7ad5a76f49bacb512cbc80e9accc", "@type" : "openaire", "@trustLevel" : "0.6434098" } }, { "@position" : "31", "rawText" : { "$" : "[31] B. Daniel, V. Jagannath, D. Dig, and D. Marinov. “ReAssert: Suggesting Repairs for Broken Unit Tests”. In: Proceedings of the 24th IEEE/ACM International Conference on Automated Software Engineering. 2009, pp. 433-444." } }, { "@position" : "32", "rawText" : { "$" : "[32] L. D'Antoni, R. Samanta, and R. Singh. “Qlose: Program Repair with Quantitative Objectives”. In: International conference on computer aided verification. Springer. 2016, pp. 383-401." } }, { "@position" : "33", "rawText" : { "$" : "[33] V. Debroy and W. Wong. “Using Mutation to Automatically Suggest Fixes for Faulty Programs”. In: Proceedings of the International Conference on Software Testing, Verification and Validation. 2010, pp. 65-74." } }, { "@position" : "34", "rawText" : { "$" : "[34] F. DeMarco, J. Xuan, D. Le Berre, and M. Monperrus. “Automatic Repair of Buggy If Conditions and Missing Preconditions with SMT”. In: Proceedings of the 6th international workshop on constraints in software testing, verification, and analysis (cstva 2014). 2014." } }, { "@position" : "35", "rawText" : { "$" : "[35] B. Demsky and M. Rinard. “Automatic Detection and Repair of Errors in Data Structures”. In: Acm sigplan notices 38.11 (2003), pp. 78-95." }, "id" : { "@value" : "doi_________::831ce490dd2b26b411d0a3dfad3192c0", "@type" : "openaire", "@trustLevel" : "0.6797866" } }, { "@position" : "36", "rawText" : { "$" : "[36] B. Demsky and A. Dash. “Bristlecone: a Language for Robust Software Systems”. In: Proceedings of ECOOP. 2008, pp. 490-515." }, "id" : { "@value" : "doi_________::3cdeb8c61016145a5f1f9ffded00cf5f", "@type" : "openaire", "@trustLevel" : "0.65308636" } }, { "@position" : "37", "rawText" : { "$" : "[37] G. Denaro, M. Pezzè, and D. Tosi. “Ensuring Interoperable Service-oriented Systems Through Engineered Self-healing”. In: Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. 2009, pp. 253-262." }, "id" : { "@value" : "od______1299::d88b26167c1fc51ae91d2750dec1cb80", "@type" : "openaire", "@trustLevel" : "0.67078865" } }, { "@position" : "38", "rawText" : { "$" : "[38] L. A. Dennis, R. Monroy, and P. Nogueira. “Proof-directed Debugging and Repair”. In: Seventh Symposium on Trends in Functional Programming. 2006, pp. 131-140." } }, { "@position" : "39", "rawText" : { "$" : "[39] A. Dhar, R. Purandare, M. Dhawan, and S. Rangaswamy. “CLOTHO: Saving Programs from Malformed Strings and Incorrect String-handling”. In: Foundations of software engineering. ACM. 2015, pp. 555-566." }, "id" : { "@value" : "doi_________::bb0b5a79cc6ce658c7b653d02eb825ed", "@type" : "openaire", "@trustLevel" : "0.6466234" } }, { "@position" : "40", "rawText" : { "$" : "[40] K. Dobolyi and W. Weimer. “Changing Java's Semantics for Handling Null Pointer Exceptions”. In: 19th International Symposium on Software Reliability Engineering. 2008, pp. 47-56." }, "id" : { "@value" : "doi_________::94c20394972b238b716eaf27a21aa995", "@type" : "openaire", "@trustLevel" : "0.6879837" } }, { "@position" : "41", "rawText" : { "$" : "[41] J. Duraes and H. Madeira. “Emulation of Software Faults: a Field Data Study and a Practical Approach”. In: Ieee transactions on software engineering 32.11 (2006), pp. 849-867." }, "id" : { "@value" : "doi_________::de928d93db7d4cc0a0f10e4a39e7751f", "@type" : "openaire", "@trustLevel" : "0.6419633" } }, { "@position" : "42", "rawText" : { "$" : "[42] M. Eisenstadt. “My Hairiest Bug War Stories”. In: Communications of the acm 40.4 (1997), pp. 30-37." }, "id" : { "@value" : "doi_________::24d27bafdd755a229c6a8f8e46be25e6", "@type" : "openaire", "@trustLevel" : "0.6089758" } }, { "@position" : "43", "rawText" : { "$" : "[43] B. Elkarablieh, I. Garcia, Y. Suen, and S. Khurshid. “Assertion-based Repair of Complex Data Structures”. In: Proceedings of the Twenty-second IEEE/ACM International Conference on Automated Software Engineering. 2007, pp. 64-73." } }, { "@position" : "44", "rawText" : { "$" : "[44] H. ETO and K. Yoda. “Propolice: Improved Stacksmashing Attack Detection”. In: Ipsj sig notes 75 (2001), pp. 181-188." } }, { "@position" : "45", "rawText" : { "$" : "[45] S. Forrest, T. Nguyen, W. Weimer, and C. Le Goues. “A Genetic Programming Approach to Automated Software Repair”. In: Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation. 2009, pp. 947-954." } }, { "@position" : "46", "rawText" : { "$" : "[46] G. Friedrich, M. Fugini, E. Mussi, B. Pernici, and G. Tagni. “Exception Handling for Repair in Service-Based Processes”. In: Ieee transactions on software engineering 36.2 (2010), pp. 198-215." } }, { "@position" : "47", "rawText" : { "$" : "[47] Z. P. Fry, B. Landau, and W. Weimer. “A Human Study of Patch Maintainability”. In: Proceedings of the International Symposium on Software Testing and Analysis. 2012, pp. 177-187." } }, { "@position" : "48", "rawText" : { "$" : "[48] R. P. Gabriel and R. Goldman. “Conscientious Software”. In: Acm Sigplan Notices. Vol. 41. 10. 2006, pp. 433-450." } }, { "@position" : "49", "rawText" : { "$" : "[49] Q. Gao, Y. Xiong, Y. Mi, L. Zhang, W. Yang, Z. Zhou, B. Xie, and H. Mei. “Safe Memory-leak Fixing for C Programs”. In: Proceedings of the 37th International Conference on Software Engineering. 2015, pp. 459-470." } }, { "@position" : "50", "rawText" : { "$" : "[50] Q. Gao, H. Zhang, J. Wang, Y. Xiong, L. Zhang, and H. Mei. “Fixing Recurring Crash Bugs via Analyzing Q&A Sites”. In: Proceedings of the 30th ieee/acm international conference on automated software engineering. ACM, 2015." } }, { "@position" : "51", "rawText" : { "$" : "[51] Z. Gao, Z. Chen, Y. Zou, and A. Memon. “SITAR: GUI Test Script Repair”. In: Ieee transactions on software engineering (2015)." } }, { "@position" : "52", "rawText" : { "$" : "[52] D. Garlan, S.-W. Cheng, and B. Schmerl. “Increasing System Dependability Through Architecture-based Self-repair”. In: Architecting Dependable Systems. 2003, pp. 61- 89." }, "id" : { "@value" : "doi_________::d85625277be9d18e919bcb5b0e882cce", "@type" : "openaire", "@trustLevel" : "0.6333976" } }, { "@position" : "53", "rawText" : { "$" : "[53] B. J. Garvin, M. B. Cohen, and M. B. Dwyer. “Using Feature Locality: Can We Leverage History to Avoid Failures During Reconfiguration?” In: Proceedings of the 8th Workshop on Assurances for Self-adaptive Systems. 2011, pp. 24-33." } }, { "@position" : "54", "rawText" : { "$" : "[54] S. George, D. Evans, and S. Marchette. “A Biological Programming Model for SelfHealing”. In: Proceedings of SSRS. 2013." } }, { "@position" : "55", "rawText" : { "$" : "[55] D. Ghosh, R. Sharman, H. Raghav Rao, and S. Upadhyaya. “Self-healing Systems-survey and Synthesis”. In: Decision support systems 42.4 (2007), pp. 2164- 2185." } }, { "@position" : "56", "rawText" : { "$" : "[56] D. Gopinath, S. Khurshid, D. Saha, and S. Chandra. “Data-guided Repair of Selection Statements”. In: Proceedings of the 36th International Conference on Software Engineering. 2014, pp. 243-253." } }, { "@position" : "57", "rawText" : { "$" : "[57] D. Gopinath, M. Z. Malik, and S. Khurshid. “Specification-based Program Repair Using SAT”. In: Proceedings of the International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 2011." } }, { "@position" : "58", "rawText" : { "$" : "[58] A. Griesmayer, R. Bloem, and B. Cook. “Repair of Boolean Programs with An Application to C”. In: Computer Aided Verification. 2006, pp. 358-371." }, "id" : { "@value" : "doi_________::548cdecf229ac417a54d97bd6927711e", "@type" : "openaire", "@trustLevel" : "0.6535551" } }, { "@position" : "59", "rawText" : { "$" : "[59] R. Gupta, S. Pal, A. Kanade, and S. Shevade. “DeepFix: Fixing Common C Language Errors by Deep Learning”. In: Proceedings of the aaai conference on artificial intelligence. 2017." } }, { "@position" : "60", "rawText" : { "$" : "[60] B. Hartmann, D. MacDougall, J. Brandt, and S. R. Klemmer. “What Would Other Programmers Do: Suggesting Solutions to Error Messages”. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 2010, pp. 1019-1028." } }, { "@position" : "61", "rawText" : { "$" : "[61] H. He and N. Gupta. “Automated Debugging Using Path-Based Weakest Preconditions”. In: FASE. 2004, pp. 267-280." } }, { "@position" : "62", "rawText" : { "$" : "[62] P. Hosek and C. Cadar. “Safe Software Updates via Multi-version Execution”. In: Proceedings of the International Conference on Software Engineering. 2013, pp. 612- 621." }, "id" : { "@value" : "doi_________::95023b71791957385eba9b2bc7b6b0e5", "@type" : "openaire", "@trustLevel" : "0.77703565" } }, { "@position" : "63", "rawText" : { "$" : "[63] D. Hovemeyer and W. Pugh. “Finding Bugs Is Easy”. In: Acm sigplan notices 39.12 (2004)." }, "id" : { "@value" : "doi_________::98bdf4bc886d9538280ce8467742014f", "@type" : "openaire", "@trustLevel" : "0.68069535" } }, { "@position" : "64", "rawText" : { "$" : "[64] Y. Huang, C. Kintala, N. Kolettis, and N. Fulton. “Software Rejuvenation: Analysis, Module and Applications”. In: Proceedings of the International Symposium on FaultTolerant Computing. 1995, pp. 381-390." } }, { "@position" : "65", "rawText" : { "$" : "[65] D. Jackson and M. Vaziri. “Finding Bugs with a Constraint Solver”. In: Proceedings of the 2000 ACM SIGSOFT International Symposium on Software Testing and Analysis. 2000, pp. 14-25." } }, { "@position" : "66", "rawText" : { "$" : "[66] D. Jeffrey, M. Feng, N. Gupta, and R. Gupta. “BugFix: a Learning-based Tool to Assist Developers in Fixing Bugs”. In: ICPC. 2009, pp. 70-79." } }, { "@position" : "67", "rawText" : { "$" : "[67] D. Jeffrey, N. Gupta, and R. Gupta. “Fault Localization Using Value Replacement”. In: Proceedings of the International Symposium on Software Testing and Analysis. 2008, pp. 167-178." } }, { "@position" : "68", "rawText" : { "$" : "[68] S. Jha, S. Gulwani, S. A. Seshia, and A. Tiwari. “Oracle-guided Component-based Program Synthesis”. In: Proceedings of the International Conference on Software Engineering. Vol. 1. 2010, pp. 215-224." } }, { "@position" : "69", "rawText" : { "$" : "[69] M. Jiang, T. Y. Chen, F.-C. Kuo, D. Towey, and Z. Ding. “A Metamorphic Testing Approach for Supporting Program Repair without the Need for a Test Oracle”. In: Journal of systems and software (2016)." } }, { "@position" : "70", "rawText" : { "$" : "[70] G. Jin, L. Song, W. Zhang, S. Lu, and B. Liblit. “Automated Atomicity-violation Fixing”. In: Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation. 2011, pp. 389-400." } }, { "@position" : "71", "rawText" : { "$" : "[71] B. Jobstmann, A. Griesmayer, and R. Bloem. “Program Repair As a Game”. In: Computer Aided Verification. 2005, pp. 226-238." }, "id" : { "@value" : "doi_________::a0796bb2ee00e1738f887ecc5a129263", "@type" : "openaire", "@trustLevel" : "0.6640217" } }, { "@position" : "72", "rawText" : { "$" : "[72] H. Jula, D. Tralamazza, C. Zamfir, and G. Candea. “Deadlock Immunity: Enabling Systems to Defend Against Deadlocks”. In: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation. 2008, pp. 295-308." }, "id" : { "@value" : "snsf_p3_pubs::fb0b54b74e1cbedb111b95a531c14cf1", "@type" : "openaire", "@trustLevel" : "0.60978603" } }, { "@position" : "73", "rawText" : { "$" : "[73] S. Kaleeswaran, V. Tulsian, A. Kanade, and A. Orso. “Minthint: Automated Synthesis of Repair Hints”. In: Proceedings of the International Conference on Software Engineering. 2014, pp. 266-276." } }, { "@position" : "74", "rawText" : { "$" : "[74] S. Kalvala and R. Warburton. “A Formal Approach to Fixing Bugs”. In: Formal Methods, Foundations and Applications. 2011, pp. 172-187." }, "id" : { "@value" : "doi_________::d00dd2d207fdd41a5344650907ff0c85", "@type" : "openaire", "@trustLevel" : "0.67734885" } }, { "@position" : "75", "rawText" : { "$" : "[75] A. Kalyanpur, B. Parsia, E. Sirin, and B. Cuenca-Grau. “Repairing Unsatisfiable Concepts in OWL Ontologies”. In: The Semantic Web: Research and Applications. Vol. 4011. 2006, pp. 170-184." }, "id" : { "@value" : "od______3818::c7c5bc96ddfd02c346496e368c8db542", "@type" : "openaire", "@trustLevel" : "0.66630703" } }, { "@position" : "76", "rawText" : { "$" : "[76] M. Kasbekar, C. Narayanan, and C. Das. “Selective Checkpointing and Rollbacks in Multi-threaded Object-oriented Environment”. In: Ieee transactions on reliability 48.4 (1999), pp. 325-337." } }, { "@position" : "77", "rawText" : { "$" : "[77] Y. Ke, K. T. Stolee, C. Le Goues, and Y. Brun. “Repairing Programs with Semantic Code Search”. In: Proceedings of the International Conference on Automated Software Engineering. 2015." } }, { "@position" : "78", "rawText" : { "$" : "[78] C. Kern and J. Esparza. “Automatic Error Correction of Java Programs”. In: Formal Methods for Industrial Critical Systems. 2010, pp. 67-81." } }, { "@position" : "79", "rawText" : { "$" : "[79] D. Kim, J. Nam, J. Song, and S. Kim. “Automatic Patch Generation Learned From Human-Written Patches”. In: Proceedings of ICSE. 2013." } }, { "@position" : "80", "rawText" : { "$" : "[80] E. Kneuss, M. Koukoutos, and V. Kuncak. “Deductive Program Repair”. In: International conference on computer aided verification. Springer. 2015, pp. 217-233." }, "id" : { "@value" : "doi_________::b9fabffd1bc6c55238a566f0d289f01c", "@type" : "openaire", "@trustLevel" : "0.6627885" } }, { "@position" : "81", "rawText" : { "$" : "[81] D. E. Knuth. “The Errors of TEX”. In: Softw., pract. exper. 19.7 (1989), pp. 607-685." } }, { "@position" : "82", "rawText" : { "$" : "[82] X. Kong, L. Zhang, W. E. Wong, and B. Li. “Experience report: how do techniques, programs, and tests impact automated program repair?” In: International symposium on software reliability engineering. IEEE. 2015, pp. 194-204." } }, { "@position" : "83", "rawText" : { "$" : "[83] R. Könighofer and R. Bloem. “Automated Error Localization and Correction for Imperative Programs”. In: Formal Methods in Computer-Aided Design (FMCAD), 2011. 2011, pp. 91-100." } }, { "@position" : "84", "rawText" : { "$" : "[84] R. Könighofer and R. Bloem. “Repair with On-the-fly Program Analysis”. In: Hardware and Software: Verification and Testing. 2013, pp. 56-71." }, "id" : { "@value" : "doi_________::436a81a296b9e029d48a820dfd54516b", "@type" : "openaire", "@trustLevel" : "0.6695329" } }, { "@position" : "85", "rawText" : { "$" : "[85] R. Koo and S. Toueg. “Checkpointing and Rollback-recovery for Distributed Systems”. In: Ieee transactions on software engineering 1 (1987), pp. 23-31." } }, { "@position" : "86", "rawText" : { "$" : "[86] M. Lake. Epic Failures: 11 Infamous Software Bugs. http://www.computerworld. com/article/2515483/enterprise- applications/epic- failures-- 11- infamous- softwarebugs.html. 2010." } }, { "@position" : "87", "rawText" : { "$" : "[87] J. L. Lawall, J. Brunel, N. Palix, R. R. Hansen, H. Stuart, and G. Muller. “WYSIWIB: a Declarative Approach to Finding API Protocols and Bugs in Linux Code”. In: International Conference on Dependable Systems & Networks. 2009, pp. 43-52." } }, { "@position" : "88", "rawText" : { "$" : "[88] N. Lazaar, A. Gotlieb, and Y. Lebbah. “A Framework for the Automatic Correction of Constraint Programs”. In: Proceedings of the International Conference on Software Testing, Verification and Validation. 2011, pp. 319-326." }, "id" : { "@value" : "doi_________::01f4566cd3c811cf918e796095b98159", "@type" : "openaire", "@trustLevel" : "0.67730725" } }, { "@position" : "89", "rawText" : { "$" : "[89] C. Le Goues, M. Dewey-Vogt, S. Forrest, and W. Weimer. “A Systematic Study of Automated Program Repair: Fixing 55 Out of 105 Bugs for $8 Each”. In: Proceedings of the International Conference on Software Engineering. 2012, pp. 3-13." } }, { "@position" : "90", "rawText" : { "$" : "[90] C. Le Goues, S. Forrest, and W. Weimer. “Current Challenges in Automatic Software Repair”. In: Software quality journal 21.3 (2013), pp. 421-443." }, "id" : { "@value" : "doi_________::9bc22c7f896fc815d34331fc8ca130ad", "@type" : "openaire", "@trustLevel" : "0.6842719" } }, { "@position" : "91", "rawText" : { "$" : "[91] C. Le Goues, N. Holtschulte, E. K. Smith, Y. Brun, P. Devanbu, S. Forrest, and W. Weimer. “The ManyBugs and IntroClass Benchmarks for Automated Repair of C Programs”. In: Ieee transactions on software engineering (tse), in press (2015)." }, "id" : { "@value" : "doi_________::cf3f3afaded86d7d82fb50ca40925607", "@type" : "openaire", "@trustLevel" : "0.62086505" } }, { "@position" : "92", "rawText" : { "$" : "[92] C. Le Goues, T. Nguyen, S. Forrest, and W. Weimer. “GenProg: a Generic Method for Automatic Software Repair”. In: Ieee transactions on software engineering 38 (2012), pp. 54-72." }, "id" : { "@value" : "doi_________::0061eafa8f13e1c2815be279e13c9f58", "@type" : "openaire", "@trustLevel" : "0.6592393" } }, { "@position" : "93", "rawText" : { "$" : "[93] X. B. D. Le, D. Lo, and C. L. Goues. “History Driven Program Repair”. In: Proceedings of the 23rd international conference on software analysis, evolution, and reengineering (saner). 2016, pp. 213-224." } }, { "@position" : "94", "rawText" : { "$" : "[94] M. Leotta, D. Clerissi, F. Ricca, and C. Spadaro. “Repairing Selenium Test Cases: an Industrial Case Study about Web Page Element Localization”. In: International conference on software testing, verification and validation. IEEE. 2013, pp. 487-488." }, "id" : { "@value" : "doi_________::80d6db949a21f0405a94330ae97a5028", "@type" : "openaire", "@trustLevel" : "0.67532986" } }, { "@position" : "95", "rawText" : { "$" : "[95] R. Levinson. “Unified Planning and Execution for Autonomous Software Repair”. In: Workshop on Plan Execution: a Reality Check. 2005." } }, { "@position" : "96", "rawText" : { "$" : "[96] C. Lewis and J. Whitehead. “Runtime Repair of Software Faults Using Event-driven Monitoring”. In: Proceedings of the 32nd acm/ieee international conference on software engineering - icse '10 2 (2010), p. 275." } }, { "@position" : "97", "rawText" : { "$" : "[97] Z. Liang and R. Sekar. “Fast and Automated Generation of Attack Signatures: a Basis for Building Self-protecting Servers”. In: Proceedings of the 12th ACM Conference on Computer and Communications Security. 2005, pp. 213-222." } }, { "@position" : "98", "rawText" : { "$" : "[98] Y. Lin and S. Kulkarni. “Automatic Repair for Multi-threaded Programs with Deadlock/Livelock Using Maximum Satisfiability”. In: Proceedings of the 2014 international symposium on software testing and analysis. ACM. 2014, pp. 237-247." } }, { "@position" : "99", "rawText" : { "$" : "[99] Z. Lin, X. Jiang, D. Xu, B. Mao, and L. Xie. “AutoPaG: Towards Automated Software Patch Generation with Source Code Root Cause Identification and Repair”. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. 2007, pp. 329-340." } }, { "@position" : "100", "rawText" : { "$" : "[100] C. Liu, J. Yang, L. Tan, and M. Hafiz. “R2Fix: Automatically Generating Bug Fixes From Bug Reports”. In: Proceedings of the International Conference on Software Testing, Verification and Validation (ICST). 2013, pp. 282-291." } }, { "@position" : "101", "rawText" : { "$" : "[101] H. Liu, Y. Chen, and S. Lu. “Understanding and Generating High Quality Patches for Concurrency bugs”. In: Proceedings of the 2016 24th acm sigsoft international symposium on foundations of software engineering. ACM. 2016, pp. 715-726." } }, { "@position" : "102", "rawText" : { "$" : "[102] P. Liu and C. Zhang. “Axis: Automatically Fixing Atomicity Violations Through Solving Control Constraints”. In: Proceedings of the 2012 International Conference on Software Engineering. 2012, pp. 299-309." } }, { "@position" : "103", "rawText" : { "$" : "[103] M. E. Locasto, S. Sidiroglou, and A. D. Keromytis. “Software Self-Healing Using Collaborative Application Communities”. In: Proceedings of the Network and Distributed System Security Symposium. 2006." }, "id" : { "@value" : "doi_________::6e539f0301aa67945ea78037c50f8cac", "@type" : "openaire", "@trustLevel" : "0.6636007" } }, { "@position" : "104", "rawText" : { "$" : "[104] F. Logozzo and T. Ball. “Modular and Verified Automatic Program Repair”. In: Proceedings of the 27th ACM International Conference on Object Oriented Programming Systems Languages and Applications. 2012." }, "id" : { "@value" : "doi_________::d4c79c47b10fe4a7677a642634719536", "@type" : "openaire", "@trustLevel" : "0.6743879" } }, { "@position" : "105", "rawText" : { "$" : "[105] F. Logozzo and M. Martel. “Automatic Repair of Overflowing Expressions with Abstract Interpretation”. In: Semantics, Abstract Interpretation, and Reasoning About Programs: Essays Dedicated to David A. Schmidt on the Occasion of His Sixtieth Birthday. Vol. 129. 2013, pp. 341-357." }, "id" : { "@value" : "arXiv_______::053a118d1a1e41678005a2da74b776e1", "@type" : "openaire", "@trustLevel" : "0.73015213" } }, { "@position" : "106", "rawText" : { "$" : "[106] F. Long, V. Ganesh, M. Carbin, S. Sidiroglou, and M. Rinard. “Automatic Input Rectification”. In: Proceedings of ICSE. 2012." } }, { "@position" : "107", "rawText" : { "$" : "[107] F. Long and M. C. Rinard. “Prophet: Automatic Patch Generation via Learning From Successful Patches”. In: Proceedings of the Symposium on Principles of Programming Languages. 2016." } }, { "@position" : "108", "rawText" : { "$" : "[108] F. Long and M. C. Rinard. “Staged Program Repair with Condition Synthesis”. In: Proceedings of ESEC/FSE. 2015." } }, { "@position" : "109", "rawText" : { "$" : "[109] F. Long, S. Sidiroglou-Douskos, D. Kim, and M. Rinard. “Sound Input Filter Generation for Integer Overflow Errors”. In: Acm sigplan notices 49.1 (2014), pp. 439- 452." } }, { "@position" : "110", "rawText" : { "$" : "[110] F. Long, S. Sidiroglou-Douskos, and M. C. Rinard. “Automatic Runtime Error Repair and Containment via Recovery Shepherding”. In: ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014." }, "id" : { "@value" : "od________88::0be88c19cf018a64e73bc16f959a0eba", "@type" : "openaire", "@trustLevel" : "0.6835259" } }, { "@position" : "111", "rawText" : { "$" : "[111] M. Malik, J. Siddiqi, and S. Khurshid. “Constraint-Based Program Debugging Using Data Structure Repair”. In: International Conference on Software Testing, Verification and Validation (ICST). 2011, pp. 190-199." } }, { "@position" : "112", "rawText" : { "$" : "[112] S. L. Marcote and M. Monperrus. Automatic Repair of Infinite Loops. Tech. rep. 1504.05078. Arxiv, 2015." } }, { "@position" : "113", "rawText" : { "$" : "[113] M. Martinez, T. Durieux, R. Sommerard, J. Xuan, and M. Monperrus. “Automatic Repair of Real Bugs in Java: A Large-Scale Experiment on the Defects4J Dataset”. In: Springer empirical software engineering (2016)." } }, { "@position" : "114", "rawText" : { "$" : "[114] M. Martinez and M. Monperrus. “Mining Software Repair Models for Reasoning on the Search Space of Automated Program Fixing”. In: Empirical Software Engineering 20.1 (2013), pp. 176-205." }, "id" : { "@value" : "doi_________::20a481dc781e009ed40ab895ff4455b9", "@type" : "openaire", "@trustLevel" : "0.7182879" } }, { "@position" : "115", "rawText" : { "$" : "[115] M. Martinez, W. Weimer, and M. Monperrus. “Do the Fix Ingredients Already Exist? An Empirical Inquiry into the Redundancy Assumptions of Program Repair Approaches”. In: Proceedings of the international conference on software engineering, track on new ideas and emerging results. 2014." } }, { "@position" : "116", "rawText" : { "$" : "[116] S. Mechtaev, J. Yi, and A. Roychoudhury. “Angelix: Scalable Multiline Program Patch Synthesis via Symbolic Analysis”. In: Proceedings of the 38th international conference on software engineering. 2016, pp. 691-701." } }, { "@position" : "117", "rawText" : { "$" : "[117] S. Mechtaev, J. Yi, and A. Roychoudhury. “DirectFix: Looking for Simple Program Repairs”. In: Proceedings of the 37th International Conference on Software Engineering. 2015." } }, { "@position" : "118", "rawText" : { "$" : "[118] I. Medeiros, N. F. Neves, and M. Correia. “Automatic detection and correction of web application vulnerabilities using data mining to predict false positives”. In: Proceedings of the 23rd international conference on world wide web. ACM. 2014, pp. 63- 74." } }, { "@position" : "119", "rawText" : { "$" : "[119] A. M. Memon. “Automatically Repairing Event Sequence-based GUI Test Suites for Regression Testing”. In: Acm transactions on software engineering and methodology 18.2 (2008), p. 4." } }, { "@position" : "120", "rawText" : { "$" : "[120] N. Meng, M. Kim, and K. S. McKinley. “LASE: Locating and Applying Systematic Edits by Learning From Examples”. In: Proceedings of the International Conference on Software Engineering. 2013, pp. 502-511." } }, { "@position" : "121", "rawText" : { "$" : "[121] N. Meng, M. Kim, and K. S. McKinley. “Systematic Editing: Generating Program Transformations From An Example”. In: Proceedings of the 32Nd ACM SIGPLAN Conference on Programming Language Design and Implementation. 2011, pp. 329- 342." } }, { "@position" : "122", "rawText" : { "$" : "[122] M. G. Merideth. “Enhancing Survivability with Proactive Fault-containment”. In: The 2003 International Conference on Dependable Systems and Networks. 2003." } }, { "@position" : "123", "rawText" : { "$" : "[123] B. Meyer. “Applying 'design by Contract'”. In: Computer 25.10 (1992), pp. 40-51." } }, { "@position" : "124", "rawText" : { "$" : "[124] M. Monperrus. “A Critical Review of \"Automatic Patch Generation Learned from Human-Written Patches\": Essay on the Problem Statement and the Evaluation of Automatic Software Repair”. In: Proceedings of the international conference on software engineering. 2014, pp. 234-242." } }, { "@position" : "125", "rawText" : { "$" : "[125] M. Monperrus. Principles of antifragile software. Tech. rep. 1404.3056. Arxiv, 2014." } }, { "@position" : "126", "rawText" : { "$" : "[126] P. Muntean, V. K. Kommanapalli, A. Ibing, and C. Eckert. “Automated Generation of Buffer Overflows Quick Fixes Using Symbolic Execution and SMT”. In: International Conference on Computer Safety, Reliability & Security (SAFECOMP'15). 2015." } }, { "@position" : "127", "rawText" : { "$" : "[127] C. Nentwich, W. Emmerich, and A. Finkelstein. “Consistency Management with Repair Actions”. In: Proceedings of the 25th International Conference on Software Engineering. 2003, pp. 455-464." } }, { "@position" : "128", "rawText" : { "$" : "[128] H. D. T. Nguyen, D. Qi, A. Roychoudhury, and S. Chandra. “SemFix: Program Repair via Semantic Analysis”. In: Proceedings of the International Conference on Software Engineering. 2013." } }, { "@position" : "129", "rawText" : { "$" : "[129] H. H. Nguyen and M. Rinard. “Detecting and Eliminating Memory Leaks Using Cyclic Memory Allocation”. In: Proceedings of the 6th International Symposium on Memory Management. 2007, pp. 15-30." } }, { "@position" : "130", "rawText" : { "$" : "[130] M. Nica, S. Nica, and F. Wotawa. “On the Use of Mutations and Testing for Debugging”. In: Software: practice and experience 43.9 (2013), pp. 1121-1142." } }, { "@position" : "131", "rawText" : { "$" : "[131] G. Novark, E. Berger, and B. Zorn. “Exterminator: Automatically Correcting Memory Errors with High Probability”. In: Acm sigplan notices 42.6 (2007), pp. 1-11." } }, { "@position" : "132", "rawText" : { "$" : "[132] V. Oliveira, E. Souza, C. Le Goues, and C. G. Camilo. “Improved Crossover Operators for Genetic Programming for Program Repair”. In: Proceedings of the 8th international symposium on search based software engineering. 2016." } }, { "@position" : "133", "rawText" : { "$" : "[133] Y. Padioleau, J. Lawall, R. Hansen, and G. Muller. “Documenting and Automating Collateral Evolutions in Linux Device Drivers”. In: Acm sigops operating systems review 42.4 (2008), pp. 247-260." } }, { "@position" : "134", "rawText" : { "$" : "[134] J. H. Perkins, G. Sullivan, W.-F. Wong, Y. Zibin, M. D. Ernst, M. Rinard, S. Kim, S. Larsen, S. Amarasinghe, J. Bachrach, M. Carbin, C. Pacheco, F. Sherwood, and S. Sidiroglou. “Automatically Patching Errors in Deployed Software”. In: Proceedings of the Symposium on Operating Systems Principles (2009), p. 87." } }, { "@position" : "135", "rawText" : { "$" : "[135] B. Pernici and A. M. Rosati. “Automatic Learning of Repair Strategies for Web Services”. In: Proceedings of the Fifth European Conference on Web Services. 2007, pp. 119-128." }, "id" : { "@value" : "doi_________::2d71ded40760d2ffa471bd4ef19231bf", "@type" : "openaire", "@trustLevel" : "0.6622441" } }, { "@position" : "136", "rawText" : { "$" : "[136] M. Pezzè, M. C. Rinard, W. Weimer, and A. Zeller. Self-Repairing Programs, Report From Dagstuhl Seminar. Tech. rep. 11062. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2011." } }, { "@position" : "137", "rawText" : { "$" : "[137] Y. Qi, X. Mao, and Y. Lei. “Efficient Automated Program Repair Through FaultRecorded Testing Prioritization”. In: Proceedings of ICSM. 2013." } }, { "@position" : "138", "rawText" : { "$" : "[138] Y. Qi, X. Mao, and Y. Lei. “Program Repair As Sound Optimization of Broken Programs”. In: International Symposium on Theoretical Aspects of Software Engineering. 2009." } }, { "@position" : "139", "rawText" : { "$" : "[139] Y. Qi, X. Mao, Y. Lei, Z. Dai, and C. Wang. “The Strength of Random Search on Automated Program Repair”. In: Proceedings of the 36th International Conference on Software Engineering. 2014, pp. 254-265." } }, { "@position" : "140", "rawText" : { "$" : "[140] Z. Qi, F. Long, S. Achour, and M. Rinard. “An Analysis of Patch Plausibility and Correctness for Generate-And-Validate Patch Generation Systems”. In: Proceedings of ISSTA. 2015." } }, { "@position" : "141", "rawText" : { "$" : "[141] F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou. “Rx: Treating Bugs As Allergies-a Safe Method to Survive Software Failures”. In: Acm sigops operating systems review 39.5 (2005), pp. 235-248." } }, { "@position" : "142", "rawText" : { "$" : "[142] B. Randell. “System Structure for Software Fault Tolerance”. In: Ieee transactions on software engineering 2 (1975), pp. 220-232." }, "id" : { "@value" : "doi_________::265e575335f9998cf7b95357b2904db2", "@type" : "openaire", "@trustLevel" : "0.7009199" } }, { "@position" : "143", "rawText" : { "$" : "[143] M. Rinard, C. Cadar, D. Dumitran, D. Roy, T. Leu, and W. Beebee Jr. “Enhancing Server Availability and Security Through Failure-oblivious Computing”. In: Proceedings of the 6th Conference on Symposium on Operating Systems, Design & Implementation. 2004, pp. 21-21." } }, { "@position" : "144", "rawText" : { "$" : "[144] M. Rinard, M. Ernst, and J. Perkins. Collaborative Learning for Security and Repair in Application Communities. Tech. rep. Massachusetts Institute of Technology, 2011." } }, { "@position" : "145", "rawText" : { "$" : "[145] M. Rinard. “Acceptability-oriented Computing”. In: Acm sigplan notices 38.12 (2003), pp. 57-75." }, "id" : { "@value" : "doi_________::bffaa22ee4c97423c1326667eb32d531", "@type" : "openaire", "@trustLevel" : "0.68851733" } }, { "@position" : "146", "rawText" : { "$" : "[146] M. C. Rinard. Survival Techniques for Computer Programs. Tech. rep. MIT, 2006." } }, { "@position" : "147", "rawText" : { "$" : "[147] M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, and T. Leu. “A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)”. In: Proceedings of the 20th Annual Computer Security Applications Conference. 2004, pp. 82-90." } }, { "@position" : "148", "rawText" : { "$" : "[148] J. Rohr. “STAREX Self-repair Routines: Software Recovery in the JPL-STAR Computer”. In: Proceedings of FTCS. 1973." } }, { "@position" : "149", "rawText" : { "$" : "[149] R. Samanta, O. Olivo, and E. A. Emerson. “Cost-aware Automatic Program Repair”. In: International static analysis symposium. Springer. 2014, pp. 268-284." } }, { "@position" : "150", "rawText" : { "$" : "[150] H. Samimi, M. Schäfer, S. Artzi, T. D. Millstein, F. Tip, and L. J. Hendren. “Automated Repair of HTML Generation Errors in PHP Applications Using String Constraint Solving”. In: Proceedings of ICSE. 2012, pp. 277-287." } }, { "@position" : "151", "rawText" : { "$" : "[151] E. Schulte, S. Forrest, and W. Weimer. “Automated Program Repair Through the Evolution of Assembly Code”. In: Proceedings of the IEEE/ACM International Conference on Automated Software Engineering. 2010, pp. 313-316." } }, { "@position" : "152", "rawText" : { "$" : "[152] A. Sethi et al. “A Survey of Fault Localization Techniques in Computer Networks”. In: Science of computer programming 53.2 (2004), pp. 165-194." }, "id" : { "@value" : "core_ac_uk__::06fb1e690cfcc685a35abf56d4e29a48", "@type" : "openaire", "@trustLevel" : "0.6542762" } }, { "@position" : "153", "rawText" : { "$" : "[153] A. Shaw, D. Doggett, and M. Hafiz. “Automatically Fixing C Buffer Overflows Using Program Transformations”. In: International Conference on Dependable Systems and Networks. 2014, pp. 124-135." } }, { "@position" : "154", "rawText" : { "$" : "[154] M. Shaw. “Self-healing: Softening Precision to Avoid Brittleness”. In: Proceedings of the First Workshop on Self-healing Systems. 2002, pp. 111-114." } }, { "@position" : "155", "rawText" : { "$" : "[155] S. Sicard, F. Boyer, and N. De Palma. “Using Components for Architecture-based Management: the Self-repair Case”. In: Proceedings of the 30th International Conference on Software Engineering. 2008, pp. 101-110." } }, { "@position" : "156", "rawText" : { "$" : "[156] S. Sidiroglou and A. Keromytis. “Countering Network Worms Through Automatic Patch Generation”. In: Security & privacy 3.6 (2005), pp. 41-49." } }, { "@position" : "157", "rawText" : { "$" : "[157] S. Sidiroglou, O. Laadan, C. Perez, N. Viennot, J. Nieh, and A. Keromytis. “Assure: Automatic Software Self-healing Using Rescue Points”. In: Acm sigplan notices 44.3 (2009), pp. 37-48." } }, { "@position" : "158", "rawText" : { "$" : "[158] S. Sidiroglou, M. Locasto, S. Boyd, and A. Keromytis. “Building a Reactive Immune System for Software Services”. In: Proceedings of the USENIX Annual Technical Conference. Vol. 161. 2005." }, "id" : { "@value" : "doi_________::5d0807395219894b44b9153330b32a0d", "@type" : "openaire", "@trustLevel" : "0.6067748" } }, { "@position" : "159", "rawText" : { "$" : "[159] S. Sidiroglou-Douskos, E. Lahtinen, F. Long, and M. Rinard. “Automatic Error Elimination by Horizontal Code Transfer Across Multiple Applications”. In: Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation. 2015, pp. 43-54." }, "id" : { "@value" : "doi_________::e495eb0ff86f5eb4d9e0e20a871c0e00", "@type" : "openaire", "@trustLevel" : "0.6810099" } }, { "@position" : "160", "rawText" : { "$" : "[160] S. Sidiroglou-Douskos, S. Misailovic, H. Hoffmann, and M. Rinard. “Managing Performance Vs. Accuracy Trade-offs with Loop Perforation”. In: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering. 2011, pp. 124-134." }, "id" : { "@value" : "doi_________::8abf90b4cccb7108a46f60ab0cc9a4d2", "@type" : "openaire", "@trustLevel" : "0.688946" } }, { "@position" : "161", "rawText" : { "$" : "[161] J. Silva. “A Survey on Algorithmic Debugging Strategies”. In: Advances in engineering software 42.11 (2011), pp. 976-991." } }, { "@position" : "162", "rawText" : { "$" : "[162] M. A. A. da Silva, A. Mougenot, X. Blanc, and R. Bendraou. “Towards Automated Inconsistency Handling in Design Models”. In: Proceedings of the 22nd International Conference on Advanced Information Systems Engineering. 2010, pp. 348-362." } }, { "@position" : "163", "rawText" : { "$" : "[163] R. Singh, S. Gulwani, and A. Solar-Lezama. “Automated Feedback Generation for Introductory Programming Assignments”. In: ACM SIGPLAN Notices. Vol. 48. 6. 2013, pp. 15-26." }, "id" : { "@value" : "core_ac_uk__::1ddb459a7dd1dcbd334e1e499aad44a3", "@type" : "openaire", "@trustLevel" : "0.6201375" } }, { "@position" : "164", "rawText" : { "$" : "[164] A. Smirnov and T. Chiueh. “DIRA: Automatic Detection, Identification, and Repair of Control-hijacking Attacks”. In: The 12th Annual Network and Distributed System Security Symposium. 2005." } }, { "@position" : "165", "rawText" : { "$" : "[165] E. K. Smith, E. Barr, C. Le Goues, and Y. Brun. “Is the Cure Worse Than the Disease? Overfitting in Automated Program Repair”. In: Proceedings of the 10th Joint Meeting of the European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE). 2015." } }, { "@position" : "166", "rawText" : { "$" : "[166] A. Somayaji, S. Hofmeyr, and S. Forrest. “Principles of a Computer Immune System”. In: Proceedings of the 1997 Workshop on New Security Paradigms. 1998, pp. 75-82." } }, { "@position" : "167", "rawText" : { "$" : "[167] S. Son, K. S. McKinley, and V. Shmatikov. “Fix Me Up: Repairing Access-Control Bugs in Web Applications.” In: Proceedings of the Network and Distributed System Security Symposium. 2013." } }, { "@position" : "168", "rawText" : { "$" : "[168] H. Sözer, B. Tekinerdoğan, and M. Akşit. “FLORA: a Framework for Decomposing Software Architecture to Introduce Local Recovery”. In: Software: practice and experience 39.10 (2009), pp. 869-889." }, "id" : { "@value" : "dris___02403::8da03926fa2fe2d1661efec2a1289aab", "@type" : "openaire", "@trustLevel" : "0.7063425" } }, { "@position" : "169", "rawText" : { "$" : "[169] M. Staats, M. W. Whalen, and M. P. E. Heimdahl. “Programs, Tests, and Oracles: the Foundations of Testing Revisited”. In: Proceedings of the International Conference on Software Engineering. 2011, pp. 391-400." }, "id" : { "@value" : "od______2658::42c4de37eec902824c6f729b200a4560", "@type" : "openaire", "@trustLevel" : "0.7283477" } }, { "@position" : "170", "rawText" : { "$" : "[170] M. Stumptner and F. Wotawa. “A Model-based Approach to Software Debugging”. In: Proceedings on the Seventh International Workshop on Principles of Diagnosis. 1996." } }, { "@position" : "171", "rawText" : { "$" : "[171] B. Sun, R. Chang, X. Chen, and A. Podgurski. “Automated Support for Propagating Bug Fixes”. In: Proceedings of the International Symposium on Software Reliability Engineering. 2008, pp. 187-196." } }, { "@position" : "172", "rawText" : { "$" : "[172] B. Sun, G. Shu, A. Podgurski, S. Li, S. Zhang, and J. Yang. “Propagating Bug Fixes with Fast Subgraph Matching”. In: Proceedings of the International Symposium on Software Reliability Engineering. 2010, pp. 21-30." } }, { "@position" : "173", "rawText" : { "$" : "[173] G. J. Sussman. Building Robust Systems An Essay. 2007." } }, { "@position" : "174", "rawText" : { "$" : "[174] S. Tallam, C. Tian, R. Gupta, and X. Zhang. “Avoiding Program Failures Through Safe Execution Perturbations”. In: International Conference on Computer Software and Applications. 2008." }, "id" : { "@value" : "doi_________::3379f8dc9a918e60ef40c0beb473885f", "@type" : "openaire", "@trustLevel" : "0.6666087" } }, { "@position" : "175", "rawText" : { "$" : "[175] S. H. Tan and A. Roychoudhury. “Relifix: Automated Repair of Software Regressions”. In: Proceedings of ICSE. 2015." } }, { "@position" : "176", "rawText" : { "$" : "[176] Y. Tao, J. Kim, S. Kim, and C. Xu. “Automatically Generated Patches As Debugging Aids: a Human Study”. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. 2014, pp. 64-74." } }, { "@position" : "177", "rawText" : { "$" : "[177] S. Thomas and L. Williams. “Using Automated Fix Generation to Secure SQL Statements”. In: Proceedings of the Third International Workshop on Software Engineering for Secure Systems. 2007, p. 9." } }, { "@position" : "178", "rawText" : { "$" : "[178] W. Torres-Pomales et al. Software Fault Tolerance: a Tutorial. Tech. rep. NASA2000-tm210616. NASA, 2000." } }, { "@position" : "179", "rawText" : { "$" : "[179] J. Tran, M. Godfrey, E. Lee, and R. Holt. “Architectural Repair of Open Source Software”. In: Proceedings of the International Workshop on Program Comprehension. 2000, pp. 48-59." } }, { "@position" : "180", "rawText" : { "$" : "[180] K. Tsipenyuk, B. Chess, and G. McGraw. “Seven Pernicious Kingdoms: a Taxonomy of Software Security Errors”. In: Security & privacy 3.6 (2005), pp. 81-84." } }, { "@position" : "181", "rawText" : { "$" : "[181] F. Wang and C.-H. Cheng. “Program Repair Suggestions From Graphical StateTransition Specifications”. In: Proceedings of FORTE 2008. 2008." } }, { "@position" : "182", "rawText" : { "$" : "[182] T. Wang, C. Song, and W. Lee. “Diagnosis and Emergency Patch Generation for Integer Overflow Exploits”. In: Detection of Intrusions and Malware, and Vulnerability Assessment. 2014, pp. 255-275." } }, { "@position" : "183", "rawText" : { "$" : "[183] X. Wang, L. Zhang, T. Xie, Y. Xiong, and H. Mei. “Automating presentation changes in dynamic web applications via collaborative hybrid analysis”. In: Proceedings of the acm sigsoft international symposium on the foundations of software engineering. ACM. 2012, p. 16." } }, { "@position" : "184", "rawText" : { "$" : "[184] Y. Wang, Y. Huang, and C. Kintala. “Progressive Retry for Software Failure Recovery in Message-passing Applications”. In: Ieee transactions on computers 46.10 (1997), pp. 1137-1141." } }, { "@position" : "185", "rawText" : { "$" : "[185] Y. Wei, Y. Pei, C. A. Furia, L. S. Silva, S. Buchholz, B. Meyer, and A. Zeller. “Automated Fixing of Programs with Contracts”. In: Proceedings of the International Symposium on Software Testing and Analysis. 2010." } }, { "@position" : "186", "rawText" : { "$" : "[186] W. Weimer, T. Nguyen, C. Le Goues, and S. Forrest. “Automatically Finding Patches Using Genetic Programming”. In: Proceedings of the International Conference on Software Engineering. 2009." } }, { "@position" : "187", "rawText" : { "$" : "[187] W. Weimer. “Patches As Better Bug Reports”. In: Proceedings of the International Conference on Generative Programming and Component Engineering. 2006." } }, { "@position" : "188", "rawText" : { "$" : "[188] W. Weimer, S. Forrest, C. Le Goues, and T. Nguyen. “Automatic Program Repair with Evolutionary Computation”. In: Communications of the acm 53.5 (2010), p. 109." } }, { "@position" : "189", "rawText" : { "$" : "[189] W. Weimer, Z. P. Fry, and S. Forrest. “Leveraging program equivalence for adaptive program repair: models and first results”. In: International conference on automated software engineering. 2013, pp. 356-366." } }, { "@position" : "190", "rawText" : { "$" : "[190] W. Wong and V. Debroy. “A Survey on Software Fault Localization”. In: University of texas at dallas, tech. rep. utdcs-45-09 (2009)." } }, { "@position" : "191", "rawText" : { "$" : "[191] Y. Xiong, Z. Hu, H. Zhao, H. Song, M. Takeichi, and H. Mei. “Supporting Automatic Model Inconsistency Fixing”. In: 7th joint meeting of the european software engineering conference and the acm sigsoft symposium on the foundations of software engineering. ACM. 2009, pp. 315-324." } }, { "@position" : "192", "rawText" : { "$" : "[192] Y. Xiong, H. Zhang, A. Hubaux, S. She, J. Wang, and K. Czarnecki. “Range Fixes: Interactive Error Resolution for Software Configuration”. In: Ieee transactions on software engineering 41.6 (2015), pp. 603-619." } }, { "@position" : "193", "rawText" : { "$" : "[193] A. Zeller, Y. Wei, B. Meyer, M. Nordio, C. A. Furia, and Y. Pei. “Automated Fixing of Programs with Contracts”. In: Ieee transactions on software engineering 40.5 (2014), pp. 427-449." } }, { "@position" : "194", "rawText" : { "$" : "[194] X. Zhang, N. Gupta, and R. Gupta. “Locating Faults Through Automated Predicate Switching”. In: Proceedings of the 28th International Conference on Software Engineering. 2006, pp. 272-281." } }, { "@position" : "195", "rawText" : { "$" : "[195] Y. Zhang and Y. Ding. “CTL Model Update for System Modifications”. In: Journal of artificial intelligence research 31.1 (2008), pp. 113-155." } }, { "@position" : "196", "rawText" : { "$" : "[196] H. Zhong and Z. Su. “An Empirical Study on Real Bug Fixes”. In: Proceedings of the 37th International Conference on Software Engineering. 2015." } }, { "@position" : "197", "rawText" : { "$" : "[197] F. Zhou, J. Condit, Z. Anderson, I. Bagrak, R. Ennals, M. Harren, G. Necula, and E. Brewer. “SafeDrive: Safe and Recoverable Extensions Using Language-based Techniques”. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation. 2006, pp. 45-60." } } ] } }, { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "[1] R. Abraham and M. Erwig. “Goal-Directed Debugging of Spreadsheets”. In: Proceedings of the 2005 IEEE Symposium on Visual Languages and Human-Centric Computing. 2005, pp. 37-44." } }, { "@position" : "2", "rawText" : { "$" : "[2] E. Aftandilian, R. Sauciuc, S. Priya, and S. Krishnan. “Building Useful Program Analysis Tools Using An Extensible Java Compiler”. In: International Working Conference on Source Code Analysis and Manipulation (SCAM). 2012, pp. 14-23." } }, { "@position" : "3", "rawText" : { "$" : "[3] P. E. Ammann and J. C. Knight. “Data Diversity: An Approach to Software Fault Tolerance”. In: Ieee transactions on computers 37.4 (1988), pp. 418-425." } }, { "@position" : "4", "rawText" : { "$" : "[4] J. Andersen and J. L. Lawall. “Generic Patch Inference”. In: Automated software engineering 17.2 (2010), pp. 119-148." }, "id" : { "@value" : "doi_________::61a2268b8ef05235ab26bf7f86a575b8", "@type" : "openaire", "@trustLevel" : "0.6860426" } }, { "@position" : "5", "rawText" : { "$" : "[5] A. Arcuri. “Automatic Software Generation and Improvement Through Search Based Techniques”. PhD thesis. The University of Birmingham, 2009." } }, { "@position" : "6", "rawText" : { "$" : "[6] A. Arcuri. “Evolutionary Repair of Faulty Software”. In: Applied soft computing 11.4 (2011), pp. 3494-3514." } }, { "@position" : "7", "rawText" : { "$" : "[7] A. Arcuri and X. Yao. “A Novel Co-evolutionary Approach to Automatic Software Bug Fixing”. In: Proceedings of the IEEE Congress on Evolutionary Computation. 2008, pp. 162-168." } }, { "@position" : "8", "rawText" : { "$" : "[8] A. Avizienis. “The N-version Approach to Fault-tolerant Software”. In: Ieee transactions on software engineering 11.12 (1985), pp. 1491-1501." }, "id" : { "@value" : "doi_________::cdc8356ee2e21ef9bcac6c9fb2cb0d63", "@type" : "openaire", "@trustLevel" : "0.6642342" } }, { "@position" : "9", "rawText" : { "$" : "[9] A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. “Basic Concepts and Taxonomy of Dependable and Secure Computing”. In: Ieee transactions on dependable and secure computing 1.1 (2004), pp. 11-33." } }, { "@position" : "10", "rawText" : { "$" : "[10] T. Azim, I. Neamtiu, and L. Marvel. “Towards Self-healing Smartphone Software via Automated Patching”. In: Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering. 2014, pp. 623-628." }, "id" : { "@value" : "doi_________::d712ef4e8d4ec5be89f3dcab74866c56", "@type" : "openaire", "@trustLevel" : "0.61199635" } }, { "@position" : "11", "rawText" : { "$" : "[11] E. T. Barr, Y. Brun, P. T. Devanbu, M. Harman, and F. Sarro. “The Plastic Surgery Hypothesis”. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. 2014, pp. 306-317." } }, { "@position" : "12", "rawText" : { "$" : "[12] E. Barr, M. Harman, P. McMinn, M. Shahbaz, and S. Yoo. “The Oracle Problem in Software Testing: a Survey”. In: Ieee transactions on software engineering 41.5 (2015), pp. 507-525." }, "id" : { "@value" : "od_______322::8a2eb300b73cf67f9060f8acb68f582d", "@type" : "openaire", "@trustLevel" : "0.6956351" } }, { "@position" : "13", "rawText" : { "$" : "[13] E. D. Berger and B. G. Zorn. “DieHard: Probabilistic Memory Safety for Unsafe Languages”. In: Acm sigplan notices 41.6 (2006), pp. 158-168." } }, { "@position" : "14", "rawText" : { "$" : "[14] R. Bodik and B. Jobstmann. “Algorithmic Program Synthesis: Introduction”. In: International journal on software tools for technology transfer 15.5 (2013), pp. 397- 411." } }, { "@position" : "15", "rawText" : { "$" : "[15] M. Brodie, S. Ma, G. Lohman, L. Mignet, M. Wilding, J. Champlin, and P. Sohn. “Quickly Finding Known Software Problems via Automated Symptom Matching”. In: Proceedings of the International Conference on Autonomic Computing. 2005, pp. 101-110." } }, { "@position" : "16", "rawText" : { "$" : "[16] Y. Brun, E. Barr, M. Xiao, C. Le Goues, and P. Devanbu. Evolution Vs. Intelligent Design in Program Patching. Tech. rep. UC Davis, 2013." } }, { "@position" : "17", "rawText" : { "$" : "[17] Y. Cai and L. Cao. “Fixing Deadlocks via Lock Pre-acquisitions”. In: Proceedings of the 38th international conference on software engineering. ACM. 2016, pp. 1109- 1120." } }, { "@position" : "18", "rawText" : { "$" : "[18] G. Candea and A. Fox. “Crash-only Software”. In: Proceedings of the 9th Conference on Hot Topics in Operating Systems. 2003, pp. 12-12." } }, { "@position" : "19", "rawText" : { "$" : "[19] G. Candea and A. Fox. “Recursive Restartability: Turning the Reboot Sledgehammer Into a Scalpel”. In: Proceedings of the 8th Workshop on Hot Topics in Operating Systems. 2001, pp. 125-130." } }, { "@position" : "20", "rawText" : { "$" : "[20] G. Candea, E. Kiciman, S. Zhang, P. Keyani, and A. Fox. “JAGR: An Autonomous Self-recovering Application Server”. In: Proceedings of the Workshop on Active Middleware Services. 2003, pp. 168-177." } }, { "@position" : "21", "rawText" : { "$" : "[21] G. Candea, S. Kawamoto, Y. Fujiki, G. Friedman, and A. Fox. “Microreboot: a Technique for Cheap Recovery”. In: Proceedings of the 6th Conference on Symposium on Operating Systems Design & Implementation. 2004, pp. 3-3." } }, { "@position" : "22", "rawText" : { "$" : "[22] M. Carbin, S. Misailovic, M. Kling, and M. C. Rinard. “Detecting and Escaping Infinite Loops with Jolt”. In: Procceedings of ECOOP. 2011, pp. 609-633." }, "id" : { "@value" : "od________88::c094ddae3d97799f82f7b81ed61b428d", "@type" : "openaire", "@trustLevel" : "0.6704617" } }, { "@position" : "23", "rawText" : { "$" : "[23] A. Carzaniga, A. Gorla, A. Mattavelli, N. Perino, and M. Pezzè. “Automatic Recovery From Runtime Failures”. In: Proceedings of the International Conference on Software Engineering. 2013." }, "id" : { "@value" : "erc_________::a644ed3d5d0bf211431055edec3a2edf", "@type" : "openaire", "@trustLevel" : "0.70273936" } }, { "@position" : "24", "rawText" : { "$" : "[24] A. Carzaniga, A. Gorla, N. Perino, and M. Pezzè. “Automatic Workarounds for Web Applications”. In: Proceedings of the Foundations of Software Engineering Conference. 2010, pp. 237-246." }, "id" : { "@value" : "doi_________::3ba8db866f56f3a0e66ac3068786c073", "@type" : "openaire", "@trustLevel" : "0.6666673" } }, { "@position" : "25", "rawText" : { "$" : "[25] S. Chandra, E. Torlak, S. Barman, and R. Bodik. “Angelic Debugging”. In: Proceeding of the International Conference on Software Engineering. 2011, pp. 121-130." } }, { "@position" : "26", "rawText" : { "$" : "[26] S.-W. Cheng, D. Garlan, B. R. Schmerl, J. P. Sousa, B. Spitnagel, and P. Steenkiste. “Using Architectural Style As a Basis for System Self-repair”. In: Proceedings of the IFIP 17th World Computer Congress / 3rd IEEE/IFIP Conference on Software Architecture: System Design, Development and Maintenance. 2002, pp. 45-59." } }, { "@position" : "27", "rawText" : { "$" : "[27] Z. Coker and M. Hafiz. “Program Transformations to Fix C Integers”. In: Proceedings of the International Conference on Software Engineering. 2013, pp. 792-801." } }, { "@position" : "28", "rawText" : { "$" : "[28] B. Cornu, L. Seinturier, and M. Monperrus. “Exception Handling Analysis and Transformation Using Fault Injection: Study of Resilience Against Unanticipated Exceptions”. In: Information and Software Technology 57 (2015), pp. 66-76." }, "id" : { "@value" : "doi_________::7f2c9178211b4d9123bf9d0d238d3ea8", "@type" : "openaire", "@trustLevel" : "0.69015485" } }, { "@position" : "29", "rawText" : { "$" : "[29] M. Costa, J. Crowcroft, M. Castro, A. Rowstron, L. Zhou, L. Zhang, and P. Barham. “Vigilante: End-to-end Containment of Internet Worms”. In: ACM SIGOPS Operating Systems Review. Vol. 39. 5. 2005, pp. 133-147." } }, { "@position" : "30", "rawText" : { "$" : "[30] V. Dallmeier, A. Zeller, and B. Meyer. “Generating Fixes From Object Behavior Anomalies”. In: Proceedings of the International Conference on Automated Software Engineering. 2009." }, "id" : { "@value" : "doi_________::d9ac7ad5a76f49bacb512cbc80e9accc", "@type" : "openaire", "@trustLevel" : "0.6434098" } }, { "@position" : "31", "rawText" : { "$" : "[31] B. Daniel, V. Jagannath, D. Dig, and D. Marinov. “ReAssert: Suggesting Repairs for Broken Unit Tests”. In: Proceedings of the 24th IEEE/ACM International Conference on Automated Software Engineering. 2009, pp. 433-444." } }, { "@position" : "32", "rawText" : { "$" : "[32] L. D'Antoni, R. Samanta, and R. Singh. “Qlose: Program Repair with Quantitative Objectives”. In: International conference on computer aided verification. Springer. 2016, pp. 383-401." } }, { "@position" : "33", "rawText" : { "$" : "[33] V. Debroy and W. Wong. “Using Mutation to Automatically Suggest Fixes for Faulty Programs”. In: Proceedings of the International Conference on Software Testing, Verification and Validation. 2010, pp. 65-74." } }, { "@position" : "34", "rawText" : { "$" : "[34] F. DeMarco, J. Xuan, D. Le Berre, and M. Monperrus. “Automatic Repair of Buggy If Conditions and Missing Preconditions with SMT”. In: Proceedings of the 6th international workshop on constraints in software testing, verification, and analysis (cstva 2014). 2014." } }, { "@position" : "35", "rawText" : { "$" : "[35] B. Demsky and M. Rinard. “Automatic Detection and Repair of Errors in Data Structures”. In: Acm sigplan notices 38.11 (2003), pp. 78-95." }, "id" : { "@value" : "doi_________::831ce490dd2b26b411d0a3dfad3192c0", "@type" : "openaire", "@trustLevel" : "0.6797866" } }, { "@position" : "36", "rawText" : { "$" : "[36] B. Demsky and A. Dash. “Bristlecone: a Language for Robust Software Systems”. In: Proceedings of ECOOP. 2008, pp. 490-515." }, "id" : { "@value" : "doi_________::3cdeb8c61016145a5f1f9ffded00cf5f", "@type" : "openaire", "@trustLevel" : "0.65308636" } }, { "@position" : "37", "rawText" : { "$" : "[37] G. Denaro, M. Pezzè, and D. Tosi. “Ensuring Interoperable Service-oriented Systems Through Engineered Self-healing”. In: Proceedings of the 7th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering. 2009, pp. 253-262." }, "id" : { "@value" : "od______1299::d88b26167c1fc51ae91d2750dec1cb80", "@type" : "openaire", "@trustLevel" : "0.67078865" } }, { "@position" : "38", "rawText" : { "$" : "[38] L. A. Dennis, R. Monroy, and P. Nogueira. “Proof-directed Debugging and Repair”. In: Seventh Symposium on Trends in Functional Programming. 2006, pp. 131-140." } }, { "@position" : "39", "rawText" : { "$" : "[39] A. Dhar, R. Purandare, M. Dhawan, and S. Rangaswamy. “CLOTHO: Saving Programs from Malformed Strings and Incorrect String-handling”. In: Foundations of software engineering. ACM. 2015, pp. 555-566." }, "id" : { "@value" : "doi_________::bb0b5a79cc6ce658c7b653d02eb825ed", "@type" : "openaire", "@trustLevel" : "0.6466234" } }, { "@position" : "40", "rawText" : { "$" : "[40] K. Dobolyi and W. Weimer. “Changing Java's Semantics for Handling Null Pointer Exceptions”. In: 19th International Symposium on Software Reliability Engineering. 2008, pp. 47-56." }, "id" : { "@value" : "doi_________::94c20394972b238b716eaf27a21aa995", "@type" : "openaire", "@trustLevel" : "0.6879837" } }, { "@position" : "41", "rawText" : { "$" : "[41] J. Duraes and H. Madeira. “Emulation of Software Faults: a Field Data Study and a Practical Approach”. In: Ieee transactions on software engineering 32.11 (2006), pp. 849-867." }, "id" : { "@value" : "doi_________::de928d93db7d4cc0a0f10e4a39e7751f", "@type" : "openaire", "@trustLevel" : "0.6419633" } }, { "@position" : "42", "rawText" : { "$" : "[42] M. Eisenstadt. “My Hairiest Bug War Stories”. In: Communications of the acm 40.4 (1997), pp. 30-37." }, "id" : { "@value" : "doi_________::24d27bafdd755a229c6a8f8e46be25e6", "@type" : "openaire", "@trustLevel" : "0.6089758" } }, { "@position" : "43", "rawText" : { "$" : "[43] B. Elkarablieh, I. Garcia, Y. Suen, and S. Khurshid. “Assertion-based Repair of Complex Data Structures”. In: Proceedings of the Twenty-second IEEE/ACM International Conference on Automated Software Engineering. 2007, pp. 64-73." } }, { "@position" : "44", "rawText" : { "$" : "[44] H. ETO and K. Yoda. “Propolice: Improved Stacksmashing Attack Detection”. In: Ipsj sig notes 75 (2001), pp. 181-188." } }, { "@position" : "45", "rawText" : { "$" : "[45] S. Forrest, T. Nguyen, W. Weimer, and C. Le Goues. “A Genetic Programming Approach to Automated Software Repair”. In: Proceedings of the 11th Annual Conference on Genetic and Evolutionary Computation. 2009, pp. 947-954." } }, { "@position" : "46", "rawText" : { "$" : "[46] G. Friedrich, M. Fugini, E. Mussi, B. Pernici, and G. Tagni. “Exception Handling for Repair in Service-Based Processes”. In: Ieee transactions on software engineering 36.2 (2010), pp. 198-215." } }, { "@position" : "47", "rawText" : { "$" : "[47] Z. P. Fry, B. Landau, and W. Weimer. “A Human Study of Patch Maintainability”. In: Proceedings of the International Symposium on Software Testing and Analysis. 2012, pp. 177-187." } }, { "@position" : "48", "rawText" : { "$" : "[48] R. P. Gabriel and R. Goldman. “Conscientious Software”. In: Acm Sigplan Notices. Vol. 41. 10. 2006, pp. 433-450." } }, { "@position" : "49", "rawText" : { "$" : "[49] Q. Gao, Y. Xiong, Y. Mi, L. Zhang, W. Yang, Z. Zhou, B. Xie, and H. Mei. “Safe Memory-leak Fixing for C Programs”. In: Proceedings of the 37th International Conference on Software Engineering. 2015, pp. 459-470." } }, { "@position" : "50", "rawText" : { "$" : "[50] Q. Gao, H. Zhang, J. Wang, Y. Xiong, L. Zhang, and H. Mei. “Fixing Recurring Crash Bugs via Analyzing Q&A Sites”. In: Proceedings of the 30th ieee/acm international conference on automated software engineering. ACM, 2015." } }, { "@position" : "51", "rawText" : { "$" : "[51] Z. Gao, Z. Chen, Y. Zou, and A. Memon. “SITAR: GUI Test Script Repair”. In: Ieee transactions on software engineering (2015)." } }, { "@position" : "52", "rawText" : { "$" : "[52] D. Garlan, S.-W. Cheng, and B. Schmerl. “Increasing System Dependability Through Architecture-based Self-repair”. In: Architecting Dependable Systems. 2003, pp. 61- 89." }, "id" : { "@value" : "doi_________::d85625277be9d18e919bcb5b0e882cce", "@type" : "openaire", "@trustLevel" : "0.6333976" } }, { "@position" : "53", "rawText" : { "$" : "[53] B. J. Garvin, M. B. Cohen, and M. B. Dwyer. “Using Feature Locality: Can We Leverage History to Avoid Failures During Reconfiguration?” In: Proceedings of the 8th Workshop on Assurances for Self-adaptive Systems. 2011, pp. 24-33." } }, { "@position" : "54", "rawText" : { "$" : "[54] S. George, D. Evans, and S. Marchette. “A Biological Programming Model for SelfHealing”. In: Proceedings of SSRS. 2013." } }, { "@position" : "55", "rawText" : { "$" : "[55] D. Ghosh, R. Sharman, H. Raghav Rao, and S. Upadhyaya. “Self-healing Systems-survey and Synthesis”. In: Decision support systems 42.4 (2007), pp. 2164- 2185." } }, { "@position" : "56", "rawText" : { "$" : "[56] D. Gopinath, S. Khurshid, D. Saha, and S. Chandra. “Data-guided Repair of Selection Statements”. In: Proceedings of the 36th International Conference on Software Engineering. 2014, pp. 243-253." } }, { "@position" : "57", "rawText" : { "$" : "[57] D. Gopinath, M. Z. Malik, and S. Khurshid. “Specification-based Program Repair Using SAT”. In: Proceedings of the International Conference on Tools and Algorithms for the Construction and Analysis of Systems. 2011." } }, { "@position" : "58", "rawText" : { "$" : "[58] A. Griesmayer, R. Bloem, and B. Cook. “Repair of Boolean Programs with An Application to C”. In: Computer Aided Verification. 2006, pp. 358-371." }, "id" : { "@value" : "doi_________::548cdecf229ac417a54d97bd6927711e", "@type" : "openaire", "@trustLevel" : "0.6535551" } }, { "@position" : "59", "rawText" : { "$" : "[59] R. Gupta, S. Pal, A. Kanade, and S. Shevade. “DeepFix: Fixing Common C Language Errors by Deep Learning”. In: Proceedings of the aaai conference on artificial intelligence. 2017." } }, { "@position" : "60", "rawText" : { "$" : "[60] B. Hartmann, D. MacDougall, J. Brandt, and S. R. Klemmer. “What Would Other Programmers Do: Suggesting Solutions to Error Messages”. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. 2010, pp. 1019-1028." } }, { "@position" : "61", "rawText" : { "$" : "[61] H. He and N. Gupta. “Automated Debugging Using Path-Based Weakest Preconditions”. In: FASE. 2004, pp. 267-280." } }, { "@position" : "62", "rawText" : { "$" : "[62] P. Hosek and C. Cadar. “Safe Software Updates via Multi-version Execution”. In: Proceedings of the International Conference on Software Engineering. 2013, pp. 612- 621." }, "id" : { "@value" : "doi_________::95023b71791957385eba9b2bc7b6b0e5", "@type" : "openaire", "@trustLevel" : "0.77703565" } }, { "@position" : "63", "rawText" : { "$" : "[63] D. Hovemeyer and W. Pugh. “Finding Bugs Is Easy”. In: Acm sigplan notices 39.12 (2004)." }, "id" : { "@value" : "doi_________::98bdf4bc886d9538280ce8467742014f", "@type" : "openaire", "@trustLevel" : "0.68069535" } }, { "@position" : "64", "rawText" : { "$" : "[64] Y. Huang, C. Kintala, N. Kolettis, and N. Fulton. “Software Rejuvenation: Analysis, Module and Applications”. In: Proceedings of the International Symposium on FaultTolerant Computing. 1995, pp. 381-390." } }, { "@position" : "65", "rawText" : { "$" : "[65] D. Jackson and M. Vaziri. “Finding Bugs with a Constraint Solver”. In: Proceedings of the 2000 ACM SIGSOFT International Symposium on Software Testing and Analysis. 2000, pp. 14-25." } }, { "@position" : "66", "rawText" : { "$" : "[66] D. Jeffrey, M. Feng, N. Gupta, and R. Gupta. “BugFix: a Learning-based Tool to Assist Developers in Fixing Bugs”. In: ICPC. 2009, pp. 70-79." } }, { "@position" : "67", "rawText" : { "$" : "[67] D. Jeffrey, N. Gupta, and R. Gupta. “Fault Localization Using Value Replacement”. In: Proceedings of the International Symposium on Software Testing and Analysis. 2008, pp. 167-178." } }, { "@position" : "68", "rawText" : { "$" : "[68] S. Jha, S. Gulwani, S. A. Seshia, and A. Tiwari. “Oracle-guided Component-based Program Synthesis”. In: Proceedings of the International Conference on Software Engineering. Vol. 1. 2010, pp. 215-224." } }, { "@position" : "69", "rawText" : { "$" : "[69] M. Jiang, T. Y. Chen, F.-C. Kuo, D. Towey, and Z. Ding. “A Metamorphic Testing Approach for Supporting Program Repair without the Need for a Test Oracle”. In: Journal of systems and software (2016)." } }, { "@position" : "70", "rawText" : { "$" : "[70] G. Jin, L. Song, W. Zhang, S. Lu, and B. Liblit. “Automated Atomicity-violation Fixing”. In: Proceedings of the 32nd ACM SIGPLAN Conference on Programming Language Design and Implementation. 2011, pp. 389-400." } }, { "@position" : "71", "rawText" : { "$" : "[71] B. Jobstmann, A. Griesmayer, and R. Bloem. “Program Repair As a Game”. In: Computer Aided Verification. 2005, pp. 226-238." }, "id" : { "@value" : "doi_________::a0796bb2ee00e1738f887ecc5a129263", "@type" : "openaire", "@trustLevel" : "0.6640217" } }, { "@position" : "72", "rawText" : { "$" : "[72] H. Jula, D. Tralamazza, C. Zamfir, and G. Candea. “Deadlock Immunity: Enabling Systems to Defend Against Deadlocks”. In: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation. 2008, pp. 295-308." }, "id" : { "@value" : "snsf_p3_pubs::fb0b54b74e1cbedb111b95a531c14cf1", "@type" : "openaire", "@trustLevel" : "0.60978603" } }, { "@position" : "73", "rawText" : { "$" : "[73] S. Kaleeswaran, V. Tulsian, A. Kanade, and A. Orso. “Minthint: Automated Synthesis of Repair Hints”. In: Proceedings of the International Conference on Software Engineering. 2014, pp. 266-276." } }, { "@position" : "74", "rawText" : { "$" : "[74] S. Kalvala and R. Warburton. “A Formal Approach to Fixing Bugs”. In: Formal Methods, Foundations and Applications. 2011, pp. 172-187." }, "id" : { "@value" : "doi_________::d00dd2d207fdd41a5344650907ff0c85", "@type" : "openaire", "@trustLevel" : "0.67734885" } }, { "@position" : "75", "rawText" : { "$" : "[75] A. Kalyanpur, B. Parsia, E. Sirin, and B. Cuenca-Grau. “Repairing Unsatisfiable Concepts in OWL Ontologies”. In: The Semantic Web: Research and Applications. Vol. 4011. 2006, pp. 170-184." }, "id" : { "@value" : "od______3818::c7c5bc96ddfd02c346496e368c8db542", "@type" : "openaire", "@trustLevel" : "0.66630703" } }, { "@position" : "76", "rawText" : { "$" : "[76] M. Kasbekar, C. Narayanan, and C. Das. “Selective Checkpointing and Rollbacks in Multi-threaded Object-oriented Environment”. In: Ieee transactions on reliability 48.4 (1999), pp. 325-337." } }, { "@position" : "77", "rawText" : { "$" : "[77] Y. Ke, K. T. Stolee, C. Le Goues, and Y. Brun. “Repairing Programs with Semantic Code Search”. In: Proceedings of the International Conference on Automated Software Engineering. 2015." } }, { "@position" : "78", "rawText" : { "$" : "[78] C. Kern and J. Esparza. “Automatic Error Correction of Java Programs”. In: Formal Methods for Industrial Critical Systems. 2010, pp. 67-81." } }, { "@position" : "79", "rawText" : { "$" : "[79] D. Kim, J. Nam, J. Song, and S. Kim. “Automatic Patch Generation Learned From Human-Written Patches”. In: Proceedings of ICSE. 2013." } }, { "@position" : "80", "rawText" : { "$" : "[80] E. Kneuss, M. Koukoutos, and V. Kuncak. “Deductive Program Repair”. In: International conference on computer aided verification. Springer. 2015, pp. 217-233." }, "id" : { "@value" : "doi_________::b9fabffd1bc6c55238a566f0d289f01c", "@type" : "openaire", "@trustLevel" : "0.6627885" } }, { "@position" : "81", "rawText" : { "$" : "[81] D. E. Knuth. “The Errors of TEX”. In: Softw., pract. exper. 19.7 (1989), pp. 607-685." } }, { "@position" : "82", "rawText" : { "$" : "[82] X. Kong, L. Zhang, W. E. Wong, and B. Li. “Experience report: how do techniques, programs, and tests impact automated program repair?” In: International symposium on software reliability engineering. IEEE. 2015, pp. 194-204." } }, { "@position" : "83", "rawText" : { "$" : "[83] R. Könighofer and R. Bloem. “Automated Error Localization and Correction for Imperative Programs”. In: Formal Methods in Computer-Aided Design (FMCAD), 2011. 2011, pp. 91-100." } }, { "@position" : "84", "rawText" : { "$" : "[84] R. Könighofer and R. Bloem. “Repair with On-the-fly Program Analysis”. In: Hardware and Software: Verification and Testing. 2013, pp. 56-71." }, "id" : { "@value" : "doi_________::436a81a296b9e029d48a820dfd54516b", "@type" : "openaire", "@trustLevel" : "0.6695329" } }, { "@position" : "85", "rawText" : { "$" : "[85] R. Koo and S. Toueg. “Checkpointing and Rollback-recovery for Distributed Systems”. In: Ieee transactions on software engineering 1 (1987), pp. 23-31." } }, { "@position" : "86", "rawText" : { "$" : "[86] M. Lake. Epic Failures: 11 Infamous Software Bugs. http://www.computerworld. com/article/2515483/enterprise- applications/epic- failures-- 11- infamous- softwarebugs.html. 2010." } }, { "@position" : "87", "rawText" : { "$" : "[87] J. L. Lawall, J. Brunel, N. Palix, R. R. Hansen, H. Stuart, and G. Muller. “WYSIWIB: a Declarative Approach to Finding API Protocols and Bugs in Linux Code”. In: International Conference on Dependable Systems & Networks. 2009, pp. 43-52." } }, { "@position" : "88", "rawText" : { "$" : "[88] N. Lazaar, A. Gotlieb, and Y. Lebbah. “A Framework for the Automatic Correction of Constraint Programs”. In: Proceedings of the International Conference on Software Testing, Verification and Validation. 2011, pp. 319-326." }, "id" : { "@value" : "doi_________::01f4566cd3c811cf918e796095b98159", "@type" : "openaire", "@trustLevel" : "0.67730725" } }, { "@position" : "89", "rawText" : { "$" : "[89] C. Le Goues, M. Dewey-Vogt, S. Forrest, and W. Weimer. “A Systematic Study of Automated Program Repair: Fixing 55 Out of 105 Bugs for $8 Each”. In: Proceedings of the International Conference on Software Engineering. 2012, pp. 3-13." } }, { "@position" : "90", "rawText" : { "$" : "[90] C. Le Goues, S. Forrest, and W. Weimer. “Current Challenges in Automatic Software Repair”. In: Software quality journal 21.3 (2013), pp. 421-443." }, "id" : { "@value" : "doi_________::9bc22c7f896fc815d34331fc8ca130ad", "@type" : "openaire", "@trustLevel" : "0.6842719" } }, { "@position" : "91", "rawText" : { "$" : "[91] C. Le Goues, N. Holtschulte, E. K. Smith, Y. Brun, P. Devanbu, S. Forrest, and W. Weimer. “The ManyBugs and IntroClass Benchmarks for Automated Repair of C Programs”. In: Ieee transactions on software engineering (tse), in press (2015)." }, "id" : { "@value" : "doi_________::cf3f3afaded86d7d82fb50ca40925607", "@type" : "openaire", "@trustLevel" : "0.62086505" } }, { "@position" : "92", "rawText" : { "$" : "[92] C. Le Goues, T. Nguyen, S. Forrest, and W. Weimer. “GenProg: a Generic Method for Automatic Software Repair”. In: Ieee transactions on software engineering 38 (2012), pp. 54-72." }, "id" : { "@value" : "doi_________::0061eafa8f13e1c2815be279e13c9f58", "@type" : "openaire", "@trustLevel" : "0.6592393" } }, { "@position" : "93", "rawText" : { "$" : "[93] X. B. D. Le, D. Lo, and C. L. Goues. “History Driven Program Repair”. In: Proceedings of the 23rd international conference on software analysis, evolution, and reengineering (saner). 2016, pp. 213-224." } }, { "@position" : "94", "rawText" : { "$" : "[94] M. Leotta, D. Clerissi, F. Ricca, and C. Spadaro. “Repairing Selenium Test Cases: an Industrial Case Study about Web Page Element Localization”. In: International conference on software testing, verification and validation. IEEE. 2013, pp. 487-488." }, "id" : { "@value" : "doi_________::80d6db949a21f0405a94330ae97a5028", "@type" : "openaire", "@trustLevel" : "0.67532986" } }, { "@position" : "95", "rawText" : { "$" : "[95] R. Levinson. “Unified Planning and Execution for Autonomous Software Repair”. In: Workshop on Plan Execution: a Reality Check. 2005." } }, { "@position" : "96", "rawText" : { "$" : "[96] C. Lewis and J. Whitehead. “Runtime Repair of Software Faults Using Event-driven Monitoring”. In: Proceedings of the 32nd acm/ieee international conference on software engineering - icse '10 2 (2010), p. 275." } }, { "@position" : "97", "rawText" : { "$" : "[97] Z. Liang and R. Sekar. “Fast and Automated Generation of Attack Signatures: a Basis for Building Self-protecting Servers”. In: Proceedings of the 12th ACM Conference on Computer and Communications Security. 2005, pp. 213-222." } }, { "@position" : "98", "rawText" : { "$" : "[98] Y. Lin and S. Kulkarni. “Automatic Repair for Multi-threaded Programs with Deadlock/Livelock Using Maximum Satisfiability”. In: Proceedings of the 2014 international symposium on software testing and analysis. ACM. 2014, pp. 237-247." } }, { "@position" : "99", "rawText" : { "$" : "[99] Z. Lin, X. Jiang, D. Xu, B. Mao, and L. Xie. “AutoPaG: Towards Automated Software Patch Generation with Source Code Root Cause Identification and Repair”. In: Proceedings of the 2nd ACM Symposium on Information, Computer and Communications Security. 2007, pp. 329-340." } }, { "@position" : "100", "rawText" : { "$" : "[100] C. Liu, J. Yang, L. Tan, and M. Hafiz. “R2Fix: Automatically Generating Bug Fixes From Bug Reports”. In: Proceedings of the International Conference on Software Testing, Verification and Validation (ICST). 2013, pp. 282-291." } }, { "@position" : "101", "rawText" : { "$" : "[101] H. Liu, Y. Chen, and S. Lu. “Understanding and Generating High Quality Patches for Concurrency bugs”. In: Proceedings of the 2016 24th acm sigsoft international symposium on foundations of software engineering. ACM. 2016, pp. 715-726." } }, { "@position" : "102", "rawText" : { "$" : "[102] P. Liu and C. Zhang. “Axis: Automatically Fixing Atomicity Violations Through Solving Control Constraints”. In: Proceedings of the 2012 International Conference on Software Engineering. 2012, pp. 299-309." } }, { "@position" : "103", "rawText" : { "$" : "[103] M. E. Locasto, S. Sidiroglou, and A. D. Keromytis. “Software Self-Healing Using Collaborative Application Communities”. In: Proceedings of the Network and Distributed System Security Symposium. 2006." }, "id" : { "@value" : "doi_________::6e539f0301aa67945ea78037c50f8cac", "@type" : "openaire", "@trustLevel" : "0.6636007" } }, { "@position" : "104", "rawText" : { "$" : "[104] F. Logozzo and T. Ball. “Modular and Verified Automatic Program Repair”. In: Proceedings of the 27th ACM International Conference on Object Oriented Programming Systems Languages and Applications. 2012." }, "id" : { "@value" : "doi_________::d4c79c47b10fe4a7677a642634719536", "@type" : "openaire", "@trustLevel" : "0.6743879" } }, { "@position" : "105", "rawText" : { "$" : "[105] F. Logozzo and M. Martel. “Automatic Repair of Overflowing Expressions with Abstract Interpretation”. In: Semantics, Abstract Interpretation, and Reasoning About Programs: Essays Dedicated to David A. Schmidt on the Occasion of His Sixtieth Birthday. Vol. 129. 2013, pp. 341-357." }, "id" : { "@value" : "arXiv_______::053a118d1a1e41678005a2da74b776e1", "@type" : "openaire", "@trustLevel" : "0.73015213" } }, { "@position" : "106", "rawText" : { "$" : "[106] F. Long, V. Ganesh, M. Carbin, S. Sidiroglou, and M. Rinard. “Automatic Input Rectification”. In: Proceedings of ICSE. 2012." } }, { "@position" : "107", "rawText" : { "$" : "[107] F. Long and M. C. Rinard. “Prophet: Automatic Patch Generation via Learning From Successful Patches”. In: Proceedings of the Symposium on Principles of Programming Languages. 2016." } }, { "@position" : "108", "rawText" : { "$" : "[108] F. Long and M. C. Rinard. “Staged Program Repair with Condition Synthesis”. In: Proceedings of ESEC/FSE. 2015." } }, { "@position" : "109", "rawText" : { "$" : "[109] F. Long, S. Sidiroglou-Douskos, D. Kim, and M. Rinard. “Sound Input Filter Generation for Integer Overflow Errors”. In: Acm sigplan notices 49.1 (2014), pp. 439- 452." } }, { "@position" : "110", "rawText" : { "$" : "[110] F. Long, S. Sidiroglou-Douskos, and M. C. Rinard. “Automatic Runtime Error Repair and Containment via Recovery Shepherding”. In: ACM SIGPLAN Conference on Programming Language Design and Implementation, 2014." }, "id" : { "@value" : "od________88::0be88c19cf018a64e73bc16f959a0eba", "@type" : "openaire", "@trustLevel" : "0.6835259" } }, { "@position" : "111", "rawText" : { "$" : "[111] M. Malik, J. Siddiqi, and S. Khurshid. “Constraint-Based Program Debugging Using Data Structure Repair”. In: International Conference on Software Testing, Verification and Validation (ICST). 2011, pp. 190-199." } }, { "@position" : "112", "rawText" : { "$" : "[112] S. L. Marcote and M. Monperrus. Automatic Repair of Infinite Loops. Tech. rep. 1504.05078. Arxiv, 2015." } }, { "@position" : "113", "rawText" : { "$" : "[113] M. Martinez, T. Durieux, R. Sommerard, J. Xuan, and M. Monperrus. “Automatic Repair of Real Bugs in Java: A Large-Scale Experiment on the Defects4J Dataset”. In: Springer empirical software engineering (2016)." } }, { "@position" : "114", "rawText" : { "$" : "[114] M. Martinez and M. Monperrus. “Mining Software Repair Models for Reasoning on the Search Space of Automated Program Fixing”. In: Empirical Software Engineering 20.1 (2013), pp. 176-205." }, "id" : { "@value" : "doi_________::20a481dc781e009ed40ab895ff4455b9", "@type" : "openaire", "@trustLevel" : "0.7182879" } }, { "@position" : "115", "rawText" : { "$" : "[115] M. Martinez, W. Weimer, and M. Monperrus. “Do the Fix Ingredients Already Exist? An Empirical Inquiry into the Redundancy Assumptions of Program Repair Approaches”. In: Proceedings of the international conference on software engineering, track on new ideas and emerging results. 2014." } }, { "@position" : "116", "rawText" : { "$" : "[116] S. Mechtaev, J. Yi, and A. Roychoudhury. “Angelix: Scalable Multiline Program Patch Synthesis via Symbolic Analysis”. In: Proceedings of the 38th international conference on software engineering. 2016, pp. 691-701." } }, { "@position" : "117", "rawText" : { "$" : "[117] S. Mechtaev, J. Yi, and A. Roychoudhury. “DirectFix: Looking for Simple Program Repairs”. In: Proceedings of the 37th International Conference on Software Engineering. 2015." } }, { "@position" : "118", "rawText" : { "$" : "[118] I. Medeiros, N. F. Neves, and M. Correia. “Automatic detection and correction of web application vulnerabilities using data mining to predict false positives”. In: Proceedings of the 23rd international conference on world wide web. ACM. 2014, pp. 63- 74." } }, { "@position" : "119", "rawText" : { "$" : "[119] A. M. Memon. “Automatically Repairing Event Sequence-based GUI Test Suites for Regression Testing”. In: Acm transactions on software engineering and methodology 18.2 (2008), p. 4." } }, { "@position" : "120", "rawText" : { "$" : "[120] N. Meng, M. Kim, and K. S. McKinley. “LASE: Locating and Applying Systematic Edits by Learning From Examples”. In: Proceedings of the International Conference on Software Engineering. 2013, pp. 502-511." } }, { "@position" : "121", "rawText" : { "$" : "[121] N. Meng, M. Kim, and K. S. McKinley. “Systematic Editing: Generating Program Transformations From An Example”. In: Proceedings of the 32Nd ACM SIGPLAN Conference on Programming Language Design and Implementation. 2011, pp. 329- 342." } }, { "@position" : "122", "rawText" : { "$" : "[122] M. G. Merideth. “Enhancing Survivability with Proactive Fault-containment”. In: The 2003 International Conference on Dependable Systems and Networks. 2003." } }, { "@position" : "123", "rawText" : { "$" : "[123] B. Meyer. “Applying 'design by Contract'”. In: Computer 25.10 (1992), pp. 40-51." } }, { "@position" : "124", "rawText" : { "$" : "[124] M. Monperrus. “A Critical Review of \"Automatic Patch Generation Learned from Human-Written Patches\": Essay on the Problem Statement and the Evaluation of Automatic Software Repair”. In: Proceedings of the international conference on software engineering. 2014, pp. 234-242." } }, { "@position" : "125", "rawText" : { "$" : "[125] M. Monperrus. Principles of antifragile software. Tech. rep. 1404.3056. Arxiv, 2014." } }, { "@position" : "126", "rawText" : { "$" : "[126] P. Muntean, V. K. Kommanapalli, A. Ibing, and C. Eckert. “Automated Generation of Buffer Overflows Quick Fixes Using Symbolic Execution and SMT”. In: International Conference on Computer Safety, Reliability & Security (SAFECOMP'15). 2015." } }, { "@position" : "127", "rawText" : { "$" : "[127] C. Nentwich, W. Emmerich, and A. Finkelstein. “Consistency Management with Repair Actions”. In: Proceedings of the 25th International Conference on Software Engineering. 2003, pp. 455-464." } }, { "@position" : "128", "rawText" : { "$" : "[128] H. D. T. Nguyen, D. Qi, A. Roychoudhury, and S. Chandra. “SemFix: Program Repair via Semantic Analysis”. In: Proceedings of the International Conference on Software Engineering. 2013." } }, { "@position" : "129", "rawText" : { "$" : "[129] H. H. Nguyen and M. Rinard. “Detecting and Eliminating Memory Leaks Using Cyclic Memory Allocation”. In: Proceedings of the 6th International Symposium on Memory Management. 2007, pp. 15-30." } }, { "@position" : "130", "rawText" : { "$" : "[130] M. Nica, S. Nica, and F. Wotawa. “On the Use of Mutations and Testing for Debugging”. In: Software: practice and experience 43.9 (2013), pp. 1121-1142." } }, { "@position" : "131", "rawText" : { "$" : "[131] G. Novark, E. Berger, and B. Zorn. “Exterminator: Automatically Correcting Memory Errors with High Probability”. In: Acm sigplan notices 42.6 (2007), pp. 1-11." } }, { "@position" : "132", "rawText" : { "$" : "[132] V. Oliveira, E. Souza, C. Le Goues, and C. G. Camilo. “Improved Crossover Operators for Genetic Programming for Program Repair”. In: Proceedings of the 8th international symposium on search based software engineering. 2016." } }, { "@position" : "133", "rawText" : { "$" : "[133] Y. Padioleau, J. Lawall, R. Hansen, and G. Muller. “Documenting and Automating Collateral Evolutions in Linux Device Drivers”. In: Acm sigops operating systems review 42.4 (2008), pp. 247-260." } }, { "@position" : "134", "rawText" : { "$" : "[134] J. H. Perkins, G. Sullivan, W.-F. Wong, Y. Zibin, M. D. Ernst, M. Rinard, S. Kim, S. Larsen, S. Amarasinghe, J. Bachrach, M. Carbin, C. Pacheco, F. Sherwood, and S. Sidiroglou. “Automatically Patching Errors in Deployed Software”. In: Proceedings of the Symposium on Operating Systems Principles (2009), p. 87." } }, { "@position" : "135", "rawText" : { "$" : "[135] B. Pernici and A. M. Rosati. “Automatic Learning of Repair Strategies for Web Services”. In: Proceedings of the Fifth European Conference on Web Services. 2007, pp. 119-128." }, "id" : { "@value" : "doi_________::2d71ded40760d2ffa471bd4ef19231bf", "@type" : "openaire", "@trustLevel" : "0.6622441" } }, { "@position" : "136", "rawText" : { "$" : "[136] M. Pezzè, M. C. Rinard, W. Weimer, and A. Zeller. Self-Repairing Programs, Report From Dagstuhl Seminar. Tech. rep. 11062. Schloss Dagstuhl - Leibniz-Zentrum für Informatik, 2011." } }, { "@position" : "137", "rawText" : { "$" : "[137] Y. Qi, X. Mao, and Y. Lei. “Efficient Automated Program Repair Through FaultRecorded Testing Prioritization”. In: Proceedings of ICSM. 2013." } }, { "@position" : "138", "rawText" : { "$" : "[138] Y. Qi, X. Mao, and Y. Lei. “Program Repair As Sound Optimization of Broken Programs”. In: International Symposium on Theoretical Aspects of Software Engineering. 2009." } }, { "@position" : "139", "rawText" : { "$" : "[139] Y. Qi, X. Mao, Y. Lei, Z. Dai, and C. Wang. “The Strength of Random Search on Automated Program Repair”. In: Proceedings of the 36th International Conference on Software Engineering. 2014, pp. 254-265." } }, { "@position" : "140", "rawText" : { "$" : "[140] Z. Qi, F. Long, S. Achour, and M. Rinard. “An Analysis of Patch Plausibility and Correctness for Generate-And-Validate Patch Generation Systems”. In: Proceedings of ISSTA. 2015." } }, { "@position" : "141", "rawText" : { "$" : "[141] F. Qin, J. Tucek, J. Sundaresan, and Y. Zhou. “Rx: Treating Bugs As Allergies-a Safe Method to Survive Software Failures”. In: Acm sigops operating systems review 39.5 (2005), pp. 235-248." } }, { "@position" : "142", "rawText" : { "$" : "[142] B. Randell. “System Structure for Software Fault Tolerance”. In: Ieee transactions on software engineering 2 (1975), pp. 220-232." }, "id" : { "@value" : "doi_________::265e575335f9998cf7b95357b2904db2", "@type" : "openaire", "@trustLevel" : "0.7009199" } }, { "@position" : "143", "rawText" : { "$" : "[143] M. Rinard, C. Cadar, D. Dumitran, D. Roy, T. Leu, and W. Beebee Jr. “Enhancing Server Availability and Security Through Failure-oblivious Computing”. In: Proceedings of the 6th Conference on Symposium on Operating Systems, Design & Implementation. 2004, pp. 21-21." } }, { "@position" : "144", "rawText" : { "$" : "[144] M. Rinard, M. Ernst, and J. Perkins. Collaborative Learning for Security and Repair in Application Communities. Tech. rep. Massachusetts Institute of Technology, 2011." } }, { "@position" : "145", "rawText" : { "$" : "[145] M. Rinard. “Acceptability-oriented Computing”. In: Acm sigplan notices 38.12 (2003), pp. 57-75." }, "id" : { "@value" : "doi_________::bffaa22ee4c97423c1326667eb32d531", "@type" : "openaire", "@trustLevel" : "0.68851733" } }, { "@position" : "146", "rawText" : { "$" : "[146] M. C. Rinard. Survival Techniques for Computer Programs. Tech. rep. MIT, 2006." } }, { "@position" : "147", "rawText" : { "$" : "[147] M. Rinard, C. Cadar, D. Dumitran, D. M. Roy, and T. Leu. “A Dynamic Technique for Eliminating Buffer Overflow Vulnerabilities (and Other Memory Errors)”. In: Proceedings of the 20th Annual Computer Security Applications Conference. 2004, pp. 82-90." } }, { "@position" : "148", "rawText" : { "$" : "[148] J. Rohr. “STAREX Self-repair Routines: Software Recovery in the JPL-STAR Computer”. In: Proceedings of FTCS. 1973." } }, { "@position" : "149", "rawText" : { "$" : "[149] R. Samanta, O. Olivo, and E. A. Emerson. “Cost-aware Automatic Program Repair”. In: International static analysis symposium. Springer. 2014, pp. 268-284." } }, { "@position" : "150", "rawText" : { "$" : "[150] H. Samimi, M. Schäfer, S. Artzi, T. D. Millstein, F. Tip, and L. J. Hendren. “Automated Repair of HTML Generation Errors in PHP Applications Using String Constraint Solving”. In: Proceedings of ICSE. 2012, pp. 277-287." } }, { "@position" : "151", "rawText" : { "$" : "[151] E. Schulte, S. Forrest, and W. Weimer. “Automated Program Repair Through the Evolution of Assembly Code”. In: Proceedings of the IEEE/ACM International Conference on Automated Software Engineering. 2010, pp. 313-316." } }, { "@position" : "152", "rawText" : { "$" : "[152] A. Sethi et al. “A Survey of Fault Localization Techniques in Computer Networks”. In: Science of computer programming 53.2 (2004), pp. 165-194." }, "id" : { "@value" : "core_ac_uk__::06fb1e690cfcc685a35abf56d4e29a48", "@type" : "openaire", "@trustLevel" : "0.6542762" } }, { "@position" : "153", "rawText" : { "$" : "[153] A. Shaw, D. Doggett, and M. Hafiz. “Automatically Fixing C Buffer Overflows Using Program Transformations”. In: International Conference on Dependable Systems and Networks. 2014, pp. 124-135." } }, { "@position" : "154", "rawText" : { "$" : "[154] M. Shaw. “Self-healing: Softening Precision to Avoid Brittleness”. In: Proceedings of the First Workshop on Self-healing Systems. 2002, pp. 111-114." } }, { "@position" : "155", "rawText" : { "$" : "[155] S. Sicard, F. Boyer, and N. De Palma. “Using Components for Architecture-based Management: the Self-repair Case”. In: Proceedings of the 30th International Conference on Software Engineering. 2008, pp. 101-110." } }, { "@position" : "156", "rawText" : { "$" : "[156] S. Sidiroglou and A. Keromytis. “Countering Network Worms Through Automatic Patch Generation”. In: Security & privacy 3.6 (2005), pp. 41-49." } }, { "@position" : "157", "rawText" : { "$" : "[157] S. Sidiroglou, O. Laadan, C. Perez, N. Viennot, J. Nieh, and A. Keromytis. “Assure: Automatic Software Self-healing Using Rescue Points”. In: Acm sigplan notices 44.3 (2009), pp. 37-48." } }, { "@position" : "158", "rawText" : { "$" : "[158] S. Sidiroglou, M. Locasto, S. Boyd, and A. Keromytis. “Building a Reactive Immune System for Software Services”. In: Proceedings of the USENIX Annual Technical Conference. Vol. 161. 2005." }, "id" : { "@value" : "doi_________::5d0807395219894b44b9153330b32a0d", "@type" : "openaire", "@trustLevel" : "0.6067748" } }, { "@position" : "159", "rawText" : { "$" : "[159] S. Sidiroglou-Douskos, E. Lahtinen, F. Long, and M. Rinard. “Automatic Error Elimination by Horizontal Code Transfer Across Multiple Applications”. In: Proceedings of the 36th ACM SIGPLAN Conference on Programming Language Design and Implementation. 2015, pp. 43-54." }, "id" : { "@value" : "doi_________::e495eb0ff86f5eb4d9e0e20a871c0e00", "@type" : "openaire", "@trustLevel" : "0.6810099" } }, { "@position" : "160", "rawText" : { "$" : "[160] S. Sidiroglou-Douskos, S. Misailovic, H. Hoffmann, and M. Rinard. “Managing Performance Vs. Accuracy Trade-offs with Loop Perforation”. In: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering. 2011, pp. 124-134." }, "id" : { "@value" : "doi_________::8abf90b4cccb7108a46f60ab0cc9a4d2", "@type" : "openaire", "@trustLevel" : "0.688946" } }, { "@position" : "161", "rawText" : { "$" : "[161] J. Silva. “A Survey on Algorithmic Debugging Strategies”. In: Advances in engineering software 42.11 (2011), pp. 976-991." } }, { "@position" : "162", "rawText" : { "$" : "[162] M. A. A. da Silva, A. Mougenot, X. Blanc, and R. Bendraou. “Towards Automated Inconsistency Handling in Design Models”. In: Proceedings of the 22nd International Conference on Advanced Information Systems Engineering. 2010, pp. 348-362." } }, { "@position" : "163", "rawText" : { "$" : "[163] R. Singh, S. Gulwani, and A. Solar-Lezama. “Automated Feedback Generation for Introductory Programming Assignments”. In: ACM SIGPLAN Notices. Vol. 48. 6. 2013, pp. 15-26." }, "id" : { "@value" : "core_ac_uk__::1ddb459a7dd1dcbd334e1e499aad44a3", "@type" : "openaire", "@trustLevel" : "0.6201375" } }, { "@position" : "164", "rawText" : { "$" : "[164] A. Smirnov and T. Chiueh. “DIRA: Automatic Detection, Identification, and Repair of Control-hijacking Attacks”. In: The 12th Annual Network and Distributed System Security Symposium. 2005." } }, { "@position" : "165", "rawText" : { "$" : "[165] E. K. Smith, E. Barr, C. Le Goues, and Y. Brun. “Is the Cure Worse Than the Disease? Overfitting in Automated Program Repair”. In: Proceedings of the 10th Joint Meeting of the European Software Engineering Conference and ACM SIGSOFT Symposium on the Foundations of Software Engineering (ESEC/FSE). 2015." } }, { "@position" : "166", "rawText" : { "$" : "[166] A. Somayaji, S. Hofmeyr, and S. Forrest. “Principles of a Computer Immune System”. In: Proceedings of the 1997 Workshop on New Security Paradigms. 1998, pp. 75-82." } }, { "@position" : "167", "rawText" : { "$" : "[167] S. Son, K. S. McKinley, and V. Shmatikov. “Fix Me Up: Repairing Access-Control Bugs in Web Applications.” In: Proceedings of the Network and Distributed System Security Symposium. 2013." } }, { "@position" : "168", "rawText" : { "$" : "[168] H. Sözer, B. Tekinerdoğan, and M. Akşit. “FLORA: a Framework for Decomposing Software Architecture to Introduce Local Recovery”. In: Software: practice and experience 39.10 (2009), pp. 869-889." }, "id" : { "@value" : "dris___02403::8da03926fa2fe2d1661efec2a1289aab", "@type" : "openaire", "@trustLevel" : "0.7063425" } }, { "@position" : "169", "rawText" : { "$" : "[169] M. Staats, M. W. Whalen, and M. P. E. Heimdahl. “Programs, Tests, and Oracles: the Foundations of Testing Revisited”. In: Proceedings of the International Conference on Software Engineering. 2011, pp. 391-400." }, "id" : { "@value" : "od______2658::42c4de37eec902824c6f729b200a4560", "@type" : "openaire", "@trustLevel" : "0.7283477" } }, { "@position" : "170", "rawText" : { "$" : "[170] M. Stumptner and F. Wotawa. “A Model-based Approach to Software Debugging”. In: Proceedings on the Seventh International Workshop on Principles of Diagnosis. 1996." } }, { "@position" : "171", "rawText" : { "$" : "[171] B. Sun, R. Chang, X. Chen, and A. Podgurski. “Automated Support for Propagating Bug Fixes”. In: Proceedings of the International Symposium on Software Reliability Engineering. 2008, pp. 187-196." } }, { "@position" : "172", "rawText" : { "$" : "[172] B. Sun, G. Shu, A. Podgurski, S. Li, S. Zhang, and J. Yang. “Propagating Bug Fixes with Fast Subgraph Matching”. In: Proceedings of the International Symposium on Software Reliability Engineering. 2010, pp. 21-30." } }, { "@position" : "173", "rawText" : { "$" : "[173] G. J. Sussman. Building Robust Systems An Essay. 2007." } }, { "@position" : "174", "rawText" : { "$" : "[174] S. Tallam, C. Tian, R. Gupta, and X. Zhang. “Avoiding Program Failures Through Safe Execution Perturbations”. In: International Conference on Computer Software and Applications. 2008." }, "id" : { "@value" : "doi_________::3379f8dc9a918e60ef40c0beb473885f", "@type" : "openaire", "@trustLevel" : "0.6666087" } }, { "@position" : "175", "rawText" : { "$" : "[175] S. H. Tan and A. Roychoudhury. “Relifix: Automated Repair of Software Regressions”. In: Proceedings of ICSE. 2015." } }, { "@position" : "176", "rawText" : { "$" : "[176] Y. Tao, J. Kim, S. Kim, and C. Xu. “Automatically Generated Patches As Debugging Aids: a Human Study”. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. 2014, pp. 64-74." } }, { "@position" : "177", "rawText" : { "$" : "[177] S. Thomas and L. Williams. “Using Automated Fix Generation to Secure SQL Statements”. In: Proceedings of the Third International Workshop on Software Engineering for Secure Systems. 2007, p. 9." } }, { "@position" : "178", "rawText" : { "$" : "[178] W. Torres-Pomales et al. Software Fault Tolerance: a Tutorial. Tech. rep. NASA2000-tm210616. NASA, 2000." } }, { "@position" : "179", "rawText" : { "$" : "[179] J. Tran, M. Godfrey, E. Lee, and R. Holt. “Architectural Repair of Open Source Software”. In: Proceedings of the International Workshop on Program Comprehension. 2000, pp. 48-59." } }, { "@position" : "180", "rawText" : { "$" : "[180] K. Tsipenyuk, B. Chess, and G. McGraw. “Seven Pernicious Kingdoms: a Taxonomy of Software Security Errors”. In: Security & privacy 3.6 (2005), pp. 81-84." } }, { "@position" : "181", "rawText" : { "$" : "[181] F. Wang and C.-H. Cheng. “Program Repair Suggestions From Graphical StateTransition Specifications”. In: Proceedings of FORTE 2008. 2008." } }, { "@position" : "182", "rawText" : { "$" : "[182] T. Wang, C. Song, and W. Lee. “Diagnosis and Emergency Patch Generation for Integer Overflow Exploits”. In: Detection of Intrusions and Malware, and Vulnerability Assessment. 2014, pp. 255-275." } }, { "@position" : "183", "rawText" : { "$" : "[183] X. Wang, L. Zhang, T. Xie, Y. Xiong, and H. Mei. “Automating presentation changes in dynamic web applications via collaborative hybrid analysis”. In: Proceedings of the acm sigsoft international symposium on the foundations of software engineering. ACM. 2012, p. 16." } }, { "@position" : "184", "rawText" : { "$" : "[184] Y. Wang, Y. Huang, and C. Kintala. “Progressive Retry for Software Failure Recovery in Message-passing Applications”. In: Ieee transactions on computers 46.10 (1997), pp. 1137-1141." } }, { "@position" : "185", "rawText" : { "$" : "[185] Y. Wei, Y. Pei, C. A. Furia, L. S. Silva, S. Buchholz, B. Meyer, and A. Zeller. “Automated Fixing of Programs with Contracts”. In: Proceedings of the International Symposium on Software Testing and Analysis. 2010." } }, { "@position" : "186", "rawText" : { "$" : "[186] W. Weimer, T. Nguyen, C. Le Goues, and S. Forrest. “Automatically Finding Patches Using Genetic Programming”. In: Proceedings of the International Conference on Software Engineering. 2009." } }, { "@position" : "187", "rawText" : { "$" : "[187] W. Weimer. “Patches As Better Bug Reports”. In: Proceedings of the International Conference on Generative Programming and Component Engineering. 2006." } }, { "@position" : "188", "rawText" : { "$" : "[188] W. Weimer, S. Forrest, C. Le Goues, and T. Nguyen. “Automatic Program Repair with Evolutionary Computation”. In: Communications of the acm 53.5 (2010), p. 109." } }, { "@position" : "189", "rawText" : { "$" : "[189] W. Weimer, Z. P. Fry, and S. Forrest. “Leveraging program equivalence for adaptive program repair: models and first results”. In: International conference on automated software engineering. 2013, pp. 356-366." } }, { "@position" : "190", "rawText" : { "$" : "[190] W. Wong and V. Debroy. “A Survey on Software Fault Localization”. In: University of texas at dallas, tech. rep. utdcs-45-09 (2009)." } }, { "@position" : "191", "rawText" : { "$" : "[191] Y. Xiong, Z. Hu, H. Zhao, H. Song, M. Takeichi, and H. Mei. “Supporting Automatic Model Inconsistency Fixing”. In: 7th joint meeting of the european software engineering conference and the acm sigsoft symposium on the foundations of software engineering. ACM. 2009, pp. 315-324." } }, { "@position" : "192", "rawText" : { "$" : "[192] Y. Xiong, H. Zhang, A. Hubaux, S. She, J. Wang, and K. Czarnecki. “Range Fixes: Interactive Error Resolution for Software Configuration”. In: Ieee transactions on software engineering 41.6 (2015), pp. 603-619." } }, { "@position" : "193", "rawText" : { "$" : "[193] A. Zeller, Y. Wei, B. Meyer, M. Nordio, C. A. Furia, and Y. Pei. “Automated Fixing of Programs with Contracts”. In: Ieee transactions on software engineering 40.5 (2014), pp. 427-449." } }, { "@position" : "194", "rawText" : { "$" : "[194] X. Zhang, N. Gupta, and R. Gupta. “Locating Faults Through Automated Predicate Switching”. In: Proceedings of the 28th International Conference on Software Engineering. 2006, pp. 272-281." } }, { "@position" : "195", "rawText" : { "$" : "[195] Y. Zhang and Y. Ding. “CTL Model Update for System Modifications”. In: Journal of artificial intelligence research 31.1 (2008), pp. 113-155." } }, { "@position" : "196", "rawText" : { "$" : "[196] H. Zhong and Z. Su. “An Empirical Study on Real Bug Fixes”. In: Proceedings of the 37th International Conference on Software Engineering. 2015." } }, { "@position" : "197", "rawText" : { "$" : "[197] F. Zhou, J. Condit, Z. Anderson, I. Bagrak, R. Ennals, M. Harren, G. Necula, and E. Brewer. “SafeDrive: Safe and Recoverable Extensions Using Language-based Techniques”. In: Proceedings of the 7th Symposium on Operating Systems Design and Implementation. 2006, pp. 45-60." } } ] } } ] } } }, { "header" : { "dri:objIdentifier" : { "$" : "doi_dedup___::47c5b1938a809d4b8aa09b923057e705" }, "dri:dateOfCollection" : { "$" : "2025-12-20T13:48:06.870381606" }, "dri:dateOfTransformation" : null }, "metadata" : { "oaf:entity" : { "@xsi:schemaLocation" : "http://namespace.openaire.eu/oaf https://www.openaire.eu/schema/1.0/oaf-1.0.xsd", "oaf:result" : { "collectedfrom" : [ { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" }, { "@name" : "UnpayWall", "@id" : "openaire____::8ac8380272269217cb09a928c8caa993" }, { "@name" : "Crossref", "@id" : "openaire____::081b82f96300b6a6e3d282bad31cb6e2" }, { "@name" : "Microsoft Academic Graph", "@id" : "openaire____::5f532a3fc4f1ea403f37070f59a7a53a" }, { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" }, { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" } ], "originalId" : [ { "$" : "10.1145/2568225.2568324" }, { "$" : "10.1145/2568225" }, { "$" : "50|doiboost____|47c5b1938a809d4b8aa09b923057e705" }, { "$" : "50|datacite____::2f176b7139493b61b63bf87234827c75" }, { "$" : "10.48550/arxiv.1408.2103" }, { "$" : "oai:arXiv.org:1408.2103" }, { "$" : "50|od________18::016bb72500f2e33e0126f1d4f7f5e6db" }, { "$" : "oai:HAL:hal-01054549v1" }, { "$" : "50|inria2______::8a02d9f0b27d01a6be15d5b3a0c0fbec" }, { "$" : "3098606854" }, { "$" : "2104107939" }, { "$" : "50|od_______165::8a02d9f0b27d01a6be15d5b3a0c0fbec" } ], "pid" : [ { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/2568225.2568324" }, { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.48550/arxiv.1408.2103" }, { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : 1408.2103 } ], "measure" : [ { "@id" : "influence", "@score" : "1.2651951E-8", "@class" : "C3" }, { "@id" : "popularity", "@score" : "4.3649955E-8", "@class" : "C3" }, { "@id" : "influence_alt", "@score" : "106", "@class" : "C4" }, { "@id" : "popularity_alt", "@score" : "13.0605955", "@class" : "C4" }, { "@id" : "impulse", "@score" : "40", "@class" : "C3" } ], "title" : [ { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "A critical review of \"automatic patch generation learned from human-written patches\": essay on the problem statement and the evaluation of automatic software repair" }, { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "A Critical Review of \"Automatic Patch Generation Learned from Human-Written Patches\": Essay on the Problem Statement and the Evaluation of Automatic Software Repair" }, { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "a critical review of automatic patch generation learned from human written patches essay on the problem statement and the evaluation of automatic software repair" } ], "bestaccessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "creator" : { "@rank" : "1", "@name" : "Martin", "@surname" : "Monperrus", "@orcid" : "0000-0003-3505-3383", "$" : "Monperrus, Martin" }, "contributor" : { "$" : "Monperrus, Martin" }, "dateofacceptance" : { "$" : "2014-05-31" }, "description" : [ { "$" : "At ICSE'2013, there was the first session ever dedicated to automatic program repair. In this session, Kim et al. presented PAR, a novel template-based approach for fixing Java bugs. We strongly disagree with key points of this paper. Our critical review has two goals. First, we aim at explaining why we disagree with Kim and colleagues and why the reasons behind this disagreement are important for research on automatic software repair in general. Second, we aim at contributing to the field with a clarification of the essential ideas behind automatic software repair. In particular we discuss the main evaluation criteria of automatic software repair: understandability, correctness and completeness. We show that depending on how one sets up the repair scenario, the evaluation goals may be contradictory. Eventually, we discuss the nature of fix acceptability and its relation to the notion of software correctness." }, { "$" : "ICSE 2014, India (2014)" } ], "embargoenddate" : { "$" : "2014-01-01" }, "subject" : [ { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "$" : "Software Engineering (cs.SE)" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "$" : "FOS: Computer and information sciences" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "Computer Science - Software Engineering" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "[INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE]" }, { "@classid" : "SDG", "@classname" : "Sustainable Development Goals", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : true, "@inferenceprovenance" : "update", "@provenanceaction" : "subject:sdg", "$" : "8. Economic growth" }, { "@classid" : "FOS", "@classname" : "Fields of Science and Technology classification", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : true, "@inferenceprovenance" : "update", "@provenanceaction" : "subject:fos", "$" : "0202 electrical engineering, electronic engineering, information engineering" }, { "@classid" : "FOS", "@classname" : "Fields of Science and Technology classification", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : true, "@inferenceprovenance" : "update", "@provenanceaction" : "subject:fos", "$" : "02 engineering and technology" } ], "language" : { "@classid" : "und", "@classname" : "Undetermined", "@schemeid" : "dnet:languages", "@schemename" : "dnet:languages" }, "relevantdate" : [ { "@classid" : "created", "@classname" : "created", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2014-05-20" }, { "@classid" : "published-online", "@classname" : "published-online", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2014-05-31" }, { "@classid" : "published-print", "@classname" : "published-print", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2014-05-31" }, { "@classid" : "submitted", "@classname" : "submitted", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2014-08-09" }, { "@classid" : "updated", "@classname" : "updated", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2022-02-11" }, { "@classid" : "available", "@classname" : "available", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2014-01-01" }, { "@classid" : "issued", "@classname" : "issued", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "$" : "2014-01-01" }, { "@classid" : "UNKNOWN", "@classname" : "UNKNOWN", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2014-08-07" }, { "@classid" : "updated", "@classname" : "updated", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2025-02-26" }, { "@classid" : "available", "@classname" : "available", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2014-08-09" }, { "@classid" : "updated", "@classname" : "updated", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2025-10-27" } ], "publisher" : { "$" : "ACM" }, "source" : { "$" : "Crossref" }, "format" : { "$" : "application/pdf" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "resourcetype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "isgreen" : { "$" : true }, "isindiamondjournal" : { "$" : false }, "publiclyfunded" : { "$" : false }, "journal" : { "@ep" : "242", "@sp" : "234", "$" : "Proceedings of the 36th International Conference on Software Engineering" }, "context" : [ { "@id" : "knowmad", "@label" : "Knowmad Institut", "@type" : "community" }, { "@id" : "inria", "@label" : "INRIA", "@type" : "community" } ], "datainfo" : { "inferred" : { "$" : true }, "deletedbyinference" : { "$" : false }, "trust" : { "$" : "0.8" }, "inferenceprovenance" : { "$" : "dedup-result-decisiontree-v4" }, "provenanceaction" : { "@classid" : "sysimport:dedup", "@classname" : "Inferred by OpenAIRE", "@schemeid" : "dnet:provenanceActions", "@schemename" : "dnet:provenanceActions" } }, "rels" : { "rel" : [ { "@inferred" : true, "@trust" : "1.0", "@inferenceprovenance" : "openaire:affiliation:crossref", "@provenanceaction" : "result:organization:openaireinference", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "openorgs____::a7d9dc62bc79f067b8c0f3f683320ab6" }, "legalshortname" : { "$" : "USTL" }, "websiteurl" : { "$" : "https://www.univ-lille.fr/" }, "country" : { "@classid" : "FR", "@classname" : "France", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "legalname" : { "$" : "University of Lille" } }, { "@inferred" : true, "@trust" : "0.8660254037844388", "@inferenceprovenance" : "openaire:affiliation:graph", "@provenanceaction" : "result:organization:openaireinference", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "openorgs____::c4563bab450fc51f8ecf4e3d942d8100" }, "legalshortname" : { "$" : "INSHS" }, "country" : { "@classid" : "FR", "@classname" : "France", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "legalname" : { "$" : "Institut des Sciences Humaines et Sociales" }, "websiteurl" : { "$" : "http://www.cnrs.fr/inshs/" } }, { "@inferred" : false, "@trust" : "0.9", "@inferenceprovenance" : "", "@provenanceaction" : "sysimport:actionset", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "pending_org_::37de421a3501d4a6c501f18ac82448b3" }, "websiteurl" : { "$" : "http://www.inria.fr/" }, "country" : { "@classid" : "FR", "@classname" : "France", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "legalname" : { "$" : "French Institute for Research in Computer Science and Automation" }, "legalshortname" : { "$" : "French Institute for Research in Computer Science and Automation" } }, { "@inferred" : true, "@trust" : "1.0", "@inferenceprovenance" : "openaire:affiliation:graph", "@provenanceaction" : "result:organization:openaireinference", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "openorgs____::7fbdf9cd4423c4604745a16afe728bc7" }, "country" : { "@classid" : "FR", "@classname" : "France", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "legalshortname" : { "$" : "CNRS" }, "legalname" : { "$" : "French National Centre for Scientific Research" }, "websiteurl" : { "$" : "http://www.cnrs.fr/index.php" } }, { "@inferred" : true, "@trust" : "1.0", "@inferenceprovenance" : "openaire:affiliation:graph", "@provenanceaction" : "result:organization:openaireinference", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "openorgs____::b1a28649a82b98ae497d5c7782656740" }, "country" : { "@classid" : "FR", "@classname" : "France", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "legalname" : { "$" : "French Institute for Research in Computer Science and Automation" }, "legalshortname" : { "$" : "INRIA" }, "websiteurl" : { "$" : "http://www.inria.fr/en/" } } ] }, "children" : { "result" : [ { "@objidentifier" : "od_______165::8a02d9f0b27d01a6be15d5b3a0c0fbec", "description" : { "$" : "At ICSE'2013, there was the first session ever dedicated to automatic program repair. In this session, Kim et al. presented PAR, a novel template-based approach for fixing Java bugs. We strongly disagree with key points of this paper. Our critical review has two goals. First, we aim at explaining why we disagree with Kim and colleagues and why the reasons behind this disagreement are important for research on automatic software repair in general. Second, we aim at contributing to the field with " }, "instance" : { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" }, "dateofacceptance" : { "$" : "2014-01-01" }, "instancetype" : { "@classid" : "0004", "@classname" : "Conference object", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : [ { "$" : "https://hal.science/hal-01054549v1/document" }, { "$" : "https://hal.science/hal-01054549v1" }, { "$" : "https://doi.org/10.1145/2568225.2568324" } ], "webresource" : [ { "url" : { "$" : "https://hal.science/hal-01054549v1/document" } }, { "url" : { "$" : "https://hal.science/hal-01054549v1" } }, { "url" : { "$" : "https://doi.org/10.1145/2568225.2568324" } } ] }, "creator" : { "$" : "Monperrus, Martin" }, "collectedfrom" : { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "A Critical Review of \"Automatic Patch Generation Learned from Human-Written Patches\": Essay on the Problem Statement and the Evaluation of Automatic Software Repair" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "dateofacceptance" : { "$" : "2014-01-01" } }, { "@objidentifier" : "doi_________::2f176b7139493b61b63bf87234827c75", "description" : { "$" : "At ICSE'2013, there was the first session ever dedicated to automatic program repair. In this session, Kim et al. presented PAR, a novel template-based approach for fixing Java bugs. We strongly disagree with key points of this paper. Our critical review has two goals. First, we aim at explaining why we disagree with Kim and colleagues and why the reasons behind this disagreement are important for research on automatic software repair in general. Second, we aim at contributing to the field with " }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "A Critical Review of \"Automatic Patch Generation Learned from Human-Written Patches\": Essay on the Problem Statement and the Evaluation of Automatic Software Repair" }, "instance" : { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "dateofacceptance" : { "$" : "2014-01-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "arXiv Non-Exclusive Distribution" }, "url" : { "$" : "https://dx.doi.org/10.48550/arxiv.1408.2103" }, "webresource" : { "url" : { "$" : "https://dx.doi.org/10.48550/arxiv.1408.2103" } } }, "creator" : { "$" : "Monperrus, Martin" }, "publisher" : { "$" : "arXiv" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "dateofacceptance" : { "$" : "2014-01-01" }, "collectedfrom" : { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.48550/arxiv.1408.2103" } }, { "@objidentifier" : "inria2______::8a02d9f0b27d01a6be15d5b3a0c0fbec", "description" : { "$" : "At ICSE'2013, there was the first session ever dedicated to automatic program repair. In this session, Kim et al. presented PAR, a novel template-based approach for fixing Java bugs. We strongly disagree with key points of this paper. Our critical review has two goals. First, we aim at explaining why we disagree with Kim and colleagues and why the reasons behind this disagreement are important for research on automatic software repair in general. Second, we aim at contributing to the field with " }, "creator" : { "$" : "Monperrus, Martin" }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "A Critical Review of \"Automatic Patch Generation Learned from Human-Written Patches\": Essay on the Problem Statement and the Evaluation of Automatic Software Repair" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "instance" : { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" }, "dateofacceptance" : { "$" : "2014-01-01" }, "instancetype" : { "@classid" : "0004", "@classname" : "Conference object", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : [ { "$" : "https://hal.science/hal-01054549v1/document" }, { "$" : "https://hal.science/hal-01054549v1" }, { "$" : "https://doi.org/10.1145/2568225.2568324" } ], "webresource" : [ { "url" : { "$" : "https://hal.science/hal-01054549v1/document" } }, { "url" : { "$" : "https://hal.science/hal-01054549v1" } }, { "url" : { "$" : "https://doi.org/10.1145/2568225.2568324" } } ] }, "dateofacceptance" : { "$" : "2014-01-01" }, "collectedfrom" : { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" } }, { "@objidentifier" : "arXiv_______::260033db00383a8ab13394d3cfe57a30", "description" : { "$" : "At ICSE'2013, there was the first session ever dedicated to automatic program repair. In this session, Kim et al. presented PAR, a novel template-based approach for fixing Java bugs. We strongly disagree with key points of this paper. Our critical review has two goals. First, we aim at explaining why we disagree with Kim and colleagues and why the reasons behind this disagreement are important for research on automatic software repair in general. Second, we aim at contributing to the field with " }, "pid" : { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : 1408.2103 }, "collectedfrom" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "creator" : { "$" : "Monperrus, Martin" }, "instance" : { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "dateofacceptance" : { "$" : "2014-08-09" }, "instancetype" : { "@classid" : "0016", "@classname" : "Preprint", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "http://arxiv.org/abs/1408.2103" }, "webresource" : { "url" : { "$" : "http://arxiv.org/abs/1408.2103" } } }, "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "A Critical Review of \"Automatic Patch Generation Learned from Human-Written Patches\": Essay on the Problem Statement and the Evaluation of Automatic Software Repair" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "dateofacceptance" : { "$" : "2014-08-09" } }, { "@objidentifier" : "doi_________::47c5b1938a809d4b8aa09b923057e705", "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/2568225.2568324" }, "publisher" : { "$" : "ACM" }, "instance" : [ { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "http://arxiv.org/pdf/1408.2103" }, "webresource" : { "url" : { "$" : "http://arxiv.org/pdf/1408.2103" } } }, { "accessright" : { "@classid" : "CLOSED", "@classname" : "Closed Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "dateofacceptance" : { "$" : "2014-05-31" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0001", "@classname" : "peerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "https://www.acm.org/publications/policies/copyright_policy#Background" }, "url" : { "$" : "https://doi.org/10.1145/2568225.2568324" }, "webresource" : { "url" : { "$" : "https://doi.org/10.1145/2568225.2568324" } } } ], "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "$" : "A critical review of \"automatic patch generation learned from human-written patches\": essay on the problem statement and the evaluation of automatic software repair" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "collectedfrom" : [ { "@name" : "Crossref", "@id" : "openaire____::081b82f96300b6a6e3d282bad31cb6e2" }, { "@name" : "UnpayWall", "@id" : "openaire____::8ac8380272269217cb09a928c8caa993" } ], "dateofacceptance" : { "$" : "2014-05-31" }, "creator" : { "$" : "Martin Monperrus" } } ], "instance" : [ { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "hostedby" : { "@name" : "arXiv.org e-Print Archive", "@id" : "opendoar____::6f4922f45568161a8cdf4ad2299f6d23" }, "dateofacceptance" : { "$" : "2014-08-09" }, "instancetype" : { "@classid" : "0016", "@classname" : "Preprint", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "pid" : { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : 1408.2103 }, "alternateidentifier" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/2568225.2568324" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "webresource" : { "url" : { "$" : "http://arxiv.org/abs/1408.2103" } } }, { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : [ { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" }, { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" } ], "hostedby" : [ { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" }, { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" } ], "dateofacceptance" : { "$" : "2014-01-01" }, "instancetype" : { "@classid" : "0004", "@classname" : "Conference object", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "alternateidentifier" : [ { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/2568225.2568324" }, { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : 1408.2103 }, { "@classid" : "arXiv", "@classname" : "arXiv", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : 1408.2103 }, { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/2568225.2568324" } ], "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "webresource" : { "url" : { "$" : "https://hal.science/hal-01054549v1/document" } } }, { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : { "@name" : "UnpayWall", "@id" : "openaire____::8ac8380272269217cb09a928c8caa993" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/2568225.2568324" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "webresource" : { "url" : { "$" : "http://arxiv.org/pdf/1408.2103" } } }, { "accessright" : { "@classid" : "CLOSED", "@classname" : "Closed Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : [ { "@name" : "Microsoft Academic Graph", "@id" : "openaire____::5f532a3fc4f1ea403f37070f59a7a53a" }, { "@name" : "Crossref", "@id" : "openaire____::081b82f96300b6a6e3d282bad31cb6e2" }, { "@name" : "Microsoft Academic Graph", "@id" : "openaire____::5f532a3fc4f1ea403f37070f59a7a53a" } ], "hostedby" : [ { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" } ], "dateofacceptance" : { "$" : "2014-05-31" }, "instancetype" : [ { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, { "@classid" : "0038", "@classname" : "Other literature type", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" } ], "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/2568225.2568324" }, "alternateidentifier" : [ { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/2568225.2568324" }, { "@classid" : "mag_id", "@classname" : "Microsoft Academic Graph Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : 3098606854 }, { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : "10.1145/2568225.2568324" }, { "@classid" : "mag_id", "@classname" : "Microsoft Academic Graph Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "$" : 2104107939 } ], "refereed" : { "@classid" : "0001", "@classname" : "peerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "https://www.acm.org/publications/policies/copyright_policy#Background" }, "webresource" : { "url" : { "$" : "https://doi.org/10.1145/2568225.2568324" } } }, { "accessright" : { "@classid" : "UNKNOWN", "@classname" : "unspecified", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : { "@name" : "Datacite", "@id" : "openaire____::9e3be59865b2c1c335d32dae2fe7b254" }, "hostedby" : { "@name" : "Unknown Repository", "@id" : "openaire____::55045bd2a65019fd8e6741a755395c8c" }, "dateofacceptance" : { "$" : "2014-01-01" }, "instancetype" : { "@classid" : "0001", "@classname" : "Article", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "pid" : { "@classid" : "doi", "@classname" : "Digital Object Identifier", "@schemeid" : "dnet:pid_types", "@schemename" : "dnet:pid_types", "@inferred" : false, "@provenanceaction" : "sysimport:actionset", "@trust" : "0.9", "$" : "10.48550/arxiv.1408.2103" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "license" : { "$" : "arXiv Non-Exclusive Distribution" }, "webresource" : { "url" : { "$" : "https://doi.org/10.48550/arxiv.1408.2103" } } } ] } }, "extraInfo" : [ { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "[1] R. J. Abbott. Resourceful systems for fault tolerance, reliability, and safety. ACM Computing Surveys (CSUR), 22(1):35-68, 1990." } }, { "@position" : "2", "rawText" : { "$" : "[2] P. Ammann and J. Knight. Data diversity: an approach to software fault tolerance. IEEE Transactions on Computers, 37(4):418 -425, 1988." } }, { "@position" : "3", "rawText" : { "$" : "[3] A. Arcuri and X. Yao. A novel co-evolutionary approach to automatic software bug fixing. In Proceedings of the IEEE Congress on Evolutionary Computation (CEC), 2008." }, "id" : { "@value" : "doi_________::68cc50a8be6f60895da5bb73341ab1d9", "@type" : "openaire", "@trustLevel" : "0.6449998" } }, { "@position" : "4", "rawText" : { "$" : "[4] A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1(1):11-33, 2004." } }, { "@position" : "5", "rawText" : { "$" : "[5] C. Bird, A. Bachmann, E. Aune, J. Duffy, A. Bernstein, V. Filkov, and P. Devanbu. Fair and balanced?: bias in bug-fix datasets. In Proceedings of the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2009." } }, { "@position" : "6", "rawText" : { "$" : "[6] A. Carzaniga, A. Gorla, A. Mattavelli, N. Perino, and M. Pezz`e. Automatic recovery from runtime failures. In Proceedings of the 2013 International Conference on Software Engineering, 2013." }, "id" : { "@value" : "erc_________::a644ed3d5d0bf211431055edec3a2edf", "@type" : "openaire", "@trustLevel" : "0.7020745" } }, { "@position" : "7", "rawText" : { "$" : "[7] V. Dallmeier, A. Zeller, and B. Meyer. Generating fixes from object behavior anomalies. In Proceedings of the International Conference on Automated Software Engineering, 2009." }, "id" : { "@value" : "doi_________::d9ac7ad5a76f49bacb512cbc80e9accc", "@type" : "openaire", "@trustLevel" : "0.67268527" } }, { "@position" : "8", "rawText" : { "$" : "[8] F. DeMarco, J. Xuan, D. Le Berre, and M. Monperrus. Automatic repair of buggy if conditions and missing preconditions with SMT. In Proceedings of the 6th Workshop on Constraints in Software Testing, Verification, and Analysis Co-located with ICSE 2014, 2014." } }, { "@position" : "9", "rawText" : { "$" : "[9] B. Demsky and M. Rinard. Automatic detection and repair of errors in data structures. In Proceedings of the ACM SIGPLAN conference on Object-Oriented Programing, Systems, Languages, and Applications (OOPSLA), 2003." }, "id" : { "@value" : "doi_________::831ce490dd2b26b411d0a3dfad3192c0", "@type" : "openaire", "@trustLevel" : "0.6843838" } }, { "@position" : "10", "rawText" : { "$" : "[10] P. J. Denning. A debate on teaching computing science. Commun. ACM, 32(12):1397-1414, Dec. 1989." } }, { "@position" : "11", "rawText" : { "$" : "[11] G. Friedrich, M. Fugini, E. Mussi, B. Pernici, and G. Tagni. Exception handling for repair in service-based processes. IEEE Transactions on Software Engineering, 36(2):198-215, 2010." } }, { "@position" : "12", "rawText" : { "$" : "[12] R. L. Glass. Facts and fallacies of software engineering. Addison-Wesley Professional, 2002." } }, { "@position" : "13", "rawText" : { "$" : "[13] S. N. Goodman. Toward evidence-based medical statistics. 1: The p value fallacy. Annals of internal medicine, 130(12):995-1004, 1999." } }, { "@position" : "14", "rawText" : { "$" : "[14] C. Goues, S. Forrest, and W. Weimer. Current challenges in automatic software repair. Software Quality Control, 21(3), 2013." } }, { "@position" : "15", "rawText" : { "$" : "[15] C. L. Goues, T. Nguyen, S. Forrest, and W. Weimer. Genprog: A generic method for automatic software repair. IEEE Transactions on Software Engineering, 38:54-72, 2012." } }, { "@position" : "16", "rawText" : { "$" : "[16] P. Hosek and C. Cadar. Safe software updates via multi-version execution. In Proceedings of the 2013 International Conference on Software Engineering, pages 612-621. IEEE Press, 2013." }, "id" : { "@value" : "doi_________::95023b71791957385eba9b2bc7b6b0e5", "@type" : "openaire", "@trustLevel" : "0.7770629" } }, { "@position" : "17", "rawText" : { "$" : "[17] Y. Jia and M. Harman. An analysis and survey of the development of mutation testing. IEEE Transactions on Software Engineering, 37(5):649-678, 2011." } }, { "@position" : "18", "rawText" : { "$" : "[18] B. Jobstmann, S. Staber, A. Griesmayer, and R. Bloem. Finding and fixing faults. Lecture Notes in Computer Science, 3725, 2005." } }, { "@position" : "19", "rawText" : { "$" : "[19] D. Kim, J. Nam, J. Song, and S. Kim. Automatic patch generation learned from human-written patches. In Proceedings of the International Conference on Software Engineering, 2013." } }, { "@position" : "20", "rawText" : { "$" : "[20] P. Koopman. Elements of the self-healing system problem space. Technical report, Carnegie Mellon University, 2003." } }, { "@position" : "21", "rawText" : { "$" : "[21] C. Lewis and J. Whitehead. Repairing games at runtime or, how we learned to stop worrying and love emergence. IEEE Software, 28(5), 2011." } }, { "@position" : "22", "rawText" : { "$" : "[22] M. E. Locasto, S. Sidiroglou, and A. D. Keromytis. Software self-healing using collaborative application communities. In Proceedings of the 2006 Network and Distributed System Security Symposium (NDSS), 2006." }, "id" : { "@value" : "doi_________::6e539f0301aa67945ea78037c50f8cac", "@type" : "openaire", "@trustLevel" : "0.6636007" } }, { "@position" : "23", "rawText" : { "$" : "[23] F. Logozzo and T. Ball. Modular and verified automatic program repair. In Proceedings of the ACM International Conference on Object-oriented Programming Systems, Languages and Applications, pages 133-146. ACM, 2012." }, "id" : { "@value" : "doi_________::d4c79c47b10fe4a7677a642634719536", "@type" : "openaire", "@trustLevel" : "0.674261" } }, { "@position" : "24", "rawText" : { "$" : "[24] F. Long, V. Ganesh, M. Carbin, S. Sidiroglou, and M. Rinard. Automatic input rectification. In Proceedings of the 2012 International Conference on Software Engineering, 2012." } }, { "@position" : "25", "rawText" : { "$" : "[25] M. Martinez and M. Monperrus. Mining software repair models for reasoning on the search space of automated program fixing. Empirical Software Engineering, -, 2013." }, "id" : { "@value" : "doi_________::20a481dc781e009ed40ab895ff4455b9", "@type" : "openaire", "@trustLevel" : "0.6991813" } }, { "@position" : "26", "rawText" : { "$" : "[26] M. Martinez, W. Weimer, and M. Monperrus. Do the fix ingredients already exist? an empirical inquiry into the redundancy assumptions of program repair approaches. In Proceedings of the International Conference on Software Engineering, New Ideas and Emerging Results Track (NIER), 2014." } }, { "@position" : "27", "rawText" : { "$" : "[27] S. Misailovic, S. Sidiroglou, H. Hoffmann, and M. Rinard. Quality of service profiling. In Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering. ACM, 2010." }, "id" : { "@value" : "doi_________::e719b87015dd6eb71ec9d25b5d689e0b", "@type" : "openaire", "@trustLevel" : "0.690052" } }, { "@position" : "28", "rawText" : { "$" : "[28] H. D. T. Nguyen, D. Qi, A. Roychoudhury, , and S. Chandra. SemFix: Program Repair via Semantic Analysis. In Proceedings of the International Conference on Software Engineering, 2013." } }, { "@position" : "29", "rawText" : { "$" : "[29] J. H. Perkins, G. Sullivan, W.-F. Wong, Y. Zibin, M. D. Ernst, M. Rinard, S. Kim, S. Larsen, S. Amarasinghe, J. Bachrach, M. Carbin, C. Pacheco, F. Sherwood, and S. Sidiroglou. Automatically patching errors in deployed software. Proceedings of the 22nd Symposium on Operating Systems Principles (SOSP), 2009." } }, { "@position" : "30", "rawText" : { "$" : "[30] D. Posnett, V. Filkov, and P. T. Devanbu. Ecological inference in empirical software engineering. In Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, pages 362-371, 2011." }, "id" : { "@value" : "doi_________::0f6c3737caf83465fb7644022a39c4e1", "@type" : "openaire", "@trustLevel" : "0.6674565" } }, { "@position" : "31", "rawText" : { "$" : "[31] M. Rinard, C. Cadar, and H. H. Nguyen. Exploring the acceptability envelope. In Companion to the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, pages 21-30. ACM, 2005." } }, { "@position" : "32", "rawText" : { "$" : "[32] E. Schulte, S. Forrest, and W. Weimer. Automated program repair through the evolution of assembly code. In Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2010." } }, { "@position" : "33", "rawText" : { "$" : "[33] M. Shaw. Self-healing: softening precision to avoid brittleness. In Proceedings of the first workshop on Self-healing systems, WOSS '02, 2002." } }, { "@position" : "34", "rawText" : { "$" : "[34] M. Staats, M. W. Whalen, and M. P. E. Heimdahl. Programs, tests, and oracles: the foundations of testing revisited. In Proceedings of the International Conference on Software Engineering, pages 391-400. IEEE, 2011." }, "id" : { "@value" : "od______2658::42c4de37eec902824c6f729b200a4560", "@type" : "openaire", "@trustLevel" : "0.7821311" } }, { "@position" : "35", "rawText" : { "$" : "[35] D. J. Taylor, D. E. Morgan, and J. P. Black. Redundancy in data structures: Improving software fault tolerance. IEEE Transactions on Software Engineering, (6):585-594, 1980." } }, { "@position" : "36", "rawText" : { "$" : "[36] Y. Wei, Y. Pei, C. A. Furia, L. S. Silva, S. Buchholz, B. Meyer, and A. Zeller. Automated fixing of programs with contracts. In Proceedings of the International Symposium on Software Testing and Analysis. AC, 2010." }, "id" : { "@value" : "doi_________::d682b6d0bdb57ad73088a8371104f41c", "@type" : "openaire", "@trustLevel" : "0.6448236" } }, { "@position" : "37", "rawText" : { "$" : "[37] W. Weimer, T. Nguyen, C. L. Goues, and S. Forrest. Automatically finding patches using genetic programming. In Proceedings of the International Conference on Software Engineering, 2009." } }, { "@position" : "38", "rawText" : { "$" : "[38] A. Zeller. Automated debugging: Are we close? Computer, 34(11):26-31, 2001." } } ] } }, { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "[1] R. J. Abbott. Resourceful systems for fault tolerance, reliability, and safety. ACM Computing Surveys (CSUR), 22(1):35-68, 1990." } }, { "@position" : "2", "rawText" : { "$" : "[2] P. Ammann and J. Knight. Data diversity: an approach to software fault tolerance. IEEE Transactions on Computers, 37(4):418 -425, 1988." } }, { "@position" : "3", "rawText" : { "$" : "[3] A. Arcuri and X. Yao. A novel co-evolutionary approach to automatic software bug fixing. In Proceedings of the IEEE Congress on Evolutionary Computation (CEC), 2008." }, "id" : { "@value" : "doi_________::68cc50a8be6f60895da5bb73341ab1d9", "@type" : "openaire", "@trustLevel" : "0.6449998" } }, { "@position" : "4", "rawText" : { "$" : "[4] A. Avizienis, J.-C. Laprie, B. Randell, and C. Landwehr. Basic concepts and taxonomy of dependable and secure computing. IEEE Transactions on Dependable and Secure Computing, 1(1):11-33, 2004." } }, { "@position" : "5", "rawText" : { "$" : "[5] C. Bird, A. Bachmann, E. Aune, J. Duffy, A. Bernstein, V. Filkov, and P. Devanbu. Fair and balanced?: bias in bug-fix datasets. In Proceedings of the 7th joint meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering, 2009." } }, { "@position" : "6", "rawText" : { "$" : "[6] A. Carzaniga, A. Gorla, A. Mattavelli, N. Perino, and M. Pezz`e. Automatic recovery from runtime failures. In Proceedings of the 2013 International Conference on Software Engineering, 2013." }, "id" : { "@value" : "erc_________::a644ed3d5d0bf211431055edec3a2edf", "@type" : "openaire", "@trustLevel" : "0.7020745" } }, { "@position" : "7", "rawText" : { "$" : "[7] V. Dallmeier, A. Zeller, and B. Meyer. Generating fixes from object behavior anomalies. In Proceedings of the International Conference on Automated Software Engineering, 2009." }, "id" : { "@value" : "doi_________::d9ac7ad5a76f49bacb512cbc80e9accc", "@type" : "openaire", "@trustLevel" : "0.67268527" } }, { "@position" : "8", "rawText" : { "$" : "[8] F. DeMarco, J. Xuan, D. Le Berre, and M. Monperrus. Automatic repair of buggy if conditions and missing preconditions with SMT. In Proceedings of the 6th Workshop on Constraints in Software Testing, Verification, and Analysis Co-located with ICSE 2014, 2014." } }, { "@position" : "9", "rawText" : { "$" : "[9] B. Demsky and M. Rinard. Automatic detection and repair of errors in data structures. In Proceedings of the ACM SIGPLAN conference on Object-Oriented Programing, Systems, Languages, and Applications (OOPSLA), 2003." }, "id" : { "@value" : "doi_________::831ce490dd2b26b411d0a3dfad3192c0", "@type" : "openaire", "@trustLevel" : "0.6843838" } }, { "@position" : "10", "rawText" : { "$" : "[10] P. J. Denning. A debate on teaching computing science. Commun. ACM, 32(12):1397-1414, Dec. 1989." } }, { "@position" : "11", "rawText" : { "$" : "[11] G. Friedrich, M. Fugini, E. Mussi, B. Pernici, and G. Tagni. Exception handling for repair in service-based processes. IEEE Transactions on Software Engineering, 36(2):198-215, 2010." } }, { "@position" : "12", "rawText" : { "$" : "[12] R. L. Glass. Facts and fallacies of software engineering. Addison-Wesley Professional, 2002." } }, { "@position" : "13", "rawText" : { "$" : "[13] S. N. Goodman. Toward evidence-based medical statistics. 1: The p value fallacy. Annals of internal medicine, 130(12):995-1004, 1999." } }, { "@position" : "14", "rawText" : { "$" : "[14] C. Goues, S. Forrest, and W. Weimer. Current challenges in automatic software repair. Software Quality Control, 21(3), 2013." } }, { "@position" : "15", "rawText" : { "$" : "[15] C. L. Goues, T. Nguyen, S. Forrest, and W. Weimer. Genprog: A generic method for automatic software repair. IEEE Transactions on Software Engineering, 38:54-72, 2012." } }, { "@position" : "16", "rawText" : { "$" : "[16] P. Hosek and C. Cadar. Safe software updates via multi-version execution. In Proceedings of the 2013 International Conference on Software Engineering, pages 612-621. IEEE Press, 2013." }, "id" : { "@value" : "doi_________::95023b71791957385eba9b2bc7b6b0e5", "@type" : "openaire", "@trustLevel" : "0.7770629" } }, { "@position" : "17", "rawText" : { "$" : "[17] Y. Jia and M. Harman. An analysis and survey of the development of mutation testing. IEEE Transactions on Software Engineering, 37(5):649-678, 2011." } }, { "@position" : "18", "rawText" : { "$" : "[18] B. Jobstmann, S. Staber, A. Griesmayer, and R. Bloem. Finding and fixing faults. Lecture Notes in Computer Science, 3725, 2005." } }, { "@position" : "19", "rawText" : { "$" : "[19] D. Kim, J. Nam, J. Song, and S. Kim. Automatic patch generation learned from human-written patches. In Proceedings of the International Conference on Software Engineering, 2013." } }, { "@position" : "20", "rawText" : { "$" : "[20] P. Koopman. Elements of the self-healing system problem space. Technical report, Carnegie Mellon University, 2003." } }, { "@position" : "21", "rawText" : { "$" : "[21] C. Lewis and J. Whitehead. Repairing games at runtime or, how we learned to stop worrying and love emergence. IEEE Software, 28(5), 2011." } }, { "@position" : "22", "rawText" : { "$" : "[22] M. E. Locasto, S. Sidiroglou, and A. D. Keromytis. Software self-healing using collaborative application communities. In Proceedings of the 2006 Network and Distributed System Security Symposium (NDSS), 2006." }, "id" : { "@value" : "doi_________::6e539f0301aa67945ea78037c50f8cac", "@type" : "openaire", "@trustLevel" : "0.6636007" } }, { "@position" : "23", "rawText" : { "$" : "[23] F. Logozzo and T. Ball. Modular and verified automatic program repair. In Proceedings of the ACM International Conference on Object-oriented Programming Systems, Languages and Applications, pages 133-146. ACM, 2012." }, "id" : { "@value" : "doi_________::d4c79c47b10fe4a7677a642634719536", "@type" : "openaire", "@trustLevel" : "0.674261" } }, { "@position" : "24", "rawText" : { "$" : "[24] F. Long, V. Ganesh, M. Carbin, S. Sidiroglou, and M. Rinard. Automatic input rectification. In Proceedings of the 2012 International Conference on Software Engineering, 2012." } }, { "@position" : "25", "rawText" : { "$" : "[25] M. Martinez and M. Monperrus. Mining software repair models for reasoning on the search space of automated program fixing. Empirical Software Engineering, -, 2013." }, "id" : { "@value" : "doi_________::20a481dc781e009ed40ab895ff4455b9", "@type" : "openaire", "@trustLevel" : "0.6991813" } }, { "@position" : "26", "rawText" : { "$" : "[26] M. Martinez, W. Weimer, and M. Monperrus. Do the fix ingredients already exist? an empirical inquiry into the redundancy assumptions of program repair approaches. In Proceedings of the International Conference on Software Engineering, New Ideas and Emerging Results Track (NIER), 2014." } }, { "@position" : "27", "rawText" : { "$" : "[27] S. Misailovic, S. Sidiroglou, H. Hoffmann, and M. Rinard. Quality of service profiling. In Proceedings of the 32nd ACM/IEEE International Conference on Software Engineering. ACM, 2010." }, "id" : { "@value" : "doi_________::e719b87015dd6eb71ec9d25b5d689e0b", "@type" : "openaire", "@trustLevel" : "0.690052" } }, { "@position" : "28", "rawText" : { "$" : "[28] H. D. T. Nguyen, D. Qi, A. Roychoudhury, , and S. Chandra. SemFix: Program Repair via Semantic Analysis. In Proceedings of the International Conference on Software Engineering, 2013." } }, { "@position" : "29", "rawText" : { "$" : "[29] J. H. Perkins, G. Sullivan, W.-F. Wong, Y. Zibin, M. D. Ernst, M. Rinard, S. Kim, S. Larsen, S. Amarasinghe, J. Bachrach, M. Carbin, C. Pacheco, F. Sherwood, and S. Sidiroglou. Automatically patching errors in deployed software. Proceedings of the 22nd Symposium on Operating Systems Principles (SOSP), 2009." } }, { "@position" : "30", "rawText" : { "$" : "[30] D. Posnett, V. Filkov, and P. T. Devanbu. Ecological inference in empirical software engineering. In Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, pages 362-371, 2011." }, "id" : { "@value" : "doi_________::0f6c3737caf83465fb7644022a39c4e1", "@type" : "openaire", "@trustLevel" : "0.6674565" } }, { "@position" : "31", "rawText" : { "$" : "[31] M. Rinard, C. Cadar, and H. H. Nguyen. Exploring the acceptability envelope. In Companion to the 20th annual ACM SIGPLAN conference on Object-oriented programming, systems, languages, and applications, pages 21-30. ACM, 2005." } }, { "@position" : "32", "rawText" : { "$" : "[32] E. Schulte, S. Forrest, and W. Weimer. Automated program repair through the evolution of assembly code. In Proceedings of the IEEE/ACM International Conference on Automated Software Engineering, 2010." } }, { "@position" : "33", "rawText" : { "$" : "[33] M. Shaw. Self-healing: softening precision to avoid brittleness. In Proceedings of the first workshop on Self-healing systems, WOSS '02, 2002." } }, { "@position" : "34", "rawText" : { "$" : "[34] M. Staats, M. W. Whalen, and M. P. E. Heimdahl. Programs, tests, and oracles: the foundations of testing revisited. In Proceedings of the International Conference on Software Engineering, pages 391-400. IEEE, 2011." }, "id" : { "@value" : "od______2658::42c4de37eec902824c6f729b200a4560", "@type" : "openaire", "@trustLevel" : "0.7821311" } }, { "@position" : "35", "rawText" : { "$" : "[35] D. J. Taylor, D. E. Morgan, and J. P. Black. Redundancy in data structures: Improving software fault tolerance. IEEE Transactions on Software Engineering, (6):585-594, 1980." } }, { "@position" : "36", "rawText" : { "$" : "[36] Y. Wei, Y. Pei, C. A. Furia, L. S. Silva, S. Buchholz, B. Meyer, and A. Zeller. Automated fixing of programs with contracts. In Proceedings of the International Symposium on Software Testing and Analysis. AC, 2010." }, "id" : { "@value" : "doi_________::d682b6d0bdb57ad73088a8371104f41c", "@type" : "openaire", "@trustLevel" : "0.6448236" } }, { "@position" : "37", "rawText" : { "$" : "[37] W. Weimer, T. Nguyen, C. L. Goues, and S. Forrest. Automatically finding patches using genetic programming. In Proceedings of the International Conference on Software Engineering, 2009." } }, { "@position" : "38", "rawText" : { "$" : "[38] A. Zeller. Automated debugging: Are we close? Computer, 34(11):26-31, 2001." } } ] } } ] } } }, { "header" : { "dri:objIdentifier" : { "$" : "dedup_wf_002::9dbd3223d811d1b709705d241dc0a50a" }, "dri:dateOfCollection" : { "$" : "2025-12-20T13:40:45.901327875" }, "dri:dateOfTransformation" : null }, "metadata" : { "oaf:entity" : { "@xsi:schemaLocation" : "http://namespace.openaire.eu/oaf https://www.openaire.eu/schema/1.0/oaf-1.0.xsd", "oaf:result" : { "collectedfrom" : [ { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" }, { "@name" : "Hyper Article en Ligne", "@id" : "opendoar____::7e7757b1e12abcb736ab9a754ffb617a" }, { "@name" : "HAL-Rennes 1", "@id" : "opendoar____::17693c91d9204b7a7646284bb3adb603" }, { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" } ], "originalId" : [ { "$" : "oai:HAL:tel-00514492v1" }, { "$" : "50|inria2______::7ba42d44fe3257e40774bceca9a145d4" }, { "$" : "50|od______2755::7ba42d44fe3257e40774bceca9a145d4" }, { "$" : "50|od_______165::7ba42d44fe3257e40774bceca9a145d4" }, { "$" : "50|od_______166::7ba42d44fe3257e40774bceca9a145d4" } ], "measure" : [ { "@id" : "influence", "@score" : "2.5152056E-9", "@class" : "C5" }, { "@id" : "popularity", "@score" : "3.8176892E-10", "@class" : "C5" }, { "@id" : "influence_alt", "@score" : "0", "@class" : "C5" }, { "@id" : "popularity_alt", "@score" : "0.0", "@class" : "C5" }, { "@id" : "impulse", "@score" : "0", "@class" : "C5" } ], "title" : [ { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "La mesure des modèles par les modèles : une approche générative" }, { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "Model driven model measurement: a generative approach" } ], "bestaccessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "creator" : { "@rank" : "1", "@name" : "Martin", "@surname" : "Monperrus", "@orcid_pending" : "0000-0003-3505-3383", "$" : "Monperrus, Martin" }, "contributor" : { "$" : "Lesage, Loïc" }, "dateofacceptance" : { "$" : "2008-01-01" }, "description" : [ { "$" : "L'ingénierie dirigée par les modèles est une approche du génie logiciel qui utilise des modèles comme artefacts de première importance, à partir desquels la validation, le code, les tests et la documentation sont dérivés. Les modèles peuvent être généralistes (e.g.; UML), propres à un domaine (e.g.; les systèmes temps réels), ou même spécifiques au métier d'une compagnie. La mesure est une activité d'ingénierie qui permet d'obtenir une information quantitative sur les processus d'ingénierie ou les systèmes en cours de développement. La mesure des modèles tôt dans le cycle de développement permet aux architectes et aux managers d'estimer les coûts, d'identifier les risques et les défauts, de valider des propriétés et de suivre une démarche d'assurance qualité dès le début du développement. Malheureusement, il est coûteux de développer un outil de mesure ad hoc pour chaque type de modèles manipulés. Nous proposons une approche indépendante du métamodèle pour définir des métriques de modèles. Les métriques sont spécifiées à un haut niveau d'abstraction, de manière plus rigoureuse qu'avec le langage naturel, de manière plus concise qu'avec un langage de programmation et débarrassées des préoccupations d'implémentation. Ensuite, à partir de cette spécification déclarative des métriques, un outil peut générer le composant de mesure, directement intégré dans un environnement de modélisation. La contribution globale de cette approche est de donner une implémentation des métriques de modèles, intégrée, fondée sur des modèles, et à un coût moindre." }, { "$" : "Model-Driven Engineering (MDE) is an approach to software development that uses models as primary artifacts, from which validation, code, test and documentation are derived. Several metamodels are used in the same process. They range from general purpose ones (e.g.; UML), to domain (e.g.; for real-time systems) and company metamodels. Measurement is an engineering activity that enables to obtain quantitative information on the engineering process or the systems being developed. Measurement of models at an early phase of the development life cycle allows architects and managers to estimate costs, to identify risks and flaws, to validate some properties and to perform early quality assurance. Unfortunately, it is costly to develop an ad hoc measurement tool for each metamodel manipulated. We propose a metamodel-independent framework to define model metrics. Metrics are specified at a high level of abstraction, thus more rigorously than with natural language, more concisely than with a programming language and free of implementation concerns. Then, from this declarative specification of metrics, a toolchain is able to generate the measurement software seamlessly integrated into a modeling environment. The overall contribution of this approach is to give a model-driven and integrated implementation of model metrics at a reasonable cost." } ], "subject" : [ { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "MOA" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "[INFO.INFO-SE] Computer Science [cs]/Software Engineering [cs.SE]" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "mesure" }, { "@classid" : "keyword", "@classname" : "keyword", "@schemeid" : "dnet:subject_classification_typologies", "@schemename" : "dnet:subject_classification_typologies", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "IDM" } ], "language" : { "@classid" : "fra/fre", "@classname" : "French", "@schemeid" : "dnet:languages", "@schemename" : "dnet:languages" }, "relevantdate" : [ { "@classid" : "UNKNOWN", "@classname" : "UNKNOWN", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2010-09-02" }, { "@classid" : "updated", "@classname" : "updated", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2025-08-12" }, { "@classid" : "available", "@classname" : "available", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2010-09-02" }, { "@classid" : "issued", "@classname" : "issued", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2008-01-01" }, { "@classid" : "updated", "@classname" : "updated", "@schemeid" : "dnet:dataCite_date", "@schemename" : "dnet:dataCite_date", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "2023-03-24" } ], "format" : { "$" : "application/pdf" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "resourcetype" : { "@classid" : "doctoral thesis", "@classname" : "doctoral thesis", "@schemeid" : "dnet:dataCite_resource", "@schemename" : "dnet:dataCite_resource" }, "isgreen" : { "$" : true }, "isindiamondjournal" : { "$" : false }, "publiclyfunded" : { "$" : false }, "context" : { "@id" : "inria", "@label" : "INRIA", "@type" : "community" }, "datainfo" : { "inferred" : { "$" : true }, "deletedbyinference" : { "$" : false }, "trust" : { "$" : "0.8" }, "inferenceprovenance" : { "$" : "dedup-result-decisiontree-v4" }, "provenanceaction" : { "@classid" : "sysimport:dedup", "@classname" : "Inferred by OpenAIRE", "@schemeid" : "dnet:provenanceActions", "@schemename" : "dnet:provenanceActions" } }, "rels" : { "rel" : [ { "@inferred" : true, "@trust" : "1.0", "@inferenceprovenance" : "openaire:affiliation:graph", "@provenanceaction" : "result:organization:openaireinference", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "openorgs____::b1a28649a82b98ae497d5c7782656740" }, "country" : { "@classid" : "FR", "@classname" : "France", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "legalname" : { "$" : "French Institute for Research in Computer Science and Automation" }, "legalshortname" : { "$" : "INRIA" }, "websiteurl" : { "$" : "http://www.inria.fr/en/" } }, { "@inferred" : true, "@trust" : "1.0", "@inferenceprovenance" : "openaire:affiliation:graph", "@provenanceaction" : "result:organization:openaireinference", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "openorgs____::ed813555b61d5510408607d696aa433a" }, "websiteurl" : { "$" : "https://www.univ-rennes1.fr/english/home/" }, "country" : { "@classid" : "FR", "@classname" : "France", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "legalname" : { "$" : "University of Rennes 1" }, "legalshortname" : { "$" : "University of Rennes 1" } }, { "@inferred" : true, "@trust" : "1.0", "@inferenceprovenance" : "openaire:affiliation:graph", "@provenanceaction" : "result:organization:openaireinference", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "openorgs____::22ea3f97f9dc4b8bb6e53af148a3a172" }, "legalname" : { "$" : "Institut de Recherche en Informatique et Systèmes Aléatoires" }, "legalshortname" : { "$" : "IRISA" }, "country" : { "@classid" : "FR", "@classname" : "France", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "websiteurl" : { "$" : "https://www.irisa.fr/en" } }, { "@inferred" : true, "@trust" : "1.0", "@inferenceprovenance" : "openaire:affiliation:graph", "@provenanceaction" : "result:organization:openaireinference", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "openorgs____::7fbdf9cd4423c4604745a16afe728bc7" }, "country" : { "@classid" : "FR", "@classname" : "France", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "legalshortname" : { "$" : "CNRS" }, "legalname" : { "$" : "French National Centre for Scientific Research" }, "websiteurl" : { "$" : "http://www.cnrs.fr/index.php" } }, { "@inferred" : true, "@trust" : "0.85", "@inferenceprovenance" : "propagation", "@provenanceaction" : "result:organization:instrepo", "to" : { "@class" : "hasAuthorInstitution", "@scheme" : "dnet:result_organization_relations", "@type" : "organization", "$" : "pending_org_::8507158e44b6079ae284361599d6ee42" }, "legalname" : { "$" : "Université de Rennes 1" }, "country" : { "@classid" : "FR", "@classname" : "France", "@schemeid" : "dnet:countries", "@schemename" : "dnet:countries" }, "legalshortname" : { "$" : "Université de Rennes 1" }, "websiteurl" : { "$" : "https://www.univ-rennes1.fr" } } ] }, "children" : { "result" : [ { "@objidentifier" : "od_______165::7ba42d44fe3257e40774bceca9a145d4", "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "La mesure des modèles par les modèles : une approche générative" }, "dateofacceptance" : { "$" : "2008-01-01" }, "creator" : { "$" : "Monperrus, Martin" }, "collectedfrom" : { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "description" : { "$" : "L'ingénierie dirigée par les modèles est une approche du génie logiciel qui utilise des modèles comme artefacts de première importance, à partir desquels la validation, le code, les tests et la documentation sont dérivés. Les modèles peuvent être généralistes (e.g.; UML), propres à un domaine (e.g.; les systèmes temps réels), ou même spécifiques au métier d'une compagnie. La mesure est une activité d'ingénierie qui permet d'obtenir une information quantitative sur les processus d'ingénierie ou l" }, "instance" : { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" }, "dateofacceptance" : { "$" : "2008-01-01" }, "instancetype" : { "@classid" : "0006", "@classname" : "Doctoral thesis", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://theses.hal.science/tel-00514492v1" }, "webresource" : { "url" : { "$" : "https://theses.hal.science/tel-00514492v1" } } } }, { "@objidentifier" : "od______2755::7ba42d44fe3257e40774bceca9a145d4", "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "La mesure des modèles par les modèles : une approche générative" }, "dateofacceptance" : { "$" : "2008-01-01" }, "creator" : { "$" : "Monperrus, Martin" }, "collectedfrom" : { "@name" : "HAL-Rennes 1", "@id" : "opendoar____::17693c91d9204b7a7646284bb3adb603" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "description" : { "$" : "L'ingénierie dirigée par les modèles est une approche du génie logiciel qui utilise des modèles comme artefacts de première importance, à partir desquels la validation, le code, les tests et la documentation sont dérivés. Les modèles peuvent être généralistes (e.g.; UML), propres à un domaine (e.g.; les systèmes temps réels), ou même spécifiques au métier d'une compagnie. La mesure est une activité d'ingénierie qui permet d'obtenir une information quantitative sur les processus d'ingénierie ou l" }, "instance" : { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "HAL-Rennes 1", "@id" : "opendoar____::17693c91d9204b7a7646284bb3adb603" }, "dateofacceptance" : { "$" : "2008-01-01" }, "instancetype" : { "@classid" : "0006", "@classname" : "Doctoral thesis", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://theses.hal.science/tel-00514492v1" }, "webresource" : { "url" : { "$" : "https://theses.hal.science/tel-00514492v1" } } } }, { "@objidentifier" : "od_______166::7ba42d44fe3257e40774bceca9a145d4", "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "La mesure des modèles par les modèles : une approche générative" }, "dateofacceptance" : { "$" : "2008-01-01" }, "creator" : { "$" : "Monperrus, Martin" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "description" : { "$" : "L'ingénierie dirigée par les modèles est une approche du génie logiciel qui utilise des modèles comme artefacts de première importance, à partir desquels la validation, le code, les tests et la documentation sont dérivés. Les modèles peuvent être généralistes (e.g.; UML), propres à un domaine (e.g.; les systèmes temps réels), ou même spécifiques au métier d'une compagnie. La mesure est une activité d'ingénierie qui permet d'obtenir une information quantitative sur les processus d'ingénierie ou l" }, "collectedfrom" : { "@name" : "Hyper Article en Ligne", "@id" : "opendoar____::7e7757b1e12abcb736ab9a754ffb617a" }, "instance" : { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "Hyper Article en Ligne", "@id" : "opendoar____::7e7757b1e12abcb736ab9a754ffb617a" }, "dateofacceptance" : { "$" : "2008-01-01" }, "instancetype" : { "@classid" : "0006", "@classname" : "Doctoral thesis", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://theses.hal.science/tel-00514492v1" }, "webresource" : { "url" : { "$" : "https://theses.hal.science/tel-00514492v1" } } } }, { "@objidentifier" : "inria2______::7ba42d44fe3257e40774bceca9a145d4", "title" : { "@classid" : "main title", "@classname" : "main title", "@schemeid" : "dnet:dataCite_title", "@schemename" : "dnet:dataCite_title", "@inferred" : false, "@provenanceaction" : "sysimport:crosswalk:repository", "@trust" : "0.9", "$" : "La mesure des modèles par les modèles : une approche générative" }, "dateofacceptance" : { "$" : "2008-01-01" }, "creator" : { "$" : "Monperrus, Martin" }, "resulttype" : { "@classid" : "publication", "@classname" : "publication", "@schemeid" : "dnet:result_typologies", "@schemename" : "dnet:result_typologies" }, "description" : { "$" : "L'ingénierie dirigée par les modèles est une approche du génie logiciel qui utilise des modèles comme artefacts de première importance, à partir desquels la validation, le code, les tests et la documentation sont dérivés. Les modèles peuvent être généralistes (e.g.; UML), propres à un domaine (e.g.; les systèmes temps réels), ou même spécifiques au métier d'une compagnie. La mesure est une activité d'ingénierie qui permet d'obtenir une information quantitative sur les processus d'ingénierie ou l" }, "collectedfrom" : { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" }, "instance" : { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "hostedby" : { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" }, "dateofacceptance" : { "$" : "2008-01-01" }, "instancetype" : { "@classid" : "0006", "@classname" : "Doctoral thesis", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "url" : { "$" : "https://theses.hal.science/tel-00514492v1" }, "webresource" : { "url" : { "$" : "https://theses.hal.science/tel-00514492v1" } } } } ], "instance" : { "accessright" : { "@classid" : "OPEN", "@classname" : "Open Access", "@schemeid" : "dnet:access_modes", "@schemename" : "dnet:access_modes" }, "collectedfrom" : [ { "@name" : "Hyper Article en Ligne", "@id" : "opendoar____::7e7757b1e12abcb736ab9a754ffb617a" }, { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" }, { "@name" : "HAL-Rennes 1", "@id" : "opendoar____::17693c91d9204b7a7646284bb3adb603" }, { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" } ], "hostedby" : [ { "@name" : "INRIA2", "@id" : "openaire____::eac72c1f2fb54aea5ecdbcc519ac9398" }, { "@name" : "Hyper Article en Ligne", "@id" : "opendoar____::7e7757b1e12abcb736ab9a754ffb617a" }, { "@name" : "HAL-Rennes 1", "@id" : "opendoar____::17693c91d9204b7a7646284bb3adb603" }, { "@name" : "INRIA a CCSD electronic archive server", "@id" : "opendoar____::9766527f2b5d3e95d4a733fcfb77bd7e" } ], "dateofacceptance" : { "$" : "2008-01-01" }, "instancetype" : { "@classid" : "0006", "@classname" : "Doctoral thesis", "@schemeid" : "dnet:publication_resource", "@schemename" : "dnet:publication_resource" }, "refereed" : { "@classid" : "0002", "@classname" : "nonPeerReviewed", "@schemeid" : "dnet:review_levels", "@schemename" : "dnet:review_levels" }, "webresource" : { "url" : { "$" : "https://theses.hal.science/tel-00514492v1" } } } } }, "extraInfo" : [ { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "[Andler et al., 2006] Andler, D., Lascar, D., et Sabbagh, G. (2006). Théorie des modèles. In Encyclopedia Universalis. Les éditions de l'Encyclopedia Universalis." } }, { "@position" : "2", "rawText" : { "$" : "[Aspray et al., 1996] Aspray, W., Keil-Slawik, R., et Parnas, D. (1996). The history of software engineering. Technical report, Schloss Dagstuhl." } }, { "@position" : "3", "rawText" : { "$" : "[Atkinson et Kühne, 2003] Atkinson, C. et Kühne, T. (2003). Model-driven development: A metamodeling foundation. IEEE Softw., 20(5):36-41." } }, { "@position" : "4", "rawText" : { "$" : "[Axelsson, 2002] Axelsson, J. (2002). Model based systems engineering using a continuous-time extension of the unified modeling language (UML). Systems Engineering, 5:165-179." } }, { "@position" : "5", "rawText" : { "$" : "[Baader et al., 2003] Baader, F., Calvanese, D., McGuinness, D. L., Nardi, D., et Patel-Schneider, P. F. (2003). The description logic handbook: Theory, implementation, and applications. In Description Logic Handbook. Cambridge University Press." } }, { "@position" : "6", "rawText" : { "$" : "[Baker, 2004] Baker, A. (2004). Simplicity. In Stanford Encyclopedia of Philosophy. The Metaphysics Research Lab, Stanford University." } }, { "@position" : "7", "rawText" : { "$" : "[Baroni et Abreu, 2002] Baroni, A. et Abreu, F. (2002). Formalizing object-oriented design metrics upon the uml meta-model. In Proc. of the 16th Brazilian Symposium on Software Engineering." } }, { "@position" : "8", "rawText" : { "$" : "[Baroni et al., 2002] Baroni, A., Braz, S., et Abreu, F. (2002). Using OCL to formalize object-oriented design metrics definitions. In ECOOP'02 Workshop on Quantitative Approaches in OO Software Engineering." } }, { "@position" : "9", "rawText" : { "$" : "[Baroni, 2005] Baroni, A. L. (2005). Quantitative assessment of uml dynamic models. In Proceedings of the doctoral symposium at the 10th European Software Engineering Conference held jointly with 13th International Symposium on Foundations of Software Engineering (ESEC-FSE'05), pages 366-369. ACM Press." } }, { "@position" : "10", "rawText" : { "$" : "[Basili et al., 1996] Basili, V. R., Briand, L. C., et Melo, W. L. (1996). A validation of object-oriented design metrics as quality indicators. IEEE Trans. Softw. Eng., 22(10):751-761." } }, { "@position" : "11", "rawText" : { "$" : "[Basili et al., 1994] Basili, V. R., Caldiera, G., et Rombach, H. D. (1994). The goal question metric approach. In Encyclopedia of Software Engineering. Wiley." } }, { "@position" : "12", "rawText" : { "$" : "[Batory, 2006] Batory, D. (2006). Multilevel models in model-driven engineering, product lines, and metaprogramming. IBM Syst. J., 45(3):527-539." } }, { "@position" : "13", "rawText" : { "$" : "[Baumert et McWhinney, 1992] Baumert, J. et McWhinney, M. (1992). Software measures and the capability maturity model. Technical report, Software Engineering Institute, Carnegie Mellon University." }, "id" : { "@value" : "doi_________::80a58ba66536b773e90f6e42872d26f5", "@type" : "openaire", "@trustLevel" : "0.6059239" } }, { "@position" : "14", "rawText" : { "$" : "[Berenbach et Borotto, 2006] Berenbach, B. et Borotto, G. (2006). Metrics for model driven requirements development. In Proceeding of the 28th International Conference on Software Engineering (ICSE '06), pages 445-451. ACM Press." } }, { "@position" : "15", "rawText" : { "$" : "[Beyer et al., 2005] Beyer, D., Noack, A., et Lewerentz, C. (2005). Efficient relational calculation for software analysis. IEEE Trans. Softw. Eng., 31(2):137-149." } }, { "@position" : "16", "rawText" : { "$" : "[Boag et al., 2007] Boag, S., Chamberlin, D., Fernández, M. F., Florescu, D., Robie, J., et Siméon, J. (2007). XQuery 1.0: An XML query language. Technical report, W3C." } }, { "@position" : "17", "rawText" : { "$" : "[Boehm, 2006] Boehm, B. (2006). A view of 20th and 21st century software engineering. In ICSE '06: Proceeding of the 28th International Conference on Software Engineering, pages 12-29. ACM." } }, { "@position" : "18", "rawText" : { "$" : "[Boehm et al., 1995] Boehm, B., Clark, B., Horowitz, E., Shelby, R., et Westland, C. (1995). An Overview of the COCOMO 2.0 Software Cost Model. In Software Technology Conference." } }, { "@position" : "19", "rawText" : { "$" : "[Boehm et Sullivan, 2000] Boehm, B. W. et Sullivan, K. J. (2000). Software economics: a roadmap. In ICSE - Future of SE Track, pages 319-343." } }, { "@position" : "20", "rawText" : { "$" : "[Briand et al., 1998] Briand, L. C., Daly, J. W., et Wüst, J. (1998). A unified framework for cohesion measurement in object-oriented systems. Empirical Softw. Eng., 3(1):65-117." } }, { "@position" : "21", "rawText" : { "$" : "[Briand et al., 1996] Briand, L. C., Morasca, S., et Basili, V. R. (1996). Propertybased software engineering measurement. Software Engineering, 22(1):68-86." } }, { "@position" : "22", "rawText" : { "$" : "[Brinkkemper et al., 2001] Brinkkemper, S., Saeki, M., et Harmsen, F. (2001). A method engineering language for the description of systems development methods. In CAiSE, pages 473-476." } }, { "@position" : "23", "rawText" : { "$" : "[Brottier et al., 2007] Brottier, E., Baudry, B., Traon, Y. L., Touzet, D., et Nicolas, B. (2007). Producing a global requirement model from multiple requirement specifications. In EDOC, pages 390-404." }, "id" : { "@value" : "od_______165::6a83fb806f45b4ef83bdf42000a9f857", "@type" : "openaire", "@trustLevel" : "0.60639083" } }, { "@position" : "24", "rawText" : { "$" : "[Budinsky et al., 2004] Budinsky, F., Steinberg, D., Merks, E., Ellersick, R., et Grose, T. J. (2004). Eclipse Modeling Framework. Addison-Wesley." } }, { "@position" : "25", "rawText" : { "$" : "[Bézivin, 2005] Bézivin, J. (2005). On the unification power of models. Software and System Modeling, 4(2):171-188." }, "id" : { "@value" : "doi_________::fb93a3323c6dcb7e780ec478b98bb1c6", "@type" : "openaire", "@trustLevel" : "0.6939042" } }, { "@position" : "26", "rawText" : { "$" : "[Cabot et Teniente, 2006] Cabot, J. et Teniente, E. (2006). A metric for measuring the complexity of ocl expressions. In Model Size Metrics Workshop co-located with MODELS'06." } }, { "@position" : "27", "rawText" : { "$" : "[Card, 1991] Card, D. (1991). What makes a software measure successful. American Programmer, 4:2-8." } }, { "@position" : "28", "rawText" : { "$" : "[CEI et ISO, 1993] CEI et ISO (1993). International vocabulary of basic and general terms in metrology = vocabulaire international des termes fondamentaux et généraux de métrologie. International Organisation for Standardization." } }, { "@position" : "29", "rawText" : { "$" : "[Chen, 1976] Chen, P. P. (1976). The entity-relationship model - toward a unified view of data. ACM Trans. Database Syst., 1(1):9-36." } }, { "@position" : "30", "rawText" : { "$" : "[Cheng et al., 2005] Cheng, B. H. C., Stephenson, R., et Berenbach, B. (2005). Lessons learned from automated analysis of industrial uml class models (an experience report). In Proceedings of MODELS' 2005, pages 324-338." } }, { "@position" : "31", "rawText" : { "$" : "[Chidamber et Kemerer, 1991] Chidamber, S. R. et Kemerer, C. F. (1991). Towards a metrics suite for object-oriented design. In Proceedings of OOPSLA'91, pages 197-211." } }, { "@position" : "32", "rawText" : { "$" : "[Chidamber et Kemerer, 1994] Chidamber, S. R. et Kemerer, C. F. (1994). A metric suite for object-oriented design. IEEE Transactions on Software Engineering, 20(6):293-318." } }, { "@position" : "33", "rawText" : { "$" : "[Cho et al., 2001] Cho, E. S., Kim, M. S., et Kim, S. D. (2001). Component metrics to measure component quality. In Proceedings of the 8th Asia-Pacific on Software Engineering Conference (APSEC'01), page 419. IEEE Computer Society." } }, { "@position" : "34", "rawText" : { "$" : "[Chretienne et al., 2004] Chretienne, P., Jean-Marie, A., Le Lann, G., Stefani, J., Atos Origin, et Dassault Aviation (2004). Programme d'Étude Amont Mesure de la compléxité (marché n˚00-34-007). Technical report, DGA." } }, { "@position" : "35", "rawText" : { "$" : "[Clayberg et Rubel, 2006] Clayberg, E. et Rubel, D. (2006). Eclipse: Building Commercial-Quality Plug-ins. Addison-Wesley." } }, { "@position" : "36", "rawText" : { "$" : "[Consens et Mendelzon, 1990] Consens, M. P. et Mendelzon, A. O. (1990). GraphLog: a visual formalism for real life recursion. In Proc. of the ACM Symp. on Principles of Database Systems, pages 404-416." } }, { "@position" : "37", "rawText" : { "$" : "[Costa, 2001] Costa, F. (2001). Combining meta-information management and reflection in an architecture for configurable and reconfigurable middleware. PhD thesis, University of Lancaster." } }, { "@position" : "38", "rawText" : { "$" : "[Costello et Liu, 1995] Costello, R. J. et Liu, D.-B. (1995). Metrics for requirements engineering. J. Syst. Softw., 29(1):39-63." } }, { "@position" : "39", "rawText" : { "$" : "[Davis et al., 1993] Davis, A., Overmyer, S., Jordan, K., Caruso, J., Dandashi, F., Dinh, A., Kincaid, G., Ledeboer, G., Reynolds, P., Sitaram, P., Ta, A., et Theofanos, M. (1993). Identifying and measuring quality in a software requirements specification. In Proceedings of the First International Software Metrics Symposium." } }, { "@position" : "40", "rawText" : { "$" : "[de Lara et Vangheluwe, 2002] de Lara, J. et Vangheluwe, H. (2002). Atom3: A tool for multi-formalism and meta-modelling. In Proceedings of the 5th International Conference on Fundamental Approaches to Software Engineering (FASE'02), pages 174-188. Springer-Verlag." } }, { "@position" : "41", "rawText" : { "$" : "[Demeyer et Ducasse, 1999] Demeyer, S. et Ducasse, S. (1999). Metrics, do they really help? In Publications, H. S., editor, Proceedings of LMO'99, pages 69-82." } }, { "@position" : "42", "rawText" : { "$" : "[Demeyer et al., 2001] Demeyer, S., Tichelaar, S., et Ducasse, S. (2001). Famix 2.1 - the famoos information exchange model. Technical report, University of Bern." } }, { "@position" : "43", "rawText" : { "$" : "[Dijkstra, 1972] Dijkstra, E. W. (1972). The humble programmer. Commun. ACM, 15:859-866." } }, { "@position" : "44", "rawText" : { "$" : "[Douglass, 2004] Douglass, B. P. (2004). Computing model complexity. White paper, I-Logix." } }, { "@position" : "45", "rawText" : { "$" : "[Ducasse et Gîrba, 2006] Ducasse, S. et Gîrba, T. (2006). Using Smalltalk as a reflective executable meta-language. In International Conference on Model Driven Engineering Languages and Systems (Models/UML 2006), volume 4199 of LNCS, pages 604-618. Springer-Verlag." } }, { "@position" : "46", "rawText" : { "$" : "[Ducasse et al., 2008] Ducasse, S., Gîrba, T., Kuhn, A., et Renggli, L. (2008). Metaenvironment and executable meta-language using smalltalk: an experience report. Journal of Software and Systems Modeling (SOSYM)." } }, { "@position" : "47", "rawText" : { "$" : "[Dufour et al., 2003] Dufour, B., Driesen, K., Hendren, L., et Verbrugge, C. (2003). Dynamic metrics for java. In Proceedings of the ACM SIGPLAN 2003 Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA'03), pages 149-168. ACM Press." }, "id" : { "@value" : "doi_________::287955775d392c0cf0e06a93fbd85ea2", "@type" : "openaire", "@trustLevel" : "0.59967333" } }, { "@position" : "48", "rawText" : { "$" : "[Eichberg et al., 2006] Eichberg, M., Germanus, D., Mezini, M., Mrokon, L., et Schä- fer, T. (2006). Qscope: an open, extensible framework for measuring software projects. In Proceedings of the 10th European Conference on Software Maintenance and Reengineering (CSMR'06)." } }, { "@position" : "49", "rawText" : { "$" : "[El Wakil et al., 2005] El Wakil, M., El Bastawissi, A., Boshra, M., et Fahmy, A. (2005). A novel approach to formalize and collect object-oriented design-metrics. In Proceedings of the 9th International Conference on Empirical Assessment in Software Engineering." } }, { "@position" : "50", "rawText" : { "$" : "[Estefan, 2007] Estefan, J. A. (2007). Survey of model-based systems engineering (MBSE) methodologies. Technical report, INCOSE MBSE Focus Group." } }, { "@position" : "51", "rawText" : { "$" : "[Favre, 2006] Favre, J.-M. (2006). Megamodelling and etymology. In Cordy, J. R., Lämmel, R., et Winter, A., editors, Transformation Techniques in Software Engineering, number 05161 in Dagstuhl Seminar Proceedings. Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany." } }, { "@position" : "52", "rawText" : { "$" : "[Feiler et al., 2006] Feiler, P. H., Gluch, D. P., et Hudak, J. J. (2006). The architecture analysis and design language (aadl): An introduction. Technical report, CMU/SEI." } }, { "@position" : "53", "rawText" : { "$" : "[Fenton, 1991] Fenton, N. E. (1991). Software Metrics: A Rigorous Approach. Chapman and Hall." } }, { "@position" : "54", "rawText" : { "$" : "[Fenton et Neil, 1999] Fenton, N. E. et Neil, M. (1999). A critique of software defect prediction models. IEEE Trans. Softw. Eng., 25(5):675-689." } }, { "@position" : "55", "rawText" : { "$" : "[Ferneley, 1997] Ferneley, E. (1997). An empirical study of coupling and control flow metrics. Information and Software Technology, 39(13):879-887." } }, { "@position" : "56", "rawText" : { "$" : "[France et Rumpe, 2007] France, R. et Rumpe, B. (2007). Model-driven development of complex software: A research roadmap. In Future of Software Engineering (FOSE'07), pages 37-54. IEEE Computer Society." } }, { "@position" : "57", "rawText" : { "$" : "[Frigg et Hartmann, 2006] Frigg, R. et Hartmann, S. (2006). Models in science. In Stanford Encyclopedia of Philosophy. The Metaphysics Research Lab." }, "id" : { "@value" : "core_ac_uk__::58e6aab36e0d6637637d1cafc3fa0aca", "@type" : "openaire", "@trustLevel" : "0.60075843" } }, { "@position" : "58", "rawText" : { "$" : "[Gamma et al., 1995] Gamma, E., Helm, R., Johnson, R., et Vlissides, J. (1995). Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Boston, MA, USA." } }, { "@position" : "59", "rawText" : { "$" : "[Garcia et al., 2004] Garcia, F., Ruiz, F., et Piattini, M. (2004). Definition and empirical validation of metrics for software process models. In Proceedings of the International Conference on Product Focused Software Process Improvement (PROFES'2004)." } }, { "@position" : "60", "rawText" : { "$" : "[Garcìa et al., 2006] Garcìa, F., Bertoa, M. F., Calero, C., Vallecillo, A., Ruiz, F., Piattini, M., et Genero, M. (2006). Towards a consistent terminology for software measurement. Information and Software Technology, 48(8):631-644." }, "id" : { "@value" : "doi_________::b852382f6350eec1442f6df9159de3c4", "@type" : "openaire", "@trustLevel" : "0.7317082" } }, { "@position" : "61", "rawText" : { "$" : "[Genero et al., 2002a] Genero, M., Miranda, D., et Piattini, M. (2002a). Defining and validating metrics for uml statechart diagrams. In Proceedings of QAOOSE'2002." } }, { "@position" : "62", "rawText" : { "$" : "[Genero et al., 2000] Genero, M., Piattini, M., et Calero, C. (2000). Early measures for UML class diagrams. L'Objet, 6(4):489-505." } }, { "@position" : "63", "rawText" : { "$" : "[Genero et al., 2002b] Genero, M., Piattini, M., et Calero, C. (2002b). Empirical validation of class diagram metrics. In Proceedings of the International Symposium on Empirical Software Engineering (ISESE'02), page 195. IEEE Computer Society." }, "id" : { "@value" : "doi_________::6075e18d85d4062a9842c669604f1b19", "@type" : "openaire", "@trustLevel" : "0.63127756" } }, { "@position" : "64", "rawText" : { "$" : "[Genero et al., 2005] Genero, M., Piattini, M., et Caleron, C. (2005). A survey of metrics for UML class diagrams. Journal of Object Technology, 4:59-92." }, "id" : { "@value" : "doi_________::a0710cf4d04bf76dd5320c1c24e14b95", "@type" : "openaire", "@trustLevel" : "0.6194535" } }, { "@position" : "65", "rawText" : { "$" : "[Gill et Grover, 2003] Gill, N. S. et Grover, P. S. (2003). Component-based measurement: few useful guidelines. SIGSOFT Softw. Eng. Notes, 28(6):4-4." } }, { "@position" : "66", "rawText" : { "$" : "[Grady, 1992] Grady, R. B. (1992). Practical software metrics for project management and process improvement. Prentice-Hall, Inc." } }, { "@position" : "67", "rawText" : { "$" : "[Granger, 1993] Granger, G.-G. (1993). La science ou les sciences. PUF." } }, { "@position" : "68", "rawText" : { "$" : "[Guerra et al., 2007] Guerra, E., de Lara, J., et Díaz, P. (2007). Visual specification of measurements and redesigns for domain specific visual languages. Journal of Visual Languages and Computing, in Press:1-27." } }, { "@position" : "69", "rawText" : { "$" : "[Guerra et al., 2006] Guerra, E., Diaz, P., et de Lara, J. (2006). Visual specification of metrics for domain specific visual languages. In Graph Transformation and Visual Modeling Techniques (GT-VMT 2006)." } }, { "@position" : "70", "rawText" : { "$" : "[Hammer et al., 1997] Hammer, T., Rosenberg, L., Huffman, L., et Hyatt, L. (1997). Requirements metrics - value added. In Proceedings of the 3rd IEEE International Symposium on Requirements Engineering (RE'97), page 141.1. IEEE Computer Society." } }, { "@position" : "71", "rawText" : { "$" : "[Harel et Rumpe, 2004] Harel, D. et Rumpe, B. (2004). Meaningful modeling: what's the semantics of semantics? Computer, 37(10):64-72." } }, { "@position" : "72", "rawText" : { "$" : "[Harmer et Wilkie, 2002] Harmer, T. J. et Wilkie, F. G. (2002). An extensible metrics extraction environment for object-oriented programming languages. In Proceedings of the International Conference on Software Maintenance." } }, { "@position" : "73", "rawText" : { "$" : "[Henderson-Sellers, 1996] Henderson-Sellers, B. (1996). measures of complexity. Prentice Hall." } }, { "@position" : "74", "rawText" : { "$" : "[Henry et Kafura, 1981] Henry, S. et Kafura, D. (1981). Software structure metrics based on information flow. IEEE Trans. Softw. Eng., 7(5):510-518." } }, { "@position" : "75", "rawText" : { "$" : "[Hitz et Montazeri, 1996] Hitz, M. et Montazeri, B. (1996). Chidamber and kemerer's metrics suite: A measurement theory perspective. IEEE Trans. Softw. Eng., 22(4):267-271." } }, { "@position" : "76", "rawText" : { "$" : "[Ince et al., 2000] Ince, A., Topuz, E., Panayirci, E., et Isik, C. (2000). Principles of Integrated Maritime Surveillance Systems, volume 527. Kluwer Academic Publishers." } }, { "@position" : "77", "rawText" : { "$" : "[ISO/IEC, 2001] ISO/IEC (2001). ISO/IEC 9126. Software engineering - Product quality. ISO/IEC." } }, { "@position" : "78", "rawText" : { "$" : "[Jones, 1991] Jones, C. (1991). Applied software measurement: assuring productivity and quality. McGraw-Hill." } }, { "@position" : "79", "rawText" : { "$" : "[Jouault et Bézivin, 2006] Jouault, F. et Bézivin, J. (2006). Km3: a dsl for metamodel specification. In Proceedings of the 8th IFIP International Conference on Formal Methods for Open Object-Based Distributed Systems." } }, { "@position" : "80", "rawText" : { "$" : "[Jouault et Kurtev, 2005] Jouault, F. et Kurtev, I. (2005). Transforming models with ATL. In Proceedings of the Model Transformations in Practice Workshop at MoDELS 2005. Workshop Model Transformations in Practice, part of the MoDELS 2005 Conference." } }, { "@position" : "81", "rawText" : { "$" : "[Jézéquel, 2008] Jézéquel, J.-M. (2008). Model driven design and aspect weaving. Journal of Software and Systems Modeling (SoSyM), 7(2):209-218." }, "id" : { "@value" : "doi_________::39ea6335b8079e0499b3be275eea751f", "@type" : "openaire", "@trustLevel" : "0.7045794" } }, { "@position" : "82", "rawText" : { "$" : "[Kamata et Tamai, 2007] Kamata, M. I. et Tamai, T. (2007). How does requirements quality relate to project success or failure? In Proceedings of the15th IEEE International Requirements Engineering Conference (RE'07), pages 69-78." } }, { "@position" : "83", "rawText" : { "$" : "[Kan, 1995] Kan, S. H. (1995). Metrics and Models in Software Quality Engineering. Addison Wesley, Reading, MA." } }, { "@position" : "84", "rawText" : { "$" : "[Kastenberg, 2004] Kastenberg, H. (2004). Software metrics as class graph properties. Master's thesis, University of Twente." } }, { "@position" : "85", "rawText" : { "$" : "[Kent, 2002] Kent, S. (2002). Model driven engineering. In Proceedings of the Third International Conference Integrated Formal Methods (IFM'2002)." } }, { "@position" : "86", "rawText" : { "$" : "[Khoshgoftaar et Munson, 1990] Khoshgoftaar, T. et Munson, J. (1990). The lines of code metric as a predictor of program faults: A critical analysis. In Proceedings of the Computer Software and Applications Conference, pages 408-413." } }, { "@position" : "87", "rawText" : { "$" : "[Kiczales et al., 1991] Kiczales, G., des Rivières, J., et Bobrow, D. G. (1991). The Art of the Metaobject Protocol. The MIT Press." } }, { "@position" : "88", "rawText" : { "$" : "[Kieburtz et al., 1996] Kieburtz, R. B., McKinney, L., Bell, J. M., Hook, J., Kotov, A., Lewis, J., Olivia, D. P., Sheard, T., Smith, I., et Walton, L. (1996). A software engineering experiment in software component generation. In Proceeding of the 18th International Conference on Software Engineering (ICSE'96), pages 542-552." } }, { "@position" : "89", "rawText" : { "$" : "[Kim et Boldyreff, 2002] Kim, H. et Boldyreff, C. (2002). Developing software metrics applicable to UML models. In Proceedings of QAOOSE'2002. QAOOSE 2002." } }, { "@position" : "90", "rawText" : { "$" : "[Kitchenham et al., 2001] Kitchenham, B. A., Hughes, R. T., et Linkman, S. G. (2001). Modeling software measurement data. IEEE Trans. Softw. Eng., 27(9):788- 804." } }, { "@position" : "91", "rawText" : { "$" : "[Kitchenham et al., 1990] Kitchenham, B. A., Pickard, L. M., et Linkman, S. J. (1990). An evaluation of some design metrics. Softw. Eng. J., 5(1):50-58." } }, { "@position" : "92", "rawText" : { "$" : "[Kolde, 2004] Kolde, C. (2004). Basic metrics for requirements management. White paper, Borland." } }, { "@position" : "93", "rawText" : { "$" : "[Krantz et al., 1971] Krantz, D., Luce, R., Suppes, P., et Tversky, A. (1971). Foundations of measurement. Academic Press, New York." } }, { "@position" : "94", "rawText" : { "$" : "[Kuehne, 2006] Kuehne, T. (2006). Matters of (meta-) modeling. Software and System Modeling, 5(4):369-385." } }, { "@position" : "95", "rawText" : { "$" : "[LaLonde et Pugh, 1994] LaLonde, W. R. et Pugh, J. R. (1994). Gathering metric information using metalevel facilities. JOOP, 7(1):33-37." } }, { "@position" : "96", "rawText" : { "$" : "[Lanza et Ducasse, 2002] Lanza, M. et Ducasse, S. (2002). Beyond language independent object-oriented metrics: Model independent metrics. In Abreu, F., Piattini, M., Poels, G., et Sahraoui, H. A., editors, Proceedings of the 6th International Workshop on Quantitative Approaches in Object-Oriented Software Engineering, pages 77-84." } }, { "@position" : "97", "rawText" : { "$" : "[Lavazza et Agostini, 2005] Lavazza, L. et Agostini, A. (2005). Automated measurement of uml models: an open toolset approach. Journal of Object Technology, 4(4):115-134." }, "id" : { "@value" : "od______3660::7022a9c40ce5f541a43616eff6ffb35f", "@type" : "openaire", "@trustLevel" : "0.60227674" } }, { "@position" : "98", "rawText" : { "$" : "[Ledeczi et al., 2001] Ledeczi, A., Maroti, M., Bakay, A., Karsai, G., Garrett, J., Thomason, C., Nordstrom, G., Sprinkle, J., et Volgyesi, P. (2001). The generic modeling environment. In Proceedings of the Workshop on Intelligent Signal Processing (WISP'2001)." } }, { "@position" : "99", "rawText" : { "$" : "[Lehman, 1994] Lehman, M. (1994). Models and modelling in software engineering. In J.Marciniak, editor, Encyclopaedia of Software Engineering, volume 1, pages 698 - 702. Wiley and Co." } }, { "@position" : "100", "rawText" : { "$" : "[Lethbridge et al., 2004] Lethbridge, T., Tichelaar, S., et Ploedereder, E. (2004). The dagstuhl middle metamodel: A schema for reverse engineering. Electr. Notes Theor. Comput. Sci., 94:7-18." }, "id" : { "@value" : "base_oa_____::de206d39d6992feeebfbd9cd95e50dd9", "@type" : "openaire", "@trustLevel" : "0.6199294" } }, { "@position" : "101", "rawText" : { "$" : "[Lewerentz et Simon, 1998] Lewerentz, C. et Simon, F. (1998). A product metrics tool integrated into a software development environment. In Proceedings of the Workshop on Object-Oriented Technology at ECOOP'98." } }, { "@position" : "102", "rawText" : { "$" : "[Lo, 1992] Lo, B. (1992). Syntactical construct based apar projection. Technical report, IBM Santa Teresa Laboratory Technical Report, California." } }, { "@position" : "103", "rawText" : { "$" : "[Loconsole, 2001] Loconsole, A. (2001). Measuring the requirements management key process area. In Proceedings of the 12th European Software Control and Metrics Conference (ESCOM'2001)." } }, { "@position" : "104", "rawText" : { "$" : "[Mahmood et Lai, 2005] Mahmood, S. et Lai, R. (2005). Measuring the complexity of a uml component specification. In QSIC '05: Proceedings of the Fifth International Conference on Quality Software, pages 150-160, Washington, DC, USA. IEEE Computer Society." } }, { "@position" : "105", "rawText" : { "$" : "[Marchesi, 1998] Marchesi, M. (1998). OOA metrics for the Unified Modeling Language. In Proceedings of the 2nd Euromicro Conference on Software Maintenance and Reengineering (CSMR'98), page 67. IEEE Computer Society." } }, { "@position" : "106", "rawText" : { "$" : "[Marinescu et al., 2005] Marinescu, C., Marinescu, R., et Gîrba, T. (2005). Towards a simplified implementation of object-oriented design metrics. In IEEE METRICS, page 11." } }, { "@position" : "107", "rawText" : { "$" : "[Martin, 2000] Martin, R. C. (2000). Design principles and design patterns." } }, { "@position" : "108", "rawText" : { "$" : "[McCabe, 1976] McCabe (1976). A complexity measure. IEEE Transactions on Software Engineering, 2:308-320." } }, { "@position" : "109", "rawText" : { "$" : "[McQuillan et Power, 2006a] McQuillan, J. et Power, J. (2006a). Towards the reusability of software metrics definitions at the meta level. In Proceedings of the ECOOP'2006 Doctoral Symposium." } }, { "@position" : "110", "rawText" : { "$" : "[McQuillan et Power, 2006b] McQuillan, J. A. et Power, J. F. (2006b). Experiences of using the dagstuhl middle metamodel for defining software metrics. In Proceedings of the 4th International Conference on Principles and Practices of Programming in Java." } }, { "@position" : "111", "rawText" : { "$" : "[Mellor et al., 2003] Mellor, S. J., Clark, A. N., et Futagami, T. (2003). Guest editors' introduction: Model-driven development. IEEE Softw., 20(5):14-18." } }, { "@position" : "112", "rawText" : { "$" : "[Mendelzon et Sametinger, 1995] Mendelzon, A. et Sametinger, J. (1995). Reverse engineering by visualizing and querying. Software - Concepts and Tools, 16(4):170- 182." } }, { "@position" : "113", "rawText" : { "$" : "[Mens et Lanza, 2002] Mens, T. et Lanza, M. (2002). A graph-based metamodel for object-oriented software metrics. Electronic Notes in Theoretical Computer Science, 72:57-68." } }, { "@position" : "114", "rawText" : { "$" : "[Monperrus et al., 2008b] Monperrus, M., Jézéquel, J.-M., Champeau, J., et Hoeltzener, B. (2008b). Measuring models. In Rech, J. et Bunse, C., editors, Model-Driven Software Development: Integrating Quality Assurance. IDEA Group." }, "id" : { "@value" : "od_______165::fc548d465adab29b7bc5a3e25e34721f", "@type" : "openaire", "@trustLevel" : "0.6636128" } }, { "@position" : "115", "rawText" : { "$" : "[Monperrus et al., 2008c] Monperrus, M., Jézéquel, J.-M., Champeau, J., et Hoeltzener, B. (2008c). Model-driven engineering metrics for real time systems. In Proceedings of the 4th European Congress on Embedded Real Time Software (ERTS'2008)." }, "id" : { "@value" : "od______2755::b25be54a7a04dd0eda8841675461a8e3", "@type" : "openaire", "@trustLevel" : "0.6636128" } }, { "@position" : "116", "rawText" : { "$" : "[Monperrus et al., 2008d] Monperrus, M., Jézéquel, J.-M., Champeau, J., et Hoeltzener, B. (2008d). A model-driven measurement approach. In Proceedings of the ACM/IEEE 11th International Conference on Model Driven Engineering Languages and Systems (MODELS'2008)." }, "id" : { "@value" : "od_______165::2addba2f6aae347f5de08a554491c23c", "@type" : "openaire", "@trustLevel" : "0.6636128" } }, { "@position" : "117", "rawText" : { "$" : "[Mora et al., 2008] Mora, B., García, F., Ruiz, F., Piattini, M., Boronat, A., Gómez, A., Carsí, J. Á., et Ramos, I. (2008). Software measurement by using qvt transformations in an mda context. In Proceedings of the International Conference on Enterprise Information Systems (ICEIS'2008)." } }, { "@position" : "118", "rawText" : { "$" : "[Morgenthaler, 2007] Morgenthaler, S. (2007). Introduction à la statistique. Presses polytechniques et universitaires romandes, 3 edition." } }, { "@position" : "119", "rawText" : { "$" : "[Mouloud, 2006] Mouloud, N. (2006). Modèle. In Encyclopedia Universalis. Les éditions de l'Encyclopedia Universalis." } }, { "@position" : "120", "rawText" : { "$" : "[Muller et al., 2005] Muller, P. A., Fleurey, F., et Jézéquel, J. M. (2005). Weaving executability into object-oriented meta-languages. In Proceedings of MODELS/UML 2005." } }, { "@position" : "121", "rawText" : { "$" : "[Müller et Simmons, 2002] Müller, A. et Simmons, G. (2002). Exception handling: Common problems and best practice with java 1.4. In Proceedings of Net.ObjectDays'2002." } }, { "@position" : "122", "rawText" : { "$" : "[Nakatani et al., 2001] Nakatani, T., Urai, T., Ohmura, S., et Tamai, T. (2001). A requirements description metamodel for use cases. In Proceedings of the 8th AsiaPacific on Software Engineering Conference (APSEC'01), page 251. IEEE Computer Society." } }, { "@position" : "123", "rawText" : { "$" : "[Narasimhan et Hendradjaya, 2004] Narasimhan, V. L. et Hendradjaya, B. (2004). Component integration metrics. In Proceedings of the International Conference on Software Engineering Research and Practice (SERP'04)." } }, { "@position" : "124", "rawText" : { "$" : "[OMG, 2004] OMG (2004). MOF 2.0 specification. Technical report, Object Management Group." } }, { "@position" : "125", "rawText" : { "$" : "[OMG, 2005] OMG (2005). System modeling language (SysML) specification. Technical report, Object Management Group." } }, { "@position" : "126", "rawText" : { "$" : "[OMG, 2008] OMG (2008). Software Process Engineering Metamodel (SPEM). Technical report, Object Management Group." } }, { "@position" : "127", "rawText" : { "$" : "[Park et Kim, 1993] Park, S. J. et Kim, H. D. (1993). Constraint-based meta-view approach for modeling environmentinitl generation. Decision Support System, 9:325-348." } }, { "@position" : "128", "rawText" : { "$" : "[Paulk et al., 1993] Paulk, M. C., Weber, C. V., Garcia, S. M., Chrissis, M. B., et Bush, M. (1993). Key practices of the capability maturity model. Technical report, Software Engineering Institute." }, "id" : { "@value" : "doi_________::6ab537678908548bd199b70d84da1709", "@type" : "openaire", "@trustLevel" : "0.62692255" } }, { "@position" : "129", "rawText" : { "$" : "[Pawlak et al., 2006] Pawlak, R., Noguera, C., et Petitprez, N. (2006). Spoon: Program analysis and transformation in java. Technical Report 5901, INRIA." } }, { "@position" : "130", "rawText" : { "$" : "[Poels et Dedene, 2000] Poels, G. et Dedene, G. (2000). Distance-based software measurement: necessary and sufficient properties for software measures. Information and Software Technology, 42(1):35-46." } }, { "@position" : "131", "rawText" : { "$" : "[Reissing, 2001] Reissing, R. (2001). Towards a model for object-oriented design measurement. In ECOOP'01 Workshop QAOOSE." } }, { "@position" : "132", "rawText" : { "$" : "[Revault, 1996] Revault, N. (1996). Principes de méta-modélisation pour l'utilisation de canevas d'applications à objets (MétaGen et les frameworks). PhD thesis, Université P. et M. Curie (Paris 6), Paris, France." } }, { "@position" : "133", "rawText" : { "$" : "[Reynoso et al., 2003] Reynoso, L., Genero, M., et Piattini, M. (2003). Measuring ocl expressions: a \"tracing\"-based approach. In Proceedings of QAOOSE'2003." } }, { "@position" : "134", "rawText" : { "$" : "[Rothenberg, 1989] Rothenberg, J. (1989). The nature of modeling. John Wiley and Sons, Inc." } }, { "@position" : "135", "rawText" : { "$" : "[Seidewitz, 2003] Seidewitz, E. (2003). What models mean. IEEE Softw., 20(5):26- 32." } }, { "@position" : "136", "rawText" : { "$" : "[Selic, 2003] Selic, B. (2003). The pragmatics of model-driven development. IEEE Softw., 20(5):19-25." } }, { "@position" : "137", "rawText" : { "$" : "[Singh et al., 2004] Singh, Y., Sabharwal, S., et Sood, M. (2004). A systematic approach to measure the problem complexity of software requirement specifications of an information system. Information and Management Sciences, 15:69-90." } }, { "@position" : "138", "rawText" : { "$" : "[Smacchia S.A., 2006] Smacchia S.A. (2006). Code query language 1.5 specification. Technical report, Smacchia S.A." } }, { "@position" : "139", "rawText" : { "$" : "[Soley, 2000] Soley, R. (2000). Model driven architecture. Technical report, Object Management Group." } }, { "@position" : "140", "rawText" : { "$" : "[Solheim et al., 2005] Solheim, H., Lillehagen, F., Petersen, S. A., Jorgensen, H., et Anastasiou, M. (2005). Model-driven visual requirements engineering. In Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE'05), pages 421-428." } }, { "@position" : "141", "rawText" : { "$" : "[Spector et Gifford, 1986] Spector, A. et Gifford, D. (1986). A computer science perspective of bridge design. Commun. ACM, 29(4):267-283." } }, { "@position" : "142", "rawText" : { "$" : "[Sztipanovits et Karsai, 1997] Sztipanovits, J. et Karsai, G. (1997). integrated computing. Computer, 30(4):110-111." } }, { "@position" : "143", "rawText" : { "$" : "[Washizaki et al., 2003] Washizaki, H., Yamamoto, H., et Fukazawa, Y. (2003). A metrics suite for measuring reusability of software components. In METRICS '03: Proceedings of the 9th International Symposium on Software Metrics, page 211. IEEE Computer Society." } }, { "@position" : "144", "rawText" : { "$" : "[White, 2000] White, K. P. (2000). Model theory. In McGraw-Hill Encyclopedia of Science and Technology. The McGraw-Hill Companies." } }, { "@position" : "145", "rawText" : { "$" : "[Wohlin, 2007] Wohlin, C. (2007). An analysis of the most cited articles in software engineering journals - 2000. Inf. Softw. Technol., 49(1):2-11." } }, { "@position" : "146", "rawText" : { "$" : "[Yu-ying et al., 2007] Yu-ying, W., Qing-shan, L., Ping, C., et Chun-de, R. (2007). Dynamic fan-in and fan-out metrics for program comprehension. Journal of Shanghai University, 11(5):474-479." }, "id" : { "@value" : "doi_________::c68c9e73a21b933b1eaf577847b2186c", "@type" : "openaire", "@trustLevel" : "0.7521498" } } ] } }, { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "[Andler et al., 2006] Andler, D., Lascar, D., et Sabbagh, G. (2006). Théorie des modèles. In Encyclopedia Universalis. Les éditions de l'Encyclopedia Universalis." } }, { "@position" : "2", "rawText" : { "$" : "[Aspray et al., 1996] Aspray, W., Keil-Slawik, R., et Parnas, D. (1996). The history of software engineering. Technical report, Schloss Dagstuhl." } }, { "@position" : "3", "rawText" : { "$" : "[Atkinson et Kühne, 2003] Atkinson, C. et Kühne, T. (2003). Model-driven development: A metamodeling foundation. IEEE Softw., 20(5):36-41." } }, { "@position" : "4", "rawText" : { "$" : "[Axelsson, 2002] Axelsson, J. (2002). Model based systems engineering using a continuous-time extension of the unified modeling language (UML). Systems Engineering, 5:165-179." } }, { "@position" : "5", "rawText" : { "$" : "[Baader et al., 2003] Baader, F., Calvanese, D., McGuinness, D. L., Nardi, D., et Patel-Schneider, P. F. (2003). The description logic handbook: Theory, implementation, and applications. In Description Logic Handbook. Cambridge University Press." } }, { "@position" : "6", "rawText" : { "$" : "[Baker, 2004] Baker, A. (2004). Simplicity. In Stanford Encyclopedia of Philosophy. The Metaphysics Research Lab, Stanford University." } }, { "@position" : "7", "rawText" : { "$" : "[Baroni et Abreu, 2002] Baroni, A. et Abreu, F. (2002). Formalizing object-oriented design metrics upon the uml meta-model. In Proc. of the 16th Brazilian Symposium on Software Engineering." } }, { "@position" : "8", "rawText" : { "$" : "[Baroni et al., 2002] Baroni, A., Braz, S., et Abreu, F. (2002). Using OCL to formalize object-oriented design metrics definitions. In ECOOP'02 Workshop on Quantitative Approaches in OO Software Engineering." } }, { "@position" : "9", "rawText" : { "$" : "[Baroni, 2005] Baroni, A. L. (2005). Quantitative assessment of uml dynamic models. In Proceedings of the doctoral symposium at the 10th European Software Engineering Conference held jointly with 13th International Symposium on Foundations of Software Engineering (ESEC-FSE'05), pages 366-369. ACM Press." } }, { "@position" : "10", "rawText" : { "$" : "[Basili et al., 1996] Basili, V. R., Briand, L. C., et Melo, W. L. (1996). A validation of object-oriented design metrics as quality indicators. IEEE Trans. Softw. Eng., 22(10):751-761." } }, { "@position" : "11", "rawText" : { "$" : "[Basili et al., 1994] Basili, V. R., Caldiera, G., et Rombach, H. D. (1994). The goal question metric approach. In Encyclopedia of Software Engineering. Wiley." } }, { "@position" : "12", "rawText" : { "$" : "[Batory, 2006] Batory, D. (2006). Multilevel models in model-driven engineering, product lines, and metaprogramming. IBM Syst. J., 45(3):527-539." } }, { "@position" : "13", "rawText" : { "$" : "[Baumert et McWhinney, 1992] Baumert, J. et McWhinney, M. (1992). Software measures and the capability maturity model. Technical report, Software Engineering Institute, Carnegie Mellon University." }, "id" : { "@value" : "doi_________::80a58ba66536b773e90f6e42872d26f5", "@type" : "openaire", "@trustLevel" : "0.6059239" } }, { "@position" : "14", "rawText" : { "$" : "[Berenbach et Borotto, 2006] Berenbach, B. et Borotto, G. (2006). Metrics for model driven requirements development. In Proceeding of the 28th International Conference on Software Engineering (ICSE '06), pages 445-451. ACM Press." } }, { "@position" : "15", "rawText" : { "$" : "[Beyer et al., 2005] Beyer, D., Noack, A., et Lewerentz, C. (2005). Efficient relational calculation for software analysis. IEEE Trans. Softw. Eng., 31(2):137-149." } }, { "@position" : "16", "rawText" : { "$" : "[Boag et al., 2007] Boag, S., Chamberlin, D., Fernández, M. F., Florescu, D., Robie, J., et Siméon, J. (2007). XQuery 1.0: An XML query language. Technical report, W3C." } }, { "@position" : "17", "rawText" : { "$" : "[Boehm, 2006] Boehm, B. (2006). A view of 20th and 21st century software engineering. In ICSE '06: Proceeding of the 28th International Conference on Software Engineering, pages 12-29. ACM." } }, { "@position" : "18", "rawText" : { "$" : "[Boehm et al., 1995] Boehm, B., Clark, B., Horowitz, E., Shelby, R., et Westland, C. (1995). An Overview of the COCOMO 2.0 Software Cost Model. In Software Technology Conference." } }, { "@position" : "19", "rawText" : { "$" : "[Boehm et Sullivan, 2000] Boehm, B. W. et Sullivan, K. J. (2000). Software economics: a roadmap. In ICSE - Future of SE Track, pages 319-343." } }, { "@position" : "20", "rawText" : { "$" : "[Briand et al., 1998] Briand, L. C., Daly, J. W., et Wüst, J. (1998). A unified framework for cohesion measurement in object-oriented systems. Empirical Softw. Eng., 3(1):65-117." } }, { "@position" : "21", "rawText" : { "$" : "[Briand et al., 1996] Briand, L. C., Morasca, S., et Basili, V. R. (1996). Propertybased software engineering measurement. Software Engineering, 22(1):68-86." } }, { "@position" : "22", "rawText" : { "$" : "[Brinkkemper et al., 2001] Brinkkemper, S., Saeki, M., et Harmsen, F. (2001). A method engineering language for the description of systems development methods. In CAiSE, pages 473-476." } }, { "@position" : "23", "rawText" : { "$" : "[Brottier et al., 2007] Brottier, E., Baudry, B., Traon, Y. L., Touzet, D., et Nicolas, B. (2007). Producing a global requirement model from multiple requirement specifications. In EDOC, pages 390-404." }, "id" : { "@value" : "od_______165::6a83fb806f45b4ef83bdf42000a9f857", "@type" : "openaire", "@trustLevel" : "0.60639083" } }, { "@position" : "24", "rawText" : { "$" : "[Budinsky et al., 2004] Budinsky, F., Steinberg, D., Merks, E., Ellersick, R., et Grose, T. J. (2004). Eclipse Modeling Framework. Addison-Wesley." } }, { "@position" : "25", "rawText" : { "$" : "[Bézivin, 2005] Bézivin, J. (2005). On the unification power of models. Software and System Modeling, 4(2):171-188." }, "id" : { "@value" : "doi_________::fb93a3323c6dcb7e780ec478b98bb1c6", "@type" : "openaire", "@trustLevel" : "0.6939042" } }, { "@position" : "26", "rawText" : { "$" : "[Cabot et Teniente, 2006] Cabot, J. et Teniente, E. (2006). A metric for measuring the complexity of ocl expressions. In Model Size Metrics Workshop co-located with MODELS'06." } }, { "@position" : "27", "rawText" : { "$" : "[Card, 1991] Card, D. (1991). What makes a software measure successful. American Programmer, 4:2-8." } }, { "@position" : "28", "rawText" : { "$" : "[CEI et ISO, 1993] CEI et ISO (1993). International vocabulary of basic and general terms in metrology = vocabulaire international des termes fondamentaux et généraux de métrologie. International Organisation for Standardization." } }, { "@position" : "29", "rawText" : { "$" : "[Chen, 1976] Chen, P. P. (1976). The entity-relationship model - toward a unified view of data. ACM Trans. Database Syst., 1(1):9-36." } }, { "@position" : "30", "rawText" : { "$" : "[Cheng et al., 2005] Cheng, B. H. C., Stephenson, R., et Berenbach, B. (2005). Lessons learned from automated analysis of industrial uml class models (an experience report). In Proceedings of MODELS' 2005, pages 324-338." } }, { "@position" : "31", "rawText" : { "$" : "[Chidamber et Kemerer, 1991] Chidamber, S. R. et Kemerer, C. F. (1991). Towards a metrics suite for object-oriented design. In Proceedings of OOPSLA'91, pages 197-211." } }, { "@position" : "32", "rawText" : { "$" : "[Chidamber et Kemerer, 1994] Chidamber, S. R. et Kemerer, C. F. (1994). A metric suite for object-oriented design. IEEE Transactions on Software Engineering, 20(6):293-318." } }, { "@position" : "33", "rawText" : { "$" : "[Cho et al., 2001] Cho, E. S., Kim, M. S., et Kim, S. D. (2001). Component metrics to measure component quality. In Proceedings of the 8th Asia-Pacific on Software Engineering Conference (APSEC'01), page 419. IEEE Computer Society." } }, { "@position" : "34", "rawText" : { "$" : "[Chretienne et al., 2004] Chretienne, P., Jean-Marie, A., Le Lann, G., Stefani, J., Atos Origin, et Dassault Aviation (2004). Programme d'Étude Amont Mesure de la compléxité (marché n˚00-34-007). Technical report, DGA." } }, { "@position" : "35", "rawText" : { "$" : "[Clayberg et Rubel, 2006] Clayberg, E. et Rubel, D. (2006). Eclipse: Building Commercial-Quality Plug-ins. Addison-Wesley." } }, { "@position" : "36", "rawText" : { "$" : "[Consens et Mendelzon, 1990] Consens, M. P. et Mendelzon, A. O. (1990). GraphLog: a visual formalism for real life recursion. In Proc. of the ACM Symp. on Principles of Database Systems, pages 404-416." } }, { "@position" : "37", "rawText" : { "$" : "[Costa, 2001] Costa, F. (2001). Combining meta-information management and reflection in an architecture for configurable and reconfigurable middleware. PhD thesis, University of Lancaster." } }, { "@position" : "38", "rawText" : { "$" : "[Costello et Liu, 1995] Costello, R. J. et Liu, D.-B. (1995). Metrics for requirements engineering. J. Syst. Softw., 29(1):39-63." } }, { "@position" : "39", "rawText" : { "$" : "[Davis et al., 1993] Davis, A., Overmyer, S., Jordan, K., Caruso, J., Dandashi, F., Dinh, A., Kincaid, G., Ledeboer, G., Reynolds, P., Sitaram, P., Ta, A., et Theofanos, M. (1993). Identifying and measuring quality in a software requirements specification. In Proceedings of the First International Software Metrics Symposium." } }, { "@position" : "40", "rawText" : { "$" : "[de Lara et Vangheluwe, 2002] de Lara, J. et Vangheluwe, H. (2002). Atom3: A tool for multi-formalism and meta-modelling. In Proceedings of the 5th International Conference on Fundamental Approaches to Software Engineering (FASE'02), pages 174-188. Springer-Verlag." } }, { "@position" : "41", "rawText" : { "$" : "[Demeyer et Ducasse, 1999] Demeyer, S. et Ducasse, S. (1999). Metrics, do they really help? In Publications, H. S., editor, Proceedings of LMO'99, pages 69-82." } }, { "@position" : "42", "rawText" : { "$" : "[Demeyer et al., 2001] Demeyer, S., Tichelaar, S., et Ducasse, S. (2001). Famix 2.1 - the famoos information exchange model. Technical report, University of Bern." } }, { "@position" : "43", "rawText" : { "$" : "[Dijkstra, 1972] Dijkstra, E. W. (1972). The humble programmer. Commun. ACM, 15:859-866." } }, { "@position" : "44", "rawText" : { "$" : "[Douglass, 2004] Douglass, B. P. (2004). Computing model complexity. White paper, I-Logix." } }, { "@position" : "45", "rawText" : { "$" : "[Ducasse et Gîrba, 2006] Ducasse, S. et Gîrba, T. (2006). Using Smalltalk as a reflective executable meta-language. In International Conference on Model Driven Engineering Languages and Systems (Models/UML 2006), volume 4199 of LNCS, pages 604-618. Springer-Verlag." } }, { "@position" : "46", "rawText" : { "$" : "[Ducasse et al., 2008] Ducasse, S., Gîrba, T., Kuhn, A., et Renggli, L. (2008). Metaenvironment and executable meta-language using smalltalk: an experience report. Journal of Software and Systems Modeling (SOSYM)." } }, { "@position" : "47", "rawText" : { "$" : "[Dufour et al., 2003] Dufour, B., Driesen, K., Hendren, L., et Verbrugge, C. (2003). Dynamic metrics for java. In Proceedings of the ACM SIGPLAN 2003 Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA'03), pages 149-168. ACM Press." }, "id" : { "@value" : "doi_________::287955775d392c0cf0e06a93fbd85ea2", "@type" : "openaire", "@trustLevel" : "0.59967333" } }, { "@position" : "48", "rawText" : { "$" : "[Eichberg et al., 2006] Eichberg, M., Germanus, D., Mezini, M., Mrokon, L., et Schä- fer, T. (2006). Qscope: an open, extensible framework for measuring software projects. In Proceedings of the 10th European Conference on Software Maintenance and Reengineering (CSMR'06)." } }, { "@position" : "49", "rawText" : { "$" : "[El Wakil et al., 2005] El Wakil, M., El Bastawissi, A., Boshra, M., et Fahmy, A. (2005). A novel approach to formalize and collect object-oriented design-metrics. In Proceedings of the 9th International Conference on Empirical Assessment in Software Engineering." } }, { "@position" : "50", "rawText" : { "$" : "[Estefan, 2007] Estefan, J. A. (2007). Survey of model-based systems engineering (MBSE) methodologies. Technical report, INCOSE MBSE Focus Group." } }, { "@position" : "51", "rawText" : { "$" : "[Favre, 2006] Favre, J.-M. (2006). Megamodelling and etymology. In Cordy, J. R., Lämmel, R., et Winter, A., editors, Transformation Techniques in Software Engineering, number 05161 in Dagstuhl Seminar Proceedings. Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany." } }, { "@position" : "52", "rawText" : { "$" : "[Feiler et al., 2006] Feiler, P. H., Gluch, D. P., et Hudak, J. J. (2006). The architecture analysis and design language (aadl): An introduction. Technical report, CMU/SEI." } }, { "@position" : "53", "rawText" : { "$" : "[Fenton, 1991] Fenton, N. E. (1991). Software Metrics: A Rigorous Approach. Chapman and Hall." } }, { "@position" : "54", "rawText" : { "$" : "[Fenton et Neil, 1999] Fenton, N. E. et Neil, M. (1999). A critique of software defect prediction models. IEEE Trans. Softw. Eng., 25(5):675-689." } }, { "@position" : "55", "rawText" : { "$" : "[Ferneley, 1997] Ferneley, E. (1997). An empirical study of coupling and control flow metrics. Information and Software Technology, 39(13):879-887." } }, { "@position" : "56", "rawText" : { "$" : "[France et Rumpe, 2007] France, R. et Rumpe, B. (2007). Model-driven development of complex software: A research roadmap. In Future of Software Engineering (FOSE'07), pages 37-54. IEEE Computer Society." } }, { "@position" : "57", "rawText" : { "$" : "[Frigg et Hartmann, 2006] Frigg, R. et Hartmann, S. (2006). Models in science. In Stanford Encyclopedia of Philosophy. The Metaphysics Research Lab." }, "id" : { "@value" : "core_ac_uk__::58e6aab36e0d6637637d1cafc3fa0aca", "@type" : "openaire", "@trustLevel" : "0.60075843" } }, { "@position" : "58", "rawText" : { "$" : "[Gamma et al., 1995] Gamma, E., Helm, R., Johnson, R., et Vlissides, J. (1995). Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Boston, MA, USA." } }, { "@position" : "59", "rawText" : { "$" : "[Garcia et al., 2004] Garcia, F., Ruiz, F., et Piattini, M. (2004). Definition and empirical validation of metrics for software process models. In Proceedings of the International Conference on Product Focused Software Process Improvement (PROFES'2004)." } }, { "@position" : "60", "rawText" : { "$" : "[Garcìa et al., 2006] Garcìa, F., Bertoa, M. F., Calero, C., Vallecillo, A., Ruiz, F., Piattini, M., et Genero, M. (2006). Towards a consistent terminology for software measurement. Information and Software Technology, 48(8):631-644." }, "id" : { "@value" : "doi_________::b852382f6350eec1442f6df9159de3c4", "@type" : "openaire", "@trustLevel" : "0.7317082" } }, { "@position" : "61", "rawText" : { "$" : "[Genero et al., 2002a] Genero, M., Miranda, D., et Piattini, M. (2002a). Defining and validating metrics for uml statechart diagrams. In Proceedings of QAOOSE'2002." } }, { "@position" : "62", "rawText" : { "$" : "[Genero et al., 2000] Genero, M., Piattini, M., et Calero, C. (2000). Early measures for UML class diagrams. L'Objet, 6(4):489-505." } }, { "@position" : "63", "rawText" : { "$" : "[Genero et al., 2002b] Genero, M., Piattini, M., et Calero, C. (2002b). Empirical validation of class diagram metrics. In Proceedings of the International Symposium on Empirical Software Engineering (ISESE'02), page 195. IEEE Computer Society." }, "id" : { "@value" : "doi_________::6075e18d85d4062a9842c669604f1b19", "@type" : "openaire", "@trustLevel" : "0.63127756" } }, { "@position" : "64", "rawText" : { "$" : "[Genero et al., 2005] Genero, M., Piattini, M., et Caleron, C. (2005). A survey of metrics for UML class diagrams. Journal of Object Technology, 4:59-92." }, "id" : { "@value" : "doi_________::a0710cf4d04bf76dd5320c1c24e14b95", "@type" : "openaire", "@trustLevel" : "0.6194535" } }, { "@position" : "65", "rawText" : { "$" : "[Gill et Grover, 2003] Gill, N. S. et Grover, P. S. (2003). Component-based measurement: few useful guidelines. SIGSOFT Softw. Eng. Notes, 28(6):4-4." } }, { "@position" : "66", "rawText" : { "$" : "[Grady, 1992] Grady, R. B. (1992). Practical software metrics for project management and process improvement. Prentice-Hall, Inc." } }, { "@position" : "67", "rawText" : { "$" : "[Granger, 1993] Granger, G.-G. (1993). La science ou les sciences. PUF." } }, { "@position" : "68", "rawText" : { "$" : "[Guerra et al., 2007] Guerra, E., de Lara, J., et Díaz, P. (2007). Visual specification of measurements and redesigns for domain specific visual languages. Journal of Visual Languages and Computing, in Press:1-27." } }, { "@position" : "69", "rawText" : { "$" : "[Guerra et al., 2006] Guerra, E., Diaz, P., et de Lara, J. (2006). Visual specification of metrics for domain specific visual languages. In Graph Transformation and Visual Modeling Techniques (GT-VMT 2006)." } }, { "@position" : "70", "rawText" : { "$" : "[Hammer et al., 1997] Hammer, T., Rosenberg, L., Huffman, L., et Hyatt, L. (1997). Requirements metrics - value added. In Proceedings of the 3rd IEEE International Symposium on Requirements Engineering (RE'97), page 141.1. IEEE Computer Society." } }, { "@position" : "71", "rawText" : { "$" : "[Harel et Rumpe, 2004] Harel, D. et Rumpe, B. (2004). Meaningful modeling: what's the semantics of semantics? Computer, 37(10):64-72." } }, { "@position" : "72", "rawText" : { "$" : "[Harmer et Wilkie, 2002] Harmer, T. J. et Wilkie, F. G. (2002). An extensible metrics extraction environment for object-oriented programming languages. In Proceedings of the International Conference on Software Maintenance." } }, { "@position" : "73", "rawText" : { "$" : "[Henderson-Sellers, 1996] Henderson-Sellers, B. (1996). measures of complexity. Prentice Hall." } }, { "@position" : "74", "rawText" : { "$" : "[Henry et Kafura, 1981] Henry, S. et Kafura, D. (1981). Software structure metrics based on information flow. IEEE Trans. Softw. Eng., 7(5):510-518." } }, { "@position" : "75", "rawText" : { "$" : "[Hitz et Montazeri, 1996] Hitz, M. et Montazeri, B. (1996). Chidamber and kemerer's metrics suite: A measurement theory perspective. IEEE Trans. Softw. Eng., 22(4):267-271." } }, { "@position" : "76", "rawText" : { "$" : "[Ince et al., 2000] Ince, A., Topuz, E., Panayirci, E., et Isik, C. (2000). Principles of Integrated Maritime Surveillance Systems, volume 527. Kluwer Academic Publishers." } }, { "@position" : "77", "rawText" : { "$" : "[ISO/IEC, 2001] ISO/IEC (2001). ISO/IEC 9126. Software engineering - Product quality. ISO/IEC." } }, { "@position" : "78", "rawText" : { "$" : "[Jones, 1991] Jones, C. (1991). Applied software measurement: assuring productivity and quality. McGraw-Hill." } }, { "@position" : "79", "rawText" : { "$" : "[Jouault et Bézivin, 2006] Jouault, F. et Bézivin, J. (2006). Km3: a dsl for metamodel specification. In Proceedings of the 8th IFIP International Conference on Formal Methods for Open Object-Based Distributed Systems." } }, { "@position" : "80", "rawText" : { "$" : "[Jouault et Kurtev, 2005] Jouault, F. et Kurtev, I. (2005). Transforming models with ATL. In Proceedings of the Model Transformations in Practice Workshop at MoDELS 2005. Workshop Model Transformations in Practice, part of the MoDELS 2005 Conference." } }, { "@position" : "81", "rawText" : { "$" : "[Jézéquel, 2008] Jézéquel, J.-M. (2008). Model driven design and aspect weaving. Journal of Software and Systems Modeling (SoSyM), 7(2):209-218." }, "id" : { "@value" : "doi_________::39ea6335b8079e0499b3be275eea751f", "@type" : "openaire", "@trustLevel" : "0.7045794" } }, { "@position" : "82", "rawText" : { "$" : "[Kamata et Tamai, 2007] Kamata, M. I. et Tamai, T. (2007). How does requirements quality relate to project success or failure? In Proceedings of the15th IEEE International Requirements Engineering Conference (RE'07), pages 69-78." } }, { "@position" : "83", "rawText" : { "$" : "[Kan, 1995] Kan, S. H. (1995). Metrics and Models in Software Quality Engineering. Addison Wesley, Reading, MA." } }, { "@position" : "84", "rawText" : { "$" : "[Kastenberg, 2004] Kastenberg, H. (2004). Software metrics as class graph properties. Master's thesis, University of Twente." } }, { "@position" : "85", "rawText" : { "$" : "[Kent, 2002] Kent, S. (2002). Model driven engineering. In Proceedings of the Third International Conference Integrated Formal Methods (IFM'2002)." } }, { "@position" : "86", "rawText" : { "$" : "[Khoshgoftaar et Munson, 1990] Khoshgoftaar, T. et Munson, J. (1990). The lines of code metric as a predictor of program faults: A critical analysis. In Proceedings of the Computer Software and Applications Conference, pages 408-413." } }, { "@position" : "87", "rawText" : { "$" : "[Kiczales et al., 1991] Kiczales, G., des Rivières, J., et Bobrow, D. G. (1991). The Art of the Metaobject Protocol. The MIT Press." } }, { "@position" : "88", "rawText" : { "$" : "[Kieburtz et al., 1996] Kieburtz, R. B., McKinney, L., Bell, J. M., Hook, J., Kotov, A., Lewis, J., Olivia, D. P., Sheard, T., Smith, I., et Walton, L. (1996). A software engineering experiment in software component generation. In Proceeding of the 18th International Conference on Software Engineering (ICSE'96), pages 542-552." } }, { "@position" : "89", "rawText" : { "$" : "[Kim et Boldyreff, 2002] Kim, H. et Boldyreff, C. (2002). Developing software metrics applicable to UML models. In Proceedings of QAOOSE'2002. QAOOSE 2002." } }, { "@position" : "90", "rawText" : { "$" : "[Kitchenham et al., 2001] Kitchenham, B. A., Hughes, R. T., et Linkman, S. G. (2001). Modeling software measurement data. IEEE Trans. Softw. Eng., 27(9):788- 804." } }, { "@position" : "91", "rawText" : { "$" : "[Kitchenham et al., 1990] Kitchenham, B. A., Pickard, L. M., et Linkman, S. J. (1990). An evaluation of some design metrics. Softw. Eng. J., 5(1):50-58." } }, { "@position" : "92", "rawText" : { "$" : "[Kolde, 2004] Kolde, C. (2004). Basic metrics for requirements management. White paper, Borland." } }, { "@position" : "93", "rawText" : { "$" : "[Krantz et al., 1971] Krantz, D., Luce, R., Suppes, P., et Tversky, A. (1971). Foundations of measurement. Academic Press, New York." } }, { "@position" : "94", "rawText" : { "$" : "[Kuehne, 2006] Kuehne, T. (2006). Matters of (meta-) modeling. Software and System Modeling, 5(4):369-385." } }, { "@position" : "95", "rawText" : { "$" : "[LaLonde et Pugh, 1994] LaLonde, W. R. et Pugh, J. R. (1994). Gathering metric information using metalevel facilities. JOOP, 7(1):33-37." } }, { "@position" : "96", "rawText" : { "$" : "[Lanza et Ducasse, 2002] Lanza, M. et Ducasse, S. (2002). Beyond language independent object-oriented metrics: Model independent metrics. In Abreu, F., Piattini, M., Poels, G., et Sahraoui, H. A., editors, Proceedings of the 6th International Workshop on Quantitative Approaches in Object-Oriented Software Engineering, pages 77-84." } }, { "@position" : "97", "rawText" : { "$" : "[Lavazza et Agostini, 2005] Lavazza, L. et Agostini, A. (2005). Automated measurement of uml models: an open toolset approach. Journal of Object Technology, 4(4):115-134." }, "id" : { "@value" : "od______3660::7022a9c40ce5f541a43616eff6ffb35f", "@type" : "openaire", "@trustLevel" : "0.60227674" } }, { "@position" : "98", "rawText" : { "$" : "[Ledeczi et al., 2001] Ledeczi, A., Maroti, M., Bakay, A., Karsai, G., Garrett, J., Thomason, C., Nordstrom, G., Sprinkle, J., et Volgyesi, P. (2001). The generic modeling environment. In Proceedings of the Workshop on Intelligent Signal Processing (WISP'2001)." } }, { "@position" : "99", "rawText" : { "$" : "[Lehman, 1994] Lehman, M. (1994). Models and modelling in software engineering. In J.Marciniak, editor, Encyclopaedia of Software Engineering, volume 1, pages 698 - 702. Wiley and Co." } }, { "@position" : "100", "rawText" : { "$" : "[Lethbridge et al., 2004] Lethbridge, T., Tichelaar, S., et Ploedereder, E. (2004). The dagstuhl middle metamodel: A schema for reverse engineering. Electr. Notes Theor. Comput. Sci., 94:7-18." }, "id" : { "@value" : "base_oa_____::de206d39d6992feeebfbd9cd95e50dd9", "@type" : "openaire", "@trustLevel" : "0.6199294" } }, { "@position" : "101", "rawText" : { "$" : "[Lewerentz et Simon, 1998] Lewerentz, C. et Simon, F. (1998). A product metrics tool integrated into a software development environment. In Proceedings of the Workshop on Object-Oriented Technology at ECOOP'98." } }, { "@position" : "102", "rawText" : { "$" : "[Lo, 1992] Lo, B. (1992). Syntactical construct based apar projection. Technical report, IBM Santa Teresa Laboratory Technical Report, California." } }, { "@position" : "103", "rawText" : { "$" : "[Loconsole, 2001] Loconsole, A. (2001). Measuring the requirements management key process area. In Proceedings of the 12th European Software Control and Metrics Conference (ESCOM'2001)." } }, { "@position" : "104", "rawText" : { "$" : "[Mahmood et Lai, 2005] Mahmood, S. et Lai, R. (2005). Measuring the complexity of a uml component specification. In QSIC '05: Proceedings of the Fifth International Conference on Quality Software, pages 150-160, Washington, DC, USA. IEEE Computer Society." } }, { "@position" : "105", "rawText" : { "$" : "[Marchesi, 1998] Marchesi, M. (1998). OOA metrics for the Unified Modeling Language. In Proceedings of the 2nd Euromicro Conference on Software Maintenance and Reengineering (CSMR'98), page 67. IEEE Computer Society." } }, { "@position" : "106", "rawText" : { "$" : "[Marinescu et al., 2005] Marinescu, C., Marinescu, R., et Gîrba, T. (2005). Towards a simplified implementation of object-oriented design metrics. In IEEE METRICS, page 11." } }, { "@position" : "107", "rawText" : { "$" : "[Martin, 2000] Martin, R. C. (2000). Design principles and design patterns." } }, { "@position" : "108", "rawText" : { "$" : "[McCabe, 1976] McCabe (1976). A complexity measure. IEEE Transactions on Software Engineering, 2:308-320." } }, { "@position" : "109", "rawText" : { "$" : "[McQuillan et Power, 2006a] McQuillan, J. et Power, J. (2006a). Towards the reusability of software metrics definitions at the meta level. In Proceedings of the ECOOP'2006 Doctoral Symposium." } }, { "@position" : "110", "rawText" : { "$" : "[McQuillan et Power, 2006b] McQuillan, J. A. et Power, J. F. (2006b). Experiences of using the dagstuhl middle metamodel for defining software metrics. In Proceedings of the 4th International Conference on Principles and Practices of Programming in Java." } }, { "@position" : "111", "rawText" : { "$" : "[Mellor et al., 2003] Mellor, S. J., Clark, A. N., et Futagami, T. (2003). Guest editors' introduction: Model-driven development. IEEE Softw., 20(5):14-18." } }, { "@position" : "112", "rawText" : { "$" : "[Mendelzon et Sametinger, 1995] Mendelzon, A. et Sametinger, J. (1995). Reverse engineering by visualizing and querying. Software - Concepts and Tools, 16(4):170- 182." } }, { "@position" : "113", "rawText" : { "$" : "[Mens et Lanza, 2002] Mens, T. et Lanza, M. (2002). A graph-based metamodel for object-oriented software metrics. Electronic Notes in Theoretical Computer Science, 72:57-68." } }, { "@position" : "114", "rawText" : { "$" : "[Monperrus et al., 2008b] Monperrus, M., Jézéquel, J.-M., Champeau, J., et Hoeltzener, B. (2008b). Measuring models. In Rech, J. et Bunse, C., editors, Model-Driven Software Development: Integrating Quality Assurance. IDEA Group." }, "id" : { "@value" : "od______2755::fc548d465adab29b7bc5a3e25e34721f", "@type" : "openaire", "@trustLevel" : "0.6636128" } }, { "@position" : "115", "rawText" : { "$" : "[Monperrus et al., 2008c] Monperrus, M., Jézéquel, J.-M., Champeau, J., et Hoeltzener, B. (2008c). Model-driven engineering metrics for real time systems. In Proceedings of the 4th European Congress on Embedded Real Time Software (ERTS'2008)." }, "id" : { "@value" : "od_______166::b25be54a7a04dd0eda8841675461a8e3", "@type" : "openaire", "@trustLevel" : "0.6636128" } }, { "@position" : "116", "rawText" : { "$" : "[Monperrus et al., 2008d] Monperrus, M., Jézéquel, J.-M., Champeau, J., et Hoeltzener, B. (2008d). A model-driven measurement approach. In Proceedings of the ACM/IEEE 11th International Conference on Model Driven Engineering Languages and Systems (MODELS'2008)." }, "id" : { "@value" : "od_______166::2addba2f6aae347f5de08a554491c23c", "@type" : "openaire", "@trustLevel" : "0.6636128" } }, { "@position" : "117", "rawText" : { "$" : "[Mora et al., 2008] Mora, B., García, F., Ruiz, F., Piattini, M., Boronat, A., Gómez, A., Carsí, J. Á., et Ramos, I. (2008). Software measurement by using qvt transformations in an mda context. In Proceedings of the International Conference on Enterprise Information Systems (ICEIS'2008)." } }, { "@position" : "118", "rawText" : { "$" : "[Morgenthaler, 2007] Morgenthaler, S. (2007). Introduction à la statistique. Presses polytechniques et universitaires romandes, 3 edition." } }, { "@position" : "119", "rawText" : { "$" : "[Mouloud, 2006] Mouloud, N. (2006). Modèle. In Encyclopedia Universalis. Les éditions de l'Encyclopedia Universalis." } }, { "@position" : "120", "rawText" : { "$" : "[Muller et al., 2005] Muller, P. A., Fleurey, F., et Jézéquel, J. M. (2005). Weaving executability into object-oriented meta-languages. In Proceedings of MODELS/UML 2005." } }, { "@position" : "121", "rawText" : { "$" : "[Müller et Simmons, 2002] Müller, A. et Simmons, G. (2002). Exception handling: Common problems and best practice with java 1.4. In Proceedings of Net.ObjectDays'2002." } }, { "@position" : "122", "rawText" : { "$" : "[Nakatani et al., 2001] Nakatani, T., Urai, T., Ohmura, S., et Tamai, T. (2001). A requirements description metamodel for use cases. In Proceedings of the 8th AsiaPacific on Software Engineering Conference (APSEC'01), page 251. IEEE Computer Society." } }, { "@position" : "123", "rawText" : { "$" : "[Narasimhan et Hendradjaya, 2004] Narasimhan, V. L. et Hendradjaya, B. (2004). Component integration metrics. In Proceedings of the International Conference on Software Engineering Research and Practice (SERP'04)." } }, { "@position" : "124", "rawText" : { "$" : "[OMG, 2004] OMG (2004). MOF 2.0 specification. Technical report, Object Management Group." } }, { "@position" : "125", "rawText" : { "$" : "[OMG, 2005] OMG (2005). System modeling language (SysML) specification. Technical report, Object Management Group." } }, { "@position" : "126", "rawText" : { "$" : "[OMG, 2008] OMG (2008). Software Process Engineering Metamodel (SPEM). Technical report, Object Management Group." } }, { "@position" : "127", "rawText" : { "$" : "[Park et Kim, 1993] Park, S. J. et Kim, H. D. (1993). Constraint-based meta-view approach for modeling environmentinitl generation. Decision Support System, 9:325-348." } }, { "@position" : "128", "rawText" : { "$" : "[Paulk et al., 1993] Paulk, M. C., Weber, C. V., Garcia, S. M., Chrissis, M. B., et Bush, M. (1993). Key practices of the capability maturity model. Technical report, Software Engineering Institute." }, "id" : { "@value" : "doi_________::b79853946d0357694299cc8897951665", "@type" : "openaire", "@trustLevel" : "0.62692255" } }, { "@position" : "129", "rawText" : { "$" : "[Pawlak et al., 2006] Pawlak, R., Noguera, C., et Petitprez, N. (2006). Spoon: Program analysis and transformation in java. Technical Report 5901, INRIA." } }, { "@position" : "130", "rawText" : { "$" : "[Poels et Dedene, 2000] Poels, G. et Dedene, G. (2000). Distance-based software measurement: necessary and sufficient properties for software measures. Information and Software Technology, 42(1):35-46." } }, { "@position" : "131", "rawText" : { "$" : "[Reissing, 2001] Reissing, R. (2001). Towards a model for object-oriented design measurement. In ECOOP'01 Workshop QAOOSE." } }, { "@position" : "132", "rawText" : { "$" : "[Revault, 1996] Revault, N. (1996). Principes de méta-modélisation pour l'utilisation de canevas d'applications à objets (MétaGen et les frameworks). PhD thesis, Université P. et M. Curie (Paris 6), Paris, France." } }, { "@position" : "133", "rawText" : { "$" : "[Reynoso et al., 2003] Reynoso, L., Genero, M., et Piattini, M. (2003). Measuring ocl expressions: a \"tracing\"-based approach. In Proceedings of QAOOSE'2003." } }, { "@position" : "134", "rawText" : { "$" : "[Rothenberg, 1989] Rothenberg, J. (1989). The nature of modeling. John Wiley and Sons, Inc." } }, { "@position" : "135", "rawText" : { "$" : "[Seidewitz, 2003] Seidewitz, E. (2003). What models mean. IEEE Softw., 20(5):26- 32." } }, { "@position" : "136", "rawText" : { "$" : "[Selic, 2003] Selic, B. (2003). The pragmatics of model-driven development. IEEE Softw., 20(5):19-25." } }, { "@position" : "137", "rawText" : { "$" : "[Singh et al., 2004] Singh, Y., Sabharwal, S., et Sood, M. (2004). A systematic approach to measure the problem complexity of software requirement specifications of an information system. Information and Management Sciences, 15:69-90." } }, { "@position" : "138", "rawText" : { "$" : "[Smacchia S.A., 2006] Smacchia S.A. (2006). Code query language 1.5 specification. Technical report, Smacchia S.A." } }, { "@position" : "139", "rawText" : { "$" : "[Soley, 2000] Soley, R. (2000). Model driven architecture. Technical report, Object Management Group." } }, { "@position" : "140", "rawText" : { "$" : "[Solheim et al., 2005] Solheim, H., Lillehagen, F., Petersen, S. A., Jorgensen, H., et Anastasiou, M. (2005). Model-driven visual requirements engineering. In Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE'05), pages 421-428." } }, { "@position" : "141", "rawText" : { "$" : "[Spector et Gifford, 1986] Spector, A. et Gifford, D. (1986). A computer science perspective of bridge design. Commun. ACM, 29(4):267-283." } }, { "@position" : "142", "rawText" : { "$" : "[Sztipanovits et Karsai, 1997] Sztipanovits, J. et Karsai, G. (1997). integrated computing. Computer, 30(4):110-111." } }, { "@position" : "143", "rawText" : { "$" : "[Washizaki et al., 2003] Washizaki, H., Yamamoto, H., et Fukazawa, Y. (2003). A metrics suite for measuring reusability of software components. In METRICS '03: Proceedings of the 9th International Symposium on Software Metrics, page 211. IEEE Computer Society." } }, { "@position" : "144", "rawText" : { "$" : "[White, 2000] White, K. P. (2000). Model theory. In McGraw-Hill Encyclopedia of Science and Technology. The McGraw-Hill Companies." } }, { "@position" : "145", "rawText" : { "$" : "[Wohlin, 2007] Wohlin, C. (2007). An analysis of the most cited articles in software engineering journals - 2000. Inf. Softw. Technol., 49(1):2-11." } }, { "@position" : "146", "rawText" : { "$" : "[Yu-ying et al., 2007] Yu-ying, W., Qing-shan, L., Ping, C., et Chun-de, R. (2007). Dynamic fan-in and fan-out metrics for program comprehension. Journal of Shanghai University, 11(5):474-479." }, "id" : { "@value" : "doi_________::c68c9e73a21b933b1eaf577847b2186c", "@type" : "openaire", "@trustLevel" : "0.7521498" } } ] } }, { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "[Andler et al., 2006] Andler, D., Lascar, D., et Sabbagh, G. (2006). Théorie des modèles. In Encyclopedia Universalis. Les éditions de l'Encyclopedia Universalis." } }, { "@position" : "2", "rawText" : { "$" : "[Aspray et al., 1996] Aspray, W., Keil-Slawik, R., et Parnas, D. (1996). The history of software engineering. Technical report, Schloss Dagstuhl." } }, { "@position" : "3", "rawText" : { "$" : "[Atkinson et Kühne, 2003] Atkinson, C. et Kühne, T. (2003). Model-driven development: A metamodeling foundation. IEEE Softw., 20(5):36-41." } }, { "@position" : "4", "rawText" : { "$" : "[Axelsson, 2002] Axelsson, J. (2002). Model based systems engineering using a continuous-time extension of the unified modeling language (UML). Systems Engineering, 5:165-179." } }, { "@position" : "5", "rawText" : { "$" : "[Baader et al., 2003] Baader, F., Calvanese, D., McGuinness, D. L., Nardi, D., et Patel-Schneider, P. F. (2003). The description logic handbook: Theory, implementation, and applications. In Description Logic Handbook. Cambridge University Press." } }, { "@position" : "6", "rawText" : { "$" : "[Baker, 2004] Baker, A. (2004). Simplicity. In Stanford Encyclopedia of Philosophy. The Metaphysics Research Lab, Stanford University." } }, { "@position" : "7", "rawText" : { "$" : "[Baroni et Abreu, 2002] Baroni, A. et Abreu, F. (2002). Formalizing object-oriented design metrics upon the uml meta-model. In Proc. of the 16th Brazilian Symposium on Software Engineering." } }, { "@position" : "8", "rawText" : { "$" : "[Baroni et al., 2002] Baroni, A., Braz, S., et Abreu, F. (2002). Using OCL to formalize object-oriented design metrics definitions. In ECOOP'02 Workshop on Quantitative Approaches in OO Software Engineering." } }, { "@position" : "9", "rawText" : { "$" : "[Baroni, 2005] Baroni, A. L. (2005). Quantitative assessment of uml dynamic models. In Proceedings of the doctoral symposium at the 10th European Software Engineering Conference held jointly with 13th International Symposium on Foundations of Software Engineering (ESEC-FSE'05), pages 366-369. ACM Press." } }, { "@position" : "10", "rawText" : { "$" : "[Basili et al., 1996] Basili, V. R., Briand, L. C., et Melo, W. L. (1996). A validation of object-oriented design metrics as quality indicators. IEEE Trans. Softw. Eng., 22(10):751-761." } }, { "@position" : "11", "rawText" : { "$" : "[Basili et al., 1994] Basili, V. R., Caldiera, G., et Rombach, H. D. (1994). The goal question metric approach. In Encyclopedia of Software Engineering. Wiley." } }, { "@position" : "12", "rawText" : { "$" : "[Batory, 2006] Batory, D. (2006). Multilevel models in model-driven engineering, product lines, and metaprogramming. IBM Syst. J., 45(3):527-539." } }, { "@position" : "13", "rawText" : { "$" : "[Baumert et McWhinney, 1992] Baumert, J. et McWhinney, M. (1992). Software measures and the capability maturity model. Technical report, Software Engineering Institute, Carnegie Mellon University." }, "id" : { "@value" : "doi_________::80a58ba66536b773e90f6e42872d26f5", "@type" : "openaire", "@trustLevel" : "0.6059239" } }, { "@position" : "14", "rawText" : { "$" : "[Berenbach et Borotto, 2006] Berenbach, B. et Borotto, G. (2006). Metrics for model driven requirements development. In Proceeding of the 28th International Conference on Software Engineering (ICSE '06), pages 445-451. ACM Press." } }, { "@position" : "15", "rawText" : { "$" : "[Beyer et al., 2005] Beyer, D., Noack, A., et Lewerentz, C. (2005). Efficient relational calculation for software analysis. IEEE Trans. Softw. Eng., 31(2):137-149." } }, { "@position" : "16", "rawText" : { "$" : "[Boag et al., 2007] Boag, S., Chamberlin, D., Fernández, M. F., Florescu, D., Robie, J., et Siméon, J. (2007). XQuery 1.0: An XML query language. Technical report, W3C." } }, { "@position" : "17", "rawText" : { "$" : "[Boehm, 2006] Boehm, B. (2006). A view of 20th and 21st century software engineering. In ICSE '06: Proceeding of the 28th International Conference on Software Engineering, pages 12-29. ACM." } }, { "@position" : "18", "rawText" : { "$" : "[Boehm et al., 1995] Boehm, B., Clark, B., Horowitz, E., Shelby, R., et Westland, C. (1995). An Overview of the COCOMO 2.0 Software Cost Model. In Software Technology Conference." } }, { "@position" : "19", "rawText" : { "$" : "[Boehm et Sullivan, 2000] Boehm, B. W. et Sullivan, K. J. (2000). Software economics: a roadmap. In ICSE - Future of SE Track, pages 319-343." } }, { "@position" : "20", "rawText" : { "$" : "[Briand et al., 1998] Briand, L. C., Daly, J. W., et Wüst, J. (1998). A unified framework for cohesion measurement in object-oriented systems. Empirical Softw. Eng., 3(1):65-117." } }, { "@position" : "21", "rawText" : { "$" : "[Briand et al., 1996] Briand, L. C., Morasca, S., et Basili, V. R. (1996). Propertybased software engineering measurement. Software Engineering, 22(1):68-86." } }, { "@position" : "22", "rawText" : { "$" : "[Brinkkemper et al., 2001] Brinkkemper, S., Saeki, M., et Harmsen, F. (2001). A method engineering language for the description of systems development methods. In CAiSE, pages 473-476." } }, { "@position" : "23", "rawText" : { "$" : "[Brottier et al., 2007] Brottier, E., Baudry, B., Traon, Y. L., Touzet, D., et Nicolas, B. (2007). Producing a global requirement model from multiple requirement specifications. In EDOC, pages 390-404." }, "id" : { "@value" : "od_______165::6a83fb806f45b4ef83bdf42000a9f857", "@type" : "openaire", "@trustLevel" : "0.60639083" } }, { "@position" : "24", "rawText" : { "$" : "[Budinsky et al., 2004] Budinsky, F., Steinberg, D., Merks, E., Ellersick, R., et Grose, T. J. (2004). Eclipse Modeling Framework. Addison-Wesley." } }, { "@position" : "25", "rawText" : { "$" : "[Bézivin, 2005] Bézivin, J. (2005). On the unification power of models. Software and System Modeling, 4(2):171-188." }, "id" : { "@value" : "doi_________::fb93a3323c6dcb7e780ec478b98bb1c6", "@type" : "openaire", "@trustLevel" : "0.6939042" } }, { "@position" : "26", "rawText" : { "$" : "[Cabot et Teniente, 2006] Cabot, J. et Teniente, E. (2006). A metric for measuring the complexity of ocl expressions. In Model Size Metrics Workshop co-located with MODELS'06." } }, { "@position" : "27", "rawText" : { "$" : "[Card, 1991] Card, D. (1991). What makes a software measure successful. American Programmer, 4:2-8." } }, { "@position" : "28", "rawText" : { "$" : "[CEI et ISO, 1993] CEI et ISO (1993). International vocabulary of basic and general terms in metrology = vocabulaire international des termes fondamentaux et généraux de métrologie. International Organisation for Standardization." } }, { "@position" : "29", "rawText" : { "$" : "[Chen, 1976] Chen, P. P. (1976). The entity-relationship model - toward a unified view of data. ACM Trans. Database Syst., 1(1):9-36." } }, { "@position" : "30", "rawText" : { "$" : "[Cheng et al., 2005] Cheng, B. H. C., Stephenson, R., et Berenbach, B. (2005). Lessons learned from automated analysis of industrial uml class models (an experience report). In Proceedings of MODELS' 2005, pages 324-338." } }, { "@position" : "31", "rawText" : { "$" : "[Chidamber et Kemerer, 1991] Chidamber, S. R. et Kemerer, C. F. (1991). Towards a metrics suite for object-oriented design. In Proceedings of OOPSLA'91, pages 197-211." } }, { "@position" : "32", "rawText" : { "$" : "[Chidamber et Kemerer, 1994] Chidamber, S. R. et Kemerer, C. F. (1994). A metric suite for object-oriented design. IEEE Transactions on Software Engineering, 20(6):293-318." } }, { "@position" : "33", "rawText" : { "$" : "[Cho et al., 2001] Cho, E. S., Kim, M. S., et Kim, S. D. (2001). Component metrics to measure component quality. In Proceedings of the 8th Asia-Pacific on Software Engineering Conference (APSEC'01), page 419. IEEE Computer Society." } }, { "@position" : "34", "rawText" : { "$" : "[Chretienne et al., 2004] Chretienne, P., Jean-Marie, A., Le Lann, G., Stefani, J., Atos Origin, et Dassault Aviation (2004). Programme d'Étude Amont Mesure de la compléxité (marché n˚00-34-007). Technical report, DGA." } }, { "@position" : "35", "rawText" : { "$" : "[Clayberg et Rubel, 2006] Clayberg, E. et Rubel, D. (2006). Eclipse: Building Commercial-Quality Plug-ins. Addison-Wesley." } }, { "@position" : "36", "rawText" : { "$" : "[Consens et Mendelzon, 1990] Consens, M. P. et Mendelzon, A. O. (1990). GraphLog: a visual formalism for real life recursion. In Proc. of the ACM Symp. on Principles of Database Systems, pages 404-416." } }, { "@position" : "37", "rawText" : { "$" : "[Costa, 2001] Costa, F. (2001). Combining meta-information management and reflection in an architecture for configurable and reconfigurable middleware. PhD thesis, University of Lancaster." } }, { "@position" : "38", "rawText" : { "$" : "[Costello et Liu, 1995] Costello, R. J. et Liu, D.-B. (1995). Metrics for requirements engineering. J. Syst. Softw., 29(1):39-63." } }, { "@position" : "39", "rawText" : { "$" : "[Davis et al., 1993] Davis, A., Overmyer, S., Jordan, K., Caruso, J., Dandashi, F., Dinh, A., Kincaid, G., Ledeboer, G., Reynolds, P., Sitaram, P., Ta, A., et Theofanos, M. (1993). Identifying and measuring quality in a software requirements specification. In Proceedings of the First International Software Metrics Symposium." } }, { "@position" : "40", "rawText" : { "$" : "[de Lara et Vangheluwe, 2002] de Lara, J. et Vangheluwe, H. (2002). Atom3: A tool for multi-formalism and meta-modelling. In Proceedings of the 5th International Conference on Fundamental Approaches to Software Engineering (FASE'02), pages 174-188. Springer-Verlag." } }, { "@position" : "41", "rawText" : { "$" : "[Demeyer et Ducasse, 1999] Demeyer, S. et Ducasse, S. (1999). Metrics, do they really help? In Publications, H. S., editor, Proceedings of LMO'99, pages 69-82." } }, { "@position" : "42", "rawText" : { "$" : "[Demeyer et al., 2001] Demeyer, S., Tichelaar, S., et Ducasse, S. (2001). Famix 2.1 - the famoos information exchange model. Technical report, University of Bern." } }, { "@position" : "43", "rawText" : { "$" : "[Dijkstra, 1972] Dijkstra, E. W. (1972). The humble programmer. Commun. ACM, 15:859-866." } }, { "@position" : "44", "rawText" : { "$" : "[Douglass, 2004] Douglass, B. P. (2004). Computing model complexity. White paper, I-Logix." } }, { "@position" : "45", "rawText" : { "$" : "[Ducasse et Gîrba, 2006] Ducasse, S. et Gîrba, T. (2006). Using Smalltalk as a reflective executable meta-language. In International Conference on Model Driven Engineering Languages and Systems (Models/UML 2006), volume 4199 of LNCS, pages 604-618. Springer-Verlag." } }, { "@position" : "46", "rawText" : { "$" : "[Ducasse et al., 2008] Ducasse, S., Gîrba, T., Kuhn, A., et Renggli, L. (2008). Metaenvironment and executable meta-language using smalltalk: an experience report. Journal of Software and Systems Modeling (SOSYM)." } }, { "@position" : "47", "rawText" : { "$" : "[Dufour et al., 2003] Dufour, B., Driesen, K., Hendren, L., et Verbrugge, C. (2003). Dynamic metrics for java. In Proceedings of the ACM SIGPLAN 2003 Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA'03), pages 149-168. ACM Press." }, "id" : { "@value" : "doi_________::287955775d392c0cf0e06a93fbd85ea2", "@type" : "openaire", "@trustLevel" : "0.59967333" } }, { "@position" : "48", "rawText" : { "$" : "[Eichberg et al., 2006] Eichberg, M., Germanus, D., Mezini, M., Mrokon, L., et Schä- fer, T. (2006). Qscope: an open, extensible framework for measuring software projects. In Proceedings of the 10th European Conference on Software Maintenance and Reengineering (CSMR'06)." } }, { "@position" : "49", "rawText" : { "$" : "[El Wakil et al., 2005] El Wakil, M., El Bastawissi, A., Boshra, M., et Fahmy, A. (2005). A novel approach to formalize and collect object-oriented design-metrics. In Proceedings of the 9th International Conference on Empirical Assessment in Software Engineering." } }, { "@position" : "50", "rawText" : { "$" : "[Estefan, 2007] Estefan, J. A. (2007). Survey of model-based systems engineering (MBSE) methodologies. Technical report, INCOSE MBSE Focus Group." } }, { "@position" : "51", "rawText" : { "$" : "[Favre, 2006] Favre, J.-M. (2006). Megamodelling and etymology. In Cordy, J. R., Lämmel, R., et Winter, A., editors, Transformation Techniques in Software Engineering, number 05161 in Dagstuhl Seminar Proceedings. Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany." } }, { "@position" : "52", "rawText" : { "$" : "[Feiler et al., 2006] Feiler, P. H., Gluch, D. P., et Hudak, J. J. (2006). The architecture analysis and design language (aadl): An introduction. Technical report, CMU/SEI." } }, { "@position" : "53", "rawText" : { "$" : "[Fenton, 1991] Fenton, N. E. (1991). Software Metrics: A Rigorous Approach. Chapman and Hall." } }, { "@position" : "54", "rawText" : { "$" : "[Fenton et Neil, 1999] Fenton, N. E. et Neil, M. (1999). A critique of software defect prediction models. IEEE Trans. Softw. Eng., 25(5):675-689." } }, { "@position" : "55", "rawText" : { "$" : "[Ferneley, 1997] Ferneley, E. (1997). An empirical study of coupling and control flow metrics. Information and Software Technology, 39(13):879-887." } }, { "@position" : "56", "rawText" : { "$" : "[France et Rumpe, 2007] France, R. et Rumpe, B. (2007). Model-driven development of complex software: A research roadmap. In Future of Software Engineering (FOSE'07), pages 37-54. IEEE Computer Society." } }, { "@position" : "57", "rawText" : { "$" : "[Frigg et Hartmann, 2006] Frigg, R. et Hartmann, S. (2006). Models in science. In Stanford Encyclopedia of Philosophy. The Metaphysics Research Lab." }, "id" : { "@value" : "core_ac_uk__::58e6aab36e0d6637637d1cafc3fa0aca", "@type" : "openaire", "@trustLevel" : "0.60075843" } }, { "@position" : "58", "rawText" : { "$" : "[Gamma et al., 1995] Gamma, E., Helm, R., Johnson, R., et Vlissides, J. (1995). Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Boston, MA, USA." } }, { "@position" : "59", "rawText" : { "$" : "[Garcia et al., 2004] Garcia, F., Ruiz, F., et Piattini, M. (2004). Definition and empirical validation of metrics for software process models. In Proceedings of the International Conference on Product Focused Software Process Improvement (PROFES'2004)." } }, { "@position" : "60", "rawText" : { "$" : "[Garcìa et al., 2006] Garcìa, F., Bertoa, M. F., Calero, C., Vallecillo, A., Ruiz, F., Piattini, M., et Genero, M. (2006). Towards a consistent terminology for software measurement. Information and Software Technology, 48(8):631-644." }, "id" : { "@value" : "doi_________::b852382f6350eec1442f6df9159de3c4", "@type" : "openaire", "@trustLevel" : "0.7317082" } }, { "@position" : "61", "rawText" : { "$" : "[Genero et al., 2002a] Genero, M., Miranda, D., et Piattini, M. (2002a). Defining and validating metrics for uml statechart diagrams. In Proceedings of QAOOSE'2002." } }, { "@position" : "62", "rawText" : { "$" : "[Genero et al., 2000] Genero, M., Piattini, M., et Calero, C. (2000). Early measures for UML class diagrams. L'Objet, 6(4):489-505." } }, { "@position" : "63", "rawText" : { "$" : "[Genero et al., 2002b] Genero, M., Piattini, M., et Calero, C. (2002b). Empirical validation of class diagram metrics. In Proceedings of the International Symposium on Empirical Software Engineering (ISESE'02), page 195. IEEE Computer Society." }, "id" : { "@value" : "doi_________::6075e18d85d4062a9842c669604f1b19", "@type" : "openaire", "@trustLevel" : "0.63127756" } }, { "@position" : "64", "rawText" : { "$" : "[Genero et al., 2005] Genero, M., Piattini, M., et Caleron, C. (2005). A survey of metrics for UML class diagrams. Journal of Object Technology, 4:59-92." }, "id" : { "@value" : "doi_________::a0710cf4d04bf76dd5320c1c24e14b95", "@type" : "openaire", "@trustLevel" : "0.6194535" } }, { "@position" : "65", "rawText" : { "$" : "[Gill et Grover, 2003] Gill, N. S. et Grover, P. S. (2003). Component-based measurement: few useful guidelines. SIGSOFT Softw. Eng. Notes, 28(6):4-4." } }, { "@position" : "66", "rawText" : { "$" : "[Grady, 1992] Grady, R. B. (1992). Practical software metrics for project management and process improvement. Prentice-Hall, Inc." } }, { "@position" : "67", "rawText" : { "$" : "[Granger, 1993] Granger, G.-G. (1993). La science ou les sciences. PUF." } }, { "@position" : "68", "rawText" : { "$" : "[Guerra et al., 2007] Guerra, E., de Lara, J., et Díaz, P. (2007). Visual specification of measurements and redesigns for domain specific visual languages. Journal of Visual Languages and Computing, in Press:1-27." } }, { "@position" : "69", "rawText" : { "$" : "[Guerra et al., 2006] Guerra, E., Diaz, P., et de Lara, J. (2006). Visual specification of metrics for domain specific visual languages. In Graph Transformation and Visual Modeling Techniques (GT-VMT 2006)." } }, { "@position" : "70", "rawText" : { "$" : "[Hammer et al., 1997] Hammer, T., Rosenberg, L., Huffman, L., et Hyatt, L. (1997). Requirements metrics - value added. In Proceedings of the 3rd IEEE International Symposium on Requirements Engineering (RE'97), page 141.1. IEEE Computer Society." } }, { "@position" : "71", "rawText" : { "$" : "[Harel et Rumpe, 2004] Harel, D. et Rumpe, B. (2004). Meaningful modeling: what's the semantics of semantics? Computer, 37(10):64-72." } }, { "@position" : "72", "rawText" : { "$" : "[Harmer et Wilkie, 2002] Harmer, T. J. et Wilkie, F. G. (2002). An extensible metrics extraction environment for object-oriented programming languages. In Proceedings of the International Conference on Software Maintenance." } }, { "@position" : "73", "rawText" : { "$" : "[Henderson-Sellers, 1996] Henderson-Sellers, B. (1996). measures of complexity. Prentice Hall." } }, { "@position" : "74", "rawText" : { "$" : "[Henry et Kafura, 1981] Henry, S. et Kafura, D. (1981). Software structure metrics based on information flow. IEEE Trans. Softw. Eng., 7(5):510-518." } }, { "@position" : "75", "rawText" : { "$" : "[Hitz et Montazeri, 1996] Hitz, M. et Montazeri, B. (1996). Chidamber and kemerer's metrics suite: A measurement theory perspective. IEEE Trans. Softw. Eng., 22(4):267-271." } }, { "@position" : "76", "rawText" : { "$" : "[Ince et al., 2000] Ince, A., Topuz, E., Panayirci, E., et Isik, C. (2000). Principles of Integrated Maritime Surveillance Systems, volume 527. Kluwer Academic Publishers." } }, { "@position" : "77", "rawText" : { "$" : "[ISO/IEC, 2001] ISO/IEC (2001). ISO/IEC 9126. Software engineering - Product quality. ISO/IEC." } }, { "@position" : "78", "rawText" : { "$" : "[Jones, 1991] Jones, C. (1991). Applied software measurement: assuring productivity and quality. McGraw-Hill." } }, { "@position" : "79", "rawText" : { "$" : "[Jouault et Bézivin, 2006] Jouault, F. et Bézivin, J. (2006). Km3: a dsl for metamodel specification. In Proceedings of the 8th IFIP International Conference on Formal Methods for Open Object-Based Distributed Systems." } }, { "@position" : "80", "rawText" : { "$" : "[Jouault et Kurtev, 2005] Jouault, F. et Kurtev, I. (2005). Transforming models with ATL. In Proceedings of the Model Transformations in Practice Workshop at MoDELS 2005. Workshop Model Transformations in Practice, part of the MoDELS 2005 Conference." } }, { "@position" : "81", "rawText" : { "$" : "[Jézéquel, 2008] Jézéquel, J.-M. (2008). Model driven design and aspect weaving. Journal of Software and Systems Modeling (SoSyM), 7(2):209-218." }, "id" : { "@value" : "doi_________::39ea6335b8079e0499b3be275eea751f", "@type" : "openaire", "@trustLevel" : "0.7045794" } }, { "@position" : "82", "rawText" : { "$" : "[Kamata et Tamai, 2007] Kamata, M. I. et Tamai, T. (2007). How does requirements quality relate to project success or failure? In Proceedings of the15th IEEE International Requirements Engineering Conference (RE'07), pages 69-78." } }, { "@position" : "83", "rawText" : { "$" : "[Kan, 1995] Kan, S. H. (1995). Metrics and Models in Software Quality Engineering. Addison Wesley, Reading, MA." } }, { "@position" : "84", "rawText" : { "$" : "[Kastenberg, 2004] Kastenberg, H. (2004). Software metrics as class graph properties. Master's thesis, University of Twente." } }, { "@position" : "85", "rawText" : { "$" : "[Kent, 2002] Kent, S. (2002). Model driven engineering. In Proceedings of the Third International Conference Integrated Formal Methods (IFM'2002)." } }, { "@position" : "86", "rawText" : { "$" : "[Khoshgoftaar et Munson, 1990] Khoshgoftaar, T. et Munson, J. (1990). The lines of code metric as a predictor of program faults: A critical analysis. In Proceedings of the Computer Software and Applications Conference, pages 408-413." } }, { "@position" : "87", "rawText" : { "$" : "[Kiczales et al., 1991] Kiczales, G., des Rivières, J., et Bobrow, D. G. (1991). The Art of the Metaobject Protocol. The MIT Press." } }, { "@position" : "88", "rawText" : { "$" : "[Kieburtz et al., 1996] Kieburtz, R. B., McKinney, L., Bell, J. M., Hook, J., Kotov, A., Lewis, J., Olivia, D. P., Sheard, T., Smith, I., et Walton, L. (1996). A software engineering experiment in software component generation. In Proceeding of the 18th International Conference on Software Engineering (ICSE'96), pages 542-552." } }, { "@position" : "89", "rawText" : { "$" : "[Kim et Boldyreff, 2002] Kim, H. et Boldyreff, C. (2002). Developing software metrics applicable to UML models. In Proceedings of QAOOSE'2002. QAOOSE 2002." } }, { "@position" : "90", "rawText" : { "$" : "[Kitchenham et al., 2001] Kitchenham, B. A., Hughes, R. T., et Linkman, S. G. (2001). Modeling software measurement data. IEEE Trans. Softw. Eng., 27(9):788- 804." } }, { "@position" : "91", "rawText" : { "$" : "[Kitchenham et al., 1990] Kitchenham, B. A., Pickard, L. M., et Linkman, S. J. (1990). An evaluation of some design metrics. Softw. Eng. J., 5(1):50-58." } }, { "@position" : "92", "rawText" : { "$" : "[Kolde, 2004] Kolde, C. (2004). Basic metrics for requirements management. White paper, Borland." } }, { "@position" : "93", "rawText" : { "$" : "[Krantz et al., 1971] Krantz, D., Luce, R., Suppes, P., et Tversky, A. (1971). Foundations of measurement. Academic Press, New York." } }, { "@position" : "94", "rawText" : { "$" : "[Kuehne, 2006] Kuehne, T. (2006). Matters of (meta-) modeling. Software and System Modeling, 5(4):369-385." } }, { "@position" : "95", "rawText" : { "$" : "[LaLonde et Pugh, 1994] LaLonde, W. R. et Pugh, J. R. (1994). Gathering metric information using metalevel facilities. JOOP, 7(1):33-37." } }, { "@position" : "96", "rawText" : { "$" : "[Lanza et Ducasse, 2002] Lanza, M. et Ducasse, S. (2002). Beyond language independent object-oriented metrics: Model independent metrics. In Abreu, F., Piattini, M., Poels, G., et Sahraoui, H. A., editors, Proceedings of the 6th International Workshop on Quantitative Approaches in Object-Oriented Software Engineering, pages 77-84." } }, { "@position" : "97", "rawText" : { "$" : "[Lavazza et Agostini, 2005] Lavazza, L. et Agostini, A. (2005). Automated measurement of uml models: an open toolset approach. Journal of Object Technology, 4(4):115-134." }, "id" : { "@value" : "od______3660::7022a9c40ce5f541a43616eff6ffb35f", "@type" : "openaire", "@trustLevel" : "0.60227674" } }, { "@position" : "98", "rawText" : { "$" : "[Ledeczi et al., 2001] Ledeczi, A., Maroti, M., Bakay, A., Karsai, G., Garrett, J., Thomason, C., Nordstrom, G., Sprinkle, J., et Volgyesi, P. (2001). The generic modeling environment. In Proceedings of the Workshop on Intelligent Signal Processing (WISP'2001)." } }, { "@position" : "99", "rawText" : { "$" : "[Lehman, 1994] Lehman, M. (1994). Models and modelling in software engineering. In J.Marciniak, editor, Encyclopaedia of Software Engineering, volume 1, pages 698 - 702. Wiley and Co." } }, { "@position" : "100", "rawText" : { "$" : "[Lethbridge et al., 2004] Lethbridge, T., Tichelaar, S., et Ploedereder, E. (2004). The dagstuhl middle metamodel: A schema for reverse engineering. Electr. Notes Theor. Comput. Sci., 94:7-18." }, "id" : { "@value" : "base_oa_____::de206d39d6992feeebfbd9cd95e50dd9", "@type" : "openaire", "@trustLevel" : "0.6199294" } }, { "@position" : "101", "rawText" : { "$" : "[Lewerentz et Simon, 1998] Lewerentz, C. et Simon, F. (1998). A product metrics tool integrated into a software development environment. In Proceedings of the Workshop on Object-Oriented Technology at ECOOP'98." } }, { "@position" : "102", "rawText" : { "$" : "[Lo, 1992] Lo, B. (1992). Syntactical construct based apar projection. Technical report, IBM Santa Teresa Laboratory Technical Report, California." } }, { "@position" : "103", "rawText" : { "$" : "[Loconsole, 2001] Loconsole, A. (2001). Measuring the requirements management key process area. In Proceedings of the 12th European Software Control and Metrics Conference (ESCOM'2001)." } }, { "@position" : "104", "rawText" : { "$" : "[Mahmood et Lai, 2005] Mahmood, S. et Lai, R. (2005). Measuring the complexity of a uml component specification. In QSIC '05: Proceedings of the Fifth International Conference on Quality Software, pages 150-160, Washington, DC, USA. IEEE Computer Society." } }, { "@position" : "105", "rawText" : { "$" : "[Marchesi, 1998] Marchesi, M. (1998). OOA metrics for the Unified Modeling Language. In Proceedings of the 2nd Euromicro Conference on Software Maintenance and Reengineering (CSMR'98), page 67. IEEE Computer Society." } }, { "@position" : "106", "rawText" : { "$" : "[Marinescu et al., 2005] Marinescu, C., Marinescu, R., et Gîrba, T. (2005). Towards a simplified implementation of object-oriented design metrics. In IEEE METRICS, page 11." } }, { "@position" : "107", "rawText" : { "$" : "[Martin, 2000] Martin, R. C. (2000). Design principles and design patterns." } }, { "@position" : "108", "rawText" : { "$" : "[McCabe, 1976] McCabe (1976). A complexity measure. IEEE Transactions on Software Engineering, 2:308-320." } }, { "@position" : "109", "rawText" : { "$" : "[McQuillan et Power, 2006a] McQuillan, J. et Power, J. (2006a). Towards the reusability of software metrics definitions at the meta level. In Proceedings of the ECOOP'2006 Doctoral Symposium." } }, { "@position" : "110", "rawText" : { "$" : "[McQuillan et Power, 2006b] McQuillan, J. A. et Power, J. F. (2006b). Experiences of using the dagstuhl middle metamodel for defining software metrics. In Proceedings of the 4th International Conference on Principles and Practices of Programming in Java." } }, { "@position" : "111", "rawText" : { "$" : "[Mellor et al., 2003] Mellor, S. J., Clark, A. N., et Futagami, T. (2003). Guest editors' introduction: Model-driven development. IEEE Softw., 20(5):14-18." } }, { "@position" : "112", "rawText" : { "$" : "[Mendelzon et Sametinger, 1995] Mendelzon, A. et Sametinger, J. (1995). Reverse engineering by visualizing and querying. Software - Concepts and Tools, 16(4):170- 182." } }, { "@position" : "113", "rawText" : { "$" : "[Mens et Lanza, 2002] Mens, T. et Lanza, M. (2002). A graph-based metamodel for object-oriented software metrics. Electronic Notes in Theoretical Computer Science, 72:57-68." } }, { "@position" : "114", "rawText" : { "$" : "[Monperrus et al., 2008b] Monperrus, M., Jézéquel, J.-M., Champeau, J., et Hoeltzener, B. (2008b). Measuring models. In Rech, J. et Bunse, C., editors, Model-Driven Software Development: Integrating Quality Assurance. IDEA Group." }, "id" : { "@value" : "od_______165::fc548d465adab29b7bc5a3e25e34721f", "@type" : "openaire", "@trustLevel" : "0.6636128" } }, { "@position" : "115", "rawText" : { "$" : "[Monperrus et al., 2008c] Monperrus, M., Jézéquel, J.-M., Champeau, J., et Hoeltzener, B. (2008c). Model-driven engineering metrics for real time systems. In Proceedings of the 4th European Congress on Embedded Real Time Software (ERTS'2008)." }, "id" : { "@value" : "od______2755::b25be54a7a04dd0eda8841675461a8e3", "@type" : "openaire", "@trustLevel" : "0.6636128" } }, { "@position" : "116", "rawText" : { "$" : "[Monperrus et al., 2008d] Monperrus, M., Jézéquel, J.-M., Champeau, J., et Hoeltzener, B. (2008d). A model-driven measurement approach. In Proceedings of the ACM/IEEE 11th International Conference on Model Driven Engineering Languages and Systems (MODELS'2008)." }, "id" : { "@value" : "od_______165::2addba2f6aae347f5de08a554491c23c", "@type" : "openaire", "@trustLevel" : "0.6636128" } }, { "@position" : "117", "rawText" : { "$" : "[Mora et al., 2008] Mora, B., García, F., Ruiz, F., Piattini, M., Boronat, A., Gómez, A., Carsí, J. Á., et Ramos, I. (2008). Software measurement by using qvt transformations in an mda context. In Proceedings of the International Conference on Enterprise Information Systems (ICEIS'2008)." } }, { "@position" : "118", "rawText" : { "$" : "[Morgenthaler, 2007] Morgenthaler, S. (2007). Introduction à la statistique. Presses polytechniques et universitaires romandes, 3 edition." } }, { "@position" : "119", "rawText" : { "$" : "[Mouloud, 2006] Mouloud, N. (2006). Modèle. In Encyclopedia Universalis. Les éditions de l'Encyclopedia Universalis." } }, { "@position" : "120", "rawText" : { "$" : "[Muller et al., 2005] Muller, P. A., Fleurey, F., et Jézéquel, J. M. (2005). Weaving executability into object-oriented meta-languages. In Proceedings of MODELS/UML 2005." } }, { "@position" : "121", "rawText" : { "$" : "[Müller et Simmons, 2002] Müller, A. et Simmons, G. (2002). Exception handling: Common problems and best practice with java 1.4. In Proceedings of Net.ObjectDays'2002." } }, { "@position" : "122", "rawText" : { "$" : "[Nakatani et al., 2001] Nakatani, T., Urai, T., Ohmura, S., et Tamai, T. (2001). A requirements description metamodel for use cases. In Proceedings of the 8th AsiaPacific on Software Engineering Conference (APSEC'01), page 251. IEEE Computer Society." } }, { "@position" : "123", "rawText" : { "$" : "[Narasimhan et Hendradjaya, 2004] Narasimhan, V. L. et Hendradjaya, B. (2004). Component integration metrics. In Proceedings of the International Conference on Software Engineering Research and Practice (SERP'04)." } }, { "@position" : "124", "rawText" : { "$" : "[OMG, 2004] OMG (2004). MOF 2.0 specification. Technical report, Object Management Group." } }, { "@position" : "125", "rawText" : { "$" : "[OMG, 2005] OMG (2005). System modeling language (SysML) specification. Technical report, Object Management Group." } }, { "@position" : "126", "rawText" : { "$" : "[OMG, 2008] OMG (2008). Software Process Engineering Metamodel (SPEM). Technical report, Object Management Group." } }, { "@position" : "127", "rawText" : { "$" : "[Park et Kim, 1993] Park, S. J. et Kim, H. D. (1993). Constraint-based meta-view approach for modeling environmentinitl generation. Decision Support System, 9:325-348." } }, { "@position" : "128", "rawText" : { "$" : "[Paulk et al., 1993] Paulk, M. C., Weber, C. V., Garcia, S. M., Chrissis, M. B., et Bush, M. (1993). Key practices of the capability maturity model. Technical report, Software Engineering Institute." }, "id" : { "@value" : "doi_________::6ab537678908548bd199b70d84da1709", "@type" : "openaire", "@trustLevel" : "0.62692255" } }, { "@position" : "129", "rawText" : { "$" : "[Pawlak et al., 2006] Pawlak, R., Noguera, C., et Petitprez, N. (2006). Spoon: Program analysis and transformation in java. Technical Report 5901, INRIA." } }, { "@position" : "130", "rawText" : { "$" : "[Poels et Dedene, 2000] Poels, G. et Dedene, G. (2000). Distance-based software measurement: necessary and sufficient properties for software measures. Information and Software Technology, 42(1):35-46." } }, { "@position" : "131", "rawText" : { "$" : "[Reissing, 2001] Reissing, R. (2001). Towards a model for object-oriented design measurement. In ECOOP'01 Workshop QAOOSE." } }, { "@position" : "132", "rawText" : { "$" : "[Revault, 1996] Revault, N. (1996). Principes de méta-modélisation pour l'utilisation de canevas d'applications à objets (MétaGen et les frameworks). PhD thesis, Université P. et M. Curie (Paris 6), Paris, France." } }, { "@position" : "133", "rawText" : { "$" : "[Reynoso et al., 2003] Reynoso, L., Genero, M., et Piattini, M. (2003). Measuring ocl expressions: a \"tracing\"-based approach. In Proceedings of QAOOSE'2003." } }, { "@position" : "134", "rawText" : { "$" : "[Rothenberg, 1989] Rothenberg, J. (1989). The nature of modeling. John Wiley and Sons, Inc." } }, { "@position" : "135", "rawText" : { "$" : "[Seidewitz, 2003] Seidewitz, E. (2003). What models mean. IEEE Softw., 20(5):26- 32." } }, { "@position" : "136", "rawText" : { "$" : "[Selic, 2003] Selic, B. (2003). The pragmatics of model-driven development. IEEE Softw., 20(5):19-25." } }, { "@position" : "137", "rawText" : { "$" : "[Singh et al., 2004] Singh, Y., Sabharwal, S., et Sood, M. (2004). A systematic approach to measure the problem complexity of software requirement specifications of an information system. Information and Management Sciences, 15:69-90." } }, { "@position" : "138", "rawText" : { "$" : "[Smacchia S.A., 2006] Smacchia S.A. (2006). Code query language 1.5 specification. Technical report, Smacchia S.A." } }, { "@position" : "139", "rawText" : { "$" : "[Soley, 2000] Soley, R. (2000). Model driven architecture. Technical report, Object Management Group." } }, { "@position" : "140", "rawText" : { "$" : "[Solheim et al., 2005] Solheim, H., Lillehagen, F., Petersen, S. A., Jorgensen, H., et Anastasiou, M. (2005). Model-driven visual requirements engineering. In Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE'05), pages 421-428." } }, { "@position" : "141", "rawText" : { "$" : "[Spector et Gifford, 1986] Spector, A. et Gifford, D. (1986). A computer science perspective of bridge design. Commun. ACM, 29(4):267-283." } }, { "@position" : "142", "rawText" : { "$" : "[Sztipanovits et Karsai, 1997] Sztipanovits, J. et Karsai, G. (1997). integrated computing. Computer, 30(4):110-111." } }, { "@position" : "143", "rawText" : { "$" : "[Washizaki et al., 2003] Washizaki, H., Yamamoto, H., et Fukazawa, Y. (2003). A metrics suite for measuring reusability of software components. In METRICS '03: Proceedings of the 9th International Symposium on Software Metrics, page 211. IEEE Computer Society." } }, { "@position" : "144", "rawText" : { "$" : "[White, 2000] White, K. P. (2000). Model theory. In McGraw-Hill Encyclopedia of Science and Technology. The McGraw-Hill Companies." } }, { "@position" : "145", "rawText" : { "$" : "[Wohlin, 2007] Wohlin, C. (2007). An analysis of the most cited articles in software engineering journals - 2000. Inf. Softw. Technol., 49(1):2-11." } }, { "@position" : "146", "rawText" : { "$" : "[Yu-ying et al., 2007] Yu-ying, W., Qing-shan, L., Ping, C., et Chun-de, R. (2007). Dynamic fan-in and fan-out metrics for program comprehension. Journal of Shanghai University, 11(5):474-479." }, "id" : { "@value" : "doi_________::c68c9e73a21b933b1eaf577847b2186c", "@type" : "openaire", "@trustLevel" : "0.7521498" } } ] } }, { "@name" : "result reference list", "@typology" : "reference list", "@provenance" : "iis::document_referencedDocuments", "@trust" : "0.9", "references" : { "reference" : [ { "@position" : "1", "rawText" : { "$" : "[Andler et al., 2006] Andler, D., Lascar, D., et Sabbagh, G. (2006). Théorie des modèles. In Encyclopedia Universalis. Les éditions de l'Encyclopedia Universalis." } }, { "@position" : "2", "rawText" : { "$" : "[Aspray et al., 1996] Aspray, W., Keil-Slawik, R., et Parnas, D. (1996). The history of software engineering. Technical report, Schloss Dagstuhl." } }, { "@position" : "3", "rawText" : { "$" : "[Atkinson et Kühne, 2003] Atkinson, C. et Kühne, T. (2003). Model-driven development: A metamodeling foundation. IEEE Softw., 20(5):36-41." } }, { "@position" : "4", "rawText" : { "$" : "[Axelsson, 2002] Axelsson, J. (2002). Model based systems engineering using a continuous-time extension of the unified modeling language (UML). Systems Engineering, 5:165-179." } }, { "@position" : "5", "rawText" : { "$" : "[Baader et al., 2003] Baader, F., Calvanese, D., McGuinness, D. L., Nardi, D., et Patel-Schneider, P. F. (2003). The description logic handbook: Theory, implementation, and applications. In Description Logic Handbook. Cambridge University Press." } }, { "@position" : "6", "rawText" : { "$" : "[Baker, 2004] Baker, A. (2004). Simplicity. In Stanford Encyclopedia of Philosophy. The Metaphysics Research Lab, Stanford University." } }, { "@position" : "7", "rawText" : { "$" : "[Baroni et Abreu, 2002] Baroni, A. et Abreu, F. (2002). Formalizing object-oriented design metrics upon the uml meta-model. In Proc. of the 16th Brazilian Symposium on Software Engineering." } }, { "@position" : "8", "rawText" : { "$" : "[Baroni et al., 2002] Baroni, A., Braz, S., et Abreu, F. (2002). Using OCL to formalize object-oriented design metrics definitions. In ECOOP'02 Workshop on Quantitative Approaches in OO Software Engineering." } }, { "@position" : "9", "rawText" : { "$" : "[Baroni, 2005] Baroni, A. L. (2005). Quantitative assessment of uml dynamic models. In Proceedings of the doctoral symposium at the 10th European Software Engineering Conference held jointly with 13th International Symposium on Foundations of Software Engineering (ESEC-FSE'05), pages 366-369. ACM Press." } }, { "@position" : "10", "rawText" : { "$" : "[Basili et al., 1996] Basili, V. R., Briand, L. C., et Melo, W. L. (1996). A validation of object-oriented design metrics as quality indicators. IEEE Trans. Softw. Eng., 22(10):751-761." } }, { "@position" : "11", "rawText" : { "$" : "[Basili et al., 1994] Basili, V. R., Caldiera, G., et Rombach, H. D. (1994). The goal question metric approach. In Encyclopedia of Software Engineering. Wiley." } }, { "@position" : "12", "rawText" : { "$" : "[Batory, 2006] Batory, D. (2006). Multilevel models in model-driven engineering, product lines, and metaprogramming. IBM Syst. J., 45(3):527-539." } }, { "@position" : "13", "rawText" : { "$" : "[Baumert et McWhinney, 1992] Baumert, J. et McWhinney, M. (1992). Software measures and the capability maturity model. Technical report, Software Engineering Institute, Carnegie Mellon University." }, "id" : { "@value" : "doi_________::80a58ba66536b773e90f6e42872d26f5", "@type" : "openaire", "@trustLevel" : "0.6059239" } }, { "@position" : "14", "rawText" : { "$" : "[Berenbach et Borotto, 2006] Berenbach, B. et Borotto, G. (2006). Metrics for model driven requirements development. In Proceeding of the 28th International Conference on Software Engineering (ICSE '06), pages 445-451. ACM Press." } }, { "@position" : "15", "rawText" : { "$" : "[Beyer et al., 2005] Beyer, D., Noack, A., et Lewerentz, C. (2005). Efficient relational calculation for software analysis. IEEE Trans. Softw. Eng., 31(2):137-149." } }, { "@position" : "16", "rawText" : { "$" : "[Boag et al., 2007] Boag, S., Chamberlin, D., Fernández, M. F., Florescu, D., Robie, J., et Siméon, J. (2007). XQuery 1.0: An XML query language. Technical report, W3C." } }, { "@position" : "17", "rawText" : { "$" : "[Boehm, 2006] Boehm, B. (2006). A view of 20th and 21st century software engineering. In ICSE '06: Proceeding of the 28th International Conference on Software Engineering, pages 12-29. ACM." } }, { "@position" : "18", "rawText" : { "$" : "[Boehm et al., 1995] Boehm, B., Clark, B., Horowitz, E., Shelby, R., et Westland, C. (1995). An Overview of the COCOMO 2.0 Software Cost Model. In Software Technology Conference." } }, { "@position" : "19", "rawText" : { "$" : "[Boehm et Sullivan, 2000] Boehm, B. W. et Sullivan, K. J. (2000). Software economics: a roadmap. In ICSE - Future of SE Track, pages 319-343." } }, { "@position" : "20", "rawText" : { "$" : "[Briand et al., 1998] Briand, L. C., Daly, J. W., et Wüst, J. (1998). A unified framework for cohesion measurement in object-oriented systems. Empirical Softw. Eng., 3(1):65-117." } }, { "@position" : "21", "rawText" : { "$" : "[Briand et al., 1996] Briand, L. C., Morasca, S., et Basili, V. R. (1996). Propertybased software engineering measurement. Software Engineering, 22(1):68-86." } }, { "@position" : "22", "rawText" : { "$" : "[Brinkkemper et al., 2001] Brinkkemper, S., Saeki, M., et Harmsen, F. (2001). A method engineering language for the description of systems development methods. In CAiSE, pages 473-476." } }, { "@position" : "23", "rawText" : { "$" : "[Brottier et al., 2007] Brottier, E., Baudry, B., Traon, Y. L., Touzet, D., et Nicolas, B. (2007). Producing a global requirement model from multiple requirement specifications. In EDOC, pages 390-404." }, "id" : { "@value" : "od_______165::6a83fb806f45b4ef83bdf42000a9f857", "@type" : "openaire", "@trustLevel" : "0.60639083" } }, { "@position" : "24", "rawText" : { "$" : "[Budinsky et al., 2004] Budinsky, F., Steinberg, D., Merks, E., Ellersick, R., et Grose, T. J. (2004). Eclipse Modeling Framework. Addison-Wesley." } }, { "@position" : "25", "rawText" : { "$" : "[Bézivin, 2005] Bézivin, J. (2005). On the unification power of models. Software and System Modeling, 4(2):171-188." }, "id" : { "@value" : "doi_________::fb93a3323c6dcb7e780ec478b98bb1c6", "@type" : "openaire", "@trustLevel" : "0.6939042" } }, { "@position" : "26", "rawText" : { "$" : "[Cabot et Teniente, 2006] Cabot, J. et Teniente, E. (2006). A metric for measuring the complexity of ocl expressions. In Model Size Metrics Workshop co-located with MODELS'06." } }, { "@position" : "27", "rawText" : { "$" : "[Card, 1991] Card, D. (1991). What makes a software measure successful. American Programmer, 4:2-8." } }, { "@position" : "28", "rawText" : { "$" : "[CEI et ISO, 1993] CEI et ISO (1993). International vocabulary of basic and general terms in metrology = vocabulaire international des termes fondamentaux et généraux de métrologie. International Organisation for Standardization." } }, { "@position" : "29", "rawText" : { "$" : "[Chen, 1976] Chen, P. P. (1976). The entity-relationship model - toward a unified view of data. ACM Trans. Database Syst., 1(1):9-36." } }, { "@position" : "30", "rawText" : { "$" : "[Cheng et al., 2005] Cheng, B. H. C., Stephenson, R., et Berenbach, B. (2005). Lessons learned from automated analysis of industrial uml class models (an experience report). In Proceedings of MODELS' 2005, pages 324-338." } }, { "@position" : "31", "rawText" : { "$" : "[Chidamber et Kemerer, 1991] Chidamber, S. R. et Kemerer, C. F. (1991). Towards a metrics suite for object-oriented design. In Proceedings of OOPSLA'91, pages 197-211." } }, { "@position" : "32", "rawText" : { "$" : "[Chidamber et Kemerer, 1994] Chidamber, S. R. et Kemerer, C. F. (1994). A metric suite for object-oriented design. IEEE Transactions on Software Engineering, 20(6):293-318." } }, { "@position" : "33", "rawText" : { "$" : "[Cho et al., 2001] Cho, E. S., Kim, M. S., et Kim, S. D. (2001). Component metrics to measure component quality. In Proceedings of the 8th Asia-Pacific on Software Engineering Conference (APSEC'01), page 419. IEEE Computer Society." } }, { "@position" : "34", "rawText" : { "$" : "[Chretienne et al., 2004] Chretienne, P., Jean-Marie, A., Le Lann, G., Stefani, J., Atos Origin, et Dassault Aviation (2004). Programme d'Étude Amont Mesure de la compléxité (marché n˚00-34-007). Technical report, DGA." } }, { "@position" : "35", "rawText" : { "$" : "[Clayberg et Rubel, 2006] Clayberg, E. et Rubel, D. (2006). Eclipse: Building Commercial-Quality Plug-ins. Addison-Wesley." } }, { "@position" : "36", "rawText" : { "$" : "[Consens et Mendelzon, 1990] Consens, M. P. et Mendelzon, A. O. (1990). GraphLog: a visual formalism for real life recursion. In Proc. of the ACM Symp. on Principles of Database Systems, pages 404-416." } }, { "@position" : "37", "rawText" : { "$" : "[Costa, 2001] Costa, F. (2001). Combining meta-information management and reflection in an architecture for configurable and reconfigurable middleware. PhD thesis, University of Lancaster." } }, { "@position" : "38", "rawText" : { "$" : "[Costello et Liu, 1995] Costello, R. J. et Liu, D.-B. (1995). Metrics for requirements engineering. J. Syst. Softw., 29(1):39-63." } }, { "@position" : "39", "rawText" : { "$" : "[Davis et al., 1993] Davis, A., Overmyer, S., Jordan, K., Caruso, J., Dandashi, F., Dinh, A., Kincaid, G., Ledeboer, G., Reynolds, P., Sitaram, P., Ta, A., et Theofanos, M. (1993). Identifying and measuring quality in a software requirements specification. In Proceedings of the First International Software Metrics Symposium." } }, { "@position" : "40", "rawText" : { "$" : "[de Lara et Vangheluwe, 2002] de Lara, J. et Vangheluwe, H. (2002). Atom3: A tool for multi-formalism and meta-modelling. In Proceedings of the 5th International Conference on Fundamental Approaches to Software Engineering (FASE'02), pages 174-188. Springer-Verlag." } }, { "@position" : "41", "rawText" : { "$" : "[Demeyer et Ducasse, 1999] Demeyer, S. et Ducasse, S. (1999). Metrics, do they really help? In Publications, H. S., editor, Proceedings of LMO'99, pages 69-82." } }, { "@position" : "42", "rawText" : { "$" : "[Demeyer et al., 2001] Demeyer, S., Tichelaar, S., et Ducasse, S. (2001). Famix 2.1 - the famoos information exchange model. Technical report, University of Bern." } }, { "@position" : "43", "rawText" : { "$" : "[Dijkstra, 1972] Dijkstra, E. W. (1972). The humble programmer. Commun. ACM, 15:859-866." } }, { "@position" : "44", "rawText" : { "$" : "[Douglass, 2004] Douglass, B. P. (2004). Computing model complexity. White paper, I-Logix." } }, { "@position" : "45", "rawText" : { "$" : "[Ducasse et Gîrba, 2006] Ducasse, S. et Gîrba, T. (2006). Using Smalltalk as a reflective executable meta-language. In International Conference on Model Driven Engineering Languages and Systems (Models/UML 2006), volume 4199 of LNCS, pages 604-618. Springer-Verlag." } }, { "@position" : "46", "rawText" : { "$" : "[Ducasse et al., 2008] Ducasse, S., Gîrba, T., Kuhn, A., et Renggli, L. (2008). Metaenvironment and executable meta-language using smalltalk: an experience report. Journal of Software and Systems Modeling (SOSYM)." } }, { "@position" : "47", "rawText" : { "$" : "[Dufour et al., 2003] Dufour, B., Driesen, K., Hendren, L., et Verbrugge, C. (2003). Dynamic metrics for java. In Proceedings of the ACM SIGPLAN 2003 Conference on Object-Oriented Programming, Systems, Languages, and Applications (OOPSLA'03), pages 149-168. ACM Press." }, "id" : { "@value" : "doi_________::287955775d392c0cf0e06a93fbd85ea2", "@type" : "openaire", "@trustLevel" : "0.59967333" } }, { "@position" : "48", "rawText" : { "$" : "[Eichberg et al., 2006] Eichberg, M., Germanus, D., Mezini, M., Mrokon, L., et Schä- fer, T. (2006). Qscope: an open, extensible framework for measuring software projects. In Proceedings of the 10th European Conference on Software Maintenance and Reengineering (CSMR'06)." } }, { "@position" : "49", "rawText" : { "$" : "[El Wakil et al., 2005] El Wakil, M., El Bastawissi, A., Boshra, M., et Fahmy, A. (2005). A novel approach to formalize and collect object-oriented design-metrics. In Proceedings of the 9th International Conference on Empirical Assessment in Software Engineering." } }, { "@position" : "50", "rawText" : { "$" : "[Estefan, 2007] Estefan, J. A. (2007). Survey of model-based systems engineering (MBSE) methodologies. Technical report, INCOSE MBSE Focus Group." } }, { "@position" : "51", "rawText" : { "$" : "[Favre, 2006] Favre, J.-M. (2006). Megamodelling and etymology. In Cordy, J. R., Lämmel, R., et Winter, A., editors, Transformation Techniques in Software Engineering, number 05161 in Dagstuhl Seminar Proceedings. Internationales Begegnungs- und Forschungszentrum fuer Informatik (IBFI), Schloss Dagstuhl, Germany." } }, { "@position" : "52", "rawText" : { "$" : "[Feiler et al., 2006] Feiler, P. H., Gluch, D. P., et Hudak, J. J. (2006). The architecture analysis and design language (aadl): An introduction. Technical report, CMU/SEI." } }, { "@position" : "53", "rawText" : { "$" : "[Fenton, 1991] Fenton, N. E. (1991). Software Metrics: A Rigorous Approach. Chapman and Hall." } }, { "@position" : "54", "rawText" : { "$" : "[Fenton et Neil, 1999] Fenton, N. E. et Neil, M. (1999). A critique of software defect prediction models. IEEE Trans. Softw. Eng., 25(5):675-689." } }, { "@position" : "55", "rawText" : { "$" : "[Ferneley, 1997] Ferneley, E. (1997). An empirical study of coupling and control flow metrics. Information and Software Technology, 39(13):879-887." } }, { "@position" : "56", "rawText" : { "$" : "[France et Rumpe, 2007] France, R. et Rumpe, B. (2007). Model-driven development of complex software: A research roadmap. In Future of Software Engineering (FOSE'07), pages 37-54. IEEE Computer Society." } }, { "@position" : "57", "rawText" : { "$" : "[Frigg et Hartmann, 2006] Frigg, R. et Hartmann, S. (2006). Models in science. In Stanford Encyclopedia of Philosophy. The Metaphysics Research Lab." }, "id" : { "@value" : "core_ac_uk__::58e6aab36e0d6637637d1cafc3fa0aca", "@type" : "openaire", "@trustLevel" : "0.60075843" } }, { "@position" : "58", "rawText" : { "$" : "[Gamma et al., 1995] Gamma, E., Helm, R., Johnson, R., et Vlissides, J. (1995). Design Patterns: Elements of Reusable Object-Oriented Software. Addison-Wesley, Boston, MA, USA." } }, { "@position" : "59", "rawText" : { "$" : "[Garcia et al., 2004] Garcia, F., Ruiz, F., et Piattini, M. (2004). Definition and empirical validation of metrics for software process models. In Proceedings of the International Conference on Product Focused Software Process Improvement (PROFES'2004)." } }, { "@position" : "60", "rawText" : { "$" : "[Garcìa et al., 2006] Garcìa, F., Bertoa, M. F., Calero, C., Vallecillo, A., Ruiz, F., Piattini, M., et Genero, M. (2006). Towards a consistent terminology for software measurement. Information and Software Technology, 48(8):631-644." }, "id" : { "@value" : "doi_________::b852382f6350eec1442f6df9159de3c4", "@type" : "openaire", "@trustLevel" : "0.7317082" } }, { "@position" : "61", "rawText" : { "$" : "[Genero et al., 2002a] Genero, M., Miranda, D., et Piattini, M. (2002a). Defining and validating metrics for uml statechart diagrams. In Proceedings of QAOOSE'2002." } }, { "@position" : "62", "rawText" : { "$" : "[Genero et al., 2000] Genero, M., Piattini, M., et Calero, C. (2000). Early measures for UML class diagrams. L'Objet, 6(4):489-505." } }, { "@position" : "63", "rawText" : { "$" : "[Genero et al., 2002b] Genero, M., Piattini, M., et Calero, C. (2002b). Empirical validation of class diagram metrics. In Proceedings of the International Symposium on Empirical Software Engineering (ISESE'02), page 195. IEEE Computer Society." }, "id" : { "@value" : "doi_________::6075e18d85d4062a9842c669604f1b19", "@type" : "openaire", "@trustLevel" : "0.63127756" } }, { "@position" : "64", "rawText" : { "$" : "[Genero et al., 2005] Genero, M., Piattini, M., et Caleron, C. (2005). A survey of metrics for UML class diagrams. Journal of Object Technology, 4:59-92." }, "id" : { "@value" : "doi_________::a0710cf4d04bf76dd5320c1c24e14b95", "@type" : "openaire", "@trustLevel" : "0.6194535" } }, { "@position" : "65", "rawText" : { "$" : "[Gill et Grover, 2003] Gill, N. S. et Grover, P. S. (2003). Component-based measurement: few useful guidelines. SIGSOFT Softw. Eng. Notes, 28(6):4-4." } }, { "@position" : "66", "rawText" : { "$" : "[Grady, 1992] Grady, R. B. (1992). Practical software metrics for project management and process improvement. Prentice-Hall, Inc." } }, { "@position" : "67", "rawText" : { "$" : "[Granger, 1993] Granger, G.-G. (1993). La science ou les sciences. PUF." } }, { "@position" : "68", "rawText" : { "$" : "[Guerra et al., 2007] Guerra, E., de Lara, J., et Díaz, P. (2007). Visual specification of measurements and redesigns for domain specific visual languages. Journal of Visual Languages and Computing, in Press:1-27." } }, { "@position" : "69", "rawText" : { "$" : "[Guerra et al., 2006] Guerra, E., Diaz, P., et de Lara, J. (2006). Visual specification of metrics for domain specific visual languages. In Graph Transformation and Visual Modeling Techniques (GT-VMT 2006)." } }, { "@position" : "70", "rawText" : { "$" : "[Hammer et al., 1997] Hammer, T., Rosenberg, L., Huffman, L., et Hyatt, L. (1997). Requirements metrics - value added. In Proceedings of the 3rd IEEE International Symposium on Requirements Engineering (RE'97), page 141.1. IEEE Computer Society." } }, { "@position" : "71", "rawText" : { "$" : "[Harel et Rumpe, 2004] Harel, D. et Rumpe, B. (2004). Meaningful modeling: what's the semantics of semantics? Computer, 37(10):64-72." } }, { "@position" : "72", "rawText" : { "$" : "[Harmer et Wilkie, 2002] Harmer, T. J. et Wilkie, F. G. (2002). An extensible metrics extraction environment for object-oriented programming languages. In Proceedings of the International Conference on Software Maintenance." } }, { "@position" : "73", "rawText" : { "$" : "[Henderson-Sellers, 1996] Henderson-Sellers, B. (1996). measures of complexity. Prentice Hall." } }, { "@position" : "74", "rawText" : { "$" : "[Henry et Kafura, 1981] Henry, S. et Kafura, D. (1981). Software structure metrics based on information flow. IEEE Trans. Softw. Eng., 7(5):510-518." } }, { "@position" : "75", "rawText" : { "$" : "[Hitz et Montazeri, 1996] Hitz, M. et Montazeri, B. (1996). Chidamber and kemerer's metrics suite: A measurement theory perspective. IEEE Trans. Softw. Eng., 22(4):267-271." } }, { "@position" : "76", "rawText" : { "$" : "[Ince et al., 2000] Ince, A., Topuz, E., Panayirci, E., et Isik, C. (2000). Principles of Integrated Maritime Surveillance Systems, volume 527. Kluwer Academic Publishers." } }, { "@position" : "77", "rawText" : { "$" : "[ISO/IEC, 2001] ISO/IEC (2001). ISO/IEC 9126. Software engineering - Product quality. ISO/IEC." } }, { "@position" : "78", "rawText" : { "$" : "[Jones, 1991] Jones, C. (1991). Applied software measurement: assuring productivity and quality. McGraw-Hill." } }, { "@position" : "79", "rawText" : { "$" : "[Jouault et Bézivin, 2006] Jouault, F. et Bézivin, J. (2006). Km3: a dsl for metamodel specification. In Proceedings of the 8th IFIP International Conference on Formal Methods for Open Object-Based Distributed Systems." } }, { "@position" : "80", "rawText" : { "$" : "[Jouault et Kurtev, 2005] Jouault, F. et Kurtev, I. (2005). Transforming models with ATL. In Proceedings of the Model Transformations in Practice Workshop at MoDELS 2005. Workshop Model Transformations in Practice, part of the MoDELS 2005 Conference." } }, { "@position" : "81", "rawText" : { "$" : "[Jézéquel, 2008] Jézéquel, J.-M. (2008). Model driven design and aspect weaving. Journal of Software and Systems Modeling (SoSyM), 7(2):209-218." }, "id" : { "@value" : "doi_________::39ea6335b8079e0499b3be275eea751f", "@type" : "openaire", "@trustLevel" : "0.7045794" } }, { "@position" : "82", "rawText" : { "$" : "[Kamata et Tamai, 2007] Kamata, M. I. et Tamai, T. (2007). How does requirements quality relate to project success or failure? In Proceedings of the15th IEEE International Requirements Engineering Conference (RE'07), pages 69-78." } }, { "@position" : "83", "rawText" : { "$" : "[Kan, 1995] Kan, S. H. (1995). Metrics and Models in Software Quality Engineering. Addison Wesley, Reading, MA." } }, { "@position" : "84", "rawText" : { "$" : "[Kastenberg, 2004] Kastenberg, H. (2004). Software metrics as class graph properties. Master's thesis, University of Twente." } }, { "@position" : "85", "rawText" : { "$" : "[Kent, 2002] Kent, S. (2002). Model driven engineering. In Proceedings of the Third International Conference Integrated Formal Methods (IFM'2002)." } }, { "@position" : "86", "rawText" : { "$" : "[Khoshgoftaar et Munson, 1990] Khoshgoftaar, T. et Munson, J. (1990). The lines of code metric as a predictor of program faults: A critical analysis. In Proceedings of the Computer Software and Applications Conference, pages 408-413." } }, { "@position" : "87", "rawText" : { "$" : "[Kiczales et al., 1991] Kiczales, G., des Rivières, J., et Bobrow, D. G. (1991). The Art of the Metaobject Protocol. The MIT Press." } }, { "@position" : "88", "rawText" : { "$" : "[Kieburtz et al., 1996] Kieburtz, R. B., McKinney, L., Bell, J. M., Hook, J., Kotov, A., Lewis, J., Olivia, D. P., Sheard, T., Smith, I., et Walton, L. (1996). A software engineering experiment in software component generation. In Proceeding of the 18th International Conference on Software Engineering (ICSE'96), pages 542-552." } }, { "@position" : "89", "rawText" : { "$" : "[Kim et Boldyreff, 2002] Kim, H. et Boldyreff, C. (2002). Developing software metrics applicable to UML models. In Proceedings of QAOOSE'2002. QAOOSE 2002." } }, { "@position" : "90", "rawText" : { "$" : "[Kitchenham et al., 2001] Kitchenham, B. A., Hughes, R. T., et Linkman, S. G. (2001). Modeling software measurement data. IEEE Trans. Softw. Eng., 27(9):788- 804." } }, { "@position" : "91", "rawText" : { "$" : "[Kitchenham et al., 1990] Kitchenham, B. A., Pickard, L. M., et Linkman, S. J. (1990). An evaluation of some design metrics. Softw. Eng. J., 5(1):50-58." } }, { "@position" : "92", "rawText" : { "$" : "[Kolde, 2004] Kolde, C. (2004). Basic metrics for requirements management. White paper, Borland." } }, { "@position" : "93", "rawText" : { "$" : "[Krantz et al., 1971] Krantz, D., Luce, R., Suppes, P., et Tversky, A. (1971). Foundations of measurement. Academic Press, New York." } }, { "@position" : "94", "rawText" : { "$" : "[Kuehne, 2006] Kuehne, T. (2006). Matters of (meta-) modeling. Software and System Modeling, 5(4):369-385." } }, { "@position" : "95", "rawText" : { "$" : "[LaLonde et Pugh, 1994] LaLonde, W. R. et Pugh, J. R. (1994). Gathering metric information using metalevel facilities. JOOP, 7(1):33-37." } }, { "@position" : "96", "rawText" : { "$" : "[Lanza et Ducasse, 2002] Lanza, M. et Ducasse, S. (2002). Beyond language independent object-oriented metrics: Model independent metrics. In Abreu, F., Piattini, M., Poels, G., et Sahraoui, H. A., editors, Proceedings of the 6th International Workshop on Quantitative Approaches in Object-Oriented Software Engineering, pages 77-84." } }, { "@position" : "97", "rawText" : { "$" : "[Lavazza et Agostini, 2005] Lavazza, L. et Agostini, A. (2005). Automated measurement of uml models: an open toolset approach. Journal of Object Technology, 4(4):115-134." }, "id" : { "@value" : "od______3660::7022a9c40ce5f541a43616eff6ffb35f", "@type" : "openaire", "@trustLevel" : "0.60227674" } }, { "@position" : "98", "rawText" : { "$" : "[Ledeczi et al., 2001] Ledeczi, A., Maroti, M., Bakay, A., Karsai, G., Garrett, J., Thomason, C., Nordstrom, G., Sprinkle, J., et Volgyesi, P. (2001). The generic modeling environment. In Proceedings of the Workshop on Intelligent Signal Processing (WISP'2001)." } }, { "@position" : "99", "rawText" : { "$" : "[Lehman, 1994] Lehman, M. (1994). Models and modelling in software engineering. In J.Marciniak, editor, Encyclopaedia of Software Engineering, volume 1, pages 698 - 702. Wiley and Co." } }, { "@position" : "100", "rawText" : { "$" : "[Lethbridge et al., 2004] Lethbridge, T., Tichelaar, S., et Ploedereder, E. (2004). The dagstuhl middle metamodel: A schema for reverse engineering. Electr. Notes Theor. Comput. Sci., 94:7-18." }, "id" : { "@value" : "base_oa_____::de206d39d6992feeebfbd9cd95e50dd9", "@type" : "openaire", "@trustLevel" : "0.6199294" } }, { "@position" : "101", "rawText" : { "$" : "[Lewerentz et Simon, 1998] Lewerentz, C. et Simon, F. (1998). A product metrics tool integrated into a software development environment. In Proceedings of the Workshop on Object-Oriented Technology at ECOOP'98." } }, { "@position" : "102", "rawText" : { "$" : "[Lo, 1992] Lo, B. (1992). Syntactical construct based apar projection. Technical report, IBM Santa Teresa Laboratory Technical Report, California." } }, { "@position" : "103", "rawText" : { "$" : "[Loconsole, 2001] Loconsole, A. (2001). Measuring the requirements management key process area. In Proceedings of the 12th European Software Control and Metrics Conference (ESCOM'2001)." } }, { "@position" : "104", "rawText" : { "$" : "[Mahmood et Lai, 2005] Mahmood, S. et Lai, R. (2005). Measuring the complexity of a uml component specification. In QSIC '05: Proceedings of the Fifth International Conference on Quality Software, pages 150-160, Washington, DC, USA. IEEE Computer Society." } }, { "@position" : "105", "rawText" : { "$" : "[Marchesi, 1998] Marchesi, M. (1998). OOA metrics for the Unified Modeling Language. In Proceedings of the 2nd Euromicro Conference on Software Maintenance and Reengineering (CSMR'98), page 67. IEEE Computer Society." } }, { "@position" : "106", "rawText" : { "$" : "[Marinescu et al., 2005] Marinescu, C., Marinescu, R., et Gîrba, T. (2005). Towards a simplified implementation of object-oriented design metrics. In IEEE METRICS, page 11." } }, { "@position" : "107", "rawText" : { "$" : "[Martin, 2000] Martin, R. C. (2000). Design principles and design patterns." } }, { "@position" : "108", "rawText" : { "$" : "[McCabe, 1976] McCabe (1976). A complexity measure. IEEE Transactions on Software Engineering, 2:308-320." } }, { "@position" : "109", "rawText" : { "$" : "[McQuillan et Power, 2006a] McQuillan, J. et Power, J. (2006a). Towards the reusability of software metrics definitions at the meta level. In Proceedings of the ECOOP'2006 Doctoral Symposium." } }, { "@position" : "110", "rawText" : { "$" : "[McQuillan et Power, 2006b] McQuillan, J. A. et Power, J. F. (2006b). Experiences of using the dagstuhl middle metamodel for defining software metrics. In Proceedings of the 4th International Conference on Principles and Practices of Programming in Java." } }, { "@position" : "111", "rawText" : { "$" : "[Mellor et al., 2003] Mellor, S. J., Clark, A. N., et Futagami, T. (2003). Guest editors' introduction: Model-driven development. IEEE Softw., 20(5):14-18." } }, { "@position" : "112", "rawText" : { "$" : "[Mendelzon et Sametinger, 1995] Mendelzon, A. et Sametinger, J. (1995). Reverse engineering by visualizing and querying. Software - Concepts and Tools, 16(4):170- 182." } }, { "@position" : "113", "rawText" : { "$" : "[Mens et Lanza, 2002] Mens, T. et Lanza, M. (2002). A graph-based metamodel for object-oriented software metrics. Electronic Notes in Theoretical Computer Science, 72:57-68." } }, { "@position" : "114", "rawText" : { "$" : "[Monperrus et al., 2008b] Monperrus, M., Jézéquel, J.-M., Champeau, J., et Hoeltzener, B. (2008b). Measuring models. In Rech, J. et Bunse, C., editors, Model-Driven Software Development: Integrating Quality Assurance. IDEA Group." }, "id" : { "@value" : "od______2755::fc548d465adab29b7bc5a3e25e34721f", "@type" : "openaire", "@trustLevel" : "0.6636128" } }, { "@position" : "115", "rawText" : { "$" : "[Monperrus et al., 2008c] Monperrus, M., Jézéquel, J.-M., Champeau, J., et Hoeltzener, B. (2008c). Model-driven engineering metrics for real time systems. In Proceedings of the 4th European Congress on Embedded Real Time Software (ERTS'2008)." }, "id" : { "@value" : "od_______166::b25be54a7a04dd0eda8841675461a8e3", "@type" : "openaire", "@trustLevel" : "0.6636128" } }, { "@position" : "116", "rawText" : { "$" : "[Monperrus et al., 2008d] Monperrus, M., Jézéquel, J.-M., Champeau, J., et Hoeltzener, B. (2008d). A model-driven measurement approach. In Proceedings of the ACM/IEEE 11th International Conference on Model Driven Engineering Languages and Systems (MODELS'2008)." }, "id" : { "@value" : "od_______166::2addba2f6aae347f5de08a554491c23c", "@type" : "openaire", "@trustLevel" : "0.6636128" } }, { "@position" : "117", "rawText" : { "$" : "[Mora et al., 2008] Mora, B., García, F., Ruiz, F., Piattini, M., Boronat, A., Gómez, A., Carsí, J. Á., et Ramos, I. (2008). Software measurement by using qvt transformations in an mda context. In Proceedings of the International Conference on Enterprise Information Systems (ICEIS'2008)." } }, { "@position" : "118", "rawText" : { "$" : "[Morgenthaler, 2007] Morgenthaler, S. (2007). Introduction à la statistique. Presses polytechniques et universitaires romandes, 3 edition." } }, { "@position" : "119", "rawText" : { "$" : "[Mouloud, 2006] Mouloud, N. (2006). Modèle. In Encyclopedia Universalis. Les éditions de l'Encyclopedia Universalis." } }, { "@position" : "120", "rawText" : { "$" : "[Muller et al., 2005] Muller, P. A., Fleurey, F., et Jézéquel, J. M. (2005). Weaving executability into object-oriented meta-languages. In Proceedings of MODELS/UML 2005." } }, { "@position" : "121", "rawText" : { "$" : "[Müller et Simmons, 2002] Müller, A. et Simmons, G. (2002). Exception handling: Common problems and best practice with java 1.4. In Proceedings of Net.ObjectDays'2002." } }, { "@position" : "122", "rawText" : { "$" : "[Nakatani et al., 2001] Nakatani, T., Urai, T., Ohmura, S., et Tamai, T. (2001). A requirements description metamodel for use cases. In Proceedings of the 8th AsiaPacific on Software Engineering Conference (APSEC'01), page 251. IEEE Computer Society." } }, { "@position" : "123", "rawText" : { "$" : "[Narasimhan et Hendradjaya, 2004] Narasimhan, V. L. et Hendradjaya, B. (2004). Component integration metrics. In Proceedings of the International Conference on Software Engineering Research and Practice (SERP'04)." } }, { "@position" : "124", "rawText" : { "$" : "[OMG, 2004] OMG (2004). MOF 2.0 specification. Technical report, Object Management Group." } }, { "@position" : "125", "rawText" : { "$" : "[OMG, 2005] OMG (2005). System modeling language (SysML) specification. Technical report, Object Management Group." } }, { "@position" : "126", "rawText" : { "$" : "[OMG, 2008] OMG (2008). Software Process Engineering Metamodel (SPEM). Technical report, Object Management Group." } }, { "@position" : "127", "rawText" : { "$" : "[Park et Kim, 1993] Park, S. J. et Kim, H. D. (1993). Constraint-based meta-view approach for modeling environmentinitl generation. Decision Support System, 9:325-348." } }, { "@position" : "128", "rawText" : { "$" : "[Paulk et al., 1993] Paulk, M. C., Weber, C. V., Garcia, S. M., Chrissis, M. B., et Bush, M. (1993). Key practices of the capability maturity model. Technical report, Software Engineering Institute." }, "id" : { "@value" : "doi_________::b79853946d0357694299cc8897951665", "@type" : "openaire", "@trustLevel" : "0.62692255" } }, { "@position" : "129", "rawText" : { "$" : "[Pawlak et al., 2006] Pawlak, R., Noguera, C., et Petitprez, N. (2006). Spoon: Program analysis and transformation in java. Technical Report 5901, INRIA." } }, { "@position" : "130", "rawText" : { "$" : "[Poels et Dedene, 2000] Poels, G. et Dedene, G. (2000). Distance-based software measurement: necessary and sufficient properties for software measures. Information and Software Technology, 42(1):35-46." } }, { "@position" : "131", "rawText" : { "$" : "[Reissing, 2001] Reissing, R. (2001). Towards a model for object-oriented design measurement. In ECOOP'01 Workshop QAOOSE." } }, { "@position" : "132", "rawText" : { "$" : "[Revault, 1996] Revault, N. (1996). Principes de méta-modélisation pour l'utilisation de canevas d'applications à objets (MétaGen et les frameworks). PhD thesis, Université P. et M. Curie (Paris 6), Paris, France." } }, { "@position" : "133", "rawText" : { "$" : "[Reynoso et al., 2003] Reynoso, L., Genero, M., et Piattini, M. (2003). Measuring ocl expressions: a \"tracing\"-based approach. In Proceedings of QAOOSE'2003." } }, { "@position" : "134", "rawText" : { "$" : "[Rothenberg, 1989] Rothenberg, J. (1989). The nature of modeling. John Wiley and Sons, Inc." } }, { "@position" : "135", "rawText" : { "$" : "[Seidewitz, 2003] Seidewitz, E. (2003). What models mean. IEEE Softw., 20(5):26- 32." } }, { "@position" : "136", "rawText" : { "$" : "[Selic, 2003] Selic, B. (2003). The pragmatics of model-driven development. IEEE Softw., 20(5):19-25." } }, { "@position" : "137", "rawText" : { "$" : "[Singh et al., 2004] Singh, Y., Sabharwal, S., et Sood, M. (2004). A systematic approach to measure the problem complexity of software requirement specifications of an information system. Information and Management Sciences, 15:69-90." } }, { "@position" : "138", "rawText" : { "$" : "[Smacchia S.A., 2006] Smacchia S.A. (2006). Code query language 1.5 specification. Technical report, Smacchia S.A." } }, { "@position" : "139", "rawText" : { "$" : "[Soley, 2000] Soley, R. (2000). Model driven architecture. Technical report, Object Management Group." } }, { "@position" : "140", "rawText" : { "$" : "[Solheim et al., 2005] Solheim, H., Lillehagen, F., Petersen, S. A., Jorgensen, H., et Anastasiou, M. (2005). Model-driven visual requirements engineering. In Proceedings of the 13th IEEE International Conference on Requirements Engineering (RE'05), pages 421-428." } }, { "@position" : "141", "rawText" : { "$" : "[Spector et Gifford, 1986] Spector, A. et Gifford, D. (1986). A computer science perspective of bridge design. Commun. ACM, 29(4):267-283." } }, { "@position" : "142", "rawText" : { "$" : "[Sztipanovits et Karsai, 1997] Sztipanovits, J. et Karsai, G. (1997). integrated computing. Computer, 30(4):110-111." } }, { "@position" : "143", "rawText" : { "$" : "[Washizaki et al., 2003] Washizaki, H., Yamamoto, H., et Fukazawa, Y. (2003). A metrics suite for measuring reusability of software components. In METRICS '03: Proceedings of the 9th International Symposium on Software Metrics, page 211. IEEE Computer Society." } }, { "@position" : "144", "rawText" : { "$" : "[White, 2000] White, K. P. (2000). Model theory. In McGraw-Hill Encyclopedia of Science and Technology. The McGraw-Hill Companies." } }, { "@position" : "145", "rawText" : { "$" : "[Wohlin, 2007] Wohlin, C. (2007). An analysis of the most cited articles in software engineering journals - 2000. Inf. Softw. Technol., 49(1):2-11." } }, { "@position" : "146", "rawText" : { "$" : "[Yu-ying et al., 2007] Yu-ying, W., Qing-shan, L., Ping, C., et Chun-de, R. (2007). Dynamic fan-in and fan-out metrics for program comprehension. Journal of Shanghai University, 11(5):474-479." }, "id" : { "@value" : "doi_________::c68c9e73a21b933b1eaf577847b2186c", "@type" : "openaire", "@trustLevel" : "0.7521498" } } ] } } ] } } } ] }, "browseResults" : null } }