{"id":"https://openalex.org/W2157322365","doi":"https://doi.org/10.1109/icsm.2015.7332504","title":"Toward improving graftability on automated program repair","display_name":"Toward improving graftability on automated program repair","publication_year":2015,"publication_date":"2015-09-01","ids":{"openalex":"https://openalex.org/W2157322365","doi":"https://doi.org/10.1109/icsm.2015.7332504","mag":"2157322365"},"language":"en","primary_location":{"id":"doi:10.1109/icsm.2015.7332504","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsm.2015.7332504","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Software Maintenance and Evolution (ICSME)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5048637430","display_name":"Soichi Sumi","orcid":null},"institutions":[{"id":"https://openalex.org/I98285908","display_name":"Osaka University","ror":"https://ror.org/035t8zc32","country_code":"JP","type":"education","lineage":["https://openalex.org/I98285908"]}],"countries":["JP"],"is_corresponding":true,"raw_author_name":"Soichi Sumi","raw_affiliation_strings":["Graduate School of Information Science and Technology, Osaka University, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Science and Technology, Osaka University, Japan","institution_ids":["https://openalex.org/I98285908"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5024065727","display_name":"Yoshiki Higo","orcid":"https://orcid.org/0000-0002-8278-8975"},"institutions":[{"id":"https://openalex.org/I98285908","display_name":"Osaka University","ror":"https://ror.org/035t8zc32","country_code":"JP","type":"education","lineage":["https://openalex.org/I98285908"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Yoshiki Higo","raw_affiliation_strings":["Graduate School of Information Science and Technology, Osaka University, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Science and Technology, Osaka University, Japan","institution_ids":["https://openalex.org/I98285908"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5102258973","display_name":"Keisuke Hotta","orcid":null},"institutions":[{"id":"https://openalex.org/I98285908","display_name":"Osaka University","ror":"https://ror.org/035t8zc32","country_code":"JP","type":"education","lineage":["https://openalex.org/I98285908"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Keisuke Hotta","raw_affiliation_strings":["Graduate School of Information Science and Technology, Osaka University, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Science and Technology, Osaka University, Japan","institution_ids":["https://openalex.org/I98285908"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5109843671","display_name":"Shinji Kusumoto","orcid":null},"institutions":[{"id":"https://openalex.org/I98285908","display_name":"Osaka University","ror":"https://ror.org/035t8zc32","country_code":"JP","type":"education","lineage":["https://openalex.org/I98285908"]}],"countries":["JP"],"is_corresponding":false,"raw_author_name":"Shinji Kusumoto","raw_affiliation_strings":["Graduate School of Information Science and Technology, Osaka University, Japan"],"affiliations":[{"raw_affiliation_string":"Graduate School of Information Science and Technology, Osaka University, Japan","institution_ids":["https://openalex.org/I98285908"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":4,"corresponding_author_ids":["https://openalex.org/A5048637430"],"corresponding_institution_ids":["https://openalex.org/I98285908"],"apc_list":null,"apc_paid":null,"fwci":3.3342,"has_fulltext":false,"cited_by_count":8,"citation_normalized_percentile":{"value":0.91948172,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"511","last_page":"515"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9997000098228455,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9987000226974487,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7674770355224609},{"id":"https://openalex.org/keywords/source-lines-of-code","display_name":"Source lines of code","score":0.733768105506897},{"id":"https://openalex.org/keywords/debugging","display_name":"Debugging","score":0.7217069864273071},{"id":"https://openalex.org/keywords/code-reuse","display_name":"Code reuse","score":0.709718644618988},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.658312201499939},{"id":"https://openalex.org/keywords/kpi-driven-code-analysis","display_name":"KPI-driven code analysis","score":0.6559186577796936},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.6295297145843506},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.6289414763450623},{"id":"https://openalex.org/keywords/redundant-code","display_name":"Redundant code","score":0.6244398355484009},{"id":"https://openalex.org/keywords/unreachable-code","display_name":"Unreachable code","score":0.6241953372955322},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.5779918432235718},{"id":"https://openalex.org/keywords/static-program-analysis","display_name":"Static program analysis","score":0.5548716187477112},{"id":"https://openalex.org/keywords/dead-code","display_name":"Dead code","score":0.5493601560592651},{"id":"https://openalex.org/keywords/code-review","display_name":"Code review","score":0.4214492738246918},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.41244903206825256},{"id":"https://openalex.org/keywords/software-bug","display_name":"Software bug","score":0.41104599833488464},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.36788350343704224},{"id":"https://openalex.org/keywords/code-generation","display_name":"Code generation","score":0.35313406586647034},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.3321255147457123},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.3017171621322632},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.11987924575805664},{"id":"https://openalex.org/keywords/key","display_name":"Key (lock)","score":0.10200616717338562},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.10112494230270386}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7674770355224609},{"id":"https://openalex.org/C199519371","wikidata":"https://www.wikidata.org/wiki/Q942695","display_name":"Source lines of code","level":3,"score":0.733768105506897},{"id":"https://openalex.org/C168065819","wikidata":"https://www.wikidata.org/wiki/Q845566","display_name":"Debugging","level":2,"score":0.7217069864273071},{"id":"https://openalex.org/C2778583558","wikidata":"https://www.wikidata.org/wiki/Q771245","display_name":"Code reuse","level":3,"score":0.709718644618988},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.658312201499939},{"id":"https://openalex.org/C121957198","wikidata":"https://www.wikidata.org/wiki/Q14365593","display_name":"KPI-driven code analysis","level":5,"score":0.6559186577796936},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.6295297145843506},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.6289414763450623},{"id":"https://openalex.org/C151578736","wikidata":"https://www.wikidata.org/wiki/Q1251793","display_name":"Redundant code","level":4,"score":0.6244398355484009},{"id":"https://openalex.org/C50951305","wikidata":"https://www.wikidata.org/wiki/Q2482534","display_name":"Unreachable code","level":5,"score":0.6241953372955322},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.5779918432235718},{"id":"https://openalex.org/C137287247","wikidata":"https://www.wikidata.org/wiki/Q1329550","display_name":"Static program analysis","level":4,"score":0.5548716187477112},{"id":"https://openalex.org/C47434764","wikidata":"https://www.wikidata.org/wiki/Q1770035","display_name":"Dead code","level":5,"score":0.5493601560592651},{"id":"https://openalex.org/C150292731","wikidata":"https://www.wikidata.org/wiki/Q1342704","display_name":"Code review","level":5,"score":0.4214492738246918},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.41244903206825256},{"id":"https://openalex.org/C1009929","wikidata":"https://www.wikidata.org/wiki/Q179550","display_name":"Software bug","level":3,"score":0.41104599833488464},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.36788350343704224},{"id":"https://openalex.org/C133162039","wikidata":"https://www.wikidata.org/wiki/Q1061077","display_name":"Code generation","level":3,"score":0.35313406586647034},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.3321255147457123},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.3017171621322632},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.11987924575805664},{"id":"https://openalex.org/C26517878","wikidata":"https://www.wikidata.org/wiki/Q228039","display_name":"Key (lock)","level":2,"score":0.10200616717338562},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.10112494230270386},{"id":"https://openalex.org/C548081761","wikidata":"https://www.wikidata.org/wiki/Q180388","display_name":"Waste management","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1109/icsm.2015.7332504","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icsm.2015.7332504","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2015 IEEE International Conference on Software Maintenance and Evolution (ICSME)","raw_type":"proceedings-article"},{"id":"pmh:oai:CiteSeerX.psu:10.1.1.702.7100","is_oa":false,"landing_page_url":"http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.702.7100","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"http://sdl.ist.osaka-u.ac.jp/%7Ehigo/data/icsme15era-eraid44-p.pdf","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320334764","display_name":"Japan Society for the Promotion of Science","ror":"https://ror.org/00hhkn466"}],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":19,"referenced_works":["https://openalex.org/W1480909796","https://openalex.org/W1998549095","https://openalex.org/W2016027000","https://openalex.org/W2019730517","https://openalex.org/W2025791343","https://openalex.org/W2056830820","https://openalex.org/W2063387237","https://openalex.org/W2076719273","https://openalex.org/W2101819268","https://openalex.org/W2104107939","https://openalex.org/W2130323538","https://openalex.org/W2137444776","https://openalex.org/W2139885493","https://openalex.org/W2142958724","https://openalex.org/W2145124323","https://openalex.org/W4231241365","https://openalex.org/W4244452926","https://openalex.org/W4255632703","https://openalex.org/W4256377773"],"related_works":["https://openalex.org/W2240848044","https://openalex.org/W2242083635","https://openalex.org/W1141223778","https://openalex.org/W790572731","https://openalex.org/W2390085541","https://openalex.org/W1975917686","https://openalex.org/W4252010021","https://openalex.org/W2034209539","https://openalex.org/W1989357464","https://openalex.org/W4240850809"],"abstract_inverted_index":{"In":[0,129,175,219],"software":[1],"evolution,":[2],"many":[3,101,115],"bugs":[4,102,116],"occur":[5],"and":[6,20,193,203],"developers":[7],"spend":[8],"a":[9,18,27,66,77,148],"long":[10],"time":[11],"to":[12,30,60,75,82,131,154,201,217,236],"fix":[13,76],"them.":[14],"Program":[15],"debugging":[16,35],"is":[17,26,80,113,146,161],"costly":[19],"difficult":[21],"task.":[22],"Automated":[23],"program":[24,34],"repair":[25,38],"promising":[28],"way":[29],"reduce":[31],"costs":[32],"on":[33],"dramatically.":[36],"Several":[37],"techniques":[39,105],"reusing":[40,162],"existing":[41,55,89,121],"code":[42,52,59,64,69,73,86,95,118,125,153,156,166,173,199,232,242,246],"lines":[43,53,87,119,200,233],"have":[44],"been":[45],"proposed":[46],"in":[47,56,88,122,230],"the":[48,57,85,94,111,123,127,180,183,191,212,224,240],"past.":[49],"They":[50],"reuse":[51,155],"already":[54],"source":[58,63,68,90,124,152],"generate":[61],"variant":[62],"of":[65,84,110,126,151,165,182,198,243],"given":[67,78,244],"(if":[70],"an":[71],"inserted":[72],"line":[74,96],"bug":[79],"identical":[81],"any":[83],"code,":[91],"we":[92,135,178,188,209,222],"call":[93],"graftable).":[97],"However,":[98],"there":[99],"are":[100,136,169],"that":[103,114,190],"such":[104],"cannot":[106],"automatically":[107],"repair.":[108],"One":[109],"reasons":[112],"require":[117],"not":[120],"software.":[128],"order":[130],"mitigate":[132],"this":[133,176],"issue,":[134],"conducting":[137],"our":[138],"research":[139],"with":[140],"two":[141,184],"ideas.":[142,185],"The":[143,158],"first":[144,192],"idea":[145,160],"using":[147],"large":[149],"dataset":[150],"lines.":[157,167],"second":[159,194,225],"only":[163],"structures":[164],"Vocabularies":[168],"obtained":[170],"from":[171,205,239],"faulty":[172,245],"regions.":[174,247],"paper,":[177],"report":[179],"feasibilities":[181],"More":[186],"concretely,":[187],"found":[189],"ideas":[195],"improved":[196,216],"graftability":[197,214],"43-59%":[202],"56-64%":[204],"34-54%,":[206],"respectively.":[207],"If":[208],"combine":[210],"both":[211],"ideas,":[213],"was":[215],"64-69%.":[218],"cases":[220],"where":[221],"used":[223,229],"idea,":[226],"24-49%":[227],"variables":[228],"reused":[231],"were":[234],"able":[235],"be":[237],"retrieved":[238],"surrounding":[241]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2019,"cited_by_count":1},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2016,"cited_by_count":1}],"updated_date":"2026-04-05T17:49:38.594831","created_date":"2025-10-10T00:00:00"}
