{"id":"https://openalex.org/W7117135895","doi":"https://doi.org/10.1145/3756681.3757025","title":"An Anatomy of 488 Faults from Defects4J Based on the Control- and Data-Flow Graph Representations of Programs","display_name":"An Anatomy of 488 Faults from Defects4J Based on the Control- and Data-Flow Graph Representations of Programs","publication_year":2025,"publication_date":"2025-06-17","ids":{"openalex":"https://openalex.org/W7117135895","doi":"https://doi.org/10.1145/3756681.3757025"},"language":null,"primary_location":{"id":"doi:10.1145/3756681.3757025","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3756681.3757025","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th International Conference on Evaluation and Assessment in Software Engineering","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":true,"oa_status":"gold","oa_url":"https://doi.org/10.1145/3756681.3757025","any_repository_has_fulltext":null},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5121240951","display_name":"Alexandra van der Spuy","orcid":null},"institutions":[{"id":"https://openalex.org/I26092322","display_name":"Stellenbosch University","ror":"https://ror.org/05bk57929","country_code":"ZA","type":"education","lineage":["https://openalex.org/I26092322"]}],"countries":["ZA"],"is_corresponding":true,"raw_author_name":"Alexandra van der Spuy","raw_affiliation_strings":["Stellenbosch University, Stellenbosch, Western Cape, South Africa"],"raw_orcid":"https://orcid.org/0009-0005-8297-7062","affiliations":[{"raw_affiliation_string":"Stellenbosch University, Stellenbosch, Western Cape, South Africa","institution_ids":["https://openalex.org/I26092322"]}]},{"author_position":"last","author":{"id":null,"display_name":"Bernd Fischer","orcid":"https://orcid.org/0000-0002-1815-218X"},"institutions":[{"id":"https://openalex.org/I26092322","display_name":"Stellenbosch University","ror":"https://ror.org/05bk57929","country_code":"ZA","type":"education","lineage":["https://openalex.org/I26092322"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Bernd Fischer","raw_affiliation_strings":["Stellenbosch University, Stellenbosch, Western Cape, South Africa"],"raw_orcid":"https://orcid.org/0000-0002-1815-218X","affiliations":[{"raw_affiliation_string":"Stellenbosch University, Stellenbosch, Western Cape, South Africa","institution_ids":["https://openalex.org/I26092322"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5121240951"],"corresponding_institution_ids":["https://openalex.org/I26092322"],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":0,"citation_normalized_percentile":{"value":0.66720746,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":null,"biblio":{"volume":null,"issue":null,"first_page":"622","last_page":"627"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.7749999761581421,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.7749999761581421,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.0738999992609024,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.05939999967813492,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/fault","display_name":"Fault (geology)","score":0.5874000191688538},{"id":"https://openalex.org/keywords/scheme","display_name":"Scheme (mathematics)","score":0.5440000295639038},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4738999903202057},{"id":"https://openalex.org/keywords/graph","display_name":"Graph","score":0.46720001101493835},{"id":"https://openalex.org/keywords/fault-model","display_name":"Fault model","score":0.44859999418258667},{"id":"https://openalex.org/keywords/classification-scheme","display_name":"Classification scheme","score":0.427700012922287},{"id":"https://openalex.org/keywords/class","display_name":"Class (philosophy)","score":0.41269999742507935}],"concepts":[{"id":"https://openalex.org/C175551986","wikidata":"https://www.wikidata.org/wiki/Q47089","display_name":"Fault (geology)","level":2,"score":0.5874000191688538},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5547000169754028},{"id":"https://openalex.org/C77618280","wikidata":"https://www.wikidata.org/wiki/Q1155772","display_name":"Scheme (mathematics)","level":2,"score":0.5440000295639038},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4738999903202057},{"id":"https://openalex.org/C132525143","wikidata":"https://www.wikidata.org/wiki/Q141488","display_name":"Graph","level":2,"score":0.46720001101493835},{"id":"https://openalex.org/C167391956","wikidata":"https://www.wikidata.org/wiki/Q1401211","display_name":"Fault model","level":3,"score":0.44859999418258667},{"id":"https://openalex.org/C13460635","wikidata":"https://www.wikidata.org/wiki/Q85753676","display_name":"Classification scheme","level":2,"score":0.427700012922287},{"id":"https://openalex.org/C2777212361","wikidata":"https://www.wikidata.org/wiki/Q5127848","display_name":"Class (philosophy)","level":2,"score":0.41269999742507935},{"id":"https://openalex.org/C50712370","wikidata":"https://www.wikidata.org/wiki/Q4269346","display_name":"Software fault tolerance","level":3,"score":0.4090999960899353},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.3955000042915344},{"id":"https://openalex.org/C126953365","wikidata":"https://www.wikidata.org/wiki/Q5438152","display_name":"Fault coverage","level":3,"score":0.34459999203681946},{"id":"https://openalex.org/C21267803","wikidata":"https://www.wikidata.org/wiki/Q5438159","display_name":"Fault indicator","level":4,"score":0.3377000093460083},{"id":"https://openalex.org/C13625343","wikidata":"https://www.wikidata.org/wiki/Q7627418","display_name":"Stuck-at fault","level":4,"score":0.3305000066757202},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3255999982357025},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.28700000047683716},{"id":"https://openalex.org/C152745839","wikidata":"https://www.wikidata.org/wiki/Q5438153","display_name":"Fault detection and isolation","level":3,"score":0.26829999685287476},{"id":"https://openalex.org/C146380142","wikidata":"https://www.wikidata.org/wiki/Q1137726","display_name":"Directed graph","level":2,"score":0.2628999948501587},{"id":"https://openalex.org/C153180895","wikidata":"https://www.wikidata.org/wiki/Q7148389","display_name":"Pattern recognition (psychology)","level":2,"score":0.2605000138282776}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145/3756681.3757025","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3756681.3757025","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th International Conference on Evaluation and Assessment in Software Engineering","raw_type":"proceedings-article"}],"best_oa_location":{"id":"doi:10.1145/3756681.3757025","is_oa":true,"landing_page_url":"https://doi.org/10.1145/3756681.3757025","pdf_url":null,"source":null,"license":"cc-by","license_id":"https://openalex.org/licenses/cc-by","version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 29th International Conference on Evaluation and Assessment in Software Engineering","raw_type":"proceedings-article"},"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":17,"referenced_works":["https://openalex.org/W1997964410","https://openalex.org/W2000026907","https://openalex.org/W2062660493","https://openalex.org/W2127637733","https://openalex.org/W2132840411","https://openalex.org/W2143178836","https://openalex.org/W2147699889","https://openalex.org/W2149321161","https://openalex.org/W2156723666","https://openalex.org/W2620081107","https://openalex.org/W2784445699","https://openalex.org/W2922320079","https://openalex.org/W2981124473","https://openalex.org/W3014450283","https://openalex.org/W3090643686","https://openalex.org/W3105943882","https://openalex.org/W4403864949"],"related_works":[],"abstract_inverted_index":{"Software":[0],"fault":[1,10,47,68,108,131,141,149,158],"datasets":[2,142],"such":[3],"as":[4,26],"Defects4J":[5,83],"provide":[6],"for":[7,156],"each":[8],"individual":[9,116],"its":[11],"location":[12],"and":[13,54,65,97,143,151],"repair,":[14],"but":[15,28,118],"do":[16,30],"not":[17,31],"characterize":[18],"the":[19,24,33,37,52,82,88,91,106,113,120],"faults.":[20],"Current":[21],"classifications":[22],"use":[23],"repairs":[25],"proxies,":[27],"these":[29],"capture":[32],"intrinsic":[34],"nature":[35],"of":[36,58,90,105,122],"fault.":[38],"In":[39],"this":[40,73],"paper,":[41],"we":[42],"propose":[43],"a":[44],"new,":[45],"direct":[46],"classification":[48,135],"scheme":[49,61,74],"based":[50],"on":[51],"control-":[53],"data-flow":[55,67,107],"graph":[56],"representations":[57],"programs.":[59],"Our":[60,133],"comprises":[62],"six":[63],"control-flow":[64,130],"two":[66],"classes.":[69,99,159],"We":[70,85,100],"manually":[71],"apply":[72],"to":[75,139,147],"488":[76],"faults":[77,92,123],"from":[78],"seven":[79],"projects":[80],"in":[81],"dataset.":[84],"find":[86,102],"that":[87,103,119],"majority":[89,121],"are":[93,124],"assigned":[94],"between":[95],"one":[96,104,129],"three":[98],"also":[101],"classes":[109],"(definition":[110],"fault)":[111],"is":[112],"most":[114],"common":[115],"class":[117],"classified":[125],"with":[126],"at":[127],"least":[128],"class.":[132],"proposed":[134],"can":[136,144],"be":[137,145],"applied":[138],"other":[140],"used":[146],"improve":[148],"localization":[150],"automated":[152],"program":[153],"repair":[154],"techniques":[155],"specific":[157]},"counts_by_year":[],"updated_date":"2026-03-27T05:58:40.876381","created_date":"2025-12-24T00:00:00"}
