. Oops, SMP 4 last sysfs file: /sys/devices/LNXSYSTM: 00/LNXSYBUS:00 /PNP0C0A: 00/power_supply/BAT1/charge_full 5 Modules linked in: rndis_wlan rndis_host cdc_ether, pp.2-6

A. Inc and . Crashreporter, Automatic bug reporting tool (ABRT), Fedora. [3] Kernel oops tracker (kerneloops), 2008.

R. Abreu, P. Zoeteweij, and A. A. Gemund, An Evaluation of Similarity Coefficients for Software Fault Localization, 2006 12th Pacific Rim International Symposium on Dependable Computing (PRDC'06), pp.39-46, 2006.
DOI : 10.1109/PRDC.2006.18

R. Abreu, P. Zoeteweij, and A. A. Van-gemund, On the Accuracy of Spectrum-based Fault Localization, Testing: Academic and Industrial Conference Practice and Research Techniques, MUTATION (TAICPART-MUTATION 2007), pp.88-99, 2007.
DOI : 10.1109/TAIC.PART.2007.13

]. H. Agrawal, J. Horgan, S. London, and A. W. Wong, Fault localization using execution slices and dataflow tests, Proceedings of Sixth International Symposium on Software Reliability Engineering. ISSRE'95, pp.143-151, 1995.
DOI : 10.1109/ISSRE.1995.497652

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.24.5879

H. Agrawal and J. R. Horgan, Dynamic program slicing, PLDI, White Plains, pp.246-256, 1990.

S. F. Altschul, A protein alignment scoring system sensitive at all evolutionary distances, Journal of Molecular Evolution, vol.2, issue.3, pp.290-300, 1993.
DOI : 10.1007/BF00160485

A. Arapov, Kernel oops repository, 2012.

L. Aversano, L. Cerulo, A. M. Di, and . Penta, How Clones are Maintained: An Empirical Study, 11th European Conference on Software Maintenance and Reengineering (CSMR'07), pp.81-90, 2007.
DOI : 10.1109/CSMR.2007.26

A. Avizienis, J. Laprie, B. Randell, and A. C. Landwehr, Basic concepts and taxonomy of dependable and secure computing, IEEE Transactions on Dependable and Secure Computing, vol.1, issue.1, pp.11-33, 2004.
DOI : 10.1109/TDSC.2004.2

B. S. Baker, A program for identifying duplicated code, Computer Science and Statistics: Proc. Symp. on the Interface, pp.49-57, 1992.

T. Ball and S. G. Eick, Software visualization in the large, Computer, vol.29, issue.4, pp.29-33, 1996.
DOI : 10.1109/2.488299

T. S. Ball and . Horwitz, Slicing programs with arbitrary control-flow, 1ST CON- FERENCE ON AUTOMATED ALGORITHMIC DEBUGGING, pp.206-222, 1993.
DOI : 10.1007/BFb0019410

T. Ball and J. R. Larus, Efficient path profiling, Proceedings of the 29th Annual IEEE/ACM International Symposium on Microarchitecture. MICRO 29, pp.46-57, 1996.
DOI : 10.1109/MICRO.1996.566449

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.7451

H. A. Basit, S. J. Puglisi, W. F. Smyth, A. Turpin, and A. S. Jarzabek, Efficient token based clone detection with flexible tokenization, The 6th Joint Meeting on European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering: Companion Papers, ESEC-FSE, pp.513-516, 2007.

I. D. Baxter, C. Pidgeon, and A. M. Mehlich, DMS, Proceedings of the international workshop on Principles of software evolution , IWPSE '02, pp.625-634, 2004.
DOI : 10.1145/512035.512047

I. D. Baxter, A. Yahin, L. Moura, M. Sant-'anna, and A. L. Bier, Clone detection using abstract syntax trees, Proceedings. International Conference on Software Maintenance (Cat. No. 98CB36272), p.368, 1998.
DOI : 10.1109/ICSM.1998.738528

B. Beizer, Software Testing Techniques, International Thomson Computer press, 2002.

S. Bellon, R. Koschke, G. Antoniol, J. Krinke, and A. E. Merlo, Comparison and evaluation of clone detection tools, Software Engineering, IEEE Transactions on, vol.33, pp.577-591, 2007.

J. A. Bergeretti-and-b and . Carré, Information-flow and data-flow analysis of while-programs, ACM Transactions on Programming Languages and Systems, vol.7, issue.1, pp.37-61, 1985.
DOI : 10.1145/2363.2366

C. Cadar, D. Dunbar, A. D. Engler, and K. , Unassisted and automatic generation of high-coverage tests for complex systems programs, Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation, OSDI, pp.209-224, 2008.

M. Y. Chen, E. Kiciman, E. Fratkin, A. Fox, and A. E. Brewer, Pinpoint: problem determination in large, dynamic Internet services, Proceedings International Conference on Dependable Systems and Networks, pp.595-604, 2002.
DOI : 10.1109/DSN.2002.1029005

J. Choi-and-j and . Ferrante, Static slicing in the presence of goto statements, ACM Transactions on Programming Languages and Systems, vol.16, issue.4, pp.1097-1113, 1994.
DOI : 10.1145/183432.183438

A. Chou, J. Yang, B. Chelf, S. Hallem, and A. D. Engler, An empirical study of operating systems errors, SOSP, pp.73-88, 2001.

J. Corbet, G. Kroah-hartman, and A. A. Mcpherson, Linux Kernel Development: How Fast it is Going, Who is Doing It, What They are Doing, and Who is Sponsoring It, The Linux Foundation, 2012.

F. J. Damerau, A technique for computer detection and correction of spelling errors, Communications of the ACM, vol.7, issue.3, pp.171-176, 1964.
DOI : 10.1145/363958.363994

Y. Dang, R. Wu, H. Zhang, D. Zhang, and A. P. Nobel, ReBucket: A method for clustering duplicate crash reports based on call stack similarity, 2012 34th International Conference on Software Engineering (ICSE), pp.1084-1093, 2012.
DOI : 10.1109/ICSE.2012.6227111

M. Datar, N. Immorlica, P. Indyk, and A. V. Mirrokni, Locality-sensitive hashing scheme based on p-stable distributions, Proceedings of the twentieth annual symposium on Computational geometry , SCG '04, pp.253-262, 2004.
DOI : 10.1145/997817.997857

Y. David and E. Yahav, Tracelet-based code search in executables, PLDI, pp.349-360, 2014.

R. A. Demillo, H. Pan, and A. E. Spafford, Failure and fault analysis for software debugging, Proceedings Twenty-First Annual International Computer Software and Applications Conference (COMPSAC'97), pp.515-521, 1997.
DOI : 10.1109/CMPSAC.1997.625061

T. F. Smith and M. S. Waterman, Identification of common molecular subsequences, Journal of Molecular Biology, vol.147, issue.1, pp.195-197, 1981.
DOI : 10.1016/0022-2836(81)90087-5

J. Ferrante, K. J. Ottenstein, and A. J. Warren, The program dependence graph and its use in optimization, ACM Transactions on Programming Languages and Systems, vol.9, issue.3, pp.319-349, 1987.
DOI : 10.1145/24039.24041

M. Gabel, J. Yang, Y. Yu, M. Goldszmidt, and A. Z. Su, Scalable and systematic detection of buggy inconsistencies in source code, Proceedings of the ACM International Conference on Object Oriented Programming Systems Languages and Applications, pp.175-190, 2010.

V. Ganesh and D. L. Dill, A Decision Procedure for Bit-Vectors and Arrays, Proceedings of the 19th International Conference on Computer Aided Verification, CAV, pp.519-531, 2007.
DOI : 10.1007/978-3-540-73368-3_52

A. Gionis, P. Indyk, and A. R. Motwani, Similarity search in high dimensions via hashing, Proceedings of the 25th International Conference on Very Large Data Bases, VLDB, pp.518-529, 1999.

K. Glerum, K. Kinshumann, S. Greenberg, G. Aul, V. Orgovan et al., Debugging in the (very) large, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP '09, pp.103-116, 2009.
DOI : 10.1145/1629575.1629586

T. Gregory, The economic impacts of inadequate infrastructure for software testing, 2002.

W. Gu, Z. Kalbarczyk, K. Ravishankar, and A. Z. Yang, Characterization of Linux kernel behavior under errors, pp.459-468, 2003.

L. Guo, J. Lawall, and A. G. Muller, Oops! where did that code snippet come from?, Proceedings of the 11th Working Conference on Mining Software Repositories, MSR 2014, pp.52-61, 2014.
DOI : 10.1145/2597073.2597094

URL : https://hal.archives-ouvertes.fr/hal-01080397

D. Gusfield, Algorithms on Strings, Trees, and Sequences, pp.89-180, 1997.
DOI : 10.1017/CBO9780511574931

R. W. Hamming, Error Detecting and Error Correcting Codes, Bell System Technical Journal, vol.29, issue.2, pp.147-160, 1950.
DOI : 10.1002/j.1538-7305.1950.tb00463.x

URL : http://campus.unibo.it/10913/1/hamming1950.pdf

S. Han, Y. Dang, S. Ge, D. Zhang, and A. T. Xie, Performance debugging in the large via mining millions of stack traces, 2012 34th International Conference on Software Engineering (ICSE), pp.145-155, 2012.
DOI : 10.1109/ICSE.2012.6227198

M. J. Harrold, G. Rothermel, R. Wu, and A. L. Yi, An empirical investigation of program spectra, Proceedings of the 1998 ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, PASTE '98, pp.83-90, 1998.

A. Hemel, The GPL compliance engineering guide, 2008.

A. Hemel, K. T. Kalleberg, R. Vermaas, and A. E. Dolstra, Finding software license violations through binary code clone detection, Proceeding of the 8th working conference on Mining software repositories, MSR '11, pp.63-72, 2011.
DOI : 10.1145/1985441.1985453

D. S. Hirschberg, A linear space algorithm for computing maximal common subsequences, Communications of the ACM, vol.18, issue.6, pp.341-343, 1975.
DOI : 10.1145/360825.360861

S. Horwitz, T. Reps, and A. D. Binkley, Interprocedural slicing using dependence graphs, Proceedings of the ACM SIGPLAN 1988 Conference on Programming Language Design and Implementation, PLDI, pp.35-46, 1988.
DOI : 10.1145/989393.989419

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.50.4405

D. R. Hower and M. D. Hill, Rerun: Exploiting Episodes for Lightweight Memory Race Recording, 2008 International Symposium on Computer Architecture, pp.265-276, 2008.
DOI : 10.1109/ISCA.2008.26

J. Huang, P. Liu, and A. C. Zhang, LEAP: lightweight deterministic multi-processor replay of concurrent java programs, SIGSOFT FSE, pp.207-216, 2010.

J. Huang, C. Zhang, and A. J. Dolby, CLAP: Recording local executions to reproduce concurrency failures, Proceedings of the 34th ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI, pp.141-152

M. Hutchins, H. Foster, T. Goradia, and A. T. Ostrand, Experiments of the effectiveness of dataflow-and controlflow-based test adequacy criteria, Proceedings of the 16th International Conference on Software Engineering, ICSE, pp.191-200, 1994.

D. Jeffrey, N. Gupta, and A. R. Gupta, Fault localization using value replacement, Proceedings of the 2008 international symposium on Software testing and analysis, ISSTA '08, pp.167-178, 2008.
DOI : 10.1145/1390630.1390652

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.156.9916

L. Jiang, G. Misherghi, Z. Su, A. S. Glondu, and . Deckard, DECKARD: Scalable and Accurate Tree-Based Detection of Code Clones, 29th International Conference on Software Engineering (ICSE'07), pp.96-105, 2007.
DOI : 10.1109/ICSE.2007.30

J. H. Johnson, Substring matching for clone detection and change tracking, Proceedings International Conference on Software Maintenance ICSM-94, pp.120-126, 1994.
DOI : 10.1109/ICSM.1994.336783

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.1216

J. A. Jones, M. J. Harrold, and A. J. Stasko, Visualization of test information to assist fault localization, Proceedings of the 24th international conference on Software engineering , ICSE '02, pp.467-477, 2002.
DOI : 10.1145/581396.581397

E. Juergens, F. Deissenboeck, B. Hummel, and A. S. Wagner, Do code clones matter?, 2009 IEEE 31st International Conference on Software Engineering, pp.485-495, 2009.
DOI : 10.1109/ICSE.2009.5070547

T. Kamiya, S. Kusumoto, and A. K. Inoue, CCFinder: a multilinguistic token-based code clone detection system for large scale source code, IEEE Transactions on Software Engineering, vol.28, issue.7, pp.654-670, 2002.
DOI : 10.1109/TSE.2002.1019480

S. Karlin and S. F. Altschul, Methods for assessing the statistical significance of molecular sequence features by using general scoring schemes., Proceedings of the National Academy of Science, pp.2264-2268, 1990.
DOI : 10.1073/pnas.87.6.2264

M. Kerrisk, Kernel submit: Improving tracing and debugging, 2012. https://lwn.net/Articles, 514898.

W. M. Khoo, A. Mycroft, and A. R. Anderson, Rendezvous: A search engine for binary code, 2013 10th Working Conference on Mining Software Repositories (MSR), pp.329-338
DOI : 10.1109/MSR.2013.6624046

M. Kim, V. Sazawal, D. Notkin, and A. G. Murphy, An empirical study of code clone genealogies, Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, ESEC/FSE-13, pp.187-196, 2005.

R. S. Komondoor and . Horwitz, Semantics-preserving procedure extraction, Proceedings of the 27th ACM SIGPLAN-SIGACT symposium on Principles of programming languages , POPL '00, pp.155-169, 2000.
DOI : 10.1145/325694.325713

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.4383

C. Kruegel, E. Kirda, D. Mutz, W. Robertson, and A. G. Vigna, Polymorphic Worm Detection Using Structural Information of Executables, Proceedings of the 8th International Conference on Recent Advances in Intrusion Detection, RAID, pp.207-226, 2006.
DOI : 10.1007/11663812_11

B. Lagüe, D. Proulx, J. Mayrand, E. M. Merlo, and A. J. Hudepohl, Assessing the benefits of incorporating function clone detection in a development process, Proceedings International Conference on Software Maintenance, p.314, 1997.
DOI : 10.1109/ICSM.1997.624264

C. Lattner-and-v and . Adve, LLVM: A compilation framework for lifelong program analysis & transformation, International Symposium on Code Generation and Optimization, 2004. CGO 2004., p.75, 2004.
DOI : 10.1109/CGO.2004.1281665

D. Lee, P. M. Chen, J. Flinn, and A. S. Narayanasamy, Chimera: hybrid program analysis for determinism, PLDI, pp.463-474, 2012.

D. Lee, M. Said, S. Narayanasamy, and A. Z. Yang, Offline symbolic analysis to infer Total Store Order, 2011 IEEE 17th International Symposium on High Performance Computer Architecture, pp.357-358, 2011.
DOI : 10.1109/HPCA.2011.5749743

D. Lee, M. Said, S. Narayanasamy, Z. Yang, and A. C. Pereira, Offline symbolic analysis for multi-processor execution replay, Proceedings of the 42nd Annual IEEE/ACM International Symposium on Microarchitecture, Micro-42, pp.564-575, 2009.
DOI : 10.1145/1669112.1669182

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.163.7553

V. I. Levenshtein, Binary codes capable of correcting deletions, insertions, and reversals, Soviet Physics Doklady, pp.707-710, 1966.

J. Li, M. D. Ernst, and C. , CBCD: Cloned buggy code detector, 2012 34th International Conference on Software Engineering (ICSE), pp.310-320, 2012.
DOI : 10.1109/ICSE.2012.6227183

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.228.1980

Z. Li, S. Lu, S. Myagmar, A. Y. Zhou, and . Cp-miner, A tool for finding copy-paste and related bugs in operating system code, Proceedings of the 6th Conference on Symposium on Opearting Systems Design & Implementation, pp.20-20, 2004.

B. Liblit, A. Aiken, A. X. Zheng, and A. M. Jordan, Bug isolation via remote program sampling, Proceedings of the ACM SIGPLAN 2003 Conference on Programming Language Design and Implementation, PLDI, pp.141-154, 2003.

B. Liblit, M. Naik, A. X. Zheng, A. Aiken, and A. M. Jordan, Scalable statistical bug isolation, Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI, pp.15-26, 2005.

C. Liu, C. Chen, J. Han, and A. P. Yu, Detection of software plagiarism by program dependence graph analysis, Proceedings of the 12th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, pp.872-881, 2006.

C. Liu, X. Yan, L. Fei, J. Han, and A. S. Midkiff, Sober: Statistical model-based bug localization, Proceedings of the 10th European Software Engineering Conference Held Jointly with 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering, ESEC/FSE-13, pp.286-295, 2005.

S. Livieri, Y. Higo, M. Matushita, and A. K. Inoue, Very-Large Scale Code Clone Analysis and Visualization of Open Source Programs Using Distributed CCFinder: D-CCFinder, 29th International Conference on Software Engineering (ICSE'07), pp.106-115, 2007.
DOI : 10.1109/ICSE.2007.97

D. Lo-and-s.-c and . Khoo, SMArTIC: Towards building an accurate, robust and scalable specification miner, FSE, pp.265-275, 2006.

L. , D. Lo, L. Jiang, and A. A. Budi, Comprehensive evaluation of association measures for fault localization, 2010 IEEE International Conference on Software Maintenance (ICSM), pp.1-10, 2010.

A. Marcus and J. I. Maletic, Identification of high-level concept clones in source code, Proceedings 16th Annual International Conference on Automated Software Engineering (ASE 2001), p.107, 2001.
DOI : 10.1109/ASE.2001.989796

J. Mayrand, C. Leblanc, and A. E. Merlo, Experiment on the automatic detection of function clones in a software system using metrics, Proceedings of International Conference on Software Maintenance ICSM-96, p.244, 1996.
DOI : 10.1109/ICSM.1996.565012

E. M. Mccreight, A Space-Economical Suffix Tree Construction Algorithm, Journal of the ACM, vol.23, issue.2, pp.262-272, 1976.
DOI : 10.1145/321941.321946

A. A. Meyer, A. A. Garcia, A. P. Souza, and A. C. Souza-jr, Comparison of similarity coefficients used for cluster analysis with dominant markers in maize (Zea mays L), Genetics and Molecular Biology, vol.27, issue.1, pp.27-83, 2004.
DOI : 10.1590/S1415-47572004000100014

P. Montesinos, L. Ceze, A. J. Torrellas, and . Delorean, Recording and deterministically replaying shared-memory multiprocessor execution efficiently, Proceedings of the 35th Annual International Symposium on Computer Architecture, pp.289-300, 2008.
DOI : 10.1109/isca.2008.36

G. Muller, J. L. Lawall, and A. H. Duchesne, A framework for simplifying the development of kernel schedulers: Design and performance evaluation, HASE, pp.56-65, 2005.
URL : https://hal.archives-ouvertes.fr/hal-00457121

G. Myles, C. Collberg, S. Sac, and . Fe, K-gram based software birthmarks, Proceedings of the 2005 ACM symposium on Applied computing , SAC '05, pp.314-318, 2005.
DOI : 10.1145/1066677.1066753

S. B. Needleman and C. D. Wunsch, A general method applicable to the search for similarities in the amino acid sequence of two proteins, Journal of Molecular Biology, pp.48-443, 1970.

K. J. Ottenstein and L. M. Ottenstein, The program dependence graph in a software development environment, Proceedings of the First ACM SIGSOFT/SIGPLAN Software Engineering Symposium on Practical Software Development Environments, SDE 1, pp.177-184, 1984.

Y. Padioleau, J. Lawall, R. R. Hansen, and A. G. Muller, Documenting and automating collateral evolutions in Linux device drivers, EuroSys, pp.247-260, 2008.
DOI : 10.1145/1352592.1352618

URL : https://hal.archives-ouvertes.fr/inria-00123142

S. Park, Y. Zhou, W. Xiong, Z. Yin, R. Kaushik et al., PRES, Proceedings of the ACM SIGOPS 22nd symposium on Operating systems principles, SOSP '09, pp.177-192, 2009.
DOI : 10.1145/1629575.1629593

L. Prechelt, G. Malpohl, and A. M. Phlippsen, Finding plagiarisms among a set of programs with JPLAG, J. of Universal Computer Science, 2002.

R. R. Sokal and F. J. Rohlf, Biometry: The Principles and Practices of Statistics in Biological, 1994.

M. K. Ramanathan, A. Grama, and A. S. Jagannathan, Sieve: A Tool for Automatically Detecting Variations Across Program Versions, 21st IEEE/ACM International Conference on Automated Software Engineering (ASE'06), pp.241-252, 2006.
DOI : 10.1109/ASE.2006.61

M. K. Ramanathan, S. Jagannathan, and A. A. Grama, Trace-based memory aliasing across program versions, in FASE, pp.381-395, 2006.

T. Reps, T. Ball, M. Das, and A. J. Larus, The use of program profiling for software maintenance with applications to the year 2000 problem, Proceedings of the 6th European SOFTWARE ENGINEERING Conference Held Jointly with the 5th ACM SIGSOFT International Symposium on Foundations of Software Engineering, ESEC'97, pp.432-449, 1997.

T. Reps, S. Horwitz, M. Sagiv, and A. G. Rosay, Speeding up slicing, Proceedings of the 2Nd ACM SIGSOFT Symposium on Foundations of Software Engineering, pp.11-20, 1994.
DOI : 10.1145/193173.195287

J. Rössler, A. Zeller, G. Fraser, C. Zamfir, and A. G. Candea, Reconstructing Core Dumps, 2013 IEEE Sixth International Conference on Software Testing, Verification and Validation, 2013.
DOI : 10.1109/ICST.2013.18

C. K. Roy and J. R. Cordy, An Empirical Study of Function Clones in Open Source Software, 2008 15th Working Conference on Reverse Engineering, pp.81-90, 2008.
DOI : 10.1109/WCRE.2008.54

C. K. Roy, J. R. Cordy, and A. R. Koschke, Comparison and evaluation of code clone detection techniques and tools: A qualitative approach, Science of Computer Programming, vol.74, issue.7, pp.470-495, 2009.
DOI : 10.1016/j.scico.2009.02.007

W. L. Ruzzo-and-m and . Tompa, A linear time algorithm for finding all maximal scoring subsequences, Proceedings of the Seventh International Conference on Intelligent Systems for Molecular Biology, pp.234-241, 1999.

A. Saebjørnsen, J. Willcock, T. Panas, D. Quinlan, and A. Z. Su, Detecting code clones in binary executables, Proceedings of the eighteenth international symposium on Software testing and analysis, ISSTA '09, pp.117-128, 2009.
DOI : 10.1145/1572272.1572287

S. Saha, J. Lozi, G. Thomas, J. L. Lawall, A. G. Muller et al., Hector: Detecting Resource-Release Omission Faults in error-handling code for systems software, 2013 43rd Annual IEEE/IFIP International Conference on Dependable Systems and Networks (DSN), 2013.
DOI : 10.1109/DSN.2013.6575307

URL : https://hal.archives-ouvertes.fr/hal-00918079

S. Schleimer, D. S. Wilkerson, and A. A. Aiken, Winnowing, Proceedings of the 2003 ACM SIGMOD international conference on on Management of data , SIGMOD '03, pp.76-85, 2003.
DOI : 10.1145/872757.872770

R. Tartler, D. Lohmann, J. Sincero, and A. W. Schröder-preikschat, Feature consistency in compile-time-configurable system software, Proceedings of the sixth conference on Computer systems, EuroSys '11, 2011.
DOI : 10.1145/1966445.1966451

F. Tip, A survey of program slicing techniques, Journal of programming languages, vol.3, pp.121-189, 1995.

M. Tompa, Lecture notes on biological sequence analysis, 2000.

E. Torlak, M. Vaziri, A. J. Dolby, and M. , Checking axiomatic specifications of memory models, Proceedings of the 2010 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI, pp.341-350, 2010.

Y. Ueda, T. Kamiya, S. Kusumoto, and A. K. Inoue, On detection of gapped code clones using gap locations, Ninth Asia-Pacific Software Engineering Conference, 2002., pp.327-336, 2002.
DOI : 10.1109/APSEC.2002.1183002

A. Van-de and . Ven, Top 10 kernel oopses for the week ending january 5th, 2008.

K. Veeraraghavan, D. Lee, B. Wester, J. Ouyang, P. M. Chen et al., DoublePlay: parallelizing sequential logging and replay, ASP- LOS, pp.15-26, 2011.

V. Wahler, D. Seipel, J. W. Gudenberg, and A. G. Fischer, Clone detection in source code by frequent itemset techniques, Source Code Analysis and Manipulation, Fourth IEEE International Workshop on, pp.128-135, 2004.
DOI : 10.1109/SCAM.2004.6

D. Weeratunge, X. Zhang, and A. S. Jagannathan, Analyzing multicore dumps to facilitate concurrency bug reproduction, ASPLOS, pp.155-166, 2010.

P. Weiner, Linear pattern matching algorithms, 14th Annual Symposium on Switching and Automata Theory (swat 1973), pp.1-11, 1973.
DOI : 10.1109/SWAT.1973.13

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.474.9582

M. Weiser, Program Slicing, Proceedings of the 5th international conference on Software engineering, ICSE, pp.439-449, 1981.
DOI : 10.1109/TSE.1984.5010248

W. E. Wong and V. Debroy, A Survey on Software Fault Localization, IEEE Transactions on Software Engineering, vol.42, issue.8, 2009.
DOI : 10.1109/TSE.2016.2521368

T. Yoshimura, H. Yamada, and A. K. Kono, Is Linux kernel oops useful or not?, in HotDep, 2012.

C. Zamfir-and-g and . Candea, Execution synthesis, Proceedings of the 5th European conference on Computer systems, EuroSys '10, pp.321-334, 2010.
DOI : 10.1145/1755913.1755946

X. Zhang and R. Gupta, Cost effective dynamic program slicing, Proceedings of the ACM SIGPLAN 2004 Conference on Programming Language Design and Implementation, pp.94-106, 2004.
DOI : 10.1145/996841.996855

URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.2.6378

X. Zhang, R. Gupta, and A. Y. Zhang, Precise dynamic slicing algorithms, Proceedings of the 25th International Conference on Software Engineering, ICSE, pp.319-329, 2003.

X. Zhang, H. He, N. Gupta, and A. R. Gupta, Experimental evaluation of using dynamic slices for fault location, Proceedings of the Sixth sixth international symposium on Automated analysis-driven debugging , AADEBUG'05, pp.33-42, 2005.
DOI : 10.1145/1085130.1085135

J. Zhou, X. Xiao, and A. C. Zhang, Stride: Search-based deterministic replay in polynomial time via bounded linkage, 2012 34th International Conference on Software Engineering (ICSE), pp.892-902, 2012.
DOI : 10.1109/ICSE.2012.6227130