{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:10:35Z","timestamp":1763467835284},"publisher-location":"Berlin, Heidelberg","reference-count":13,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540403258"},{"type":"electronic","value":"9783540448983"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2003]]},"DOI":"10.1007\/3-540-44898-5_16","type":"book-chapter","created":{"date-parts":[[2007,11,10]],"date-time":"2007-11-10T22:21:25Z","timestamp":1194733285000},"page":"295-315","source":"Crossref","is-referenced-by-count":78,"title":["Z-Ranking: Using Statistical Analysis to Counter the Impact of Static Analysis Approximations"],"prefix":"10.1007","author":[{"given":"Ted","family":"Kremenek","sequence":"first","affiliation":[]},{"given":"Dawson","family":"Engler","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2003,5,13]]},"reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"A. Aiken, M. Faehndrich, and Z. Su. Detecting races in relay ladder logic programs. In Proceedings of the 1st International Conference on Tools and Algorithms for the Construction and Analysis of Systems, April 1998.","DOI":"10.1007\/BFb0054172"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"T. Ball and S.K. Rajamani. Automatically validating temporal safety properties of interfaces. In SPIN 2001 Workshop on Model Checking of Software, May 2001.","DOI":"10.1007\/3-540-45139-0_7"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"A. Chou, J. Yang, B. Chelf, S. Hallem, and D. Engler. An empirical study of operating systems errors. In Proceedings of the Eighteenth ACM Symposium on Operating Systems Principles, 2001.","DOI":"10.1145\/502034.502042"},{"key":"16_CR4","unstructured":"Manuvir Das, Sorin Lerner, and Mark Seigle. Path-sensitive program verification in polynomial time. In Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation, Berlin, Germany, June 2002."},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"D. Engler, B. Chelf, A. Chou, and S. Hallem. Checking system rules using system-specific, programmer-written compiler extensions. In Proceedings of Operating Systems Design and Implementation (OSDI), September 2000.","DOI":"10.21236\/ADA419626"},{"key":"16_CR6","doi-asserted-by":"crossref","unstructured":"D. Evans, J. Guttag, J. Horning, and Y.M. Tan. Lclint: A tool for using specifications to check code. In Proceedings of the ACM SIGSOFT Symposium on the Foundations of Software Engineering, December 1994.","DOI":"10.1145\/193173.195297"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Cormac Flanagan and Stephen N. Freund. Type-based race detection for Java. In SIGPLAN Conference on Programming Language Design and Implementation, pages 219\u2013232, 2000.","DOI":"10.1145\/349299.349328"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"J.S. Foster, T. Terauchi, and Alex Aiken. Flow-sensitive type qualifiers. In Proceedings of the ACM SIGPLAN 2002 Conference on Programming Language Design and Implementation, June 2002.","DOI":"10.1145\/512529.512531"},{"key":"16_CR9","unstructured":"D. Freedman, R. Pisani, and R. Purves. Statistics. W.W. Norton, third edition, 1998."},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"S. Hallem, B. Chelf, Y. Xie, and D. Engler. A system and language for building system-specific, static analyses. In SIGPLAN Conference on Programming Language Design and Implementation, 2002.","DOI":"10.21236\/ADA419593"},{"key":"16_CR11","volume-title":"Probability Models","author":"S. M. Ross","year":"1997","unstructured":"Sheldon M. Ross. Probability Models. Academic Press, London, UK, sixth edition, 1997.","edition":"sixth edition"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Thomas J. Santer and Dianne E. Duffy. The Statistical Analysis of Discrete Data. Springer-Verlag, December 1989.","DOI":"10.1007\/978-1-4612-1017-7"},{"key":"16_CR13","unstructured":"D. Wagner, J. Foster, E. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In 2000 NDSSC, February 2000."}],"container-title":["Lecture Notes in Computer Science","Static Analysis"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/3-540-44898-5_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,5,14]],"date-time":"2023-05-14T13:43:10Z","timestamp":1684071790000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/3-540-44898-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2003]]},"ISBN":["9783540403258","9783540448983"],"references-count":13,"URL":"https:\/\/doi.org\/10.1007\/3-540-44898-5_16","relation":{},"ISSN":["0302-9743"],"issn-type":[{"type":"print","value":"0302-9743"}],"subject":[],"published":{"date-parts":[[2003]]}}}