{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,10]],"date-time":"2025-10-10T12:59:44Z","timestamp":1760101184491,"version":"3.40.3"},"publisher-location":"Cham","reference-count":28,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030312794"},{"type":"electronic","value":"9783030312800"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-31280-0_2","type":"book-chapter","created":{"date-parts":[[2019,10,7]],"date-time":"2019-10-07T23:06:50Z","timestamp":1570489610000},"page":"22-40","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Regular Expression Learning with Evolutionary Testing and Repair"],"prefix":"10.1007","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-6253-4062","authenticated-orcid":false,"given":"Paolo","family":"Arcaini","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4035-0131","authenticated-orcid":false,"given":"Angelo","family":"Gargantini","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1400-1026","authenticated-orcid":false,"given":"Elvinia","family":"Riccobene","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,10,8]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"74","DOI":"10.1007\/978-3-319-96562-8_3","volume-title":"Machine Learning for Dynamic Software Analysis: Potentials and Limits","author":"BK Aichernig","year":"2018","unstructured":"Aichernig, B.K., Mostowski, W., Mousavi, M.R., Tappler, M., Taromirad, M.: Model learning and model-based testing. In: Bennaceur, A., H\u00e4hnle, R., Meinke, K. (eds.) Machine Learning for Dynamic Software Analysis: Potentials and Limits. LNCS, vol. 11026, pp. 74\u2013100. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96562-8_3"},{"issue":"2","key":"2_CR2","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/0890-5401(87)90052-6","volume":"75","author":"D Angluin","year":"1987","unstructured":"Angluin, D.: Learning regular sets from queries and counterexamples. Inf. Comput. 75(2), 87\u2013106 (1987). https:\/\/doi.org\/10.1016\/0890-5401(87)90052-6","journal-title":"Inf. Comput."},{"key":"2_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-319-99927-2_1","volume-title":"Testing Software and Systems","author":"P Arcaini","year":"2018","unstructured":"Arcaini, P., Gargantini, A., Riccobene, E.: Interactive testing and repairing of regular expressions. In: Medina-Bulo, I., Merayo, M.G., Hierons, R. (eds.) ICTSS 2018. LNCS, vol. 11146, pp. 1\u201316. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-99927-2_1"},{"issue":"1\u20132","key":"2_CR4","doi-asserted-by":"publisher","first-page":"e1664","DOI":"10.1002\/stvr.1664","volume":"29","author":"P Arcaini","year":"2019","unstructured":"Arcaini, P., Gargantini, A., Riccobene, E.: Fault-based test generation for regular expressions by mutation. Softw. Test. Verif. Reliab. 29(1\u20132), e1664 (2019). https:\/\/doi.org\/10.1002\/stvr.1664","journal-title":"Softw. Test. Verif. Reliab."},{"issue":"4","key":"2_CR5","doi-asserted-by":"publisher","first-page":"3494","DOI":"10.1016\/j.asoc.2011.01.023","volume":"11","author":"A Arcuri","year":"2011","unstructured":"Arcuri, A.: Evolutionary repair of faulty software. Appl. Soft Comput. 11(4), 3494\u20133514 (2011). https:\/\/doi.org\/10.1016\/j.asoc.2011.01.023","journal-title":"Appl. Soft Comput."},{"issue":"12","key":"2_CR6","doi-asserted-by":"publisher","first-page":"72","DOI":"10.1109\/MC.2014.344","volume":"47","author":"A Bartoli","year":"2014","unstructured":"Bartoli, A., Davanzo, G., De Lorenzo, A., Medvet, E., Sorio, E.: Automatic synthesis of regular expressions from examples. Computer 47(12), 72\u201380 (2014). https:\/\/doi.org\/10.1109\/MC.2014.344","journal-title":"Computer"},{"issue":"5","key":"2_CR7","doi-asserted-by":"publisher","first-page":"1217","DOI":"10.1109\/TKDE.2016.2515587","volume":"28","author":"A Bartoli","year":"2016","unstructured":"Bartoli, A., De Lorenzo, A., Medvet, E., Tarlao, F.: Inference of regular expressions for text extraction from examples. IEEE Trans. Knowl. Data Eng. 28(5), 1217\u20131230 (2016). https:\/\/doi.org\/10.1109\/TKDE.2016.2515587","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"3","key":"2_CR8","doi-asserted-by":"publisher","first-page":"1067","DOI":"10.1109\/tcyb.2017.2680466","volume":"48","author":"A Bartoli","year":"2018","unstructured":"Bartoli, A., De Lorenzo, A., Medvet, E., Tarlao, F.: Active learning of regular expressions for entity extraction. IEEE Trans. Cybern. 48(3), 1067\u20131080 (2018). https:\/\/doi.org\/10.1109\/tcyb.2017.2680466","journal-title":"IEEE Trans. Cybern."},{"key":"2_CR9","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3731.001.0001","volume-title":"Inductive Logic Programming: From Machine Learning to Software Engineering","author":"F Bergadano","year":"1995","unstructured":"Bergadano, F., Gunetti, D.: Inductive Logic Programming: From Machine Learning to Software Engineering. MIT Press, Cambridge (1995)"},{"key":"2_CR10","unstructured":"Bongard, J., Lipson, H.: Active coevolutionary learning of deterministic finite automata. J. Mach. Learn. Res. 6, 28 (2005). 00076"},{"key":"2_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-05094-1","volume-title":"Introduction to Evolutionary Computing","author":"AE Eiben","year":"2003","unstructured":"Eiben, A.E., Smith, J.E.: Introduction to Evolutionary Computing. Springer, Heidelberg (2003). https:\/\/doi.org\/10.1007\/978-3-662-05094-1"},{"key":"2_CR12","doi-asserted-by":"publisher","unstructured":"Henard, C., Papadakis, M., Perrouin, G., Klein, J., Le Traon, Y.: Towards automated testing and fixing of re-engineered feature models. In: Proceedings of the 2013 International Conference on Software Engineering, ICSE 2013, pp. 1245\u20131248. IEEE Press, Piscataway (2013). https:\/\/doi.org\/10.1109\/ICSE.2013.6606689","DOI":"10.1109\/ICSE.2013.6606689"},{"key":"2_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/978-3-319-96562-8_5","volume-title":"Machine Learning for Dynamic Software Analysis: Potentials and Limits","author":"F Howar","year":"2018","unstructured":"Howar, F., Steffen, B.: Active automata learning in practice. In: Bennaceur, A., H\u00e4hnle, R., Meinke, K. (eds.) Machine Learning for Dynamic Software Analysis: Potentials and Limits. LNCS, vol. 11026, pp. 123\u2013148. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-96562-8_5"},{"key":"2_CR14","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"487","DOI":"10.1007\/978-3-319-21690-4_32","volume-title":"Computer Aided Verification","author":"M Isberner","year":"2015","unstructured":"Isberner, M., Howar, F., Steffen, B.: The open-source LearnLib. In: Kroening, D., P\u0103s\u0103reanu, C.S. (eds.) CAV 2015. LNCS, vol. 9206, pp. 487\u2013495. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-21690-4_32"},{"issue":"8","key":"2_CR15","doi-asserted-by":"publisher","first-page":"1090","DOI":"10.1109\/5.533956","volume":"84","author":"D Lee","year":"1996","unstructured":"Lee, D., Yannakakis, M.: Principles and methods of testing finite state machines-a survey. Proc. IEEE 84(8), 1090\u20131123 (1996). https:\/\/doi.org\/10.1109\/5.533956","journal-title":"Proc. IEEE"},{"key":"2_CR16","doi-asserted-by":"crossref","unstructured":"Li, Y., Krishnamurthy, R., Raghavan, S., Vaithyanathan, S., Jagadish, H.V.: Regular expression learning for information extraction. In: Proceedings of the Conference on Empirical Methods in Natural Language Processing, EMNLP 2008, pp. 21\u201330. Association for Computational Linguistics, Stroudsburg (2008)","DOI":"10.3115\/1613715.1613719"},{"key":"2_CR17","doi-asserted-by":"publisher","first-page":"43","DOI":"10.1016\/j.orp.2016.09.002","volume":"3","author":"M L\u00f3pez-Ib\u00e1\u00f1ez","year":"2016","unstructured":"L\u00f3pez-Ib\u00e1\u00f1ez, M., Dubois-Lacoste, J., C\u00e1ceres, L.P., Birattari, M., St\u00fctzle, T.: The irace package: iterated racing for automatic algorithm configuration. Oper. Res. Perspect. 3, 43\u201358 (2016). https:\/\/doi.org\/10.1016\/j.orp.2016.09.002","journal-title":"Oper. Res. Perspect."},{"issue":"1","key":"2_CR18","doi-asserted-by":"publisher","first-page":"176","DOI":"10.1007\/s10664-013-9282-8","volume":"20","author":"M Martinez","year":"2015","unstructured":"Martinez, M., Monperrus, M.: Mining software repair models for reasoning on the search space of automated program fixing. Empirical Softw. Eng. 20(1), 176\u2013205 (2015). https:\/\/doi.org\/10.1007\/s10664-013-9282-8","journal-title":"Empirical Softw. Eng."},{"key":"2_CR19","unstructured":"M\u00f8ller, A.: dk.brics.automaton - finite-state automata and regular expressions for Java (2010). http:\/\/www.brics.dk\/automaton\/"},{"key":"2_CR20","doi-asserted-by":"publisher","first-page":"275","DOI":"10.1016\/bs.adcom.2018.03.015","volume-title":"Advances in Computers","author":"Mike Papadakis","year":"2019","unstructured":"Papadakis, M., Kintis, M., Zhang, J., Jia, Y., Le Traon, Y., Harman, M.: Mutation testing advances: an analysis and survey. In: Advances in Computers. Advances in Computers. Elsevier (2018). https:\/\/doi.org\/10.1016\/bs.adcom.2018.03.015"},{"issue":"5","key":"2_CR21","doi-asserted-by":"publisher","first-page":"427","DOI":"10.1109\/TSE.2014.2312918","volume":"40","author":"Y Pei","year":"2014","unstructured":"Pei, Y., Furia, C.A., Nordio, M., Wei, Y., Meyer, B., Zeller, A.: Automated fixing of programs with contracts. IEEE Trans. Softw. Eng. 40(5), 427\u2013449 (2014). https:\/\/doi.org\/10.1109\/TSE.2014.2312918","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"3","key":"2_CR22","doi-asserted-by":"publisher","first-page":"415","DOI":"10.1109\/tevc.2017.2693219","volume":"22","author":"J Petke","year":"2018","unstructured":"Petke, J., Haraldsson, S.O., Harman, M., Langdon, W.B., White, D.R., Woodward, J.R.: Genetic improvement of software: a comprehensive survey. IEEE Trans. Evol. Comput. 22(3), 415\u2013432 (2018). https:\/\/doi.org\/10.1109\/tevc.2017.2693219","journal-title":"IEEE Trans. Evol. Comput."},{"issue":"5","key":"2_CR23","doi-asserted-by":"publisher","first-page":"393","DOI":"10.1007\/s10009-009-0111-8","volume":"11","author":"H Raffelt","year":"2009","unstructured":"Raffelt, H., Steffen, B., Berg, T., Margaria, T.: LearnLib: a framework for extrapolating behavioral models. Int. J. Softw. Tools Technol. Transf. 11(5), 393\u2013407 (2009). https:\/\/doi.org\/10.1007\/s10009-009-0111-8","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"2_CR24","unstructured":"Regexlib.com. http:\/\/www.regexlib.com. Accessed 24 May 2019"},{"key":"2_CR25","unstructured":"Regular-expressions.info. http:\/\/www.regular-expressions.info\/. Accessed 24 May 2019"},{"key":"2_CR26","doi-asserted-by":"crossref","unstructured":"Watchmaker. https:\/\/watchmaker.uncommons.org\/. Accessed 24 May 2019","DOI":"10.1155\/2019\/6156948"},{"issue":"5","key":"2_CR27","doi-asserted-by":"publisher","first-page":"109","DOI":"10.1145\/1735223.1735249","volume":"53","author":"W Weimer","year":"2010","unstructured":"Weimer, W., Forrest, S., Le Goues, C., Nguyen, T.: Automatic program repair with evolutionary computation. Commun. ACM 53(5), 109\u2013116 (2010). https:\/\/doi.org\/10.1145\/1735223.1735249","journal-title":"Commun. ACM"},{"key":"2_CR28","doi-asserted-by":"publisher","unstructured":"Wilkerson, J.L., Tauritz, D.: Coevolutionary automated software correction. In: Proceedings of the 12th Annual Conference on Genetic and Evolutionary Computation - GECCO 2010. ACM Press (2010). https:\/\/doi.org\/10.1145\/1830483.1830739","DOI":"10.1145\/1830483.1830739"}],"container-title":["Lecture Notes in Computer Science","Testing Software and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-31280-0_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,3,13]],"date-time":"2024-03-13T20:58:01Z","timestamp":1710363481000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-31280-0_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030312794","9783030312800"],"references-count":28,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-31280-0_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"8 October 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICTSS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"IFIP International Conference on Testing Software and Systems","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Paris","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"France","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"15 October 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 October 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"31","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"pts2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/ictss2019.centralesupelec.fr\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,1","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}