{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T13:59:02Z","timestamp":1766066342997,"version":"3.40.3"},"publisher-location":"Cham","reference-count":21,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319035413"},{"type":"electronic","value":"9783319035420"}],"license":[{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2013,1,1]],"date-time":"2013-01-01T00:00:00Z","timestamp":1356998400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-319-03542-0_20","type":"book-chapter","created":{"date-parts":[[2013,12,9]],"date-time":"2013-12-09T16:31:54Z","timestamp":1386606714000},"page":"273-289","source":"Crossref","is-referenced-by-count":3,"title":["Temporal Specification Mining for Anomaly Analysis"],"prefix":"10.1007","author":[{"given":"Farn","family":"Wang","sequence":"first","affiliation":[]},{"given":"Jung-Hsuan","family":"Wu","sequence":"additional","affiliation":[]},{"given":"Chung-Hao","family":"Huang","sequence":"additional","affiliation":[]},{"given":"Cheng-Chieh","family":"Chang","sequence":"additional","affiliation":[]},{"given":"Chung-Cheng","family":"Li","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"20_CR1","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1145\/170035.170072","volume-title":"Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, SIGMOD 1993","author":"R. Agrawal","year":"1993","unstructured":"Agrawal, R., Imieli\u0144ski, T., Swami, A.: Mining association rules between sets of items in large databases. In: Proceedings of the 1993 ACM SIGMOD International Conference on Management of Data, SIGMOD 1993, pp. 207\u2013216. ACM, New York (1993)"},{"key":"20_CR2","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/503272.503275","volume-title":"Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2002","author":"G. Ammons","year":"2002","unstructured":"Ammons, G., Bod\u00edk, R., Larus, J.R.: Mining specifications. In: Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2002, pp. 4\u201316. ACM, New York (2002)"},{"key":"20_CR3","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/1831708.1831719","volume-title":"Proceedings of the 19th International Symposium on Software Testing and Analysis, ISSTA 2010","author":"V. Dallmeier","year":"2010","unstructured":"Dallmeier, V., Knopp, N., Mallon, C., Hack, S., Zeller, A.: Generating test cases for specification mining. In: Proceedings of the 19th International Symposium on Software Testing and Analysis, ISSTA 2010, pp. 85\u201396. ACM, New York (2010)"},{"key":"20_CR4","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1145\/302405.302467","volume-title":"Proceedings of the 21st International Conference on Software Engineering, ICSE 1999","author":"M.D. Ernst","year":"1999","unstructured":"Ernst, M.D., Cockrell, J., Griswold, W.G., Notkin, D.: Dynamically discovering likely program invariants to support program evolution. In: Proceedings of the 21st International Conference on Software Engineering, ICSE 1999, pp. 213\u2013224. ACM, New York (1999)"},{"key":"20_CR5","doi-asserted-by":"crossref","unstructured":"Geisser, S.: Predictive Inference: An Introduction. Monographs on Statistics and Applied Probability. Chapman & Hall (1993)","DOI":"10.1007\/978-1-4899-4467-2"},{"key":"20_CR6","unstructured":"Havelund, K., Rosu, G.: Testing linear temporal logic formulae on finite execution traces. Technical report (2001)"},{"key":"20_CR7","unstructured":"Kamp, H.W.: Tense Logic and the Theory of Linear Order. Phd thesis, Computer Science Department, University of California at Los\u00a0Angeles, USA (1968)"},{"issue":"1","key":"20_CR8","first-page":"71","volume":"32","author":"S. Kotsiantis","year":"2006","unstructured":"Kotsiantis, S., Kanellopoulos, D.: Association rules mining: A recent overview. GESTS International Transactions on Computer Science and Engineering\u00a032(1), 71\u201382 (2006)","journal-title":"GESTS International Transactions on Computer Science and Engineering"},{"key":"20_CR9","doi-asserted-by":"crossref","first-page":"557","DOI":"10.1145\/1557019.1557083","volume-title":"Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2009","author":"D. Lo","year":"2009","unstructured":"Lo, D., Cheng, H., Han, J., Khoo, S.-C., Sun, C.: Classification of software behaviors for failure detection: a discriminative pattern mining approach. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining, KDD 2009, pp. 557\u2013566. ACM, New York (2009)"},{"key":"20_CR10","doi-asserted-by":"publisher","first-page":"265","DOI":"10.1145\/1181775.1181808","volume-title":"Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering, SIGSOFT 2006\/FSE-14","author":"D. Lo","year":"2006","unstructured":"Lo, D., Khoo, S.-C.: Smartic: towards building an accurate, robust and scalable specification miner. In: Proceedings of the 14th ACM SIGSOFT International Symposium on Foundations of Software Engineering, SIGSOFT 2006\/FSE-14, pp. 265\u2013275. ACM, New York (2006)"},{"key":"20_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1007\/978-3-540-78568-2_8","volume-title":"Database Systems for Advanced Applications","author":"D. Lo","year":"2008","unstructured":"Lo, D., Khoo, S.-C., Liu, C.: Efficient mining of recurrent rules from a sequence database. In: Haritsa, J.R., Kotagiri, R., Pudi, V. (eds.) DASFAA 2008. LNCS, vol.\u00a04947, pp. 67\u201383. Springer, Heidelberg (2008)"},{"key":"20_CR12","first-page":"50","volume-title":"Proceedings of the 2008 International Workshop on Dynamic Analysis: Held in Conjunction with the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2008), WODA 2008","author":"D. Lo","year":"2008","unstructured":"Lo, D., Khoo, S.-C., Liu, C.: Mining past-time temporal rules from execution traces. In: Proceedings of the 2008 International Workshop on Dynamic Analysis: Held in Conjunction with the ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2008), WODA 2008, pp. 50\u201356. ACM, New York (2008)"},{"key":"20_CR13","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1145\/1321631.1321710","volume-title":"Proceedings of the Twenty-Second IEEE\/ACM International Conference on Automated Software Engineering, ASE 2007","author":"D. Lo","year":"2007","unstructured":"Lo, D., Maoz, S., Khoo, S.-C.: Mining modal scenario-based specifications from execution traces of reactive systems. In: Proceedings of the Twenty-Second IEEE\/ACM International Conference on Automated Software Engineering, ASE 2007, pp. 465\u2013468. ACM, New York (2007)"},{"key":"20_CR14","first-page":"501","volume-title":"Proceedings of the 30th International Conference on Software Engineering, ICSE 2008","author":"D. Lorenzoli","year":"2008","unstructured":"Lorenzoli, D., Mariani, L., Pezz\u00e8, M.: Automatic generation of software behavioral models. In: Proceedings of the 30th International Conference on Software Engineering, ICSE 2008, pp. 501\u2013510. ACM, New York (2008)"},{"key":"20_CR15","first-page":"46","volume-title":"Proceedings of the 18th Annual Symposium on Foundations of Computer Science, SFCS 1977","author":"A. Pnueli","year":"1977","unstructured":"Pnueli, A.: The temporal logic of programs. In: Proceedings of the 18th Annual Symposium on Foundations of Computer Science, SFCS 1977, pp. 46\u201357. IEEE Computer Society, Washington, DC (1977)"},{"issue":"1","key":"20_CR16","first-page":"37","volume":"2","author":"D.M.W. Powers","year":"2011","unstructured":"Powers, D.M.W.: Evaluation: From precision, recall and f-measure to roc, informedness, markedness & correlation. Journal of Machine Learning Technologies\u00a02(1), 37\u201363 (2011)","journal-title":"Journal of Machine Learning Technologies"},{"key":"20_CR17","volume-title":"Information Retrieval","author":"C.J.V. Rijsbergen","year":"1979","unstructured":"Rijsbergen, C.J.V.: Information Retrieval, 2nd edn. Butterworth-Heinemann, Newton (1979)","edition":"2"},{"key":"20_CR18","unstructured":"Strej\u010dek, J.: Linear Temporal Logic: Expressiveness and Model Checking. PhD thesis, Faculty of Informatics, Masaryk University, Brno, Czech Republic (2004)"},{"key":"20_CR19","volume-title":"Proceedings of the 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, DASC 2011","author":"F. Wang","year":"2011","unstructured":"Wang, F., Yao, L.-W., Wu, J.-H.: Intelligent test oracle construction for reactive systems without explicit specifications. In: Proceedings of the 2011 IEEE Ninth International Conference on Dependable, Autonomic and Secure Computing, DASC 2011.IEEE Computer Society, Washington, DC (2011)"},{"key":"20_CR20","doi-asserted-by":"crossref","unstructured":"Yang, J., Evans, D.: Perracotta: mining temporal api rules from imperfect traces. In: Proceedings of the 28th International Conference on Software Engineering, ICSE 2006, pp. 282\u2013291. ACM Press (2006)","DOI":"10.1145\/1134285.1134325"},{"key":"20_CR21","unstructured":"Zhao, Q., Bhowmick, S.S.: Association Rule Mining: A Survey"}],"container-title":["Lecture Notes in Computer Science","Programming Languages and Systems"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-03542-0_20","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,20]],"date-time":"2023-01-20T20:09:29Z","timestamp":1674245369000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-03542-0_20"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783319035413","9783319035420"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-03542-0_20","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}