{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T04:03:54Z","timestamp":1746417834939,"version":"3.40.4"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319111636"},{"type":"electronic","value":"9783319111643"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11164-3_14","type":"book-chapter","created":{"date-parts":[[2014,9,12]],"date-time":"2014-09-12T07:49:11Z","timestamp":1410508151000},"page":"162-177","source":"Crossref","is-referenced-by-count":13,"title":["Abstraction and Mining of Traces to Explain Concurrency Bugs"],"prefix":"10.1007","author":[{"given":"Mitra","family":"Tabaei Befrouei","sequence":"first","affiliation":[]},{"given":"Chao","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Georg","family":"Weissenbacher","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"14_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/10722167_15","volume-title":"Computer Aided Verification","author":"E.M. Clarke","year":"2000","unstructured":"Clarke, E.M., Grumberg, O., Jha, S., Lu, Y., Veith, H.: Counterexample-guided abstraction refinement. In: Emerson, E.A., Sistla, A.P. (eds.) CAV 2000. LNCS, vol.\u00a01855, pp. 154\u2013169. Springer, Heidelberg (2000)"},{"issue":"12","key":"14_CR2","doi-asserted-by":"publisher","first-page":"859","DOI":"10.1109\/TSE.2004.91","volume":"30","author":"N. Delgado","year":"2004","unstructured":"Delgado, N., Gates, A.Q., Roach, S.: A taxonomy and catalog of runtime software-fault monitoring tools. IEEE Transactions on Software Engineering (TSE)\u00a030(12), 859\u2013872 (2004)","journal-title":"IEEE Transactions on Software Engineering (TSE)"},{"issue":"11","key":"14_CR3","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1145\/1839676.1839698","volume":"53","author":"T. Elmas","year":"2010","unstructured":"Elmas, T., Qadeer, S., Tasiran, S.: Goldilocks: a race-aware Java runtime. Communications of the ACM\u00a053(11), 85\u201392 (2010)","journal-title":"Communications of the ACM"},{"key":"14_CR4","doi-asserted-by":"crossref","unstructured":"Engler, D.R., Ashcraft, K.: RacerX: effective, static detection of race conditions and deadlocks. In: Symposium on Operating Systems Principles (SOSP), pp. 237\u2013252. ACM (2003)","DOI":"10.1145\/1165389.945468"},{"issue":"11","key":"14_CR5","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1145\/1839676.1839699","volume":"53","author":"C. Flanagan","year":"2010","unstructured":"Flanagan, C., Freund, S.N.: FastTrack: efficient and precise dynamic race detection. Communications of the ACM\u00a053(11), 93\u2013101 (2010)","journal-title":"Communications of the ACM"},{"key":"14_CR6","doi-asserted-by":"crossref","unstructured":"Flanagan, C., Qadeer, S.: A type and effect system for atomicity. In: PLDI, pp. 338\u2013349. ACM (2003)","DOI":"10.1145\/780822.781169"},{"key":"14_CR7","doi-asserted-by":"crossref","unstructured":"Hammer, C., Dolby, J., Vaziri, M., Tip, F.: Dynamic detection of atomic-set-serializability violations. In: International Conference on Software Engineering (ICSE), pp. 231\u2013240. ACM (2008)","DOI":"10.1145\/1368088.1368120"},{"key":"14_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-642-31759-0_5","volume-title":"Model Checking Software","author":"S. Leue","year":"2012","unstructured":"Leue, S., Tabaei Befrouei, M.: Counterexample explanation by anomaly detection. In: Donaldson, A., Parker, D. (eds.) SPIN 2012. LNCS, vol.\u00a07385, pp. 24\u201342. Springer, Heidelberg (2012)"},{"key":"14_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"264","DOI":"10.1007\/978-3-642-39176-7_17","volume-title":"Model Checking Software","author":"S. Leue","year":"2013","unstructured":"Leue, S., Tabaei Befrouei, M.: Mining sequential patterns to explain concurrent counterexamples. In: Bartocci, E., Ramakrishnan, C.R. (eds.) SPIN 2013. LNCS, vol.\u00a07976, pp. 264\u2013281. Springer, Heidelberg (2013)"},{"key":"14_CR10","unstructured":"Lewis, D.: Counterfactuals. Wiley-Blackwell (2001)"},{"key":"14_CR11","doi-asserted-by":"crossref","unstructured":"Lu, S., Tucek, J., Qin, F., Zhou, Y.: AVIO: detecting atomicity violations via access interleaving invariants. In: Architectural Support for Programming Languages and Operating Systems, ASPLOS (2006)","DOI":"10.1145\/1168857.1168864"},{"key":"14_CR12","doi-asserted-by":"publisher","first-page":"329","DOI":"10.1145\/1353536.1346323","volume":"43","author":"S. Lu","year":"2008","unstructured":"Lu, S., Park, S., Seo, E., Zhou, Y.: Learning from mistakes: a comprehensive study on real world concurrency bug characteristics. ACM Sigplan Notices\u00a043, 329\u2013339 (2008)","journal-title":"ACM Sigplan Notices"},{"key":"14_CR13","doi-asserted-by":"crossref","unstructured":"Lucia, B., Ceze, L.: Finding concurrency bugs with context-aware communication graphs. In: Symposium on Microarchitecture (MICRO), pp. 553\u2013563. ACM (2009)","DOI":"10.1145\/1669112.1669181"},{"key":"14_CR14","doi-asserted-by":"crossref","unstructured":"Mabroukeh, N.R., Ezeife, C.I.: A taxonomy of sequential pattern mining algorithms. ACM Computing Surveys\u00a043(1), 3:1\u20133:41 (2010)","DOI":"10.1145\/1824795.1824798"},{"key":"14_CR15","doi-asserted-by":"crossref","unstructured":"Musuvathi, M., Qadeer, S.: Iterative context bounding for systematic testing of multithreaded programs. In: PLDI, pp. 446\u2013455. ACM (2007)","DOI":"10.1145\/1273442.1250785"},{"issue":"7","key":"14_CR16","doi-asserted-by":"publisher","first-page":"133","DOI":"10.1145\/109626.109640","volume":"26","author":"R.H.B. Netzer","year":"1991","unstructured":"Netzer, R.H.B., Miller, B.P.: Improving the accuracy of data race detection. SIGPLAN Notices\u00a026(7), 133\u2013144 (1991)","journal-title":"SIGPLAN Notices"},{"issue":"4","key":"14_CR17","doi-asserted-by":"publisher","first-page":"631","DOI":"10.1145\/322154.322158","volume":"26","author":"C.H. Papadimitriou","year":"1979","unstructured":"Papadimitriou, C.H.: The serializability of concurrent database updates. Journal of the ACM\u00a026(4), 631\u2013653 (1979)","journal-title":"Journal of the ACM"},{"key":"14_CR18","doi-asserted-by":"crossref","unstructured":"Park, S., Vuduc, R., Harrold, M.J.: A unified approach for localizing non-deadlock concurrency bugs. In: Software Testing, Verification and Validation (ICST), pp. 51\u201360. IEEE (2012)","DOI":"10.1109\/ICST.2012.85"},{"key":"14_CR19","doi-asserted-by":"crossref","unstructured":"Park, S., Vuduc, R.W., Harrold, M.J.: Falcon: fault localization in concurrent programs. In: International Conference on Software Engineering (ICSE), pp. 245\u2013254. ACM (2010)","DOI":"10.1145\/1806799.1806838"},{"key":"14_CR20","doi-asserted-by":"crossref","unstructured":"Park, S., Lu, S., Zhou, Y.: CTrigger: exposing atomicity violation bugs from their hiding places. In: Architectural Support for Programming Languages and Operating Systems (ASPLOS), pp. 25\u201336. ACM (2009)","DOI":"10.1145\/1508284.1508249"},{"key":"14_CR21","doi-asserted-by":"crossref","unstructured":"R\u00f6\u00dfler, J., Fraser, G., Zeller, A., Orso, A.: Isolating failure causes through test case generation. In: International Symposium on Software Testing and Analysis, pp. 309\u2013319. ACM (2012)","DOI":"10.1145\/2338965.2336790"},{"issue":"4","key":"14_CR22","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1145\/265924.265927","volume":"15","author":"S. Savage","year":"1997","unstructured":"Savage, S., Burrows, M., Nelson, G., Sobalvarro, P., Anderson, T.: Eraser: A dynamic data race detector for multithreaded programs. Transactions on Computer Systems (TOCS)\u00a015(4), 391\u2013411 (1997)","journal-title":"Transactions on Computer Systems (TOCS)"},{"key":"14_CR23","unstructured":"Wang, J., Han, J.: Bide: Efficient mining of frequent closed sequences. In: ICDE (2004)"},{"issue":"2","key":"14_CR24","doi-asserted-by":"publisher","first-page":"93","DOI":"10.1109\/TSE.2006.1599419","volume":"32","author":"L. Wang","year":"2006","unstructured":"Wang, L., Stoller, S.D.: Runtime analysis of atomicity for multithreaded programs. TSE\u00a032(2), 93\u2013110 (2006)","journal-title":"TSE"},{"key":"14_CR25","doi-asserted-by":"crossref","unstructured":"Xu, M., Bod\u00edk, R., Hill, M.D.: A serializability violation detector for shared-memory server programs. In: PLDI, pp. 1\u201314. ACM (2005)","DOI":"10.1145\/1064978.1065013"},{"key":"14_CR26","doi-asserted-by":"crossref","unstructured":"Yan, X., Han, J., Afshar, R.: CloSpan: Mining closed sequential patterns in large datasets. In: Proceedings of 2003 SIAM International Conference on Data Mining, SDM 2003 (2003)","DOI":"10.1137\/1.9781611972733.15"},{"key":"14_CR27","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"58","DOI":"10.1007\/978-3-540-73370-6_6","volume-title":"Model Checking Software","author":"Y. Yang","year":"2007","unstructured":"Yang, Y., Chen, X., Gopalakrishnan, G.C., Kirby, R.M.: Distributed dynamic partial order reduction based verification of threaded software. In: Bo\u0161na\u010dki, D., Edelkamp, S. (eds.) SPIN 2007. LNCS, vol.\u00a04595, pp. 58\u201375. Springer, Heidelberg (2007)"}],"container-title":["Lecture Notes in Computer Science","Runtime Verification"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11164-3_14","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,4]],"date-time":"2025-05-04T16:05:14Z","timestamp":1746374714000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11164-3_14"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319111636","9783319111643"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11164-3_14","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}