{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,31]],"date-time":"2025-08-31T10:10:28Z","timestamp":1756635028996},"publisher-location":"Cham","reference-count":14,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319115863"},{"type":"electronic","value":"9783319115870"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-11587-0_4","type":"book-chapter","created":{"date-parts":[[2014,9,19]],"date-time":"2014-09-19T06:27:47Z","timestamp":1411108067000},"page":"13-28","source":"Crossref","is-referenced-by-count":4,"title":["Automated Failure Analysis in Model Checking Based on Data Mining"],"prefix":"10.1007","author":[{"given":"Ning","family":"Ge","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Marc","family":"Pantel","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Xavier","family":"Cr\u00e9gut","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"4_CR1","unstructured":"Alipour, M.A.: Automated fault localization techniques; a survey. Technical report, Technical report, Oregon State University (2012)"},{"issue":"1","key":"4_CR2","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1145\/640128.604140","volume":"38","author":"T. Ball","year":"2003","unstructured":"Ball, T., Naik, M., Rajamani, S.K.: From symptom to cause: localizing errors in counterexample traces. ACM SIGPLAN Notices\u00a038(1), 97\u2013105 (2003)","journal-title":"ACM SIGPLAN Notices"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/3-540-44829-2_8","volume-title":"Model Checking Software","author":"A. Groce","year":"2003","unstructured":"Groce, A., Visser, W.: What went wrong: Explaining counterexamples. In: Ball, T., Rajamani, S.K. (eds.) SPIN 2003. LNCS, vol.\u00a02648, pp. 121\u2013135. Springer, Heidelberg (2003)"},{"key":"4_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"108","DOI":"10.1007\/978-3-540-24730-2_8","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A. Groce","year":"2004","unstructured":"Groce, A.: Error explanation with distance metrics. In: Jensen, K., Podelski, A. (eds.) TACAS 2004. LNCS, vol.\u00a02988, pp. 108\u2013122. Springer, Heidelberg (2004)"},{"key":"4_CR5","doi-asserted-by":"crossref","unstructured":"Lamport, L.: Proving the correctness of multiprocess programs. IEEE Transactions on Software Engineering\u00a0(2), 125\u2013143 (1977)","DOI":"10.1109\/TSE.1977.229904"},{"issue":"4","key":"4_CR6","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/0020-0190(85)90056-0","volume":"21","author":"B. Alpern","year":"1985","unstructured":"Alpern, B., Schneider, F.B.: Defining liveness. Information Processing Letters\u00a021(4), 181\u2013185 (1985)","journal-title":"Information Processing Letters"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"352","DOI":"10.1007\/978-3-642-31491-9_27","volume-title":"Modelling Foundations and Applications","author":"N. Ge","year":"2012","unstructured":"Ge, N., Pantel, M.: Time properties verification framework for UML-MARTE safety critical real-time systems. In: Vallecillo, A., Tolvanen, J.-P., Kindler, E., St\u00f6rrle, H., Kolovos, D. (eds.) ECMFA 2012. LNCS, vol.\u00a07349, pp. 352\u2013367. Springer, Heidelberg (2012)"},{"issue":"9","key":"4_CR8","doi-asserted-by":"publisher","first-page":"1036","DOI":"10.1109\/TCOM.1976.1093424","volume":"24","author":"P. Merlin","year":"1976","unstructured":"Merlin, P., Farber, D.: Recoverability of communication protocols\u2013implications of a theoretical study. IEEE Transactions on Communications\u00a024(9), 1036\u20131043 (1976)","journal-title":"IEEE Transactions on Communications"},{"issue":"3","key":"4_CR9","doi-asserted-by":"publisher","first-page":"259","DOI":"10.1109\/32.75415","volume":"17","author":"B. Berthomieu","year":"1991","unstructured":"Berthomieu, B., Diaz, M.: Modeling and verification of time dependent systems using time petri nets. IEEE Trans. Softw. Eng.\u00a017(3), 259\u2013273 (1991)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"4_CR10","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1214\/aoms\/1177729694","volume":"22","author":"S. Kullback","year":"1951","unstructured":"Kullback, S., Leibler, R.A.: On information and sufficiency. The Annals of Mathematical Statistics\u00a022(1), 79\u201386 (1951)","journal-title":"The Annals of Mathematical Statistics"},{"key":"4_CR11","doi-asserted-by":"crossref","unstructured":"Baker, L.D., McCallum, A.K.: Distributional clustering of words for text classification. In: Proceedings of the 21st Annual International ACM SIGIR Conference on Research and Development in Information Retrieval, pp. 96\u2013103. ACM (1998)","DOI":"10.1145\/290941.290970"},{"issue":"1","key":"4_CR12","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1108\/eb026526","volume":"28","author":"K.S. Jones","year":"1972","unstructured":"Jones, K.S.: A statistical interpretation of term specificity and its application in retrieval. Journal of Documentation\u00a028(1), 11\u201321 (1972)","journal-title":"Journal of Documentation"},{"key":"4_CR13","unstructured":"Wong, W.E., Debroy, V.: A survey of software fault localization. University of Texas at Dallas, Tech. Rep. UTDCS-45-09 (2009)"},{"issue":"2","key":"4_CR14","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/356586.356588","volume":"3","author":"E.G. Coffman","year":"1971","unstructured":"Coffman, E.G., Elphick, M., Shoshani, A.: System deadlocks. ACM Computing Surveys (CSUR)\u00a03(2), 67\u201378 (1971)","journal-title":"ACM Computing Surveys (CSUR)"}],"container-title":["Lecture Notes in Computer Science","Model and Data Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-11587-0_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T22:30:43Z","timestamp":1558996243000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-11587-0_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319115863","9783319115870"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-11587-0_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}