{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T02:28:53Z","timestamp":1743128933562,"version":"3.40.3"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319259413"},{"type":"electronic","value":"9783319259420"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-25942-0_9","type":"book-chapter","created":{"date-parts":[[2015,10,16]],"date-time":"2015-10-16T09:32:14Z","timestamp":1444987934000},"page":"135-149","source":"Crossref","is-referenced-by-count":3,"title":["Inferring Software Behavioral Models with MapReduce"],"prefix":"10.1007","author":[{"given":"Chen","family":"Luo","sequence":"first","affiliation":[]},{"given":"Fei","family":"He","sequence":"additional","affiliation":[]},{"given":"Carlo","family":"Ghezzi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,10,17]]},"reference":[{"key":"9_CR1","doi-asserted-by":"crossref","unstructured":"Ammons, G., Bod\u00edk, R., Larus, J.R.: Mining specifications. In: Proceedings of the 29th ACM SIGPLAN-SIGACT Symposium on Principles of Programming Languages, POPL 2002, pp. 4\u201316. ACM, New York (2002)","DOI":"10.1145\/503272.503275"},{"key":"9_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1007\/978-3-642-35632-2_20","volume-title":"Runtime Verification","author":"B Barre","year":"2013","unstructured":"Barre, B., Klein, M., Soucy-Boivin, M., Ollivier, P.-A., Hall\u00e9, S.: MapReduce for parallel trace validation of LTL properties. In: Qadeer, S., Tasiran, S. (eds.) RV 2012. LNCS, vol. 7687, pp. 184\u2013198. Springer, Heidelberg (2013)"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1007\/978-3-319-11164-3_4","volume-title":"Runtime Verification","author":"D Basin","year":"2014","unstructured":"Basin, D., Caronni, G., Ereth, S., Harvan, M., Klaedtke, F., Mantel, H.: Scalable offline monitoring. In: Bonakdarpour, B., Smolka, S.A. (eds.) RV 2014. LNCS, vol. 8734, pp. 31\u201347. Springer, Heidelberg (2014)"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Beschastnikh, I., Brun, Y., Ernst, M.D., Krishnamurthy, A.: Inferring models of concurrent systems from logs of their behavior with CSight. In: Proceedings of the 36th International Conference on Software Engineering, pp. 468\u2013479. ACM (2014)","DOI":"10.1145\/2568225.2568246"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Beschastnikh, I., Brun, Y., Schneider, S., Sloan, M., Ernst, M.D.: Leveraging existing instrumentation to automatically infer invariant-constrained models. In: Proceedings of the 19th ACM SIGSOFT symposium and the 13th European Conference on Foundations of Software Engineering, pp. 267\u2013277. ACM (2011)","DOI":"10.1145\/2025113.2025151"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"144","DOI":"10.1007\/978-3-319-10431-7_11","volume-title":"Software Engineering and Formal Methods","author":"D Bianculli","year":"2014","unstructured":"Bianculli, D., Ghezzi, C., Krsti\u0107, S.: Trace checking of metric temporal logic with aggregating modalities using MapReduce. In: Giannakopoulou, D., Sala\u00fcn, G. (eds.) SEFM 2014. LNCS, vol. 8702, pp. 144\u2013158. Springer, Heidelberg (2014)"},{"issue":"6","key":"9_CR7","doi-asserted-by":"publisher","first-page":"592","DOI":"10.1109\/TC.1972.5009015","volume":"21","author":"A Biermann","year":"1972","unstructured":"Biermann, A., Feldman, J.: On the synthesis of finite-state machines from samples of their behavior. Computers, IEEE Transactions on C 21(6), 592\u2013597 (1972)","journal-title":"Computers, IEEE Transactions on C"},{"issue":"3","key":"9_CR8","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1145\/287000.287001","volume":"7","author":"JE Cook","year":"1998","unstructured":"Cook, J.E., Wolf, A.L.: Discovering models of software processes from event-based data. ACM Trans. Softw. Eng. Methodol. 7(3), 215\u2013249 (1998)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"1","key":"9_CR9","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1145\/1327452.1327492","volume":"51","author":"J Dean","year":"2008","unstructured":"Dean, J., Ghemawat, S.: Mapreduce: Simplified data processing on large clusters. Commun. ACM 51(1), 107\u2013113 (2008)","journal-title":"Commun. ACM"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Ghezzi, C., Pezz\u00e8, M., Sama, M., Tamburrelli, G.: Mining behavior models from user-intensive web applications. In: Proceedings of the 36th International Conference on Software Engineering, pp. 277\u2013287. ACM (2014)","DOI":"10.1145\/2568225.2568234"},{"key":"9_CR11","doi-asserted-by":"crossref","unstructured":"Lee, C., Chen, F., Ro\u015fu, G.: Mining parametric specifications. In: Proceedings of the 33rd International Conference on Software Engineering, pp. 591\u2013600. ICSE 2011. ACM, New York (2011)","DOI":"10.1145\/1985793.1985874"},{"issue":"4","key":"9_CR12","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/2094114.2094118","volume":"40","author":"KH Lee","year":"2012","unstructured":"Lee, K.H., Lee, Y.J., Choi, H., Chung, Y.D., Moon, B.: Parallel data processing with mapreduce: A survey. SIGMOD Rec. 40(4), 11\u201320 (2012)","journal-title":"SIGMOD Rec."},{"key":"9_CR13","doi-asserted-by":"crossref","unstructured":"Lo, D., Mariani, L., Pezz\u00e8, M.: Automatic steering of behavioral model inference. In: Proceedings of the 7th Joint Meeting Of The European Software Engineering Conference and the ACM SIGSOFT symposium on The foundations of software engineering, pp. 345\u2013354. ACM (2009)","DOI":"10.1145\/1595696.1595761"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Lorenzoli, D., Mariani, L., Pezz\u00e8, M.: Automatic generation of software behavioral models. In: Proceedings of the 30th international conference on Software engineering, pp. 501\u2013510. ACM (2008)","DOI":"10.1145\/1368088.1368157"},{"key":"9_CR15","doi-asserted-by":"crossref","unstructured":"Luo, C., He, F., Ghezzi, C.: Inferring software behavioral models with mapreduce (extended version). http:\/\/sts.thss.tsinghua.edu.cn\/beagle\/paper\/model-2015.pdf","DOI":"10.1007\/978-3-319-25942-0_9"},{"key":"9_CR16","unstructured":"Thollard, F., Dupont, P., Higuera, C.d.l.: Probabilistic dfa inference using kullback-leibler divergence and minimality. In: Proceedings of the Seventeenth International Conference on Machine Learning, ICML 2000, pp. 975\u2013982. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA (2000)"},{"key":"9_CR17","doi-asserted-by":"crossref","unstructured":"Walkinshaw, N., Bogdanov, K.: Inferring finite-state models with temporal constraints. In: Proceedings of the 2008 23rd IEEE\/ACM International Conference on Automated Software Engineering, pp. 248\u2013257. IEEE Computer Society (2008)","DOI":"10.1109\/ASE.2008.35"},{"key":"9_CR18","unstructured":"Xu, W., Huang, L., Fox, A., Patterson, D., Jordan, M.: Experience mining google\u2019s production console logs. In: Proceedings of the 2010 Workshop on Managing Systems via Log Analysis and Machine Learning Techniques, SLAML 2010, pp. 5\u20135. USENIX Association, Berkeley, CA, USA (2010)"}],"container-title":["Lecture Notes in Computer Science","Dependable Software Engineering: Theories, Tools, and Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-25942-0_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,5,23]],"date-time":"2022-05-23T11:47:43Z","timestamp":1653306463000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-25942-0_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319259413","9783319259420"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-25942-0_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2015]]}}}