{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,2]],"date-time":"2026-04-02T15:55:01Z","timestamp":1775145301745,"version":"3.50.1"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319479576","type":"print"},{"value":"9783319479583","type":"electronic"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47958-3_2","type":"book-chapter","created":{"date-parts":[[2016,10,8]],"date-time":"2016-10-08T13:40:52Z","timestamp":1475934052000},"page":"25-41","source":"Crossref","is-referenced-by-count":9,"title":["Learning a Strategy for Choosing Widening Thresholds from a Large Codebase"],"prefix":"10.1007","author":[{"given":"Sooyoung","family":"Cha","sequence":"first","affiliation":[]},{"given":"Sehun","family":"Jeong","sequence":"additional","affiliation":[]},{"given":"Hakjoo","family":"Oh","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,9]]},"reference":[{"key":"2_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/3-540-36377-7_5","volume-title":"The Essence of Computation: Complexity, Analysis, Transformation","author":"B Blanchet","year":"2002","unstructured":"Blanchet, B., Cousot, P., Cousot, R., Feret, J., Mauborgne, L., Min\u00e9, A., Monniaux, D., Rival, X.: Design and implementation of a special-purpose static program analyzer for safety-critical real-time embedded software. In: Mogensen, T.\u00c6., Schmidt, D.A., Sudborough, I.H. (eds.) The Essence of Computation. LNCS, vol. 2566, pp. 85\u2013108. Springer, Heidelberg (2002). doi: 10.1007\/3-540-36377-7_5"},{"issue":"12","key":"2_CR2","doi-asserted-by":"crossref","first-page":"1479","DOI":"10.1016\/j.jsc.2011.12.050","volume":"47","author":"O Bouissou","year":"2012","unstructured":"Bouissou, O., Seladji, Y., Chapoutot, A.: Acceleration of the abstract fixpoint computation in numerical program analysis. J. Symb. Comput. 47(12), 1479\u20131511 (2012). International Workshop on Invariant Generation","journal-title":"J. Symb. Comput."},{"issue":"3","key":"2_CR3","doi-asserted-by":"crossref","first-page":"229","DOI":"10.1007\/s10703-009-0089-6","volume":"35","author":"P Cousot","year":"2009","unstructured":"Cousot, P., Cousot, R., Feret, J., Mauborgne, L., Antoine, M., Rival, X.: Why does astr\u00e9e scale up? Formal Methods Syst. Des. 35(3), 229\u2013264 (2009)","journal-title":"Formal Methods Syst. Des."},{"key":"2_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"272","DOI":"10.1007\/978-3-540-77505-8_23","volume-title":"Advances in Computer Science - ASIAN 2006. Secure Software and Related Issues","author":"P Cousot","year":"2007","unstructured":"Cousot, P., Cousot, R., Feret, J., Mauborgne, L., Min\u00e9, A., Monniaux, D., Rival, X.: Combination of abstractions in the ASTR\u00c9E static analyzer. In: Okada, M., Satoh, I. (eds.) ASIAN 2006. LNCS, vol. 4435, pp. 272\u2013300. Springer, Heidelberg (2007). doi: 10.1007\/978-3-540-77505-8_23"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Grigore, R., Yang, H.: Abstraction refinement guided by a learnt probabilistic model. In: POPL (2016)","DOI":"10.1145\/2837614.2837663"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Halbwachs, N., Proy, Y.-E., Roumanoff, P.: Verification of real-time systems using linear relation analysis. In: Formal Methods in System Design, pp. 157\u2013185 (1997)","DOI":"10.1023\/A:1008678014487"},{"key":"2_CR7","doi-asserted-by":"crossref","first-page":"1317","DOI":"10.1002\/spe.2381","volume":"46","author":"S Kim","year":"2015","unstructured":"Kim, S., Heo, K., Hakjoo, O., Yi, K.: Widening with thresholds via binary search. Pract. Exp. Softw. 46, 1317\u20131328 (2015)","journal-title":"Pract. Exp. Softw."},{"key":"2_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"492","DOI":"10.1007\/978-3-642-24372-1_38","volume-title":"Automated Technology for Verification and Analysis","author":"L Lakhdar-Chaouch","year":"2011","unstructured":"Lakhdar-Chaouch, L., Jeannet, B., Girault, A.: Widening with thresholds for programs with complex control graphs. In: Bultan, T., Hsiung, P.-A. (eds.) ATVA 2011. LNCS, vol. 6996, pp. 492\u2013502. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-24372-1_38"},{"key":"2_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"170","DOI":"10.1007\/978-3-642-38088-4_12","volume-title":"NASA Formal Methods","author":"B Mihaila","year":"2013","unstructured":"Mihaila, B., Sepp, A., Simon, A.: Widening as abstract domain. In: Brat, G., Rungta, N., Venet, A. (eds.) NFM 2013. LNCS, vol. 7871, pp. 170\u2013184. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-38088-4_12"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Naik, M., Yang, H., Castelnuovo, G., Sagiv, M.: Abstractions from tests. In: POPL (2012)","DOI":"10.1145\/2103656.2103701"},{"key":"2_CR11","unstructured":"Hakjoo, O., Lee, W., Heo, K., Yang, H., Yi, K.: Selective context-sensitivity guided by impact pre-analysis. In: PLDI (2014)"},{"issue":"2","key":"2_CR12","first-page":"6:1","volume":"38","author":"O Hakjoo","year":"2015","unstructured":"Hakjoo, O., Lee, W., Heo, K., Yang, H., Yi, K.: Selective X-sensitive analysis guided by impact pre-analysis. ACM Trans. Program. Lang. Syst. 38(2), 6:1\u20136:45 (2015)","journal-title":"ACM Trans. Program. Lang. Syst."},{"key":"2_CR13","unstructured":"Hakjoo, O., Yang, H., Yi, K.: Learning a strategy for adapting a program analysis via Bayesian optimisation. In: OOPSLA (2015)"},{"key":"2_CR14","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/3206.001.0001","volume-title":"Gaussian Processes for Machine Learning (Adaptive Computation and Machine Learning)","author":"CE Rasmussen","year":"2005","unstructured":"Rasmussen, C.E., Williams, C.K.I.: Gaussian Processes for Machine Learning (Adaptive Computation and Machine Learning). The MIT Press, Cambridge (2005)"},{"key":"2_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"574","DOI":"10.1007\/978-3-642-37036-6_31","volume-title":"Programming Languages and Systems","author":"R Sharma","year":"2013","unstructured":"Sharma, R., Gupta, S., Hariharan, B., Aiken, A., Liang, P., Nori, A.V.: A data driven approach for algebraic loop invariants. In: Felleisen, M., Gardner, P. (eds.) ESOP 2013. LNCS, vol. 7792, pp. 574\u2013592. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-37036-6_31"},{"key":"2_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"388","DOI":"10.1007\/978-3-642-38856-9_21","volume-title":"Static Analysis","author":"R Sharma","year":"2013","unstructured":"Sharma, R., Gupta, S., Hariharan, B., Aiken, A., Nori, A.V.: Verification as learning geometric concepts. In: Logozzo, F., F\u00e4hndrich, M. (eds.) SAS 2013. LNCS, vol. 7935, pp. 388\u2013411. Springer, Heidelberg (2013). doi: 10.1007\/978-3-642-38856-9_21"},{"key":"2_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"71","DOI":"10.1007\/978-3-642-31424-7_11","volume-title":"Computer Aided Verification","author":"R Sharma","year":"2012","unstructured":"Sharma, R., Nori, A.V., Aiken, A.: Interpolants as classifiers. In: Madhusudan, P., Seshia, S.A. (eds.) CAV 2012. LNCS, vol. 7358, pp. 71\u201387. Springer, Heidelberg (2012). doi: 10.1007\/978-3-642-31424-7_11"},{"key":"2_CR18","unstructured":"Sparrow. http:\/\/ropas.snu.ac.kr\/sparrow"}],"container-title":["Lecture Notes in Computer Science","Programming Languages and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47958-3_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,14]],"date-time":"2019-09-14T11:30:51Z","timestamp":1568460651000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47958-3_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319479576","9783319479583"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47958-3_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016]]}}}