{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,13]],"date-time":"2026-02-13T10:16:27Z","timestamp":1770977787734,"version":"3.50.1"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319929699","type":"print"},{"value":"9783319929705","type":"electronic"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-92970-5_3","type":"book-chapter","created":{"date-parts":[[2018,5,29]],"date-time":"2018-05-29T08:54:12Z","timestamp":1527584052000},"page":"37-53","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Automated Specification Extraction and Analysis with Specstractor"],"prefix":"10.1007","author":[{"given":"Christoph","family":"Schulze","sequence":"first","affiliation":[]},{"given":"Rance","family":"Cleaveland","sequence":"additional","affiliation":[]},{"given":"Mikael","family":"Lindvall","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,5,30]]},"reference":[{"key":"3_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-16612-9_1","volume-title":"Runtime Verification","author":"C Ackermann","year":"2010","unstructured":"Ackermann, C., Cleaveland, R., Huang, S., Ray, A., Shelton, C., Latronico, E.: Automatic requirement extraction from test cases. In: Barringer, H., Falcone, Y., Finkbeiner, B., Havelund, K., Lee, I., Pace, G., Ro\u015fu, G., Sokolsky, O., Tillmann, N. (eds.) RV 2010. LNCS, vol. 6418, pp. 1\u201315. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-16612-9_1"},{"key":"3_CR2","doi-asserted-by":"crossref","first-page":"35","DOI":"10.1016\/j.scico.2007.01.015","volume":"69","author":"MD Ernst","year":"2007","unstructured":"Ernst, M.D., et al.: The Daikon system for dynamic detection of likely invariants. Sci. Comput. Program. 69, 35\u201345 (2007)","journal-title":"Sci. Comput. Program."},{"key":"3_CR3","doi-asserted-by":"crossref","unstructured":"Cheng, X., Hsiao, M.S.: Simulation-directed invariant mining for software verification. In: Proceedings of DATE 2008, pp. 682\u2013687. ACM, New York (2008)","DOI":"10.1109\/DATE.2008.4484757"},{"key":"3_CR4","doi-asserted-by":"crossref","unstructured":"Beschastnikh, I., et al.: Mining temporal invariants from partially ordered logs. In: SLAML 2011, pp. 3:1\u20133:10. ACM, New York (2011)","DOI":"10.1145\/2038633.2038636"},{"key":"3_CR5","doi-asserted-by":"crossref","first-page":"167:1","DOI":"10.1145\/3126504","volume":"16","author":"C Schulze","year":"2017","unstructured":"Schulze, C., Cleaveland, R.: Improving invariant mining via static analysis. ACM Trans. Embed. Comput. Syst. 16, 167:1\u2013167:20 (2017)","journal-title":"ACM Trans. Embed. Comput. Syst."},{"key":"3_CR6","doi-asserted-by":"crossref","unstructured":"Han, J., Pei, J., Yin, Y.: Mining frequent patterns without candidate generation. In: ACM SIGMOD Record, vol. 29, pp. 1\u201312. ACM (2000)","DOI":"10.1145\/342009.335372"},{"key":"3_CR7","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-319-46131-1_8","volume-title":"Machine Learning and Knowledge Discovery in Databases","author":"P Fournier-Viger","year":"2016","unstructured":"Fournier-Viger, P., Lin, J.C.-W., Gomariz, A., Gueniche, T., Soltani, A., Deng, Z., Lam, H.T.: The SPMF open-source data mining library version 2. In: Berendt, B., Bringmann, B., Fromont, \u00c9., Garriga, G., Miettinen, P., Tatti, N., Tresp, V. (eds.) ECML PKDD 2016. LNCS (LNAI), vol. 9853, pp. 36\u201340. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-46131-1_8"},{"key":"3_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"84","DOI":"10.1007\/978-3-540-70930-5_6","volume-title":"Model-Driven Development of Reliable Automotive Services","author":"R Cleaveland","year":"2008","unstructured":"Cleaveland, R., Smolka, S.A., Sims, S.T.: An instrumentation-based approach to controller model validation. In: Broy, M., Kr\u00fcger, I.H., Meisinger, M. (eds.) ASWSD 2006. LNCS, vol. 4922, pp. 84\u201397. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-70930-5_6"},{"key":"3_CR9","first-page":"487","volume":"1215","author":"R Agrawal","year":"1994","unstructured":"Agrawal, R., Srikant, R., et al.: Fast algorithms for mining association rules. Proc. VLDB 1215, 487\u2013499 (1994)","journal-title":"Proc. VLDB"},{"key":"3_CR10","doi-asserted-by":"crossref","unstructured":"Srikant, R., Agrawal, R.: Mining quantitative association rules in large relational tables. In: Proceedings of SIGMOD, pp. 1\u201312. ACM, New York (1996)","DOI":"10.1145\/233269.233311"},{"key":"3_CR11","first-page":"1035","volume":"7","author":"A Salleb-Aouissi","year":"2007","unstructured":"Salleb-Aouissi, A., Vrain, C., Nortet, C.: Quantminer: a genetic algorithm for mining quantitative association rules. IJCAI 7, 1035\u20131040 (2007)","journal-title":"IJCAI"},{"key":"3_CR12","volume-title":"Data Mining: Concepts and Techniques","author":"J Han","year":"2011","unstructured":"Han, J., Pei, J., Kamber, M.: Data Mining: Concepts and Techniques. Elsevier, New York (2011)"},{"issue":"4","key":"3_CR13","doi-asserted-by":"crossref","first-page":"491","DOI":"10.1007\/PL00011680","volume":"3","author":"SD Bay","year":"2001","unstructured":"Bay, S.D.: Multivariate discretization for set mining. Knowl. Inf. Syst. 3(4), 491\u2013512 (2001)","journal-title":"Knowl. Inf. Syst."},{"key":"3_CR14","doi-asserted-by":"publisher","unstructured":"Kellerer, H., Pferschy, U., Pisinger, D.: Introduction to NP-completeness of knapsack problems. In: Knapsack Problems, pp. 483\u2013493. Springer, Heidelberg (2004). https:\/\/doi.org\/10.1007\/978-3-540-24777-7_16","DOI":"10.1007\/978-3-540-24777-7_16"},{"key":"3_CR15","doi-asserted-by":"crossref","unstructured":"Lindvall, M., et al.: Safety-focused security requirements elicitation for medical device software. In: Requirements Engineering, pp. 134\u2013143. IEEE (2017)","DOI":"10.1109\/RE.2017.21"},{"key":"3_CR16","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/978-3-642-19835-9_18","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"M Merten","year":"2011","unstructured":"Merten, M., Steffen, B., Howar, F., Margaria, T.: Next generation learnlib. In: Abdulla, P.A., Leino, K.R.M. (eds.) TACAS 2011. LNCS, vol. 6605, pp. 220\u2013223. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-19835-9_18"},{"key":"3_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"8","DOI":"10.1007\/978-3-319-48869-1_2","volume-title":"Verified Software. Theories, Tools, and Experiments","author":"KY Rozier","year":"2016","unstructured":"Rozier, K.Y.: Specification: the biggest bottleneck in formal methods and autonomy. In: Blazy, S., Chechik, M. (eds.) VSTTE 2016. LNCS, vol. 9971, pp. 8\u201326. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-48869-1_2"},{"key":"3_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"2","DOI":"10.1007\/978-3-642-20398-5_2","volume-title":"NASA Formal Methods","author":"A Zeller","year":"2011","unstructured":"Zeller, A.: Specifications for free. In: Bobaru, M., Havelund, K., Holzmann, G.J., Joshi, R. (eds.) NFM 2011. LNCS, vol. 6617, pp. 2\u201312. Springer, Heidelberg (2011). https:\/\/doi.org\/10.1007\/978-3-642-20398-5_2"},{"key":"3_CR19","doi-asserted-by":"crossref","unstructured":"Dallmeier, V., Knopp, N., Mallon, C., Hack, S., Zeller, A.: Generating test cases for specification mining. In: Proceedings of ISSTA, p. 85. ACM Press, July 2010","DOI":"10.1145\/1831708.1831719"},{"key":"3_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"292","DOI":"10.1007\/978-3-642-00768-2_26","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"C Goues Le","year":"2009","unstructured":"Le Goues, C., Weimer, W.: Specification mining with few false positives. In: Kowalewski, S., Philippou, A. (eds.) TACAS 2009. LNCS, vol. 5505, pp. 292\u2013306. Springer, Heidelberg (2009). https:\/\/doi.org\/10.1007\/978-3-642-00768-2_26"},{"key":"3_CR21","doi-asserted-by":"crossref","unstructured":"Lorenzoli, D., Mariani, L., Pezz\u00e8, M.: Automatic generation of software behavioral models. In: Proceedings of ICSE, p. 501. ACM Press, May 2008","DOI":"10.1145\/1368088.1368157"},{"key":"3_CR22","doi-asserted-by":"crossref","unstructured":"Vasudevan, S., et al.: GoldMine: automatic assertion generation using data mining and static analysis. In: Proceedings of DATE, pp. 626\u2013629 (2010)","DOI":"10.1109\/DATE.2010.5457129"},{"key":"3_CR23","doi-asserted-by":"crossref","unstructured":"Zeng, F., Cao, Q., Mao, L., Chen, Z.: Test case generation based on invariant extraction. In: Proceedings of WCNMC, pp. 1\u20134. IEEE, September 2009","DOI":"10.1109\/WICOM.2009.5302578"}],"container-title":["Lecture Notes in Computer Science","Software Engineering and Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-92970-5_3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,18]],"date-time":"2019-10-18T15:23:20Z","timestamp":1571412200000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-92970-5_3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319929699","9783319929705"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-92970-5_3","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018]]}}}