{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T05:46:16Z","timestamp":1725515176763},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540691631"},{"type":"electronic","value":"9783540691662"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-69166-2_6","type":"book-chapter","created":{"date-parts":[[2008,7,13]],"date-time":"2008-07-13T09:25:03Z","timestamp":1215941103000},"page":"78-92","source":"Crossref","is-referenced-by-count":1,"title":["Protocol Inference Using Static Path Profiles"],"prefix":"10.1007","author":[{"given":"Murali Krishna","family":"Ramanathan","sequence":"first","affiliation":[]},{"given":"Koushik","family":"Sen","sequence":"additional","affiliation":[]},{"given":"Ananth","family":"Grama","sequence":"additional","affiliation":[]},{"given":"Suresh","family":"Jagannathan","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","doi-asserted-by":"crossref","unstructured":"Ammons, G., Bodik, R., Larus, J.: Mining specifications. In: Proceedings of POPL 2002, pp. 4\u201316 (2002)","DOI":"10.1145\/503272.503275"},{"key":"6_CR2","doi-asserted-by":"crossref","unstructured":"Ammons, G., Mandelin, D., Bodik, R., Larus, J.: Debugging temporal specifications with concept analysis. In: Proceedings of PLDI 2003, pp. 182\u2013195 (2003)","DOI":"10.1145\/781131.781152"},{"issue":"8","key":"6_CR3","doi-asserted-by":"publisher","first-page":"721","DOI":"10.1109\/TSE.2003.1223646","volume":"29","author":"P. Anderson","year":"2003","unstructured":"Anderson, P., Reps, T., Teitelbaum, T.: Design and implementation of a fine-grained software inspection tool. IEEE Trans. on Software Engineering\u00a029(8), 721\u2013733 (2003)","journal-title":"IEEE Trans. on Software Engineering"},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Ball, T., Larus, J.: Efficient path profiling. In: MICRO-29 (December 1996)","DOI":"10.1109\/MICRO.1996.566449"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/3-540-45139-0_7","volume-title":"Model Checking Software","author":"T. Ball","year":"2001","unstructured":"Ball, T., Rajamani, S.K.: Automatically validating temporal safety properties of interfaces. In: Dwyer, M.B. (ed.) SPIN 2001. LNCS, vol.\u00a02057, pp. 103\u2013122. Springer, Heidelberg (2001)"},{"key":"6_CR6","unstructured":"Burdick, D., Calimlim, M., Flannick, J., Gehrke, J., Yiu, T.: Mafia: A performance study of mining maximal frequent itemsets. In: FIMI 2003 (2003)"},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Chin, B., Markstrum, S., Millstein, T.: Semantic type qualifiers. In: Proceedings of PLDI 2005, pp. 85\u201395 (2005)","DOI":"10.1145\/1065010.1065022"},{"issue":"2","key":"6_CR8","first-page":"1","volume":"27","author":"M. Ernst","year":"2001","unstructured":"Ernst, M., Cockrell, J., Griswold, W., Notkin, D.: Dynamically discovering likely program invariants to support program evolution. IEEE TSE\u00a027(2), 1\u201325 (2001)","journal-title":"IEEE TSE"},{"key":"6_CR9","doi-asserted-by":"crossref","unstructured":"Foster, J., Terauchi, T., Aiken, A.: Flow-sensitive type qualifiers. In: Proceedings of PLDI 2002 (2002)","DOI":"10.1145\/512529.512531"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Furr, M., Foster, J.: Checking type safety of foreign function calls. In: Proceedings of PLDI 2005 (2005)","DOI":"10.1145\/1065010.1065019"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Godefroid, P.: Compositional dynamic test generation. In: POPL 2007, pp. 47\u201354 (2007)","DOI":"10.1145\/1190216.1190226"},{"key":"6_CR12","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Klarslund, N., Sen, K.: Dart: Directed automated random testing. In: Proceedings of PLDI 2005, Chicago, Il, pp. 213\u2013223 (2005)","DOI":"10.1145\/1065010.1065036"},{"issue":"5","key":"6_CR13","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1095430.1081713","volume":"30","author":"T. Henzinger","year":"2005","unstructured":"Henzinger, T., Jhala, R., Majumdar, R.: Permissive interfaces. SIGSOFT Softw. Eng. Notes\u00a030(5), 31\u201340 (2005)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"6_CR14","volume-title":"The SPIN Model Checker: Primer and Reference Manual","author":"G.J. Holzmann","year":"2004","unstructured":"Holzmann, G.J.: The SPIN Model Checker: Primer and Reference Manual. Addison-Wesley, Reading (2004)"},{"key":"6_CR15","volume-title":"Mathematical Statistics With Applications","author":"A.S. Kapadia","year":"2005","unstructured":"Kapadia, A.S., Chan, W., Moye, L.A.: Mathematical Statistics With Applications. CRC, Boca Raton (2005)"},{"key":"6_CR16","unstructured":"Kremenek, T., Twohey, P., Back, G., Ng, A., Engler, D.: From uncertainty to belief: Inferring the specification within. In: Proceedings of OSDI 2006 (2006)"},{"key":"6_CR17","series-title":"Lecture Notes in Computer Science","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"P. Lam","year":"2005","unstructured":"Lam, P., Kuncak, V., Rinard, M.: Generalized typestate checking for data structure consistency. In: Cousot, R. (ed.) VMCAI 2005. LNCS, vol.\u00a03385, Springer, Heidelberg (2005)"},{"key":"6_CR18","doi-asserted-by":"crossref","unstructured":"Li, Z., Zhou, Y.: Pr-miner: Automatically extracting implicit programming rules and detecting violations in large software code. In: Proceedings of ESEC-FSE 2005 (September 2005)","DOI":"10.1145\/1081706.1081755"},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Mandelin, D., Xu, L., Bodik, R., Kimelman, D.: Jungloid mining: Helping to navigate the api jungle. In: Proceedings of PLDI 2005, pp. 48\u201361 (2005)","DOI":"10.1145\/1065010.1065018"},{"key":"6_CR20","doi-asserted-by":"crossref","unstructured":"Ramanathan, M.K., Grama, A., Jagannathan, S.: Path-sensitive inference of function precedence protocols. In: Proceedings of ICSE 2007 (May 2007)","DOI":"10.1109\/ICSE.2007.63"},{"key":"6_CR21","doi-asserted-by":"crossref","unstructured":"Ramanathan, M.K., Grama, A., Jagannathan, S.: Static specification inference using predicate mining. In: Proceedings of PLDI 2007, pp. 123\u2013134 (2007)","DOI":"10.1145\/1250734.1250749"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Sen, K., Marinov, D., Agha, G.: Cute: A concolic unit testing engine for c. In: Proceedings of ESEC-FSE, pp. 263\u2013272 (2005)","DOI":"10.1145\/1081706.1081750"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Shoham, S., Yahav, E., Fink, S., Pistoia, M.: Static specification mining using automata-based abstractions. In: ISSTA 2007: International Symposium on Software Testing and Analysis, pp. 174\u2013184 (July 2007)","DOI":"10.1145\/1273463.1273487"},{"key":"6_CR24","doi-asserted-by":"crossref","unstructured":"Vaswani, K., Nori, A.V., Chilimbi, T.M.: Preferential path profiling: compactly numbering interesting paths. In: Proceedings of POPL 2007, Nice, France (January 2007)","DOI":"10.1145\/1190216.1190268"},{"key":"6_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"461","DOI":"10.1007\/978-3-540-31980-1_30","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"W. Weimer","year":"2005","unstructured":"Weimer, W., Necula, G.: Mining temporal specifications for error detection. In: Halbwachs, N., Zuck, L.D. (eds.) TACAS 2005. LNCS, vol.\u00a03440, pp. 461\u2013476. Springer, Heidelberg (2005)"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"Xie, Y., Aiken, A.: Scalable error detection using boolean satisfiability. In: Proceedings of POPL 2005 (2005)","DOI":"10.1145\/1040305.1040334"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"Yang, J., Evans, D., Bhardwaj, D., Bhat, T., Das, M.: Perracotta: Mining temporal api rules from imperfect traces. In: Proceedings of ICSE 2006 (May 2006)","DOI":"10.1145\/1134285.1134325"}],"container-title":["Lecture Notes in Computer Science","Static Analysis"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-69166-2_6.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,3]],"date-time":"2021-05-03T04:30:16Z","timestamp":1620016216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-69166-2_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540691631","9783540691662"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-69166-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[]}}