{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,4]],"date-time":"2025-07-04T17:04:27Z","timestamp":1751648667985},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540712084"},{"type":"electronic","value":"9783540712091"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-71209-1_5","type":"book-chapter","created":{"date-parts":[[2007,7,4]],"date-time":"2007-07-04T22:56:34Z","timestamp":1183589794000},"page":"34-49","source":"Crossref","is-referenced-by-count":3,"title":["Generating Representation Invariants of Structurally Complex Data"],"prefix":"10.1007","author":[{"given":"Muhammad Zubair","family":"Malik","sequence":"first","affiliation":[]},{"given":"Aman","family":"Pervaiz","sequence":"additional","affiliation":[]},{"given":"Sarfraz","family":"Khurshid","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"5_CR1","doi-asserted-by":"crossref","unstructured":"Adjie-Winoto, W., et al.: The design and implementation of an intentional naming system. In: Proc. 17th ACM Symposium on Operating Systems Principles (SOSP), Kiawah Island (December 1999)","DOI":"10.1145\/319151.319164"},{"key":"5_CR2","doi-asserted-by":"crossref","unstructured":"Balaban, I., Pnueli, A., Zuck, L.D.: Shape analysis by predicate abstraction. In: Proc. 6th International Conference on Verification, Model Checking and Abstract Interpretation, Paris, France (2005)","DOI":"10.1007\/978-3-540-30579-8_12"},{"key":"5_CR3","unstructured":"Beck, K., Gamma, E.: Test infected: Programmers love writing tests. Java Report 3(7) (1998)"},{"key":"5_CR4","doi-asserted-by":"crossref","unstructured":"Boyapati, C., Khurshid, S., Marinov, D.: Korat: Automated testing based on Java predicates. In: Proc. International Symposium on Software Testing and Analysis (ISSTA) (July 2002)","DOI":"10.1145\/566172.566191"},{"key":"5_CR5","volume-title":"Introduction to Algorithms","author":"T.H. Cormen","year":"1990","unstructured":"Cormen, T.H., Leiserson, C.E.: Introduction to Algorithms. The MIT Press, Cambridge (1990)"},{"key":"5_CR6","doi-asserted-by":"crossref","unstructured":"Cousot, P., Halbwachs, N.: Automatic discovery of linear restraints among variables of a program. In: Proc. 5th Annual ACM Symposium on the Principles of Programming Languages (POPL), Tucson, Arizona (1978)","DOI":"10.1145\/512760.512770"},{"key":"5_CR7","unstructured":"Ernst, M.D.: Dynamically Discovering Likely Program Invariants. PhD thesis, University of Washington Department of Computer Science and Engineering (August 2000)"},{"key":"5_CR8","doi-asserted-by":"crossref","unstructured":"Flanagan, C., et al.: Extended static checking for Java. In: Proc. ACM SIGPLAN 2002 Conference on Programming language design and implementation (2002)","DOI":"10.1145\/512529.512558"},{"key":"5_CR9","doi-asserted-by":"crossref","unstructured":"German, S.M., Wegbreit, B.: A synthesizer of inductive assertions. IEEE Trans. Software Eng. 1(1) (1975)","DOI":"10.1109\/TSE.1975.6312821"},{"key":"5_CR10","doi-asserted-by":"crossref","unstructured":"Ghiya, R., Hendren, L.J.: Is it a tree, a DAG, or a cyclic graph? A shape analysis for heap-directed pointers in C. In: POPL \u201996: Proceedings of the 23rd ACM SIGPLAN-SIGACT symposium on Principles of programming languages (1996)","DOI":"10.1145\/237721.237724"},{"key":"5_CR11","doi-asserted-by":"crossref","unstructured":"Gupta, N., Heidepriem, Z.V.: A new structural coverage criterion for dynamic detection of program invariants. In: Proc. 18th Conference on Automated Software Engineering (ASE), San Diego, CA (October 2003)","DOI":"10.1109\/ASE.2003.1240294"},{"key":"5_CR12","doi-asserted-by":"crossref","unstructured":"Hangal, S., Lam, M.S.: Tracking down software bugs using automatic anomaly detection. In: ICSE \u201902: Proceedings of the 24th International Conference on Software Engineering (2002)","DOI":"10.1145\/581376.581377"},{"key":"5_CR13","volume-title":"Software Abstractions: Logic, Language and Analysis","author":"D. Jackson","year":"2006","unstructured":"Jackson, D.: Software Abstractions: Logic, Language and Analysis. The MIT Press, Cambridge (2006)"},{"key":"5_CR14","doi-asserted-by":"crossref","unstructured":"Jackson, D., Fekete, A.: Lightweight analysis of object interactions. In: Proc. Fourth International Symposium on Theoretical Aspects of Computer Software, Sendai, Japan (October 2001)","DOI":"10.1007\/3-540-45500-0_25"},{"key":"5_CR15","series-title":"Lecture Notes in Computer Science","volume-title":"Model Checking Software","author":"S. Khurshid","year":"2005","unstructured":"Khurshid, S., Garc\u00eda, I., Suen, Y.L.: Repairing structurally complex data. In: Godefroid, P. (ed.) SPIN 2005. LNCS, vol.\u00a03639, Springer, Heidelberg (2005)"},{"key":"5_CR16","doi-asserted-by":"crossref","unstructured":"Khurshid, S., Malik, M.Z., Uzuncaova, E.: An automated approach for writing Alloy specifications using instances. In: 2nd International Symposium on Leveraging Applications of Formal Methods, Verification and Validation, Paphos, Cyprus (2006)","DOI":"10.1109\/ISoLA.2006.44"},{"key":"5_CR17","unstructured":"Leavens, G.T., Baker, A.L., Ruby, C.: Preliminary design of JML: A behavioral interface specification language for Java. Technical Report TR 98-06i, Department of Computer Science, Iowa State University (June 1998)"},{"key":"5_CR18","series-title":"Lecture Notes in Computer Science","volume-title":"Theory and Applications of Satisfiability Testing","author":"D. Marinov","year":"2005","unstructured":"Marinov, D., et al.: Optimizations for compiling declarative models into boolean formulas. In: Bacchus, F., Walsh, T. (eds.) SAT 2005. LNCS, vol.\u00a03569, Springer, Heidelberg (2005)"},{"key":"5_CR19","doi-asserted-by":"crossref","unstructured":"Moeller, A., Schwartzbach, M.I.:The pointer assertion logic engine. In: Proc. SIGPLAN Conference on Programming Languages Design and Implementation, Snowbird, UT (June 2001)","DOI":"10.1145\/378795.378851"},{"key":"5_CR20","doi-asserted-by":"crossref","unstructured":"Sagiv, M., Reps, T., Wilhelm, R.: Solving shape-analysis problems in languages with destructive updating. ACM Transactions on Programming Languages and Systems (TOPLAS) (January 1998)","DOI":"10.1145\/271510.271517"},{"key":"5_CR21","doi-asserted-by":"crossref","unstructured":"Sankaranarayanan, S., Sipma, H.B., Manna, Z.: Non-linear loop invariant generation using groebner bases. In: POPL \u201904: Proceedings of the 31st ACM SIGPLAN-SIGACT symposium on Principles of programming languages (2004)","DOI":"10.1145\/964001.964028"},{"key":"5_CR22","doi-asserted-by":"crossref","unstructured":"Taghdiri, M.: Inferring specifications to detect errors in code. In: Proceedings of the 19th IEEE International Conference on Automated Software Engineering, Washington, DC (2004)","DOI":"10.1109\/ASE.2004.1342732"},{"key":"5_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-45319-9_9","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A. Tiwari","year":"2001","unstructured":"Tiwari, A., et al.: A technique for invariant generation. In: Margaria, T., Yi, W. (eds.) ETAPS 2001 and TACAS 2001. LNCS, vol.\u00a02031, Springer, Heidelberg (2001)"},{"key":"5_CR24","unstructured":"Vaziri, M., Holzmann, G.: Automatic detection of invariants in spin. In: Proc. SPIN Workshop on Software Model Checking (November 1998)"},{"key":"5_CR25","doi-asserted-by":"crossref","unstructured":"Whaley, J., Martin, M.C., Lam, M.S.: Automatic extraction of object-oriented component interfaces. In: Proc. International Symposium on Software Testing and Analysis, ISSTA (July 2002)","DOI":"10.1145\/566172.566212"}],"container-title":["Lecture Notes in Computer Science","Tools and Algorithms for the Construction and Analysis of Systems"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-71209-1_5.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,19]],"date-time":"2020-11-19T05:16:54Z","timestamp":1605763014000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-71209-1_5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540712084","9783540712091"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-71209-1_5","relation":{},"subject":[]}}