{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,5]],"date-time":"2026-02-05T12:30:14Z","timestamp":1770294614422,"version":"3.49.0"},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783642005923","type":"print"},{"value":"9783642005930","type":"electronic"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00593-0_25","type":"book-chapter","created":{"date-parts":[[2009,3,27]],"date-time":"2009-03-27T06:26:08Z","timestamp":1238135168000},"page":"370-384","source":"Crossref","is-referenced-by-count":50,"title":["Mining API Error-Handling Specifications from Source Code"],"prefix":"10.1007","author":[{"given":"Mithun","family":"Acharya","sequence":"first","affiliation":[]},{"given":"Tao","family":"Xie","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"25_CR1","unstructured":"IEEE Computer Society. IEEE Standard for Information Technology - Portable Operating System Interface POSIX - Part I: System Application Program Interface API, IEEE Std 1003.1b-1993 (1994)"},{"key":"25_CR2","doi-asserted-by":"crossref","unstructured":"Acharya, M., Xie, T., Pei, J., Xu, J.: Mining API patterns as partial orders from source code: From usage scenarios to specifications. In: Proc. ESEC\/FSE, pp. 25\u201334 (2007)","DOI":"10.1145\/1287624.1287630"},{"key":"25_CR3","doi-asserted-by":"crossref","unstructured":"Ammons, G., Bodik, R., Larus, J.: Mining specifications. In: Proc. POPL, pp. 4\u201316 (2002)","DOI":"10.1145\/503272.503275"},{"key":"25_CR4","doi-asserted-by":"crossref","unstructured":"Bruntink, M., Deursen, A.V., Tourwe, T.: Discovering faults in idiom-based exception handling. In: Proc. ICSE, pp. 242\u2013251 (2006)","DOI":"10.1145\/1134285.1134320"},{"key":"25_CR5","doi-asserted-by":"crossref","unstructured":"Chang, R.Y., Podgurski, A.: Finding what\u2019s not there: A new approach to revealing neglected conditions in software. In: Proc. ISSTA, pp. 163\u2013173 (2007)","DOI":"10.1145\/1273463.1273486"},{"key":"25_CR6","doi-asserted-by":"crossref","unstructured":"Chen, H., Wagner, D.: MOPS: an infrastructure for examining security properties of software. In: Proc. CCS, pp. 235\u2013244 (2002)","DOI":"10.1145\/586110.586142"},{"key":"25_CR7","volume-title":"Exception Handling and Tolerance of Software Faults. In Software Fault Tolerance","author":"F. Cristian","year":"1995","unstructured":"Cristian, F.: Exception Handling and Tolerance of Software Faults. In Software Fault Tolerance, ch.\u00a05. John Wiley and Sons, Chichester (1995)"},{"key":"25_CR8","doi-asserted-by":"crossref","unstructured":"Engler, D., Chen, D.Y., Hallem, S., Chou, A., Chelf, B.: Bugs as deviant behavior: A general approach to inferring errors in systems code. In: Proc. SOSP, pp. 57\u201372 (2001)","DOI":"10.1145\/502034.502041"},{"issue":"10","key":"25_CR9","doi-asserted-by":"publisher","first-page":"827","DOI":"10.1002\/spe.4380221003","volume":"22","author":"N.H. Gehani","year":"1992","unstructured":"Gehani, N.H.: Exceptional C for C with exceptions. Software Practices and Experiences\u00a022(10), 827\u2013848 (1992)","journal-title":"Software Practices and Experiences"},{"key":"25_CR10","unstructured":"Gunawi, H., Rubio-Gonzalez, C., Arpaci-Dusseau, A., Arpaci-Dusseau, R., Liblit, B.: EIO: Error handling is occasionally correct. In: Proc. USENIX FAST, pp. 242\u2013251 (2006)"},{"key":"25_CR11","doi-asserted-by":"crossref","unstructured":"Li, Z., Zhou, Y.: PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code. In: Proc. ESEC\/FSE, pp. 306\u2013315 (2005)","DOI":"10.1145\/1081706.1081755"},{"key":"25_CR12","doi-asserted-by":"crossref","unstructured":"Ramanathan, M.K., Grama, A., Jagannathan, S.: Static specification inference using predicate mining. In: Proc. PLDI, pp. 123\u2013134 (2007)","DOI":"10.1145\/1250734.1250749"},{"key":"25_CR13","unstructured":"Rosenthal, D.: Inter-client communication Conventions Manual (ICCCM), Version 2.0. X Consortium, Inc. (1994)"},{"key":"25_CR14","unstructured":"Toy, W.: Fault-tolerant design of local ESS processors. In: The Theory and Practice of Reliable System Design. Digital Press (1982)"},{"key":"25_CR15","doi-asserted-by":"crossref","unstructured":"Wang, J., Han, J.: BIDE: Efficient mining of frequent closed sequences. In: Proc. ICDE, pp. 79\u201390 (2004)","DOI":"10.1109\/ICDE.2004.1319986"},{"key":"25_CR16","doi-asserted-by":"crossref","unstructured":"Weimer, W., Necula, G.C.: Finding and preventing run-time error handling mistakes. In: Proc. OOPSLA, pp. 419\u2013431 (2004)","DOI":"10.1145\/1028976.1029011"},{"key":"25_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/978-3-540-31980-1_30","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"W. Weimer","year":"2005","unstructured":"Weimer, W., Necula, G.C.: Mining temporal specifications for error detection. In: Halbwachs, N., Zuck, L.D. (eds.) TACAS 2005. LNCS, vol.\u00a03440, pp. 461\u2013476. Springer, Heidelberg (2005)"},{"key":"25_CR18","doi-asserted-by":"crossref","unstructured":"Yang, J., Evans, D., Bhardwaj, D., Bhat, T., Das, M.: Perracotta: Mining temporal API rules from imperfect traces. In: Proc. ICSE, pp. 282\u2013291 (2006)","DOI":"10.1145\/1134285.1134325"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00593-0_25","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T00:19:38Z","timestamp":1558225178000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00593-0_25"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642005923","9783642005930"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00593-0_25","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2009]]}}}