{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:12:01Z","timestamp":1763467921310},"publisher-location":"Berlin, Heidelberg","reference-count":38,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642007675"},{"type":"electronic","value":"9783642007682"}],"license":[{"start":{"date-parts":[[2009,1,1]],"date-time":"2009-01-01T00:00:00Z","timestamp":1230768000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-00768-2_26","type":"book-chapter","created":{"date-parts":[[2009,3,26]],"date-time":"2009-03-26T21:16:10Z","timestamp":1238102170000},"page":"292-306","source":"Crossref","is-referenced-by-count":41,"title":["Specification Mining with Few False Positives"],"prefix":"10.1007","author":[{"given":"Claire","family":"Le Goues","sequence":"first","affiliation":[]},{"given":"Westley","family":"Weimer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"26_CR1","doi-asserted-by":"crossref","unstructured":"Alur, R., Cerny, P., Madhusudan, P., Nam, W.: Synthesis of interface specifications for Java classes. In: POPL (2005)","DOI":"10.1145\/1040305.1040314"},{"key":"26_CR2","doi-asserted-by":"crossref","unstructured":"Ammons, G., Bodik, R., Larus, J.R.: Mining specifications. In: POPL, pp. 4\u201316 (2002)","DOI":"10.1145\/503272.503275"},{"key":"26_CR3","doi-asserted-by":"crossref","unstructured":"Ammons, G., Mandelin, D., Bod\u00edk, R., Larus, J.R.: Debugging temporal specifications with concept analysis. In: Programming Language Design and Implementation, pp. 182\u2013195 (2003)","DOI":"10.1145\/780822.781152"},{"key":"26_CR4","doi-asserted-by":"crossref","unstructured":"Ball, T.: A theory of predicate-complete test coverage and generation. In: FMCO, pp. 1\u201322 (2004)","DOI":"10.1007\/11561163_1"},{"key":"26_CR5","doi-asserted-by":"crossref","unstructured":"Ball, T., Bounimova, E., Cook, B., Levin, V., Lichtenberg, J., McGarvey, C., Ondrusek, B., Rajamani, S.K., Ustuner, A.: Thorough static analysis of device drivers. In: European Systems Conference, April 2006, pp. 103\u2013122 (2006)","DOI":"10.1145\/1217935.1217943"},{"key":"26_CR6","doi-asserted-by":"crossref","unstructured":"Buse, R.P.L., Weimer, W.: Automatic documentation inference for exceptions. In: ISSTA, pp. 273\u2013282 (2008)","DOI":"10.1145\/1390630.1390664"},{"key":"26_CR7","doi-asserted-by":"crossref","unstructured":"Buse, R.P.L., Weimer, W.: A metric for software readability. In: ISSTA, pp. 121\u2013130 (2008)","DOI":"10.1145\/1390630.1390647"},{"key":"26_CR8","doi-asserted-by":"crossref","unstructured":"Buse, R.P.L., Weimer, W.: The road not taken: Estimating path execution frequency statically (2009)","DOI":"10.1109\/ICSE.2009.5070516"},{"key":"26_CR9","unstructured":"Chen, H., Wagner, D., Dean, D.: Setuid demystified. In: USENIX Security Symposium, pp. 171\u2013190 (2002)"},{"key":"26_CR10","doi-asserted-by":"crossref","unstructured":"Corbett, J.C., Dwyer, M.B., Hatcliff, J., Laubach, S., Pasareanu, C., Robby, Zheng, H.: Bandera: extracting finite-state models from Java source code. In: ICSE, pp. 762\u2013765 (2000)","DOI":"10.1145\/337180.337234"},{"key":"26_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/11817963_1","volume-title":"Computer Aided Verification","author":"M. Das","year":"2006","unstructured":"Das, M.: Formal specifications on industrial-strength code\u2014from myth to reality. In: Ball, T., Jones, R.B. (eds.) CAV 2006. LNCS, vol.\u00a04144, p. 1. Springer, Heidelberg (2006)"},{"key":"26_CR12","doi-asserted-by":"crossref","unstructured":"de Souza, S.C.B., Anquetil, N., de Oliveira, K.M.: A study of the documentation essential to software maintenance. In: SIGDOC, pp. 68\u201375 (2005)","DOI":"10.1145\/1085313.1085331"},{"key":"26_CR13","doi-asserted-by":"crossref","unstructured":"DeLine, R., F\u00e4hndrich, M.: Enforcing high-level protocols in low-level software. In: PLDI, pp. 59\u201369 (2001)","DOI":"10.1145\/381694.378811"},{"key":"26_CR14","doi-asserted-by":"crossref","unstructured":"Engler, D., Chelf, B., Chou, A., Hallem, S.: Checking system rules using system-specific, programmer-written compiler extensions. In: Symposium on Operating Systems Design and Implementation (2000)","DOI":"10.21236\/ADA419626"},{"key":"26_CR15","doi-asserted-by":"crossref","unstructured":"Engler, D.R., Chen, D.Y., Chou, A.: Bugs as inconsistent behavior: A general approach to inferring errors in systems code. In: SOSP, pp. 57\u201372 (2001)","DOI":"10.21236\/ADA419584"},{"key":"26_CR16","doi-asserted-by":"crossref","unstructured":"Flanagan, C., Leino, K.R.M., Lillibridge, M., Nelson, G., Saxe, J.B., Stata, R.: Extended static checking for Java. In: PLDI, pp. 234\u2013245 (2002)","DOI":"10.1145\/512529.512558"},{"key":"26_CR17","doi-asserted-by":"crossref","unstructured":"Gabel, M., Su, Z.: Symbolic mining of temporal specifications. In: ICSE, pp. 51\u201360 (2008)","DOI":"10.1145\/1368088.1368096"},{"issue":"5","key":"26_CR18","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1016\/S0019-9958(67)91165-5","volume":"10","author":"E.M. Gold","year":"1967","unstructured":"Gold, E.M.: Language identification in the limit. Information and Control\u00a010(5), 447\u2013474 (1967)","journal-title":"Information and Control"},{"key":"26_CR19","doi-asserted-by":"crossref","unstructured":"Hovemeyer, D., Pugh, W.: Finding bugs is easy. In: OOPSLA Companion, pp. 132\u2013136 (2004)","DOI":"10.1145\/1028664.1028717"},{"issue":"2","key":"26_CR20","doi-asserted-by":"publisher","first-page":"249","DOI":"10.1147\/rd.312.0249","volume":"31","author":"R.M. Karp","year":"1987","unstructured":"Karp, R.M., Rabin, M.O.: Efficient randomized pattern-matching algorithms. IBM J. Res. Dev.\u00a031(2), 249\u2013260 (1987)","journal-title":"IBM J. Res. Dev."},{"key":"26_CR21","doi-asserted-by":"crossref","unstructured":"Kataoka, Y., Ernst, M., Griswold, W., Notkin, D.: Automated support for program refactoring using invariants. In: ICSM, pp. 736\u2013743 (2001)","DOI":"10.1109\/ICSM.2001.972794"},{"issue":"2","key":"26_CR22","first-page":"1137","volume":"14","author":"R. Kohavi","year":"1995","unstructured":"Kohavi, R.: A study of cross-validation and bootstrap for accuracy estimation and model selection. IJCAI\u00a014(2), 1137\u20131145 (1995)","journal-title":"IJCAI"},{"key":"26_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"110","DOI":"10.1007\/11901914_11","volume-title":"Automated Technology for Verification and Analysis","author":"O. Kupferman","year":"2006","unstructured":"Kupferman, O., Lampert, R.: On the construction of fine automata for safety properties. In: Graf, S., Zhang, W. (eds.) ATVA 2006. LNCS, vol.\u00a04218, pp. 110\u2013124. Springer, Heidelberg (2006)"},{"issue":"1","key":"26_CR24","doi-asserted-by":"publisher","first-page":"364","DOI":"10.1145\/1047659.1040335","volume":"40","author":"S. Lerner","year":"2005","unstructured":"Lerner, S., Millstein, T., Rice, E., Chambers, C.: Automated soundness proofs for dataflow analyses and transformations via local rules. SIGPLAN Not.\u00a040(1), 364\u2013377 (2005)","journal-title":"SIGPLAN Not."},{"key":"26_CR25","unstructured":"Livshits, V.B., Lam, M.S.: Finding security errors in Java programs with static analysis. In: USENIX Security Symposium, August 2005, pp. 271\u2013286 (2005)"},{"key":"26_CR26","doi-asserted-by":"crossref","unstructured":"Malayeri, D., Aldrich, J.: Practical exception specifications. In: Advanced Topics in Exception Handling Techniques, pp. 200\u2013220 (2006)","DOI":"10.1007\/11818502_11"},{"key":"26_CR27","doi-asserted-by":"crossref","unstructured":"Nagappan, N., Ball, T.: Using software dependencies and churn metrics to predict field failures: An empirical case study. In: ESEM, pp. 364\u2013373 (2007)","DOI":"10.1109\/ESEM.2007.13"},{"key":"26_CR28","unstructured":"National Institute of Standards and Technology. The economic impacts of inadequate infrastructure for software testing. Technical Report 02-3 (May 2002)"},{"key":"26_CR29","volume-title":"Software Engineering: Theory and Practice","author":"S.L. Pfleeger","year":"2001","unstructured":"Pfleeger, S.L.: Software Engineering: Theory and Practice. Prentice Hall PTR, Upper Saddle River (2001)"},{"key":"26_CR30","volume-title":"Practical Software Maintenance: Best Practices for Managing Your Software Investment","author":"T.M. Pigoski","year":"1996","unstructured":"Pigoski, T.M.: Practical Software Maintenance: Best Practices for Managing Your Software Investment. John Wiley & Sons, Inc., Chichester (1996)"},{"issue":"10","key":"26_CR31","doi-asserted-by":"publisher","first-page":"47","DOI":"10.1109\/2.539720","volume":"29","author":"C.V. Ramamoothy","year":"1996","unstructured":"Ramamoothy, C.V., Tsai, W.-T.: Advances in software engineering. IEEE Computer\u00a029(10), 47\u201358 (1996)","journal-title":"IEEE Computer"},{"key":"26_CR32","unstructured":"Seacord, R.C., Plakosh, D., Lewis, G.A.: Modernizing Legacy Systems: Software Technologies, Engineering Process and Business Practices (2003)"},{"key":"26_CR33","doi-asserted-by":"crossref","unstructured":"Shoham, S., Yahav, E., Fink, S., Pistoia, M.: Static specification mining using automata-based abstractions. In: ISSTA, pp. 174\u2013184 (2007)","DOI":"10.1145\/1273463.1273487"},{"key":"26_CR34","doi-asserted-by":"crossref","unstructured":"Weimer, W.: Patches as better bug reports. In: GPCE, pp. 181\u2013190 (2006)","DOI":"10.1145\/1173706.1173734"},{"issue":"1","key":"26_CR35","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/TSE.2007.70744","volume":"34","author":"W. Weimer","year":"2008","unstructured":"Weimer, W., Mishra, N.: Privately finding specifications. IEEE Trans. Software Eng.\u00a034(1), 21\u201332 (2008)","journal-title":"IEEE Trans. Software Eng."},{"key":"26_CR36","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"461","DOI":"10.1007\/978-3-540-31980-1_30","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"W. Weimer","year":"2005","unstructured":"Weimer, W., Necula, G.C.: Mining temporal specifications for error detection. In: Halbwachs, N., Zuck, L.D. (eds.) TACAS 2005. LNCS, vol.\u00a03440, pp. 461\u2013476. Springer, Heidelberg (2005)"},{"key":"26_CR37","doi-asserted-by":"crossref","unstructured":"Whaley, J., Martin, M.C., Lam, M.S.: Automatic extraction of object-oriented component interfaces. In: ISSTA (2002)","DOI":"10.1145\/566172.566212"},{"key":"26_CR38","doi-asserted-by":"crossref","unstructured":"Yang, J., Evans, D., Bhardwaj, D., Bhat, T., Das, M.: Perracotta: mining temporal API rules from imperfect traces. In: ICSE, pp. 282\u2013291 (2006)","DOI":"10.1145\/1134285.1134325"}],"container-title":["Lecture Notes in Computer Science","Tools and Algorithms for the Construction and Analysis of Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-00768-2_26","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,18]],"date-time":"2019-05-18T23:52:37Z","timestamp":1558223557000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-00768-2_26"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642007675","9783642007682"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-00768-2_26","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}