{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T12:46:51Z","timestamp":1725540411410},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642050886"},{"type":"electronic","value":"9783642050893"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2009]]},"DOI":"10.1007\/978-3-642-05089-3_4","type":"book-chapter","created":{"date-parts":[[2009,11,3]],"date-time":"2009-11-03T22:31:40Z","timestamp":1257287500000},"page":"33-40","source":"Crossref","is-referenced-by-count":1,"title":["Verification, Testing and Statistics"],"prefix":"10.1007","author":[{"given":"Sriram K.","family":"Rajamani","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"4_CR1","doi-asserted-by":"crossref","unstructured":"Ashok, B., Joy, J., Liang, H., Rajamani, S.K., Srinivasa, G., Vangala, V.: DebugAdvisor: A recommendation system for debugging. In: ESEC\/FSE 2009: Foundations of Software Engineering (to appear, 2009)","DOI":"10.1145\/1595696.1595766"},{"key":"4_CR2","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1145\/1217935.1217943","volume-title":"EuroSys 2006: European Systems Conference","author":"T. Ball","year":"2006","unstructured":"Ball, T., Bounimova, E., Cook, B., Levin, V., Lichtenberg, J., McGarvey, C., Ondrusek, B., Rajamani, S.K., Ustuner, A.: Thorough static analysis of device drivers. In: EuroSys 2006: European Systems Conference, pp. 73\u201385. ACM Press, New York (2006)"},{"key":"4_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/3-540-45139-0_7","volume-title":"Model Checking Software","author":"T. Ball","year":"2001","unstructured":"Ball, T., Rajamani, S.K.: Automatically validating temporal safety properties of interfaces. In: Dwyer, M.B. (ed.) SPIN 2001. LNCS, vol.\u00a02057, pp. 103\u2013122. Springer, Heidelberg (2001)"},{"key":"4_CR4","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1145\/1390630.1390634","volume-title":"ISSTA 2008: International Symposium on Software Testing and Analysis","author":"N.E. Beckman","year":"2008","unstructured":"Beckman, N.E., Nori, A.V., Rajamani, S.K., Simmons, R.J.: Proofs from tests. In: ISSTA 2008: International Symposium on Software Testing and Analysis, pp. 3\u201314. ACM Press, New York (2008)"},{"issue":"1-7","key":"4_CR5","doi-asserted-by":"publisher","first-page":"107","DOI":"10.1016\/S0169-7552(98)00110-X","volume":"30","author":"S. Brin","year":"1998","unstructured":"Brin, S., Page, L.: The anatomy of a large-scale hypertextual web search engine. Comput. Netw. ISDN Syst.\u00a030(1-7), 107\u2013117 (1998)","journal-title":"Comput. Netw. ISDN Syst."},{"key":"4_CR6","doi-asserted-by":"crossref","unstructured":"Engler, D., Chelf, B., Chou, A., Hallem, S.: Checking system rules using system-specific, programmer-written compiler extensions. In: OSDI 2000: Operating System Design and Implementation, pp. 1\u201316. Usenix Association (2008)","DOI":"10.21236\/ADA419626"},{"key":"4_CR7","first-page":"232","volume-title":"ICSE 2006: International Conference on Software Engineering","author":"B. Hackett","year":"2006","unstructured":"Hackett, B., Das, M., Wang, D., Yang, Z.: Modular checking for buffer overflows in the large. In: ICSE 2006: International Conference on Software Engineering, pp. 232\u2013241. ACM Press, New York (2006)"},{"key":"4_CR8","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1145\/1065010.1065036","volume-title":"PLDI 2005: Programming Language Design and Implementation","author":"P. Godefroid","year":"2005","unstructured":"Godefroid, P., Klarlund, N., Sen, K.: DART: Directed automated random testing. In: PLDI 2005: Programming Language Design and Implementation, pp. 213\u2013223. ACM Press, New York (2005)"},{"key":"4_CR9","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Nori, A.V., Rajamani, S.K., Tetali, S.: Compositional may-must program analysis: Unleashing the power of alternation. Microsoft Research Technical Report MSR-TR-2009-2. Microsoft Research (2009)","DOI":"10.1145\/1706299.1706307"},{"key":"4_CR10","first-page":"117","volume-title":"FSE 2006: Foundations of Software Engineering","author":"B.S. Gulavani","year":"2006","unstructured":"Gulavani, B.S., Henzinger, T.A., Kannan, Y., Nori, A.V., Rajamani, S.K.: SYNERGY: A new algorithm for property checking. In: FSE 2006: Foundations of Software Engineering, pp. 117\u2013127. ACM Press, New York (2006)"},{"key":"4_CR11","first-page":"58","volume-title":"POPL 2002: Principles of Programming Languages","author":"T.A. Henzinger","year":"2002","unstructured":"Henzinger, T.A., Jhala, R., Majumdar, R., Sutre, G.: Lazy abstraction. In: POPL 2002: Principles of Programming Languages, pp. 58\u201370. ACM Press, New York (2002)"},{"key":"4_CR12","doi-asserted-by":"publisher","first-page":"4","DOI":"10.1145\/345966.345982","volume":"31","author":"J.M. Kleinberg","year":"1999","unstructured":"Kleinberg, J.M.: Hubs, authorities, and communities. ACM Computing Surveys\u00a031, 4es, 5 (1999)","journal-title":"ACM Computing Surveys"},{"issue":"2","key":"4_CR13","doi-asserted-by":"publisher","first-page":"498","DOI":"10.1109\/18.910572","volume":"47","author":"F.R. Kschischang","year":"2001","unstructured":"Kschischang, F.R., Frey, B.J., Loeliger, H.A.: Factor graphs and the sum-product algorithm. IEEE Trans. Information Theory\u00a047(2), 498\u2013519 (2001)","journal-title":"IEEE Trans. Information Theory"},{"key":"4_CR14","first-page":"264","volume-title":"Theory of Computing (STOC)","author":"D. Lee","year":"1992","unstructured":"Lee, D., Yannakakis, M.: On-line minimization of transition systems. In: Theory of Computing (STOC), pp. 264\u2013274. ACM, New York (1992)"},{"key":"4_CR15","volume-title":"PLDI 2009: Programming Language Design and Implementation","author":"B. Livshits","year":"2009","unstructured":"Livshits, B., Nori, A.V., Rajamani, S.K., Banerjee, A.: Merlin: Specification inference for explicit information flow problems. In: PLDI 2009: Programming Language Design and Implementation, ACM Press, New York (to appear, 2009)"},{"key":"4_CR16","unstructured":"Minka, T., Winn, J., Guiver, J., Kannan, A.: Infer.NET 2.2, Microsoft Research Cambridge (2009), http:\/\/research.microsoft.com\/infernet"},{"key":"4_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"178","DOI":"10.1007\/978-3-642-00768-2_17","volume-title":"TACAS 2009","author":"A.V. Nori","year":"2009","unstructured":"Nori, A.V., Rajamani, S.K., Tetali, S., Thakur, A.V.: The Yogi project: Software property checking via static analysis and testing. In: Kowalewski, S., Philippou, A. (eds.) TACAS 2009. LNCS, vol.\u00a05505, pp. 178\u2013181. Springer, Heidelberg (2009)"}],"container-title":["Lecture Notes in Computer Science","FM 2009: Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-05089-3_4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,24]],"date-time":"2020-11-24T02:47:38Z","timestamp":1606186058000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-05089-3_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009]]},"ISBN":["9783642050886","9783642050893"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-05089-3_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2009]]}}}