{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T00:50:02Z","timestamp":1725670202846},"publisher-location":"Berlin, Heidelberg","reference-count":25,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642287558"},{"type":"electronic","value":"9783642287565"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-28756-5_2","type":"book-chapter","created":{"date-parts":[[2012,3,22]],"date-time":"2012-03-22T20:57:15Z","timestamp":1332449835000},"page":"2-17","source":"Crossref","is-referenced-by-count":7,"title":["History-Aware Data Structure Repair Using SAT"],"prefix":"10.1007","author":[{"given":"Razieh","family":"Nokhbeh Zaeem","sequence":"first","affiliation":[]},{"given":"Divya","family":"Gopinath","sequence":"additional","affiliation":[]},{"given":"Sarfraz","family":"Khurshid","sequence":"additional","affiliation":[]},{"given":"Kathryn S.","family":"McKinley","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"2_CR1","doi-asserted-by":"crossref","unstructured":"Blackburn, S.M., Hosking, A.: Barriers: Friend or foe? In: ISMM (2004)","DOI":"10.1145\/1029873.1029891"},{"key":"2_CR2","doi-asserted-by":"crossref","unstructured":"Blackburn, S.M., et al.: The DaCapo Benchmarks: Java Benchmarking Development and Analysis. In: OOPSLA (2006)","DOI":"10.1145\/1167473.1167488"},{"key":"2_CR3","doi-asserted-by":"crossref","unstructured":"Boyapati, C., Khurshid, S., Marinov, D.: Korat: Automated testing based on Java predicates. In: ISSTA (2002)","DOI":"10.1145\/566189.566191"},{"key":"2_CR4","doi-asserted-by":"crossref","unstructured":"Demsky, B., Rinard, M.: Automatic detection and repair of errors in data structures. In: OOPSLA (2003)","DOI":"10.1145\/949313.949314"},{"key":"2_CR5","doi-asserted-by":"crossref","unstructured":"Elkarablieh, B., Garcia, I., Suen, Y.L., Khurshid, S.: Assertion-based repair of complex data structures. In: ASE (2007)","DOI":"10.1145\/1321631.1321643"},{"key":"2_CR6","unstructured":"Ext2 fsck. manual page, \n                    \n                      http:\/\/e2fsprogs.sourceforge.net"},{"issue":"6 part 2","key":"2_CR7","doi-asserted-by":"crossref","first-page":"1385","DOI":"10.1002\/j.1538-7305.1985.tb00280.x","volume":"64","author":"G. Haugk","year":"1985","unstructured":"Haugk, G., Lax, F., Royer, R., Williams, J.: The 5ESS(TM) switching system: Maintenance capabilities. AT&T Technical Journal\u00a064(6 part 2), 1385\u20131416 (1985)","journal-title":"AT&T Technical Journal"},{"key":"2_CR8","doi-asserted-by":"crossref","unstructured":"Hussain, I., Csallner, C.: Dynamic symbolic data structure repair. In: ICSE (2010)","DOI":"10.1145\/1810295.1810333"},{"key":"2_CR9","unstructured":"Jackson, D.: Software Abstractions: Logic, Language, and Analysis. The MIT Press (2006)"},{"key":"2_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"123","DOI":"10.1007\/11537328_12","volume-title":"Model Checking Software","author":"S. Khurshid","year":"2005","unstructured":"Khurshid, S., Garc\u00eda, I., Suen, Y.L.: Repairing Structurally Complex Data. In: Godefroid, P. (ed.) SPIN 2005. LNCS, vol.\u00a03639, pp. 123\u2013138. Springer, Heidelberg (2005)"},{"key":"2_CR11","doi-asserted-by":"crossref","unstructured":"Malik, M.Z., Ghori, K., Elkarablieh, B., Khurshid, S.: A case for automated debugging using data structure repair. In: ASE (2009)","DOI":"10.1109\/ASE.2009.92"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Mayer, W., Stumptner, M.: Evaluating models for Model-Based debugging. In: ASE (2008)","DOI":"10.1109\/ASE.2008.23"},{"key":"2_CR13","unstructured":"Microsoft. chkdsk manual page, \n                    \n                      http:\/\/support.microsoft.com\/kb\/315265"},{"issue":"10","key":"2_CR14","doi-asserted-by":"publisher","first-page":"1135","DOI":"10.1109\/TSE.1987.232855","volume":"13","author":"S. Mourad","year":"1987","unstructured":"Mourad, S., Andrews, D.: On the reliability of the IBM MVS\/XA operating system. IEEE Transactions on Software Engineering\u00a013(10), 1135\u20131139 (1987)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Novark, G., Berger, E.D., Zorn, B.G.: Exterminator: automatically correcting memory errors with high probability. In: PLDI (2007)","DOI":"10.1145\/1250734.1250736"},{"key":"2_CR16","unstructured":"Parr, T., Bovet, J.: Antlr parser generator home page, \n                    \n                      http:\/\/www.antlr.org"},{"key":"2_CR17","doi-asserted-by":"crossref","unstructured":"Perkins, J., et al.: Automatically patching errors in deployed software. In: SOSP (2009)","DOI":"10.1145\/1629575.1629585"},{"key":"2_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"552","DOI":"10.1007\/978-3-642-14107-2_26","volume-title":"ECOOP 2010 \u2013 Object-Oriented Programming","author":"H. Samimi","year":"2010","unstructured":"Samimi, H., Aung, E.D., Millstein, T.: Falling Back on Executable Specifications. In: D\u2019Hondt, T. (ed.) ECOOP 2010. LNCS, vol.\u00a06183, pp. 552\u2013576. Springer, Heidelberg (2010)"},{"issue":"3","key":"2_CR19","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1109\/TSMC.1983.6313167","volume":"13","author":"A. Sanfeliu","year":"1983","unstructured":"Sanfeliu, A., Fu, K.-S.: Distance measure between attributed relational graphs for pattern recognition. IEEE Trans. Systems, Man and Cybernetics\u00a013(3), 353\u2013362 (1983)","journal-title":"IEEE Trans. Systems, Man and Cybernetics"},{"key":"2_CR20","unstructured":"Smirnov, A., Chiueh, T.-c.: DIRA: Automatic detection, identification, and repair of control-hijacking attacks. In: NDSS (2005)"},{"key":"2_CR21","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/11560548_6","volume-title":"Correct Hardware Design and Verification Methods","author":"S. Staber","year":"2005","unstructured":"Staber, S., Jobstmann, B., Bloem, R.: Finding and Fixing Faults. In: Borrione, D., Paul, W. (eds.) CHARME 2005. LNCS, vol.\u00a03725, pp. 35\u201349. Springer, Heidelberg (2005)"},{"key":"2_CR22","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"632","DOI":"10.1007\/978-3-540-71209-1_49","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"E. Torlak","year":"2007","unstructured":"Torlak, E., Jackson, D.: Kodkod: A Relational Model Finder. In: Grumberg, O., Huth, M. (eds.) TACAS 2007. LNCS, vol.\u00a04424, pp. 632\u2013647. Springer, Heidelberg (2007)"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Wei, Y., et al.: Automated fixing of programs with contracts. In: ISSTA (2010)","DOI":"10.1145\/1831708.1831716"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Weimer, W.: Patches as better bug reports. In: GPCE (2006)","DOI":"10.1145\/1173706.1173734"},{"key":"2_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"577","DOI":"10.1007\/978-3-642-14107-2_27","volume-title":"ECOOP 2010 \u2013 Object-Oriented Programming","author":"R.N. Zaeem","year":"2010","unstructured":"Zaeem, R.N., Khurshid, S.: Contract-Based Data Structure Repair Using Alloy. In: D\u2019Hondt, T. (ed.) ECOOP 2010. LNCS, vol.\u00a06183, pp. 577\u2013598. Springer, Heidelberg (2010)"}],"container-title":["Lecture Notes in Computer Science","Tools and Algorithms for the Construction and Analysis of Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-28756-5_2.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,4]],"date-time":"2021-05-04T11:08:48Z","timestamp":1620126528000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-28756-5_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642287558","9783642287565"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-28756-5_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}