{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,4,10]],"date-time":"2025-04-10T04:19:15Z","timestamp":1744258755008,"version":"3.40.4"},"publisher-location":"Berlin, Heidelberg","reference-count":37,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642340253"},{"type":"electronic","value":"9783642340260"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34026-0_42","type":"book-chapter","created":{"date-parts":[[2012,9,26]],"date-time":"2012-09-26T01:07:20Z","timestamp":1348621640000},"page":"572-586","source":"Crossref","is-referenced-by-count":5,"title":["Learning-Based Test Programming for Programmers"],"prefix":"10.1007","author":[{"given":"Alex","family":"Groce","sequence":"first","affiliation":[]},{"given":"Alan","family":"Fern","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Erwig","sequence":"additional","affiliation":[]},{"given":"Jervis","family":"Pinto","sequence":"additional","affiliation":[]},{"given":"Tim","family":"Bauer","sequence":"additional","affiliation":[]},{"given":"Amin","family":"Alipour","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"42_CR1","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1016\/0890-5401(87)90052-6","volume":"75","author":"D. Angluin","year":"1987","unstructured":"Angluin, D.: Learning regular sets from queries and counterexamples. Information and Computation\u00a075, 87\u2013106 (1987)","journal-title":"Information and Computation"},{"key":"42_CR2","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1007\/3-540-36577-X_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"J.M. Cobleigh","year":"2003","unstructured":"Cobleigh, J.M., Giannakopoulou, D., P\u0103s\u0103reanu, C.S.: Learning Assumptions for Compositional Verification. In: Garavel, H., Hatcliff, J. (eds.) TACAS 2003. LNCS, vol.\u00a02619, pp. 331\u2013346. Springer, Heidelberg (2003)"},{"key":"42_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/3-540-46002-0_25","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A. Groce","year":"2002","unstructured":"Groce, A., Peled, D., Yannakakis, M.: Adaptive Model Checking. In: Katoen, J.-P., Stevens, P. (eds.) TACAS 2002. LNCS, vol.\u00a02280, pp. 357\u2013370. Springer, Heidelberg (2002)"},{"key":"42_CR4","doi-asserted-by":"crossref","unstructured":"Peled, D., Vardi, M.Y., Yannakakis, M.: Black box checking. In: FORTE, pp. 225\u2013240 (1999)","DOI":"10.1007\/978-0-387-35578-8_13"},{"key":"42_CR5","unstructured":"Brady, B., Bryant, R.E., Seshia, S.A.: Learning conditional abstractions. In: Proceedings of the IEEE International Conference on Formal Methods in Computer-Aided Design (FMCAD), pp. 116\u2013124 (October 2011)"},{"key":"42_CR6","doi-asserted-by":"crossref","unstructured":"Gupta, A., Clarke, E.M.: Reconsidering CEGAR: Learning good abstractions without refinement. In: International Conference on Computer Design, pp. 591\u2013598 (2005)","DOI":"10.1109\/ICCD.2005.91"},{"key":"42_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"19","DOI":"10.1007\/978-3-540-39724-3_5","volume-title":"Correct Hardware Design and Verification Methods","author":"S. Chaki","year":"2003","unstructured":"Chaki, S., Clarke, E., Groce, A., Strichman, O.: Predicate Abstraction with Minimum Predicates. In: Geist, D., Tronci, E. (eds.) CHARME 2003. LNCS, vol.\u00a02860, pp. 19\u201334. Springer, Heidelberg (2003)"},{"key":"42_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"154","DOI":"10.1007\/10722167_15","volume-title":"Computer Aided Verification","author":"E. Clarke","year":"2000","unstructured":"Clarke, E., Grumberg, O., Jha, S., Lu, Y., Veith, H.: Counterexample-Guided Abstraction Refinement. In: Emerson, E.A., Sistla, A.P. (eds.) CAV 2000. LNCS, vol.\u00a01855, pp. 154\u2013169. Springer, Heidelberg (2000)"},{"key":"42_CR9","doi-asserted-by":"publisher","first-page":"105","DOI":"10.1002\/stvr.294","volume":"14","author":"P. McMinn","year":"2004","unstructured":"McMinn, P.: Search-based software test data generation: A survey. Software Testing, Verification, and Reliability\u00a014, 105\u2013156 (2004)","journal-title":"Software Testing, Verification, and Reliability"},{"key":"42_CR10","doi-asserted-by":"crossref","unstructured":"Andrews, J., Li, F., Menzies, T.: Nighthawk: A two-level genetic-random unit test data generator. In: Automated Software Engineering, pp. 144\u2013153 (2007)","DOI":"10.1145\/1321631.1321654"},{"key":"42_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"240","DOI":"10.1007\/11940197_16","volume-title":"Formal Approaches to Software Testing and Runtime Verification","author":"M. Veanes","year":"2006","unstructured":"Veanes, M., Roy, P., Campbell, C.: Online Testing with Reinforcement Learning. In: Havelund, K., N\u00fa\u00f1ez, M., Ro\u015fu, G., Wolff, B. (eds.) FATES\/RV 2006. LNCS, vol.\u00a04262, pp. 240\u2013253. Springer, Heidelberg (2006)"},{"key":"42_CR12","doi-asserted-by":"crossref","unstructured":"Groce, A.: Coverage rewarded: Test input generation via adaptation-based programming. In: IEEE\/ACM International Conference on Automated Software Engineering, pp. 380\u2013383 (2011)","DOI":"10.1109\/ASE.2011.6100077"},{"key":"42_CR13","doi-asserted-by":"publisher","first-page":"774","DOI":"10.1109\/32.238581","volume":"19","author":"P.G. Frankl","year":"1993","unstructured":"Frankl, P.G., Weiss, S.N.: An experimental comparison of the effectiveness of branch testing and data flow testing. IEEE Transactions on Software Engineering\u00a019, 774\u2013787 (1993)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"42_CR14","doi-asserted-by":"crossref","unstructured":"Frankl, P.G., Iakounenko, O.: Further empirical studies of test effectiveness. In: International Symposium on Foundations of Software Engineering, pp. 153\u2013162 (1998)","DOI":"10.1145\/291252.288298"},{"key":"42_CR15","doi-asserted-by":"crossref","unstructured":"Lyu, M.R., Huang, Z., Sze, S.K.S., Cai, X.: An empirical study on testing and fault tolerance for software reliability engineering. In: International Symposium on Software Reliability Engineering, pp. 119\u2013126 (2003)","DOI":"10.1109\/ISSRE.2003.1251036"},{"key":"42_CR16","doi-asserted-by":"crossref","unstructured":"Cai, X., Lyu, M.R.: The effect of code coverage on fault detection under different testing profiles. In: International Workshop on Advances in Model-Based Testing, pp. 1\u20137 (2005)","DOI":"10.1145\/1082983.1083288"},{"key":"42_CR17","doi-asserted-by":"crossref","unstructured":"Sutton, R., Barto, A.: Reinforcement Learning: an Introduction. MIT Press (1998)","DOI":"10.1109\/TNN.1998.712192"},{"key":"42_CR18","doi-asserted-by":"crossref","unstructured":"Groce, A., Holzmann, G., Joshi, R.: Randomized differential testing as a prelude to formal verification. In: International Conference on Software Engineering, pp. 621\u2013631 (2007)","DOI":"10.1109\/ICSE.2007.68"},{"key":"42_CR19","doi-asserted-by":"crossref","unstructured":"Yang, X., Chen, Y., Eide, E., Regehr, J.: Finding and understanding bugs in C compilers. In: Programming Language Design and Implementation, pp. 283\u2013294 (2011)","DOI":"10.1145\/1993316.1993532"},{"key":"42_CR20","doi-asserted-by":"crossref","unstructured":"Claessen, K., Hughes, J.: QuickCheck: a lightweight tool for random testing of haskell programs. In: International Conference on Functional Programming, pp. 268\u2013279 (2000)","DOI":"10.1145\/357766.351266"},{"key":"42_CR21","doi-asserted-by":"crossref","unstructured":"Bauer, T., Erwig, M., Fern, A., Pinto, J.: Adaptation-based programming in Java. In: ACM SIGPLAN Workshop on Partial Evaluation and Program Manipulation, pp. 81\u201390 (2011)","DOI":"10.1145\/1929501.1929518"},{"key":"42_CR22","doi-asserted-by":"crossref","unstructured":"Pinto, J., Fern, A., Bauer, T., Erwig, M.: Robust learning for adaptive programs by leveraging program structure. In: International Conference on Machine Learning and Applications, pp. 943\u2013948 (2010)","DOI":"10.1109\/ICMLA.2010.150"},{"key":"42_CR23","unstructured":"Andre, D., Russel, S.: State abstraction for programmable reinforcement learning agents. In: National Conference on Artificial Intelligence (2002)"},{"issue":"1","key":"42_CR24","first-page":"159","volume":"22","author":"S. Mahadevan","year":"1996","unstructured":"Mahadevan, S.: Agent reward reinforcement learning: Foundations, algorithms, and empirical results. Machine Learning\u00a022(1), 159\u2013195 (1996)","journal-title":"Machine Learning"},{"key":"42_CR25","unstructured":"Fern, A., Pinto, J., Bauer, T.: Adapatation-based programming library in Java, http:\/\/groups.engr.oregonstate.edu\/abp\/"},{"issue":"1","key":"42_CR26","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TCIAIG.2012.2186810","volume":"4","author":"C. Browne","year":"2012","unstructured":"Browne, C., Powley, E., Whitehouse, D., Lucas, S., Cowling, P., Rohlfshagen, P., Tavener, S., Perez, D., Samothrakis, S., Colton, S.: A survey of monte carlo tree search methods. IEEE Transactions on Computational Intelligence and AI in Games\u00a04(1), 1\u201343 (2012)","journal-title":"IEEE Transactions on Computational Intelligence and AI in Games"},{"key":"42_CR27","unstructured":"Gelly, S., Silver, D.: Achieving master level play in 9\u00d7 9 computer go. In: Proceedings of the AAAI on Artificial Intelligence, pp. 1537\u20131540 (2008)"},{"key":"42_CR28","doi-asserted-by":"crossref","unstructured":"Andrews, J.H., Groce, A., Weston, M., Xu, R.G.: Random test run length and effectiveness. In: Automated Software Engineering, pp. 19\u201328 (2008)","DOI":"10.1109\/ASE.2008.12"},{"key":"42_CR29","doi-asserted-by":"crossref","unstructured":"Groce, A., Visser, W.: Model checking Java programs using structural heuristics. In: International Symposium on Software Testing and Analysis, pp. 12\u201321 (2002)","DOI":"10.1145\/566171.566175"},{"issue":"4","key":"42_CR30","doi-asserted-by":"publisher","first-page":"260","DOI":"10.1007\/s10009-003-0130-9","volume":"6","author":"A. Groce","year":"2004","unstructured":"Groce, A., Visser, W.: Heuristics for model checking Java programs. Software Tools for Technology Transfer\u00a06(4), 260\u2013276 (2004)","journal-title":"Software Tools for Technology Transfer"},{"key":"42_CR31","unstructured":"Fowler, M.: Domain-Specific Languages. Addison-Wesley Professional (2010)"},{"issue":"4es","key":"42_CR32","doi-asserted-by":"publisher","first-page":"196","DOI":"10.1145\/242224.242477","volume":"28","author":"P. Hudak","year":"1996","unstructured":"Hudak, P.: Building Domain-Specific Embedded Languages. ACM Computing Surveys\u00a028(4es), 196\u2013196 (1996)","journal-title":"ACM Computing Surveys"},{"key":"42_CR33","unstructured":"Codecover - an open-source glass-box testing tool., http:\/\/codecover.org\/"},{"key":"42_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"76","DOI":"10.1007\/978-3-540-24732-6_6","volume-title":"Model Checking Software","author":"G.J. Holzmann","year":"2004","unstructured":"Holzmann, G.J., Joshi, R.: Model-Driven Software Verification. In: Graf, S., Mounier, L. (eds.) SPIN 2004. LNCS, vol.\u00a02989, pp. 76\u201391. Springer, Heidelberg (2004)"},{"key":"42_CR35","unstructured":"Holzmann, G.J.: The SPIN Model Checker: Primer and Reference Manual. Addison-Wesley Professional (2003)"},{"key":"42_CR36","unstructured":"Groce, A., Holzmann, G., Joshi, R., Xu, R.G.: Putting flight software through the paces with testing, model checking, and constraint-solving. In: International Workshop on Constraints in Formal Verification, pp. 1\u201315 (2008)"},{"issue":"3-4","key":"42_CR37","doi-asserted-by":"publisher","first-page":"283","DOI":"10.1007\/s10515-008-0033-9","volume":"15","author":"G. Holzmann","year":"2008","unstructured":"Holzmann, G., Joshi, R., Groce, A.: Model driven code checking. Automated Software Engineering\u00a015(3-4), 283\u2013297 (2008)","journal-title":"Automated Software Engineering"}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification and Validation. Technologies for Mastering Change"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34026-0_42.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,4,9]],"date-time":"2025-04-09T13:24:20Z","timestamp":1744205060000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34026-0_42"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642340253","9783642340260"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34026-0_42","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}