{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T23:49:49Z","timestamp":1725752989207},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642412011"},{"type":"electronic","value":"9783642412028"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-41202-8_4","type":"book-chapter","created":{"date-parts":[[2013,10,21]],"date-time":"2013-10-21T05:11:19Z","timestamp":1382332279000},"page":"36-52","source":"Crossref","is-referenced-by-count":3,"title":["Mining Dataflow Sensitive Specifications"],"prefix":"10.1007","author":[{"given":"Zhiqiang","family":"Zuo","sequence":"first","affiliation":[]},{"given":"Siau-Cheng","family":"Khoo","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"unstructured":"Agrawal, R., Srikant, R.: Mining sequential patterns. In: ICDE 1995 (1995)","key":"4_CR1"},{"doi-asserted-by":"crossref","unstructured":"Ammons, G., Bod\u00edk, R., Larus, J.R.: Mining specifications. In: POPL 2002 (2002)","key":"4_CR2","DOI":"10.1145\/503272.503275"},{"unstructured":"Damm, W., Harel, D.: Lscs: Breathing life into message sequence charts. Tech. rep.","key":"4_CR3"},{"doi-asserted-by":"crossref","unstructured":"Ernst, M.D., Cockrell, J., Griswold, W.G., Notkin, D.: Dynamically discovering likely program invariants to support program evolution. TSE (2001)","key":"4_CR4","DOI":"10.1109\/32.908957"},{"doi-asserted-by":"crossref","unstructured":"Horwitz, S., Reps, T., Binkley, D.: Interprocedural slicing using dependence graphs. In: PLDI 1988, NY, USA (1988)","key":"4_CR5","DOI":"10.1145\/53990.53994"},{"unstructured":"ITU-T: Itu-t recommendation z.120: Message sequence chart (msc) (1999)","key":"4_CR6"},{"key":"4_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/978-3-540-31980-1_29","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"H. Kugler","year":"2005","unstructured":"Kugler, H., Harel, D., Pnueli, A., Lu, Y., Bontemps, Y.: Temporal logic for scenario-based specifications. In: Halbwachs, N., Zuck, L.D. (eds.) TACAS 2005. LNCS, vol.\u00a03440, pp. 445\u2013460. Springer, Heidelberg (2005)"},{"doi-asserted-by":"crossref","unstructured":"Lee, C., Chen, F., Ro\u015fu, G.: Mining parametric specifications. In: ICSE 2011, NY, USA (2011)","key":"4_CR8","DOI":"10.1145\/1985793.1985874"},{"doi-asserted-by":"crossref","unstructured":"Lo, D., Khoo, S.C., Liu, C.: Efficient mining of iterative patterns for software specification discovery. In: KDD 2007, New York, NY, USA (2007)","key":"4_CR9","DOI":"10.1145\/1281192.1281243"},{"doi-asserted-by":"crossref","unstructured":"Masseglia, F., Poncelet, P., Teisseire, M.: Incremental mining of sequential patterns in large databases. Data Knowl. Eng. (2003)","key":"4_CR10","DOI":"10.1016\/S0169-023X(02)00209-4"},{"doi-asserted-by":"crossref","unstructured":"Olender, K.M., Osterweil, L.J.: Cecil: A sequencing constraint language for automatic static analysis generation. IEEE Trans. Softw. Eng. (1990)","key":"4_CR11","DOI":"10.1109\/32.48935"},{"doi-asserted-by":"crossref","unstructured":"Pradel, M., Gross, T.R.: Automatic generation of object usage specifications from large method traces. In: ASE 2009. IEEE Computer Society, USA (2009)","key":"4_CR12","DOI":"10.1109\/ASE.2009.60"},{"unstructured":"Raja, V.R.: Soot: A Java Bytecode Optimization Framework. Master\u2019s thesis, School of Computer Science, McGill University, Montreal (2000)","key":"4_CR13"},{"doi-asserted-by":"crossref","unstructured":"Thummalapenta, S., Xie, T.: Alattin: Mining alternative patterns for detecting neglected conditions. In: ASE 2009. IEEE Computer Society, USA (2009)","key":"4_CR14","DOI":"10.1109\/ASE.2009.72"},{"doi-asserted-by":"crossref","unstructured":"Thummalapenta, S., Xie, T.: Mining exception-handling rules as sequence association rules. In: ICSE 2009, Washington, DC, USA (2009)","key":"4_CR15","DOI":"10.1109\/ICSE.2009.5070548"},{"unstructured":"Tip, F.: A survey of program slicing techniques. Tech. rep. (1994)","key":"4_CR16"},{"doi-asserted-by":"crossref","unstructured":"Wasylkowski, A., Zeller, A., Lindig, C.: Detecting object usage anomalies. FSE 2007 (2007)","key":"4_CR17","DOI":"10.1145\/1287624.1287632"},{"unstructured":"Zhang, X., Gupta, R., Zhang, Y.: Precise dynamic slicing algorithms. In: ICSE 2003 (2003)","key":"4_CR18"}],"container-title":["Lecture Notes in Computer Science","Formal Methods and Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-41202-8_4","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,23]],"date-time":"2019-05-23T20:34:17Z","timestamp":1558643657000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-41202-8_4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642412011","9783642412028"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-41202-8_4","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}