{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,31]],"date-time":"2025-12-31T20:15:20Z","timestamp":1767212120210},"publisher-location":"Berlin, Heidelberg","reference-count":22,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642548031"},{"type":"electronic","value":"9783642548048"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-642-54804-8_17","type":"book-chapter","created":{"date-parts":[[2014,3,21]],"date-time":"2014-03-21T05:59:16Z","timestamp":1395381556000},"page":"246-260","source":"Crossref","is-referenced-by-count":12,"title":["Automatic Program Repair by Fixing Contracts"],"prefix":"10.1007","author":[{"given":"Yu","family":"Pei","sequence":"first","affiliation":[]},{"given":"Carlo A.","family":"Furia","sequence":"additional","affiliation":[]},{"given":"Martin","family":"Nordio","sequence":"additional","affiliation":[]},{"given":"Bertrand","family":"Meyer","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","doi-asserted-by":"crossref","unstructured":"Ammons, G., Bod\u00edk, R., Larus, J.R.: Mining specifications. In: POPL, pp. 4\u201316 (2002)","DOI":"10.1145\/565816.503275"},{"issue":"4","key":"17_CR2","doi-asserted-by":"publisher","first-page":"3494","DOI":"10.1016\/j.asoc.2011.01.023","volume":"11","author":"A. Arcuri","year":"2011","unstructured":"Arcuri, A.: Evolutionary repair of faulty software. Applied Soft Computing\u00a011(4), 3494\u20133514 (2011)","journal-title":"Applied Soft Computing"},{"issue":"1","key":"17_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1002\/stvr.415","volume":"21","author":"I. Ciupa","year":"2011","unstructured":"Ciupa, I., Pretschner, A., Oriol, M., Leitner, A., Meyer, B.: On the number and nature of faults found by random testing. Softw. Test., Verif. Reliab.\u00a021(1), 3\u201328 (2011)","journal-title":"Softw. Test., Verif. Reliab."},{"key":"17_CR4","doi-asserted-by":"crossref","unstructured":"Cousot, P., Halbwachs, N.: Automatic discovery of linear restraints among variables of a program. In: POPL, pp. 84\u201396 (1978)","DOI":"10.1145\/512760.512770"},{"key":"17_CR5","doi-asserted-by":"crossref","unstructured":"Csallner, C., Smaragdakis, Y.: Dynamically discovering likely interface invariants. In: ICSE, pp. 861\u2013864 (2006)","DOI":"10.1145\/1134285.1134435"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Dallmeier, V., Lindig, C., Wasylkowski, A., Zeller, A.: Mining object behavior with ADABU. In: WODA, pp. 17\u201324 (2006)","DOI":"10.1145\/1138912.1138918"},{"key":"17_CR7","doi-asserted-by":"crossref","unstructured":"Dallmeier, V., Zeller, A., Meyer, B.: Generating fixes from object behavior anomalies. In: ASE, pp. 550\u2013554. IEEE (2009)","DOI":"10.1109\/ASE.2009.15"},{"issue":"2","key":"17_CR8","first-page":"99","volume":"27","author":"M.D. Ernst","year":"2001","unstructured":"Ernst, M.D., Cockrell, J., Griswold, W.G., Notkin, D.: Dynamically discovering likely program invariants to support program evolution. IEEE TSE\u00a027(2), 99\u2013123 (2001)","journal-title":"IEEE TSE"},{"key":"17_CR9","doi-asserted-by":"crossref","unstructured":"Ghezzi, C., Mocci, A., Monga, M.: Synthesizing intensional behavior models by graph transformation. In: ICSE, pp. 430\u2013440 (2009)","DOI":"10.1109\/ICSE.2009.5070542"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-642-19835-9_15","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"D. Gopinath","year":"2011","unstructured":"Gopinath, D., Malik, M.Z., Khurshid, S.: Specification-based program repair using SAT. In: Abdulla, P.A., Leino, K.R.M. (eds.) TACAS 2011. LNCS, vol.\u00a06605, pp. 173\u2013188. Springer, Heidelberg (2011)"},{"issue":"8","key":"17_CR11","first-page":"526","volume":"33","author":"J. Henkel","year":"2007","unstructured":"Henkel, J., Reichenbach, C., Diwan, A.: Discovering documentation for Java container classes. IEEE TSE\u00a033(8), 526\u2013543 (2007)","journal-title":"IEEE TSE"},{"key":"17_CR12","doi-asserted-by":"crossref","unstructured":"Jeffrey, D., Feng, M., Gupta, N., Gupta, R.: BugFix: a learning-based tool to assist developers in fixing bugs. In: ICPC, pp. 70\u201379. IEEE (2009)","DOI":"10.1109\/ICPC.2009.5090029"},{"key":"17_CR13","doi-asserted-by":"crossref","unstructured":"Kim, D., Nam, J., Song, J., Kim, S.: Automatic patch generation learned from human-written patches. In: ICSE, pp. 802\u2013811. IEEE (2013)","DOI":"10.1109\/ICSE.2013.6606626"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Le Goues, C., Dewey-Vogt, M., Forrest, S., Weimer, W.: A systematic study of automated program repair: Fixing 55 out of 105 bugs for $8 each. In: ICSE, pp. 3\u201313. IEEE (2012)","DOI":"10.1109\/ICSE.2012.6227211"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Lorenzoli, D., Mariani, L., Pezz\u00e8, M.: Automatic generation of software behavioral models. In: ICSE, pp. 501\u2013510 (2008)","DOI":"10.1145\/1368088.1368157"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Nguyen, H.D.T., Qi, D., Roychoudhury, A., Chandra, S.: SemFix: program repair via semantic analysis. In: ICSE, pp. 772\u2013781. IEEE (2013)","DOI":"10.1109\/ICSE.2013.6606623"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Pei, Y., Wei, Y., Furia, C.A., Nordio, M., Meyer, B.: Code-based automated program fixing. In: ASE, pp. 392\u2013395. ACM (2011)","DOI":"10.1109\/ASE.2011.6100080"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Polikarpova, N., Furia, C.A., Pei, Y., Wei, Y., Meyer, B.: What good are strong specifications? In: ICSE, pp. 257\u2013266. ACM (2013)","DOI":"10.1109\/ICSE.2013.6606572"},{"key":"17_CR19","doi-asserted-by":"crossref","unstructured":"Wei, Y., Furia, C.A., Kazmin, N., Meyer, B.: Inferring better contracts. In: ICSE, pp. 191\u2013200. ACM (2011)","DOI":"10.1145\/1985793.1985820"},{"key":"17_CR20","doi-asserted-by":"crossref","unstructured":"Wei, Y., Pei, Y., Furia, C.A., Silva, L.S., Buchholz, S., Meyer, B., Zeller, A.: Automated fixing of programs with contracts. In: ISSTA, pp. 61\u201372. ACM (2010)","DOI":"10.1145\/1831708.1831716"},{"key":"17_CR21","doi-asserted-by":"crossref","unstructured":"Weimer, W., Nguyen, T., Le Goues, C., Forrest, S.: Automatically finding patches using genetic programming. In: ICSE, pp. 364\u2013374. IEEE (2009)","DOI":"10.1109\/ICSE.2009.5070536"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Xie, T., Martin, E., Yuan, H.: Automatic extraction of abstract-object-state machines from unit-test executions. In: ICSE, pp. 835\u2013838. IEEE (2006)","DOI":"10.1145\/1134285.1134427"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-54804-8_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,26]],"date-time":"2019-05-26T08:29:43Z","timestamp":1558859383000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-54804-8_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783642548031","9783642548048"],"references-count":22,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-54804-8_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}