{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,17]],"date-time":"2026-02-17T04:33:01Z","timestamp":1771302781769,"version":"3.50.1"},"reference-count":44,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T00:00:00Z","timestamp":1530748800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2018,12]]},"DOI":"10.1007\/s10515-018-0242-9","type":"journal-article","created":{"date-parts":[[2018,7,5]],"date-time":"2018-07-05T12:06:37Z","timestamp":1530792397000},"page":"745-784","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":4,"title":["Inferring visual contracts from Java programs"],"prefix":"10.1007","volume":"25","author":[{"given":"Abdullah","family":"Alshanqiti","sequence":"first","affiliation":[]},{"given":"Reiko","family":"Heckel","sequence":"additional","affiliation":[]},{"given":"Timo","family":"Kehrer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,7,5]]},"reference":[{"key":"242_CR1","unstructured":"Alshanqiti, A.M., Heckel, R.: Towards dynamic reverse engineering visual contracts from java. In: Electronic Communications of the EASST, vol. 67 (2014). http:\/\/journal.ub.tu-berlin.de\/eceasst\/article\/view\/940"},{"key":"242_CR2","doi-asserted-by":"crossref","unstructured":"Alshanqiti, A., Heckel, R.: Extracting visual contracts from java programs. In: International Conference on Automated Software Engineering, pp. 104\u2013114. ACM (2015)","DOI":"10.1109\/ASE.2015.63"},{"key":"242_CR3","unstructured":"Alshanqiti, A.M., Heckel, R., Khan, T.: Learning minimal and maximal rules from observations of graph transformations. Electronic Communications of the EASST, vol. 58 (2013)"},{"key":"242_CR4","doi-asserted-by":"publisher","first-page":"816","DOI":"10.1145\/2970276.2970287","volume-title":"Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering, ASE 2016, Singapore, September 3\u20137, 2016","author":"AM Alshanqiti","year":"2016","unstructured":"Alshanqiti, A.M., Heckel, R., Kehrer, T.: Visual contract extractor: a tool for reverse engineering visual contracts using dynamic analysis. In: Lo, D., Apel, S., Khurshid, S. (eds.) Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering, ASE 2016, Singapore, September 3\u20137, 2016, pp. 816\u2013821. ACM, London (2016). https:\/\/doi.org\/10.1145\/2970276.2970287"},{"issue":"2","key":"242_CR5","doi-asserted-by":"publisher","first-page":"141","DOI":"10.1007\/s10515-012-0114-7","volume":"20","author":"T Arendt","year":"2013","unstructured":"Arendt, T., Taentzer, G.: A tool environment for quality assurance based on the eclipse modeling framework. Autom. Softw. Eng. 20(2), 141\u2013184 (2013)","journal-title":"Autom. Softw. Eng."},{"key":"242_CR6","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-642-16145-2_9","volume-title":"Model Driven Engineering Languages and Systems\u201413th International Conference, MODELS 2010, Oslo, Norway, October 3\u20138, 2010, Proceedings, Part I, Lecture Notes in Computer Science","author":"T Arendt","year":"2010","unstructured":"Arendt, T., Biermann, E., Jurack, S., Krause, C., Taentzer, G.: Henshin: advanced concepts and tools for in-place EMF model transformations. In: Petriu, D.C., Rouquette, N., Haugen, \u00d8. (eds.) Model Driven Engineering Languages and Systems\u201413th International Conference, MODELS 2010, Oslo, Norway, October 3\u20138, 2010, Proceedings, Part I, Lecture Notes in Computer Science, vol. 6394, pp. 121\u2013135. Springer, Berlin (2010). https:\/\/doi.org\/10.1007\/978-3-642-16145-2_9"},{"key":"242_CR7","unstructured":"Artzi, S., Ernst, M.D., Kie\u017cun, A., Pacheco, C., Perkins, J.H.: Finding the needles in the haystack: generating legal test inputs for object-oriented programs. In: Proceedings of 1st Workshop on Model-Based Testing and Object-Oriented Systems (2006)"},{"issue":"3","key":"242_CR8","doi-asserted-by":"publisher","first-page":"347","DOI":"10.1007\/s10270-008-0092-1","volume":"8","author":"Z Balogh","year":"2009","unstructured":"Balogh, Z., Varr, D.: Model transformation by example using inductive logic programming. Int. J. Softw. Syst. Model. 8(3), 347\u2013364 (2009)","journal-title":"Int. J. Softw. Syst. Model."},{"issue":"5","key":"242_CR9","doi-asserted-by":"publisher","first-page":"507","DOI":"10.1109\/TSE.2014.2372785","volume":"41","author":"ET Barr","year":"2015","unstructured":"Barr, E.T., Harman, M., McMinn, P., Shahbaz, M., Yoo, S.: The oracle problem in software testing: a survey. IEEE Trans. Softw. Eng. 41(5), 507\u2013525 (2015). https:\/\/doi.org\/10.1109\/TSE.2014.2372785","journal-title":"IEEE Trans. Softw. Eng."},{"key":"242_CR10","doi-asserted-by":"crossref","unstructured":"Bisztray, D., Heckel, R., Ehrig, H.: Verification of architectural refactorings: rule extraction and tool support. In: ECEASST, vol. 16 (2009)","DOI":"10.1007\/978-3-642-10248-6_13"},{"issue":"1","key":"242_CR11","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/s13173-012-0083-5","volume":"19","author":"H Brito","year":"2012","unstructured":"Brito, H., Marques-Neto, H., Terra, R., Rocha, H., Valente, M.: On-the-fly extraction of hierarchical object graphs. J. Braz. Comput. Soc. 19(1), 15\u201327 (2012)","journal-title":"J. Braz. Comput. Soc."},{"key":"242_CR12","doi-asserted-by":"publisher","first-page":"253","DOI":"10.1007\/978-3-319-09108-2_17","volume-title":"Graph Transformation, Lecture Notes in Computer Science","author":"H Bruggink","year":"2014","unstructured":"Bruggink, H.: Towards process mining with graph transformation systems. In: Giese, H., Knig, B. (eds.) Graph Transformation, Lecture Notes in Computer Science, vol. 8571, pp. 253\u2013268. Springer, Berlin (2014). https:\/\/doi.org\/10.1007\/978-3-319-09108-2_17"},{"issue":"4","key":"242_CR13","doi-asserted-by":"publisher","first-page":"687","DOI":"10.1007\/s10515-015-0185-3","volume":"23","author":"J B\u00fcrdek","year":"2015","unstructured":"B\u00fcrdek, J., Kehrer, T., Lochau, M., Reuling, D., Kelter, U., Sch\u00fcrr, A.: Reasoning about product-line evolution using complex feature model differences. Autom. Softw. Eng. 23(4), 687\u2013733 (2015)","journal-title":"Autom. Softw. Eng."},{"key":"242_CR14","doi-asserted-by":"publisher","first-page":"189","DOI":"10.1007\/978-3-642-21470-7_14","volume-title":"Modelling Foundations and Applications","author":"Xavier Dolques","year":"2011","unstructured":"Dolques, X., Dogui, A., Falleri, J.R., Huchard, M., Nebut, C., Pfister, F.: Easing model transformation learning with automatically aligned examples. In: Proceedings of the 7th European Conference on Modelling Foundations and Applications, ECMFA\u201911, pp. 189\u2013204. Springer, Berlin (2011)"},{"key":"242_CR15","volume-title":"Fundamentals of Algebraic Graph Transformation","author":"H Ehrig","year":"2006","unstructured":"Ehrig, H., Ehrig, K., Prange, U., Taentzer, G.: Fundamentals of Algebraic Graph Transformation. Springer, Berlin (2006)"},{"key":"242_CR16","doi-asserted-by":"publisher","first-page":"336","DOI":"10.1007\/11841883_24","volume-title":"Graph Transformations, Third International Conference, ICGT 2006, Natal, Rio Grande do Norte, Brazil, September 17\u201323, 2006, Proceedings, Lecture Notes in Computer Science","author":"G Engels","year":"2006","unstructured":"Engels, G., Lohmann, M., Sauer, S., Heckel, R.: Model-driven monitoring: an application of graph transformation for design by contract. In: Corradini, A., Ehrig, H., Montanari, U., Ribeiro, L., Rozenberg, G. (eds.) Graph Transformations, Third International Conference, ICGT 2006, Natal, Rio Grande do Norte, Brazil, September 17\u201323, 2006, Proceedings, Lecture Notes in Computer Science, vol. 4178, pp. 336\u2013350. Springer, Berlin (2006). https:\/\/doi.org\/10.1007\/11841883_24"},{"issue":"1-3","key":"242_CR17","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.scico.2007.01.015","volume":"69","author":"Michael D. Ernst","year":"2007","unstructured":"Ernst, M.D., Perkins, J.H., Guo, P.J., McCamant, S., Pacheco, C., Tschantz, M.S., Xiao, C.: The Daikon system for dynamic detection of likely invariants. Sci. Comput. Program. 69(1\u20133), 35\u201345 (2007). https:\/\/doi.org\/10.1016\/j.scico.2007.01.015 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S016764230700161X . Special issue on Experimental Software and Toolkits","journal-title":"Science of Computer Programming"},{"key":"242_CR18","doi-asserted-by":"crossref","unstructured":"Faunes, M., Sahraoui, H., Boukadoum, M.: Generating model transformation rules from examples using an evolutionary algorithm. In: Proceedings of the 27th IEEE\/ACM International Conference on Automated Software Engineering, pp. 250\u2013253. ACM, London (2012)","DOI":"10.1145\/2351676.2351714"},{"key":"242_CR19","unstructured":"Geiger, L., Z\u00fcndorf, A.: eDOBS-graphical debugging for eclipse. In: Electronic Communications of the EASST, vol. 1 (2007)"},{"key":"242_CR20","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/978-3-642-31491-9_29","volume-title":"Modelling Foundations and Applications","author":"Lars Hamann","year":"2012","unstructured":"Hamann, L., Hofrichter, O., Gogolla, M.: OCL-based runtime monitoring of applications with protocol state machines. In: Proceedings of 8th European Conference on Modelling Foundations and Applications, pp. 384\u2013399 (2012). https:\/\/doi.org\/10.1007\/978-3-642-31491-9_29"},{"issue":"2","key":"242_CR21","doi-asserted-by":"publisher","first-page":"67","DOI":"10.4018\/jwsr.2005040104","volume":"2","author":"JH Hausmann","year":"2005","unstructured":"Hausmann, J.H., Heckel, R., Lohmann, M.: Model-based development of web services descriptions enabling a precise matching concept. Int. J. Web Serv. Res. 2(2), 67\u201384 (2005). https:\/\/doi.org\/10.4018\/jwsr.2005040104","journal-title":"Int. J. Web Serv. Res."},{"key":"242_CR22","doi-asserted-by":"publisher","first-page":"145","DOI":"10.1016\/j.entcs.2004.02.073","volume":"116","author":"Reiko Heckel","year":"2005","unstructured":"Heckel, R., Lohmann, M.: Towards contract-based testing of web services. Electron. Notes Theor. Comput. Sci. 116, 145\u2013156 (2005). https:\/\/doi.org\/10.1016\/j.entcs.2004.02.073 . http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1571066104052831","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"242_CR23","doi-asserted-by":"publisher","first-page":"197","DOI":"10.1007\/978-3-642-28279-9_15","volume-title":"Conceptual Modelling and Its Theoretical Foundations","author":"G Kappel","year":"2012","unstructured":"Kappel, G., Langer, P., Retschitzegger, W., Schwinger, W., Wimmer, M.: Model transformation by-example: a survey of the first wave. In: D\u00fcsterh\u00f6ft, A., Klettke, M., Schewe, K.D. (eds.) Conceptual Modelling and Its Theoretical Foundations, pp. 197\u2013215. Springer, Berlin (2012a)"},{"key":"242_CR24","doi-asserted-by":"crossref","unstructured":"Kehrer, T., Kelter, U., Taentzer, G.: A rule-based approach to the semantic lifting of model differences in the context of model versioning. In: 26th International Conference on Automated Software Engineering, pp. 163\u2013172 (2011)","DOI":"10.1109\/ASE.2011.6100050"},{"key":"242_CR25","unstructured":"Kehrer, T., Rindt, M., Pietsch, P., Kelter, U.: Generating edit operations for profiled UML models. In: Proceedings of International Workshop on Models and Evolution, CEUR Workshop Proceedings, vol. 1090, pp. 30\u201339 (2013)"},{"key":"242_CR26","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-319-42064-6_12","volume-title":"Theory and Practice of Model Transformations","author":"Timo Kehrer","year":"2016","unstructured":"Kehrer, T., Taentzer, G., Rindt, M., Kelter, U.: Automatically deriving the specification of model editing operations from meta-models. In: Proceedings of 9th International Conference on Model Transformations, pp. 173\u2013188. Springer, Berlin (2016)"},{"key":"242_CR27","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1007\/978-3-319-61473-1_7","volume-title":"Theory and Practice of Model Transformation","author":"Timo Kehrer","year":"2017","unstructured":"Kehrer, T., Alshanqiti, A.M., Heckel, R.: Automatic inference of rule-based specifications of complex in-place model transformations. In: Theory and Practice of Model Transformation\u201410th International Conference, ICMT 2017, Held as Part of STAF 2017, Marburg, Germany, July 17\u201318, 2017, Proceedings, pp. 92\u2013107 (2017). https:\/\/doi.org\/10.1007\/978-3-319-61473-1_7"},{"key":"242_CR28","first-page":"279","volume-title":"Lecture Notes in Computer Science","author":"Tamim Ahmed Khan","year":"2012","unstructured":"Khan, T.A., Runge, O., Heckel, R.: Testing against visual contracts: model-based coverage. In: Proceedings of International Conference on Graph Transformation, pp. 279\u2013293 (2012)"},{"key":"242_CR29","first-page":"153","volume-title":"Proceedings of the Third International Conference on Theory and Practice of Model Transformations, Lecture Notes in Computer Science","author":"P Langer","year":"2010","unstructured":"Langer, P., Wimmer, M., Kappel, G.: Model-to-model transformations by demonstration. In: Tratt, L., Gogolla, M. (eds.) Proceedings of the Third International Conference on Theory and Practice of Model Transformations, Lecture Notes in Computer Science, vol. 6142, pp. 153\u2013167. Springer, Berlin (2010)"},{"key":"242_CR30","doi-asserted-by":"publisher","unstructured":"Malpani, A., Bernstein, P., Melnik, S., Terwilliger, J.: Reverse engineering models from databases to bootstrap application development. In: Proceedings of 26th International Conference on Data Engineering, pp. 1177\u20131180 (2010). https:\/\/doi.org\/10.1109\/ICDE.2010.5447776","DOI":"10.1109\/ICDE.2010.5447776"},{"key":"242_CR31","doi-asserted-by":"publisher","first-page":"17","DOI":"10.1016\/j.entcs.2004.02.089","volume":"116","author":"L Mariani","year":"2005","unstructured":"Mariani, L., Pezz\u00e8, M.: A technique for verifying component-based software. Electron. Notes Theor. Comput. Sci. 116, 17\u201330 (2005). https:\/\/doi.org\/10.1016\/j.entcs.2004.02.089","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"242_CR32","unstructured":"Martinez, L., Pereira, C., Favre, L.: Recovering activity diagrams from object oriented code: an MDA-based approach. In: Proceedings of International Conference on Software Engineering Research and Practice, vol.\u00a01, pp. 58\u201364 (2011)"},{"key":"242_CR33","doi-asserted-by":"publisher","first-page":"125","DOI":"10.1016\/j.entcs.2005.10.021","volume":"152","author":"T Mens","year":"2006","unstructured":"Mens, T., Van Gorp, P.: A taxonomy of model transformation. Electron. Notes Theor. Comput. Sci. 152, 125\u2013142 (2006)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"242_CR34","first-page":"33","volume-title":"Lecture Notes in Computer Science","author":"Domenik Pavletic","year":"2015","unstructured":"Pavletic, D., Voelter, M., Raza, S.A., Kolb, B., Kehrer, T.: Extensible debugger framework for extensible languages. In: Reliable Software Technologies\u2014Ada-Europe 2015, pp. 33\u201349. Springer, Berlin (2015)"},{"issue":"1","key":"242_CR35","doi-asserted-by":"publisher","first-page":"96","DOI":"10.1145\/1108768.1108816","volume":"31","author":"A Rountev","year":"2005","unstructured":"Rountev, A., Volgin, O., Reddoch, M.: Static control-flow analysis for reverse engineering of uml sequence diagrams. SIGSOFT Softw. Eng. Notes 31(1), 96\u2013102 (2005)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"242_CR36","unstructured":"Runge, O., Khan, T.A., Heckel, R.: Test case generation using visual contracts. In: ECEASST, vol. 58 (2013)"},{"issue":"3","key":"242_CR37","first-page":"135","volume":"3","author":"MK Sarkar","year":"2013","unstructured":"Sarkar, M.K., Chatterjee, T., Mukherjee, D.: Reverse engineering: an analysis of static behaviors of object oriented programs by extracting UML class diagram. Int. J. Adv. Comput. Res. 3(3), 135 (2013)","journal-title":"Int. J. Adv. Comput. Res."},{"key":"242_CR38","doi-asserted-by":"publisher","first-page":"201","DOI":"10.1109\/ASE.2015.86","volume-title":"30th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2015, Lincoln, NE, USA, November 9\u201313, 2015","author":"S Shamshiri","year":"2015","unstructured":"Shamshiri, S., Just, R., Rojas, J.M., Fraser, G., McMinn, P., Arcuri, A.: Do automatically generated unit tests find real faults? An empirical study of effectiveness and challenges. In: Cohen, M.B., Grunske, L., Whalen, M. (eds.) 30th IEEE\/ACM International Conference on Automated Software Engineering, ASE 2015, Lincoln, NE, USA, November 9\u201313, 2015, pp. 201\u2013211. IEEE Computer Society, Washington (2015). https:\/\/doi.org\/10.1109\/ASE.2015.86"},{"key":"242_CR39","doi-asserted-by":"crossref","unstructured":"Str\u00fcber, D., Born, K., Gill, K.D., Groner, R., Kehrer, T., Ohrndorf, M., Tichy, M.: Henshin: A usability-focused framework for EMF model transformation development. In: ICGT (2017)","DOI":"10.1007\/978-3-319-61470-0_12"},{"key":"242_CR40","doi-asserted-by":"crossref","unstructured":"Tonella, P., Potrich, A.: Reverse engineering of the interaction diagrams from C++ code. In: Software Maintenance, 2003. International Conference on ICSM 2003. Proceedings, pp. 159\u2013168 (2003)","DOI":"10.1109\/ICSM.2003.1235418"},{"key":"242_CR41","doi-asserted-by":"publisher","first-page":"410","DOI":"10.1007\/11880240_29","volume-title":"Model Driven Engineering Languages and Systems","author":"D\u00e1niel Varr\u00f3","year":"2006","unstructured":"Varr\u00f3, D.: Model transformation by example. In: International Conference on Model Driven Engineering Languages and Systems, pp. 410\u2013424. Springer, Berlin (2006)"},{"key":"242_CR42","doi-asserted-by":"crossref","unstructured":"You, C., Holder, L.B., Cook, D.J.: Learning patterns in the dynamics of biological networks. In: International Conference on Knowledge Discovery and Data Mining, pp. 977\u2013986. ACM, London (2009)","DOI":"10.1145\/1557019.1557125"},{"issue":"3","key":"242_CR43","doi-asserted-by":"publisher","first-page":"431","DOI":"10.1109\/TSE.2010.3","volume":"36","author":"C Zhao","year":"2010","unstructured":"Zhao, C., Kong, J., Zhang, K.: Program behavior discovery and verification: a graph grammar approach. IEEE Trans. Softw. Eng. 36(3), 431\u2013448 (2010)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"242_CR44","doi-asserted-by":"crossref","unstructured":"Ziadi, T., Da\u00a0Silva, M.A.A., Hillah, L.M., Ziane, M.: A fully dynamic approach to the reverse engineering of UML sequence diagrams. In: 16th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS), pp. 107\u2013116. IEEE, Washington (2011)","DOI":"10.1109\/ICECCS.2011.18"}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10515-018-0242-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-018-0242-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-018-0242-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,7,5]],"date-time":"2025-07-05T15:52:24Z","timestamp":1751730744000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10515-018-0242-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,7,5]]},"references-count":44,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2018,12]]}},"alternative-id":["242"],"URL":"https:\/\/doi.org\/10.1007\/s10515-018-0242-9","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"value":"0928-8910","type":"print"},{"value":"1573-7535","type":"electronic"}],"subject":[],"published":{"date-parts":[[2018,7,5]]},"assertion":[{"value":"21 December 2017","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"27 June 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"5 July 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}