{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,30]],"date-time":"2026-01-30T04:58:51Z","timestamp":1769749131992,"version":"3.49.0"},"reference-count":77,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T00:00:00Z","timestamp":1574294400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T00:00:00Z","timestamp":1574294400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1421503"],"award-info":[{"award-number":["CCF-1421503"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1409423"],"award-info":[{"award-number":["CCF-1409423"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1421575"],"award-info":[{"award-number":["CCF-1421575"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1438982"],"award-info":[{"award-number":["CCF-1438982"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1439957"],"award-info":[{"award-number":["CCF-1439957"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2019,12]]},"DOI":"10.1007\/s10515-019-00267-1","type":"journal-article","created":{"date-parts":[[2019,11,21]],"date-time":"2019-11-21T07:02:51Z","timestamp":1574319771000},"page":"795-837","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":7,"title":["How effective are existing Java API specifications for finding bugs during runtime verification?"],"prefix":"10.1007","volume":"26","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-5631-4816","authenticated-orcid":false,"given":"Owolabi","family":"Legunsen","sequence":"first","affiliation":[]},{"given":"Nader","family":"Al Awar","sequence":"additional","affiliation":[]},{"given":"Xinyue","family":"Xu","sequence":"additional","affiliation":[]},{"given":"Wajih Ul","family":"Hassan","sequence":"additional","affiliation":[]},{"given":"Grigore","family":"Ro\u015fu","sequence":"additional","affiliation":[]},{"given":"Darko","family":"Marinov","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,11,21]]},"reference":[{"key":"267_CR1","doi-asserted-by":"crossref","unstructured":"Allan, C., Avgustinov, P., Christensen, A.S., Hendren, L., Kuzins, S., Lhot\u00e1k, O., de\u00a0Moor, O., Sereni, D., Sittampalam, G., Tibble, J.: Adding trace matching with free variables to AspectJ. In: OOPSLA, pp. 345\u2013364 (2005)","DOI":"10.1145\/1103845.1094839"},{"key":"267_CR2","doi-asserted-by":"crossref","unstructured":"Arnold, M., Vechev, M., Yahav, E.: QVM: An efficient runtime for detecting defects in deployed systems. In: OOPSLA, pp. 143\u2013162 (2008)","DOI":"10.1145\/1449955.1449776"},{"key":"267_CR3","doi-asserted-by":"crossref","unstructured":"Beckman, N.E., Nori, A.V.: Probabilistic, modular and scalable inference of typestate specifications. In: PLDI, pp. 211\u2013221 (2011)","DOI":"10.1145\/1993316.1993524"},{"key":"267_CR4","doi-asserted-by":"crossref","unstructured":"Blackburn, S.M., Garner, R., Hoffmann, C., Khang, A.M., McKinley, K.S., Bentzur, R., Diwan, A., Feinberg, D., Frampton, D., Guyer, S.Z., Hirzel, M., Hosking, A., Jump, M., Lee, H., Moss, J.E.B., Phansalkar, A., Stefanovi\u0107, D., VanDrunen, T., von Dincklage, D., Wiedermann, B. The DaCapo benchmarks: Java benchmarking development and analysis. In: OOPSLA, pp. 169\u2013190 (2006)","DOI":"10.1145\/1167515.1167488"},{"key":"267_CR5","doi-asserted-by":"publisher","first-page":"365","DOI":"10.1007\/978-3-642-29860-8_28","volume-title":"Runtime Verification","author":"Eric Bodden","year":"2012","unstructured":"Bodden, E.: MOPBox: a library approach to runtime verification. In: RV Tool Demo, pp. 365\u2013369 (2011)"},{"key":"267_CR6","doi-asserted-by":"crossref","unstructured":"Bodden, E., Hendren, L., Lam, P., Lhot\u00e1k, O., Naeem, N.A.: Collaborative runtime verification with tracematches. In: RV, pp. 22\u201337 (2007a)","DOI":"10.1007\/978-3-540-77395-5_3"},{"key":"267_CR7","doi-asserted-by":"crossref","unstructured":"Bodden, E., Hendren, L.J., Lhot\u00e1k, O.: A staged static program analysis to improve the performance of runtime monitoring. In: ECOOP, pp. 525\u2013549 (2007b)","DOI":"10.1007\/978-3-540-73589-2_25"},{"key":"267_CR8","doi-asserted-by":"crossref","unstructured":"Bodden, E., Lam, P., Hendren, L.: Finding programming errors earlier by evaluating runtime monitors ahead-of-time. In: FSE, pp. 36\u201347 (2008)","DOI":"10.1145\/1453101.1453109"},{"key":"267_CR9","doi-asserted-by":"crossref","unstructured":"Chen, D., Zhang, Y., Wang, R., Li, X., Peng, L., Wei, W.: Mining universal specification based on probabilistic model. In: SEKE, pp. 471\u2013476 (2015)","DOI":"10.18293\/SEKE2015-219"},{"key":"267_CR10","doi-asserted-by":"crossref","unstructured":"Chen, F., Ro\u015fu, G.: Towards monitoring-oriented programming: a paradigm combining specification and implementation. In: RV, pp. 108\u2013127 (2003)","DOI":"10.1016\/S1571-0661(04)81045-4"},{"key":"267_CR11","volume-title":"Sampling Techniques","author":"WG Cochran","year":"1977","unstructured":"Cochran, W.G.: Sampling Techniques. Wiley, New York (1977)"},{"key":"267_CR12","doi-asserted-by":"crossref","unstructured":"Dallmeier, V., Knopp, N., Mallon, C., Hack, S., Zeller, A.: Generating test cases for specification mining. In: ISSTA, pp. 85\u201396 (2010)","DOI":"10.1145\/1831708.1831719"},{"key":"267_CR13","doi-asserted-by":"crossref","unstructured":"Dwyer, M.B., Purandare, R., Person, S.: Runtime verification in context: can optimizing error detection improve fault diagnosis? In: RV, pp. 36\u201350 (2010)","DOI":"10.1007\/978-3-642-16612-9_4"},{"key":"267_CR14","unstructured":"Emopers: Closing ObjectOutputStream before calling toByteArray on the underlying ByteArrayOutputStream. https:\/\/github.com\/JodaOrg\/joda-time\/pull\/339 (2015). Accessed 15 Nov 2019"},{"key":"267_CR15","unstructured":"Emopers: Checking the validity of input ListIterators. https:\/\/github.com\/imglib\/imglib2\/pull\/259 (2019). Accessed 15 Nov 2019"},{"key":"267_CR16","doi-asserted-by":"crossref","unstructured":"Forejt, V., Kwiatkowska, M., Parker, D., Qu, H., Ujma, M.: Incremental runtime verification of probabilistic systems. In: RV, pp. 314\u2013319 (2012)","DOI":"10.1007\/978-3-642-35632-2_30"},{"key":"267_CR17","unstructured":"Formal Systems Laboratory: JavaMOP. http:\/\/fsl.cs.illinois.edu\/index.php\/JavaMOP (2014). Accessed 15 Nov 2019"},{"key":"267_CR18","unstructured":"Formal Systems Laboratory: Collections$$\\_$$SynchronizedCollection. http:\/\/fsl.cs.illinois.edu\/annotated-java\/__properties\/html\/java\/util\/Collections_SynchronizedCollection.html (2015a). Accessed 15 Nov 2019"},{"key":"267_CR19","unstructured":"Formal Systems Laboratory: JavaMOPAgent Documentation. https:\/\/github.com\/runtimeverification\/javamop\/blob\/master\/docs\/JavaMOPAgentUsage.md (2015b). Accessed 15 Nov 2019"},{"key":"267_CR20","unstructured":"Formal Systems Laboratory: FSL Specification Database. https:\/\/runtimeverification.com\/monitor\/propertydb (2016). Accessed 15 Nov 2019"},{"key":"267_CR21","doi-asserted-by":"crossref","unstructured":"Gabel, M., Su, Z.: Online inference and enforcement of temporal properties. In: ICSE, pp. 15\u201324 (2010)","DOI":"10.1145\/1806799.1806806"},{"key":"267_CR22","doi-asserted-by":"crossref","unstructured":"Gabel, M., Su, Z.: Testing mined specifications. In: FSE, pp. 1\u201311 (2012)","DOI":"10.1145\/2393596.2393598"},{"key":"267_CR23","doi-asserted-by":"crossref","unstructured":"Hussein, S., Meredith, P., Ro\u015fu, G.: Security-policy monitoring and enforcement with JavaMOP. In: PLAS, pp. 1\u201311 (2012)","DOI":"10.1145\/2336717.2336720"},{"key":"267_CR24","doi-asserted-by":"crossref","unstructured":"Jin, D., Meredith, P.O., Griffith, D., Ro\u015fu, G.: Garbage collection for monitoring parametric properties. In: PLDI, pp. 415\u2013424 (2011)","DOI":"10.1145\/1993316.1993547"},{"key":"267_CR25","doi-asserted-by":"crossref","unstructured":"Jin, D., Meredith, P.O., Lee, C., Ro\u015fu, G.: JavaMOP: Efficient parametric runtime monitoring framework. In: ICSE Demo, pp. 1427\u20131430 (2012a)","DOI":"10.1109\/ICSE.2012.6227231"},{"key":"267_CR26","unstructured":"Jin, D., Meredith, P.O., Ro\u015fu, G.: Scalable parametric runtime monitoring. Technical report, Computer Science Department, UIUC (2012b)"},{"key":"267_CR27","doi-asserted-by":"crossref","unstructured":"Joda, S.: Joda-Time. http:\/\/www.joda.org\/joda-time\/ (2016). Accessed 15 Nov 2019","DOI":"10.4103\/2070-1128.247886"},{"key":"267_CR28","doi-asserted-by":"publisher","first-page":"181","DOI":"10.1016\/j.entcs.2004.01.027","volume":"113","author":"Murat Karaorman","year":"2005","unstructured":"Karaorman, M., Freeman, J.: jMonitor: Java runtime event specification and monitoring library. In: RV, pp. 181\u2013200 (2004)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"267_CR29","doi-asserted-by":"crossref","unstructured":"Krka, I., Brun, Y., Medvidovic, N.: Automatic mining of specifications from invocation traces and method invariants. In: FSE, pp. 178\u2013189 (2014)","DOI":"10.1145\/2635868.2635890"},{"key":"267_CR30","doi-asserted-by":"crossref","unstructured":"Le Goues, C., Weimer, W.: Specification mining with few false positives. In: TACAS, pp. 292\u2013306 (2009)","DOI":"10.1007\/978-3-642-00768-2_26"},{"key":"267_CR31","doi-asserted-by":"crossref","unstructured":"Lee, C., Chen, F., Ro\u015fu, G.: Mining parametric specifications. In: ICSE, pp. 591\u2013600 (2011)","DOI":"10.1145\/1985793.1985874"},{"key":"267_CR32","unstructured":"Lee, C., Jin, D., Meredith, P.O., Ro\u015fu, G.: Towards categorizing and formalizing the JDK API. Technical report, Computer Science Department, UIUC (2012)"},{"key":"267_CR33","doi-asserted-by":"crossref","unstructured":"Legunsen, O., Marinov, D., Ro\u015fu, G.: Evolution-aware monitoring-oriented programming. In: ICSE NIER, pp. 615\u2013618 (2015)","DOI":"10.1109\/ICSE.2015.206"},{"key":"267_CR34","doi-asserted-by":"crossref","unstructured":"Legunsen, O., Hariri, F., Shi, A., Lu, Y., Zhang, L., Marinov, D.: An extensive study of static regression test selection in modern software evolution. In: FSE, pp. 583\u2013594 (2016a)","DOI":"10.1145\/2950290.2950361"},{"key":"267_CR35","doi-asserted-by":"crossref","unstructured":"Legunsen, O., Hassan, W.U., Xu, X., Rosu, G., Marinov, D.: How good are the specs? A study of the bug-finding effectiveness of existing Java API specifications. In: ASE, pp. 602\u2013613 (2016b)","DOI":"10.1145\/2970276.2970356"},{"key":"267_CR36","unstructured":"Legunsen, O., Hassan, W.U., Xu, X., Ro\u015fu, G., Marinov, D.: Supplementary material for this paper. http:\/\/fsl.cs.illinois.edu\/spec-eval (2016c). Accessed 15 Nov 2019"},{"key":"267_CR37","doi-asserted-by":"crossref","unstructured":"Legunsen, O., Shi, A., Marinov, D.: STARTS: STAtic Regression Test Selection. In: ASE, pp. 949\u2013954 (2017)","DOI":"10.1109\/ASE.2017.8115710"},{"key":"267_CR38","doi-asserted-by":"crossref","unstructured":"Legunsen, O., Zhang, Y., Hadzi-Tanovic, M., Ro\u015fu, G., Marinov, D.: Techniques for evolution-aware runtime verification. In: ICST, pp. 300\u2013311 (2019)","DOI":"10.1109\/ICST.2019.00037"},{"key":"267_CR39","doi-asserted-by":"crossref","unstructured":"Lemieux, C.: Mining temporal properties of data invariants. In: ICSE SRC, pp. 751\u2013753 (2015)","DOI":"10.1109\/ICSE.2015.238"},{"key":"267_CR40","doi-asserted-by":"crossref","unstructured":"Lemieux, C., Park, D., Beschastnikh, I.: General LTL specification mining. In: ASE, pp. 81\u201392 (2015)","DOI":"10.1109\/ASE.2015.71"},{"key":"267_CR41","unstructured":"Ley, M.: CompleteSearch DBLP. http:\/\/www.dblp.org\/search\/index.php (2015). Accessed 15 Nov 2019"},{"key":"267_CR42","doi-asserted-by":"publisher","first-page":"285","DOI":"10.1007\/978-3-319-11164-3_24","volume-title":"Runtime Verification","author":"Qingzhou Luo","year":"2014","unstructured":"Luo, Q., Zhang, Y., Lee, C., Jin, D., Meredith, P.O., \u015eerb\u0103nu\u0163\u0103, T.F., Ro\u015fu, G.: RV-Monitor: efficient parametric runtime verification with simultaneous properties. In: RV, pp. 285\u2013300 (2014)"},{"key":"267_CR43","doi-asserted-by":"crossref","unstructured":"Mao, D., Chen, L., Zhang, L.: An extensive study on cross-project predictive mutation testing. In: ICST, pp. 160\u2013171 (2019)","DOI":"10.1109\/ICST.2019.00025"},{"key":"267_CR44","doi-asserted-by":"crossref","unstructured":"Meredith, P., Ro\u015fu, G.: Efficient parametric runtime verification with deterministic string rewriting. In: ASE, pp. 70\u201380 (2013)","DOI":"10.1109\/ASE.2013.6693067"},{"key":"267_CR45","doi-asserted-by":"crossref","unstructured":"Meredith, P., Jin, D., Chen, F., Ro\u015fu, G.: Efficient monitoring of parametric context-free patterns. In: ASE, pp. 148\u2013157 (2008)","DOI":"10.1109\/ASE.2008.25"},{"key":"267_CR46","doi-asserted-by":"publisher","first-page":"208","DOI":"10.1007\/978-3-642-29860-8_16","volume-title":"Runtime Verification","author":"Samaneh Navabpour","year":"2012","unstructured":"Navabpour, S., Wu, C.W.W., Bonakdarpour, B., Fischmeister, S.: Efficient techniques for near-optimal instrumentation in time-triggered runtime verification. In: RV, pp. 208\u2013222 (2011)"},{"key":"267_CR47","doi-asserted-by":"crossref","unstructured":"Nguyen, A.C., Khoo, S.C.: Extracting significant specifications from mining through mutation testing. In: ICFEM, pp. 472\u2013488 (2011)","DOI":"10.1007\/978-3-642-24559-6_32"},{"key":"267_CR48","doi-asserted-by":"crossref","unstructured":"Nguyen, H.A., Dyer, R., Nguyen, T.N., Rajan, H.: Mining preconditions of APIs in large-scale code corpus. In: FSE, pp. 166\u2013177 (2014)","DOI":"10.1145\/2635868.2635924"},{"key":"267_CR49","unstructured":"Oracle: java.lang.instrument. http:\/\/docs.oracle.com\/javase\/7\/docs\/api\/java\/lang\/instrument\/package-summary.html (2015a). Accessed 15 Nov 2019"},{"key":"267_CR50","unstructured":"Oracle: java.lang.Math. https:\/\/docs.oracle.com\/javase\/7\/docs\/api\/java\/lang\/Math.html (2015b). Accessed 15 Nov 2019"},{"key":"267_CR51","unstructured":"Oracle: java.net.URL. https:\/\/docs.oracle.com\/javase\/7\/docs\/api\/java\/net\/URL.html (2015c). Accessed 15 Nov 2019"},{"key":"267_CR52","unstructured":"Oracle: java.util.Collections. https:\/\/docs.oracle.com\/javase\/7\/docs\/api\/java\/util\/Collections.html (2015d). Accessed 15 Nov 2019"},{"key":"267_CR53","doi-asserted-by":"crossref","unstructured":"Pacheco, C., Ernst, M.D.: Randoop: feedback-directed random testing for Java. In: OOPSLA Companion, pp. 815\u2013816 (2007)","DOI":"10.1145\/1297846.1297902"},{"key":"267_CR54","unstructured":"Pacheco, C., Ernst, M.D.: Randoop. https:\/\/randoop.github.io\/randoop\/ (2016). Accessed 15 Nov 2019"},{"key":"267_CR55","doi-asserted-by":"crossref","unstructured":"Pacheco, C., Lahiri, S.K., Ernst, M.D., Ball, T.: Feedback-directed random test generation. In: ICSE, pp. 75\u201384 (2007)","DOI":"10.1109\/ICSE.2007.37"},{"key":"267_CR56","doi-asserted-by":"crossref","unstructured":"Pacheco, C., Lahiri, S.K., Ball, T.: Finding errors in .NET with feedback-directed random testing. In: ISSTA, pp. 87\u201396 (2008)","DOI":"10.1145\/1390630.1390643"},{"key":"267_CR57","doi-asserted-by":"crossref","unstructured":"Pradel, M.: Dynamically inferring, refining, and checking API usage protocols. In: OOPSLA Companion, pp. 773\u2013774 (2009)","DOI":"10.1145\/1639950.1640008"},{"key":"267_CR58","doi-asserted-by":"crossref","unstructured":"Pradel, M.: Statically checking API protocol conformance with mined multi-object specifications (supplementary material). http:\/\/mp.binaervarianz.de\/icse2012-statically\/ (2015). Accessed 15 Nov 2019","DOI":"10.1109\/ICSE.2012.6227127"},{"key":"267_CR59","doi-asserted-by":"crossref","unstructured":"Pradel, M., Gross, T.R.: Automatic generation of object usage specifications from large method traces. In: ASE, pp. 371\u2013382 (2009)","DOI":"10.1109\/ASE.2009.60"},{"key":"267_CR60","doi-asserted-by":"crossref","unstructured":"Pradel, M., Gross, T.R.: Leveraging test generation and specification mining for automated bug detection without false positives. In: ICSE, pp. 288\u2013298 (2012)","DOI":"10.1109\/ICSE.2012.6227185"},{"key":"267_CR61","doi-asserted-by":"crossref","unstructured":"Pradel, M., Bichsel, P., Gross, T.R.: A framework for the evaluation of specification miners based on finite state machines. In: ICSM, pp. 1\u201310 (2010)","DOI":"10.1109\/ICSM.2010.5609576"},{"key":"267_CR62","doi-asserted-by":"crossref","unstructured":"Pradel, M., Jaspan, C., Aldrich, J., Gross, T.R.: Statically checking API protocol conformance with mined multi-object specifications. In: ICSE, pp. 925\u2013935 (2012)","DOI":"10.1109\/ICSE.2012.6227127"},{"key":"267_CR63","doi-asserted-by":"crossref","unstructured":"Purandare, R., Dwyer, M.B., Elbaum, S.: Optimizing monitoring of finite state properties through monitor compaction. In: ISSTA, pp. 280\u2013290 (2013)","DOI":"10.1145\/2483760.2483762"},{"key":"267_CR64","doi-asserted-by":"crossref","unstructured":"Reger, G., Barringer, H., Rydeheard, D.: A pattern-based approach to parametric specification mining. In: ASE, pp. 658\u2013663 (2013)","DOI":"10.1109\/ASE.2013.6693129"},{"issue":"5","key":"267_CR65","first-page":"613","volume":"39","author":"MP Robillard","year":"2013","unstructured":"Robillard, M.P., Bodden, E., Kawrykow, D., Mezini, M., Ratchford, T.: Automated API property inference techniques. TSE 39(5), 613\u2013637 (2013)","journal-title":"TSE"},{"key":"267_CR66","doi-asserted-by":"crossref","unstructured":"Shamshiri, S., Just, R., Rojas, J., Fraser, G., McMinn, P., Arcuri, A.: Do automatically generated unit tests find real faults? An empirical study of effectiveness and challenges. In: ASE, pp. 201\u2013211 (2015)","DOI":"10.1109\/ASE.2015.86"},{"key":"267_CR67","doi-asserted-by":"crossref","unstructured":"Sun, J., Xiao, H., Liu, Y., Lin, S.W., Qin, S.: TLV: abstraction through testing, learning, and validation. In: ESEC\/FSE, pp. 698\u2013709 (2015)","DOI":"10.1145\/2786805.2786817"},{"key":"267_CR68","doi-asserted-by":"crossref","unstructured":"Tan, S.H., Marinov, D., Tan, L., Leavens, G.T.: @tComment: testing Javadoc comments to detect comment-code inconsistencies. In: ICST, pp. 260\u2013269 (2012)","DOI":"10.1109\/ICST.2012.106"},{"key":"267_CR69","unstructured":"The JaCoCo Team: JaCoCo Java Code Coverage Library. https:\/\/www.jacoco.org\/jacoco (2018). Accessed 15 Nov 2019"},{"key":"267_CR70","doi-asserted-by":"crossref","unstructured":"Thummalapenta, S., Xie, T.: Alattin: mining alternative patterns for detecting neglected conditions. In: ASE, pp. 283\u2013294 (2009)","DOI":"10.1109\/ASE.2009.72"},{"key":"267_CR71","doi-asserted-by":"crossref","unstructured":"Wasylkowski, A., Zeller, A.: Mining temporal specifications from object usage. In: ASE, pp. 295\u2013306 (2009)","DOI":"10.1109\/ASE.2009.30"},{"key":"267_CR72","doi-asserted-by":"crossref","unstructured":"Weimer, W., Necula, G.: Mining temporal specifications for error detection. In: TACAS, pp. 461\u2013476 (2005)","DOI":"10.1007\/978-3-540-31980-1_30"},{"key":"267_CR73","doi-asserted-by":"publisher","first-page":"304","DOI":"10.1007\/978-3-642-40787-1_18","volume-title":"Runtime Verification","author":"Chun Wah Wallace Wu","year":"2013","unstructured":"Wu, C.W.W., Kumar, D., Bonakdarpour, B., Fischmeister, S.: Reducing monitoring overhead by integrating event- and time-triggered techniques. In: RV, pp. 304\u2013321 (2013)"},{"key":"267_CR74","doi-asserted-by":"crossref","unstructured":"Wu, Q., Liang, G., Wang, Q., Xie, T., Mei, H.: Iterative mining of resource-releasing specifications. In: ASE, pp. 233\u2013242 (2011)","DOI":"10.1109\/ASE.2011.6100058"},{"key":"267_CR75","doi-asserted-by":"crossref","unstructured":"Zhang, J., Wang, Z., Zhang, L., Hao, D., Zang, L., Cheng, S., Zhang, L.: Predictive mutation testing. In: ISSTA, pp. 342\u2013353 (2016)","DOI":"10.1145\/2931037.2931038"},{"issue":"9","key":"267_CR76","doi-asserted-by":"publisher","first-page":"898","DOI":"10.1109\/TSE.2018.2809496","volume":"45","author":"Jie Zhang","year":"2019","unstructured":"Zhang, J., Zhang, L., Harman, M., Hao, D., Jia, Y., Zhang, L.: Predictive mutation testing. In: TSE, pp. 898\u2013918 (2018)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"267_CR77","doi-asserted-by":"crossref","unstructured":"Zhong, H., Zhang, L., Xie, T., Mei, H.: Inferring resource specifications from natural language API documentation. In: ASE, pp. 307\u2013318 (2009)","DOI":"10.1109\/ASE.2009.94"}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-019-00267-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10515-019-00267-1\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-019-00267-1.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,23]],"date-time":"2023-09-23T05:38:31Z","timestamp":1695447511000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10515-019-00267-1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,11,21]]},"references-count":77,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2019,12]]}},"alternative-id":["267"],"URL":"https:\/\/doi.org\/10.1007\/s10515-019-00267-1","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"value":"0928-8910","type":"print"},{"value":"1573-7535","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,11,21]]},"assertion":[{"value":"3 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"11 October 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 November 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}