{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T14:19:39Z","timestamp":1725891579089},"publisher-location":"Berlin, Heidelberg","reference-count":18,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642346903"},{"type":"electronic","value":"9783642346910"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-34691-0_16","type":"book-chapter","created":{"date-parts":[[2012,11,14]],"date-time":"2012-11-14T09:10:35Z","timestamp":1352884235000},"page":"215-230","source":"Crossref","is-referenced-by-count":2,"title":["Lightweight Automatic Error Detection by Monitoring Collar Variables"],"prefix":"10.1007","author":[{"given":"Jo\u00e3o","family":"Santos","sequence":"first","affiliation":[]},{"given":"Rui","family":"Abreu","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Patterson, D., Brown, A., Broadwell, P., Candea, G., Chen, M., Cutler, J., Enriquez, P., Fox, A., Kiciman, E., Merzbacher, M., Oppenheimer, D., Sastry, N., Tetzlaff, W., Traupman, J., Treuhaft, N.: Recovery-oriented computing (ROC): Motivation, definition, techniques, and case studies. Computer Science Technical Report UCB\/\/CSD-02-1175, 1\u201316 (2002)"},{"key":"16_CR2","doi-asserted-by":"crossref","unstructured":"Racunas, P., Constantinides, K., Manne, S., Mukherjee, S.S.: Perturbation-based Fault Screening. In: Proceedings of HPCA 2007, pp. 169\u2013180 (2007)","DOI":"10.1109\/HPCA.2007.346195"},{"key":"16_CR3","doi-asserted-by":"crossref","unstructured":"Hangal, S., Lam, M.S.: Tracking down software bugs using automatic anomaly detection. In: Proceedings of ICSE 2002, pp. 291\u2013301 (2002)","DOI":"10.1145\/581339.581377"},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Abreu, R., Gonz\u00e1lez, A., Zoeteweij, P., van Gemund, A.J.: Automatic software fault localization using generic program invariants. In: Proceedings of SAC 2008, pp. 712\u2013717 (2008)","DOI":"10.1145\/1363686.1363855"},{"issue":"1","key":"16_CR5","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/MC.2007.37","volume":"40","author":"T. Menzies","year":"2007","unstructured":"Menzies, T., Owen, D., Richardson, J.: The strangest thing about software. Computer\u00a040(1), 54\u201360 (2007)","journal-title":"Computer"},{"issue":"4","key":"16_CR6","doi-asserted-by":"publisher","first-page":"439","DOI":"10.1007\/s10515-010-0072-x","volume":"17","author":"G. Gay","year":"2010","unstructured":"Gay, G., Menzies, T., Davies, M., Gundy-Burlet, K.: Automatically finding the control variables for complex system behavior. Automated Software Engineering\u00a017(4), 439\u2013468 (2010)","journal-title":"Automated Software Engineering"},{"key":"16_CR7","doi-asserted-by":"crossref","unstructured":"Ernst, M.D., Cockrell, J., Griswoldt, W.G., Notkin, D.: Dynamically Discovering Likely Program to Support Program Evolution Invariants. In: Proceedings of ICSE 1999, pp. 213\u2013224 (1999)","DOI":"10.1145\/302405.302467"},{"key":"16_CR8","doi-asserted-by":"crossref","unstructured":"Dimitrov, M., Zhou, H.: Anomaly-Based Bug Prediction, Isolation, and Validation: An Automated Approach for Software Debugging. In: Proceedings of ASPLOS 2009, vol.\u00a044, pp. 61\u201372. ACM (2009)","DOI":"10.1145\/1508284.1508252"},{"key":"16_CR9","series-title":"CCIS","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1007\/978-3-642-14819-4_5","volume-title":"Evaluation of Novel Approaches to Software Engineering","author":"R. Abreu","year":"2010","unstructured":"Abreu, R., Gonz\u00e1lez, A., Zoeteweij, P., van Gemund, A.J.: Using Fault Screeners for Software Error Detection. In: Maciaszek, L.A., Gonz\u00e1lez-P\u00e9rez, C., Jablonski, S. (eds.) ENASE 2008\/2009. CCIS, vol.\u00a069, pp. 60\u201374. Springer, Heidelberg (2010)"},{"issue":"1-3","key":"16_CR10","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.scico.2007.01.015","volume":"69","author":"M.D. Ernst","year":"2007","unstructured":"Ernst, M.D., Perkins, J.H., Guo, P.J., McCamant, S., Pacheco, C., Tschantz, M.S., Xiao, C.: The Daikon system for dynamic detection of likely invariants. Science of Computer Programming\u00a069(1-3), 35\u201345 (2007)","journal-title":"Science of Computer Programming"},{"key":"16_CR11","unstructured":"Pytlik, B., Renieris, M., Krishnamurthi, S., Reiss, S.P.: Automated Fault Localization Using Potential Invariants. In: Proceedings of AADEBUG 2003, pp. 273\u2013276 (2003)"},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Hangal, S., Chandra, N., Narayanan, S., Chakravorty, S.: IODINE: A Tool to Automatically Infer Dynamic Invariants for Hardware Designs. In: Proceedings of DAC 2005, pp. 775\u2013778 (2005)","DOI":"10.1145\/1065579.1065786"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Janssen, T., Abreu, R., van Gemund, A.J.: Zoltar: A Toolset for Automatic Fault Localization. In: Proceedings of ASE 2009, pp. 662\u2013664 (2009)","DOI":"10.1109\/ASE.2009.27"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Sagdeo, P., Athavale, V., Kowshik, S., Vasudevan, S.: PRECIS: Inferring invariants using program path guided clustering. In: Proceedings of ASE 2011, pp. 532\u2013535 (2011)","DOI":"10.1109\/ASE.2011.6100117"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Sahoo, S.K., Li, M.L., Ramachandran, P., Adve, S.V., Adve, V.S., Zhou, Y.: Using likely program invariants to detect hardware errors. In: Proceedings of DSN 2008, pp. 70\u201379 (June 2008)","DOI":"10.1109\/DSN.2008.4630072"},{"key":"16_CR16","doi-asserted-by":"crossref","unstructured":"Jalali, O., Menzies, T., Feather, M.: Optimizing Requirements Decisions with KEYS. In: Proceedings of PROMISE 2008 (ICSE), pp. 1\u20138 (2008)","DOI":"10.1145\/1370788.1370807"},{"key":"16_CR17","unstructured":"Gay, G., Menzies, T., Jalali, O., Feather, M., Kiper, J.: Real-time Optimization of Requirements Models. Jet Propulsion, 1\u201333 (2008)"},{"key":"16_CR18","unstructured":"Williams, R., Gomes, C.P., Selman, B.: Backdoors To Typical Case Complexity. In: Proceedings of IJCAI 2003 (2003)"}],"container-title":["Lecture Notes in Computer Science","Testing Software and Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-34691-0_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,8]],"date-time":"2019-05-08T22:57:51Z","timestamp":1557356271000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-34691-0_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642346903","9783642346910"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-34691-0_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}