{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T09:08:31Z","timestamp":1725613711676},"reference-count":11,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,11]]},"DOI":"10.1109\/ase.2011.6100117","type":"proceedings-article","created":{"date-parts":[[2011,12,16]],"date-time":"2011-12-16T18:30:08Z","timestamp":1324060208000},"page":"532-535","source":"Crossref","is-referenced-by-count":5,"title":["PRECIS: Inferring invariants using program path guided clustering"],"prefix":"10.1109","author":[{"given":"Parth","family":"Sagdeo","sequence":"first","affiliation":[]},{"given":"Viraj","family":"Athavale","sequence":"additional","affiliation":[]},{"given":"Sumant","family":"Kowshik","sequence":"additional","affiliation":[]},{"given":"Shobha","family":"Vasudevan","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"3","article-title":"Powerful techniques for the automatic generation of invariants","author":"bensalem","year":"1996","journal-title":"CAV"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1016\/S0304-3975(96)00191-0"},{"journal-title":"Data Mining Concepts and Techniques","year":"2006","author":"han","key":"10"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1137\/0206052"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503275"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302467"},{"key":"5","doi-asserted-by":"crossref","first-page":"291","DOI":"10.1145\/581376.581377","article-title":"Tracking Down Software Bugs using Automatic Anomaly Detection","author":"sudheendra hangal","year":"2002","journal-title":"Proceedings of the 24th International Conference on Software Engineering ICSE 2002"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1137\/1.9781611971217"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390665"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368127"},{"key":"11","article-title":"Experiments of the effectiveness of dataflow- and controlflow-based test adequacy criteria","author":"hutchins","year":"0","journal-title":"Proc ICS 94"}],"event":{"name":"2011 26th IEEE\/ACM International Conference on Automated Software Engineering (ASE)","start":{"date-parts":[[2011,11,6]]},"location":"Lawrence, KS, USA","end":{"date-parts":[[2011,11,10]]}},"container-title":["2011 26th IEEE\/ACM International Conference on Automated Software Engineering (ASE 2011)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6093623\/6100039\/06100117.pdf?arnumber=6100117","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T11:28:19Z","timestamp":1497958099000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6100117\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,11]]},"references-count":11,"URL":"https:\/\/doi.org\/10.1109\/ase.2011.6100117","relation":{},"subject":[],"published":{"date-parts":[[2011,11]]}}}