{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:34:12Z","timestamp":1773192852671,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":36,"publisher":"ACM","license":[{"start":{"date-parts":[[2004,10,31]],"date-time":"2004-10-31T00:00:00Z","timestamp":1099180800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2004,10,31]]},"DOI":"10.1145\/1029894.1029901","type":"proceedings-article","created":{"date-parts":[[2005,1,30]],"date-time":"2005-01-30T12:55:16Z","timestamp":1107089716000},"page":"23-32","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":50,"title":["Efficient incremental algorithms for dynamic detection of likely invariants"],"prefix":"10.1145","author":[{"given":"Jeff H.","family":"Perkins","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology"}]},{"given":"Michael D.","family":"Ernst","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology"}]}],"member":"320","published-online":{"date-parts":[[2004,10,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503275"},{"key":"e_1_3_2_1_2_1","volume-title":"Sept. 13, 2002.","author":"Arnout K.","unstructured":"K. Arnout and B. Meyer . Extracting implicit contracts from .NET components. http:\/\/se.inf.ethz.ch\/people\/arnout\/work_in_progress\/contract_extraction.pdf , Sept. 13, 2002. K. Arnout and B. Meyer. Extracting implicit contracts from .NET components. http:\/\/se.inf.ethz.ch\/people\/arnout\/work_in_progress\/contract_extraction.pdf, Sept. 13, 2002."},{"key":"e_1_3_2_1_3_1","first-page":"169","volume-title":"AIFIPP '92","author":"Bratko I.","year":"1993","unstructured":"I. Bratko and M. Grobelnik . Inductive learning applied to program construction and verification. In J. Cuena, editor , AIFIPP '92 , pages 169 -- 182 . North-Holland , 1993 . I. Bratko and M. Grobelnik. Inductive learning applied to program construction and verification. In J. Cuena, editor, AIFIPP '92, pages 169--182. North-Holland, 1993."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/998675.999452"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/287000.287001"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/288195.288214"},{"key":"e_1_3_2_1_7_1","volume-title":"Watch What I Do: Programming by Demonstration","author":"Cypher A.","year":"1993","unstructured":"A. Cypher , D. C. Halbert , D. Kurlander , H. Lieberman , D. Maulsby , B. A. Myers , and A. Turransky , editors . Watch What I Do: Programming by Demonstration . MIT Press , Cambridge, MA , 1993 . A. Cypher, D. C. Halbert, D. Kurlander, H. Lieberman, D. Maulsby, B. A. Myers, and A. Turransky, editors. Watch What I Do: Programming by Demonstration. MIT Press, Cambridge, MA, 1993."},{"key":"e_1_3_2_1_8_1","volume-title":"Mar. 16","author":"Dodoo N.","year":"2002","unstructured":"N. Dodoo , A. Donovan , L. Lin , and M. D. Ernst . Selecting predicates for implications in program analysis , Mar. 16 , 2002 . Draft . http:\/\/pag.csail.mit.edu\/ mernst\/pubs\/invariants-implications.ps. N. Dodoo, A. Donovan, L. Lin, and M. D. Ernst. Selecting predicates for implications in program analysis, Mar. 16, 2002. Draft. http:\/\/pag.csail.mit.edu\/ mernst\/pubs\/invariants-implications.ps."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.908957"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/337180.337240"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/1767111.1767119"},{"key":"e_1_3_2_1_13_1","first-page":"21","volume-title":"WODA 2003","author":"Gupta N.","year":"2003","unstructured":"N. Gupta . Generating test data for dynamically discovering likely program invariants . In WODA 2003 , pages 21 -- 24 , May 2003 . N. Gupta. Generating test data for dynamically discovering likely program invariants. In WODA 2003, pages 21--24, May 2003."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2003.1240294"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581377"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/776816.776824"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45070-2_19"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/998675.999449"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2001.972794"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/945645.945654"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781148"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007540"},{"key":"e_1_3_2_1_23_1","volume-title":"TACoS","author":"Mariani L.","year":"2004","unstructured":"L. Mariani and M. Pezz\u00e8 . A technique for verifying component-based software . In TACoS , Mar. 2004 . L. Mariani and M. Pezz\u00e8. A technique for verifying component-based software. In TACoS, Mar. 2004."},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/940071.940110"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24851-4_20"},{"key":"e_1_3_2_1_26_1","volume-title":"MIT Dept. of EECS","author":"Ne Win T.","year":"2003","unstructured":"T. Ne Win . Theorem-proving distributed algorithms with dynamic analysis. Master's thesis , MIT Dept. of EECS , May 2003 . T. Ne Win. Theorem-proving distributed algorithms with dynamic analysis. Master's thesis, MIT Dept. of EECS, May 2003."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2944214.2944275"},{"key":"e_1_3_2_1_29_1","volume-title":"MIT Lab for Computer Science","author":"Nimmer J. W.","year":"2002","unstructured":"J. W. Nimmer . Automatic generation and checking of program specifications. Technical Report 852 , MIT Lab for Computer Science , June 10, 2002 . Revision of author's Master's thesis. J. W. Nimmer. Automatic generation and checking of program specifications. Technical Report 852, MIT Lab for Computer Science, June 10, 2002. Revision of author's Master's thesis."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566213"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587054"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/253228.253351"},{"key":"e_1_3_2_1_33_1","volume-title":"AADEBUG","author":"Pytlik B.","year":"2003","unstructured":"B. Pytlik , M. Renieris , S. Krishnamurthi , and S. P. Reiss . Automated fault localization using potential invariants . In AADEBUG , Sept. 2003 . B. Pytlik, M. Renieris, S. Krishnamurthi, and S. P. Reiss. Automated fault localization using potential invariants. In AADEBUG, Sept. 2003."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581378"},{"key":"e_1_3_2_1_35_1","volume-title":"SPIN 1998","author":"Vaziri M.","year":"1998","unstructured":"M. Vaziri and G. Holzmann . Automatic detection of invariants in Spin . In SPIN 1998 , Nov. 1998 . M. Vaziri and G. Holzmann. Automatic detection of invariants in Spin. In SPIN 1998, Nov. 1998."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566212"},{"key":"e_1_3_2_1_38_1","first-page":"17","volume-title":"WODA 2003","author":"Xie T.","year":"2003","unstructured":"T. Xie and D. Notkin . Exploiting synergy between testing and inferred partial specifications . In WODA 2003 , pages 17 -- 20 , May 2003 . T. Xie and D. Notkin. Exploiting synergy between testing and inferred partial specifications. In WODA 2003, pages 17--20, May 2003."},{"key":"e_1_3_2_1_39_1","first-page":"40","volume-title":"ASE 2003","author":"Xie T.","year":"2003","unstructured":"T. Xie and D. Notkin . Tool-assisted unit test selection based on operational violations . In ASE 2003 , pages 40 -- 48 , Oct. 2003 . T. Xie and D. Notkin. Tool-assisted unit test selection based on operational violations. In ASE 2003, pages 40--48, Oct. 2003."}],"event":{"name":"SIGSOFT04\/FSE-12: SIGSOFT 2004 -12th International Symposium on the Foundations of Software Engineering","location":"Newport Beach CA USA","acronym":"SIGSOFT04\/FSE-12","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 12th ACM SIGSOFT twelfth international symposium on Foundations of software engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029894.1029901","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1029894.1029901","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T12:31:03Z","timestamp":1750249863000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1029894.1029901"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004,10,31]]},"references-count":36,"alternative-id":["10.1145\/1029894.1029901","10.1145\/1029894"],"URL":"https:\/\/doi.org\/10.1145\/1029894.1029901","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/1041685.1029901","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2004,10,31]]},"assertion":[{"value":"2004-10-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}