{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T09:57:03Z","timestamp":1776333423835,"version":"3.51.2"},"publisher-location":"New York, NY, USA","reference-count":51,"publisher":"ACM","license":[{"start":{"date-parts":[[2006,5,28]],"date-time":"2006-05-28T00:00:00Z","timestamp":1148774400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,5,28]]},"DOI":"10.1145\/1134285.1134325","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T16:53:01Z","timestamp":1153759981000},"page":"282-291","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":283,"title":["Perracotta"],"prefix":"10.1145","author":[{"given":"Jinlin","family":"Yang","sequence":"first","affiliation":[{"name":"University of Virginia"}]},{"given":"David","family":"Evans","sequence":"additional","affiliation":[{"name":"University of Virginia"}]},{"given":"Deepali","family":"Bhardwaj","sequence":"additional","affiliation":[{"name":"Microsoft Corporation"}]},{"given":"Thirumalesh","family":"Bhat","sequence":"additional","affiliation":[{"name":"Microsoft Corporation"}]},{"given":"Manuvir","family":"Das","sequence":"additional","affiliation":[{"name":"Microsoft Corporation"}]}],"member":"320","published-online":{"date-parts":[[2006,5,28]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Joint CAV\/ISSTA Special Event on Specification Verification and Testing of Concurrent Software. Jul. 2004.  Joint CAV\/ISSTA Special Event on Specification Verification and Testing of Concurrent Software. Jul. 2004."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28644-8_1"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1040305.1040314"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503275"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/380921.380932"},{"key":"e_1_3_2_1_6_1","volume-title":"ICSM","author":"Bennett K.","year":"1995","unstructured":"K. Bennett , T. Bull , E. Younger , and Z. Luo . Bylands: reverse engineering safety-critical systems . ICSM , Oct. 1995 . K. Bennett, T. Bull, E. Younger, and Z. Luo. Bylands: reverse engineering safety-critical systems. ICSM, Oct. 1995."},{"key":"e_1_3_2_1_7_1","volume-title":"Formal specifications in software maintenance: from code to Z++ and back again. Information and Software Technology. Nov.\/Dec","author":"Bowen J.","year":"1993","unstructured":"J. Bowen , P. Breuer , and K. Lano . Formal specifications in software maintenance: from code to Z++ and back again. Information and Software Technology. Nov.\/Dec . 1993 . J. Bowen, P. Breuer, and K. Lano. Formal specifications in software maintenance: from code to Z++ and back again. Information and Software Technology. Nov.\/Dec. 1993."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/smr.4360030303"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/776816.776863"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/586110.586142"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2003.10.005"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s100090200075"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512538"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512558"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302672"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502041"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.908957"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/231379.231389"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(00)00196-4"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/263699.263717"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(67)91165-5"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(78)90562-4"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/506315.506316"},{"key":"e_1_3_2_1_24_1","volume-title":"Workshop on Dynamic Analysis","author":"Gupta N.","year":"2003","unstructured":"N. Gupta . Generating test data for dynamically discovering likely program invariants . Workshop on Dynamic Analysis , May 2003 . N. Gupta. Generating test data for dynamically discovering likely program invariants. Workshop on Dynamic Analysis, May 2003."},{"key":"e_1_3_2_1_25_1","volume-title":"ICSE","author":"Hagnal S.","year":"2002","unstructured":"S. Hagnal and M. S. Lam . Tracking down software bugs using automatic anomaly detection . ICSE , May 2002 . S. Hagnal and M. S. Lam. Tracking down software bugs using automatic anomaly detection. ICSE, May 2002."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/776816.776824"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:FORM.0000017721.39909.4b"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587064"},{"key":"e_1_3_2_1_29_1","unstructured":"Java Transaction API specification. http:\/\/java.sun.com\/products\/jta\/  Java Transaction API specification. http:\/\/java.sun.com\/products\/jta\/"},{"key":"e_1_3_2_1_30_1","unstructured":"J2EE. http:\/\/java.sun.com\/j2ee\/index.jsp  J2EE. http:\/\/java.sun.com\/j2ee\/index.jsp"},{"key":"e_1_3_2_1_31_1","unstructured":"JBoss. http:\/\/www.jboss.org  JBoss. http:\/\/www.jboss.org"},{"key":"e_1_3_2_1_32_1","unstructured":"JRat. http:\/\/jrat.sourceforge.net\/  JRat. http:\/\/jrat.sourceforge.net\/"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2004.1293079"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065014"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007540"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081754"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/587051.587054"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SFCS.1977.32"},{"key":"e_1_3_2_1_39_1","volume-title":"International Symposium on Automated and Analysis-Driven Debugging.","author":"Pytlik B.","year":"2003","unstructured":"B. Pytlik , M. Renieris , S. Krishnamurthi , and S. P. Reiss . Automated fault localization using potential invariants . International Symposium on Automated and Analysis-Driven Debugging. Sep. 2003 . B. Pytlik, M. Renieris, S. Krishnamurthi, and S. P. Reiss. Automated fault localization using potential invariants. International Symposium on Automated and Analysis-Driven Debugging. Sep. 2003."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.5555\/381473.381497"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/199448.199462"},{"key":"e_1_3_2_1_42_1","volume-title":"WinHEC","author":"Verifier Static Driver","year":"2004","unstructured":"Static Driver Verifier : Finding bugs in device drivers at compile-time . WinHEC , Apr. 2004 . Static Driver Verifier: Finding bugs in device drivers at compile-time. WinHEC, Apr. 2004."},{"key":"e_1_3_2_1_43_1","unstructured":"C. Simonyi. Hungarian notation. MSDN library.  C. Simonyi. Hungarian notation. MSDN library."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581345"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312929"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022920129859"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31980-1_30"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566212"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10851-006-8530-6"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/996821.996832"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2004.11"}],"event":{"name":"ICSE06: International Conference on Software Engineering","location":"Shanghai China","acronym":"ICSE06","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 28th international conference on Software engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1134285.1134325","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1134285.1134325","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T15:06:31Z","timestamp":1750259191000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1134285.1134325"}},"subtitle":["mining temporal API rules from imperfect traces"],"short-title":[],"issued":{"date-parts":[[2006,5,28]]},"references-count":51,"alternative-id":["10.1145\/1134285.1134325","10.1145\/1134285"],"URL":"https:\/\/doi.org\/10.1145\/1134285.1134325","relation":{},"subject":[],"published":{"date-parts":[[2006,5,28]]},"assertion":[{"value":"2006-05-28","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}