{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:09:21Z","timestamp":1763467761569},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,7,21]]},"DOI":"10.1145\/1146238.1146266","type":"proceedings-article","created":{"date-parts":[[2006,7,24]],"date-time":"2006-07-24T12:53:01Z","timestamp":1153745581000},"page":"233-244","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":89,"title":["Inference and enforcement of data structure consistency specifications"],"prefix":"10.1145","author":[{"given":"Brian","family":"Demsky","sequence":"first","affiliation":[{"name":"University of California at Irvine, Irvine, CA"}]},{"given":"Michael D.","family":"Ernst","sequence":"additional","affiliation":[{"name":"MIT Computer Science and Artificial Intelligence Lab, Cambridge, MA"}]},{"given":"Philip J.","family":"Guo","sequence":"additional","affiliation":[{"name":"MIT Computer Science and Artificial Intelligence Lab, Cambridge, MA"}]},{"given":"Stephen","family":"McCamant","sequence":"additional","affiliation":[{"name":"MIT Computer Science and Artificial Intelligence Lab, Cambridge, MA"}]},{"given":"Jeff H.","family":"Perkins","sequence":"additional","affiliation":[{"name":"MIT Computer Science and Artificial Intelligence Lab, Cambridge, MA"}]},{"given":"Martin","family":"Rinard","sequence":"additional","affiliation":[{"name":"MIT Computer Science and Artificial Intelligence Lab, Cambridge, MA"}]}],"member":"320","published-online":{"date-parts":[[2006,7,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566191"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/874075.876408"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/185827.185828"},{"key":"e_1_3_2_1_4_1","first-page":"566","volume-title":"Very Large Data Bases","author":"Ceri S.","year":"1990","unstructured":"S. Ceri and J. Widom . Deriving production rules for constraint maintenance . In Very Large Data Bases , pages 566 -- 577 , 1990 .]] S. Ceri and J. Widom. Deriving production rules for constraint maintenance. In Very Large Data Bases, pages 566--577, 1990.]]"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512560"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/337180.337234"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_3_2_1_8_1","unstructured":"Center-TRACON automation system. http:\/\/www.ctas.arc.nasa.gov\/.]]  Center-TRACON automation system. http:\/\/www.ctas.arc.nasa.gov\/.]]"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/263698.263723"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512538"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1049\/ic:20040301"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/949305.949314"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062499"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781149"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302467"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/337180.337240"},{"key":"e_1_3_2_1_17_1","volume-title":"Morgan Kaufmann","author":"Gray J.","year":"1993","unstructured":"J. Gray and A. Reuter . Transaction Processing: Concepts and Techniques . Morgan Kaufmann , 1993 .]] J. Gray and A. Reuter. Transaction Processing: Concepts and Techniques. Morgan Kaufmann, 1993.]]"},{"key":"e_1_3_2_1_18_1","volume-title":"Sept.","author":"Griffin T.","year":"1992","unstructured":"T. Griffin , H. Trickey , and C. Tuckey . Generating update constraints from PRL5.0 specifications. Preliminary report presented at AT&T Database Day , Sept. 1992 .]] T. Griffin, H. Trickey, and C. Tuckey. Generating update constraints from PRL5.0 specifications. Preliminary report presented at AT&T Database Day, Sept. 1992.]]"},{"key":"e_1_3_2_1_19_1","unstructured":"P. J. Guo. Fjalar: A dynamic analysis framework for C and C++ programs. http:\/\/pag.csail.mit.edu\/fjalar\/.]]  P. J. Guo. Fjalar: A dynamic analysis framework for C and C++ programs. http:\/\/pag.csail.mit.edu\/fjalar\/.]]"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146268"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISRE.1997.566869"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512539"},{"key":"e_1_3_2_1_23_1","volume-title":"July-August","author":"Haugk G.","year":"1985","unstructured":"G. Haugk , F. Lax , R. Royer , and J. Williams . The 5ESS(TM) switching system: Maintenance capabilities. AT&T Technical Journal, 64(6 part 2):1385--1416 , July-August 1985 .]] G. Haugk, F. Lax, R. Royer, and J. Williams. The 5ESS(TM) switching system: Maintenance capabilities. AT&T Technical Journal, 64(6 part 2):1385--1416, July-August 1985.]]"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/143095.143139"},{"key":"e_1_3_2_1_25_1","unstructured":"M. K. Johnson. Whitepaper: Red Hat's new journaling file system: ext3. http:\/\/www.redhat.com\/support\/wpapers\/redhat\/ext3\/index.html 2001.]]  M. K. Johnson. Whitepaper: Red Hat's new journaling file system: ext3. http:\/\/www.redhat.com\/support\/wpapers\/redhat\/ext3\/index.html 2001.]]"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/11532231_20"},{"key":"e_1_3_2_1_27_1","volume-title":"Proceedings of the 1994 USENIX Symposium on Very High Level Language","author":"Ladd D. A.","year":"1994","unstructured":"D. A. Ladd and J. C. Ramming . Two application languages in software production . In Proceedings of the 1994 USENIX Symposium on Very High Level Language , October 1994 .]] D. A. Ladd and J. C. Ramming. Two application languages in software production. In Proceedings of the 1994 USENIX Symposium on Very High Level Language, October 1994.]]"},{"key":"e_1_3_2_1_29_1","volume-title":"Proceedings of the 11th Annual Conference on Object-Oriented Programming Systems, Languages and Applications","author":"Mishra A.","year":"1996","unstructured":"A. Mishra , J. Ros , A. Singhal , G. Weiss , D. Litman , P. Patel-Schneider , D. Dvorak , and J. Crawford . R++: Using rules in object-oriented designs . In Proceedings of the 11th Annual Conference on Object-Oriented Programming Systems, Languages and Applications , July 1996 .]] A. Mishra, J. Ros, A. Singhal, G. Weiss, D. Litman, P. Patel-Schneider, D. Dvorak, and J. Crawford. R++: Using rules in object-oriented designs. In Proceedings of the 11th Annual Conference on Object-Oriented Programming Systems, Languages and Applications, July 1996.]]"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232855"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251254.1251275"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/121132.121137"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/69.63251"},{"key":"e_1_3_2_1_35_1","volume-title":"Proceedings of the Year 2000 Network and Distributed System Security Symposium","author":"Wagner D.","year":"2000","unstructured":"D. Wagner , J. S. Foster , E. A. Brewer , and A. Aiken . A first step towards automated detection of buffer overrun vulnerabilities . In Proceedings of the Year 2000 Network and Distributed System Security Symposium , 2000 .]] D. Wagner, J. S. Foster, E. A. Brewer, and A. Aiken. A first step towards automated detection of buffer overrun vulnerabilities. In Proceedings of the Year 2000 Network and Distributed System Security Symposium, 2000.]]"},{"key":"e_1_3_2_1_36_1","volume-title":"Proceedings of the 25th Fault-Tolerant Computing Symposium","author":"Wang Y. M.","year":"2005","unstructured":"Y. M. Wang , Y. Huang , K. P. Vo , P. Y. Chung , and C. Kintala . Checkpointing and its applications . In Proceedings of the 25th Fault-Tolerant Computing Symposium , 2005 .]] Y. M. Wang, Y. Huang, K. P. Vo, P. Y. Chung, and C. Kintala. Checkpointing and its applications. In Proceedings of the 25th Fault-Tolerant Computing Symposium, 2005.]]"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1007\/11609773_11"}],"event":{"name":"ISSTA06: International Symposium on Software Testing and Analysis 2006","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Portland Maine USA","acronym":"ISSTA06"},"container-title":["Proceedings of the 2006 international symposium on Software testing and analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1146238.1146266","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,12]],"date-time":"2023-01-12T03:30:35Z","timestamp":1673494235000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1146238.1146266"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006,7,21]]},"references-count":35,"alternative-id":["10.1145\/1146238.1146266","10.1145\/1146238"],"URL":"https:\/\/doi.org\/10.1145\/1146238.1146266","relation":{},"subject":[],"published":{"date-parts":[[2006,7,21]]},"assertion":[{"value":"2006-07-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}