{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T04:13:49Z","timestamp":1773375229535,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2006,11,5]]},"DOI":"10.1145\/1181775.1181808","type":"proceedings-article","created":{"date-parts":[[2007,1,17]],"date-time":"2007-01-17T01:15:56Z","timestamp":1168996556000},"page":"265-275","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":119,"title":["SMArTIC"],"prefix":"10.1145","author":[{"given":"David","family":"Lo","sequence":"first","affiliation":[{"name":"National University of Singapore"}]},{"given":"Siau-Cheng","family":"Khoo","sequence":"additional","affiliation":[{"name":"National University of Singapore"}]}],"member":"320","published-online":{"date-parts":[[2006,11,5]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503275"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781152"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/592849.592852"},{"key":"e_1_3_2_1_4_1","first-page":"591","article-title":"On the synthesis of finite-state machines from samples of their behaviour","volume":"21","author":"Biermann A.W.","year":"1972","unstructured":"A.W. Biermann and J.A. Feldman . On the synthesis of finite-state machines from samples of their behaviour . IEEE Transactions on Computers , 21 : 591 -- 597 , 1972 . A.W. Biermann and J.A. Feldman. On the synthesis of finite-state machines from samples of their behaviour. IEEE Transactions on Computers, 21:591--597, 1972.","journal-title":"IEEE Transactions on Computers"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/872754.873563"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/287000.287001"},{"key":"e_1_3_2_1_7_1","volume-title":"Introduction to Algorithms","author":"Cormen T.H.","year":"2001","unstructured":"T.H. Cormen , C.E. Leiserson , R.L. Rivest , and C. Stein . Introduction to Algorithms . MIT Press , 2001 . T.H. Cormen, C.E. Leiserson, R.L. Rivest, and C. Stein. Introduction to Algorithms. MIT Press, 2001."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-28630-1_10"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/WCRE.2006.47"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302672"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/775047.775095"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.908957"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/844380.844760"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062462"},{"key":"e_1_3_2_1_15_1","volume-title":"Proc. of the workshop on dynamic analysis","author":"Gupta N.","year":"2003","unstructured":"N. Gupta . Generating test data for dynamically discovering likely program invariants . In Proc. of the workshop on dynamic analysis , 2003 . N. Gupta. Generating test data for dynamically discovering likely program invariants. In Proc. of the workshop on dynamic analysis, 2003."},{"key":"e_1_3_2_1_16_1","volume-title":"Morgan Kaufmann","author":"Han J.","year":"2001","unstructured":"J. Han and M. Kamber . Data Mining Concepts and Techniques . Morgan Kaufmann , 2001 . J. Han and M. Kamber. Data Mining Concepts and Techniques. Morgan Kaufmann, 2001."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511810275","volume-title":"Logic in Computer Science","author":"Huth M.","year":"2004","unstructured":"M. Huth and M. Ryan . Logic in Computer Science . Cambridge , 2004 . M. Huth and M. Ryan. Logic in Computer Science. Cambridge, 2004."},{"key":"e_1_3_2_1_18_1","unstructured":"The Java hotspot performance engine architecture. http:\/\/java.sun.com\/products\/hotspot\/whitepaper.html.  The Java hotspot performance engine architecture. http:\/\/java.sun.com\/products\/hotspot\/whitepaper.html."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-45070-2_19"},{"key":"e_1_3_2_1_20_1","unstructured":"JRat. http:\/\/jrat.sourceforge.net\/.  JRat. http:\/\/jrat.sourceforge.net\/."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"crossref","DOI":"10.1002\/9780470316801","volume-title":"Finding Groups in Data: an Introduction to Cluster Analysis","author":"Kaufman L.","year":"1990","unstructured":"L. Kaufman and P.J. Rousseeuw . Finding Groups in Data: an Introduction to Cluster Analysis . John Wiley & Sons , 1990 . L. Kaufman and P.J. Rousseeuw. Finding Groups in Data: an Introduction to Cluster Analysis. John Wiley & Sons, 1990."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1014052.1014077"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/301618.301678"},{"key":"e_1_3_2_1_24_1","volume-title":"Simulation modelling and analysis","author":"Law A.M.","year":"2000","unstructured":"A.M. Law and W. D. Kelton . Simulation modelling and analysis . McGraw-Hill , 2000 . A.M. Law and W. D. Kelton. Simulation modelling and analysis. McGraw-Hill, 2000."},{"key":"e_1_3_2_1_25_1","volume-title":"SoC-NUS tech. report, TRA 8\/06","author":"Lo D.","year":"2006","unstructured":"D. Lo and S-C. Khoo . SMArTIC: Specification mining architecture with trace filtering and clustering . In SoC-NUS tech. report, TRA 8\/06 , 2006 . D. Lo and S-C. Khoo. SMArTIC: Specification mining architecture with trace filtering and clustering. In SoC-NUS tech. report, TRA 8\/06, 2006."},{"key":"e_1_3_2_1_26_1","volume-title":"Proc. of National Conf. on Artificial Intelligence","author":"Lyngs\u00f8 R.B.","year":"1999","unstructured":"R.B. Lyngs\u00f8 , C.N.S. Pedersen , and H. Nielsen . Metrics and similarity measures for hidden Markov models . In Proc. of National Conf. on Artificial Intelligence , 1999 . R.B. Lyngs\u00f8, C.N.S. Pedersen, and H. Nielsen. Metrics and similarity measures for hidden Markov models. In Proc. of National Conf. on Artificial Intelligence, 1999."},{"key":"e_1_3_2_1_27_1","volume-title":"Introduction to the Practice of Statistics","author":"Moore D.S.","year":"1998","unstructured":"D.S. Moore and G.P. McCabe . Introduction to the Practice of Statistics . W.H. Freeman & Co. , Third Edition , 1998 . D.S. Moore and G.P. McCabe. Introduction to the Practice of Statistics. W.H. Freeman & Co., Third Edition, 1998."},{"key":"e_1_3_2_1_28_1","unstructured":"Jakarta Commons Net. http:\/\/jakarta.apache.org\/commons\/net\/.  Jakarta Commons Net. http:\/\/jakarta.apache.org\/commons\/net\/."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/DCC.1994.305932"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566213"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.6165"},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. of the workshop on automata induction, grammatical inference and language acquisition","author":"Raman A. V.","year":"1997","unstructured":"A. V. Raman and J. D. Patrick . The sk-strings method for inferring PFSA . In Proc. of the workshop on automata induction, grammatical inference and language acquisition , 1997 . A. V. Raman and J. D. Patrick. The sk-strings method for inferring PFSA. In Proc. of the workshop on automata induction, grammatical inference and language acquisition, 1997."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581378"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/381473.381497"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/337449.337481"},{"key":"e_1_3_2_1_37_1","volume-title":"Information Retrieval","author":"van Rijsbergen C. J.","year":"1979","unstructured":"C. J. van Rijsbergen . Information Retrieval . Butterworths , London , 1979 . C. J. van Rijsbergen. Information Retrieval. Butterworths, London, 1979."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/977401.978142"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566212"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31980-1_30"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134325"}],"event":{"name":"SIGSOFT06\/FSE-14: SIGSOFT 2006 -14th International Symposium on the Foundations of Software Engineering","location":"Portland Oregon USA","acronym":"SIGSOFT06\/FSE-14","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 14th ACM SIGSOFT international symposium on Foundations of software engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1181775.1181808","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,1,10]],"date-time":"2023-01-10T20:43:59Z","timestamp":1673383439000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1181775.1181808"}},"subtitle":["towards building an accurate, robust and scalable specification miner"],"short-title":[],"issued":{"date-parts":[[2006,11,5]]},"references-count":40,"alternative-id":["10.1145\/1181775.1181808","10.1145\/1181775"],"URL":"https:\/\/doi.org\/10.1145\/1181775.1181808","relation":{},"subject":[],"published":{"date-parts":[[2006,11,5]]},"assertion":[{"value":"2006-11-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}