{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,2]],"date-time":"2025-12-02T15:00:49Z","timestamp":1764687649967,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,5,31]],"date-time":"2014-05-31T00:00:00Z","timestamp":1401494400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,5,31]]},"DOI":"10.1145\/2597073.2597080","type":"proceedings-article","created":{"date-parts":[[2014,5,20]],"date-time":"2014-05-20T13:48:00Z","timestamp":1400593680000},"page":"132-141","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":25,"title":["MUX: algorithm selection for software model checkers"],"prefix":"10.1145","author":[{"given":"Varun","family":"Tulsian","sequence":"first","affiliation":[{"name":"Indian Institute of Science, India"}]},{"given":"Aditya","family":"Kanade","sequence":"additional","affiliation":[{"name":"Indian Institute of Science, India"}]},{"given":"Rahul","family":"Kumar","sequence":"additional","affiliation":[{"name":"Microsoft Research, India"}]},{"given":"Akash","family":"Lal","sequence":"additional","affiliation":[{"name":"Microsoft Research, India"}]},{"given":"Aditya V.","family":"Nori","sequence":"additional","affiliation":[{"name":"Microsoft Research, India"}]}],"member":"320","published-online":{"date-parts":[[2014,5,31]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36742-7_52"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-03077-7_18"},{"key":"e_1_3_2_1_3_1","first-page":"42","volume-title":"FMCAD","author":"Ball T.","year":"2010","unstructured":"T. Ball , E. Bounimova , R. Kumar , and V. Levin . Slam2: static driver verification with under 4% false alarms . In FMCAD , pages 35\u2013 42 , 2010 . T. Ball, E. Bounimova, R. Kumar, and V. Levin. Slam2: static driver verification with under 4% false alarms. In FMCAD, pages 35\u201342, 2010."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24756-2_1"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1965724.1965743"},{"key":"e_1_3_2_1_6_1","volume-title":"MSR-TR-2001-21","author":"Ball T.","year":"2001","unstructured":"T. Ball and S. K. Rajamani . SLIC: A specification language for interface checking (of C). Technical report , MSR-TR-2001-21 , Microsoft Research , 2001 . T. Ball and S. K. Rajamani. SLIC: A specification language for interface checking (of C). Technical report, MSR-TR-2001-21, Microsoft Research, 2001."},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-36742-7_43"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393664"},{"key":"e_1_3_2_1_9_1","first-page":"518","volume-title":"CAV","author":"Beyer D.","year":"2007","unstructured":"D. Beyer , T. A. Henzinger , and G. Th\u00e9oduloz . Configurable software verification: Concretizing the convergence of model checking and program analysis . In CAV , pages 504\u2013 518 , 2007 . D. Beyer, T. A. Henzinger, and G. Th\u00e9oduloz. Configurable software verification: Concretizing the convergence of model checking and program analysis. In CAV, pages 504\u2013518, 2007."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2330163.2330209"},{"key":"e_1_3_2_1_11_1","volume-title":"Pattern recognition and machine learning","author":"Bishop C. M.","year":"2006","unstructured":"C. M. Bishop and N. M. Nasrabadi . Pattern recognition and machine learning . 2006 . C. M. Bishop and N. M. Nasrabadi. Pattern recognition and machine learning. 2006."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491477.2491480"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.49"},{"key":"e_1_3_2_1_15_1","first-page":"1874","volume-title":"LIBLINEAR: A library for large linear classification. J. of ML Research","author":"Fan R.","year":"2008","unstructured":"R. Fan , K. Chang , C. Hsieh , X. Wang , and C. Lin . LIBLINEAR: A library for large linear classification. J. of ML Research , pages 1871\u2013 1874 , 2008 . R. Fan, K. Chang, C. Hsieh, X. Wang, and C. Lin. LIBLINEAR: A library for large linear classification. J. of ML Research, pages 1871\u20131874, 2008."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24664-0_27"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-005-1489-x"},{"key":"e_1_3_2_1_18_1","volume-title":"Unified Modeling Language Specification (Version 2.41)","author":"Object Management Group","year":"2011","unstructured":"Object Management Group . Unified Modeling Language Specification (Version 2.41) . 2011 . Object Management Group. Unified Modeling Language Specification (Version 2.41). 2011."},{"key":"e_1_3_2_1_19_1","volume-title":"ECAI, page 475","author":"Guerri A.","year":"2004","unstructured":"A. Guerri and M. Milano . Learning techniques for automatic algorithm portfolio selection . In ECAI, page 475 , 2004 . A. Guerri and M. Milano. Learning techniques for automatic algorithm portfolio selection. In ECAI, page 475, 2004."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1656274.1656278"},{"key":"e_1_3_2_1_22_1","first-page":"239","volume-title":"Model Checking Software","author":"Henzinger T. A.","unstructured":"T. A. Henzinger , R. Jhala , R. Majumdar , and G. Sutre . Software verification with BLAST . In Model Checking Software , pages 235\u2013 239 . 2003. T. A. Henzinger, R. Jhala, R. Majumdar, and G. Sutre. Software verification with BLAST. In Model Checking Software, pages 235\u2013239. 2003."},{"key":"e_1_3_2_1_23_1","first-page":"54","volume-title":"Science","author":"Huberman B.","year":"1997","unstructured":"B. Huberman , R. Lukose , and T. Hogg . An economics approach to hard computational problems . Science , pages 51\u2013 54 , 1997 . B. Huberman, R. Lukose, and T. Hogg. An economics approach to hard computational problems. Science, pages 51\u201354, 1997."},{"key":"e_1_3_2_1_24_1","volume-title":"Specification and Description Language (SDL)","author":"T.","year":"2010","unstructured":"ITU- T. Specification and Description Language (SDL) . 2010 . ITU-T. Specification and Description Language (SDL). 2010."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1133981.1134003"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.5555\/2041160.2041198"},{"key":"e_1_3_2_1_27_1","volume-title":"Rank correlation methods","author":"Kendall M. G.","year":"1990","unstructured":"M. G. Kendall and J. D. Gibbons . Rank correlation methods . Oxford University Press , 1990 . M. G. Kendall and J. D. Gibbons. Rank correlation methods. Oxford University Press, 1990."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/996841.996863"},{"key":"e_1_3_2_1_29_1","first-page":"518","volume-title":"ICML","author":"Lagoudakis M.G.","year":"2000","unstructured":"M.G. Lagoudakis and M.L. Littman . Algorithm selection using reinforcement learning . In ICML , pages 511\u2013 518 , 2000 . M.G. Lagoudakis and M.L. Littman. Algorithm selection using reinforcement learning. In ICML, pages 511\u2013518, 2000."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31424-7_32"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2013.42"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127878.1127884"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.10"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060297"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806852"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00768-2_17"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0065-2458(08)60520-3"},{"key":"e_1_3_2_1_38_1","first-page":"260","volume-title":"AAAI","volume":"7","author":"Samulowitz H.","year":"2007","unstructured":"H. Samulowitz and R. Memisevic . Learning to solve QBF . In AAAI , volume 7 , pages 255\u2013 260 , 2007 . H. Samulowitz and R. Memisevic. Learning to solve QBF. In AAAI, volume 7, pages 255\u2013260, 2007."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/IJCNN.2008.4634391"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065944.1065981"},{"key":"e_1_3_2_1_41_1","first-page":"265","volume-title":"Proc. of the London Math. Soc.","author":"Turing A. M.","year":"1936","unstructured":"A. M. Turing . On computable numbers, with an application to the entscheidungsproblem . Proc. of the London Math. Soc. , pages 230\u2013 265 , 1936 . A. M. Turing. On computable numbers, with an application to the entscheidungsproblem. Proc. of the London Math. Soc., pages 230\u2013265, 1936."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2007.25"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022920129859"},{"key":"e_1_3_2_1_44_1","first-page":"559","volume-title":"ASE","author":"Wang S.","year":"2011","unstructured":"S. Wang , D. Lo , L. Jiang , Lucia, and H. C. Lau . Search-based fault localization . In ASE , pages 556\u2013 559 , 2011 . S. Wang, D. Lo, L. Jiang, Lucia, and H. C. Lau. Search-based fault localization. In ASE, pages 556\u2013559, 2011."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.5555\/1622673.1622687"}],"event":{"name":"ICSE '14: 36th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","TCSE IEEE Computer Society's Tech. Council on Software Engin."],"location":"Hyderabad India","acronym":"ICSE '14"},"container-title":["Proceedings of the 11th Working Conference on Mining Software Repositories"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2597073.2597080","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2597073.2597080","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T06:56:03Z","timestamp":1750229763000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2597073.2597080"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,5,31]]},"references-count":44,"alternative-id":["10.1145\/2597073.2597080","10.1145\/2597073"],"URL":"https:\/\/doi.org\/10.1145\/2597073.2597080","relation":{},"subject":[],"published":{"date-parts":[[2014,5,31]]},"assertion":[{"value":"2014-05-31","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}