{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,18]],"date-time":"2025-12-18T14:05:27Z","timestamp":1766066727797,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":55,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T00:00:00Z","timestamp":1499644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,10]]},"DOI":"10.1145\/3092703.3092730","type":"proceedings-article","created":{"date-parts":[[2017,7,11]],"date-time":"2017-07-11T20:17:18Z","timestamp":1499804238000},"page":"136-146","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":7,"title":["Effective online software anomaly detection"],"prefix":"10.1145","author":[{"given":"Yizhen","family":"Chen","sequence":"first","affiliation":[{"name":"SUNY Albany, USA"}]},{"given":"Ming","family":"Ying","sequence":"additional","affiliation":[{"name":"SUNY Albany, USA"}]},{"given":"Daren","family":"Liu","sequence":"additional","affiliation":[{"name":"SUNY Albany, USA"}]},{"given":"Adil","family":"Alim","sequence":"additional","affiliation":[{"name":"SUNY Albany, USA"}]},{"given":"Feng","family":"Chen","sequence":"additional","affiliation":[{"name":"SUNY Albany, USA"}]},{"given":"Mei-Hwa","family":"Chen","sequence":"additional","affiliation":[{"name":"SUNY Albany, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Daikon invariant detector. https:\/\/plse.cs.washington.edu\/daikon.  Daikon invariant detector. https:\/\/plse.cs.washington.edu\/daikon."},{"key":"e_1_3_2_1_2_1","unstructured":"Java-callgraph. https:\/\/github.com\/gousiosg\/java-callgraph.  Java-callgraph. https:\/\/github.com\/gousiosg\/java-callgraph."},{"key":"e_1_3_2_1_3_1","unstructured":"The objectaid uml explorer. http:\/\/objectaid.com\/.  The objectaid uml explorer. http:\/\/objectaid.com\/."},{"key":"e_1_3_2_1_4_1","series-title":"Series B (Methodological)","first-page":"76","volume-title":"The usefulness of optimum experimental designs. Journal of the Royal Statistical Society","author":"Atkinson A.","year":"1996","unstructured":"A. Atkinson . The usefulness of optimum experimental designs. Journal of the Royal Statistical Society . Series B (Methodological) , pages 59\u2013 76 , 1996 . A. Atkinson. The usefulness of optimum experimental designs. Journal of the Royal Statistical Society. Series B (Methodological), pages 59\u201376, 1996."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931049"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1188895.1188911"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1132905.1132921"},{"key":"e_1_3_2_1_8_1","volume-title":"The oracle problem in software testing: A survey","author":"Barr E. T.","year":"2015","unstructured":"E. T. Barr , M. Harman , P. McMinn , M. Shahbaz , and S. Yoo . The oracle problem in software testing: A survey . IEEE transactions on software engineering, 41(5):507\u2013 525, 2015 . E. T. Barr, M. Harman, P. McMinn, M. Shahbaz, and S. Yoo. The oracle problem in software testing: A survey. IEEE transactions on software engineering, 41(5):507\u2013 525, 2015."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2909480"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.acha.2009.04.002"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/993483"},{"key":"e_1_3_2_1_12_1","first-page":"490","volume-title":"Proceedings of the 26th International Conference on Software Engineering","author":"Brun Y.","unstructured":"Y. Brun and M. D. Ernst . Finding latent code errors via machine learning over program executions . In Proceedings of the 26th International Conference on Software Engineering , pages 480\u2013 490 . IEEE Computer Society, 2004. Y. Brun and M. D. Ernst. Finding latent code errors via machine learning over program executions. In Proceedings of the 26th International Conference on Software Engineering, pages 480\u2013490. IEEE Computer Society, 2004."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-7152(84)90020-8"},{"key":"e_1_3_2_1_14_1","volume-title":"IJCAI. Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence","author":"Chen F.","year":"2016","unstructured":"F. Chen and B. Zhou . A generalized matching pursuit approach for graphstructured sparsity . In IJCAI. Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence , 2016 . F. Chen and B. Zhou. A generalized matching pursuit approach for graphstructured sparsity. In IJCAI. Proceedings of the Twenty-Third International Joint Conference on Artificial Intelligence, 2016."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2002951.2002955"},{"issue":"5","key":"e_1_3_2_1_16_1","first-page":"2826","article-title":"Sparse vehicular sensor networks for traffic dynamics reconstruction. Intelligent Transportation Systems","volume":"16","author":"del Arco E.","year":"2015","unstructured":"E. del Arco , E. Morgado , M. I. Chidean , J. Ramiro-Bargueno , I. Mora-Jim\u00e9nez , and A. J. Caamano . Sparse vehicular sensor networks for traffic dynamics reconstruction. Intelligent Transportation Systems , IEEE Transactions on , 16 ( 5 ): 2826 \u2013 2837 , 2015 . E. del Arco, E. Morgado, M. I. Chidean, J. Ramiro-Bargueno, I. Mora-Jim\u00e9nez, and A. J. Caamano. Sparse vehicular sensor networks for traffic dynamics reconstruction. Intelligent Transportation Systems, IEEE Transactions on, 16(5):2826\u20132837, 2015.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.21236\/ADA445754"},{"key":"e_1_3_2_1_18_1","first-page":"348","volume-title":"Proceedings of the 23rd international conference on Software engineering","author":"Dickinson W.","unstructured":"W. Dickinson , D. Leon , and A. Podgurski . Finding failures by cluster analysis of execution profiles . In Proceedings of the 23rd international conference on Software engineering , pages 339\u2013 348 . IEEE Computer Society, 2001. W. Dickinson, D. Leon, and A. Podgurski. Finding failures by cluster analysis of execution profiles. In Proceedings of the 23rd international conference on Software engineering, pages 339\u2013348. IEEE Computer Society, 2001."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2013.05.020"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-005-3861-2"},{"key":"e_1_3_2_1_21_1","first-page":"3404","volume-title":"Advances in Neural Information Processing Systems","author":"Dolhansky B. W.","year":"2016","unstructured":"B. W. Dolhansky and J. A. Bilmes . Deep submodular functions: Definitions and learning . In Advances in Neural Information Processing Systems , pages 3396\u2013 3404 , 2016 . B. W. Dolhansky and J. A. Bilmes. Deep submodular functions: Definitions and learning. In Advances in Neural Information Processing Systems, pages 3396\u20133404, 2016."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.proeng.2014.02.066"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/581339.581377"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1061\/40976(316)513"},{"issue":"9","key":"e_1_3_2_1_26_1","first-page":"5129","article-title":"Approximation algorithms for model-based compressive sensing. Information Theory","volume":"61","author":"Hegde C.","year":"2015","unstructured":"C. Hegde , P. Indyk , and L. Schmidt . Approximation algorithms for model-based compressive sensing. Information Theory , IEEE Transactions on , 61 ( 9 ): 5129 \u2013 5147 , 2015 . C. Hegde, P. Indyk, and L. Schmidt. Approximation algorithms for model-based compressive sensing. Information Theory, IEEE Transactions on, 61(9):5129\u20135147, 2015.","journal-title":"IEEE Transactions on"},{"key":"e_1_3_2_1_27_1","first-page":"937","volume-title":"Proceedings of the 32nd International Conference on Machine Learning (ICML-15)","author":"Hegde C.","year":"2015","unstructured":"C. Hegde , P. Indyk , and L. Schmidt . A nearly-linear time framework for graphstructured sparsity . In Proceedings of the 32nd International Conference on Machine Learning (ICML-15) , pages 928\u2013 937 , 2015 . C. Hegde, P. Indyk, and L. Schmidt. A nearly-linear time framework for graphstructured sparsity. In Proceedings of the 32nd International Conference on Machine Learning (ICML-15), pages 928\u2013937, 2015."},{"key":"e_1_3_2_1_28_1","volume-title":"Algorithms for approximate minimization of the difference between submodular functions, with applications. arXiv preprint arXiv:1207.0560","author":"Iyer R.","year":"2012","unstructured":"R. Iyer and J. Bilmes . Algorithms for approximate minimization of the difference between submodular functions, with applications. arXiv preprint arXiv:1207.0560 , 2012 . R. Iyer and J. Bilmes. Algorithms for approximate minimization of the difference between submodular functions, with applications. arXiv preprint arXiv:1207.0560, 2012."},{"key":"e_1_3_2_1_29_1","first-page":"2444","volume-title":"Advances in Neural Information Processing Systems","author":"Iyer R. K.","year":"2013","unstructured":"R. K. Iyer and J. A. Bilmes . Submodular optimization with submodular cover and submodular knapsack constraints . In Advances in Neural Information Processing Systems , pages 2436\u2013 2444 , 2013 . R. K. Iyer and J. A. Bilmes. Submodular optimization with submodular cover and submodular knapsack constraints. In Advances in Neural Information Processing Systems, pages 2436\u20132444, 2013."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628055"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.43.4.684"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1127777.1127782"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1061\/(ASCE)0733-9496(2008)134:6(516)"},{"key":"e_1_3_2_1_34_1","first-page":"192","volume-title":"Proceedings of the 2009 International Conference on Information Processing in Sensor Networks","author":"Krause A.","unstructured":"A. Krause , R. Rajagopal , A. Gupta , and C. Guestrin . Simultaneous placement and scheduling of sensors . In Proceedings of the 2009 International Conference on Information Processing in Sensor Networks , pages 181\u2013 192 . IEEE Computer Society, 2009. A. Krause, R. Rajagopal, A. Gupta, and C. Guestrin. Simultaneous placement and scheduling of sensors. In Proceedings of the 2009 International Conference on Information Processing in Sensor Networks, pages 181\u2013192. IEEE Computer Society, 2009."},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1390681.1390689"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/780822.781148"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610408"},{"key":"e_1_3_2_1_38_1","volume-title":"Tractability: Practical Approaches to Hard Problems","author":"Lucas Bordeaux Y. H.","year":"2014","unstructured":"Y. H. Lucas Bordeaux and P. Kohli . Tractability: Practical Approaches to Hard Problems . Cambridge University Press , 2014 . Y. H. Lucas Bordeaux and P. Kohli. Tractability: Practical Approaches to Hard Problems. Cambridge University Press, 2014."},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/2773808.2774067"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1080\/01966324.1988.10737244"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491434"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.991329"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/566171.566182"},{"key":"e_1_3_2_1_44_1","volume-title":"Optimal sensor placement for time-dependent systems: Application to wind studies around buildings. Journal of Computing in Civil Engineering, page 04015024","author":"Papadopoulou M.","year":"2015","unstructured":"M. Papadopoulou , B. Raphael , I. F. Smith , and C. Sekhar . Optimal sensor placement for time-dependent systems: Application to wind studies around buildings. Journal of Computing in Civil Engineering, page 04015024 , 2015 . M. Papadopoulou, B. Raphael, I. F. Smith, and C. Sekhar. Optimal sensor placement for time-dependent systems: Application to wind studies around buildings. Journal of Computing in Civil Engineering, page 04015024, 2015."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1561\/2400000003"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629585"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/EDCC.2010.33"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572284"},{"key":"e_1_3_2_1_49_1","volume-title":"Automated fault localization using potential invariants. arXiv preprint cs\/0310040","author":"Pytlik B.","year":"2003","unstructured":"B. Pytlik , M. Renieris , S. Krishnamurthi , and S. P. Reiss . Automated fault localization using potential invariants. arXiv preprint cs\/0310040 , 2003 . B. Pytlik, M. Renieris, S. Krishnamurthi, and S. P. Reiss. Automated fault localization using potential invariants. arXiv preprint cs\/0310040, 2003."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/2490301.2451131"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572282"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595750"},{"key":"e_1_3_2_1_53_1","first-page":"1264","volume-title":"Advances in neural information processing systems","author":"Snelson E.","year":"2005","unstructured":"E. Snelson and Z. Ghahramani . Sparse gaussian processes using pseudo-inputs . In Advances in neural information processing systems , pages 1257\u2013 1264 , 2005 . E. Snelson and Z. Ghahramani. Sparse gaussian processes using pseudo-inputs. In Advances in neural information processing systems, pages 1257\u20131264, 2005."},{"key":"e_1_3_2_1_54_1","first-page":"249","volume-title":"Software Metrics Symposium, 1999. Proceedings. Sixth International","author":"Tang M.-H.","unstructured":"M.-H. Tang , M.-H. Kao , and M.-H. Chen . An empirical study on object-oriented metrics . In Software Metrics Symposium, 1999. Proceedings. Sixth International , pages 242\u2013 249 . IEEE, 1999. M.-H. Tang, M.-H. Kao, and M.-H. Chen. An empirical study on object-oriented metrics. In Software Metrics Symposium, 1999. Proceedings. Sixth International, pages 242\u2013249. IEEE, 1999."},{"key":"e_1_3_2_1_55_1","first-page":"2013","article-title":"Deployment support for sensor networks in indoor climate monitoring","author":"Yun J.","year":"2013","unstructured":"J. Yun and J. Kim . Deployment support for sensor networks in indoor climate monitoring . International Journal of Distributed Sensor Networks , 2013 , 2013 . J. Yun and J. Kim. Deployment support for sensor networks in indoor climate monitoring. International Journal of Distributed Sensor Networks, 2013, 2013.","journal-title":"International Journal of Distributed Sensor Networks"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(02)00048-4"}],"event":{"name":"ISSTA '17: International Symposium on Software Testing and Analysis","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Santa Barbara CA USA","acronym":"ISSTA '17"},"container-title":["Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3092703.3092730","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3092703.3092730","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:27Z","timestamp":1750217847000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3092703.3092730"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,10]]},"references-count":55,"alternative-id":["10.1145\/3092703.3092730","10.1145\/3092703"],"URL":"https:\/\/doi.org\/10.1145\/3092703.3092730","relation":{},"subject":[],"published":{"date-parts":[[2017,7,10]]},"assertion":[{"value":"2017-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}