{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T23:15:33Z","timestamp":1763507733601,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":62,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,10,24]],"date-time":"2018-10-24T00:00:00Z","timestamp":1540339200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000185","name":"Defense Advanced Research Projects Agency","doi-asserted-by":"publisher","award":["FA8650-15-C-7564"],"award-info":[{"award-number":["FA8650-15-C-7564"]}],"id":[{"id":"10.13039\/100000185","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,10,24]]},"DOI":"10.1145\/3276954.3276959","type":"proceedings-article","created":{"date-parts":[[2018,10,24]],"date-time":"2018-10-24T15:28:39Z","timestamp":1540394919000},"page":"12-28","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":5,"title":["Active learning for inference and regeneration of computer programs that store and retrieve data"],"prefix":"10.1145","author":[{"given":"Martin C.","family":"Rinard","sequence":"first","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]},{"given":"Jiasi","family":"Shen","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]},{"given":"Varun","family":"Mangalick","sequence":"additional","affiliation":[{"name":"Massachusetts Institute of Technology, USA"}]}],"member":"320","published-online":{"date-parts":[[2018,10,24]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2013.60"},{"volume-title":"Learning I\/O Automata","author":"Aarts Fides","key":"e_1_3_2_1_2_1","unstructured":"Fides Aarts and Frits Vaandrager . 2010. Learning I\/O Automata . Springer Berlin Heidelberg , Berlin, Heidelberg , 71\u201385. Fides Aarts and Frits Vaandrager. 2010. Learning I\/O Automata. Springer Berlin Heidelberg, Berlin, Heidelberg, 71\u201385."},{"key":"e_1_3_2_1_3_1","volume-title":"Automatic generation of basic behavior schemas from UML class diagrams. Software &amp","author":"Albert Manoli","year":"2010","unstructured":"Manoli Albert , Jordi Cabot , Cristina G\u00f3mez , and Vicente Pelechano . 2010. Automatic generation of basic behavior schemas from UML class diagrams. Software &amp ; Systems Modeling 9, 1 ( 2010 ), 47\u201367. Manoli Albert, Jordi Cabot, Cristina G\u00f3mez, and Vicente Pelechano. 2010. Automatic generation of basic behavior schemas from UML class diagrams. Software &amp; Systems Modeling 9, 1 (2010), 47\u201367."},{"key":"e_1_3_2_1_4_1","volume-title":"FMCAD 2013","author":"Alur Rajeev","year":"2013","unstructured":"Rajeev Alur , Rastislav Bod\u00edk , Garvit Juniwal , Milo M. K. Martin , Mukund Raghothaman , Sanjit A. Seshia , Rishabh Singh , Armando Solar-Lezama , Emina Torlak , and Abhishek Udupa . 2013 . Syntax-guided synthesis. In Formal Methods in Computer-Aided Design , FMCAD 2013 , Portland, OR, USA , October 20-23, 2013. 1\u20138. Rajeev Alur, Rastislav Bod\u00edk, Garvit Juniwal, Milo M. K. Martin, Mukund Raghothaman, Sanjit A. Seshia, Rishabh Singh, Armando Solar-Lezama, Emina Torlak, and Abhishek Udupa. 2013. Syntax-guided synthesis. In Formal Methods in Computer-Aided Design, FMCAD 2013, Portland, OR, USA, October 20-23, 2013. 1\u20138."},{"volume-title":"2015 IEEE High Performance Extreme Computing Conference (HPEC). 1\u20136.","author":"Amidon P.","key":"e_1_3_2_1_5_1","unstructured":"P. Amidon , E. Davis , S. Sidiroglou-Douskos , and M. Rinard . 2015. Program fracture and recombination for efficient automatic code reuse . In 2015 IEEE High Performance Extreme Computing Conference (HPEC). 1\u20136. P. Amidon, E. Davis, S. Sidiroglou-Douskos, and M. Rinard. 2015. Program fracture and recombination for efficient automatic code reuse. In 2015 IEEE High Performance Extreme Computing Conference (HPEC). 1\u20136."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/0890-5401(87)90052-6"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062349"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192383"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.153.0225"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-29613-5_2"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/2432361"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150464"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180445"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10270-012-0270-z"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1007\/s00165-016-0355-5"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1978.231496"},{"volume-title":"Proceedings of the 8th International Conference on Neural Information Processing Systems (NIPS\u201995)","author":"Mark","key":"e_1_3_2_1_17_1","unstructured":"Mark W. Craven and Jude W. Shavlik. 1995. Extracting Tree-structured Representations of Trained Networks . In Proceedings of the 8th International Conference on Neural Information Processing Systems (NIPS\u201995) . MIT Press, Cambridge, MA, USA, 24\u201330. Mark W. Craven and Jude W. Shavlik. 1995. Extracting Tree-structured Representations of Trained Networks. In Proceedings of the 8th International Conference on Neural Information Processing Systems (NIPS\u201995). MIT Press, Cambridge, MA, USA, 24\u201330."},{"key":"e_1_3_2_1_18_1","volume-title":"Proceedings of the 24th USENIX Conference on Security Symposium (SEC\u201915)","author":"Ruiter Joeri De","year":"2015","unstructured":"Joeri De Ruiter and Erik Poll . 2015 . Protocol State Fuzzing of TLS Implementations . In Proceedings of the 24th USENIX Conference on Security Symposium (SEC\u201915) . USENIX Association, Berkeley, CA, USA, 193\u2013206. Joeri De Ruiter and Erik Poll. 2015. Protocol State Fuzzing of TLS Implementations. In Proceedings of the 24th USENIX Conference on Security Symposium (SEC\u201915). USENIX Association, Berkeley, CA, USA, 193\u2013206."},{"key":"e_1_3_2_1_19_1","unstructured":"Django. 2018. The Web framework for perfectionists with deadlines | Django. https:\/\/www.djangoproject.com\/.  Django. 2018. The Web framework for perfectionists with deadlines | Django. https:\/\/www.djangoproject.com\/."},{"key":"e_1_3_2_1_20_1","volume-title":"Sampling for Bayesian Program Learning. In Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016","author":"Ellis Kevin","year":"2016","unstructured":"Kevin Ellis , Armando Solar-Lezama , and Josh Tenenbaum . 2016 . Sampling for Bayesian Program Learning. In Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016 , December 5-10, 2016, Barcelona, Spain. 1289\u20131297. Kevin Ellis, Armando Solar-Lezama, and Josh Tenenbaum. 2016. Sampling for Bayesian Program Learning. In Advances in Neural Information Processing Systems 29: Annual Conference on Neural Information Processing Systems 2016, December 5-10, 2016, Barcelona, Spain. 1289\u20131297."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192382"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3062341.3062351"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737977"},{"volume-title":"Combining Model Learning and Model Checking to Analyze TCP Implementations","author":"Fiter\u0103u-Bro\u015ftean Paul","key":"e_1_3_2_1_24_1","unstructured":"Paul Fiter\u0103u-Bro\u015ftean , Ramon Janssen , and Frits Vaandrager . 2016. Combining Model Learning and Model Checking to Analyze TCP Implementations . Springer International Publishing , Cham , 454\u2013471. Paul Fiter\u0103u-Bro\u015ftean, Ramon Janssen, and Frits Vaandrager. 2016. Combining Model Learning and Model Checking to Analyze TCP Implementations. Springer International Publishing, Cham, 454\u2013471."},{"key":"e_1_3_2_1_25_1","unstructured":"Flask. 2018. Flask. http:\/\/flask.pocoo.org\/ .  Flask. 2018. Flask. http:\/\/flask.pocoo.org\/ ."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2011.04.003"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070546"},{"volume-title":"CAV 2015, San Francisco, CA, USA, July 18-24, 2015, Proceedings, Part I. 307\u2013323","author":"Gehr Timon","key":"e_1_3_2_1_28_1","unstructured":"Timon Gehr , Dimitar Dimitrov , and Martin T. Vechev . 2015. Learning Commutativity Specifications. In Computer Aided Verification - 27th International Conference , CAV 2015, San Francisco, CA, USA, July 18-24, 2015, Proceedings, Part I. 307\u2013323 . Timon Gehr, Dimitar Dimitrov, and Martin T. Vechev. 2015. Learning Commutativity Specifications. In Computer Aided Verification - 27th International Conference, CAV 2015, San Francisco, CA, USA, July 18-24, 2015, Proceedings, Part I. 307\u2013323."},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090147.2094081"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2010.07.008"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1561\/2500000010"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786875"},{"key":"e_1_3_2_1_34_1","volume-title":"Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531","author":"Hinton Geoffrey","year":"2015","unstructured":"Geoffrey Hinton , Oriol Vinyals , and Jeff Dean . 2015. Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531 ( 2015 ). Geoffrey Hinton, Oriol Vinyals, and Jeff Dean. 2015. Distilling the knowledge in a neural network. arXiv preprint arXiv:1503.02531 (2015)."},{"volume-title":"The TTT Algorithm: A Redundancy-Free Approach to Active Automata Learning","author":"Isberner Malte","key":"e_1_3_2_1_35_1","unstructured":"Malte Isberner , Falk Howar , and Bernhard Steffen . 2014. The TTT Algorithm: A Redundancy-Free Approach to Active Automata Learning . Springer International Publishing , Cham , 307\u2013322. Malte Isberner, Falk Howar, and Bernhard Steffen. 2014. The TTT Algorithm: A Redundancy-Free Approach to Active Automata Learning. Springer International Publishing, Cham, 307\u2013322."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884856"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2803189"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806833"},{"key":"e_1_3_2_1_39_1","unstructured":"Steve Lohr. 2017. Where Non-Techies Can Get With the Programming. The New York Times. https:\/\/nyti.ms\/2oxp31L .  Steve Lohr. 2017. Where Non-Techies Can Get With the Programming. The New York Times. https:\/\/nyti.ms\/2oxp31L ."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737974"},{"key":"e_1_3_2_1_41_1","volume-title":"Gedanken-experiments on sequential machines. Automata studies 34","author":"Moore Edward F","year":"1956","unstructured":"Edward F Moore . 1956. Gedanken-experiments on sequential machines. Automata studies 34 ( 1956 ), 129\u2013153. Edward F Moore. 1956. Gedanken-experiments on sequential machines. Automata studies 34 (1956), 129\u2013153."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908093"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081180.1081189"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462176"},{"key":"e_1_3_2_1_45_1","unstructured":"Ruby On Rails. 2018. Ruby on Rails | A web-application framework that includes everything needed to create database-backed web applications according to the Model-View-Controller (MVC) pattern. https:\/\/rubyonrails.org\/.  Ruby On Rails. 2018. Ruby on Rails | A web-application framework that includes everything needed to create database-backed web applications according to the Model-View-Controller (MVC) pattern. https:\/\/rubyonrails.org\/."},{"key":"e_1_3_2_1_46_1","unstructured":"Redis. 2018. Redis. https:\/\/redis.io\/ .  Redis. 2018. Redis. https:\/\/redis.io\/ ."},{"volume-title":"Object-Oriented and Classical Software Engineering (7 ed.)","author":"Schach Stephen R.","key":"e_1_3_2_1_48_1","unstructured":"Stephen R. Schach . 2007. Object-Oriented and Classical Software Engineering (7 ed.) . McGraw-Hill, Inc. , New York, NY, USA . Stephen R. Schach. 2007. Object-Oriented and Classical Software Engineering (7 ed.). McGraw-Hill, Inc., New York, NY, USA."},{"key":"e_1_3_2_1_49_1","unstructured":"Douglas C Schmidt. 2006. Model-driven engineering. (2006).  Douglas C Schmidt. 2006. Model-driven engineering. (2006)."},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106269"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737988"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2694344.2694389"},{"key":"e_1_3_2_1_57_1","volume-title":"Computer Science For All","author":"Smith Megan","year":"2016","unstructured":"Megan Smith . 2016. Computer Science For All . The White House . https:\/\/ obamawhitehouse.archives.gov\/blog\/ 2016 \/01\/30\/computer-science-all . Megan Smith. 2016. Computer Science For All. The White House. https:\/\/ obamawhitehouse.archives.gov\/blog\/2016\/01\/30\/computer-science-all ."},{"key":"e_1_3_2_1_58_1","unstructured":"StackOverflow. 2018. Stack Overflow. http:\/\/stackoverflow.com\/.  StackOverflow. 2018. Stack Overflow. http:\/\/stackoverflow.com\/."},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022683529158"},{"key":"e_1_3_2_1_60_1","volume-title":"25th USENIX Security Symposium (USENIX Security 16)","author":"Tram\u00e8r Florian","year":"2016","unstructured":"Florian Tram\u00e8r , Fan Zhang , Ari Juels , Michael K. Reiter , and Thomas Ristenpart . 2016 . Stealing Machine Learning Models via Prediction APIs . In 25th USENIX Security Symposium (USENIX Security 16) . USENIX Association, Austin, TX, 601\u2013618. Florian Tram\u00e8r, Fan Zhang, Ari Juels, Michael K. Reiter, and Thomas Ristenpart. 2016. Stealing Machine Learning Models via Prediction APIs. In 25th USENIX Security Symposium (USENIX Security 16). USENIX Association, Austin, TX, 601\u2013618."},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2967606"},{"key":"e_1_3_2_1_62_1","volume-title":"Approximate Active Learning of Nondeterministic Input Output Transition Systems. Electronic Communications of the EASST 72","author":"Volpato Michele","year":"2015","unstructured":"Michele Volpato and Jan Tretmans . 2015. Approximate Active Learning of Nondeterministic Input Output Transition Systems. Electronic Communications of the EASST 72 ( 2015 ). Michele Volpato and Jan Tretmans. 2015. Approximate Active Learning of Nondeterministic Input Output Transition Systems. Electronic Communications of the EASST 72 (2015)."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1145\/3158151"},{"volume-title":"Using Dynamic Analysis to Infer Python Programs and Convert Them into Database Programs. Master\u2019s thesis","author":"Jerry Wu.","key":"e_1_3_2_1_64_1","unstructured":"Jerry Wu. 2018. Using Dynamic Analysis to Infer Python Programs and Convert Them into Database Programs. Master\u2019s thesis . Massachusetts Institute of Technology . Jerry Wu. 2018. Using Dynamic Analysis to Infer Python Programs and Convert Them into Database Programs. Master\u2019s thesis. Massachusetts Institute of Technology."},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2908080.2908088"},{"key":"e_1_3_2_1_66_1","first-page":"5","article-title":"2015 Taulbee Survey: Continued Booming Undergraduate CS Enrollment; Doctoral Degree Production Dips Slightly","volume":"28","author":"Zweben Stuart","year":"2016","unstructured":"Stuart Zweben and Betsy Bizot . 2016 . 2015 Taulbee Survey: Continued Booming Undergraduate CS Enrollment; Doctoral Degree Production Dips Slightly . Computing Research News 28 , 5 (may 2016). Stuart Zweben and Betsy Bizot. 2016. 2015 Taulbee Survey: Continued Booming Undergraduate CS Enrollment; Doctoral Degree Production Dips Slightly. Computing Research News 28, 5 (may 2016).","journal-title":"Computing Research News"}],"event":{"name":"SPLASH '18: Conference on Systems, Programming, Languages, and Applications: Software for Humanity","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"],"location":"Boston MA USA","acronym":"SPLASH '18"},"container-title":["Proceedings of the 2018 ACM SIGPLAN International Symposium on New Ideas, New Paradigms, and Reflections on Programming and Software"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3276954.3276959","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3276954.3276959","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3276954.3276959","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T00:57:41Z","timestamp":1750208261000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3276954.3276959"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,10,24]]},"references-count":62,"alternative-id":["10.1145\/3276954.3276959","10.1145\/3276954"],"URL":"https:\/\/doi.org\/10.1145\/3276954.3276959","relation":{},"subject":[],"published":{"date-parts":[[2018,10,24]]},"assertion":[{"value":"2018-10-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}