{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,11]],"date-time":"2026-04-11T02:13:15Z","timestamp":1775873595536,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":50,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,5,21]],"date-time":"2022-05-21T00:00:00Z","timestamp":1653091200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/501100003725","name":"National Research Foundation of Korea","doi-asserted-by":"publisher","award":["2021R1A5A1021944"],"award-info":[{"award-number":["2021R1A5A1021944"]}],"id":[{"id":"10.13039\/501100003725","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,5,21]]},"DOI":"10.1145\/3510003.3510098","type":"proceedings-article","created":{"date-parts":[[2022,7,5]],"date-time":"2022-07-05T22:42:59Z","timestamp":1657060979000},"page":"1282-1293","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["Learning probabilistic models for static analysis alarms"],"prefix":"10.1145","author":[{"given":"Hyunsu","family":"Kim","sequence":"first","affiliation":[{"name":"KAIST, Korea"}]},{"given":"Mukund","family":"Raghothaman","sequence":"additional","affiliation":[{"name":"University of Southern California"}]},{"given":"Kihong","family":"Heo","sequence":"additional","affiliation":[{"name":"KAIST, Korea"}]}],"member":"320","published-online":{"date-parts":[[2022,7,5]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Foundations of Databases: The Logical Level","author":"Abiteboul Serge","unstructured":"Serge Abiteboul, Richard Hull, and Victor Vianu. 1994. Foundations of Databases: The Logical Level (1st ed.). Pearson.","edition":"1"},{"key":"e_1_3_2_1_2_1","volume-title":"de Campos","author":"Adel Tameem","year":"2017","unstructured":"Tameem Adel and Cassio P. de Campos. 2017. Learning Bayesian Networks with Incomplete Data by Augmentation. In Proceedings of the Thirty-First AAAI Conference on Artificial Intelligence. AAAI Press, 1684--1690."},{"key":"e_1_3_2_1_3_1","volume-title":"CP 2017","volume":"10416","author":"Albarghouthi Aws","year":"2017","unstructured":"Aws Albarghouthi, Paraschos Koutris, Mayur Naik, and Calvin Smith. 2017. Constraint-Based Synthesis of Datalog Programs. In Principles and Practice of Constraint Programming - 23rd International Conference, CP 2017, Vol. 10416. Springer, 689--706."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133925"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468626"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Patrick Cousot and Radhia Cousot. 1992. Abstract Interpretation Frameworks. J. Log. Comput. (1992).","DOI":"10.1093\/logcom\/2.4.511"},{"key":"e_1_3_2_1_7_1","unstructured":"Paul Eggert. 2010. sort: Commit 14ad7a2. http:\/\/git.savannah.gnu.org\/cgit\/coreutils.git\/commit\/?id=14ad7a2. sort: Fix very-unlikely buffer overrun when merging to input file."},{"key":"e_1_3_2_1_8_1","volume-title":"The Bayesian Structural EM Algorithm. In UAI '98: Proceedings of the Fourteenth Conference on Uncertainty in Artificial Intelligence. 129--138","author":"Friedman Nir","year":"1998","unstructured":"Nir Friedman. 1998. The Bayesian Structural EM Algorithm. In UAI '98: Proceedings of the Fourteenth Conference on Uncertainty in Artificial Intelligence. 129--138."},{"key":"e_1_3_2_1_9_1","unstructured":"Assaf Gordon. 2018. sed: Commit 007a417. http:\/\/git.savannah.gnu.org\/cgit\/sed.git\/commit\/?id=007a417. sed: Fix heap buffer overflow from multiline EOL regex optimization."},{"key":"e_1_3_2_1_10_1","volume-title":"Proceedings of the 41st ACM SIGPLAN International Conference on Programming Language Design and Implementation, PLDI. ACM, 1112--1127","author":"He Jingxuan","unstructured":"Jingxuan He, Gagandeep Singh, Markus P\u00fcschel, and Martin T. Vechev. 2020. Learning fast and precise numerical analysis. In Proceedings of the 41st ACM SIGPLAN International Conference on Programming Language Design and Implementation, PLDI. ACM, 1112--1127."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00994016"},{"key":"e_1_3_2_1_12_1","volume-title":"SAS (Lecture Notes in Computer Science","volume":"256","author":"Heo Kihong","year":"2016","unstructured":"Kihong Heo, Hakjoo Oh, and Hongseok Yang. 2016. Learning a Variable-Clustering Strategy for Octagon from Labeled Data Generated by a Static Analysis. In Static Analysis - 23rd International Symposium, SAS (Lecture Notes in Computer Science, Vol. 9837). Springer, 237--256."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2019.00027"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.54"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314616"},{"key":"e_1_3_2_1_16_1","volume-title":"Static Analysis","author":"Jensen Simon Holm","unstructured":"Simon Holm Jensen, Anders M\u00f8ller, and Peter Thiemann. 2009. Type Analysis for JavaScript. In Static Analysis. Springer, 238--255."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3276931"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/3428247"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133924"},{"key":"e_1_3_2_1_20_1","volume-title":"Probabilistic graphical models: Principles and techniques","author":"Koller Daphne","unstructured":"Daphne Koller and Nir Friedman. 2009. Probabilistic graphical models: Principles and techniques. The MIT Press."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1882291.1882336"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/3095021"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786851"},{"key":"e_1_3_2_1_24_1","unstructured":"Jim Meyering. 2018. tar: Commit b531801. http:\/\/git.savannah.gnu.org\/cgit\/tar.git\/commit\/?id=b531801. One-top-level: Avoid a heap-buffer-overflow."},{"key":"e_1_3_2_1_25_1","unstructured":"MITRE. 2015. CVE-2015-1345. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-1345."},{"key":"e_1_3_2_1_26_1","unstructured":"MITRE. 2015. CVE-2015-8106. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2015-8106."},{"key":"e_1_3_2_1_27_1","unstructured":"MITRE. 2016. CVE-2016-10713. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2016-10713."},{"key":"e_1_3_2_1_28_1","unstructured":"MITRE. 2017. CVE-2017-16663. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-16663."},{"key":"e_1_3_2_1_29_1","unstructured":"MITRE. 2017. CVE-2017-16938. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-16938."},{"key":"e_1_3_2_1_30_1","unstructured":"MITRE. 2017. CVE-2017-9181. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2017-9181."},{"key":"e_1_3_2_1_31_1","unstructured":"MITRE. 2018. CVE-2018-10372. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-10372."},{"key":"e_1_3_2_1_32_1","unstructured":"MITRE. 2018. CVE-2018-6612. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2018-6612."},{"key":"e_1_3_2_1_33_1","unstructured":"MITRE. 2019. CVE-2019-16166. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-16166."},{"key":"e_1_3_2_1_34_1","unstructured":"MITRE. 2019. CVE-2019-18397. https:\/\/cve.mitre.org\/cgi-bin\/cvename.cgi?name=CVE-2019-18397."},{"key":"e_1_3_2_1_35_1","article-title":"libDAI: A Free and Open Source C++ Library for Discrete Approximate Inference in Graphical Models","author":"Mooij Joris","year":"2010","unstructured":"Joris Mooij. 2010. libDAI: A Free and Open Source C++ Library for Discrete Approximate Inference in Graphical Models. Journal of Machine Learning Research 11 (Aug. 2010), 2169--2173.","journal-title":"Journal of Machine Learning Research 11"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254092"},{"key":"e_1_3_2_1_37_1","unstructured":"Hakjoo Oh Kihong Heo Wonchan Lee Woosuk Lee and Kwangkeun Yi. 2012. The Sparrow static analyzer. https:\/\/github.com\/ropas\/sparrow."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814309"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192417"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/3371130"},{"key":"e_1_3_2_1_41_1","unstructured":"Tim R\u00fchsen. 2018. wget: Commit b3ff8ce. http:\/\/git.savannah.gnu.org\/cgit\/wget.git\/commit\/?id=b3ff8ce.src\/ftp-ls.c (ftp_parse_vms_ls): Fix heap-buffer-overflow."},{"key":"e_1_3_2_1_42_1","unstructured":"Tim R\u00fchsen. 2018. wget: Commit f0d715b. http:\/\/git.savannah.gnu.org\/cgit\/wget.git\/commit\/?id=f0d715b.src\/ftp-ls.c (ftp_parse_vms_ls): Fix heap-buffer-overflow."},{"key":"e_1_3_2_1_43_1","volume-title":"Learning Bayesian Networks with Thousands of Variables. In Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015. 1864","author":"Scanagatta Mauro","year":"2015","unstructured":"Mauro Scanagatta, Cassio P. de Campos, Giorgio Corani, and Marco Zaffalon. 2015. Learning Bayesian Networks with Thousands of Variables. In Advances in Neural Information Processing Systems 28: Annual Conference on Neural Information Processing Systems 2015. 1864--1872."},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/3192366.3192418"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/3236024.3236034"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.24963\/ijcai.2019\/847"},{"key":"e_1_3_2_1_47_1","volume-title":"Vechev","author":"Singh Gagandeep","year":"2018","unstructured":"Gagandeep Singh, Markus P\u00fcschel, and Martin T. Vechev. 2018. Fast Numerical Program Analysis with Reinforcement Learning. In Computer Aided Verification - 30th International Conference, CAV (Lecture Notes in Computer Science, Vol. 10981). Springer, 211--229."},{"key":"e_1_3_2_1_48_1","volume-title":"Prediction, and Search","author":"Spirtes Peter","unstructured":"Peter Spirtes, Clark Glymour, and Richard Scheines. 2000. Causation, Prediction, and Search, Second Edition. MIT Press."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/2892208.2892235"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1145\/3133881"}],"event":{"name":"ICSE '22: 44th International Conference on Software Engineering","location":"Pittsburgh Pennsylvania","acronym":"ICSE '22","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"]},"container-title":["Proceedings of the 44th International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510098","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3510003.3510098","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T18:10:23Z","timestamp":1750183823000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3510003.3510098"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,5,21]]},"references-count":50,"alternative-id":["10.1145\/3510003.3510098","10.1145\/3510003"],"URL":"https:\/\/doi.org\/10.1145\/3510003.3510098","relation":{},"subject":[],"published":{"date-parts":[[2022,5,21]]},"assertion":[{"value":"2022-07-05","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}