{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T05:00:29Z","timestamp":1750309229183,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":13,"publisher":"ACM","license":[{"start":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T00:00:00Z","timestamp":1720569600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2024,7,10]]},"DOI":"10.1145\/3663529.3663865","type":"proceedings-article","created":{"date-parts":[[2024,7,10]],"date-time":"2024-07-10T19:43:13Z","timestamp":1720640593000},"page":"657-658","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":1,"title":["Inferring Natural Preconditions via Program Transformation"],"prefix":"10.1145","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-0738-8813","authenticated-orcid":false,"given":"Elizabeth","family":"Dinella","sequence":"first","affiliation":[{"name":"Bryn Mawr College, Philadelphia, USA"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-4446-4777","authenticated-orcid":false,"given":"Shuvendu K.","family":"Lahiri","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, United States"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-1348-8618","authenticated-orcid":false,"given":"Mayur","family":"Naik","sequence":"additional","affiliation":[{"name":"University of Pennsylvania, Philadelphia, USA"}]}],"member":"320","published-online":{"date-parts":[[2024,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314641"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2018.00074"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542517"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"crossref","unstructured":"Patrick Cousot Radhia Cousot Manuel Fahndrich and Francesco Logozzo. 2013. Automatic Inference of Necessary Preconditions. In in Proceedings of the 14th Conference on Verification Model Checking and Abstract Interpretation (VMCAI\u201913) (in proceedings of the 14th conference on verification model checking and abstract interpretation (vmcai\u201913) ed.).","DOI":"10.1007\/978-3-642-35873-9_10"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/1946284.1946296"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"crossref","unstructured":"Michael D Ernst Jeff H Perkins Philip J Guo Stephen McCamant Carlos Pacheco Matthew S Tschantz and Chen Xiao. 2007. The Daikon system for dynamic detection of likely invariants. Science of computer programming.","DOI":"10.1016\/j.scico.2007.01.015"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337322"},{"key":"e_1_3_2_1_8_1","volume-title":"Learning to Represent Programs with Property Signatures. CoRR, abs\/2002.09030","author":"Odena Augustus","year":"2020","unstructured":"Augustus Odena and Charles Sutton. 2020. Learning to Represent Programs with Property Signatures. CoRR, abs\/2002.09030 (2020)."},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2980983.2908099"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37036-6_25"},{"key":"e_1_3_2_1_11_1","unstructured":"Charles Sutton David Bieber Kensen Shi Kexin Pei and Pengcheng Yin. 2023. Can Large Language Models Reason About Program Invariants?"},{"key":"e_1_3_2_1_12_1","volume":"199","author":"S.","unstructured":"S. M. J Sutton. 1995. Preconditions, Postconditions, and Provisional Execution in Software Processes. USA.","journal-title":"J Sutton."},{"key":"e_1_3_2_1_13_1","volume-title":"APISan: Sanitizing API Usages through Semantic Cross-Checking","author":"Yun Insu","year":"1971","unstructured":"Insu Yun, Changwoo Min, Xujie Si, Yeongjin Jang, Taesoo Kim, and Mayur Naik. 2016. APISan: Sanitizing API Usages through Semantic Cross-Checking. USENIX Association, Austin, TX. isbn:978-1-931971-32-4"}],"event":{"name":"FSE '24: 32nd ACM International Conference on the Foundations of Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Porto de Galinhas Brazil","acronym":"FSE '24"},"container-title":["Companion Proceedings of the 32nd ACM International Conference on the Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3663529.3663865","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3663529.3663865","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T23:44:22Z","timestamp":1750290262000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3663529.3663865"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2024,7,10]]},"references-count":13,"alternative-id":["10.1145\/3663529.3663865","10.1145\/3663529"],"URL":"https:\/\/doi.org\/10.1145\/3663529.3663865","relation":{},"subject":[],"published":{"date-parts":[[2024,7,10]]},"assertion":[{"value":"2024-07-10","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}