Specification Mining: A Concise Introduction
暂无分享,去创建一个
Jiawei Han | Siau-Cheng Khoo | David Lo | Chao Liu | Chao Liu | Jiawei Han | D. Lo | Siau-Cheng Khoo
[1] David Lo,et al. Scenario-based and value-based specification mining: better together , 2010, Automated Software Engineering.
[2] Zhendong Su,et al. Online inference and enforcement of temporal properties , 2010, 2010 ACM/IEEE 32nd International Conference on Software Engineering.
[3] Andreas Zeller,et al. Mining temporal specifications from object usage , 2009, 2009 IEEE/ACM International Conference on Automated Software Engineering.
[4] Thomas R. Gross,et al. Automatic Generation of Object Usage Specifications from Large Method Traces , 2009, 2009 IEEE/ACM International Conference on Automated Software Engineering.
[5] Tao Xie,et al. Inferring Resource Specifications from Natural Language API Documentation , 2009, 2009 IEEE/ACM International Conference on Automated Software Engineering.
[6] Tao Xie,et al. Alattin: Mining Alternative Patterns for Detecting Neglected Conditions , 2009, 2009 IEEE/ACM International Conference on Automated Software Engineering.
[7] David Lo,et al. Mining Hierarchical Scenario-Based Specifications , 2009, 2009 IEEE/ACM International Conference on Automated Software Engineering.
[8] David Lo,et al. Mining Quantified Temporal Rules: Formalism, Algorithms, and Evaluation , 2009, 2009 16th Working Conference on Reverse Engineering.
[9] David Lo,et al. Automatic steering of behavioral model inference , 2009, ESEC/SIGSOFT FSE.
[10] Hoan Anh Nguyen,et al. Graph-based mining of multiple object usage patterns , 2009, ESEC/FSE '09.
[11] Jian Pei,et al. MAPO: Mining and Recommending API Usage Patterns , 2009, ECOOP.
[12] Krzysztof Czarnecki,et al. Supporting Framework Use via Automatically Extracted Concept-Implementation Templates , 2009, ECOOP.
[13] Benjamin Livshits,et al. Merlin: specification inference for explicit information flow problems , 2009, PLDI '09.
[14] Tao Xie,et al. Mining exception-handling rules as sequence association rules , 2009, 2009 IEEE 31st International Conference on Software Engineering.
[15] Tao Xie,et al. Mining API Error-Handling Specifications from Source Code , 2009, FASE.
[16] Lu Zhang,et al. Early Filtering of Polluting Method Calls for Mining Temporal Specifications , 2008, 2008 15th Asia-Pacific Software Engineering Conference.
[17] Hong Mei,et al. Inferring Specifications of Object Oriented APIs from API Source Code , 2008, 2008 15th Asia-Pacific Software Engineering Conference.
[18] Leonardo Mariani,et al. Automated Identification of Failure Causes in System Logs , 2008, 2008 19th International Symposium on Software Reliability Engineering (ISSRE).
[19] David Lo,et al. Specification mining of symbolic scenario-based models , 2008, PASTE '08.
[20] Zhendong Su,et al. Javert: fully automatic mining of general temporal properties from dynamic traces , 2008, SIGSOFT '08/FSE-16.
[21] Neil Walkinshaw,et al. Inferring Finite-State Models with Temporal Constraints , 2008, 2008 23rd IEEE/ACM International Conference on Automated Software Engineering.
[22] David Lo,et al. Mining Scenario-Based Triggers and Effects , 2008, 2008 23rd IEEE/ACM International Conference on Automated Software Engineering.
[23] Suresh Jagannathan,et al. Protocol Inference Using Static Path Profiles , 2008, SAS.
[24] Chao Liu,et al. Journal of Software Maintenance and Evolution: Research and Practice Mining Temporal Rules for Software Maintenance , 2022 .
[25] Leonardo Mariani,et al. Automatic generation of software behavioral models , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.
[26] Zhendong Su,et al. Symbolic mining of temporal specifications , 2008, 2008 ACM/IEEE 30th International Conference on Software Engineering.
[27] Eran Yahav,et al. Static Specification Mining Using Automata-Based Abstractions , 2007, IEEE Transactions on Software Engineering.
[28] Rainer Koschke,et al. Dynamic Protocol Recovery , 2007, 14th Working Conference on Reverse Engineering (WCRE 2007).
[29] Stephen McCamant,et al. The Daikon system for dynamic detection of likely invariants , 2007, Sci. Comput. Program..
[30] Siau-Cheng Khoo,et al. Mining modal scenario-based specifications from execution traces of reactive systems , 2007, ASE '07.
[31] Tao Xie,et al. Parseweb: a programmer assistant for reusing open source code on the web , 2007, ASE.
[32] Sebastián Uchitel,et al. Detecting Implied Scenarios from Execution Traces , 2007, 14th Working Conference on Reverse Engineering (WCRE 2007).
[33] Spiros Mancoridis,et al. A Reverse Engineering Tool for Extracting Protocols of Networked Applications , 2007, 14th Working Conference on Reverse Engineering (WCRE 2007).
[34] Neil Walkinshaw,et al. Reverse Engineering State Machines by Interactive Grammar Inference , 2007, 14th Working Conference on Reverse Engineering (WCRE 2007).
[35] Jian Pei,et al. Mining API patterns as partial orders from source code: from usage scenarios to specifications , 2007, ESEC-FSE '07.
[36] Chao Liu,et al. Efficient mining of iterative patterns for software specification discovery , 2007, KDD '07.
[37] Suresh Jagannathan,et al. Static specification inference using predicate mining , 2007, PLDI '07.
[38] Leonardo Mariani,et al. Compatibility and Regression Testing of COTS-Component-Based Software , 2007, 29th International Conference on Software Engineering (ICSE'07).
[39] Suresh Jagannathan,et al. Path-Sensitive Inference of Function Precedence Protocols , 2007, 29th International Conference on Software Engineering (ICSE'07).
[40] Tao Xie,et al. Mining Interface Specifications for Generating Checkable Robustness Properties , 2006, 2006 17th International Symposium on Software Reliability Engineering.
[41] Dawson R. Engler,et al. From uncertainty to belief: inferring the specification within , 2006, OSDI '06.
[42] Siau-Cheng Khoo,et al. SMArTIC: towards building an accurate, robust and scalable specification miner , 2006, SIGSOFT '06/FSE-14.
[43] Lionel C. Briand,et al. Toward the Reverse Engineering of UML Sequence Diagrams for Distributed Java Software , 2006, IEEE Transactions on Software Engineering.
[44] Stephen McCamant,et al. Inference and enforcement of data structure consistency specifications , 2006, ISSTA '06.
[45] Marat Boshernitsan,et al. From daikon to agitator: lessons and challenges in building a commercial tool for developer testing , 2006, ISSTA '06.
[46] Kamran Sartipi,et al. Dynamic Analysis of Software Systems using Execution Pattern Mining , 2006, 14th IEEE International Conference on Program Comprehension (ICPC'06).
[47] Manuvir Das,et al. Perracotta: mining temporal API rules from imperfect traces , 2006, ICSE.
[48] Andreas Zeller,et al. Mining object behavior with ADABU , 2006, WODA '06.
[49] Zhenmin Li,et al. PR-Miner: automatically extracting implicit programming rules and detecting violations in large software code , 2005, ESEC/FSE-13.
[50] Thomas A. Henzinger,et al. Permissive interfaces , 2005, ESEC/FSE-13.
[51] Benjamin Livshits,et al. DynaMine: finding common error patterns by mining software revision histories , 2005, ESEC/FSE-13.
[52] Leonardo Mariani,et al. Behavior capture and test: automated analysis of component integration , 2005, 10th IEEE International Conference on Engineering of Complex Computer Systems (ICECCS'05).
[53] Rastislav Bodík,et al. Jungloid mining: helping to navigate the API jungle , 2005, PLDI '05.
[54] George C. Necula,et al. Mining Temporal Specifications for Error Detection , 2005, TACAS.
[55] Pavol Cerný,et al. Synthesis of interface specifications for Java classes , 2005, POPL '05.
[56] Michael D. Ernst,et al. Efficient incremental algorithms for dynamic detection of likely invariants , 2004, SIGSOFT '04/FSE-12.
[57] Yuriy Brun,et al. Finding latent code errors via machine learning over program executions , 2004, Proceedings. 26th International Conference on Software Engineering.
[58] Heikki Mannila,et al. Discovery of Frequent Episodes in Event Sequences , 1997, Data Mining and Knowledge Discovery.
[59] James R. Larus,et al. Debugging temporal specifications with concept analysis , 2003, PLDI '03.
[60] Eleni Stroulia,et al. From run-time behavior to usage scenarios: an interaction-pattern mining approach , 2002, KDD.
[61] Michael D. Ernst,et al. Automatic generation of program specifications , 2002, ISSTA '02.
[62] Monica S. Lam,et al. Automatic extraction of object-oriented component interfaces , 2002, ISSTA '02.
[63] James R. Larus,et al. Mining specifications , 2002, POPL '02.
[64] Dawson R. Engler,et al. Bugs as deviant behavior: a general approach to inferring errors in systems code , 2001, SOSP.
[65] David Harel,et al. LSCs: Breathing Life into Message Sequence Charts , 1999, Formal Methods Syst. Des..
[66] William G. Griswold,et al. Quickly detecting relevant program invariants , 2000, Proceedings of the 2000 International Conference on Software Engineering. ICSE 2000 the New Millennium.
[67] L. Erlikh,et al. Leveraging legacy system dollars for e-business , 2000 .
[68] William G. Griswold,et al. Dynamically discovering likely program invariants to support program evolution , 1999, Proceedings of the 1999 International Conference on Software Engineering (IEEE Cat. No.99CB37002).
[69] Alexander L. Wolf,et al. Automating Process Discovery through Event-Data Analysis , 1995, 1995 17th International Conference on Software Engineering.
[70] Ramakrishnan Srikant,et al. Mining sequential patterns , 1995, Proceedings of the Eleventh International Conference on Data Engineering.
[71] Thomas A. Standish. An Essay on Software Reuse , 1984, IEEE Transactions on Software Engineering.
[72] Jerome A. Feldman,et al. On the Synthesis of Finite-State Machines from Samples of Their Behavior , 1972, IEEE Transactions on Computers.