{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T16:45:14Z","timestamp":1725727514833},"publisher-location":"Berlin, Heidelberg","reference-count":27,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642391750"},{"type":"electronic","value":"9783642391767"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39176-7_17","type":"book-chapter","created":{"date-parts":[[2013,5,30]],"date-time":"2013-05-30T08:58:44Z","timestamp":1369904324000},"page":"264-281","source":"Crossref","is-referenced-by-count":8,"title":["Mining Sequential Patterns to Explain Concurrent Counterexamples"],"prefix":"10.1007","author":[{"given":"Stefan","family":"Leue","sequence":"first","affiliation":[]},{"given":"Mitra Tabaei","family":"Befrouei","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"17_CR1","unstructured":"Agrawal, R., Srikant, R.: Mining sequential patterns. In: ICDE (1995)"},{"volume-title":"Principles of Model Checking","year":"2008","author":"C. Baier","key":"17_CR2","unstructured":"Baier, C., Katoen, J.-P.: Principles of Model Checking. The MIT Press, Massachusetts (2008)"},{"key":"17_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1007\/978-3-642-02658-4_11","volume-title":"Computer Aided Verification","author":"I. Beer","year":"2009","unstructured":"Beer, I., Ben-David, S., Chockler, H., Orni, A., Trefler, R.: Explaining counterexamples using causality. In: Bouajjani, A., Maler, O. (eds.) CAV 2009. LNCS, vol.\u00a05643, pp. 94\u2013108. Springer, Heidelberg (2009)"},{"key":"17_CR4","unstructured":"Dong, G., Pei, J.: Sequence Data Mining. Springer (2007)"},{"key":"17_CR5","unstructured":"Fatta, G.D., Leue, S., Stegantova, E.: Discriminative pattern mining in software fault detection. In: Proceedings of the 3rd International Workshop on Software Quality Assurance (2006)"},{"key":"17_CR6","doi-asserted-by":"crossref","unstructured":"Groce, A., Chaki, S., Kroening, D., Strichman, O.: Error explanation with distance metrics. In: International Journal on Software Tools for Technology Transfer (STTT) (2006)","DOI":"10.1007\/s10009-005-0202-0"},{"key":"17_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/3-540-44829-2_8","volume-title":"Model Checking Software","author":"A. Groce","year":"2003","unstructured":"Groce, A., Visser, W.: What went wrong: Explaining counterexamples. In: Ball, T., Rajamani, S.K. (eds.) SPIN 2003. LNCS, vol.\u00a02648, pp. 121\u2013135. Springer, Heidelberg (2003)"},{"key":"17_CR8","doi-asserted-by":"crossref","unstructured":"Halpern, J., Pearl, J.: Causes and explanations: A structural-model approach. part I: Causes. The British Journal for the Philosophy of Science (2005)","DOI":"10.1093\/bjps\/axi147"},{"key":"17_CR9","unstructured":"Holzmann, G.J.: The SPIN Model Checker: Primer and Reference Manual. Addision-Wesley (2003)"},{"key":"17_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"471","DOI":"10.1007\/3-540-46419-0_32","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"M. Kamel","year":"2000","unstructured":"Kamel, M., Leue, S.: VIP: A visual editor and compiler for v-promela. In: Graf, S., Schwartzbach, M. (eds.) TACAS\/ETAPS 2000. LNCS, vol.\u00a01785, pp. 471\u2013486. Springer, Heidelberg (2000)"},{"key":"17_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"248","DOI":"10.1007\/978-3-642-35873-9_16","volume-title":"Verification, Model Checking, and Abstract Interpretation","author":"F. Leitner-Fischer","year":"2013","unstructured":"Leitner-Fischer, F., Leue, S.: Causality checking for complex system models. In: Giacobazzi, R., Berdine, J., Mastroeni, I. (eds.) VMCAI 2013. LNCS, vol.\u00a07737, pp. 248\u2013267. Springer, Heidelberg (2013)"},{"key":"17_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"24","DOI":"10.1007\/978-3-642-31759-0_5","volume-title":"Model Checking Software","author":"S. Leue","year":"2012","unstructured":"Leue, S., Tabaei Befrouei, M.: Counterexample explanation by anomaly detection. In: Donaldson, A., Parker, D. (eds.) SPIN 2012. LNCS, vol.\u00a07385, pp. 24\u201342. Springer, Heidelberg (2012)"},{"key":"17_CR13","unstructured":"Lewis, D.: Counterfactuals. Wiley-Blackwell (2001)"},{"key":"17_CR14","doi-asserted-by":"crossref","unstructured":"Liu, C., Yan, X., Yu, H., Han, J., Yu, P.S.: Mining behavior graphs for backtrace of noncrashing bugs. In: Proceedings of the Fifth SIAM International Conference on Data Mining (2005)","DOI":"10.1137\/1.9781611972757.26"},{"key":"17_CR15","doi-asserted-by":"crossref","unstructured":"Lo, D., Khoo, S., Liu, C.: Efficient mining of iterative patterns for software specification discovery. In: KDD (2007)","DOI":"10.1145\/1281192.1281243"},{"key":"17_CR16","doi-asserted-by":"crossref","unstructured":"Lu, S., Tucek, J., Qin, F., Zhou, Y.: Avio: Detecting atomicity violations via access interleaving invariants. In: ASPLOS (2006)","DOI":"10.1145\/1168857.1168864"},{"key":"17_CR17","doi-asserted-by":"crossref","unstructured":"Lucia, B., Ceze, L.: Finding concurrency bugs with context-aware communication graphs. In: Proceedings of the 42nd Annual IEEE\/ACM International Symposium on Microarchitecture (2009)","DOI":"10.1145\/1669112.1669181"},{"key":"17_CR18","doi-asserted-by":"crossref","unstructured":"Netzer, R., Miller, B.: Improving the accuracy of data race detection. In: Proceedings of the 3rd ACM Symposium on Principles and Practice of Parallel Programming. ACM Press (1991)","DOI":"10.1145\/109625.109640"},{"key":"17_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1007\/978-3-642-21887-3_46","volume-title":"Computational Science and Its Applications - ICCSA 2011","author":"S. Parsa","year":"2011","unstructured":"Parsa, S., Naree, S.A., Koopaei, N.E.: Software fault localization via mining execution graphs. In: Murgante, B., Gervasi, O., Iglesias, A., Taniar, D., Apduhan, B.O. (eds.) ICCSA 2011, Part II. LNCS, vol.\u00a06783, pp. 610\u2013623. Springer, Heidelberg (2011)"},{"key":"17_CR20","unstructured":"Pei, J., Han, J., Mortazavi-Asl, B., Pinto, H., Chen, Q., Dayal, U., Hsu, M.: Prefixspan: Mining sequential patterns efficiently by prefix-projected pattern growth. In: 17th International Conference on Data Engineering (ICDE 2001) (2001)"},{"key":"17_CR21","unstructured":"Pelanek, R.: Benchmarks for explicit model checkers (2006), \n \n http:\/\/anna.fi.muni.cz\/models"},{"key":"17_CR22","doi-asserted-by":"crossref","unstructured":"Ramanathan, M.K., Grama, A., Jagannathan, S.: Path-sensitive inference of function precedence protocols. In: Proceedings of the 29th International Conference on Software Engineering (ICSE) (2007)","DOI":"10.1109\/ICSE.2007.63"},{"key":"17_CR23","doi-asserted-by":"crossref","unstructured":"Savage, S., Burrows, M., Nelson, G., Sobalvarro, P., Anderson, T.: Eraser: a dynamic data race detector for multithreaded programs. ACM Transactions on Computer Systems (TOCS)\u00a015(4) (1997)","DOI":"10.1145\/265924.265927"},{"key":"17_CR24","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1007\/11901914_9","volume-title":"Automated Technology for Verification and Analysis","author":"C. Wang","year":"2006","unstructured":"Wang, C., Yang, Z., Ivan\u010di\u0107, F., Gupta, A.: Whodunit? causal analysis for counterexamples. In: Graf, S., Zhang, W. (eds.) ATVA 2006. LNCS, vol.\u00a04218, pp. 82\u201395. Springer, Heidelberg (2006)"},{"key":"17_CR25","unstructured":"Wang, J., Han, J.: Bide: Efficient mining of frequent closed sequences. In: ICDE (2004)"},{"key":"17_CR26","doi-asserted-by":"crossref","unstructured":"Yan, X., Han, J., Afshar, R.: Clospan: Mining closed sequential patterns in large datasets. In: Proceedings of 2003 SIAM International Conference on Data Mining (SDM 2003) (2003)","DOI":"10.1137\/1.9781611972733.15"},{"volume-title":"Why Programs Fail: A Guide to Systematic Debugging","year":"2009","author":"A. Zeller","key":"17_CR27","unstructured":"Zeller, A.: Why Programs Fail: A Guide to Systematic Debugging. Morgan Kaufmann, Burlington (2009)"}],"container-title":["Lecture Notes in Computer Science","Model Checking Software"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39176-7_17","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,13]],"date-time":"2019-05-13T12:59:19Z","timestamp":1557752359000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39176-7_17"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642391750","9783642391767"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39176-7_17","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}