Mining specifications
Top Cited Papers
- 1 January 2002
- proceedings article
- Published by Association for Computing Machinery (ACM)
- Vol. 37 (1), 4-16
- https://doi.org/10.1145/503272.503275
Abstract
No abstract availableThis publication has 16 references indexed in Scilit:
- An empirical study of operating systems errorsPublished by Association for Computing Machinery (ACM) ,2001
- Bugs as deviant behaviorPublished by Association for Computing Machinery (ACM) ,2001
- Dynamically discovering likely program invariants to support program evolutionIEEE Transactions on Software Engineering, 2001
- A Real-Time Intrusion Detection System Based on Learning Program BehaviorLecture Notes in Computer Science, 2000
- Using Finite Automata to Mine Execution Data for Intrusion Detection: A Preliminary ReportLecture Notes in Computer Science, 2000
- Quickly detecting relevant program invariantsPublished by Association for Computing Machinery (ACM) ,2000
- Discovering models of software processes from event-based dataACM Transactions on Software Engineering and Methodology, 1998
- On the learnability and usage of acyclic probabilistic finite automataPublished by Association for Computing Machinery (ACM) ,1995
- Efficiency of a Good But Not Linear Set Union AlgorithmJournal of the ACM, 1975
- Language identification in the limitInformation and Control, 1967