This paper presents an approach to mine parametric state-based specifications from execution traces, which can involve multiple components. We first discuss a general framework for mining parametric properties from execution traces, which allows one to apply non-parametric mining algorithms to infer parametric specifications without any modification. Then we propose a novel mining algorithm that extends the Probabilistic Finite State Automata (PFSA) approach to infer finite automata that describe system be-haviors concisely and precisely from successful executions. The presented technique has been implemented in a proto-type tool for Java, called jMiner, which has been applied to a number of real-life programs, including Java library classe...
Abstract—Specification mining extracts candidate specification from existing systems, to be used for...
Program verication is a promising approach to improving program quality, because it can search all p...
Software evolution incurs difficulties in program comprehension and software verification, and hence...
This paper presents an approach to mine parametric state-based specifications from execution traces,...
Mining formal specifications from program executions has numerous applications in software analysis,...
Mining formal specifications from program executions has numerous applications in software analysis,...
Abstract—This paper presents a technique for using execution traces to mine parametric temporal spec...
Abstract. This paper presents a technique for mining parametric temporal specifications from executi...
Softwares are often built without specification. Tools to automatically extract specification from s...
Many testing and analysis techniques use finite state mod-els to validate and verify the quality of ...
Program verification is a promising approach to improving program quality, because it can search all...
Behavioural models are a valuable tool for software verification, testing, monitoring, publishing et...
AbstractLibraries usually impose constraints on how clients should use them. Often these constraints...
Abstract—Dynamic specification mining extracts candidate specifications from logs of execution trace...
Abstract—Specification mining extracts candidate specification from existing systems, to be used for...
Abstract—Specification mining extracts candidate specification from existing systems, to be used for...
Program verication is a promising approach to improving program quality, because it can search all p...
Software evolution incurs difficulties in program comprehension and software verification, and hence...
This paper presents an approach to mine parametric state-based specifications from execution traces,...
Mining formal specifications from program executions has numerous applications in software analysis,...
Mining formal specifications from program executions has numerous applications in software analysis,...
Abstract—This paper presents a technique for using execution traces to mine parametric temporal spec...
Abstract. This paper presents a technique for mining parametric temporal specifications from executi...
Softwares are often built without specification. Tools to automatically extract specification from s...
Many testing and analysis techniques use finite state mod-els to validate and verify the quality of ...
Program verification is a promising approach to improving program quality, because it can search all...
Behavioural models are a valuable tool for software verification, testing, monitoring, publishing et...
AbstractLibraries usually impose constraints on how clients should use them. Often these constraints...
Abstract—Dynamic specification mining extracts candidate specifications from logs of execution trace...
Abstract—Specification mining extracts candidate specification from existing systems, to be used for...
Abstract—Specification mining extracts candidate specification from existing systems, to be used for...
Program verication is a promising approach to improving program quality, because it can search all p...
Software evolution incurs difficulties in program comprehension and software verification, and hence...