General LTL specification mining (T)

C Lemieux, D Park… - 2015 30th IEEE/ACM …, 2015 - ieeexplore.ieee.org
Temporal properties are useful for describing and reasoning about software behavior, but
developers rarely write down temporal specifications of their systems. Prior work on inferring …

Mithra: Anomaly detection as an oracle for cyberphysical systems

A Afzal, C Le Goues… - IEEE Transactions on …, 2021 - ieeexplore.ieee.org
Testing plays an essential role in ensuring the safety and quality of cyberphysical systems
(CPSs). One of the main challenges in automated and software-in-the-loop simulation …

Domain model acquisition in domains with action costs

P Gregory, A Lindsay - Proceedings of the International Conference on …, 2016 - ojs.aaai.org
This paper addresses the challenge of automated numeric domain model acquisition from
observations. Many industrial and commercial applications of planning technology rely on …

[图书][B] Automata based monitoring and mining of execution traces

G Reger - 2014 - search.proquest.com
This thesis contributes work to the fields of runtime monitoring and specification mining. It
develops a formalism for specifying patterns of behaviour in execution traces and defines …

Periodic task mining in embedded system traces

O Iegorov, R Torres… - 2017 IEEE Real-Time and …, 2017 - ieeexplore.ieee.org
Modern systems are growing in complexity beyond deep comprehension of developers.
Increasing difficulties of keeping software projects on schedule and increasing recall rates …

Mining temporal properties of data invariants

C Lemieux - 2015 IEEE/ACM 37th IEEE International …, 2015 - ieeexplore.ieee.org
System specifications are important in maintaining program correctness, detecting bugs,
understanding systems and guiding test case generation. Often, these specifications are not …

Mining temporal intervals from real-time system traces

S Kauffman, S Fischmeister - 2017 6th International Workshop …, 2017 - ieeexplore.ieee.org
We introduce a novel algorithm for mining temporal intervals from real-time system traces
with linear complexity using passive, black-box learning. Our interest is in mining nfer …

Past, present, and future of and in software visualization

S Diehl - Computer Vision, Imaging and Computer Graphics …, 2015 - Springer
In a selective retrospective of the history of software visualization we discuss examples of
applying visualization techniques to analyze the past and present state of software. Based …

Suggesting edits to explain failing traces

G Reger - Runtime Verification: 6th International Conference, RV …, 2015 - Springer
Runtime verification involves checking whether an execution trace produced by a running
system satisfies a specification. However, a simple 'yes' or 'no'answer may not be sufficient; …

Domain model acquisition with missing information and noisy data

P Gregory, A Lindsay, J Porteous - Workshop on Knowledge …, 2017 - research.tees.ac.uk
In this work, we address the problem of learning planning domain models from example
action traces that contain missing and noisy data. In many situations, the action traces that …