• Nguyen H, Phan H, Khairunnesa S, Nguyen S, Yadavally A, Wang S, Rajan H and Nguyen T. A Hybrid Approach for Inference between Behavioral Exception API Documentation and Implementations, and Its Applications. Proceedings of the 37th IEEE/ACM International Conference on Automated Software Engineering. (1-13).

    https://doi.org/10.1145/3551349.3560434

  • Afzal A, Motwani M, Stolee K, Brun Y and Le Goues C. SOSRepair: Expressive Semantic Search for Real-World Program Repair. IEEE Transactions on Software Engineering. 10.1109/TSE.2019.2944914. 47:10. (2162-2181).

    https://ieeexplore.ieee.org/document/8854217/

  • Bichhawat A, Fredrikson M and Yang J. (2021). Automating Audit with Policy Inference 2021 IEEE 34th Computer Security Foundations Symposium (CSF). 10.1109/CSF51468.2021.00001. 978-1-7281-7607-9. (1-16).

    https://ieeexplore.ieee.org/document/9505224/

  • Yang N, Cuijpers P, Schiffelers R, Lukkien J and Serebrenik A. An interview study of how developers use execution logs in embedded software engineering. Proceedings of the 43rd International Conference on Software Engineering: Software Engineering in Practice. (61-70).

    https://doi.org/10.1109/ICSE-SEIP52600.2021.00015

  • Zhou Y, Wang C, Yan X, Chen T, Panichella S and Gall H. Automatic Detection and Repair Recommendation of Directive Defects in Java API Documentation. IEEE Transactions on Software Engineering. 10.1109/TSE.2018.2872971. 46:9. (1004-1023).

    https://ieeexplore.ieee.org/document/8478004/

  • Beschastnikh I, Liu P, Xing A, Wang P, Brun Y and Ernst M. (2020). Visualizing Distributed System Executions. ACM Transactions on Software Engineering and Methodology. 29:2. (1-38). Online publication date: 30-Apr-2020.

    https://doi.org/10.1145/3375633

  • Motwani M and Brun Y. Automatically generating precise Oracles from structured natural language specifications. Proceedings of the 41st International Conference on Software Engineering. (188-199).

    https://doi.org/10.1109/ICSE.2019.00035

  • Zhong H and Mei H. An Empirical Study on API Usages. IEEE Transactions on Software Engineering. 10.1109/TSE.2017.2782280. 45:4. (319-334).

    https://ieeexplore.ieee.org/document/8186224/

  • Sun P, Brown C, Beschastnikh I and Stolee K. (2019). Mining Specifications from Documentation using a Crowd 2019 IEEE 26th International Conference on Software Analysis, Evolution and Reengineering (SANER). 10.1109/SANER.2019.8668025. 978-1-7281-0591-8. (275-286).

    https://ieeexplore.ieee.org/document/8668025/

  • Amar H, Bao L, Busany N, Lo D and Maoz S. Using finite-state models for log differencing. Proceedings of the 2018 26th ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering. (49-59).

    https://doi.org/10.1145/3236024.3236069

  • Sulír M and Porubän J. (2017). Source Code Documentation Generation Using Program Execution. Information. 10.3390/info8040148. 8:4. (148).

    https://www.mdpi.com/2078-2489/8/4/148

  • Krismayer T, Rabiser R and Grünbacher P. Mining constraints for event-based monitoring in systems of systems. Proceedings of the 32nd IEEE/ACM International Conference on Automated Software Engineering. (826-831).

    /doi/10.5555/3155562.3155664

  • Noda K, Kobayashi T, Toda T and Atsumi N. (2017). Identifying Core Objects for Trace Summarization Using Reference Relations and Access Analysis 2017 IEEE 41st Annual Computer Software and Applications Conference (COMPSAC). 10.1109/COMPSAC.2017.142. 978-1-5386-0367-3. (13-22).

    http://ieeexplore.ieee.org/document/8029585/

  • Wang Q, Brun Y and Orso A. (2017). Behavioral Execution Comparison: Are Tests Representative of Field Behavior? 2017 IEEE International Conference on Software Testing, Verification and Validation (ICST). 10.1109/ICST.2017.36. 978-1-5090-6031-3. (321-332).

    http://ieeexplore.ieee.org/document/7927986/

  • Ohmann T, Stanley R, Beschastnikh I and Brun Y. Visually reasoning about system and resource behavior. Proceedings of the 38th International Conference on Software Engineering Companion. (601-604).

    https://doi.org/10.1145/2889160.2889166

  • Busany N and Maoz S. Behavioral log analysis with statistical guarantees. Proceedings of the 38th International Conference on Software Engineering. (877-887).

    https://doi.org/10.1145/2884781.2884805

  • Grechanik M, Luo Q, Poshyvanyk D and Porter A. Enhancing Rules For Cloud Resource Provisioning Via Learned Software Performance Models. Proceedings of the 7th ACM/SPEC on International Conference on Performance Engineering. (209-214).

    https://doi.org/10.1145/2851553.2851568

  • Le T, Le X, Lo D and Beschastnikh I. Synergizing specification miners through model fissions and fusions. Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering. (115-125).

    https://doi.org/10.1109/ASE.2015.83

  • Lemieux C, Park D and Beschastnikh I. General LTL specification mining. Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering. (81-92).

    https://doi.org/10.1109/ASE.2015.71

  • Cohen H and Maoz S. Have we seen enough traces?. Proceedings of the 30th IEEE/ACM International Conference on Automated Software Engineering. (93-103).

    https://doi.org/10.1109/ASE.2015.62

  • Busany N and Maoz S. Behavioral log analysis with statistical guarantees. Proceedings of the 2015 10th Joint Meeting on Foundations of Software Engineering. (898-901).

    https://doi.org/10.1145/2786805.2803198

  • Beschastnikh I, Brun Y, Abrahamson J, Ernst M and Krishnamurthy A. (2015). Using Declarative Specification to Improve the Understanding, Extensibility, and Comparison of Model-Inference Algorithms. IEEE Transactions on Software Engineering. 41:4. (408-428). Online publication date: 1-Apr-2015.

    https://doi.org/10.1109/TSE.2014.2369047

  • Krka I, Brun Y and Medvidovic N. Automatic mining of specifications from invocation traces and method invariants. Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering. (178-189).

    https://doi.org/10.1145/2635868.2635890

  • Ohmann T, Herzberg M, Fiss S, Halbert A, Palyart M, Beschastnikh I and Brun Y. Behavioral resource-aware model inference. Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering. (19-30).

    https://doi.org/10.1145/2642937.2642988

  • Cohen H and Maoz S. The confidence in our k-tails. Proceedings of the 29th ACM/IEEE International Conference on Automated Software Engineering. (605-610).

    https://doi.org/10.1145/2642937.2642944

  • Ohmann T, Thai K, Beschastnikh I and Brun Y. Mining precise performance-aware behavioral models from existing instrumentation. Companion Proceedings of the 36th International Conference on Software Engineering. (484-487).

    https://doi.org/10.1145/2591062.2591107

  • Fahland D, Lo D and Maoz S. Mining branching-time scenarios. Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering. (443-453).

    https://doi.org/10.1109/ASE.2013.6693102

  • Thung F, Wang S, Lo D and Lawall J. Automatic recommendation of API methods from feature requests. Proceedings of the 28th IEEE/ACM International Conference on Automated Software Engineering. (290-300).

    https://doi.org/10.1109/ASE.2013.6693088

  • Thung F, Lo D and Lawall J. (2013). Automated library recommendation 2013 20th Working Conference on Reverse Engineering (WCRE). 10.1109/WCRE.2013.6671293. 978-1-4799-2931-3. (182-191).

    http://ieeexplore.ieee.org/document/6671293/

  • Beschastnikh I, Brun Y, Abrahamson J, Ernst M and Krishnamurthy A. Unifying FSM-inference algorithms through declarative specification. Proceedings of the 2013 International Conference on Software Engineering. (252-261).

    /doi/10.5555/2486788.2486822

  • Beschastnikh I, Brun Y, Abrahamson J, Ernst M and Krishnamurthy A. (2013). Unifying FSM-inference algorithms through declarative specification 2013 35th International Conference on Software Engineering (ICSE). 10.1109/ICSE.2013.6606571. 978-1-4673-3076-3. (252-261).

    http://ieeexplore.ieee.org/document/6606571/

  • Lo D and Maoz S. (2012). Scenario-based and value-based specification mining: better together. Automated Software Engineering. 10.1007/s10515-012-0103-x. 19:4. (423-458). Online publication date: 1-Dec-2012.

    http://link.springer.com/10.1007/s10515-012-0103-x

  • Cohen M, Huang S and Memon A. AutoInSpec. Proceedings of the 2012 IEEE 23rd International Symposium on Software Reliability Engineering. (251-260).

    https://doi.org/10.1109/ISSRE.2012.33

  • Kumar S, Khoo S, Roychoudhury A and Lo D. Inferring class level specifications for distributed systems. Proceedings of the 34th International Conference on Software Engineering. (914-924).

    /doi/10.5555/2337223.2337331

  • Kumar S, Khoo S, Roychoudhury A and Lo D. (2012). Inferring class level specifications for distributed systems 2012 34th International Conference on Software Engineering (ICSE 2012). 10.1109/ICSE.2012.6227128. 978-1-4673-1066-6. (914-924).

    http://ieeexplore.ieee.org/document/6227128/

  • Howar F, Steffen B, Jonsson B and Cassel S. Inferring canonical register automata. Proceedings of the 13th international conference on Verification, Model Checking, and Abstract Interpretation. (251-266).

    https://doi.org/10.1007/978-3-642-27940-9_17

  • Zhong H, Zhang L, Xie T and Mei H. (2011). Inferring specifications for resources from natural language API documentation. Automated Software Engineering. 18:3-4. (227-261). Online publication date: 1-Dec-2011.

    https://doi.org/10.1007/s10515-011-0082-3

  • Wu Q, Liang G, Wang Q and Mei H. (2011). Mining effective temporal specifications from heterogeneous API data. Journal of Computer Science and Technology. 26:6. (1061-1075). Online publication date: 1-Nov-2011.

    https://doi.org/10.1007/s11390-011-1201-0

  • Lo D, Khoo S and Han J. (2011). Specification Mining. Mining Software Specifications. 10.1201/b10928-2. (1-27). Online publication date: 24-May-2011.

    http://www.crcnetbase.com/doi/abs/10.1201/b10928-2

  • Lo D and Maoz S. Towards Succinctness in Mining Scenario-Based Specifications. Proceedings of the 2011 16th IEEE International Conference on Engineering of Complex Computer Systems. (231-240).

    https://doi.org/10.1109/ICECCS.2011.30