{"id":"https://openalex.org/W2153964911","doi":"https://doi.org/10.1109/icse.2009.5070548","title":"Mining exception-handling rules as sequence association rules","display_name":"Mining exception-handling rules as sequence association rules","publication_year":2009,"publication_date":"2009-01-01","ids":{"openalex":"https://openalex.org/W2153964911","doi":"https://doi.org/10.1109/icse.2009.5070548","mag":"2153964911"},"language":"en","primary_location":{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icse.2009.5070548","pdf_url":null,"source":null,"license":null,"version":null,"is_accepted":false,"is_published":false},"type":"article","type_crossref":"proceedings-article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5024313608","display_name":"Suresh Thummalapenta","orcid":null},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535","https://openalex.org/I4210158053"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Suresh Thummalapenta","raw_affiliation_string":"Department of Computer Science, North Carolina State University, USA#TAB#","raw_affiliation_strings":["Department of Computer Science, North Carolina State University, USA#TAB#"]},{"author_position":"last","author":{"id":"https://openalex.org/A5048118068","display_name":"Tao Xie","orcid":"https://orcid.org/0000-0002-6731-216X"},"institutions":[{"id":"https://openalex.org/I137902535","display_name":"North Carolina State University","ror":"https://ror.org/04tj63d06","country_code":"US","type":"education","lineage":["https://openalex.org/I137902535","https://openalex.org/I4210158053"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Tao Xie","raw_affiliation_string":"Department of Computer Science, North Carolina State University, USA#TAB#","raw_affiliation_strings":["Department of Computer Science, North Carolina State University, USA#TAB#"]}],"countries_distinct_count":1,"institutions_distinct_count":1,"corresponding_author_ids":[],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"has_fulltext":true,"fulltext_origin":"ngrams","cited_by_count":120,"cited_by_percentile_year":{"min":98,"max":99},"biblio":{"volume":null,"issue":null,"first_page":null,"last_page":null},"is_retracted":false,"is_paratext":false,"primary_topic":{"id":"https://openalex.org/T10126","display_name":"Program Analysis and Verification Techniques","score":0.9959,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10126","display_name":"Program Analysis and Verification Techniques","score":0.9959,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Empirical Studies in Software Engineering","score":0.9954,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12479","display_name":"Web Application Security and Vulnerability Detection","score":0.9855,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"keyword":"sequence association rules","score":0.6641},{"keyword":"exception-handling","score":0.25}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.5255966},{"id":"https://openalex.org/C154945302","wikidata":"https://www.wikidata.org/wiki/Q11660","display_name":"Artificial intelligence","level":1,"score":0.3619079},{"id":"https://openalex.org/C23123220","wikidata":"https://www.wikidata.org/wiki/Q816826","display_name":"Information retrieval","level":1,"score":0.3489194},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.32922512}],"mesh":[],"locations_count":1,"locations":[{"is_oa":false,"landing_page_url":"https://doi.org/10.1109/icse.2009.5070548","pdf_url":null,"source":null,"license":null,"version":null,"is_accepted":false,"is_published":false}],"best_oa_location":null,"sustainable_development_goals":[],"grants":[],"referenced_works_count":18,"referenced_works":["https://openalex.org/W1657461476","https://openalex.org/W1989526951","https://openalex.org/W1998070736","https://openalex.org/W2025677988","https://openalex.org/W2054520963","https://openalex.org/W2079599301","https://openalex.org/W2093938715","https://openalex.org/W2096061896","https://openalex.org/W2099056153","https://openalex.org/W2106259924","https://openalex.org/W2106837287","https://openalex.org/W2118477385","https://openalex.org/W2122182354","https://openalex.org/W2124666592","https://openalex.org/W2129262850","https://openalex.org/W2131954495","https://openalex.org/W2156841542","https://openalex.org/W4253522809"],"related_works":["https://openalex.org/W2748952813","https://openalex.org/W2051487156","https://openalex.org/W2073681303","https://openalex.org/W2390279801","https://openalex.org/W2358668433","https://openalex.org/W2376932109","https://openalex.org/W2001405890","https://openalex.org/W2382290278","https://openalex.org/W2478288626","https://openalex.org/W4391913857"],"ngrams_url":"https://api.openalex.org/works/W2153964911/ngrams","abstract_inverted_index":{"Programming":[0],"languages":[1],"such":[2,27],"as":[3,28,61],"Java":[4],"and":[5,22,214],"C++":[6],"provide":[7],"exception-handling":[8,34,59,172,208],"constructs":[9],"to":[10,17,169,192],"handle":[11,18],"exception":[12,20],"conditions.":[13],"Applications":[14],"are":[15,42,222,226],"expected":[16],"these":[19,38,179,211],"conditions":[21],"take":[23],"necessary":[24,39],"recovery":[25,40],"actions":[26,41],"releasing":[29],"opened":[30],"database":[31],"connections.":[32],"However,":[33],"rules":[35,60,64,166,181,209],"that":[36,57,107,202,225],"describe":[37],"often":[43],"not":[44,227],"available":[45],"in":[46,195,210],"practice.":[47],"To":[48],"address":[49],"this":[50],"issue,":[51],"we":[52],"develop":[53],"a":[54,115,143,230],"novel":[55],"approach":[56,204],"mines":[58,205],"sequence":[62,116,144],"association":[63],"of":[65,117,145,165,178],"the":[66,176],"form":[67,164],"ldquo(FC":[68],"c":[71,78,158],"1":[74,95,126,154],"...FC":[75,96,127,155],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">n":[81,161],")":[82,134],"nland":[83],"FC":[84,136],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">a":[87,139],"rArr":[88],"(FC":[89,120,148],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">e":[92,99,123,130,151],"xmlns:xlink=\"http://www.w3.org/1999/xlink\">m":[102,133],")rdquo.":[103],"This":[104],"rule":[105],"describes":[106],"function":[108,118,146],"call":[109],"FCa":[110],"should":[111],"be":[112],"followed":[113],"by":[114,142,182,229],"calls":[119,147],"when":[135],"is":[140,167],"preceded":[141],").":[162],"Such":[163],"required":[168],"characterize":[170],"common":[171],"rules.":[173],"We":[174],"show":[175,201],"usefulness":[177],"mined":[180],"applying":[183],"them":[184],"on":[185],"five":[186,212],"real-world":[187],"applications":[188,213],"(including":[189],"285":[190],"KLOC)":[191],"detect":[193],"violations":[194],"our":[196,203],"evaluation.":[197],"Our":[198],"empirical":[199],"results":[200],"294":[206],"real":[207],"also":[215],"detects":[216],"160":[217],"defects,":[218],"where":[219],"87":[220],"defects":[221,224],"new":[223],"found":[228],"previous":[231],"related":[232],"approach.":[233]},"cited_by_api_url":"https://api.openalex.org/works?filter=cites:W2153964911","counts_by_year":[{"year":2023,"cited_by_count":2},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":11},{"year":2020,"cited_by_count":6},{"year":2019,"cited_by_count":13},{"year":2018,"cited_by_count":10},{"year":2017,"cited_by_count":5},{"year":2016,"cited_by_count":7},{"year":2015,"cited_by_count":8},{"year":2014,"cited_by_count":5},{"year":2013,"cited_by_count":6},{"year":2012,"cited_by_count":20}],"updated_date":"2024-02-26T12:29:36.222441","created_date":"2016-06-24"}