Acharya M,Xie T.Mining API error-handling specifications from source code[A].Proceedings of the 12th International Conference on Fundamental Approach to Software Engineering .Heidelberg:Springer-Verlag,2009.370-384.
[2]
Lu S,Park S,Zhou Y Y.MUVI:automatically inferring multi-variable access correlations and detecting related semantic and concurrency bugs[A].Proceedings of 21st ACM SIGOPS Symposium on Operating Systems Principles[C].New York:ACM Press,2007.103-116.
[3]
Li Z M,Zhou Y Y.PR-Miner:automatically extracting implicit programming rules and detecting violations in large software code[A].13th ACM SIGSOFT Symposium on the Foundations of Software Enginerring[C].New York:ACM Press,2005.306-315.
[4]
Pei J,Han J W,Mao R Y.CLOSET:an efficient algorithm for mining frequent closed itemsets[A].ACM SIGMOD Workshop on Research Issues in Data Mining and Knowledge Discovery[C].New York:ACM Press,2000 21-30.
[5]
Graphne G,Zhu J F.High performance mining of maximal frequent itemsets[A].ISAM03 Workshop on High Performance Data Mining:Pervasive and Data Stream Mining[C].New York:ACM Press,2003.135-143.
[6]
Chen H,Wagner D.MOPS:An infrastructure for examining security properties of software[A].Proceedings of the 9th ACM Conference on Computer and Communications Security[C].New York:ACM Press,2002.235-244.
[7]
Thummalapenta S,Xie T.Mining exception-handling rules as sequence association rules[A].Proceedings of the 31st International Conference on Software Engineering[C].Washington D C:IEEE Computer Society Press,2009.496-506.
[8]
Chang R Y,Podgurski A.Discovering programming rules and violations by mining international dependences [J].Journal of Software Maintenance and Evolution:Research and Practice,2011,23(3):160-175.
[9]
Wang J Y,Han J W,Pei J.CLOSET+:searching for the best strategies for mining frequent closed itemsets[A].Proceedings of the 9th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining[C].New York:ACM Press,2003.236-245.
[10]
Graphne G,Zhu J F.Efficiently using prefix-tress in mining frequent itemsets[A].Proceedings of the 12th ACM SIGSOFT Symposium on Operating Systems Design and Implementation[C].New York:ACM Press,2003.110-119.
[11]
Han J W,Pei J,Yin Y W.Mining frequent patterns without candidate generation[A].Proceedings of the 2000 ACM SIGMOD International Conference on Management of Data[C].New York:ACM Press,2000.1-12.
[12]
刘晓东,刘大有.数据挖掘专利综述[J].电子学报,2003,31(12A):1989-1993. Liu Xiaodong,Liu Dayou.Data Mining Patent Summarization[J].Acta Electronica Sinica,2003,31(12A):1989-1993.(in Chinese)