D. Engler, D. Chen, S. Hallem, A. Chou, and B. Chelf, Bugs as deviant behavior: A general approach to inferring errors in systems code, Proceedings of SOSP'01, vol.35, pp.57-72, 2001.

Z. Li and Y. Zhou, Pr-miner: automatically extracting implicit programming rules and detecting violations in large software code, SIGSOFT Softw. Eng. Notes, vol.30, issue.5, pp.306-315, 2005.

B. Livshits and T. Zimmermann, Dynamine: finding common error patterns by mining software revision histories, SIGSOFT Softw. Eng. Notes, vol.30, issue.5, pp.296-305, 2005.

A. Wasylkowski, A. Zeller, and C. Lindig, Detecting object usage anomalies, Proceedings of ESEC-FSE'07, pp.35-44, 2007.

M. P. Robillard, Topology analysis of software dependencies, ACM Trans. Softw. Eng. Methodol, vol.17, issue.4, pp.1-36, 2008.

S. Kim and M. D. Ernst, Which warnings should i fix first?, Proceedings of ESEC/FSE, pp.45-54, 2007.

G. Baxter, M. Frean, J. Noble, M. Rickerby, H. Smith et al., Understanding the shape of java software, Proceedings of OOPSLA, ACM, 2006.

K. Lienberherr, Formulations and benefits of the law of demeter, ACM SIGPLAN Notices, vol.24, issue.3, pp.67-78, 1989.

D. Hovemeyer and W. Pugh, 2010) This preprint is provided by the contributing authors to ensure timely dissemination of scholarly and technical work. 10. G. Yang, "The complexity of mining maximal frequent itemsets and maximal frequent patterns, Proceedings of the 24th European Conference on Object­Oriented Programming, vol.39, pp.92-106, 2004.

M. D. Ernst, J. Cockrell, W. Griswold, and D. Notkin, Dynamically discovering likely program invariants to support program evolution, IEEE Transactions on Software Engineering, vol.27, issue.2, pp.99-123, 2001.

S. Hangal and M. S. Lam, Tracking down software bugs using automatic anomaly detection, Proceedings of the 24th International Conference on Software Engineering (ICSE'02), pp.291-301, 2002.

C. Csallner, Y. Smaragdakis, and T. Xie, Dsd-crasher: A hybrid analysis tool for bug finding, ACM Trans. Softw. Eng. Methodol, vol.17, issue.2, pp.1-37, 2008.

J. Yang, D. Evans, D. Bhardwaj, T. Bhat, and M. Das, Perracotta: mining temporal api rules from imperfect traces, ICSE '06: Proceedings of the 28th international conference on Software engineering, pp.282-291, 2006.

V. Dallmeier, C. Lindig, and A. Zeller, Lightweight defect localization for java, Proceedings of ECOOP'2005, 2005.

C. C. Williams and J. K. Hollingsworth, Automatic mining of source code repositories to improve bug finding techniques, IEEE Transactions on Software Engineering, vol.31, issue.6, pp.466-480, 2005.

R. Chang, A. Podgurski, and J. Yang, Finding what's not there: A new approach to revealing neglected conditions in software, Proceedings of ISSTA'07, 2007.