{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T15:45:03Z","timestamp":1750347903084,"version":"3.40.3"},"publisher-location":"Cham","reference-count":66,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030452339"},{"type":"electronic","value":"9783030452346"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-45234-6_2","type":"book-chapter","created":{"date-parts":[[2020,4,20]],"date-time":"2020-04-20T14:04:23Z","timestamp":1587391463000},"page":"29-52","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":14,"title":["Platinum: Reusing Constraint Solutions in Bounded Analysis of Relational Logic"],"prefix":"10.1007","author":[{"given":"Guolong","family":"Zheng","sequence":"first","affiliation":[]},{"given":"Hamid","family":"Bagheri","sequence":"additional","affiliation":[]},{"given":"Gregg","family":"Rothermel","sequence":"additional","affiliation":[]},{"given":"Jianghao","family":"Wang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2020,4,17]]},"reference":[{"key":"2_CR1","unstructured":"Covert analysis tool. http:\/\/www.sdalab.com\/projects\/covert (2017)"},{"key":"2_CR2","unstructured":"Google play market. http:\/\/play.google.com\/store\/apps\/ (2017)"},{"key":"2_CR3","unstructured":"WordPress. http:\/\/codex.wordpress.org\/Database_Description\/3.3 (2017)"},{"key":"2_CR4","unstructured":"Green solver. https:\/\/github.com\/green-solver\/green-solver\/tree\/master\/green\/test\/za\/ac\/sun\/cs\/green\/misc (2018)"},{"key":"2_CR5","unstructured":"Platinum repository. https:\/\/sites.google.com\/view\/platinum-repository (2019)"},{"key":"2_CR6","doi-asserted-by":"crossref","unstructured":"Aquino, A., Bianchi, F.A., Chen, M., Denaro, G., Pezz\u00e8, M.: Reusing constraint proofs in program analysis. In: Proceedings of the International Symposium on Software Testing and Analysis. pp. 305\u2013315 (2015)","DOI":"10.1145\/2771783.2771802"},{"key":"2_CR7","doi-asserted-by":"publisher","unstructured":"Aquino, A., Denaro, G., Pezz\u00e8, M.: Heuristically Matching Solution Spaces of Arithmetic Formulas to Efficiently Reuse Solutions. In: Proceedings of the 39th International Conference on Software Engineering. pp. 427\u2013437. ICSE \u201917, IEEE Press, Piscataway, NJ, USA (2017), https:\/\/doi.org\/10.1109\/ICSE.2017.46","DOI":"10.1109\/ICSE.2017.46"},{"key":"2_CR8","doi-asserted-by":"publisher","unstructured":"Bagheri, H., Kang, E., Malek, S., Jackson, D.: Detection of design flaws in the android permission protocol through bounded verification. In: Bj\u00f8rner, N., de\u00a0Boer, F.S. (eds.) FM 2015: Formal Methods - 20th International Symposium, Oslo, Norway, June 24-26, 2015, Proceedings. Lecture Notes in Computer Science, vol.\u00a09109, pp. 73\u201389. Springer (2015), https:\/\/doi.org\/10.1007\/978-3-319-19249-9_6","DOI":"10.1007\/978-3-319-19249-9_6"},{"key":"2_CR9","doi-asserted-by":"publisher","unstructured":"Bagheri, H., Kang, E., Malek, S., Jackson, D.: A formal approach for detection of security flaws in the android permission system. Formal Asp. Comput. 30(5), 525\u2013544 (2018), https:\/\/doi.org\/10.1007\/s00165-017-0445-z","DOI":"10.1007\/s00165-017-0445-z"},{"key":"2_CR10","doi-asserted-by":"crossref","unstructured":"Bagheri, H., Malek, S.: Titanium: Efficient analysis of evolving alloy specifications. In: Proceedings of the International Symposium on the Foundations of Software Engineering (2016)","DOI":"10.1145\/2950290.2950337"},{"key":"2_CR11","doi-asserted-by":"publisher","unstructured":"Bagheri, H., Sadeghi, A., Behrouz, R.J., Malek, S.: Practical, formal synthesis and automatic enforcement of security policies for android. In: 46th Annual IEEE\/IFIP International Conference on Dependable Systems and Networks, DSN 2016, Toulouse, France, June 28 - July 1, 2016. pp. 514\u2013525. IEEE Computer Society (2016), https:\/\/doi.org\/10.1109\/DSN.2016.53","DOI":"10.1109\/DSN.2016.53"},{"key":"2_CR12","doi-asserted-by":"crossref","unstructured":"Bagheri, H., Sadeghi, A., Garcia, J., Malek, S.: Covert: Compositional analysis of android inter-app permission leakage. IEEE Transactions on Software Engineering (2015)","DOI":"10.1109\/TSE.2015.2419611"},{"key":"2_CR13","doi-asserted-by":"publisher","unstructured":"Bagheri, H., Sullivan, K.J.: Model-driven synthesis of formally precise, stylized software architectures. Formal Asp. Comput. 28(3), 441\u2013467 (2016), https:\/\/doi.org\/10.1007\/s00165-016-0360-8","DOI":"10.1007\/s00165-016-0360-8"},{"key":"2_CR14","unstructured":"Bagheri, H., Tang, C., Sullivan, K.: Trademaker: Automated dynamic analysis of synthesized tradespaces. In: Proceedings of the 36th International Conference on Software Engineering. pp. 106\u2013116. ICSE 2014, ACM, New York, NY, USA (2014), http:\/\/doi.acm.org\/10.1145\/2568225.2568291"},{"key":"2_CR15","doi-asserted-by":"crossref","unstructured":"Bagheri, H., Tang, C., Sullivan, K.: Automated synthesis and dynamic analysis of tradeoff spaces for object-relational mapping. IEEE Transactions on Software Engineering 43(2), 145\u2013163 (2017)","DOI":"10.1109\/TSE.2016.2587646"},{"key":"2_CR16","doi-asserted-by":"publisher","unstructured":"Bagheri, H., Wang, J., Aerts, J., Malek, S.: Efficient, evolutionary security analysis of interacting android apps. In: 2018 IEEE International Conference on Software Maintenance and Evolution, ICSME 2018, Madrid, Spain, September 23-29, 2018. pp. 357\u2013368. IEEE Computer Society (2018), https:\/\/doi.org\/10.1109\/ICSME.2018.00044","DOI":"10.1109\/ICSME.2018.00044"},{"key":"2_CR17","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, Third Edition. The MIT Press, 3rd edn. (2009)"},{"key":"2_CR18","doi-asserted-by":"crossref","unstructured":"Cunha, A., Macedo, N., Guimaraes, T.: Target oriented relational model finding. In: Proceedings of the International Conference on Fundamental Approaches to Software Engineering. pp. 17\u201331 (2014)","DOI":"10.1007\/978-3-642-54804-8_2"},{"key":"2_CR19","doi-asserted-by":"crossref","unstructured":"De\u00a0Ita\u00a0Luna, G., Marcial-Romero, J.R., Hernandez, J.: The Incremental Satisfiability Problem for a Two Conjunctive Normal Form. Electronic Notes in Theoretical Computer Science 328, 31\u201345 (Dec 2016), http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1571066116301013","DOI":"10.1016\/j.entcs.2016.11.004"},{"key":"2_CR20","doi-asserted-by":"crossref","unstructured":"Devdatta Akhawe, Adam Barth, Peifung E. Lamy, John Mitchelly, Dawn Song: Towards a Formal Foundation of Web Security. In: Proceedings of the 23rd International Conference on Computer Security Foundations Symposium (CSF). pp. 290\u2013304 (2010)","DOI":"10.1109\/CSF.2010.27"},{"key":"2_CR21","doi-asserted-by":"crossref","unstructured":"Een, N., Sorensson, N.: Translating pseudo-boolean constraints into sat. Journal on Satisfiability, Boolean Modeling and Computation 2, 1\u201326 (2006)","DOI":"10.3233\/SAT190014"},{"key":"2_CR22","doi-asserted-by":"crossref","unstructured":"Egly, U., Lonsing, F., Oetsch, J.: Automated Benchmarking of Incremental SAT and QBF Solvers. In: Logic for Programming, Artificial Intelligence, and Reasoning. pp. 178\u2013186. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg (Nov 2015)","DOI":"10.1007\/978-3-662-48899-7_13"},{"key":"2_CR23","doi-asserted-by":"crossref","unstructured":"Galeotti, J.P., Rosner, N., Pombo, C.G.L., Frias, M.F.: Analysis of invariants for efficient bounded verification. In: Proceedings of International Symposium on Software Testing and Analysis. pp. 25\u201336 (2010)","DOI":"10.1145\/1831708.1831712"},{"key":"2_CR24","doi-asserted-by":"crossref","unstructured":"Galeotti, J.P., Rosner, N., Pombo, C.G.L., Frias, M.F.: TACO: Efficient SAT-based bounded verification using symmetry breaking and tight bounds. IEEE Transactions on Software Engineering 39(9), 1283\u20131307 (2013)","DOI":"10.1109\/TSE.2013.15"},{"key":"2_CR25","doi-asserted-by":"crossref","unstructured":"Ganov, S., Khurshid, S., Perry, D.E.: Annotations for alloy: Automated incremental analysis using domain specific solvers. In: Proc. of ICFEM. pp. 414\u2013429 (2012)","DOI":"10.1007\/978-3-642-34281-3_29"},{"key":"2_CR26","unstructured":"Hao, J., Kang, E., Sun, J., Jackson, D.: Designing Minimal Effective Normative Systems with the Help of Lightweight Formal Methods. In: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. pp. 50\u201360. FSE 2016, ACM, New York, NY, USA (2016), http:\/\/doi.acm.org\/10.1145\/2950290.2950307"},{"key":"2_CR27","unstructured":"Heaven, W., Russo, A.: Enhancing the alloy analyzer with patterns of analysis. In: Workshop on Logic-based Methods in Programming Environments (2005)"},{"key":"2_CR28","unstructured":"Jackson, D.: Software Abstractions. MIT Press, 2nd edn. (2012)"},{"key":"2_CR29","doi-asserted-by":"crossref","unstructured":"Jia, X., Ghezzi, C., Ying, S.: Enhancing reuse of constraint solutions to improve symbolic execution. In: Proceedings of the International Symposium on Software Testing and Analysis. pp. 177\u2013187 (2015)","DOI":"10.1145\/2771783.2771806"},{"key":"2_CR30","unstructured":"Lau, S.Q.: Domain Analysis of E-Commerce Systems Using Feature-Based Model Templates. Master\u2019s thesis, University of Waterloo, Canada (2006)"},{"key":"2_CR31","doi-asserted-by":"publisher","unstructured":"Li, X., Shannon, D., Walker, J., Khurshid, S., Marinov, D.: Analyzing the Uses of a Software Modeling Tool. Electronic Notes in Theoretical Computer Science 164(2), 3\u201318 (Oct 2006). https:\/\/doi.org\/10.1016\/j.entcs.2006.10.001 , http:\/\/www.sciencedirect.com\/science\/article\/pii\/S1571066106004786","DOI":"10.1016\/j.entcs.2006.10.001"},{"key":"2_CR32","unstructured":"Macedo, N., Brunel, J., Chemouil, D., Cunha, A., Kuperberg, D.: Lightweight Specification and Analysis of Dynamic Systems with Rich Configurations. In: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. pp. 373\u2013383. FSE 2016, ACM, New York, NY, USA (2016), http:\/\/doi.acm.org\/10.1145\/2950290.2950318"},{"key":"2_CR33","doi-asserted-by":"crossref","unstructured":"Macedo, N., Cunha, A., Guimaraes, T.: Exploring scenario exploration. In: Proceedings of the International Conference on Fundamental Approaches to Software Engineering. pp. 301\u2013315 (2015)","DOI":"10.1007\/978-3-662-46675-9_20"},{"key":"2_CR34","doi-asserted-by":"crossref","unstructured":"Maldonado-Lopez, F.A., Chavarriaga, J., Donoso, Y.: Detecting Network Policy Conflicts Using Alloy. In: Abstract State Machines, Alloy, B, TLA, VDM, and Z. pp. 314\u2013317. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg (Jun 2014)","DOI":"10.1007\/978-3-662-43652-3_31"},{"key":"2_CR35","doi-asserted-by":"publisher","unstructured":"Mansoor, N., Saddler, J.A., Silva, B., Bagheri, H., Cohen, M.B., Farritor, S.: Modeling and testing a family of surgical robots: an experience report. In: Leavens, G.T., Garcia, A., Pasareanu, C.S. (eds.) Proceedings of the 2018 ACM Joint Meeting on European Software Engineering Conference and Symposium on the Foundations of Software Engineering, ESEC\/SIGSOFT FSE 2018, Lake Buena Vista, FL, USA, November 04-09, 2018. pp. 785\u2013790. ACM (2018), https:\/\/doi.org\/10.1145\/3236024.3275534","DOI":"10.1145\/3236024.3275534"},{"key":"2_CR36","unstructured":"Marinov, D., Khurshid, S.: What will the user do (next) in the tool? In: Proceedings of the ACM SIGSOFT First Alloy Workshop. pp. 98\u201399. ACM (2006)"},{"key":"2_CR37","unstructured":"Milicevic, A., Rayside, D., Yessenov, K., Jackson, D.: Unifying execution of imperative and declarative code. In: Proceedings of the 33rd International Conference on Software Engineering. pp. 511\u2013520. ICSE \u201911, ACM, New York, NY, USA (2011), http:\/\/doi.acm.org\/10.1145\/1985793.1985863"},{"key":"2_CR38","doi-asserted-by":"publisher","unstructured":"Mirzaei, N., Garcia, J., Bagheri, H., Sadeghi, A., Malek, S.: Reducing combinatorics in GUI testing of android applications. In: Dillon, L.K., Visser, W., Williams, L. (eds.) Proceedings of the 38th International Conference on Software Engineering, ICSE 2016, Austin, TX, USA, May 14-22, 2016. pp. 559\u2013570. ACM (2016), https:\/\/doi.org\/10.1145\/2884781.2884853","DOI":"10.1145\/2884781.2884853"},{"key":"2_CR39","doi-asserted-by":"crossref","unstructured":"Montaghami, V., Rayside, D.: Extending Alloy with partial instances. In: Proceedings of the International Conferece on Abstract State Machines, Alloy, B, VDM, and Z. pp. 122\u2013135 (2012)","DOI":"10.1007\/978-3-642-30885-7_9"},{"key":"2_CR40","doi-asserted-by":"crossref","unstructured":"Montaghami, V., Rayside, D.: Staged evaluation of partial instances in a relational model finder. In: Proceedings of the International Conferece on Abstract State Machines, Alloy, B, VDM, and Z. pp. 318\u2013323 (2014)","DOI":"10.1007\/978-3-662-43652-3_32"},{"key":"2_CR41","doi-asserted-by":"crossref","unstructured":"Montaghami, V., Rayside, D.: Bordeaux: A tool for thinking outside the box. In: Proceedings of the International Conference on Fundamental Approaches to Software Engineering. pp. 22\u201339 (2017)","DOI":"10.1007\/978-3-662-54494-5_2"},{"key":"2_CR42","doi-asserted-by":"crossref","unstructured":"Nadel, A., Ryvchin, V., Strichman, O.: Ultimately Incremental SAT. In: Theory and Applications of Satisfiability Testing (SAT 2014). pp. 206\u2013218. Lecture Notes in Computer Science, Springer, Cham (Jul 2014)","DOI":"10.1007\/978-3-319-09284-3_16"},{"key":"2_CR43","unstructured":"Near, J.P., Jackson, D.: Derailer: Interactive security analysis for web applications. In: Proceedings of the 29th ACM\/IEEE International Conference on Automated Software Engineering. pp. 587\u2013598. ASE \u201914, ACM, New York, NY, USA (2014), http:\/\/doi.acm.org\/10.1145\/2642937.2643012"},{"key":"2_CR44","unstructured":"Nelson, T., Danas, N., Dougherty, D.J., Krishnamurthi, S.: The Power of \"Why\" and \"Why Not\": Enriching Scenario Exploration with Provenance. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering. pp. 106\u2013116. ESEC\/FSE 2017, ACM, New York, NY, USA (2017), http:\/\/doi.acm.org\/10.1145\/3106237.3106272"},{"key":"2_CR45","doi-asserted-by":"crossref","unstructured":"Nelson, T., Saghafi, S., Dougherty, D.J., Fisler, K., Krishnamurthi, S.: Aluminum: Principled scenario exploration through minimality. In: Proceedings of the International Conference on Software Engineering. pp. 232\u2013241 (2013)","DOI":"10.1109\/ICSE.2013.6606569"},{"key":"2_CR46","unstructured":"Nijjar, J., Bultan, T.: Bounded verification of ruby on rails data models. In: Proceedings of the 2011 International Symposium on Software Testing and Analysis. pp. 67\u201377. ISSTA \u201911, ACM, New York, NY, USA (2011), http:\/\/doi.acm.org\/10.1145\/2001420.2001429"},{"key":"2_CR47","doi-asserted-by":"crossref","unstructured":"Person, S., Yang, G., Rungta, N., Khurshid, S.: Directed incremental symbolic execution. In: Proceedings of the Conference on Programming Language Design and Implementation. pp. 504\u2013515 (2011)","DOI":"10.1145\/1993316.1993558"},{"key":"2_CR48","unstructured":"Ponzio, P., Aguirre, N., Frias, M.F., Visser, W.: Field-exhaustive Testing. In: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering. pp. 908\u2013919. FSE 2016, ACM, New York, NY, USA (2016), http:\/\/doi.acm.org\/10.1145\/2950290.2950336"},{"key":"2_CR49","doi-asserted-by":"crossref","unstructured":"Qiu, R., Yang, G., Pasareanu, C.S., Khurshid, S.: Compositional symbolic execution with memoized replay. In: Proceedings of the International Conference on Software Engineering (2015)","DOI":"10.1109\/ICSE.2015.79"},{"key":"2_CR50","doi-asserted-by":"crossref","unstructured":"Ramos, D.A., Engler, D.R.: Practical, low-effort equivalence verification of real code. In: Gopalakrishnan, G., Qadeer, S. (eds.) Computer Aided Verification, Lecture Notes in Computer Science, vol.\u00a06806, pp. 669\u2013685. Springer Berlin Heidelberg (2011), http:\/\/dx.doi.org\/10.1007\/978-3-642-22110-1_55","DOI":"10.1007\/978-3-642-22110-1_55"},{"key":"2_CR51","doi-asserted-by":"crossref","unstructured":"Rosner, N., Siddiqui, J.H., Aguirre, N., Khurshid, S., Frias, M.F.: Ranger: Parallel analysis of Alloy models by range partitioning. In: Proceeding of the International Conference on Automated Software Engineering. pp. 147\u2013157 (2013)","DOI":"10.1109\/ASE.2013.6693075"},{"key":"2_CR52","unstructured":"Ruchansky, N., Proserpio, D.: A (Not) NICE Way to Verify the Openflow Switch Specification: Formal Modelling of the Openflow Switch Using Alloy. In: Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM. pp. 527\u2013528. SIGCOMM \u201913, ACM, New York, NY, USA (2013), http:\/\/doi.acm.org\/10.1145\/2486001.2491711"},{"key":"2_CR53","doi-asserted-by":"crossref","unstructured":"Semerath, O., Varas, A., Varra, D.: Iterative and Incremental Model Generation by Logic Solvers. In: Fundamental Approaches to Software Engineering. pp. 87\u2013103. Lecture Notes in Computer Science, Springer, Berlin, Heidelberg (Apr 2016), https:\/\/link.springer.com\/chapter\/10.1007\/978-3-662-49665-7_6","DOI":"10.1007\/978-3-662-49665-7_6"},{"key":"2_CR54","doi-asserted-by":"crossref","unstructured":"Stevens, C., Bagheri, H.: Reducing run-time adaptation space via analysis of possible utility bounds. In: Proceedings of the 42nd International Conference on Software Engineering. ICSE 2020, ACM (2020)","DOI":"10.1145\/3377811.3380365"},{"key":"2_CR55","unstructured":"Taghdiri, M.: Inferring specifications to detect errors in code. In: Proceedings of the 19th IEEE International Conference on Automated Software Engineering. pp. 144\u2013153. ASE \u201904, IEEE Computer Society, Washington, DC, USA (2004), http:\/\/dx.doi.org\/10.1109\/ASE.2004.42"},{"key":"2_CR56","unstructured":"Torlak, E.: A Constraint Solver for Software Engineering: Finding Models and Cores of Large Relational Specifications. PhD thesis, MIT (Feb 2009), http:\/\/alloy.mit.edu\/kodkod\/"},{"key":"2_CR57","unstructured":"Torlak, E., Jackson, D.: Kodkod: A relational model finder. In: Proceedings of the 13th International Conference on Tools and Algorithms for the Construction and Analysis of Systems. pp. 632\u2013647. TACAS\u201907, Springer-Verlag, Berlin, Heidelberg (2007), http:\/\/dl.acm.org\/citation.cfm?id=1763507.1763571"},{"key":"2_CR58","doi-asserted-by":"crossref","unstructured":"Torlak, E., Taghdiri, M., Dennis, G., Near, J.P.: Applications and extensions of Alloy: Past, present and future. Mathematical Structures in Computer Science 23(4), 915\u2013933 (2013)","DOI":"10.1017\/S0960129512000291"},{"key":"2_CR59","doi-asserted-by":"crossref","unstructured":"Uzuncaova, E., Khurshid, S.: Kato: A program slicing tool for declarative specifications. In: Proceedings of the International Conference on Software Engineering. pp. 767\u2013770 (2007)","DOI":"10.1109\/ICSE.2007.47"},{"key":"2_CR60","unstructured":"Uzuncaova, E., Khurshid, S.: Constraint prioritization for efficient analysis of declarative models. In: Proceedings of the International Symposium on Formal Methods (2008)"},{"key":"2_CR61","doi-asserted-by":"crossref","unstructured":"Uzuncaova, E., Khurshid, S., Batory, D.: Incremental test generation for software product lines. IEEE Trans. Software Eng. 36(3), 309\u2013322 (2010)","DOI":"10.1109\/TSE.2010.30"},{"key":"2_CR62","doi-asserted-by":"crossref","unstructured":"Visser, W., Geldenhuys, J., , Dwyer, M.B.: Green: Reducing, reusing and recycling constraints in program analysis. In: Proceedings of the ACM SIGSOFT 20th International Symposium on the Foundations of Software Engineering. pp. 58:1\u201358:11 (2012)","DOI":"10.1145\/2393596.2393665"},{"key":"2_CR63","doi-asserted-by":"publisher","unstructured":"Wang, J., Bagheri, H., Cohen, M.B.: An evolutionary approach for analyzing alloy specifications. In: Huchard, M., K\u00e4stner, C., Fraser, G. (eds.) Proceedings of the 33rd ACM\/IEEE International Conference on Automated Software Engineering, ASE 2018, Montpellier, France, September 3-7, 2018. pp. 820\u2013825. ACM (2018), https:\/\/doi.org\/10.1145\/3238147.3240468","DOI":"10.1145\/3238147.3240468"},{"key":"2_CR64","unstructured":"Wang, K.: MuAlloy: an automated mutation system for alloy. Thesis (May 2015), https:\/\/repositories.lib.utexas.edu\/handle\/2152\/31865"},{"key":"2_CR65","doi-asserted-by":"crossref","unstructured":"Yang, G., P\u0103s\u0103reanu, C.S., Khurshid, S.: Memoized symbolic execution. In: Proceedings of the International Symposium on Software Testing and Analysis. pp. 144\u2013154 (2012)","DOI":"10.1145\/2338965.2336771"},{"key":"2_CR66","doi-asserted-by":"crossref","unstructured":"Zave, P.: Using Lightweight Modeling to Understand Chord. SIGCOMM Comput. Commun. Rev. 42(2), 49\u201357 (Mar 2012), http:\/\/doi.acm.org\/10.1145\/2185376.2185383","DOI":"10.1145\/2185376.2185383"}],"container-title":["Lecture Notes in Computer Science","Fundamental Approaches to Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-45234-6_2","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,3,9]],"date-time":"2021-03-09T20:36:33Z","timestamp":1615322193000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-45234-6_2"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030452339","9783030452346"],"references-count":66,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-45234-6_2","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"17 April 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FASE","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Fundamental Approaches to Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Dublin","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Ireland","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"25 April 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 April 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"23","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fase2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/www.etaps.org\/2020\/fase","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Easychair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"81","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"23","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"28% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"9","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference could not take place due to the COVID-19 pandemic. There was an online event on July 2, 2020.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}