{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T02:03:47Z","timestamp":1725501827851},"publisher-location":"Berlin, Heidelberg","reference-count":19,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540779643"},{"type":"electronic","value":"9783540779667"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"DOI":"10.1007\/978-3-540-77966-7_19","type":"book-chapter","created":{"date-parts":[[2008,2,1]],"date-time":"2008-02-01T08:59:24Z","timestamp":1201856364000},"page":"235-251","source":"Crossref","is-referenced-by-count":0,"title":["The Advantages of Post-Link Code Coverage"],"prefix":"10.1007","author":[{"given":"Orna","family":"Raz","sequence":"first","affiliation":[]},{"given":"Moshe","family":"Klausner","sequence":"additional","affiliation":[]},{"given":"Nitzan","family":"Peleg","sequence":"additional","affiliation":[]},{"given":"Gad","family":"Haber","sequence":"additional","affiliation":[]},{"given":"Eitan","family":"Farchi","sequence":"additional","affiliation":[]},{"given":"Shachar","family":"Fienblit","sequence":"additional","affiliation":[]},{"given":"Yakov","family":"Filiarsky","sequence":"additional","affiliation":[]},{"given":"Shay","family":"Gammer","sequence":"additional","affiliation":[]},{"given":"Sergey","family":"Novikov","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"doi-asserted-by":"crossref","unstructured":"Balakrishnan, G., Reps, T., Melski, D., Teitelbaum, T.: Wysinwyx: What you see is not what you execute. In: Verified Software: Theories, Tools, Experiments. Springer, Heidelberg (to appear), http:\/\/citeseer.ist.psu.edu\/762389.html","key":"19_CR1","DOI":"10.1145\/1749608.1749612"},{"unstructured":"Code coverage metrics (accessed June 2007), http:\/\/www.bullseye.com\/coverage.html","key":"19_CR2"},{"unstructured":"Object coverage. (accessed June 2007), http:\/\/www.bullseye.com\/coverage.html#other_object","key":"19_CR3"},{"unstructured":"Cohn, R., Goodwin, D., Lowney, P.G.: Optimizing alpha executables on windows nt with spike. In: Digital Technical Journal (1997)","key":"19_CR4"},{"unstructured":"Contest concurrent testing tool (accessed June 2007), http:\/\/w3.haifa.ibm.com\/softwaretesting\/ConTest-Java\/index.html","key":"19_CR5"},{"unstructured":"Do-178b software considerations in airborne systems and equipment certification (accessed June 2007), http:\/\/en.wikipedia.org\/wiki\/DO-178B","key":"19_CR6"},{"unstructured":"Focus functional and code coverage visuals and analysis (accessed June 2007) http:\/\/w3.haifa.ibm.com\/softwaretesting\/FoCuS\/index.html","key":"19_CR7"},{"unstructured":"G-cover object level coverage analysis (accessed June 2007), http:\/\/www.ghs.com\/products\/safety_critical\/gcover.html","key":"19_CR8"},{"unstructured":"Gcov coverage with gnu compiler gcc (accessed June 2007), http:\/\/gcc.gnu.org\/onlinedocs\/gcc\/Gcov.html","key":"19_CR9"},{"doi-asserted-by":"crossref","unstructured":"Grinwald, R., Harel, E., Orgad, M., S. U.S., Ziv, A.: User defined coverage - a tool supported methodology for design verification. In: DAC (June 1998)","key":"19_CR10","DOI":"10.1145\/277044.277081"},{"unstructured":"Haber, G., Henis, E., Eisenberg, V.: Reliable post-link optimizations based on partial information. In: 3rd Workshop on Feedback Directed and Dynamic Optimizations (December 2000)","key":"19_CR11"},{"doi-asserted-by":"crossref","unstructured":"Haber, G., Klausner, M., Eisnebreg, V., Mendelson, B., Gurevich, M.: Optimization opportunities created by global data reordering. In: 1st International Symposium on Code Generation and Optimization (March 2003)","key":"19_CR12","DOI":"10.1109\/CGO.2003.1191548"},{"unstructured":"Henis, E.A., Haber, G., Klausner, M., Warshavsky, A.: Feedback based post-link optimization for large subsystems. In: 2nd Workshop on Feedback Directed Optimization (November 1999)","key":"19_CR13"},{"unstructured":"Muth, R., Debray, S., Watterson, S.: Alto: A link-time optimizer for the compaq alpha. Technical Report, 98-14, Dept. of Computer Science, The University of Arizona (December 1998)","key":"19_CR14"},{"unstructured":"Nahshon, I., Bernstein, D.: Fdpr - a post-pass object code optimization tool. In: Poster Session of the International Conference on Compiler Construction (April 1996)","key":"19_CR15"},{"unstructured":"Romer, T., Voelker, G., Lee, D., Wolman, A., Wong, W., Levy, H., Bershad, B., Chen, B.: Instrumentation and optimization of win32\/intel executables using etch. In: USENIX Windows NT Workshop (August 1997)","key":"19_CR16"},{"doi-asserted-by":"crossref","unstructured":"Schmidt, W.J., Roediger, R.R., Mestad, C.S., Mendelson, B., Shavitt-Lottem, I., Bortnikov-Sitnitsky, V.: Profile-directed restructuring of operating system code. In: IBM Systems Journal (1998)","key":"19_CR17","DOI":"10.1147\/sj.372.0270"},{"unstructured":"Schwarz, B., Debray, S., Andrews, G., Legendre, M.: Plto: A link-time optimizer for the intel ia-32 architecture. In: Workshop on Binary Rewriting (September 2001)","key":"19_CR18"},{"unstructured":"Wikipedia: Code coverage (accessed June 2007), http:\/\/en.wikipedia.org\/wiki\/Code_coverage","key":"19_CR19"}],"container-title":["Lecture Notes in Computer Science","Hardware and Software: Verification and Testing"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-77966-7_19.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,27]],"date-time":"2021-04-27T10:57:26Z","timestamp":1619521046000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-77966-7_19"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[null]]},"ISBN":["9783540779643","9783540779667"],"references-count":19,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-77966-7_19","relation":{},"subject":[]}}