{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,29]],"date-time":"2025-03-29T04:15:17Z","timestamp":1743221717391,"version":"3.40.3"},"publisher-location":"Berlin, Heidelberg","reference-count":35,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642304729"},{"type":"electronic","value":"9783642304736"}],"license":[{"start":{"date-parts":[[2012,1,1]],"date-time":"2012-01-01T00:00:00Z","timestamp":1325376000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012]]},"DOI":"10.1007\/978-3-642-30473-6_10","type":"book-chapter","created":{"date-parts":[[2012,5,25]],"date-time":"2012-05-25T15:29:12Z","timestamp":1337959752000},"page":"115-131","source":"Crossref","is-referenced-by-count":13,"title":["Generation of Test Data Structures Using Constraint Logic Programming"],"prefix":"10.1007","author":[{"given":"Valerio","family":"Senni","sequence":"first","affiliation":[]},{"given":"Fabio","family":"Fioravanti","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"10_CR1","unstructured":"The MAP transformation system (1995-2012), http:\/\/www.iasi.cnr.it\/~proietti\/system.html ."},{"key":"10_CR2","unstructured":"ICST 2009, Second International Conference on Software Testing Verification and Validation, April 1-4. IEEE Computer Society, Denver (2009)"},{"key":"10_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-642-21768-5_3","volume-title":"Tests and Proofs","author":"N. Aguirre","year":"2011","unstructured":"Aguirre, N., Bengolea, V.S., Frias, M.F., Galeotti, J.P.: Incorporating Coverage Criteria in Bounded Exhaustive Black Box Test Generation of Structural Inputs. In: Gogolla, M., Wolff, B. (eds.) TAP 2011. LNCS, vol.\u00a06706, pp. 15\u201332. Springer, Heidelberg (2011)"},{"key":"10_CR4","doi-asserted-by":"crossref","unstructured":"Bartolini, C., Bertolino, A., Marchetti, E., Polini, A.: Ws-taxi: A wsdl-based testing tool for web services. In: ICST [2], pp. 326\u2013335 (2009)","DOI":"10.1109\/ICST.2009.28"},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Boyapati, C., Khurshid, S., Marinov, D.: Korat: automated testing based on java predicates. In: ISSTA, pp. 123\u2013133 (2002)","DOI":"10.1145\/566171.566191"},{"issue":"11","key":"10_CR6","doi-asserted-by":"publisher","first-page":"1755","DOI":"10.1016\/j.jss.2009.06.029","volume":"82","author":"F. Charreteur","year":"2009","unstructured":"Charreteur, F., Botella, B., Gotlieb, A.: Modelling dynamic memory management in constraint-based testing. Journal of Systems and Software\u00a082(11), 1755\u20131766 (2009)","journal-title":"Journal of Systems and Software"},{"issue":"4","key":"10_CR7","doi-asserted-by":"publisher","first-page":"328","DOI":"10.1109\/TSE.2005.52","volume":"31","author":"D. Coppit","year":"2005","unstructured":"Coppit, D., Yang, J., Khurshid, S., Le, W., Sullivan, K.J.: Software assurance by bounded exhaustive testing. IEEE Trans. Software Eng.\u00a031(4), 328\u2013339 (2005)","journal-title":"IEEE Trans. Software Eng."},{"key":"10_CR8","unstructured":"Cormen, T.H., Leiserson, C.E., Rivest, R.L., Stein, C.: Introduction to Algorithms, 3rd edn. MIT Press (2009)"},{"key":"10_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"128","DOI":"10.1007\/978-3-642-12592-8_10","volume-title":"Logic-Based Program Synthesis and Transformation","author":"F. Degrave","year":"2010","unstructured":"Degrave, F., Schrijvers, T., Vanhoof, W.: Towards a Framework for Constraint-Based Test Case Generation. In: De Schreye, D. (ed.) LOPSTR 2009. LNCS, vol.\u00a06037, pp. 128\u2013142. Springer, Heidelberg (2010)"},{"issue":"9","key":"10_CR10","doi-asserted-by":"publisher","first-page":"900","DOI":"10.1109\/32.92910","volume":"17","author":"R.A. DeMillo","year":"1991","unstructured":"DeMillo, R.A., Offutt, A.J.: Constraint-based automatic test data generation. IEEE Trans. Software Eng.\u00a017(9), 900\u2013910 (1991)","journal-title":"IEEE Trans. Software Eng."},{"issue":"2","key":"10_CR11","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1080\/09528130701538174","volume":"21","author":"A. Dovier","year":"2009","unstructured":"Dovier, A., Formisano, A., Pontelli, E.: An empirical study of constraint logic programming and answer set programming solutions of combinatorial problems. J. Exp. Theor. Artif. Intell.\u00a021(2), 79\u2013121 (2009)","journal-title":"J. Exp. Theor. Artif. Intell."},{"key":"10_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"291","DOI":"10.1007\/978-3-540-25951-0_10","volume-title":"Program Development in Computational Logic","author":"F. Fioravanti","year":"2004","unstructured":"Fioravanti, F., Pettorossi, A., Proietti, M.: Transformation Rules for Locally Stratified Constraint Logic Programs. In: Bruynooghe, M., Lau, K.-K. (eds.) Program Development in CL. LNCS, vol.\u00a03049, pp. 291\u2013339. Springer, Heidelberg (2004)"},{"issue":"1","key":"10_CR13","doi-asserted-by":"crossref","first-page":"119","DOI":"10.3233\/IA-2011-0014","volume":"5","author":"F. Fioravanti","year":"2011","unstructured":"Fioravanti, F., Pettorossi, A., Proietti, M., Senni, V.: Program transformation for development, verification, and synthesis of programs. Intelligenza Artificiale\u00a05(1), 119\u2013125 (2011)","journal-title":"Intelligenza Artificiale"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Gligoric, M., Gvero, T., Jagannath, V., Khurshid, S., Kuncak, V., Marinov, D.: Test generation through programming in udita. In: Kramer, J., Bishop, J., Devanbu, P.T., Uchitel, S. (eds.) ICSE (1), pp. 225\u2013234. ACM (2010)","DOI":"10.1145\/1806799.1806835"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Gligoric, M., Gvero, T., Lauterburg, S., Marinov, D., Khurshid, S.: Optimizing generation of object graphs in java pathfinder. In: ICST [2], pp. 51\u201360","DOI":"10.1109\/ICST.2009.52"},{"issue":"4-6","key":"10_CR16","first-page":"659","volume":"10","author":"M. G\u00f3mez-Zamalloa","year":"2010","unstructured":"G\u00f3mez-Zamalloa, M., Albert, E., Puebla, G.: Test case generation for object-oriented imperative languages in clp. TPLP\u00a010(4-6), 659\u2013674 (2010)","journal-title":"TPLP"},{"key":"10_CR17","series-title":"Lecture Notes in Artificial Intelligence","doi-asserted-by":"publisher","first-page":"399","DOI":"10.1007\/3-540-44957-4_27","volume-title":"Computational Logic - CL 2000","author":"A. Gotlieb","year":"2000","unstructured":"Gotlieb, A., Botella, B., Rueher, M.: A CLP Framework for Computing Structural Test Data. In: Palamidessi, C., Moniz Pereira, L., Lloyd, J.W., Dahl, V., Furbach, U., Kerber, M., Lau, K.-K., Sagiv, Y., Stuckey, P.J. (eds.) CL 2000. LNCS (LNAI), vol.\u00a01861, pp. 399\u2013413. Springer, Heidelberg (2000)"},{"key":"10_CR18","doi-asserted-by":"crossref","unstructured":"Wang, D., Chang, H.-Y., Ly-Gagnon, M., Hoffman, D.: Grammar based testing of html injection vulnerabilities in rss feeds. In: ICST [2], pp. 105\u2013110 (2009)","DOI":"10.1109\/TAICPART.2009.34"},{"key":"10_CR19","doi-asserted-by":"crossref","first-page":"95","DOI":"10.1017\/S1471068402001485","volume":"3","author":"J.M. Howe","year":"2003","unstructured":"Howe, J.M., King, A.: Efficient groundness analysis in prolog. Theory Pract. Log. Program.\u00a03, 95\u2013124 (2003)","journal-title":"Theory Pract. Log. Program."},{"key":"10_CR20","doi-asserted-by":"publisher","first-page":"503","DOI":"10.1016\/0743-1066(94)90033-7","volume":"19\/20","author":"J. Jaffar","year":"1994","unstructured":"Jaffar, J., Maher, M.J.: Constraint logic programming: A survey. J. Log. Program.\u00a019\/20, 503\u2013581 (1994)","journal-title":"J. Log. Program."},{"key":"10_CR21","volume-title":"Partial evaluation and automatic program generation","author":"N.D. Jones","year":"1993","unstructured":"Jones, N.D., Gomard, C.K., Sestoft, P.: Partial evaluation and automatic program generation. Prentice-Hall, Inc., Upper Saddle River (1993)"},{"key":"10_CR22","doi-asserted-by":"crossref","unstructured":"Khalek, S.A., Yang, G., Zhang, L., Marinov, D., Khurshid, S.: Testera: A tool for testing java programs using alloy specifications. In: Alexander, P., Pasareanu, C.S., Hosking, J.G. (eds.) ASE, pp. 608\u2013611. IEEE (2011)","DOI":"10.1109\/ASE.2011.6100137"},{"issue":"4-5","key":"10_CR23","doi-asserted-by":"publisher","first-page":"537","DOI":"10.1017\/S1471068411000160","volume":"11","author":"J. Kriener","year":"2011","unstructured":"Kriener, J., King, A.: RedAlert: Determinacy Inference for Prolog. Theory and Practice of Logic Programming\u00a011(4-5), 537\u2013553 (2011)","journal-title":"Theory and Practice of Logic Programming"},{"key":"10_CR24","doi-asserted-by":"crossref","unstructured":"Lloyd, J.W.: Foundations of Logic Programming, 2nd edn. Springer (1987)","DOI":"10.1007\/978-3-642-83189-8"},{"key":"10_CR25","unstructured":"Marinov, D.: Automatic Testing of Software with Structurally Complex Inputs. PhD thesis. MIT (2005)"},{"key":"10_CR26","unstructured":"Marinov, D., Andoni, A., Daniliuc, D., Khurshid, S., Rinard, M.: An evaluation of exhaustive testing for data structures. Technical report, MIT Computer Science and Artificial Intelligence Laboratory Report MIT -LCS-TR-921 (2003)"},{"key":"10_CR27","doi-asserted-by":"crossref","DOI":"10.7551\/mitpress\/5625.001.0001","volume-title":"Programming with constraints : an introduction","author":"K. Marriott","year":"1998","unstructured":"Marriott, K., Stuckey, P.J.: Programming with constraints: an introduction. MIT Press, Cambridge (1998)"},{"issue":"2","key":"10_CR28","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1002\/stvr.225","volume":"11","author":"C. Meudec","year":"2001","unstructured":"Meudec, C.: Atgen: automatic test data generation using constraint logic programming and symbolic execution. Software Testing, Verification and Reliability\u00a011(2), 81\u201396 (2001)","journal-title":"Software Testing, Verification and Reliability"},{"key":"10_CR29","doi-asserted-by":"crossref","unstructured":"Milicevic, A., Misailovic, S., Marinov, D., Khurshid, S.: Korat: A tool for generating structurally complex test inputs. In: ICSE, pp. 771\u2013774. IEEE Computer Society (2007)","DOI":"10.1109\/ICSE.2007.48"},{"issue":"1","key":"10_CR30","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1016\/0304-3975(94)00227-A","volume":"142","author":"M. Proietti","year":"1995","unstructured":"Proietti, M., Pettorossi, A.: Unfolding - definition - folding, in this order, for avoiding unnecessary variables in logic programs. Theor. Comput. Sci.\u00a0142(1), 89\u2013124 (1995)","journal-title":"Theor. Comput. Sci."},{"key":"10_CR31","unstructured":"Robinson, R.W.: Counting unlabeled acyclic digraphs. In: Little, C. (ed.) Combinatorial Mathematics V. Lecture Notes in Mathematics, vol.\u00a0622, pp. 28\u201343. Springer, Heidelberg (1977), 10.1007\/BFb0069178"},{"key":"10_CR32","doi-asserted-by":"crossref","unstructured":"Senni, V., Fioravanti, F.: Generation of test data structures using constraint logic programming. Technical Report 12-04, IASI-CNR, Roma, Italy (2012)","DOI":"10.1007\/978-3-642-30473-6_10"},{"key":"10_CR33","doi-asserted-by":"crossref","unstructured":"Visser, W., Pasareanu, C.S., Khurshid, S.: Test input generation with java pathfinder. In: Avrunin, G.S., Rothermel, G. (eds.) ISSTA, pp. 97\u2013107. ACM (2004)","DOI":"10.1145\/1013886.1007526"},{"key":"10_CR34","doi-asserted-by":"crossref","unstructured":"Visvanathan, S., Gupta, N.: Generating test data for functions with pointer inputs. In: ASE, p. 149. IEEE Computer Society (2002)","DOI":"10.1109\/ASE.2002.1115007"},{"key":"10_CR35","doi-asserted-by":"crossref","unstructured":"Zhao, R., Li, Q.: Automatic test generation for dynamic data structures. In: SERA, pp. 545\u2013549. IEEE Computer Society (2007)","DOI":"10.1109\/SERA.2007.59"}],"container-title":["Lecture Notes in Computer Science","Tests and Proofs"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-30473-6_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,3,28]],"date-time":"2025-03-28T21:25:01Z","timestamp":1743197101000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-30473-6_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012]]},"ISBN":["9783642304729","9783642304736"],"references-count":35,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-30473-6_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2012]]}}}