{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,3]],"date-time":"2025-05-03T16:28:11Z","timestamp":1746289691560},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642380877"},{"type":"electronic","value":"9783642380884"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38088-4_16","type":"book-chapter","created":{"date-parts":[[2013,5,8]],"date-time":"2013-05-08T20:38:27Z","timestamp":1368045507000},"page":"229-243","source":"Crossref","is-referenced-by-count":14,"title":["Bounded Lazy Initialization"],"prefix":"10.1007","author":[{"given":"Jaco","family":"Geldenhuys","sequence":"first","affiliation":[]},{"given":"Nazareno","family":"Aguirre","sequence":"additional","affiliation":[]},{"given":"Marcelo F.","family":"Frias","sequence":"additional","affiliation":[]},{"given":"Willem","family":"Visser","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"16_CR1","doi-asserted-by":"crossref","unstructured":"Ammann, P., Offutt, J.: Introduction to Software Testing. Cambridge University Press (2008)","DOI":"10.1017\/CBO9780511809163"},{"key":"16_CR2","volume-title":"Model Checking","author":"E.M. Clarke Jr.","year":"1999","unstructured":"Clarke Jr., E.M., Grumberg, O., Peled, D.A.: Model Checking. MIT Press, Cambridge (1999)"},{"key":"16_CR3","first-page":"157","volume-title":"Proceedings of the 21st IEEE\/ACM International Conference on Automated Software Engineering, ASE 2006","author":"X. Deng","year":"2006","unstructured":"Deng, X., Lee, J., Robby: Bogor\/Kiasan: A k-bounded symbolic execution for checking strong heap properties of open systems. In: Proceedings of the 21st IEEE\/ACM International Conference on Automated Software Engineering, ASE 2006, pp. 157\u2013166. IEEE Computer Society, Washington, DC (2006)"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"130","DOI":"10.1007\/978-3-540-87873-5_13","volume-title":"Verified Software: Theories, Tools, Experiments","author":"G. Dennis","year":"2008","unstructured":"Dennis, G., Yessenov, K., Jackson, D.: Bounded verification of voting software. In: Shankar, N., Woodcock, J. (eds.) VSTTE 2008. LNCS, vol.\u00a05295, pp. 130\u2013145. Springer, Heidelberg (2008)"},{"key":"16_CR5","doi-asserted-by":"crossref","unstructured":"Galeotti, J.P., Rosner, N., Pombo, C.L., Frias, M.F.: Analysis of invariants for efficient bounded verification. In: Proceedings of the 19th International Symposium on Software Testing and Analysis, pp. 25\u201336 (July 2010)","DOI":"10.1145\/1831708.1831712"},{"key":"16_CR6","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1145\/1065010.1065036","volume-title":"Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2005","author":"P. Godefroid","year":"2005","unstructured":"Godefroid, P., Klarlund, N., Sen, K.: DART: directed automated random testing. In: Proceedings of the 2005 ACM SIGPLAN Conference on Programming Language Design and Implementation, PLDI 2005, pp. 213\u2013223. ACM, New York (2005)"},{"key":"16_CR7","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1145\/347324.383378","volume-title":"Proceedings of the 2000 ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2000","author":"D. Jackson","year":"2000","unstructured":"Jackson, D., Vaziri, M.: Finding bugs with a constraint solver. In: Proceedings of the 2000 ACM SIGSOFT International Symposium on Software Testing and Analysis, ISSTA 2000, pp. 14\u201325. ACM, New York (2000)"},{"key":"16_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"553","DOI":"10.1007\/3-540-36577-X_40","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"S. Khurshid","year":"2003","unstructured":"Khurshid, S., P\u0103s\u0103reanu, C.S., Visser, W.: Generalized symbolic execution for model checking and testing. In: Garavel, H., Hatcliff, J. (eds.) TACAS 2003. LNCS, vol.\u00a02619, pp. 553\u2013568. Springer, Heidelberg (2003)"},{"issue":"7","key":"16_CR9","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1145\/360248.360252","volume":"19","author":"J.C. King","year":"1976","unstructured":"King, J.C.: Symbolic execution and program testing. Commun. ACM\u00a019(7), 385\u2013394 (1976)","journal-title":"Commun. ACM"},{"key":"16_CR10","first-page":"179","volume-title":"Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering, ASE 2010","author":"C.S. P\u0103s\u0103reanu","year":"2010","unstructured":"P\u0103s\u0103reanu, C.S., Rungta, N.: Symbolic PathFinder: symbolic execution of Java bytecode. In: Proceedings of the IEEE\/ACM International Conference on Automated Software Engineering, ASE 2010, pp. 179\u2013180. ACM, New York (2010)"},{"key":"16_CR11","doi-asserted-by":"publisher","first-page":"11","DOI":"10.1145\/1512762.1512764","volume-title":"Proceedings of the 2007 Symposium on Library-Centric Software Design, LCSD 2007","author":"D. Shao","year":"2007","unstructured":"Shao, D., Khurshid, S., Perry, D.E.: Whispec: white-box testing of libraries using declarative specifications. In: Proceedings of the 2007 Symposium on Library-Centric Software Design, LCSD 2007, pp. 11\u201320. ACM, New York (2007)"},{"key":"16_CR12","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/3-540-36577-X_37","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"M. Vaziri","year":"2003","unstructured":"Vaziri, M., Jackson, D.: Checking properties of heap-manipulating procedures with a constraint solver. In: Garavel, H., Hatcliff, J. (eds.) TACAS 2003. LNCS, vol.\u00a02619, pp. 505\u2013520. Springer, Heidelberg (2003)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Visser, W., Pasareanu, C.S., Khurshid, S.: Test input generation with Java PathFinder. In: Avrunin, G.S., Rothermel, G. (eds.) ISSTA, pp. 97\u2013107. ACM (2004)","DOI":"10.1145\/1013886.1007526"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Visser, W., P\u0103s\u0103reanu, C.S., Pel\u00e1nek, R.: Test input generation for Java containers using state matching. In: Pollock, L.L., Pezz\u00e8, M. (eds.) Proceedings of the ACM\/SIGSOFT International Symposium on Software Testing and Analysis, pp. 37\u201348. ACM (July 2006)","DOI":"10.1145\/1146238.1146243"}],"container-title":["Lecture Notes in Computer Science","NASA Formal Methods"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38088-4_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,2,16]],"date-time":"2022-02-16T09:42:16Z","timestamp":1645004536000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38088-4_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642380877","9783642380884"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38088-4_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}