{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T19:46:29Z","timestamp":1760298389271},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2011,6,26]],"date-time":"2011-06-26T00:00:00Z","timestamp":1309046400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Software Qual J"],"published-print":{"date-parts":[[2011,12]]},"DOI":"10.1007\/s11219-011-9150-y","type":"journal-article","created":{"date-parts":[[2011,6,26]],"date-time":"2011-06-26T00:04:56Z","timestamp":1309046696000},"page":"725-751","source":"Crossref","is-referenced-by-count":20,"title":["Enhancing structural software coverage by incrementally computing branch executability"],"prefix":"10.1007","volume":"19","author":[{"given":"Mauro","family":"Baluda","sequence":"first","affiliation":[]},{"given":"Pietro","family":"Braione","sequence":"additional","affiliation":[]},{"given":"Giovanni","family":"Denaro","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Pezz\u00e8","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2011,6,26]]},"reference":[{"key":"9150_CR1","unstructured":"Ball, T. (2003). Abstraction-guided test generation: A case study. Tech. Rep. MSR-TR-2003-86, Microsoft Research."},{"key":"9150_CR2","unstructured":"Ball, T. (2004). A theory of predicate-complete test coverage and generation. In Proceedings of the third international symposium on formal methods for components and objects (FMCO 2004), Lecture Notes in Computer Science, Springer Berlin \/ Heidelberg (Vol. 3657, pp. 1\u201322)."},{"key":"9150_CR3","doi-asserted-by":"crossref","unstructured":"Ball, T., Cook, B., Levin, V., & Rajamani, S. K. (2004). SLAM and static driver verifier: Technology transfer of formal methods inside Microsoft. In Proceedings of the 4th international conference on integrated formal methods (IFM 2004), Springer (pp. 1\u201320).","DOI":"10.1007\/978-3-540-24756-2_1"},{"key":"9150_CR4","doi-asserted-by":"crossref","unstructured":"Baluda, M., Braione, P., Denaro, G., & Pezz\u00e8, M. (2010). Structural coverage of feasible code. In Proceedings of the fifth international workshop on automation of software test (AST 2010).","DOI":"10.1145\/1808266.1808275"},{"key":"9150_CR5","doi-asserted-by":"crossref","unstructured":"Beckman, N. E., Nori, A. V., Rajamani, S. K., Simmons, R. J., Tetali, S. D., & Thakur, A. V. (2010). Proofs from tests. IEEE Transactions on Software Engineering, 36(4), 495\u2013508","DOI":"10.1109\/TSE.2010.49"},{"key":"9150_CR6","doi-asserted-by":"crossref","unstructured":"Beyer, D., Chlipala, A. J., Henzinger, T. A., Jhala, R., & Majumdar, R. (2004). Generating tests from counterexamples. In Proceedings of the 26th international conference on software engineering (ICSE \u201904), IEEE Computer Society (pp. 326\u2013335).","DOI":"10.1109\/ICSE.2004.1317455"},{"issue":"5-6","key":"9150_CR7","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1007\/s10009-007-0044-z","volume":"9","author":"D. Beyer","year":"2007","unstructured":"Beyer, D., Henzinger, T., Jhala, R., & Majumdar, R. (2007). The software model checker BLAST. International Journal on Software Tools for Technology Transfer (STTT), 9(5\u20136), 505\u2013525 doi: 10.1007\/s10009-007-0044-z .","journal-title":"International Journal on Software Tools for Technology Transfer (STTT)"},{"key":"9150_CR8","doi-asserted-by":"crossref","first-page":"234","DOI":"10.1145\/390016.808445","volume":"10","author":"R. S. Boyer","year":"1975","unstructured":"Boyer, R. S., Elspas, B., Levitt, K. N. (1975). SELECT\u2014a formal system for testing and debugging programs by symbolic execution. ACM SIGPLAN Notices 10, 234\u2013245.","journal-title":"ACM SIGPLAN Notices"},{"key":"9150_CR9","doi-asserted-by":"crossref","unstructured":"Bucur, S., Ureche, V., Zamfir, C., & Candea, G. (2011). Parallel symbolic execution for automated real-world software testing. In Proceedings of EuroSys 2011, ACM.","DOI":"10.1145\/1966445.1966463"},{"key":"9150_CR10","doi-asserted-by":"crossref","unstructured":"Burnim, J., & Sen, K. (2008). Heuristics for scalable dynamic test generation. In Proceedings of the 23rd IEEE\/ACM international conference on automated software engineering (ASE 2008) (pp. 443\u2013446).","DOI":"10.1109\/ASE.2008.69"},{"key":"9150_CR11","doi-asserted-by":"crossref","unstructured":"Cadar, C., Ganesh, V., Pawlowski, P. M., Dill, D. L., & Engler, D. R. (2006). EXE: Automatically generating inputs of death. In Proceedings of the 13th ACM conference on computer and communications security (CCS \u201906), (pp. 322\u2013335). ACM, New York, NY, USA. doi: 10.1145\/1180405.1180445 .","DOI":"10.1145\/1180405.1180445"},{"key":"9150_CR12","unstructured":"Cadar, C., Dunbar, D., & Engler, D. (2008). KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In Proceedings of the 8th USENIX symposium on operating systems design and implementation (OSDI 2008)."},{"key":"9150_CR13","unstructured":"Callahan, J., Schneider, F., & Easterbrook, S. (1996). Automated software testing using model-checking. In: Proceedings of the 1996 SPIN workshop (SPIN 1996). Also WVU Technical Report NASA-IVV-96-022., http:\/\/www.citeseer.ist.psu.edu\/article\/callahan96automated.html."},{"key":"9150_CR14","doi-asserted-by":"crossref","unstructured":"Chipounov, V., Kuznetsov, V., & Candea, G. (2011). S2E: A platform for in-vivo multi-path analysis of software systems. In Proceedings of the 16th international conference on architectural support for programming languages and operating systems (ASPLOS 2011) (pp. 265\u2013278), ACM. doi: 10.1145\/1950365.1950396 .","DOI":"10.1145\/1950365.1950396"},{"key":"9150_CR15","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TSE.1976.233817","volume":"2","author":"L. A. Clarke","year":"1976","unstructured":"Clarke, L. A. (1976). A system to generate test data and symbolically execute programs. IEEE Transactions on Software Engineering, 2, 215\u2013222.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9150_CR16","unstructured":"Csallner, C., & Smaragdakis, Y. (2005). Check\u2019n\u2019crash: Combining static checking and testing. In Proceedings of the 27th international conference on software engineering (ICSE 2005) (pp. 422\u2013431)."},{"issue":"2","key":"9150_CR17","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/1348250.1348254","volume":"17","author":"C. Csallner","year":"2008","unstructured":"Csallner, C., Smaragdakis, Y., & Xie, T. (2008). DSD-crasher: A hybrid analysis tool for bug finding. ACM Transactions on Software Engineering and Methodology (TOSEM) 17(2), 1\u201337.","journal-title":"ACM Transactions on Software Engineering and Methodology (TOSEM)"},{"issue":"4","key":"9150_CR18","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/s10664-005-3861-2","volume":"10","author":"H. Do","year":"2005","unstructured":"Do, H., Elbaum, S. G., & Rothermel, G. (2005). Supporting controlled experimentation with testing techniques: An infrastructure and its potential impact. Empirical Software Engineering: An International Journal 10(4), 405\u2013435.","journal-title":"Empirical Software Engineering: An International Journal"},{"key":"9150_CR19","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/226155.226158","volume":"5","author":"R. Ferguson","year":"1996","unstructured":"Ferguson, R., & Korel, B. (1996). The chaining approach for software test data generation. ACM Transactions on Software Engineering and Methodology 5, 63\u201386.","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"issue":"10","key":"9150_CR20","doi-asserted-by":"crossref","first-page":"1483","DOI":"10.1109\/32.6194","volume":"14","author":"P. G. Frankl","year":"1988","unstructured":"Frankl, P. G., & Weyuker, E. J. (1988). An applicable family of data flow testing criteria. IEEE Transactions on Software Engineering 14(10),1483\u20131498 doi: 10.1109\/32.6194 .","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"9150_CR21","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1002\/stvr.402","volume":"19","author":"G. Fraser","year":"2009","unstructured":"Fraser, G., Wotawa, F., & Ammann, P. E. (2009). Testing with model checkers: A survey. Software Testing, Verification and Reliability 19(3), 215\u2013261.","journal-title":"Software Testing, Verification and Reliability"},{"key":"9150_CR22","doi-asserted-by":"crossref","unstructured":"Godefroid, P., Klarlund, N., & Sen, K. (2005). DART: Directed automated random testing. In Proceedings of the ACM SIGPLAN 2005 conference on programming language design and implementation (PLDI 2005) (pp. 213\u2013223).","DOI":"10.1145\/1065010.1065036"},{"key":"9150_CR23","unstructured":"Godefroid, P., Levin, M. Y., & Molnar, D. (2008). Automated whitebox fuzz testing. In Proceedings of the 16th annual network and distributed system security symposium (NDSS 2008) (pp. 151\u2013166). doi: 10.1.1.129.5914 ."},{"key":"9150_CR24","doi-asserted-by":"crossref","unstructured":"Gulavani, B. S., Henzinger, T. A., Kannan, Y., Nori, A. V., & Rajamani, S. K. (2006). Synergy: A new algorithm for property checking. In Proceedings of the 14th ACM SIGSOFT symposium on foundations of software engineering (FSE-14) (pp. 117\u2013127).","DOI":"10.1145\/1181775.1181790"},{"issue":"7","key":"9150_CR25","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1145\/360248.360252","volume":"19","author":"J. C. King","year":"1976","unstructured":"King, J. C. (1976). Symbolic execution and program testing. Communications of the ACM 19(7), 385\u2013394.","journal-title":"Communications of the ACM"},{"issue":"4","key":"9150_CR26","doi-asserted-by":"crossref","first-page":"203","DOI":"10.1002\/stvr.4370020405","volume":"2","author":"B. Korel","year":"1992","unstructured":"Korel, B. (1992). Dynamic method for software test data generation. Software Testing, Verification and Reliability 2(4), 203\u2013213.","journal-title":"Software Testing, Verification and Reliability"},{"key":"9150_CR27","doi-asserted-by":"crossref","unstructured":"Majumdar R., & Sen, K. (2007) Hybrid concolic testing. In Proceedings of the 29th international conference on software engineering (pp. 416\u2013426). IEEE Computer Society.","DOI":"10.1109\/ICSE.2007.41"},{"key":"9150_CR28","doi-asserted-by":"crossref","unstructured":"Namin, A. S., & Andrews, J. H. (2009). The influence of size and coverage on test suite effectiveness. In Proceedings of the eighteenth international symposium on software testing and analysis (issta \u201909) (pp. 57\u201368). ACM, New York, NY, USA.","DOI":"10.1145\/1572272.1572280"},{"key":"9150_CR29","unstructured":"Pezz\u00e8, M., & Young, M. (2007). Software testing and analysis: process, principles and techniques. Wiley, URL http:\/\/www.amazon.com\/exec\/obidos\/redirect?tag=citeulike07-20&path=ASIN\/047145593 ."},{"key":"9150_CR30","unstructured":"RTCA, Inc. (1993). Document RTCA\/DO-178B. U.S. Department of Transportation, Federal Aviation Administration, Washington, D.C."},{"key":"9150_CR31","doi-asserted-by":"crossref","unstructured":"Sen, K., Marinov, D., & Agha, G. (2005). CUTE: A concolic unit testing engine for C. In Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on foundations of software engineering (ESEC\/FSE-13) (pp. 263\u2013272).","DOI":"10.1145\/1081706.1081750"},{"key":"9150_CR32","doi-asserted-by":"crossref","unstructured":"Staats, M., & Pa\u030csa\u030creanu, C. S. (2010). Parallel symbolic execution for structural test generation. In Proceedings of the 19th international symposium on software testing and analysis (ISSTA 2010) (pp. 183\u2013194). ACM. doi: 10.1145\/1831708.1831732 .","DOI":"10.1145\/1831708.1831732"},{"key":"9150_CR33","doi-asserted-by":"crossref","unstructured":"Visser, W., Pa\u030csa\u030creanu, C. S., & Khurshid, S. (2004). Test input generation with Java PathFinder. In Proceedings of the 2004 ACM SIGSOFT International Symposium on Software Testing and Analysis (ISSTA 2004) (pp. 97\u2013107). ACM.","DOI":"10.1145\/1007512.1007526"},{"key":"9150_CR34","doi-asserted-by":"crossref","unstructured":"Weyuker, E. J. (1988) The evaluation of program-based software test data adequacy criteria. Communications of the ACM, 31(6), 668\u2013675, doi: 10.1145\/62959.62963 .","DOI":"10.1145\/62959.62963"},{"key":"9150_CR35","unstructured":"Xie, T., Tillmann, N., de Halleux. P., & Schulte, W. (2009). Fitness-guided path exploration in dynamic symbolic execution. In Proceedings of the 39th annual IEEE\/IFIP international conference on dependable systems and networks (DSN 2009) (pp. 359\u2013368). URL http:\/\/www.csc.ncsu.edu\/faculty\/xie\/publications\/dsn09-fitnex.pd ."},{"key":"9150_CR36","doi-asserted-by":"crossref","unstructured":"Yates, D. F., & Malevris, N. (1989). Reducing the effects of infeasible paths in branch testing. In Proceedings of the ACM SIGSOFT \u201989 third symposium on software testing, analysis, and verification (pp. 48\u201354). ACM.","DOI":"10.1145\/75308.75315"}],"container-title":["Software Quality Journal"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-011-9150-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11219-011-9150-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11219-011-9150-y","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T10:18:47Z","timestamp":1560334727000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11219-011-9150-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,6,26]]},"references-count":36,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2011,12]]}},"alternative-id":["9150"],"URL":"https:\/\/doi.org\/10.1007\/s11219-011-9150-y","relation":{},"ISSN":["0963-9314","1573-1367"],"issn-type":[{"value":"0963-9314","type":"print"},{"value":"1573-1367","type":"electronic"}],"subject":[],"published":{"date-parts":[[2011,6,26]]}}}