{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,1,31]],"date-time":"2026-01-31T21:00:17Z","timestamp":1769893217988,"version":"3.49.0"},"reference-count":69,"publisher":"Springer Science and Business Media LLC","issue":"3-4","license":[{"start":{"date-parts":[[2019,4,9]],"date-time":"2019-04-09T00:00:00Z","timestamp":1554768000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2019,4,9]],"date-time":"2019-04-09T00:00:00Z","timestamp":1554768000000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1319688"],"award-info":[{"award-number":["CCF-1319688"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1319858"],"award-info":[{"award-number":["CCF-1319858"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1549161"],"award-info":[{"award-number":["CCF-1549161"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CCF-1464123"],"award-info":[{"award-number":["CCF-1464123"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1239498"],"award-info":[{"award-number":["CNS-1239498"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Innovations Syst Softw Eng"],"published-print":{"date-parts":[[2019,9]]},"DOI":"10.1007\/s11334-019-00331-9","type":"journal-article","created":{"date-parts":[[2019,4,9]],"date-time":"2019-04-09T12:02:28Z","timestamp":1554811348000},"page":"325-342","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["A synergistic approach to improving symbolic execution using test ranges"],"prefix":"10.1007","volume":"15","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1404-4560","authenticated-orcid":false,"given":"Guowei","family":"Yang","sequence":"first","affiliation":[]},{"given":"Rui","family":"Qiu","sequence":"additional","affiliation":[]},{"given":"Sarfraz","family":"Khurshid","sequence":"additional","affiliation":[]},{"given":"Corina S.","family":"P\u0103s\u0103reanu","sequence":"additional","affiliation":[]},{"given":"Junye","family":"Wen","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,4,9]]},"reference":[{"key":"331_CR1","doi-asserted-by":"crossref","unstructured":"Albert E, G\u00f3mez-Zamalloa M, Rojas JM, Puebla G (2011) Compositional clp-based test data generation for imperative languages. In: Proceedings of the 20th international conference on logic-based program synthesis and transformation, LOPSTR\u201911. Springer, Berlin, pp 99\u2013116","DOI":"10.1007\/978-3-642-20551-4_7"},{"issue":"8","key":"331_CR2","doi-asserted-by":"publisher","first-page":"1978","DOI":"10.1016\/j.jss.2013.02.061","volume":"86","author":"S Anand","year":"2013","unstructured":"Anand S, Burke EK, Chen TY, Clark J, Cohen MB, Grieskamp W, Harman M, Harrold MJ, Mcminn P (2013) An orchestrated survey of methodologies for automated software test case generation. J Syst Softw 86(8):1978\u20132001","journal-title":"J Syst Softw"},{"key":"331_CR3","doi-asserted-by":"crossref","unstructured":"Baars AI, Harman M, Hassoun Y, Lakhotia K, McMinn P, Tonella P, Vos TEJ (2011) Symbolic search-based testing. In: 26th IEEE\/ACM international conference on automated software engineering (ASE 2011), Lawrence, KS, USA, November 6\u201310, 2011, pp 53\u201362","DOI":"10.1109\/ASE.2011.6100119"},{"key":"331_CR4","doi-asserted-by":"crossref","unstructured":"Balasubramanian D, P\u0103s\u0103reanu CS, Whalen MW, Karsai G, Lowry M (2011) Polyglot: modeling and analysis for multiple statechart formalisms. In: Proceedings of the 2011 international symposium on software testing and analysis, ISSTA\u201911. ACM, New York, pp 45\u201355","DOI":"10.1145\/2001420.2001427"},{"key":"331_CR5","doi-asserted-by":"crossref","unstructured":"Beyer D, Henzinger TA, Keremoglu ME, Wendler P (2012) Conditional model checking: a technique to pass information between verifiers. In: Proceedings of the ACM SIGSOFT 20th international symposium on the foundations of software engineering, FSE\u201912. ACM, New York, pp 57:1\u201357:11","DOI":"10.1145\/2393596.2393664"},{"key":"331_CR6","doi-asserted-by":"crossref","unstructured":"Beyer D, Lemberger T (2018) CPA-SymExec: efficient symbolic execution in CPAchecker. In: Proceedings of the 33rd ACM\/IEEE international conference on automated software engineering, ASE 2018. ACM, New York, pp 900\u2013903","DOI":"10.1145\/3238147.3240478"},{"key":"331_CR7","doi-asserted-by":"crossref","unstructured":"Boyapati C, Khurshid S, Marinov D (2002) Korat: automated testing based on java predicates. In: Proceedings of the 2002 ACM SIGSOFT international symposium on software testing and analysis, ISSTA\u201902. ACM, New York, pp 123\u2013133","DOI":"10.1145\/566172.566191"},{"key":"331_CR8","doi-asserted-by":"crossref","unstructured":"Bucur S, Ureche V, Zamfir C, Candea G (2011) Parallel symbolic execution for automated real-world software testing. In: Proceedings of the sixth conference on computer systems, EuroSys\u201911. ACM, New York, pp 183\u2013198","DOI":"10.1145\/1966445.1966463"},{"key":"331_CR9","doi-asserted-by":"crossref","unstructured":"Burnim J, Juvekar S, Sen K (2009) Wise: automated test generation for worst-case complexity. In: Proceedings of the 31st international conference on software engineering, ICSE\u201909. IEEE Computer Society, Washington, DC, pp 463\u2013473","DOI":"10.1109\/ICSE.2009.5070545"},{"key":"331_CR10","unstructured":"Cadar C, Dunbar D, Engler D (2008) Klee: unassisted and automatic generation of high-coverage tests for complex systems programs. In: Proceedings of the 8th USENIX conference on operating systems design and implementation, OSDI\u201908. USENIX Association, Berkeley, pp 209\u2013224"},{"key":"331_CR11","doi-asserted-by":"crossref","unstructured":"Casta\u00f1o R, Braberman V, Garbervetsky D, Uchitel S (2017) Model checker execution reports. In: Proceedings of the 32nd IEEE\/ACM international conference on automated software engineering, ASE 2017. IEEE Press, Piscataway, pp 200\u2013205","DOI":"10.1109\/ASE.2017.8115633"},{"key":"331_CR12","unstructured":"Chen J, Hu W, Zhang L, Hao D, Khurshid S, Zhang L (2018) Learning to accelerate symbolic execution via code transformation. In: Proceedings of the 32nd European conference on object-oriented programming, ECOOP 2018, Amsterdam, Netherlands, pp 6:1\u20136:27"},{"key":"331_CR13","doi-asserted-by":"crossref","unstructured":"Clarke LA (1976) A program testing system. In: Proceedings of the 1976 annual conference, ACM\u201976. ACM, New York, pp 488\u2013491","DOI":"10.1145\/800191.805647"},{"key":"331_CR14","unstructured":"Dini N (2016) MKorat: a novel approach for memoizing the Korat search and some potential applications. Master\u2019s thesis, University of Texas at Austin"},{"key":"331_CR15","doi-asserted-by":"crossref","unstructured":"Dini N, Yelen C, Khurshid S (2017) Optimizing parallel korat using invalid ranges. In: Proceedings of the 24th ACM SIGSOFT international SPIN symposium on model checking of software, Santa Barbara, CA, USA, July 10\u201314, 2017, pp 182\u2013191","DOI":"10.1145\/3092282.3092293"},{"key":"331_CR16","doi-asserted-by":"crossref","unstructured":"Dong S, Olivo O, Zhang L, Khurshid S (2015) Studying the influence of standard compiler optimizations on symbolic execution. In: 26th IEEE international symposium on software reliability engineering, ISSRE 2015, Gaithersbury, MD, USA, November 2\u20135, 2015. IEEE Computer Society, pp 205\u2013215","DOI":"10.1109\/ISSRE.2015.7381814"},{"key":"331_CR17","doi-asserted-by":"crossref","unstructured":"Dustmann OS, Wehrle K, Cadar C (2018) Parti: a multi-interval theory solver for symbolic execution. In: Proceedings of the 33rd ACM\/IEEE international conference on automated software engineering, ASE 2018. ACM, New York, pp 430\u2013440","DOI":"10.1145\/3238147.3238179"},{"key":"331_CR18","doi-asserted-by":"crossref","unstructured":"Eclat: automatic generation and classification of test inputs. In: Proceedings of the 19th European conference on object-oriented programming, ECOOP\u201905, 2005. Springer, Berlin, pp 504\u2013527","DOI":"10.1007\/11531142_22"},{"key":"331_CR19","unstructured":"Forum MP (1994) Mpi: a message-passing interface standard. Technical report, Knoxville, TN, USA"},{"key":"331_CR20","doi-asserted-by":"crossref","unstructured":"Fraser G, Arcuri A (2011) Evolutionary generation of whole test suites. In: Proceedings of the 2011 11th international conference on quality software, QSIC\u201911. IEEE Computer Society, Washington, DC, pp 31\u201340","DOI":"10.1109\/QSIC.2011.19"},{"key":"331_CR21","doi-asserted-by":"crossref","unstructured":"Godefroid P (2007) Compositional dynamic test generation. In: Proceedings of the 34th annual ACM SIGPLAN-SIGACT symposium on principles of programming languages, POPL\u201907. ACM, New York, pp 47\u201354","DOI":"10.1145\/1190216.1190226"},{"key":"331_CR22","doi-asserted-by":"crossref","unstructured":"Godefroid P, Klarlund N, Sen K (2005) DART: directed automated random testing. In: Proceedings of the 2005 ACM SIGPLAN conference on programming language design and implementation, PLDI\u201905. ACM, New York, pp 213\u2013223","DOI":"10.1145\/1065010.1065036"},{"key":"331_CR23","doi-asserted-by":"crossref","unstructured":"Inkumsah K, Xie T (2007) Evacon: a framework for integrating evolutionary and concolic testing for object-oriented programs. In: 22nd IEEE\/ACM international conference on automated software engineering (ASE 2007), November 5\u20139, 2007. Atlanta, Georgia, USA, pp 425\u2013428","DOI":"10.1145\/1321631.1321700"},{"key":"331_CR24","doi-asserted-by":"crossref","unstructured":"Inkumsah K, Xie T (2008) Improving structural testing of object-oriented programs via integrating evolutionary testing and symbolic execution. In: Proceedings of the 2008 23rd IEEE\/ACM international conference on automated software engineering, ASE\u201908. IEEE Computer Society, Washington, DC, pp 297\u2013306","DOI":"10.1109\/ASE.2008.40"},{"key":"331_CR25","doi-asserted-by":"crossref","unstructured":"Jia X, Ghezzi C, Ying S (2015) Enhancing reuse of constraint solutions to improve symbolic execution. In: Proceedings of the 2015 international symposium on software testing and analysis, ISSTA 2015. ACM, New York, pp 177\u2013187","DOI":"10.1145\/2771783.2771806"},{"issue":"5","key":"331_CR26","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/TSE.2010.62","volume":"37","author":"Y Jia","year":"2011","unstructured":"Jia Y, Harman M (2011) An analysis and survey of the development of mutation testing. IEEE Trans Softw Eng 37(5):649\u2013678","journal-title":"IEEE Trans Softw Eng"},{"key":"331_CR27","doi-asserted-by":"crossref","unstructured":"Joshi A, Heimdahl MPE (2005) Model-based safety analysis of simulink models using scade design verifier. In: Proceedings of the 24th international conference on computer safety, reliability, and security, SAFECOMP\u201905. Springer, Berlin, pp 122\u2013135","DOI":"10.1007\/11563228_10"},{"key":"331_CR28","doi-asserted-by":"crossref","unstructured":"Khurshid S, P\u0103s\u0103reanu CS, Visser W (2003) Generalized symbolic execution for model checking and testing. In: Proceedings of the 9th international conference on tools and algorithms for the construction and analysis of systems, TACAS\u201903. Springer, Berlin, pp 553\u2013568","DOI":"10.1007\/3-540-36577-X_40"},{"key":"331_CR29","doi-asserted-by":"crossref","unstructured":"Kim M, Kim Y, Rothermel G (2012) A scalable distributed concolic testing approach: an empirical evaluation. In: Proceedings of the 2012 IEEE fifth international conference on software testing, verification and validation, ICST \u201912. IEEE Computer Society, Washington, DC, pp 340\u2013349","DOI":"10.1109\/ICST.2012.114"},{"issue":"7","key":"331_CR30","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1145\/360248.360252","volume":"19","author":"JC King","year":"1976","unstructured":"King JC (1976) Symbolic execution and program testing. Commun ACM 19(7):385\u2013394","journal-title":"Commun ACM"},{"key":"331_CR31","unstructured":"K\u00f6roglu Y, Sen A (2016) Design of a modified concolic testing algorithm with smaller constraints. In: Proceedings of the 7th workshop on constraint solvers in testing, verification, and analysis co-located with the international symposium on software testing and analysis (ISSTA 2016), Saarbr\u00fccken, Germany, July 17th, 2016, pp 3\u201314"},{"key":"331_CR32","unstructured":"K\u00f6roglu Y, Sen A (2016) Design of a modified concolic testing algorithm with smaller constraints. In: International workshop on constraints in software testing, verification and analysis 2016, CSTVA@ISSTA"},{"issue":"12","key":"331_CR33","doi-asserted-by":"publisher","first-page":"2379","DOI":"10.1016\/j.jss.2010.07.026","volume":"83","author":"K Lakhotia","year":"2010","unstructured":"Lakhotia K, McMinn P, Harman M (2010) An empirical investigation into branch coverage for C programs using CUTE and AUSTIN. J Syst Softw 83(12):2379\u20132391","journal-title":"J Syst Softw"},{"key":"331_CR34","doi-asserted-by":"crossref","unstructured":"Lauterburg S, Sobeih A, Marinov D, Viswanathan M (2008) Incremental state-space exploration for programs with dynamically allocated data. In: 30th international conference on software engineering (ICSE 2008), Leipzig, Germany, May 10\u201318, 2008, pp 291\u2013300","DOI":"10.1145\/1368088.1368128"},{"key":"331_CR35","doi-asserted-by":"crossref","unstructured":"Li G, Andreasen E, Ghosh I (2014) SymJS: automatic symbolic testing of javascript web applications. In: Proceedings of the 22nd ACM SIGSOFT international symposium on foundations of software engineering, FSE 2014. ACM, New York, pp 449\u2013459","DOI":"10.1145\/2635868.2635913"},{"key":"331_CR36","doi-asserted-by":"crossref","unstructured":"Liew D, Cadar C, Donaldson AF (2016) Symbooglix: a symbolic execution engine for boogie programs. In: 2016 IEEE international conference on software testing, verification and validation, ICST 2016, Chicago, IL, USA, April 11\u201315, 2016, pp 45\u201356","DOI":"10.1109\/ICST.2016.11"},{"key":"331_CR37","unstructured":"Ma K-K, Phang KY, Foster JS, Hicks M (2011) Directed symbolic execution. In: Proceedings of the 18th international conference on static analysis, SAS\u201911. Springer, Berlin, pp 95\u2013111"},{"key":"331_CR38","doi-asserted-by":"crossref","unstructured":"Misailovic S, Milicevic A, Petrovic N, Khurshid S, Marinov D (2007) Parallel test generation and execution with Korat. In: Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on the foundations of software engineering, ESEC-FSE\u201907. ACM, New York, pp 135\u2013144","DOI":"10.1145\/1287624.1287645"},{"key":"331_CR39","doi-asserted-by":"crossref","unstructured":"Pacheco C, Lahiri SK, Ernst MD, Ball T (2007) Feedback-directed random test generation. In: Proceedings of the 29th international conference on software engineering, ICSE\u201907. IEEE Computer Society, Washington, DC, pp 75\u201384","DOI":"10.1109\/ICSE.2007.37"},{"issue":"3","key":"331_CR40","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/s10515-013-0122-2","volume":"20","author":"CS Pasareanu","year":"2013","unstructured":"Pasareanu CS, Visser W, Bushnell DH, Geldenhuys J, Mehlitz PC, Rungta N (2013) Symbolic pathfinder: integrating symbolic execution with model checking for java bytecode analysis. Autom Softw Eng 20(3):391\u2013425","journal-title":"Autom Softw Eng"},{"key":"331_CR41","doi-asserted-by":"crossref","unstructured":"Person S, Yang G, Rungta N, Khurshid S (2011) Directed incremental symbolic execution. In: Proceedings of the 32nd ACM SIGPLAN conference on programming language design and implementation, PLDI\u201911. ACM, New York, pp 504\u2013515","DOI":"10.1145\/1993498.1993558"},{"key":"331_CR42","doi-asserted-by":"crossref","unstructured":"P\u0103s\u0103reanu CS, Mehlitz PC, Bushnell DH, Gundy-Burlet K, Lowry M, Person S, Pape M (2008) Combining unit-level symbolic execution and system-level concrete execution for testing Nasa software. In: Proceedings of the 2008 international symposium on software testing and analysis, ISSTA\u201908. ACM, New York, pp 15\u201326","DOI":"10.1145\/1390630.1390635"},{"key":"331_CR43","doi-asserted-by":"crossref","unstructured":"P\u0103s\u0103reanu CS, Rungta N (2010) Symbolic pathfinder: symbolic execution of java bytecode. In: Proceedings of the IEEE\/ACM international conference on automated software engineering, ASE\u201910. ACM, New York, pp 179\u2013180","DOI":"10.1145\/1858996.1859035"},{"key":"331_CR44","unstructured":"Qiu R (2016) Scaling and certifying symbolic execution, Ph.D. dissertation, University of Texas at Austin"},{"key":"331_CR45","doi-asserted-by":"crossref","unstructured":"Qiu R, Khurshid S, P\u0103s\u0103reanu CS, Wen J, Yang G (2018) Using test ranges to improve symbolic execution. In: Dutle A, Mu\u00f1oz C, Narkawicz A (eds) NASA formal methods. Springer, Cham, pp 416\u2013434","DOI":"10.1007\/978-3-319-77935-5_28"},{"key":"331_CR46","unstructured":"Qiu R, Khurshid S, P\u0103s\u0103reanu CS, Yang G (2017) A synergistic approach for distributed symbolic execution using test ranges. In: Proceedings of the 39th international conference on software engineering, ICSE 2017, Buenos Aires, Argentina, May 20\u201328, 2017\u2014companion volume, pp 130\u2013132"},{"key":"331_CR47","doi-asserted-by":"crossref","unstructured":"Qiu R, Yang G, P\u0103s\u0103reanu CS, Khurshid S (2015) Compositional symbolic execution with memoized replay. In: Proceedings of the 37th international conference on software engineering, vol 1, ICSE\u201915. IEEE Press, Piscataway, pp 632\u2013642","DOI":"10.1109\/ICSE.2015.79"},{"key":"331_CR48","unstructured":"Rojas JM, P\u0103s\u0103reanu CS (2013) Compositional symbolic execution through program specialization. In: BYTECODE\u201913, ETAPS\u201913"},{"key":"331_CR49","unstructured":"SAE Standards ARP4761 (1996) Guidelines and methods for conducting the safety assessment process on civil airborne systems and equipment. December 1996. SAE International. \n                    https:\/\/www.sae.org\/standards\/content\/arp4761\n                    \n                  . Accessed 1 Jan 2019"},{"key":"331_CR50","doi-asserted-by":"crossref","unstructured":"Sen K, Agha G (2006) CUTE and jCUTE: concolic unit testing and explicit path model-checking tools. In: Computer aided verification. Springer, Berlin, pp 419\u2013423","DOI":"10.1007\/11817963_38"},{"key":"331_CR51","doi-asserted-by":"crossref","unstructured":"Sen K, Marinov D, Agha G (2005) CUTE: a concolic unit testing engine for C. In: Proceedings of the 10th European software engineering conference held jointly with 13th ACM SIGSOFT international symposium on foundations of software engineering, ESEC\/FSE-13. ACM, New York, pp 263\u2013272","DOI":"10.1145\/1081706.1081750"},{"issue":"6","key":"331_CR52","doi-asserted-by":"publisher","first-page":"532","DOI":"10.1016\/j.jpdc.2009.02.006","volume":"69","author":"A Shafi","year":"2009","unstructured":"Shafi A, Carpenter B, Baker M (2009) Nested parallelism for multi-core HPC systems using Java. J Parallel Distrib Comput 69(6):532\u2013545","journal-title":"J Parallel Distrib Comput"},{"key":"331_CR53","unstructured":"Siddiqui JH, Khurshid S (2010) Parsym: parallel symbolic execution. In: 2010 2nd international conference on software technology and engineering, vol 1, pp V1-405\u2013V1-409"},{"key":"331_CR54","unstructured":"Siddiqui JH, Khurshid S (2012) Scaling symbolic execution using ranged analysis. In: Proceedings of the ACM international conference on object oriented programming systems languages and applications, OOPSLA\u201912. ACM, New York, pp 523\u2013536"},{"key":"331_CR55","unstructured":"SIR Repository. \n                    https:\/\/sir.csc.ncsu.edu\n                    \n                  . Accessed 1 Jan 2019"},{"key":"331_CR56","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-642-32469-7_14","volume-title":"Formal methods for industrial critical systems","author":"J Slab\u00fd","year":"2012","unstructured":"Slab\u00fd J, Strej\u010dek J, Trt\u00edk M (2012) Checking properties described by state machines: on synergy of instrumentation, slicing, and symbolic execution. In: Stoelinga M, Pinger R (eds) Formal methods for industrial critical systems. Springer, Berlin, pp 207\u2013221"},{"key":"331_CR57","doi-asserted-by":"crossref","unstructured":"Souza M, Borges M, d\u2019Amorim M, P\u0103s\u0103reanu CS (2011) CORAL: solving complex constraints for symbolic PathFinder. In: Proceedings of the third international conference on NASA formal methods, NFM\u201911. Springer, Heidelberg, pp 359\u2013374","DOI":"10.1007\/978-3-642-20398-5_26"},{"key":"331_CR58","doi-asserted-by":"crossref","unstructured":"Staats M, P\u01ces\u01cereanu C (2010) Parallel symbolic execution for structural test generation. In: Proceedings of the 19th international symposium on software testing and analysis, ISSTA\u201910. ACM, New York, pp 183\u2013194","DOI":"10.1145\/1831708.1831732"},{"key":"331_CR59","unstructured":"Stampede. \n                    https:\/\/www.tacc.utexas.edu\/stampede\n                    \n                  . Accessed 1 Jan 2019"},{"key":"331_CR60","unstructured":"SynergiSE. \n                    http:\/\/cs.txstate.edu\/~g_y10\/synergise\n                    \n                  . Accessed 1 Jan 2019"},{"key":"331_CR61","doi-asserted-by":"crossref","unstructured":"Visser W, Geldenhuys J, Dwyer MB (2012) Green: reducing, reusing and recycling constraints in program analysis. In: Proceedings of the ACM SIGSOFT 20th international symposium on the foundations of software engineering, FSE\u201912. ACM, New York, pp 58:1\u201358:11","DOI":"10.1145\/2393596.2393665"},{"key":"331_CR62","unstructured":"Wagner J, Kuznetsov V, Candea G (2013) -OVERIFY: optimizing programs for fast verification. In: Presented as part of the 14th workshop on hot topics in operating systems, Santa Ana Pueblo, NM, USENIX"},{"key":"331_CR63","unstructured":"Wang R, Ning P, Xie T, Chen Q (2013) MetaSymploit: day-one defense against script-based attacks with security-enhanced symbolic analysis. In: Proceedings of the USENIX security symposium"},{"key":"331_CR64","doi-asserted-by":"crossref","unstructured":"Wen J, Yang G (2018) Parallel property checking with symbolic execution. In: The 30th international conference on software engineering and knowledge engineering, Hotel Pullman, Redwood City, California, USA, July 1\u20133, 2018, pp 554\u2013553","DOI":"10.18293\/SEKE2018-171"},{"key":"331_CR65","doi-asserted-by":"crossref","unstructured":"Wen J, Yang G (2019) Parallel property checking with staged symbolic execution. In: Proceedings of the 34th annual ACM symposium on applied computing, SAC 2019, Limassol, Cyprus, April 08\u201312, 2019. (to appear)","DOI":"10.1145\/3297280.3297457"},{"key":"331_CR66","doi-asserted-by":"crossref","unstructured":"Yang G, Dwyer MB, Rothermel G (2009) Regression model checking. In: 25th IEEE international conference on software maintenance (ICSM 2009), September 20\u201326, 2009. Edmonton, Alberta, Canada, pp 115\u2013124","DOI":"10.1109\/ICSM.2009.5306334"},{"key":"331_CR67","doi-asserted-by":"crossref","unstructured":"Yang G, Khurshid S, Person S, Rungta N (2014) Property differencing for incremental checking. In: Proceedings of the 36th international conference on software engineering, ICSE 2014. ACM, New York, pp 1059\u20131070","DOI":"10.1145\/2568225.2568319"},{"issue":"1","key":"331_CR68","doi-asserted-by":"publisher","first-page":"3:1","DOI":"10.1145\/2629536","volume":"24","author":"G Yang","year":"2014","unstructured":"Yang G, Person S, Rungta N, Khurshid S (2014) Directed incremental symbolic execution. ACM Trans Softw Eng Methodol 24(1):3:1\u20133:42","journal-title":"ACM Trans Softw Eng Methodol"},{"key":"331_CR69","doi-asserted-by":"crossref","unstructured":"Yang G, P\u0103s\u0103reanu CS, Khurshid S (2012) Memoized symbolic execution. In: Proceedings of the 2012 international symposium on software testing and analysis, ISSTA 2012. ACM, New York, pp 144\u2013154","DOI":"10.1145\/2338965.2336771"}],"container-title":["Innovations in Systems and Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-019-00331-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11334-019-00331-9\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11334-019-00331-9.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,14]],"date-time":"2020-05-14T08:18:30Z","timestamp":1589444310000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11334-019-00331-9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,4,9]]},"references-count":69,"journal-issue":{"issue":"3-4","published-print":{"date-parts":[[2019,9]]}},"alternative-id":["331"],"URL":"https:\/\/doi.org\/10.1007\/s11334-019-00331-9","relation":{},"ISSN":["1614-5046","1614-5054"],"issn-type":[{"value":"1614-5046","type":"print"},{"value":"1614-5054","type":"electronic"}],"subject":[],"published":{"date-parts":[[2019,4,9]]},"assertion":[{"value":"2 October 2018","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"1 March 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 April 2019","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}