{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:53:33Z","timestamp":1760586813414},"reference-count":38,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2016,10,13]],"date-time":"2016-10-13T00:00:00Z","timestamp":1476316800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Sci. China Inf. Sci."],"published-print":{"date-parts":[[2017,1]]},"DOI":"10.1007\/s11432-015-0450-5","type":"journal-article","created":{"date-parts":[[2016,10,18]],"date-time":"2016-10-18T10:14:14Z","timestamp":1476785654000},"update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":10,"title":["An empirical study on constraint optimization techniques for test generation"],"prefix":"10.1007","volume":"60","author":[{"given":"Zhiyi","family":"Zhang","sequence":"first","affiliation":[]},{"given":"Zhenyu","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Ruizhi","family":"Gao","sequence":"additional","affiliation":[]},{"given":"Eric","family":"Wong","sequence":"additional","affiliation":[]},{"given":"Baowen","family":"Xu","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,13]]},"reference":[{"key":"450_CR1","volume-title":"Software Testing Techniques","author":"B Beizer","year":"1990","unstructured":"Beizer B. Software Testing Techniques. 2nd ed. New York: International Thomson Computer Press, 1990"},{"key":"450_CR2","doi-asserted-by":"crossref","first-page":"2826","DOI":"10.1007\/s11432-012-4746-9","volume":"55","author":"C R Fang","year":"2012","unstructured":"Fang C R, Chen Z Y, Xu B W. Comparing logic coverage criteria on test case prioritization. Sci China Inf Sci, 2012, 55: 2826\u20132840","journal-title":"Sci China Inf Sci"},{"key":"450_CR3","doi-asserted-by":"crossref","first-page":"633","DOI":"10.1142\/S0218194015300018","volume":"25","author":"R Yang","year":"2015","unstructured":"Yang R, Chen Z Y, Zhang Z Y, et al. Efsm-based test case generation: sequence, data, and oracle. Int J Softw Eng Knowl Eng, 2015, 25: 633\u2013667","journal-title":"Int J Softw Eng Knowl Eng"},{"key":"450_CR4","doi-asserted-by":"crossref","first-page":"117","DOI":"10.1145\/2593882.2593885","volume-title":"Proceedings of the IEEE International Conference on Future of Software Engineering (ICSE)","author":"A Orso","year":"2014","unstructured":"Orso A, Rothermel G. Software testing: a research travelogue (2000\u20132014). In: Proceedings of the IEEE International Conference on Future of Software Engineering (ICSE). New York: ACM, 2014. 117\u2013132"},{"key":"450_CR5","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1145\/360248.360252","volume":"19","author":"J C King","year":"1976","unstructured":"King J C. Symbolic execution and program testing. Commun ACM, 1976, 19: 385\u2013394","journal-title":"Commun ACM"},{"key":"450_CR6","doi-asserted-by":"crossref","first-page":"1758","DOI":"10.1016\/j.future.2012.02.006","volume":"29","author":"T Chen","year":"2013","unstructured":"Chen T, Zhang X-S, Guo S-Z, et al. State of the art: dynamic symbolic execution for automated test generation. Future Gener Comput Syst, 2013, 29: 1758\u20131773","journal-title":"Future Gener Comput Syst"},{"key":"450_CR7","doi-asserted-by":"crossref","first-page":"1978","DOI":"10.1016\/j.jss.2013.02.061","volume":"86","author":"S Anand","year":"2013","unstructured":"Anand S, Burke E K, Chen T Y, et al. An orchestrated survey of methodologies for automated software test case generation. J Syst Softw, 2013, 86: 1978\u20132001","journal-title":"J Syst Softw"},{"key":"450_CR8","first-page":"209","volume-title":"Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation. Berkeley: USENIX Association","author":"C Cadar","year":"2008","unstructured":"Cadar C, Dunbar D, Engler D R. KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs. In: Proceedings of the 8th USENIX Conference on Operating Systems Design and Implementation. Berkeley: USENIX Association, 2008. 209\u2013224"},{"key":"450_CR9","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1455518.1455522","volume":"12","author":"C Cadar","year":"2008","unstructured":"Cadar C, Ganesh V, Pawlowski P M, et al. Exe: automatically generating inputs of death. ACM Trans Inf Syst Secur, 2008, 12: 10","journal-title":"ACM Trans Inf Syst Secur"},{"key":"450_CR10","first-page":"213","volume":"40","author":"P Godefroid","year":"2005","unstructured":"Godefroid P, Klarlund N, Sen K. Dart: directed automated random testing. In: Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation. New York: ACM, 2005. 40: 213\u2013223","journal-title":"Proceedings of the ACM SIGPLAN Conference on Programming Language Design and Implementation. New York: ACM"},{"key":"450_CR11","doi-asserted-by":"crossref","first-page":"263","DOI":"10.1145\/1081706.1081750","volume-title":"Proceedings of the 10th European Software Engineering Conference Held Jointly With 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering","author":"K Sen","year":"2005","unstructured":"Sen K, Marinov D, Agha G. CUTE: a concolic unit testing engine for C. In: Proceedings of the 10th European Software Engineering Conference Held Jointly With 13th ACM SIGSOFT International Symposium on Foundations of Software Engineering. New York: ACM, 2005. 263\u2013272"},{"key":"450_CR12","doi-asserted-by":"crossref","first-page":"373","DOI":"10.1007\/s10817-006-9026-1","volume":"35","author":"C Barrett","year":"2005","unstructured":"Barrett C, de Moura L, Stump A. Design and results of the first satisfiability modulo theories competition (smt-comp 2005). J Autom Reasoning, 2005, 35: 373\u2013390","journal-title":"J Autom Reasoning"},{"key":"450_CR13","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1007\/BF02739235","volume":"5","author":"K Schittkowski","year":"1986","unstructured":"Schittkowski K. NLPQL: a fortran subroutine solving constrained nonlinear programming problems. Ann Oper Res, 1986, 5: 485\u2013500","journal-title":"Ann Oper Res"},{"key":"450_CR14","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1007\/11537328_2","volume-title":"Model Checking Software. Berlin: Springer","author":"C Cadar","year":"2005","unstructured":"Cadar C, Engler D. Execution generated test cases: how to make systems code crash itself. In: Model Checking Software. Berlin: Springer, 2005. 2\u201323"},{"key":"450_CR15","first-page":"151","volume":"8","author":"P Godefroid","year":"2008","unstructured":"Godefroid P, Levin M Y, Molnar D A, et al. Automated whitebox fuzz testing. In: Proceedings of the Network and Distributed System Security Symposium, San Diego, 2008. 8: 151\u2013166","journal-title":"Proceedings of the Network and Distributed System Security Symposium, San Diego"},{"key":"450_CR16","first-page":"15","volume-title":"Proceedings of IEEE Symposium on Security and Privacy, Berkeley\/Oakland","author":"D Brumley","year":"2006","unstructured":"Brumley D, Newsome J, Song D, et al. Towards automatic generation of vulnerability-based signatures. In: Proceedings of IEEE Symposium on Security and Privacy, Berkeley\/Oakland, 2006. 15\u201316"},{"key":"450_CR17","doi-asserted-by":"crossref","first-page":"224","DOI":"10.1109\/TDSC.2008.55","volume":"5","author":"D Brumley","year":"2008","unstructured":"Brumley D, Newsome J, Song D, et al. Theory and techniques for automatic generation of vulnerability-based signatures. IEEE Trans Depend Secure Comput, 2008, 5: 224\u2013241","journal-title":"IEEE Trans Depend Secure Comput"},{"key":"450_CR18","doi-asserted-by":"crossref","first-page":"311","DOI":"10.1109\/CSF.2007.17","volume-title":"Proceedings of the 20th IEEE Computer Security Foundations Symposium, Venice","author":"D Brumley","year":"2007","unstructured":"Brumley D, Wang H, Jha S, et al. Creating vulnerability signatures using weakest preconditions. In: Proceedings of the 20th IEEE Computer Security Foundations Symposium, Venice, 2007. 311\u2013325"},{"key":"450_CR19","doi-asserted-by":"crossref","first-page":"213","DOI":"10.1145\/1102120.1102150","volume-title":"Proceedings of the 12th ACM Conference on Computer and Communications Security","author":"Z K Liang","year":"2005","unstructured":"Liang Z K, Sekar R. Fast and automated generation of attack signatures: a basis for building self-protecting servers. In: Proceedings of the 12th ACM Conference on Computer and Communications Security. New York: ACM, 2005. 213\u2013222"},{"key":"450_CR20","first-page":"58","volume-title":"Proceedings of the Network and Distributed System Security Symposium, San Diego","author":"J Newsome","year":"2006","unstructured":"Newsome J, Brumley D, Song D. Vulnerability-specific execution filtering for exploit prevention on commodity software. In: Proceedings of the Network and Distributed System Security Symposium, San Diego, 2006. 58\u201371"},{"key":"450_CR21","volume-title":"Bitscope: Automatically Dissecting Malicious Binaries","author":"D Brumley","year":"2007","unstructured":"Brumley D, Hartwig C, Kang M G, et al. Bitscope: Automatically Dissecting Malicious Binaries. School of Computer Science, Carnegie Mellon University, Technology Report CMU-CS-07-133. 2007"},{"key":"450_CR22","doi-asserted-by":"crossref","first-page":"65","DOI":"10.1007\/978-0-387-68768-1_4","volume-title":"Botnet Detection. Berlin: Springer","author":"D Brumley","year":"2008","unstructured":"Brumley D, Hartwig C, Liang Z K, et al. Automatically identifying trigger-based behavior in malware. In: Botnet Detection. Berlin: Springer, 2008. 65\u201388"},{"key":"450_CR23","first-page":"231","volume-title":"Proceedings of IEEE Symposium on Security and Privacy, Berkeley","author":"A Moser","year":"2007","unstructured":"Moser A, Kruegel C, Kirda E. Exploring multiple execution paths for malware analysis. In: Proceedings of IEEE Symposium on Security and Privacy, Berkeley, 2007. 231\u2013245"},{"key":"450_CR24","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-540-89862-7_1","volume-title":"Information Systems Security. Berlin: Springer","author":"D Song","year":"2008","unstructured":"Song D, Brumley D, Yin H, et al. Bitblaze: a new approach to computer security via binary analysis. In: Information Systems Security. Berlin: Springer, 2008. 1\u201325"},{"key":"450_CR25","first-page":"245","volume-title":"Proceedings of IEEE International Conference on Computer Design: VLSI in Computers and Processors, Cambridge","author":"A K Chandra","year":"1992","unstructured":"Chandra A K, Iyengar V S. Constraint solving for test case generation: a technique for high-level design verification. In: Proceedings of IEEE International Conference on Computer Design: VLSI in Computers and Processors, Cambridge, 1992. 245\u2013248"},{"key":"450_CR26","doi-asserted-by":"crossref","first-page":"900","DOI":"10.1109\/32.92910","volume":"17","author":"R A Milli De","year":"1991","unstructured":"De Milli R A, Offutt A J. Constraint-based automatic test data generation. IEEE Trans Softw Eng, 1991, 17: 900\u2013910","journal-title":"IEEE Trans Softw Eng"},{"key":"450_CR27","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1145\/271775.271790","volume":"23","author":"A Gotlieb","year":"1998","unstructured":"Gotlieb A, Botella B, Rueher M. Automatic test data generation using constraint solving techniques. ACM SIGSOFT Softw Eng Notes, 1998, 23: 53\u201362","journal-title":"ACM SIGSOFT Softw Eng Notes"},{"key":"450_CR28","doi-asserted-by":"crossref","first-page":"85","DOI":"10.1016\/0166-218X(84)90081-7","volume":"8","author":"C A Tovey","year":"1984","unstructured":"Tovey C A. A simplified np-complete satisfiability problem. Discrete Appl Math, 1984, 8: 85\u201389","journal-title":"Discrete Appl Math"},{"key":"450_CR29","doi-asserted-by":"crossref","first-page":"519","DOI":"10.1007\/978-3-540-73368-3_52","volume-title":"Computer Aided Verification. Berlin: Springer","author":"V Ganesh","year":"2007","unstructured":"Ganesh V, Dill D L. A decision procedure for bit-vectors and arrays. In: Computer Aided Verification. Berlin: Springer, 2007. 519\u2013531"},{"key":"450_CR30","doi-asserted-by":"crossref","first-page":"337","DOI":"10.1007\/978-3-540-78800-3_24","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems. Berlin: Springer","author":"L Moura de","year":"2008","unstructured":"de Moura L, Bj\u00f8rner N. Z3: an efficient smt solver. In: Tools and Algorithms for the Construction and Analysis of Systems. Berlin: Springer, 2008. 337\u2013340"},{"key":"450_CR31","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1007\/978-3-540-73368-3_34","volume-title":"Computer Aided Verification. Berlin: Springer","author":"C Barrett","year":"2007","unstructured":"Barrett C, Tinelli C. Cvc3. In: Computer Aided Verification. Berlin: Springer, 2007. 298\u2013302"},{"key":"450_CR32","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/978-3-642-39799-8_3","volume-title":"Computer Aided Verification. Berlin: Springer","author":"H Palikareva","year":"2013","unstructured":"Palikareva H, Cadar C. Multi-solver support in symbolic execution. In: Computer Aided Verification. Berlin: Springer, 2013. 53\u201368"},{"key":"450_CR33","doi-asserted-by":"crossref","first-page":"98","DOI":"10.1109\/2.312055","volume":"27","author":"C Jones","year":"1994","unstructured":"Jones C. Software metrics: good, bad and missing. Computer, 1994, 27: 98\u2013100","journal-title":"Computer"},{"key":"450_CR34","doi-asserted-by":"crossref","first-page":"30","DOI":"10.1049\/sej.1988.0003","volume":"3","author":"M Shepperd","year":"1988","unstructured":"Shepperd M. A critique of cyclomatic complexity as a software metric. Softw Eng J, 1988, 3: 30\u201336","journal-title":"Softw Eng J"},{"key":"450_CR35","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1145\/226155.226158","volume":"5","author":"R Ferguson","year":"1996","unstructured":"Ferguson R, Korel B. The chaining approach for software test data generation. ACM Trans Softw Eng Meth, 1996, 5: 63\u201386","journal-title":"ACM Trans Softw Eng Meth"},{"key":"450_CR36","doi-asserted-by":"crossref","first-page":"195","DOI":"10.1145\/226295.226317","volume":"21","author":"A J Offutt","year":"1996","unstructured":"Offutt A J, Hayes J H. A semantic model of program faults. ACM SIGSOFT Soft Eng Notes, 1996, 21: 195\u2013200","journal-title":"ACM SIGSOFT Soft Eng Notes"},{"key":"450_CR37","doi-asserted-by":"crossref","first-page":"174","DOI":"10.1007\/978-3-642-00768-2_16","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems. Berlin: Springer","author":"R Brummayer","year":"2009","unstructured":"Brummayer R, Biere A. Boolector: an efficient smt solver for bit-vectors and arrays. In: Tools and Algorithms for the Construction and Analysis of Systems. Berlin: Springer, 2009. 174\u2013177"},{"key":"450_CR38","first-page":"310","volume-title":"Proceedings of IEEE 4th International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Berlin","author":"I Erete","year":"2011","unstructured":"Erete I, Orso A. Optimizing constraint solving to better support symbolic execution. In: Proceedings of IEEE 4th International Conference on Software Testing, Verification and Validation Workshops (ICSTW), Berlin, 2011. 310\u2013315"}],"container-title":["Science China Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-0450-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11432-015-0450-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11432-015-0450-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,10]],"date-time":"2022-07-10T16:07:15Z","timestamp":1657469235000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11432-015-0450-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,13]]},"references-count":38,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2017,1]]}},"alternative-id":["450"],"URL":"https:\/\/doi.org\/10.1007\/s11432-015-0450-5","relation":{},"ISSN":["1674-733X","1869-1919"],"issn-type":[{"value":"1674-733X","type":"print"},{"value":"1869-1919","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,10,13]]},"article-number":"012105"}}