{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T12:28:20Z","timestamp":1742387300958},"reference-count":20,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1992,1,1]],"date-time":"1992-01-01T00:00:00Z","timestamp":694224000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information and Software Technology"],"published-print":{"date-parts":[[1992,1]]},"DOI":"10.1016\/0950-5849(92)90093-5","type":"journal-article","created":{"date-parts":[[2003,8,8]],"date-time":"2003-08-08T01:31:39Z","timestamp":1060306299000},"page":"43-56","source":"Crossref","is-referenced-by-count":40,"title":["Path analysis testing of concurrent programs"],"prefix":"10.1016","volume":"34","author":[{"given":"R-D","family":"Yang","sequence":"first","affiliation":[]},{"given":"C-G","family":"Chung","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"issue":"No 2","key":"10.1016\/0950-5849(92)90093-5_BIB1","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1109\/TSE.1975.6312836","article-title":"Toward a theory of test data selection","volume":"Vol 1","author":"Goodenough","year":"1975","journal-title":"IEEE Trans. Soft. Eng."},{"issue":"No 2","key":"10.1016\/0950-5849(92)90093-5_BIB2","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/TSE.1976.233816","article-title":"Reliability of the path analysis testing strategy","volume":"Vol 2","author":"Howden","year":"1976","journal-title":"IEEE Trans. Soft. Eng."},{"key":"10.1016\/0950-5849(92)90093-5_BIB3","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1002\/spe.4380160304","article-title":"A probe effect in concurrent programs","author":"Gait","year":"1986","journal-title":"Soft. Pract. Exper."},{"issue":"No 6","key":"10.1016\/0950-5849(92)90093-5_BIB4","doi-asserted-by":"crossref","first-page":"764","DOI":"10.1109\/TSE.1984.5010305","article-title":"Monitoring for deadlock and blocking in Ada tasking","volume":"Vol 10","author":"German","year":"1984","journal-title":"IEEE Trans. Soft. Eng."},{"key":"10.1016\/0950-5849(92)90093-5_BIB5","series-title":"Proc. Compsac 85","first-page":"310","article-title":"On testing concurrent programs","author":"Tai","year":"1985"},{"key":"10.1016\/0950-5849(92)90093-5_BIB6","series-title":"Proc. IEEE 2nd Int. Conf. Ada Applications and Environment","first-page":"69","article-title":"Reproducible testing of Ada tasking programs","author":"Tai","year":"1986"},{"key":"10.1016\/0950-5849(92)90093-5_BIB7","series-title":"Proc. Workshop on Software Testing","first-page":"164","article-title":"Structural testing of concurrent programs","author":"Taylor","year":"1986"},{"key":"10.1016\/0950-5849(92)90093-5_BIB8","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1002\/spe.4380030206","article-title":"Testing a multiprogramming system","volume":"Vol 3","author":"Brinch Hansen","year":"1973","journal-title":"Soft. Pract. Exper."},{"key":"10.1016\/0950-5849(92)90093-5_BIB9","doi-asserted-by":"crossref","first-page":"721","DOI":"10.1002\/spe.4380080607","article-title":"Reproducible testing of monitors","volume":"Vol 8","author":"Brinch Hansen","year":"1978","journal-title":"Soft. Pract. Exper."},{"key":"10.1016\/0950-5849(92)90093-5_BIB10","series-title":"Proc. SOFTFAIR II, Second Conf. Software Development Tools, Techniques, and Alternatives","first-page":"114","article-title":"Reproducible testing of concurrent Ada programs","author":"Tai","year":"1985"},{"key":"10.1016\/0950-5849(92)90093-5_BIB11","series-title":"Proc. IEEE 2nd Int. Conf. Ada Applications and Environments","article-title":"Reproducible testing of Ada tasking programs","author":"Tai","year":"1986"},{"issue":"No 5","key":"10.1016\/0950-5849(92)90093-5_BIB12","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1145\/69586.69587","article-title":"A general-purpose algorithm for analyzing concurrent programs","volume":"Vol 26","author":"Taylor","year":"1983","journal-title":"Commun. ACM"},{"key":"10.1016\/0950-5849(92)90093-5_BIB13","series-title":"Proc. 2nd Workshop on Software Testing","first-page":"106","article-title":"A formal framework for the study of concurrent program testing","author":"Weiss","year":"1988"},{"key":"10.1016\/0950-5849(92)90093-5_BIB14","series-title":"Proc. Int. Conf. Software Engineering and Knowledge Engineering","article-title":"Testing concurrent Ada programs with reproducible test cases","author":"Yang","year":"1989"},{"key":"10.1016\/0950-5849(92)90093-5_BIB15","series-title":"IEEE Software","first-page":"47","article-title":"Debugging Ada tasking programs","author":"Helmbold","year":"1985"},{"key":"10.1016\/0950-5849(92)90093-5_BIB16","series-title":"Proc. Workshop on Software Testing","first-page":"170","article-title":"Combining static concurrency analysis with symbolic execution","author":"Young","year":"1986"},{"key":"10.1016\/0950-5849(92)90093-5_BIB17","series-title":"Proc. 2nd Workshop on Software Testing","first-page":"114","article-title":"An experience with two symbolic execution-based approaches to formal verification of Ada tasking programs","author":"Dillon","year":"1988"},{"key":"10.1016\/0950-5849(92)90093-5_BIB18","doi-asserted-by":"crossref","DOI":"10.1109\/PCCC.1990.101652","article-title":"A path analysis approach to concurrent program testing","author":"Yang","year":"1990"},{"key":"10.1016\/0950-5849(92)90093-5_BIB19","article-title":"A static analyzer for validating concurrent Ada programs","author":"Hu","year":"1989"},{"key":"10.1016\/0950-5849(92)90093-5_BIB20","article-title":"An execution controller for concurrent Ada program with tracing and forcing functions","author":"Chia","year":"1989"}],"container-title":["Information and Software Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0950584992900935?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0950584992900935?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T04:26:27Z","timestamp":1552623987000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0950584992900935"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,1]]},"references-count":20,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1992,1]]}},"alternative-id":["0950584992900935"],"URL":"https:\/\/doi.org\/10.1016\/0950-5849(92)90093-5","relation":{},"ISSN":["0950-5849"],"issn-type":[{"value":"0950-5849","type":"print"}],"subject":[],"published":{"date-parts":[[1992,1]]}}}