{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T09:12:02Z","timestamp":1761988322292,"version":"3.28.0"},"reference-count":18,"publisher":"Institution of Engineering and Technology (IET)","issue":"5","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET Softw."],"published-print":{"date-parts":[[2010,10,7]]},"DOI":"10.1049\/iet-sen.2009.0092","type":"journal-article","created":{"date-parts":[[2010,9,23]],"date-time":"2010-09-23T23:23:04Z","timestamp":1285284184000},"page":"361-370","source":"Crossref","is-referenced-by-count":27,"title":["Automatic detection of infeasible paths in software testing"],"prefix":"10.1049","volume":"4","author":[{"given":"D.","family":"Gong","sequence":"first","affiliation":[{"name":"School of Information and Electrical Engineering, China University of Mining and Technology, Xuzhou, Jiangsu 221116, People's Republic of China"}]},{"given":"X.","family":"Yao","sequence":"additional","affiliation":[{"name":"School of Information and Electrical Engineering, China University of Mining and Technology, Xuzhou, Jiangsu 221116, People's Republic of China"}]}],"member":"265","reference":[{"key":"10.1049\/iet-sen.2009.0092_r1","unstructured":"Beizer, B.: \u2018Software testing techniques\u2019, (International Thomson Computer Press 1990)"},{"key":"10.1049\/iet-sen.2009.0092_r2","first-page":"134","volume":"41","author":"Shan","year":"2005"},{"key":"10.1049\/iet-sen.2009.0092_r3","first-page":"28","author":"Hedley","year":"1985","journal-title":"Proc. Eighth Int. Conf. on Software Engineering"},{"key":"10.1049\/iet-sen.2009.0092_r4","first-page":"139","volume":"11","author":"Zhang","year":"2001"},{"key":"10.1049\/iet-sen.2009.0092_r5","first-page":"53","volume":"33","author":"Coward","year":"1991"},{"key":"10.1049\/iet-sen.2009.0092_r6","first-page":"378","author":"Forgacs","year":"1997","journal-title":"Proc. Sixth Eur. Software Engineering Conf. and Fifth ACM SIGSOFT Symp. on the Foundations of Software Engineering"},{"key":"10.1049\/iet-sen.2009.0092_r7","first-page":"199","volume":"47","author":"Sittisak","year":"2005"},{"key":"10.1049\/iet-sen.2009.0092_r8","first-page":"361","author":"Bodik","year":"1997","journal-title":"Proc. Sixth Eur. Softw. Eng. Conf. and Fifth ACM SIGSOFT Symp. on the Foundations of Software Engineering"},{"key":"10.1049\/iet-sen.2009.0092_r9","first-page":"69","volume":"28","author":"Antonella","year":"2004"},{"key":"10.1049\/iet-sen.2009.0092_r10","first-page":"137","volume":"255","author":"Bahman","year":"2009"},{"key":"10.1049\/iet-sen.2009.0092_r11","first-page":"40","author":"Chen","year":"2005","journal-title":"Proc. Fifth Int. Workshop on Worst-Case Execution Time Analysis"},{"key":"10.1049\/iet-sen.2009.0092_r12","first-page":"435","volume":"37","author":"Malevris","year":"1995"},{"key":"10.1049\/iet-sen.2009.0092_r13","first-page":"115","volume":"32","author":"Malevris","year":"1990"},{"key":"10.1049\/iet-sen.2009.0092_r14","first-page":"641","volume":"50","author":"Ngo","year":"2008"},{"key":"10.1049\/iet-sen.2009.0092_r15","first-page":"691","volume":"12","author":"Bueno","year":"2002"},{"key":"10.1049\/iet-sen.2009.0092_r16","first-page":"209","author":"Bueno","year":"2000","journal-title":"Proc. 15th IEEE Int. Automated Software Engineering Conf."},{"key":"10.1049\/iet-sen.2009.0092_r17","doi-asserted-by":"crossref","unstructured":"Balakrishnan, G., Sankaranarayanan, S., Ivanc\u0306ic\u0301, F., Wei, O., and Gupta, A.: \u2018SLR: path-sensitive analysis through infeasible-path detection and syntactic language refinement\u2019, (LNCS,5079), 2008 p. 238\u2013254","DOI":"10.1007\/978-3-540-69166-2_16"},{"key":"10.1049\/iet-sen.2009.0092_r18","unstructured":"SIR: \u2018A repository of software-related artifacts meant to support rigorous controlled experimentation\u2019, Available at: http:\/\/sir.unl.edu\/portal\/index.html"}],"container-title":["IET Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/digital-library.theiet.org\/content\/journals\/10.1049\/iet-sen.2009.0092?crawler=true&mimetype=application\/pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,11,12]],"date-time":"2024-11-12T18:14:38Z","timestamp":1731435278000},"score":1,"resource":{"primary":{"URL":"http:\/\/digital-library.theiet.org\/doi\/10.1049\/iet-sen.2009.0092"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,10,7]]},"references-count":18,"journal-issue":{"issue":"5","published-print":{"date-parts":[[2010,10,7]]}},"alternative-id":["10.1049\/iet-sen.2009.0092"],"URL":"https:\/\/doi.org\/10.1049\/iet-sen.2009.0092","relation":{},"ISSN":["1751-8806","1751-8814"],"issn-type":[{"type":"print","value":"1751-8806"},{"type":"electronic","value":"1751-8814"}],"subject":[],"published":{"date-parts":[[2010,10,7]]}}}