{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,29]],"date-time":"2024-10-29T12:49:50Z","timestamp":1730206190900,"version":"3.28.0"},"reference-count":68,"publisher":"IEEE","license":[{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2019,2,1]],"date-time":"2019-02-01T00:00:00Z","timestamp":1548979200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019,2]]},"DOI":"10.1109\/cgo.2019.8661178","type":"proceedings-article","created":{"date-parts":[[2019,3,7]],"date-time":"2019-03-07T19:01:46Z","timestamp":1551985306000},"page":"136-148","source":"Crossref","is-referenced-by-count":3,"title":["Generation of In-Bounds Inputs for Arrays in Memory-Unsafe Languages"],"prefix":"10.1109","author":[{"given":"Marcus","family":"Rodrigues","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Breno","family":"Guimaraes","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Fernando Magno Quintao","family":"Pereira","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1007\/s10766-015-0362-9"},{"key":"ref38","first-page":"859","article-title":"OpenACC: First experiences with real-world applications","author":"wienke","year":"2012","journal-title":"Euro-Par"},{"journal-title":"Program analysis and specialization for the C programming language","year":"1994","author":"andersen","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1007\/s10990-006-8609-1"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2009.04.004"},{"journal-title":"Principles of Program Analysis","year":"2005","author":"nielson","key":"ref30"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.3352"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250746"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/3126499"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/237721.237727"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/3210563.3210565"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.2003.1238018"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2010.14"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2180887.2180901"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/514191.514229"},{"key":"ref64","first-page":"32","article-title":"AutoMatch: An automated framework for relative performance estimation and workload distribution on heterogeneous HPC systems","author":"helal","year":"2017","journal-title":"IISWC"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1057387.1057388"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/1449764.1449790"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568273"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1109\/ICSAI.2014.7009435"},{"journal-title":"xUnit Test Patterns Refactoring Test Code","year":"2007","author":"meszaros","key":"ref68"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/154766.155580"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190234"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2009.9"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250767"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814285"},{"key":"ref23","doi-asserted-by":"crossref","first-page":"29","DOI":"10.1145\/3158117","article-title":"Inference of static semantics for incomplete C programs","volume":"2","author":"melo","year":"2018","journal-title":"Proc ACM Program Lang"},{"key":"ref26","first-page":"791","article-title":"Validation of memory accesses through symbolic analyses","author":"nazar\u00e9","year":"2014","journal-title":"OOPSLA"},{"key":"ref25","first-page":"357","article-title":"Symbolic range propagation","author":"blume","year":"1994","journal-title":"IPPS"},{"journal-title":"Software Testing in the Real World Improving the Process","year":"1995","author":"kit","key":"ref50"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100093"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227197"},{"key":"ref57","first-page":"296","article-title":"PerfBlower: Quickly detecting memory-related performance problems via amplification","volume":"37","author":"fang","year":"2015","journal-title":"ECOOP"},{"key":"ref56","doi-asserted-by":"crossref","first-page":"369","DOI":"10.1145\/2737924.2737966","article-title":"Static detection of asymptotic performance bugs in collection traversals","author":"olivo","year":"2015","journal-title":"PLDI"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606602"},{"key":"ref54","first-page":"413","article-title":"Efficient flow profiling for detecting performance bugs","author":"mudduluru","year":"2016","journal-title":"ISSTA"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254075"},{"key":"ref52","first-page":"94","article-title":"Sapienz: Multi-objective automated testing for android applications","author":"mao","year":"2016","journal-title":"ISSTA"},{"key":"ref10","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1145\/2090147.2094081","article-title":"SAGE: Whitebox fuzzing for security testing","volume":"10","author":"godefroid","year":"2012","journal-title":"Queue"},{"key":"ref11","first-page":"28","article-title":"Address-Sanitizer: A fast address sanity checker","author":"serebryany","year":"2012","journal-title":"USENIX"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/DSD.2011.62"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2011.5764689"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2983574"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254076"},{"key":"ref15","first-page":"1","article-title":"Just-in-time value specialization","author":"santos","year":"2013","journal-title":"CGO"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-61736-1_44"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/PACT.1998.727179"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/S0049-237X(09)70565-8"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.2307\/2118559"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1145\/503272.503286"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349342"},{"key":"ref6","first-page":"209","article-title":"KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs","author":"cadar","year":"2008","journal-title":"OSDI"},{"journal-title":"Large-Scale C++ Software Design","year":"1996","author":"lakos","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2012.03.009"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"ref49","first-page":"21","article-title":"A survey on automatic test data generation","author":"edvardsson","year":"1999","journal-title":"Compsec"},{"key":"ref9","first-page":"520","article-title":"Dependent types for low-level programming","author":"condit","year":"2007","journal-title":"ESOP"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.294"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"journal-title":"Experiences of Test Automation Case Studies of Software Test Automation","year":"2012","author":"graham","key":"ref48"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.06.009"},{"key":"ref42","first-page":"13","article-title":"DawnCC: Automatic annotation for data parallelism and offloading","volume":"14","author":"mendon\u00e7a","year":"2017","journal-title":"Trans Archit Code Optim"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993516"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.02.061"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3020266"}],"event":{"name":"2019 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)","start":{"date-parts":[[2019,2,16]]},"location":"Washington, DC, USA","end":{"date-parts":[[2019,2,20]]}},"container-title":["2019 IEEE\/ACM International Symposium on Code Generation and Optimization (CGO)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/8653576\/8661160\/08661178.pdf?arnumber=8661178","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,19]],"date-time":"2022-07-19T16:17:40Z","timestamp":1658247460000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8661178\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2]]},"references-count":68,"URL":"https:\/\/doi.org\/10.1109\/cgo.2019.8661178","relation":{},"subject":[],"published":{"date-parts":[[2019,2]]}}}