{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T17:28:30Z","timestamp":1729618110208,"version":"3.28.0"},"reference-count":25,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,6]]},"DOI":"10.1109\/iccitechnol.2012.6285773","type":"proceedings-article","created":{"date-parts":[[2012,8,30]],"date-time":"2012-08-30T16:57:57Z","timestamp":1346345877000},"page":"118-123","source":"Crossref","is-referenced-by-count":1,"title":["Path coverage testing in the cloud"],"prefix":"10.1109","author":[{"given":"Nassima","family":"Aleb","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Samir","family":"Kechid","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"263","reference":[{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2000.873645"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390635"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.69"},{"key":"ref14","doi-asserted-by":"crossref","DOI":"10.1007\/11817963_38","article-title":"CUTE and jCUTE: Concolic unit testing and explicit path model-checking tools","author":"sen","year":"2006","journal-title":"Computer Aided Verification"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831732"},{"key":"ref16","article-title":"Distributed parallel symbolic execution","author":"king","year":"2009","journal-title":"Tech Rep"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTE.2010.5608866"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966463"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.26"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-10452-7_17"},{"key":"ref3","article-title":"Automated whitebox fuzz testing","author":"godefroid","year":"2008","journal-title":"Network and Distributed Systems Security"},{"article-title":"A discipline of programming","year":"1976","author":"diikstra","key":"ref6"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025180"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"ref7","doi-asserted-by":"crossref","first-page":"339","DOI":"10.1007\/s10009-009-0118-1","article-title":"A survey of new trends in symbolic execution for software testing and analysis","volume":"11","author":"pasareanu","year":"2009","journal-title":"Journal on Software Tools for Technology transfer"},{"key":"ref2","article-title":"Parameterized unit tests","author":"tillmann","year":"0","journal-title":"European Software Engineering Conference\/Foundations of Software Engineering"},{"key":"ref9","article-title":"jFuzz: A concolic whitebox fuzzer for Java","author":"jayaraman","year":"0","journal-title":"Proceedings of the Nasa Formal Methods Symposium"},{"key":"ref1","article-title":"CUTE: A concolic unit testing engine for C","author":"sen","year":"0","journal-title":"European Software Engineering Conference\/Foundations of Software Engineering"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-24443-8_21"},{"key":"ref22","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-540-78800-3_24","article-title":"Z3: An efficient SMT solver","author":"moura","year":"2008","journal-title":"Tools and Algorithms for the Construction and Analysis of Systems"},{"key":"ref21","article-title":"Distributed Concolic algorithm of the SCORE framework","author":"kim","year":"2011","journal-title":"KAIST Technical Report"},{"journal-title":"National Security Agency (NSA)","article-title":"FIPS 180&#x2013;3: Secure hash standard (SHS)","year":"2008","key":"ref24"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1994.296778"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.2307\/3001968"}],"event":{"name":"2012 International Conference on Communications and Information Technology (ICCIT)","start":{"date-parts":[[2012,6,26]]},"location":"Hammamet, Tunisia","end":{"date-parts":[[2012,6,28]]}},"container-title":["2012 International Conference on Communications and Information Technology (ICCIT)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6269207\/6285764\/06285773.pdf?arnumber=6285773","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,3]],"date-time":"2019-07-03T03:31:13Z","timestamp":1562124673000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6285773\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,6]]},"references-count":25,"URL":"https:\/\/doi.org\/10.1109\/iccitechnol.2012.6285773","relation":{},"subject":[],"published":{"date-parts":[[2012,6]]}}}