{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T06:05:17Z","timestamp":1729663517057,"version":"3.28.0"},"reference-count":17,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,11]]},"DOI":"10.1109\/icsai.2014.7009435","type":"proceedings-article","created":{"date-parts":[[2015,1,19]],"date-time":"2015-01-19T21:37:49Z","timestamp":1421703469000},"page":"1022-1026","source":"Crossref","is-referenced-by-count":1,"title":["A method of function modeling in accurate stub generation"],"prefix":"10.1109","author":[{"given":"Chi","family":"Yao","sequence":"first","affiliation":[]},{"given":"Ya-wen","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Feng","family":"Li","sequence":"additional","affiliation":[]},{"given":"Yun-zhan","family":"Gong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"17","first-page":"3353","article-title":"Based on environmental issues mixed input interaction [J]","year":"2013","journal-title":"Application Research of Computers"},{"key":"15","article-title":"Interval arithmetic in software testing","volume":"9","author":"zhiyan","year":"1998","journal-title":"[J] Journal of Software"},{"year":"0","author":"yan","key":"16"},{"key":"13","first-page":"155","article-title":"Automated detection method for c program memory access flaws[j]","volume":"37","author":"yan","year":"2010","journal-title":"Computer Science"},{"key":"14","first-page":"182","article-title":"Unit testing research and application based symbolic execution","volume":"29","author":"huijuan","year":"2012","journal-title":"Applied Soft Computing [J]"},{"key":"11","first-page":"109","volume":"32","author":"jinhui","year":"2004","journal-title":"Automatic Path-oriented Test Data Generation Method Commentary [J] Journal of Electronics"},{"key":"12","article-title":"Research symbolic execution. [J]","author":"jinbin","year":"2009","journal-title":"National Computer Security Symposium"},{"key":"3","first-page":"132","author":"lin","year":"2011","journal-title":"Lazy Symbolic Execution for Test Data Generation[J]"},{"key":"2","first-page":"213","article-title":"DART: Directed automated random testing[C]\/\/ACM Sigplan Notices","author":"godefroid","year":"2005","journal-title":"ACM"},{"key":"1","article-title":"CUTE: A concolic unit testing engine for C[M]","author":"sen","year":"2005","journal-title":"ACM"},{"key":"10","first-page":"262","volume":"24","author":"feiyu","year":"2012","journal-title":"Automatically Generated Based on the Type of Memory Modeling of Complex Structures of Test Data [J] Computer-aided Design and Computer Graphics"},{"year":"2010","journal-title":"Fan Wenqing Segmented Symbolic Execution Model and Its Environment Interact Research [D] Beijing University of Posts and Telecommunications","key":"7"},{"key":"6","first-page":"1066","article-title":"Symbolic execution for software testing in practice: Preliminary assessment[c]\/\/proceedings of the 33rd international conference on software engineering","author":"cadar","year":"2011","journal-title":"ACM"},{"key":"5","doi-asserted-by":"crossref","first-page":"10","DOI":"10.1145\/1455518.1455522","article-title":"EXE: Automatically generating inputs of death[J]","volume":"12","author":"cadar","year":"2008","journal-title":"ACM Transactions on Information and System Security (TISSEC)"},{"doi-asserted-by":"publisher","key":"4","DOI":"10.1145\/2408776.2408795"},{"key":"9","first-page":"156","article-title":"Unit testing the underlying simulation technology [J]","author":"wang tong","year":"2012","journal-title":"Computer Systems & Applications"},{"key":"8","first-page":"687","article-title":"Lazy to replace C symbolic execution [J]","author":"mengxiang","year":"2009","journal-title":"Beijing University of Aeronautics and Astronautics Journal"}],"event":{"name":"2014 2nd International Conference on Systems and Informatics (ICSAI)","start":{"date-parts":[[2014,11,15]]},"location":"Shanghai, China","end":{"date-parts":[[2014,11,17]]}},"container-title":["The 2014 2nd International Conference on Systems and Informatics (ICSAI 2014)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6994954\/7009247\/07009435.pdf?arnumber=7009435","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T23:54:37Z","timestamp":1498175677000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7009435\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,11]]},"references-count":17,"URL":"https:\/\/doi.org\/10.1109\/icsai.2014.7009435","relation":{},"subject":[],"published":{"date-parts":[[2014,11]]}}}