{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T05:53:27Z","timestamp":1747806807121},"reference-count":37,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/issre.2013.6698900","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T12:09:09Z","timestamp":1389010149000},"page":"11-20","source":"Crossref","is-referenced-by-count":11,"title":["An empirical comparison of the fault-detection capabilities of internal oracles"],"prefix":"10.1109","author":[{"given":"Tingting","family":"Yu","sequence":"first","affiliation":[]},{"given":"Witawas","family":"Srisa-an","sequence":"additional","affiliation":[]},{"given":"Gregg","family":"Rothermel","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1147403.1147413"},{"key":"35","doi-asserted-by":"publisher","DOI":"10.1145\/1086228.1086282"},{"key":"17","article-title":"Recovering device drivers","author":"swift","year":"2004","journal-title":"OSDI"},{"key":"36","doi-asserted-by":"publisher","DOI":"10.1145\/1450058.1450087"},{"journal-title":"Applied Operating System Concepts","year":"2001","author":"silberschatz","key":"18"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1145\/1294261.1294272"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/1791194.1791203"},{"key":"34","article-title":"Deadlock immunity: Enabling systems to defend against deadlocks","author":"jula","year":"2008","journal-title":"OSDI"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065034"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542490"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1145\/781527.781528"},{"key":"37","article-title":"Dynamic test generation to find integer bugs in x86 binary Linux programs","author":"molnar","year":"2009","journal-title":"USS"},{"key":"11","article-title":"Inspect: A runtime model checker for multithreaded C programs","author":"yang","year":"2008","journal-title":"U of Utah Tech Rep"},{"journal-title":"Thread Analyzer","year":"2005","key":"12"},{"journal-title":"Linux Device Drivers","year":"2005","author":"corbet","key":"21"},{"key":"20","article-title":"Using runtime analysis to guide model checking of Java programs","author":"havelund","year":"2000","journal-title":"SPIN MCSV"},{"journal-title":"Web Page","article-title":"Deadlock in 3c59x driver","year":"0","key":"22"},{"key":"23","article-title":"Checking system rules using system-specific, programmer-written compiler extensions","author":"engler","year":"2000","journal-title":"OSDI"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985796"},{"key":"25","article-title":"CalFuzzer: An extensible active testing framework for concurrent programs","author":"joshi","year":"2009","journal-title":"CAV"},{"key":"26","doi-asserted-by":"publisher","DOI":"10.1145\/1808266.1808278"},{"key":"27","doi-asserted-by":"crossref","DOI":"10.1145\/1250734.1250738","article-title":"Automatically classifying benign and harmful data races using replay analysis","author":"narayanasamy","year":"2007","journal-title":"PLDI"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287654"},{"key":"29","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453137"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1145\/154183.154269"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/WST.1988.5353"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1145\/1346281.1346323"},{"journal-title":"Serial UART BUG TXEN Race Conditions","year":"0","author":"van lil","key":"1"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1145\/1542476.1542489"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.33"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985847"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1145\/1736020.1736041"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2003.1240304"},{"key":"31","article-title":"Visualizing potential deadlocks in multithreaded programs","author":"kim","year":"2009","journal-title":"PCT"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1109\/32.153381"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/IPDPS.2003.1213511"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/2151024.2151034"}],"event":{"name":"2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE)","start":{"date-parts":[[2013,11,4]]},"location":"Pasadena, CA, USA","end":{"date-parts":[[2013,11,7]]}},"container-title":["2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6689494\/6698873\/06698900.pdf?arnumber=6698900","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:23:08Z","timestamp":1498094588000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6698900\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":37,"URL":"https:\/\/doi.org\/10.1109\/issre.2013.6698900","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}