{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,23]],"date-time":"2024-10-23T10:18:41Z","timestamp":1729678721401,"version":"3.28.0"},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1109\/rtas.2014.6926000","type":"proceedings-article","created":{"date-parts":[[2015,1,21]],"date-time":"2015-01-21T19:35:37Z","timestamp":1421868937000},"page":"169-178","source":"Crossref","is-referenced-by-count":17,"title":["Trickle: Automated infeasible path detection using all minimal unsatisfiable subsets"],"prefix":"10.1109","author":[{"given":"Bernard","family":"Blackham","sequence":"first","affiliation":[]},{"given":"Mark","family":"Liffiton","sequence":"additional","affiliation":[]},{"given":"Gernot","family":"Heiser","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref10","first-page":"174","article-title":"Discovery of minimal unsatisable subsets of constraints using hitting set dualization","volume":"3","author":"bailey","year":"2005","journal-title":"7th PADL"},{"key":"ref11","article-title":"The Yices SMT solver","volume":"4","author":"dutertre","year":"2006","journal-title":"SRI International"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/115372.115320"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27940-9_21"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.2000.896006"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(74)80049-8"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/RTSS.2011.38"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2168836.2168869"},{"key":"ref18","doi-asserted-by":"crossref","first-page":"641","DOI":"10.1016\/j.infsof.2007.06.006","article-title":"Heuristics-based infeasible path detection for dynamic test data generation","volume":"50","author":"ngo","year":"2008","journal-title":"Information and Software Technology"},{"key":"ref19","first-page":"316","article-title":"SMT-based false positive elimination in static program analysis","volume":"8 9","author":"huuck","year":"0","journal-title":"Conference Paper"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-007-9084-z"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1145\/2429069.2429085"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2013.6531083"},{"key":"ref27","doi-asserted-by":"crossref","first-page":"505","DOI":"10.1007\/s10009-007-0044-z","article-title":"The software model checker BLAST: Applications to software engineering","volume":"9","author":"beyer","year":"2007","journal-title":"Int J Softw Tools for Technology Transfer"},{"key":"ref6","first-page":"137","article-title":"The M&#x00E4;lardalen WCET benchmarks - past, present and future","volume":"1 8","author":"gustafsson","year":"2010","journal-title":"7th WS Worst-Case Execution-Time Analysis"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/1629575.1629596"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2007.01.014"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1347375.1347389"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1016\/j.scico.2007.01.015"},{"key":"ref9","first-page":"221","article-title":"Boosting minimal unsatisfiable core extraction","volume":"3","author":"nadel","year":"2010","journal-title":"FMCAD 2010"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.1995.495219"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-63531-9_25"},{"key":"ref22","article-title":"Algorithms for infeasible path calculation","volume":"9","author":"gustafsson","year":"2006","journal-title":"6th Workshop on Worst-Case Execution Time Analysis"},{"key":"ref21","first-page":"358","article-title":"Efficient detection and exploitation of infeasible paths for software timing analysis","volume":"8","author":"suhendra","year":"2006","journal-title":"43rd DAC"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ACSD.2011.15"},{"key":"ref23","first-page":"469","article-title":"Reliable and precise WCET determination for a real-life processor","volume":"9","author":"ferdinand","year":"2001","journal-title":"1st EMS OFT"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/876638.876643"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2013.6531082"}],"event":{"name":"2014 IEEE Real-Time and Embedded Technology and Applications Symposium (RTAS)","start":{"date-parts":[[2014,4,15]]},"location":"Berlin, Germany","end":{"date-parts":[[2014,4,17]]}},"container-title":["2014 IEEE 19th Real-Time and Embedded Technology and Applications Symposium (RTAS)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6917167\/6925980\/06926000.pdf?arnumber=6926000","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,23]],"date-time":"2017-06-23T04:03:27Z","timestamp":1498190607000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6926000\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,4]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/rtas.2014.6926000","relation":{},"subject":[],"published":{"date-parts":[[2014,4]]}}}