{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T09:59:09Z","timestamp":1740131949331,"version":"3.37.3"},"reference-count":64,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"1","license":[{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,1,1]],"date-time":"2023-01-01T00:00:00Z","timestamp":1672531200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61872263","U1836214","61802275","62002256"],"award-info":[{"award-number":["61872263","U1836214","61802275","62002256"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Singapore Ministry of Education Research Found","award":["MOE2016-T2-2-123"],"award-info":[{"award-number":["MOE2016-T2-2-123"]}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2023,1,1]]},"DOI":"10.1109\/tse.2022.3144480","type":"journal-article","created":{"date-parts":[[2022,1,21]],"date-time":"2022-01-21T21:39:57Z","timestamp":1642801197000},"page":"99-112","source":"Crossref","is-referenced-by-count":2,"title":["Achieving High MAP-Coverage Through Pattern Constraint Reduction"],"prefix":"10.1109","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-2998-1052","authenticated-orcid":false,"given":"Yingquan","family":"Zhao","sequence":"first","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6173-8170","authenticated-orcid":false,"given":"Zan","family":"Wang","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-8766-7235","authenticated-orcid":false,"given":"Shuang","family":"Liu","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-3545-1392","authenticated-orcid":false,"given":"Jun","family":"Sun","sequence":"additional","affiliation":[{"name":"School of Information Systems, Singapore Management University, Singapore"}]},{"ORCID":"https:\/\/orcid.org\/0000-0003-3056-9962","authenticated-orcid":false,"given":"Junjie","family":"Chen","sequence":"additional","affiliation":[{"name":"College of Intelligence and Computing, Tianjin University, Tianjin, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-1180-3891","authenticated-orcid":false,"given":"Xiang","family":"Chen","sequence":"additional","affiliation":[{"name":"School of Information Science and Technology, Nantong University, Nantong, China"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2707089"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1007\/s11390-016-1669-8"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338927"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1523"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00073"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238198"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2557833.2560581"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1145\/2813885.2737975"},{"volume-title":"Java Concurrency in Practice","year":"2006","author":"Goetz","key":"ref9"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111067"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737975"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.32"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254126"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884876"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-4380-9_16"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2660767"},{"key":"ref20","first-page":"161","article-title":"Coverage metrics for requirements-based testing: Evaluation of effectiveness","volume-title":"Proc. 2nd NASA Formal Methods Symp","author":"Staats"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384651"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985824"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.33"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737998"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786874"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2660193.2660238"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/271771.271804"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-29860-8_14"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/265924.265927"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1273442.1250762"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542490"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/780822.781145"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2016.038"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321679"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/1453101.1453121"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1379022.1375584"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1543135.1542489"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/1735971.1736040"},{"key":"ref39","first-page":"267","article-title":"Finding and reproducing heisenbugs in concurrent programs","volume-title":"Proc. 8th USENIX Conf. Oper. Syst. Des. Implementation","author":"Musuvathi"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/PDP.2015.19"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1145\/238721.238760"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/1165389.945468"},{"key":"ref43","first-page":"127","article-title":"Detecting data races using dynamic escape analysis based on read barrier","volume-title":"Proc. Virtual Mach. Res. Technol. Symp.","author":"Nishiyama"},{"article-title":"Precise race detection and efficient model checking using locksets","year":"2006","author":"Elmas","key":"ref44"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/504311.504288"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1095809.1095832"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/543552.512560"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1002\/cpe.1064"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-17906-2_30"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491453"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/2535838.2535845"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-63387-9_26"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-96142-2_22"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-89963-3_14"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3182657"},{"key":"ref56","first-page":"209","article-title":"KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs","volume-title":"Proc. 8th USENIX Symp. Oper. Syst. Des. Implementation","author":"Cadar"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-53288-8_18"},{"key":"ref58","first-page":"101","article-title":"Concolic testing of concurrent programs","volume-title":"Proc. Softw. Eng, Fachtagung des GI-Fachbereichs Softwaretechnik","author":"Farzan"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1007\/11817963_38"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771798"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-20398-5_23"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/3243176.3243206"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/2499370.2462167"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/2885495"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180225"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1016\/S0004-3702(02)00375-2"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/10008953\/09689981.pdf?arnumber=9689981","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,1,13]],"date-time":"2024-01-13T22:15:38Z","timestamp":1705184138000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/9689981\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,1,1]]},"references-count":64,"journal-issue":{"issue":"1"},"URL":"https:\/\/doi.org\/10.1109\/tse.2022.3144480","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2023,1,1]]}}}