{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:39:11Z","timestamp":1750307951203,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":37,"publisher":"ACM","license":[{"start":{"date-parts":[[2007,9,7]],"date-time":"2007-09-07T00:00:00Z","timestamp":1189123200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2007,9,7]]},"DOI":"10.1145\/1287624.1287670","type":"proceedings-article","created":{"date-parts":[[2007,9,26]],"date-time":"2007-09-26T17:32:33Z","timestamp":1190827953000},"page":"321-330","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["State space exploration using feedback constraint generation and Monte-Carlo sampling"],"prefix":"10.1145","author":[{"given":"Sriram","family":"Sankaranarayanan","sequence":"first","affiliation":[{"name":"NEC Laboratories America, Princeton, NJ"}]},{"given":"Richard M.","family":"Chang","sequence":"additional","affiliation":[{"name":"University of Texas, Austin, TX"}]},{"given":"Guofei","family":"Jiang","sequence":"additional","affiliation":[{"name":"NEC Laboratories America, Princeton, NJ"}]},{"given":"Franjo","family":"Ivan\u010di\u0107","sequence":"additional","affiliation":[{"name":"NEC Laboratories America, Princeton, NJ"}]}],"member":"320","published-online":{"date-parts":[[2007,9,7]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1020281327116"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/781131.781153"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(200006)30:7%3C775::AID-SPE309%3E3.0.CO;2-H"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/11537328_2"},{"key":"e_1_3_2_1_5_1","volume-title":"Property inference from program executions","author":"Chang Richard M.","year":"2006","unstructured":"Richard M. Chang , George S. Avrunin , and Lori A . Clarke , Property inference from program executions , 2006 , University of Massachusetts , Amherst, Tech report number: UM-CS-2006-26. Richard M. Chang, George S. Avrunin, and Lori A. Clarke, Property inference from program executions, 2006, University of Massachusetts, Amherst, Tech report number: UM-CS-2006-26."},{"key":"e_1_3_2_1_6_1","first-page":"4","volume":"49","author":"Chib Siddhartha","year":"1995","unstructured":"Siddhartha Chib and Edward Greenberg , Understanding the Metropolis-Hastings algorithm , The American Statistician 49 ( 1995 ), no. 4 , 327--335. Siddhartha Chib and Edward Greenberg, Understanding the Metropolis-Hastings algorithm, The American Statistician 49 (1995), no. 4, 327--335.","journal-title":"The American Statistician"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/351240.351266"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24730-2_15"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.602"},{"key":"e_1_3_2_1_10_1","first-page":"390","volume-title":"Conference on Computer-Aided Verification, LNCS, Springer-Verlag","author":"David","year":"1996","unstructured":"David L. Dill, The mur-- verification system , Conference on Computer-Aided Verification, LNCS, Springer-Verlag , July 1996 , pp. 390 -- 393 . David L. Dill, The mur-- verification system, Conference on Computer-Aided Verification, LNCS, Springer-Verlag, July 1996, pp. 390--393."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.411.0111"},{"key":"e_1_3_2_1_12_1","volume-title":"Ph. D.","author":"Ernst Michael D.","year":"2000","unstructured":"Michael D. Ernst , Dynamically discovering likely program invariants , Ph. D. , University of Washington Department of Computer Science and Engineering , Seattle, Washington , August 2000 . Michael D. Ernst, Dynamically discovering likely program invariants , Ph. D., University of Washington Department of Computer Science and Engineering, Seattle, Washington, August 2000."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/775832.775907"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/368122.368878"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_16_1","volume-title":"CP '07","author":"Gogate Vaibhav","year":"2007","unstructured":"Vaibhav Gogate and Rina Dechter , A new algorithm for sampling csp solution uniformly at random , CP '07 , 2007 . Vaibhav Gogate and Rina Dechter, A new algorithm for sampling csp solution uniformly at random, CP '07, 2007."},{"key":"e_1_3_2_1_17_1","first-page":"970","volume-title":"Encyclopedia of Software Engineering","author":"Hamlet R.","year":"1994","unstructured":"R. Hamlet , Random testing , Encyclopedia of Software Engineering (J. Marciniak, ed.), Wiley , 1994 , pp. 970 -- 978 . R. Hamlet, Random testing , Encyclopedia of Software Engineering (J. Marciniak, ed.), Wiley, 1994, pp. 970--978."},{"key":"e_1_3_2_1_18_1","volume-title":"The SPIN Model Checker: Primer and reference manual","author":"Holzmann Gerard J.","year":"2004","unstructured":"Gerard J. Holzmann , The SPIN Model Checker: Primer and reference manual , Addison-Wesley , 2004 . Gerard J. Holzmann, The SPIN Model Checker: Primer and reference manual, Addison-Wesley, 2004."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1052883.1052895"},{"key":"e_1_3_2_1_20_1","unstructured":"CoVerity Inc. Coverity verification toolsuite http:\/\/www.coverity.com  CoVerity Inc. Coverity verification toolsuite http:\/\/www.coverity.com"},{"key":"e_1_3_2_1_21_1","unstructured":"PolySpace Inc. Polyspace verification toolsuite http:\/\/www.polyspace.com  PolySpace Inc. Polyspace verification toolsuite http:\/\/www.polyspace.com"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1007\/11513988_31"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICAC.2005.42"},{"key":"e_1_3_2_1_24_1","volume-title":"The art of computer programming","author":"Knuth Donald E.","year":"1997","unstructured":"Donald E. Knuth , The art of computer programming , vol. 3 , Addison-Wesley , 1997 . Donald E. Knuth, The art of computer programming, vol. 3, Addison-Wesley, 1997."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/226295.226319"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.41"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988709"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/1060289.1060297"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1016\/S1571-0661(04)00256-7"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.37"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.5555\/876877.879206"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1023\/A:1022920129859"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007526"},{"key":"e_1_3_2_1_35_1","volume-title":"AAAI'04","author":"Wei Wei","year":"2004","unstructured":"Wei Wei , Jordan Erenrich , and Bart Selman , Towards efficient sampling: Exploiting random walk strategies , AAAI'04 , 2004 . Wei Wei, Jordan Erenrich, and Bart Selman, Towards efficient sampling: Exploiting random walk strategies, AAAI'04, 2004."},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-31980-1_24"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134325"}],"event":{"name":"ESEC\/FSE07: Joint 11th European Software Engineering Conference 2007","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering"],"location":"Dubrovnik Croatia","acronym":"ESEC\/FSE07"},"container-title":["Proceedings of the the 6th joint meeting of the European software engineering conference and the ACM SIGSOFT symposium on The foundations of software engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1287624.1287670","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1287624.1287670","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T14:57:50Z","timestamp":1750258670000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1287624.1287670"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,9,7]]},"references-count":37,"alternative-id":["10.1145\/1287624.1287670","10.1145\/1287624"],"URL":"https:\/\/doi.org\/10.1145\/1287624.1287670","relation":{},"subject":[],"published":{"date-parts":[[2007,9,7]]},"assertion":[{"value":"2007-09-07","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}