{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:29:38Z","timestamp":1750307378795,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":17,"publisher":"ACM","license":[{"start":{"date-parts":[[2010,5,3]],"date-time":"2010-05-03T00:00:00Z","timestamp":1272844800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2010,5,3]]},"DOI":"10.1145\/1808266.1808275","type":"proceedings-article","created":{"date-parts":[[2010,6,11]],"date-time":"2010-06-11T18:52:58Z","timestamp":1276282378000},"page":"59-66","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":20,"title":["Structural coverage of feasible code"],"prefix":"10.1145","author":[{"given":"Mauro","family":"Baluda","sequence":"first","affiliation":[{"name":"University of Lugano, Lugano, Switzerland"}]},{"given":"Pietro","family":"Braione","sequence":"additional","affiliation":[{"name":"University of Milano-Bicocca, Milano, Italy"}]},{"given":"Giovanni","family":"Denaro","sequence":"additional","affiliation":[{"name":"University of Milano-Bicocca, Milano, Italy"}]},{"given":"Mauro","family":"Pezz\u00e8","sequence":"additional","affiliation":[{"name":"University of Lugano, Lugano, Switzerland and University of Milano-Bicocca, Milano, Italy"}]}],"member":"320","published-online":{"date-parts":[[2010,5,3]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390634"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.69"},{"key":"e_1_3_2_1_3_1","volume-title":"Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2008)","author":"Cadar C.","year":"2008","unstructured":"C. Cadar , D. Dunbar , and D. Engler . KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs . In Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2008) , 2008 . C. Cadar, D. Dunbar, and D. Engler. KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs. In Proceedings of the 8th USENIX Symposium on Operating Systems Design and Implementation (OSDI 2008), 2008."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1180405.1180445"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-005-3861-2"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.6194"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.v19:3"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_10_1","volume-title":"Automated whitebox fuzz testing","author":"Godefroid P.","year":"2007","unstructured":"P. Godefroid , M. Y. Levin , and D. Molnar . Automated whitebox fuzz testing , 2007 . P. Godefroid, M. Y. Levin, and D. Molnar. Automated whitebox fuzz testing, 2007."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181790"},{"key":"e_1_3_2_1_12_1","first-page":"230","volume-title":"Proceedings of the Monterey Workshop, Monterey, Calif.: Naval Postgraduate School","author":"Hong H. S.","year":"2001","unstructured":"H. S. Hong and I. Lee . Automatic test generation from specifications for control-flow and data-flow coverage criteria . In Proceedings of the Monterey Workshop, Monterey, Calif.: Naval Postgraduate School , pages 230 -- 246 , 2001 . H. S. Hong and I. Lee. Automatic test generation from specifications for control-flow and data-flow coverage criteria. In Proceedings of the Monterey Workshop, Monterey, Calif.: Naval Postgraduate School, pages 230--246, 2001."},{"key":"e_1_3_2_1_13_1","volume-title":"Software Testing and Analysis: Process, Principles and Techniques","author":"Pezz\u00e8 M.","year":"2007","unstructured":"M. Pezz\u00e8 and M. Young . Software Testing and Analysis: Process, Principles and Techniques . Wiley , April 2007 . M. Pezz\u00e8 and M. Young. Software Testing and Analysis: Process, Principles and Techniques. Wiley, April 2007."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792786.1792798"},{"key":"e_1_3_2_1_16_1","unstructured":"United States. RTCA Inc. Document RTCA\/DO-178B. U.S. Department of Transportation Federal Aviation Administration Washington D.C. 1993.  United States. RTCA Inc. Document RTCA\/DO-178B . U.S. Department of Transportation Federal Aviation Administration Washington D.C. 1993."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007526"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/62959.62963"}],"event":{"name":"ICSE '10: 32nd International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Cape Town South Africa","acronym":"ICSE '10"},"container-title":["Proceedings of the 5th Workshop on Automation of Software Test"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1808266.1808275","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1808266.1808275","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:23:12Z","timestamp":1750245792000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1808266.1808275"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2010,5,3]]},"references-count":17,"alternative-id":["10.1145\/1808266.1808275","10.1145\/1808266"],"URL":"https:\/\/doi.org\/10.1145\/1808266.1808275","relation":{},"subject":[],"published":{"date-parts":[[2010,5,3]]},"assertion":[{"value":"2010-05-03","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}