{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,21]],"date-time":"2025-10-21T15:06:44Z","timestamp":1761059204084,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":15,"publisher":"ACM","license":[{"start":{"date-parts":[[2011,5,21]],"date-time":"2011-05-21T00:00:00Z","timestamp":1305936000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2011,5,21]]},"DOI":"10.1145\/1985793.1985897","type":"proceedings-article","created":{"date-parts":[[2011,5,24]],"date-time":"2011-05-24T13:04:30Z","timestamp":1306242270000},"page":"736-745","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Code coverage analysis in practice for large systems"],"prefix":"10.1145","author":[{"given":"Yoram","family":"Adler","sequence":"first","affiliation":[{"name":"IBM Research, Haifa, Israel"}]},{"given":"Noam","family":"Behar","sequence":"additional","affiliation":[{"name":"Microsoft R&amp;D Center, Israel, Israel"}]},{"given":"Orna","family":"Raz","sequence":"additional","affiliation":[{"name":"IBM Research, Haifa, Israel"}]},{"given":"Onn","family":"Shehory","sequence":"additional","affiliation":[{"name":"IBM Research, Haifa, Israel"}]},{"given":"Nadav","family":"Steindler","sequence":"additional","affiliation":[{"name":"IBM Research, Haifa, Israel"}]},{"given":"Shmuel","family":"Ur","sequence":"additional","affiliation":[{"name":"Shmuel Ur Innovation, Israel, Israel"}]},{"given":"Aviad","family":"Zlotnick","sequence":"additional","affiliation":[{"name":"IBM Research, Haifa, Israel"}]}],"member":"320","published-online":{"date-parts":[[2011,5,21]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572278"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-COMPANION.2009.5070982"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/79060"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065944.1065972"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2008.36"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.988497"},{"key":"e_1_3_2_1_7_1","unstructured":"FoCuS. http:\/\/www.alphaworks.ibm.com\/tech\/focus.  FoCuS. http:\/\/www.alphaworks.ibm.com\/tech\/focus."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/367008.367020"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/961322.961347"},{"key":"e_1_3_2_1_10_1","first-page":"16","volume-title":"Proceedings of the 16th Interational Conference on Testing Computer Software","author":"Marick Brian","year":"1999","unstructured":"Brian Marick . How to misuse code coverage . In Proceedings of the 16th Interational Conference on Testing Computer Software , pages 16 -- 18 , 1999 . Brian Marick. How to misuse code coverage. In Proceedings of the 16th Interational Conference on Testing Computer Software, pages 16--18, 1999."},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302637"},{"key":"e_1_3_2_1_12_1","unstructured":"PHP hypertext preprocessor. http:\/\/www.php.net\/.  PHP hypertext preprocessor. http:\/\/www.php.net\/."},{"key":"e_1_3_2_1_13_1","first-page":"235","volume-title":"Haifa Verification Conference","author":"Raz Orna","year":"2007","unstructured":"Orna Raz , Moshe Klausner , Nitzan Peleg , Gadi Haber , Eitan Farchi , Shachar Fienblit , Yakov S. Filiarsky , Shay Gammer , and Sergey Novikov . The advantages of post-link code coverage . In Haifa Verification Conference , pages 235 -- 251 , 2007 . Orna Raz, Moshe Klausner, Nitzan Peleg, Gadi Haber, Eitan Farchi, Shachar Fienblit, Yakov S. Filiarsky, Shay Gammer, and Sergey Novikov. The advantages of post-link code coverage. In Haifa Verification Conference, pages 235--251, 2007."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.962562"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566186"}],"event":{"name":"ICSE11: International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Waikiki, Honolulu HI USA","acronym":"ICSE11"},"container-title":["Proceedings of the 33rd International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1985793.1985897","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/1985793.1985897","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T11:22:18Z","timestamp":1750245738000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/1985793.1985897"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,5,21]]},"references-count":15,"alternative-id":["10.1145\/1985793.1985897","10.1145\/1985793"],"URL":"https:\/\/doi.org\/10.1145\/1985793.1985897","relation":{},"subject":[],"published":{"date-parts":[[2011,5,21]]},"assertion":[{"value":"2011-05-21","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}