{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,27]],"date-time":"2026-02-27T03:47:29Z","timestamp":1772164049178,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":27,"publisher":"ACM","license":[{"start":{"date-parts":[[2012,10,19]],"date-time":"2012-10-19T00:00:00Z","timestamp":1350604800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2012,10,19]]},"DOI":"10.1145\/2384616.2384681","type":"proceedings-article","created":{"date-parts":[[2012,10,22]],"date-time":"2012-10-22T08:07:05Z","timestamp":1350893225000},"page":"897-914","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":13,"title":["White box sampling in uncertain data processing enabled by program analysis"],"prefix":"10.1145","author":[{"given":"Tao","family":"Bao","sequence":"first","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Yunhui","family":"Zheng","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]},{"given":"Xiangyu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Purdue University, West Lafayette, IN, USA"}]}],"member":"320","published-online":{"date-parts":[[2012,10,19]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/93542.93576"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0378-4754(02)00252-5"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.5555\/1762008.1762018"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/645605.662922"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831713"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/1706299.1706308"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025131"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273490"},{"key":"e_1_3_2_1_9_1","volume-title":"Jan","author":"U. Consortium","year":"2010","unstructured":"U. Consortium . The universal protein resource (uniprot) in 2010. Nucleic Acids Res, 38(Database issue) , Jan 2010 . U. Consortium. The universal protein resource (uniprot) in 2010. Nucleic Acids Res, 38(Database issue), Jan 2010."},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375607"},{"key":"e_1_3_2_1_11_1","volume-title":"NDSS","author":"Godefroid P.","year":"2008","unstructured":"P. Godefroid , M. Y. Levin , and D. Molnar . Automated White-box Fuzz Testing . In NDSS , 2008 . P. Godefroid, M. Y. Levin, and D. Molnar. Automated White-box Fuzz Testing. In NDSS, 2008."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5555\/786769.787040"},{"key":"e_1_3_2_1_13_1","volume-title":"Survey of sampling-based methods for uncertainty and sensitivity analysis. Reliability Eng. & Sys. Safety, 91(10-11)","author":"Helton J. C.","year":"2006","unstructured":"J. C. Helton , J. D. Johnson , C. J. Sallaberry , and C. B. Storlie . Survey of sampling-based methods for uncertainty and sensitivity analysis. Reliability Eng. & Sys. Safety, 91(10-11) , 2006 . J. C. Helton, J. D. Johnson, C. J. Sallaberry, and C. B. Storlie. Survey of sampling-based methods for uncertainty and sensitivity analysis. Reliability Eng. & Sys. Safety, 91(10-11), 2006."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1080\/00207547908919637"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376686"},{"key":"e_1_3_2_1_16_1","volume-title":"What we do not know about sequence analysis and sequence databases. Bioinformatics, 14(9)","author":"Karp P. D.","year":"1998","unstructured":"P. D. Karp . What we do not know about sequence analysis and sequence databases. Bioinformatics, 14(9) , 1998 . P. D. Karp. What we do not know about sequence analysis and sequence databases. Bioinformatics, 14(9), 1998."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.2307\/1271432"},{"key":"e_1_3_2_1_18_1","volume-title":"Uncertainty: A Guide to Dealing with Uncertainty in Quantitative Risk and Policy Analysis","author":"Morgan M. G.","year":"1992","unstructured":"M. G. Morgan and M. Henrion . Uncertainty: A Guide to Dealing with Uncertainty in Quantitative Risk and Policy Analysis . Cambridge University Press , 1992 . M. G. Morgan and M. Henrion. Uncertainty: A Guide to Dealing with Uncertainty in Quantitative Risk and Policy Analysis. Cambridge University Press, 1992."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375606"},{"key":"e_1_3_2_1_20_1","volume-title":"NDSS","author":"Newsome J.","year":"2005","unstructured":"J. Newsome and D. Song . Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software . In NDSS , 2005 . J. Newsome and D. Song. Dynamic Taint Analysis for Automatic Detection, Analysis, and Signature Generation of Exploits on Commodity Software. In NDSS, 2005."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2008.4497514"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985872"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831724"},{"key":"e_1_3_2_1_24_1","volume-title":"Oct","author":"Tripathi S.","year":"2008","unstructured":"S. Tripathi and R. S. Govindaraju . Engaging uncertainty in hydrologic data sets using principal component analysis: Banpca algorithm. Water Resour. Res., 44(10) , Oct 2008 . S. Tripathi and R. S. Govindaraju. Engaging uncertainty in hydrologic data sets using principal component analysis: Banpca algorithm. Water Resour. Res., 44(10), Oct 2008."},{"key":"e_1_3_2_1_26_1","volume-title":"VLDB","author":"Zhang M.","year":"2007","unstructured":"M. Zhang , X. Zhang , X. Zhang , and S. Prabhakar . Tracing lineage beyond relational operators . In VLDB , 2007 . M. Zhang, X. Zhang, X. Zhang, and S. Prabhakar. Tracing lineage beyond relational operators. In VLDB, 2007."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jasms.2005.03.016"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250782"}],"event":{"name":"SPLASH '12: Conference on Systems, Programming, and Applications: Software for Humanity","location":"Tucson Arizona USA","acronym":"SPLASH '12","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the ACM international conference on Object oriented programming systems languages and applications"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2384616.2384681","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2384616.2384681","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T05:21:18Z","timestamp":1750224078000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2384616.2384681"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,10,19]]},"references-count":27,"alternative-id":["10.1145\/2384616.2384681","10.1145\/2384616"],"URL":"https:\/\/doi.org\/10.1145\/2384616.2384681","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/2398857.2384681","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2012,10,19]]},"assertion":[{"value":"2012-10-19","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}