{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,16]],"date-time":"2026-04-16T02:02:47Z","timestamp":1776304967855,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":40,"publisher":"ACM","license":[{"start":{"date-parts":[[2013,8,18]],"date-time":"2013-08-18T00:00:00Z","timestamp":1376784000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2013,8,18]]},"DOI":"10.1145\/2491411.2501854","type":"proceedings-article","created":{"date-parts":[[2013,8,20]],"date-time":"2013-08-20T14:07:21Z","timestamp":1377007641000},"page":"554-564","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":50,"title":["Scalable and incremental software bug detection"],"prefix":"10.1145","author":[{"given":"Scott","family":"McPeak","sequence":"first","affiliation":[{"name":"Coverity, USA"}]},{"given":"Charles-Henri","family":"Gros","sequence":"additional","affiliation":[{"name":"Coverity, USA"}]},{"given":"Murali Krishna","family":"Ramanathan","sequence":"additional","affiliation":[{"name":"Indian Institute of Science, India"}]}],"member":"320","published-online":{"date-parts":[[2013,8,18]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985898"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1251535.1251543"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254091"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831738"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1965724.1965743"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.5555\/380921.380932"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1646353.1646374"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10009-007-0044-z"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048101"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/1394504.1394505"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/512950.512973"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/512529.512538"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1327452.1327492"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/1375581.1375615"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251229.1251230"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.5555\/1251229.1251230"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/502034.502041"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/948109.948155"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1190216.1190226"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.5555\/822085.823311"},{"key":"e_1_3_2_1_23_1","volume-title":"Proceedings of the 2010 USENIX conference on Web application development, WebApps\u201910","author":"Guarnieri S.","year":"2010","unstructured":"S. Guarnieri and B. Livshits . Gulfstream: staged static analysis for streaming javascript applications . In Proceedings of the 2010 USENIX conference on Web application development, WebApps\u201910 , Berkeley, CA, USA , 2010 . USENIX Association. S. Guarnieri and B. Livshits. Gulfstream: staged static analysis for streaming javascript applications. In Proceedings of the 2010 USENIX conference on Web application development, WebApps\u201910, Berkeley, CA, USA, 2010. USENIX Association."},{"key":"e_1_3_2_1_24_1","volume-title":"The SPIN Model Checker: Primer and Reference Manual","author":"Holzmann G.","year":"2004","unstructured":"G. Holzmann . The SPIN Model Checker: Primer and Reference Manual . Addison-Wesley , 2004 . G. Holzmann. The SPIN Model Checker: Primer and Reference Manual. Addison-Wesley, 2004."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1512475.1512493"},{"key":"e_1_3_2_1_26_1","volume-title":"Seventh USENIX Symposium on Operating Systems Design and Implementation (OSDI)","author":"Kremenek T.","year":"2006","unstructured":"T. Kremenek , P. Twohey , G. Back , A. Ng , and D. Engler . From uncertainty to belief: Inferring the specification within . In Seventh USENIX Symposium on Operating Systems Design and Implementation (OSDI) , 2006 . T. Kremenek, P. Twohey, G. Back, A. Ng, and D. Engler. From uncertainty to belief: Inferring the specification within. In Seventh USENIX Symposium on Operating Systems Design and Implementation (OSDI), 2006."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.26.1.22"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384626"},{"key":"e_1_3_2_1_29_1","volume-title":"Springer","author":"Lopes N.","year":"2011","unstructured":"N. Lopes and A. Rybalchenko . Distributed and predictable software model checking. In Verification, Model Checking, and Abstract Interpretation, pages 340\u2013355 . Springer , 2011 . N. Lopes and A. Rybalchenko. Distributed and predictable software model checking. In Verification, Model Checking, and Abstract Interpretation, pages 340\u2013355. Springer, 2011."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/2259016.2259049"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869459.1869495"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062558"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297846.1297902"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/1926385.1926445"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254126"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/1250734.1250749"},{"key":"e_1_3_2_1_37_1","unstructured":"Whitepaper: Coverity scan: 2012 open source report. http:\/\/scan.coverity.com May 2013.  Whitepaper: Coverity scan: 2012 open source report. http:\/\/scan.coverity.com May 2013."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337360"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1232420.1232423"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1145\/2384616.2384651"}],"event":{"name":"ESEC\/FSE'13: Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering","location":"Saint Petersburg Russia","acronym":"ESEC\/FSE'13","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2491411.2501854","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2491411.2501854","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:28:49Z","timestamp":1750231729000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2491411.2501854"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,18]]},"references-count":40,"alternative-id":["10.1145\/2491411.2501854","10.1145\/2491411"],"URL":"https:\/\/doi.org\/10.1145\/2491411.2501854","relation":{},"subject":[],"published":{"date-parts":[[2013,8,18]]},"assertion":[{"value":"2013-08-18","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}