{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:17:11Z","timestamp":1763468231042,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":81,"publisher":"ACM","license":[{"start":{"date-parts":[[2014,9,15]],"date-time":"2014-09-15T00:00:00Z","timestamp":1410739200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000143","name":"Division of Computing and Communication Foundations","doi-asserted-by":"publisher","award":["CCF-1434590","CCF-1434596","CCF-1349666"],"award-info":[{"award-number":["CCF-1434590","CCF-1434596","CCF-1349666"]}],"id":[{"id":"10.13039\/100000143","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/100000144","name":"Division of Computer and Network Systems","doi-asserted-by":"publisher","award":["CNS-1434582","CNS-1439481"],"award-info":[{"award-number":["CNS-1434582","CNS-1439481"]}],"id":[{"id":"10.13039\/100000144","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61228203"],"award-info":[{"award-number":["61228203"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2014,9,15]]},"DOI":"10.1145\/2642937.2642941","type":"proceedings-article","created":{"date-parts":[[2014,9,17]],"date-time":"2014-09-17T14:22:41Z","timestamp":1410963761000},"page":"385-396","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":23,"title":["Transferring an automated test generation tool to practice"],"prefix":"10.1145","author":[{"given":"Nikolai","family":"Tillmann","sequence":"first","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Jonathan","family":"de Halleux","sequence":"additional","affiliation":[{"name":"Microsoft Research, Redmond, WA, USA"}]},{"given":"Tao","family":"Xie","sequence":"additional","affiliation":[{"name":"University of Illinois at Urbana-Champaign, Urbana, IL, USA"}]}],"member":"320","published-online":{"date-parts":[[2014,9,15]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Blog post: Fun with the ResourceReader. http:\/\/blogs.msdn.com\/b\/nikolait\/archive\/2008\/06\/04\/fun-with-the-resourcereader.aspx.  Blog post: Fun with the ResourceReader. http:\/\/blogs.msdn.com\/b\/nikolait\/archive\/2008\/06\/04\/fun-with-the-resourcereader.aspx."},{"key":"e_1_3_2_1_2_1","unstructured":"Blog post: Pex dynamic analysis and test generation for. NET.http:\/\/blog.dotnetwiki.org\/2007\/03\/08\/PexDynamicAnalysisAndTestGenerationForNet.aspx.  Blog post: Pex dynamic analysis and test generation for. NET.http:\/\/blog.dotnetwiki.org\/2007\/03\/08\/PexDynamicAnalysisAndTestGenerationForNet.aspx."},{"key":"e_1_3_2_1_3_1","unstructured":"Blog post: What if coding were a game? http:\/\/blogs.msdn.com\/b\/msr_er\/archive\/2014\/05\/15\/what-if-coding-were-a-game.aspx.  Blog post: What if coding were a game? http:\/\/blogs.msdn.com\/b\/msr_er\/archive\/2014\/05\/15\/what-if-coding-were-a-game.aspx."},{"key":"e_1_3_2_1_4_1","unstructured":"Facebook Page on Code Hunt Game. https:\/\/www.facebook.com\/codehuntgame.  Facebook Page on Code Hunt Game. https:\/\/www.facebook.com\/codehuntgame."},{"key":"e_1_3_2_1_5_1","unstructured":"Facebook Page on Pex and Moles. https:\/\/www.facebook.com\/PexMoles.  Facebook Page on Pex and Moles. https:\/\/www.facebook.com\/PexMoles."},{"key":"e_1_3_2_1_6_1","unstructured":"Flopsy - search-based floating point constraint solving for symbolic execution. http:\/\/pexarithmeticsolver.codeplex.com\/.  Flopsy - search-based floating point constraint solving for symbolic execution. http:\/\/pexarithmeticsolver.codeplex.com\/."},{"key":"e_1_3_2_1_7_1","unstructured":"ICFP Programming Contest 2013. http:\/\/research.microsoft.com\/en-us\/events\/icfpcontest2013\/.  ICFP Programming Contest 2013. http:\/\/research.microsoft.com\/en-us\/events\/icfpcontest2013\/."},{"key":"e_1_3_2_1_8_1","unstructured":"ICSE 2011 Pex4Fun Contest. http:\/\/research.microsoft.com\/ICSE2011Contest.  ICSE 2011 Pex4Fun Contest. http:\/\/research.microsoft.com\/ICSE2011Contest."},{"key":"e_1_3_2_1_9_1","volume-title":"January","author":"Inversion","year":"2004","unstructured":"Inversion of control containers and the dependency injection pattern. http:\/\/www.martinfowler.com\/articles\/injection.html , January 2004 . Inversion of control containers and the dependency injection pattern. http:\/\/www.martinfowler.com\/articles\/injection.html, January 2004."},{"key":"e_1_3_2_1_10_1","unstructured":"Microsoft Customer Experience Improvement Program. http:\/\/www.microsoft.com\/products\/ceip\/.  Microsoft Customer Experience Improvement Program. http:\/\/www.microsoft.com\/products\/ceip\/."},{"key":"e_1_3_2_1_11_1","unstructured":"Microsoft Devlabs Extensions. http:\/\/msdn.microsoft.com\/DevLabs.  Microsoft Devlabs Extensions. http:\/\/msdn.microsoft.com\/DevLabs."},{"key":"e_1_3_2_1_12_1","unstructured":"Microsoft Patterns & Practices SharePoint Guidance. http:\/\/spg.codeplex.com\/.  Microsoft Patterns & Practices SharePoint Guidance. http:\/\/spg.codeplex.com\/."},{"key":"e_1_3_2_1_13_1","unstructured":"Microsoft Visual Studio 2010 Moles x86 - isolation framework for .NET. http:\/\/visualstudiogallery.msdn.microsoft.com\/b3b41648-1c21-471f-a2b0 f76d8fb932ee\/.  Microsoft Visual Studio 2010 Moles x86 - isolation framework for .NET. http:\/\/visualstudiogallery.msdn.microsoft.com\/b3b41648-1c21-471f-a2b0 f76d8fb932ee\/."},{"key":"e_1_3_2_1_14_1","unstructured":"Microsoft Visual Studio Gallery. http:\/\/visualstudiogallery.msdn.microsoft.com\/.  Microsoft Visual Studio Gallery. http:\/\/visualstudiogallery.msdn.microsoft.com\/."},{"key":"e_1_3_2_1_15_1","unstructured":"Microsoft Visual Studio Gallery: Microsoft Code Digger. http:\/\/visualstudiogallery.msdn.microsoft.com\/fb5badda-4ea3-4314-a723-a1975cbdabb4.  Microsoft Visual Studio Gallery: Microsoft Code Digger. http:\/\/visualstudiogallery.msdn.microsoft.com\/fb5badda-4ea3-4314-a723-a1975cbdabb4."},{"key":"e_1_3_2_1_16_1","unstructured":"MSDN Forum on Pex and Moles PowerTool. http:\/\/social.msdn.microsoft.com\/Forums\/en-US\/home?forum=pex.  MSDN Forum on Pex and Moles PowerTool. http:\/\/social.msdn.microsoft.com\/Forums\/en-US\/home?forum=pex."},{"key":"e_1_3_2_1_17_1","unstructured":"MSDN\n  : Isolating code under test with Microsoft Fakes. http:\/\/msdn.microsoft.com\/en-us\/library\/hh549175(v=vs.110).aspx.  MSDN: Isolating code under test with Microsoft Fakes. http:\/\/msdn.microsoft.com\/en-us\/library\/hh549175(v=vs.110).aspx."},{"key":"e_1_3_2_1_18_1","unstructured":"Open source Pex extension: Fitnex. http:\/\/pexase.codeplex.com\/wikipage?title=Fitnex.  Open source Pex extension: Fitnex. http:\/\/pexase.codeplex.com\/wikipage?title=Fitnex."},{"key":"e_1_3_2_1_19_1","unstructured":"Open source Pex extensions by the Automated Software Engineering Group at Illinois. http:\/\/pexase.codeplex.com\/.  Open source Pex extensions by the Automated Software Engineering Group at Illinois. http:\/\/pexase.codeplex.com\/."},{"key":"e_1_3_2_1_20_1","unstructured":"Publications from the Microsoft Research Pex project. http:\/\/research.microsoft.com\/projects\/pex\/publications.aspx.  Publications from the Microsoft Research Pex project. http:\/\/research.microsoft.com\/projects\/pex\/publications.aspx."},{"key":"e_1_3_2_1_21_1","unstructured":"Stackoverflow questions tagged with Pex. http:\/\/stackoverflow.com\/questions\/tagged\/pex.  Stackoverflow questions tagged with Pex. http:\/\/stackoverflow.com\/questions\/tagged\/pex."},{"key":"e_1_3_2_1_22_1","volume-title":"Microsoft Research","author":"Akiba T.","year":"2013","unstructured":"T. Akiba , K. Imajo , H. Iwami , Y. Iwata , T. Kataoka , N. Takahashi , M. Moskal , , and N. Swamy . Calibrating research in program synthesis using 72,000 hours of programmer time. Technical report , Microsoft Research , December 2013 . T. Akiba, K. Imajo, H. Iwami, Y. Iwata, T. Kataoka, N. Takahashi, M. Moskal, , and N. Swamy. Calibrating research in program synthesis using 72,000 hours of programmer time. Technical report, Microsoft Research, December 2013."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1145\/1646353.1646374"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1145\/2072221.2072273"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-00768-2_27"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146258"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2012.86"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.69"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233817"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368127"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.24"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2420950.2421004"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831734"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/1894386.1894400"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483774"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806835"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.5555\/1885930.1885934"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.01.002"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1145\/2351676.2351716"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38916-0_9"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.5555\/1928028.1928039"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2009.67"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693105"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.v14:2"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.2008.85"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1988842.1988846"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100152"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.5555\/2662413.2662439"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491529"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609565"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081750"},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1328279.1328285"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336772"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.60"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001422"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.5555\/1894403.1894415"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595725"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048083"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2593833.2593838"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792786.1792798"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/2556325.2567870"},{"key":"e_1_3_2_1_65_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628054"},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486941"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081749"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/1081706.1081745"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-27660-6_44"},{"key":"e_1_3_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.5555\/1806209.1806211"},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.15"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985876"},{"key":"e_1_3_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/1869542.1869570"},{"key":"e_1_3_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.5555\/2662593.2662600"},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2009.5270315"},{"key":"e_1_3_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/2070821.2070829"},{"key":"e_1_3_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2013.94"},{"key":"e_1_3_2_1_78_1","first-page":"951","volume-title":"Proc. ICSE, Software Engineering in Practice (SEIP), Mini-Tutorial","author":"Zhang D.","year":"2013","unstructured":"D. Zhang and T. Xie . Pathways to technology transfer and adoption: Achievements and challenges . In Proc. ICSE, Software Engineering in Practice (SEIP), Mini-Tutorial , pages 951 -- 952 , 2013 . D. Zhang and T. Xie. Pathways to technology transfer and adoption: Achievements and challenges. In Proc. ICSE, Software Engineering in Practice (SEIP), Mini-Tutorial, pages 951--952, 2013."},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609672"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-37057-1_10"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985441.1985444"}],"event":{"name":"ASE '14: ACM\/IEEE International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","M\u00e4lardalen University M\u00e4lardalen University","IEEE CS"],"location":"Vasteras Sweden","acronym":"ASE '14"},"container-title":["Proceedings of the 29th ACM\/IEEE International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642937.2642941","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2642937.2642941","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T07:19:33Z","timestamp":1750231173000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2642937.2642941"}},"subtitle":["from pex to fakes and code digger"],"short-title":[],"issued":{"date-parts":[[2014,9,15]]},"references-count":81,"alternative-id":["10.1145\/2642937.2642941","10.1145\/2642937"],"URL":"https:\/\/doi.org\/10.1145\/2642937.2642941","relation":{},"subject":[],"published":{"date-parts":[[2014,9,15]]},"assertion":[{"value":"2014-09-15","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}