{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:42Z","timestamp":1750306302455,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":24,"publisher":"ACM","license":[{"start":{"date-parts":[[2015,11,6]],"date-time":"2015-11-06T00:00:00Z","timestamp":1446768000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2015,11,6]]},"DOI":"10.1145\/2875913.2875932","type":"proceedings-article","created":{"date-parts":[[2016,10,11]],"date-time":"2016-10-11T16:59:00Z","timestamp":1476205140000},"page":"176-185","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["nCov"],"prefix":"10.1145","author":[{"given":"Yan","family":"Zhou","sequence":"first","affiliation":[{"name":"State Key Laboratory of Novel Computer Software Technology, Nanjing University, Nanjing, China, Jiangsu Novel Software Technology and Industrialization, Nanjing, China, Department of Computer Science and Technology, Nanjing University, Nanjing, China"}]},{"given":"You","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Novel Computer Software Technology, Nanjing University, Nanjing, China, Jiangsu Novel Software Technology and Industrialization, Nanjing, China, Department of Computer Science and Technology, Nanjing University, Nanjing, China"}]},{"given":"Linzhang","family":"Wang","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Novel Computer Software Technology, Nanjing University, Nanjing, China, Jiangsu Novel Software Technology and Industrialization, Nanjing, China, Department of Computer Science and Technology, Nanjing University, Nanjing, China"}]},{"given":"Xuandong","family":"Li","sequence":"additional","affiliation":[{"name":"State Key Laboratory of Novel Computer Software Technology, Nanjing University, Nanjing, China, Jiangsu Novel Software Technology and Industrialization, Nanjing, China, Department of Computer Science and Technology, Nanjing University, Nanjing, China"}]}],"member":"320","published-online":{"date-parts":[[2015,11,6]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/2509136.2509553"},{"key":"e_1_3_2_1_2_1","unstructured":"Chris Lattner. LLVM Language Reference Manual http:\/\/llvm.org\/releases\/2.9\/docs\/LangRef.html#moduleasm  Chris Lattner. LLVM Language Reference Manual http:\/\/llvm.org\/releases\/2.9\/docs\/LangRef.html#moduleasm"},{"key":"e_1_3_2_1_3_1","unstructured":"The LLVM compiler infrastructure. http:\/\/llvm.org\/.  The LLVM compiler infrastructure. http:\/\/llvm.org\/."},{"key":"e_1_3_2_1_4_1","unstructured":"Writing an LLVM Pass http:\/\/llvm.org\/docs\/WritingAnLLVMPass.html  Writing an LLVM Pass http:\/\/llvm.org\/docs\/WritingAnLLVMPass.html"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/257734.257766"},{"key":"e_1_3_2_1_6_1","unstructured":"Standard Performance Evaluation Corporation http:\/\/www.spec.org\/cpu2000\/CINT2000\/  Standard Performance Evaluation Corporation http:\/\/www.spec.org\/cpu2000\/CINT2000\/"},{"key":"e_1_3_2_1_7_1","unstructured":"Runlim: a program to run benchmarks. http:\/\/fmv.jku.at\/runlim\/  Runlim: a program to run benchmarks. http:\/\/fmv.jku.at\/runlim\/"},{"volume-title":"Proceedings of the 29th annual ACM\/IEEE international symposium on Microarchitecture (MICRO 29)","author":"Ball Thomas","key":"e_1_3_2_1_8_1"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379241"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/267895.267925"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.5555\/977395.977673"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566186"},{"key":"e_1_3_2_1_13_1","unstructured":"gcov---a Test Coverage Program https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/Gcov.html  gcov---a Test Coverage Program https:\/\/gcc.gnu.org\/onlinedocs\/gcc\/Gcov.html"},{"key":"e_1_3_2_1_14_1","unstructured":"COVTOOL - Free test coverage analyzer for C++. http:\/\/covtool.sourceforge.net\/  COVTOOL - Free test coverage analyzer for C++. http:\/\/covtool.sourceforge.net\/"},{"volume-title":"Proceedings of the Second Symposium on. IEEE, Assessment of Quality Software Development Tools","author":"Horgan J. R.","key":"e_1_3_2_1_15_1"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1980.230473"},{"key":"e_1_3_2_1_17_1","first-page":"0471043281","article-title":"The art of software testing. John Wiley and Sons","volume":"10","author":"Myers Glenford J.","year":"1979","journal-title":"ISBN"},{"key":"e_1_3_2_1_18_1","article-title":"Applicability of modified condition\/decision coverage to software testing","volume":"1994","author":"Chilenski John Joseph","year":"1994","journal-title":"Software Engineering Journal"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/DASC.2000.886883"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1183927"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.491648"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/2576195.2576213"},{"volume-title":"The BSD Conference, 1--2.","year":"2008","author":"Lattner Chris","key":"e_1_3_2_1_23_1"},{"volume-title":"Proceedings of the 18th IEEE International Conference on Automated Software Engineering, 49--58","author":"Gupta Neelam","key":"e_1_3_2_1_24_1"}],"event":{"name":"Internetware '15: The Seventh Asia-Pacific Symposium on Internetware","sponsor":["Key Laboratory of High Confidence Software Technologies Key Laboratory of High Confidence Software Technologies, Ministry of Education"],"location":"Wuhan China","acronym":"Internetware '15"},"container-title":["Proceedings of the 7th Asia-Pacific Symposium on Internetware"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2875913.2875932","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2875913.2875932","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:18Z","timestamp":1750221558000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2875913.2875932"}},"subtitle":["A Tool for Measuring Length-n Subpath Coverage"],"short-title":[],"issued":{"date-parts":[[2015,11,6]]},"references-count":24,"alternative-id":["10.1145\/2875913.2875932","10.1145\/2875913"],"URL":"https:\/\/doi.org\/10.1145\/2875913.2875932","relation":{},"subject":[],"published":{"date-parts":[[2015,11,6]]},"assertion":[{"value":"2015-11-06","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}