{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:07:04Z","timestamp":1759032424243,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":16,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,14]],"date-time":"2016-05-14T00:00:00Z","timestamp":1463184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,14]]},"DOI":"10.1145\/2896971.2896980","type":"proceedings-article","created":{"date-parts":[[2016,5,21]],"date-time":"2016-05-21T22:27:38Z","timestamp":1463869658000},"page":"19-25","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":8,"title":["Generating source inputs for metamorphic testing using dynamic symbolic execution"],"prefix":"10.1145","author":[{"given":"Eman","family":"Alatawi","sequence":"first","affiliation":[{"name":"The University of Melbourne"}]},{"given":"Tim","family":"Miller","sequence":"additional","affiliation":[{"name":"The University of Melbourne"}]},{"given":"Harald","family":"S\u00f8ndergaard","sequence":"additional","affiliation":[{"name":"The University of Melbourne"}]}],"member":"320","published-online":{"date-parts":[[2016,5,14]]},"reference":[{"key":"e_1_3_2_1_1_1","first-page":"128","volume-title":"5th Int. Conf. Software Eng., Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD). Int. Assoc. Computer and Information Science","author":"Chen T. Y.","year":"2004","unstructured":"T. Y. Chen , F.-C. Kuo , Y. Liu , and A. Tang , \" Metamorphic testing and testing with special values,\" in Proc . 5th Int. Conf. Software Eng., Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD). Int. Assoc. Computer and Information Science , 2004 , pp. 128 -- 134 . T. Y. Chen, F.-C. Kuo, Y. Liu, and A. Tang, \"Metamorphic testing and testing with special values,\" in Proc. 5th Int. Conf. Software Eng., Artificial Intelligence, Networking and Parallel\/Distributed Computing (SNPD). Int. Assoc. Computer and Information Science, 2004, pp. 128--134."},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1572272.1572295"},{"key":"e_1_3_2_1_3_1","first-page":"151","volume-title":"Network and Distributed System Security Symp. (NDSS). The Internet Society","author":"Godefroid P.","year":"2008","unstructured":"P. Godefroid , M. Levin , and D. Molnar , \" Automated whitebox fuzz testing,\" in Proc . Network and Distributed System Security Symp. (NDSS). The Internet Society , 2008 , pp. 151 -- 166 . P. Godefroid, M. Levin, and D. Molnar, \"Automated whitebox fuzz testing,\" in Proc. Network and Distributed System Security Symp. (NDSS). The Internet Society, 2008, pp. 151--166."},{"key":"e_1_3_2_1_4_1","first-page":"134","volume-title":"ser. LNCS","author":"Tillmann N.","year":"2008","unstructured":"N. Tillmann and J. De Halleux , \"Pex---white box test generation for. NET,\" in Tests and Proofs , ser. LNCS . Springer , 2008 , vol. 4966 , pp. 134 -- 153 . N. Tillmann and J. De Halleux, \"Pex---white box test generation for. NET,\" in Tests and Proofs, ser. LNCS. Springer, 2008, vol. 4966, pp. 134--153."},{"key":"e_1_3_2_1_5_1","first-page":"439","volume-title":"6th Int. Conf. New Trends in Information Science and Service Science and Data Mining (ISSDM). IEEE","author":"Chen L.","year":"2012","unstructured":"L. Chen , L. Cai , J. Liu , Z. Liu , S. Wei , and P. Liu , \" An optimized method for generating cases of metamorphic testing,\" in Proc . 6th Int. Conf. New Trends in Information Science and Service Science and Data Mining (ISSDM). IEEE , 2012 , pp. 439 -- 443 . L. Chen, L. Cai, J. Liu, Z. Liu, S. Wei, and P. Liu, \"An optimized method for generating cases of metamorphic testing,\" in Proc. 6th Int. Conf. New Trends in Information Science and Service Science and Data Mining (ISSDM). IEEE, 2012, pp. 439--443."},{"key":"e_1_3_2_1_7_1","first-page":"34","volume-title":"27th Ann. Int. Computer Software and Applications Conf. (COMPSAC). IEEE","author":"Gotlieb A.","year":"2003","unstructured":"A. Gotlieb and B. Botella , \" Automated metamorphic testing,\" in Proc . 27th Ann. Int. Computer Software and Applications Conf. (COMPSAC). IEEE , 2003 , pp. 34 -- 40 . A. Gotlieb and B. Botella, \"Automated metamorphic testing,\" in Proc. 27th Ann. Int. Computer Software and Applications Conf. (COMPSAC). IEEE, 2003, pp. 34--40."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2005.93"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.5555\/1318471.1318537"},{"key":"e_1_3_2_1_10_1","first-page":"180","volume-title":"Systems, Technology and Management","author":"Batra G.","year":"2011","unstructured":"G. Batra and J. Sengupta , \" An efficient metamorphic testing technique using genetic algorithm,\" in Information Intelligence , Systems, Technology and Management . Springer , 2011 , pp. 180 -- 188 . G. Batra and J. Sengupta, \"An efficient metamorphic testing technique using genetic algorithm,\" in Information Intelligence, Systems, Technology and Management. Springer, 2011, pp. 180--188."},{"key":"e_1_3_2_1_11_1","first-page":"193","volume-title":"4th IEEE Int. Conf. Software Eng. and Service Science (ICSESS). IEEE","author":"Dong G.","year":"2013","unstructured":"G. Dong , T. Guo , and P. Zhang , \" Security assurance with program path analysis and metamorphic testing,\" in Proc . 4th IEEE Int. Conf. Software Eng. and Service Science (ICSESS). IEEE , 2013 , pp. 193 -- 197 . G. Dong, T. Guo, and P. Zhang, \"Security assurance with program path analysis and metamorphic testing,\" in Proc. 4th IEEE Int. Conf. Software Eng. and Service Science (ICSESS). IEEE, 2013, pp. 193--197."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASWEC.2015.16"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_14_1","first-page":"569","volume-title":"4th Ibero-American Symp. Software Eng. and Knowledge Eng. (JIISIC)","author":"Chen T. Y.","year":"2004","unstructured":"T. Y. Chen , D. H. Huang , T. H. Tse , and Z. Q. Zhou , \" Case studies on the selection of useful relations in metamorphic testing,\" in Proc . 4th Ibero-American Symp. Software Eng. and Knowledge Eng. (JIISIC) , 2004 , pp. 569 -- 583 . T. Y. Chen, D. H. Huang, T. H. Tse, and Z. Q. Zhou, \"Case studies on the selection of useful relations in metamorphic testing,\" in Proc. 4th Ibero-American Symp. Software Eng. and Knowledge Eng. (JIISIC), 2004, pp. 569--583."},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568271"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635929"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/SSIRI.2011.21"}],"event":{"name":"ICSE '16: 38th International Conference on Software Engineering","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS\\DATC IEEE Computer Society","TCSE IEEE Computer Society's Tech. Council on Software Engin."],"location":"Austin Texas","acronym":"ICSE '16"},"container-title":["Proceedings of the 1st International Workshop on Metamorphic Testing"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2896971.2896980","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2896971.2896980","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:06Z","timestamp":1750221546000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2896971.2896980"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,5,14]]},"references-count":16,"alternative-id":["10.1145\/2896971.2896980","10.1145\/2896971"],"URL":"https:\/\/doi.org\/10.1145\/2896971.2896980","relation":{},"subject":[],"published":{"date-parts":[[2016,5,14]]},"assertion":[{"value":"2016-05-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}