{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,11]],"date-time":"2026-03-11T01:44:34Z","timestamp":1773193474898,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":57,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,6,14]],"date-time":"2017-06-14T00:00:00Z","timestamp":1497398400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"NSF","doi-asserted-by":"publisher","award":["1319187, 1528133, 1618158"],"award-info":[{"award-number":["1319187, 1528133, 1618158"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Google Faculty Research Award"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,6,14]]},"DOI":"10.1145\/3062341.3062379","type":"proceedings-article","created":{"date-parts":[[2017,6,14]],"date-time":"2017-06-14T10:01:04Z","timestamp":1497434464000},"page":"347-361","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":74,"title":["Skeletal program enumeration for rigorous compiler testing"],"prefix":"10.1145","author":[{"given":"Qirun","family":"Zhang","sequence":"first","affiliation":[{"name":"University of California at Davis, USA"}]},{"given":"Chengnian","family":"Sun","sequence":"additional","affiliation":[{"name":"University of California at Davis, USA"}]},{"given":"Zhendong","family":"Su","sequence":"additional","affiliation":[{"name":"University of California at Davis, USA"}]}],"member":"320","published-online":{"date-parts":[[2017,6,14]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Dotty Compiler. http:\/\/dotty.epfl.ch\/.  Dotty Compiler. http:\/\/dotty.epfl.ch\/."},{"key":"e_1_3_2_1_2_1","unstructured":"Perennial Inc. Perennial C Compiler Validation Suite. http: \/\/www.peren.com\/pages\/cvsa_set.htm.  Perennial Inc. Perennial C Compiler Validation Suite. http: \/\/www.peren.com\/pages\/cvsa_set.htm."},{"key":"e_1_3_2_1_3_1","unstructured":"Plum Hall Inc. The Plum Hall Validation Suite for C. http: \/\/www.plumhall.com\/stec.html.  Plum Hall Inc. The Plum Hall Validation Suite for C. http: \/\/www.plumhall.com\/stec.html."},{"key":"e_1_3_2_1_4_1","unstructured":"Scala Compiler. http:\/\/www.scala-lang.org\/.  Scala Compiler. http:\/\/www.scala-lang.org\/."},{"key":"e_1_3_2_1_5_1","unstructured":"A. Balestrat. CCG. https:\/\/github.com\/Mrktn\/ccg.  A. Balestrat. CCG. https:\/\/github.com\/Mrktn\/ccg."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(97)00017-7"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566191"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.5555\/1375341.1375345"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462173"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/351240.351266"},{"key":"e_1_3_2_1_11_1","first-page":"25","article-title":"Generating constrained random data with uniform distribution","author":"Claessen K.","year":"2015","unstructured":"K. Claessen , J. Dureg\u00e5rd , and M. H. Palka . Generating constrained random data with uniform distribution . J. Funct. Program. , 25 , 2015 . K. Claessen, J. Dureg\u00e5rd, and M. H. Palka. Generating constrained random data with uniform distribution. J. Funct. Program., 25, 2015.","journal-title":"J. Funct. Program."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/1287624.1287651"},{"key":"e_1_3_2_1_13_1","unstructured":"S. M. Daniel S. Wilkerson and S. Goldsmith. Berkeley Delta. http:\/\/delta.stage.tigris.org\/.  S. M. Daniel S. Wilkerson and S. Goldsmith. Berkeley Delta. http:\/\/delta.stage.tigris.org\/."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1016\/1385-7258(72)90034-0"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/2364506.2364515"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103656.2103719"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-662-46669-8_16"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2013.15"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806835"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0956796813000178"},{"key":"e_1_3_2_1_22_1","first-page":"25","article-title":"Counting and generating terms in the binary lambda calculus","author":"Grygiel K.","year":"2015","unstructured":"K. Grygiel and P. Lescanne . Counting and generating terms in the binary lambda calculus . J. Funct. Program. , 25 , 2015 . K. Grygiel and P. Lescanne. Counting and generating terms in the binary lambda calculus. J. Funct. Program., 25, 2015.","journal-title":"J. Funct. Program."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.231145"},{"key":"e_1_3_2_1_24_1","first-page":"458","volume-title":"USENIX Security","author":"Holler C.","year":"2012","unstructured":"C. Holler , K. Herzig , and A. Zeller . Fuzzing with code fragments . In USENIX Security , pages 445\u2013 458 , 2012 . C. Holler, K. Herzig, and A. Zeller. Fuzzing with code fragments. In USENIX Security, pages 445\u2013458, 2012."},{"key":"e_1_3_2_1_25_1","first-page":"126","volume-title":"TFP","author":"Katayama S.","year":"2005","unstructured":"S. Katayama . Systematic search for lambda expressions . In TFP , pages 111\u2013 126 , 2005 . S. Katayama. Systematic search for lambda expressions. In TFP, pages 111\u2013126, 2005."},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-89197-0_21"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2103746.2103758"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1023\/B:AUSE.0000038938.10589.b9"},{"key":"e_1_3_2_1_29_1","volume-title":"Combinatorial algorithms. Part 1","author":"Knuth D. E.","year":"2011","unstructured":"D. E. Knuth . The art of computer programming. Vol . 4 A. , Combinatorial algorithms. Part 1 . Addison-Wesley , 2011 . D. E. Knuth. The art of computer programming. Vol. 4A., Combinatorial algorithms. Part 1. Addison-Wesley, 2011."},{"key":"e_1_3_2_1_30_1","volume-title":"Combinatorial algorithms: generation, enumeration, and search","author":"Kreher D. L.","year":"1999","unstructured":"D. L. Kreher and D. R. Stinson . Combinatorial algorithms: generation, enumeration, and search . CRC Press, London , New York , 1999 . D. L. Kreher and D. R. Stinson. Combinatorial algorithms: generation, enumeration, and search. CRC Press, London, New York, 1999."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814323"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2594291.2594334"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2814270.2814319"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771785"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1111037.1111042"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2012.11.019"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737986"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10852-008-9086-9"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.ipl.2011.03.006"},{"issue":"1","key":"e_1_3_2_1_40_1","first-page":"100","article-title":"Differential testing for software","volume":"10","author":"McKeeman W. M.","year":"1998","unstructured":"W. M. McKeeman . Differential testing for software . Digital Technical Journal , 10 ( 1 ): 100 \u2013 107 , 1998 . W. M. McKeeman. Differential testing for software. Digital Technical Journal, 10(1):100\u2013107, 1998.","journal-title":"Digital Technical Journal"},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.2197\/ipsjtsldm.7.91"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1145\/349299.349314"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/555142"},{"key":"e_1_3_2_1_44_1","volume-title":"NIST Handbook of Mathematical Functions","author":"Olver F. W. J.","year":"2010","unstructured":"F. W. J. Olver , D. W. Lozier , R. F. Boisvert , and C. W. Clark , editors . NIST Handbook of Mathematical Functions . Cambridge University Press , New York, NY , 2010 . F. W. J. Olver, D. W. Lozier, R. F. Boisvert, and C. W. Clark, editors. NIST Handbook of Mathematical Functions. Cambridge University Press, New York, NY, 2010."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1982595.1982615"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.5555\/646482.691453"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254104"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/2660193.2660232"},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1145\/1411286.1411292"},{"key":"e_1_3_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-30473-6_10"},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007531"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884879"},{"key":"e_1_3_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1145\/2983990.2984038"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931074"},{"key":"e_1_3_2_1_55_1","volume-title":"ICLP (Technical Communications)","author":"Tarau P.","year":"2015","unstructured":"P. Tarau . On type-directed generation of lambda terms . In ICLP (Technical Communications) , 2015 . P. Tarau. On type-directed generation of lambda terms. In ICLP (Technical Communications), 2015."},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007526"},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993532"}],"event":{"name":"PLDI '17: ACM SIGPLAN Conference on Programming Language Design and Implementation","location":"Barcelona Spain","acronym":"PLDI '17","sponsor":["SIGPLAN ACM Special Interest Group on Programming Languages"]},"container-title":["Proceedings of the 38th ACM SIGPLAN Conference on Programming Language Design and Implementation"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3062341.3062379","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3062341.3062379","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3062341.3062379","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:36:32Z","timestamp":1750203392000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3062341.3062379"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,6,14]]},"references-count":57,"alternative-id":["10.1145\/3062341.3062379","10.1145\/3062341"],"URL":"https:\/\/doi.org\/10.1145\/3062341.3062379","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/3140587.3062379","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2017,6,14]]},"assertion":[{"value":"2017-06-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}