{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,25]],"date-time":"2026-02-25T18:11:11Z","timestamp":1772043071329,"version":"3.50.1"},"publisher-location":"New York, NY, USA","reference-count":82,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,7,10]],"date-time":"2017-07-10T00:00:00Z","timestamp":1499644800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2017,7,10]]},"DOI":"10.1145\/3092703.3092714","type":"proceedings-article","created":{"date-parts":[[2017,7,11]],"date-time":"2017-07-11T20:17:18Z","timestamp":1499804238000},"page":"295-306","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":47,"title":["Faster mutation analysis via equivalence modulo states"],"prefix":"10.1145","author":[{"given":"Bo","family":"Wang","sequence":"first","affiliation":[{"name":"Peking University, China"}]},{"given":"Yingfei","family":"Xiong","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"given":"Yangqingwei","family":"Shi","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"given":"Lu","family":"Zhang","sequence":"additional","affiliation":[{"name":"Peking University, China"}]},{"given":"Dan","family":"Hao","sequence":"additional","affiliation":[{"name":"Peking University, China"}]}],"member":"320","published-online":{"date-parts":[[2017,7,10]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"crossref","unstructured":"Iftekhar Ahmed Carlos Jensen Alex Groce and Paul E McKenney. 2017. Applying Mutation Analysis on Kernel Test Suites: An Experience Report. In ICSTW. 110\u2013115.  Iftekhar Ahmed Carlos Jensen Alex Groce and Paul E McKenney. 2017. Applying Mutation Analysis on Kernel Test Suites: An Experience Report. In ICSTW. 110\u2013115.","DOI":"10.1109\/ICSTW.2017.26"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062530"},{"key":"e_1_3_2_1_3_1","volume-title":"O\u2019Hallaron David Richard, and O\u2019Hallaron David Richard","author":"Bryant Randal E","year":"2003","unstructured":"Randal E Bryant , O\u2019Hallaron David Richard, and O\u2019Hallaron David Richard . 2003 . Randal E Bryant, O\u2019Hallaron David Richard, and O\u2019Hallaron David Richard. 2003."},{"key":"e_1_3_2_1_4_1","volume-title":"a programmer\u2019s perspective","author":"Computer","unstructured":"Computer systems : a programmer\u2019s perspective . Prentice Hall Upper Saddle River . Computer systems: a programmer\u2019s perspective. Prentice Hall Upper Saddle River."},{"key":"e_1_3_2_1_5_1","volume-title":"Assessing and Comparing Mutation-based Fault Localization Techniques. arXiv preprint arXiv:1607.05512","author":"Chekam Thierry Titcheu","year":"2016","unstructured":"Thierry Titcheu Chekam , Mike Papadakis , and Yves Le Traon . 2016. Assessing and Comparing Mutation-based Fault Localization Techniques. arXiv preprint arXiv:1607.05512 ( 2016 ). Thierry Titcheu Chekam, Mike Papadakis, and Yves Le Traon. 2016. Assessing and Comparing Mutation-based Fault Localization Techniques. arXiv preprint arXiv:1607.05512 (2016)."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2666610"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884821"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-005-3861-2"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Vinicius HS Durelli Jeff Offutt and Marcio E Delamaro. 2012. Toward harnessing high-level language virtual machines for further speeding up weak mutation testing. In ICST. 681\u2013690.  Vinicius HS Durelli Jeff Offutt and Marcio E Delamaro. 2012. Toward harnessing high-level language virtual machines for further speeding up weak mutation testing. In ICST. 681\u2013690.","DOI":"10.1109\/ICST.2012.158"},{"key":"e_1_3_2_1_11_1","unstructured":"Gordon Fraser and Andrea Arcuri. 2015.  Gordon Fraser and Andrea Arcuri. 2015."},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-013-9299-z"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.93"},{"key":"e_1_3_2_1_14_1","volume-title":"Eva May, Gordon Fraser, and Andreas Zeller.","author":"Galeotti Juan P","year":"2015","unstructured":"Juan P Galeotti , Carlo A Furia , Eva May, Gordon Fraser, and Andreas Zeller. 2015 . Juan P Galeotti, Carlo A Furia, Eva May, Gordon Fraser, and Andreas Zeller. 2015."},{"key":"e_1_3_2_1_15_1","volume-title":"dynamic analysis, and static checking","author":"Inferring","year":"2015","unstructured":"Inferring loop invariants by mutation , dynamic analysis, and static checking . IEEE Transactions on Software Engineering 41, 10 ( 2015 ), 1019\u20131037. Inferring loop invariants by mutation, dynamic analysis, and static checking. IEEE Transactions on Software Engineering 41, 10 (2015), 1019\u20131037."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1469"},{"key":"e_1_3_2_1_17_1","unstructured":"Milos Gligoric Lingming Zhang Cristiano Pereira and Gilles Pokam. 2013.  Milos Gligoric Lingming Zhang Cristiano Pereira and Gilles Pokam. 2013."},{"key":"e_1_3_2_1_18_1","volume-title":"Proc. ISSTA. 224\u2013234","author":"Selective","unstructured":"Selective mutation testing for concurrent code . In Proc. ISSTA. 224\u2013234 . Selective mutation testing for concurrent code. In Proc. ISSTA. 224\u2013234."},{"key":"e_1_3_2_1_19_1","volume-title":"Measuring Effectiveness of Mutant Sets","author":"Gopinath Rahul","unstructured":"Rahul Gopinath , Amin Alipour , Iftekhar Ahmed , Carlos Jensen , and Alex Groce . 2016. Measuring Effectiveness of Mutant Sets . In IEEE ICSTW. 132\u2013141. Rahul Gopinath, Amin Alipour, Iftekhar Ahmed, Carlos Jensen, and Alex Groce. 2016. Measuring Effectiveness of Mutant Sets. In IEEE ICSTW. 132\u2013141."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884787"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/2889160.2892655"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.231145"},{"key":"e_1_3_2_1_23_1","volume-title":"Pedro Reales Mateo, and Macario Polo","author":"Harman Mark","year":"2014","unstructured":"Mark Harman , Yue Jia , Pedro Reales Mateo, and Macario Polo . 2014 . Mark Harman, Yue Jia, Pedro Reales Mateo, and Macario Polo. 2014."},{"key":"e_1_3_2_1_24_1","unstructured":"Angels and monsters: An empirical investigation of potential test effectiveness and efficiency improvement from strongly subsuming higher order mutation. In ASE. 397\u2013408.  Angels and monsters: An empirical investigation of potential test effectiveness and efficiency improvement from strongly subsuming higher order mutation. In ASE. 397\u2013408."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"crossref","unstructured":"Shin Hong Byeongcheol Lee Taehoon Kwak Yiru Jeon Bongsuk Ko Yunho Kim and Moonzoo Kim. 2015. Mutation-based fault localization for real-world multilingual programs (T). In ASE. 464\u2013475.  Shin Hong Byeongcheol Lee Taehoon Kwak Yiru Jeon Bongsuk Ko Yunho Kim and Moonzoo Kim. 2015. Mutation-based fault localization for real-world multilingual programs (T). In ASE. 464\u2013475.","DOI":"10.1109\/ASE.2015.14"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2007.4362630"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1982.235571"},{"key":"e_1_3_2_1_28_1","unstructured":"Changbin Ji Zhenyu Chen Baowen Xu and Zhihong Zhao. 2009.  Changbin Ji Zhenyu Chen Baowen Xu and Zhihong Zhao. 2009."},{"key":"e_1_3_2_1_29_1","unstructured":"A Novel Method of Mutation Clustering Based on Domain Analysis.. In SEKE. 422\u2013425.  A Novel Method of Mutation Clustering Based on Domain Analysis.. In SEKE. 422\u2013425."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628053"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610388"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635929"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2012.31"},{"key":"e_1_3_2_1_35_1","unstructured":"Ren \u00e9 Just Bob Kurtz and Paul Ammann. 2017.  Ren \u00e9 Just Bob Kurtz and Paul Ammann. 2017."},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1561"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100138"},{"key":"e_1_3_2_1_39_1","unstructured":"Dongsun Kim Jaechang Nam Jaewoo Song and Sunghun Kim. 2013. Automatic patch generation learned from human-written patches. In ICSE \u201913. 802\u2013811.   Dongsun Kim Jaechang Nam Jaewoo Song and Sunghun Kim. 2013. Automatic patch generation learned from human-written patches. In ICSE \u201913. 802\u2013811."},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380210704"},{"key":"e_1_3_2_1_41_1","unstructured":"Edward W. Krauser Aditya P. Mathur and Vernon J Rego. 1991.  Edward W. Krauser Aditya P. Mathur and Vernon J Rego. 1991."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.90444"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950322"},{"key":"e_1_3_2_1_44_1","unstructured":"Chris Lattner and Vikram Adve. 2004.  Chris Lattner and Vikram Adve. 2004."},{"key":"e_1_3_2_1_45_1","volume-title":"A compilation framework for lifelong program analysis &amp","author":"LLVM","unstructured":"LLVM : A compilation framework for lifelong program analysis &amp ; transformation. In CGO. 75\u201386. LLVM: A compilation framework for lifelong program analysis &amp; transformation. In CGO. 75\u201386."},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"crossref","unstructured":"Thomas Loise Xavier Devroey Gilles Perrouin Mike Papadakis and Patrick Heymans. 2017. Towards Security-aware Mutation Testing. In ICSTW. 97\u2013102.  Thomas Loise Xavier Devroey Gilles Perrouin Mike Papadakis and Patrick Heymans. 2017. Towards Security-aware Mutation Testing. In ICSTW. 97\u2013102.","DOI":"10.1109\/ICSTW.2017.24"},{"key":"e_1_3_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381798"},{"key":"e_1_3_2_1_48_1","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242663"},{"key":"e_1_3_2_1_49_1","unstructured":"Shabnam Mirshokraie Ali Mesbah and Karthik Pattabiraman. 2015.  Shabnam Mirshokraie Ali Mesbah and Karthik Pattabiraman. 2015."},{"key":"e_1_3_2_1_50_1","volume-title":"IEEE Transactions on Software Engineering 41, 5","author":"Guided","year":"2015","unstructured":"Guided mutation testing for javascript web applications. IEEE Transactions on Software Engineering 41, 5 ( 2015 ), 429\u2013444. Guided mutation testing for javascript web applications. IEEE Transactions on Software Engineering 41, 5 (2015), 429\u2013444."},{"key":"e_1_3_2_1_51_1","unstructured":"Seokhyeon Moon Yunho Kim Moonzoo Kim and Shin Yoo. 2014.  Seokhyeon Moon Yunho Kim Moonzoo Kim and Shin Yoo. 2014."},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.28"},{"key":"e_1_3_2_1_53_1","first-page":"233","article-title":"Mutation analysis for security tests qualification","volume":"2007","author":"Mouelhi Tejeddine","year":"2007","unstructured":"Tejeddine Mouelhi , Yves Le Traon , and Benoit Baudry . 2007 . Mutation analysis for security tests qualification . In TAICPART-MUTATION 2007. 233 \u2013 242 . Tejeddine Mouelhi, Yves Le Traon, and Benoit Baudry. 2007. Mutation analysis for security tests qualification. In TAICPART-MUTATION 2007. 233\u2013242.","journal-title":"TAICPART-MUTATION"},{"key":"e_1_3_2_1_54_1","doi-asserted-by":"crossref","unstructured":"A Jefferson Offutt and W Michael Craft. 1994.  A Jefferson Offutt and W Michael Craft. 1994.","DOI":"10.17077\/2168-569X.1185"},{"key":"e_1_3_2_1_55_1","volume-title":"131\u2013154","author":"Software Testing Using","year":"1994","unstructured":"Using compiler optimization techniques to detect equivalent mutants. Software Testing , Verification and Reliability 4, 3 ( 1994 ), 131\u2013154 . Using compiler optimization techniques to detect equivalent mutants. Software Testing, Verification and Reliability 4, 3 (1994), 131\u2013154."},{"key":"e_1_3_2_1_56_1","volume-title":"Proc. ICPP.","author":"Offutt A Jefferson","year":"1992","unstructured":"A Jefferson Offutt , Roy P Pargas , Scott V Fichter , and Prashant K Khambekar . 1992 . Mutation testing of software using a MIMD computer . In Proc. ICPP. A Jefferson Offutt, Roy P Pargas, Scott V Fichter, and Prashant K Khambekar. 1992. Mutation testing of software using a MIMD computer. In Proc. ICPP."},{"key":"e_1_3_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.5555\/2662413.2662439"},{"key":"e_1_3_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931040"},{"key":"e_1_3_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.11"},{"key":"e_1_3_2_1_60_1","doi-asserted-by":"crossref","unstructured":"Mike Papadakis Yue Jia Mark Harman and Yves Le Traon. 2015. Trivial compiler equivalence: A large scale empirical study of a simple fast and effective equivalent mutant detection technique. In ICSE. 936\u2013946.   Mike Papadakis Yue Jia Mark Harman and Yves Le Traon. 2015. Trivial compiler equivalence: A large scale empirical study of a simple fast and effective equivalent mutant detection technique. In ICSE. 936\u2013946.","DOI":"10.1109\/ICSE.2015.103"},{"key":"e_1_3_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.159"},{"key":"e_1_3_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1145\/2554850.2554978"},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1509"},{"key":"e_1_3_2_1_64_1","unstructured":"Spencer Pearson Jos \u00e9 Campos Ren \u00e9 Just Gordon Fraser Rui Abreu Michael D. Ernst Deric Pang and Benjamin Keller. 2017.  Spencer Pearson Jos \u00e9 Campos Ren \u00e9 Just Gordon Fraser Rui Abreu Michael D. Ernst Deric Pang and Benjamin Keller. 2017."},{"key":"e_1_3_2_1_65_1","unstructured":"Evaluating &amp; improving fault localization techniques. In ICSE.  Evaluating &amp; improving fault localization techniques. In ICSE."},{"key":"e_1_3_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568254"},{"key":"e_1_3_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595750"},{"key":"e_1_3_2_1_68_1","doi-asserted-by":"publisher","DOI":"10.1145\/2897010.2897012"},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"crossref","unstructured":"Susumu Tokumoto Hiroaki Yoshida Kazunori Sakamoto and Shinichi Honiden. 2016. MuVM: Higher Order Mutation Analysis Virtual Machine for C. In ICST. 320\u2013329.  Susumu Tokumoto Hiroaki Yoshida Kazunori Sakamoto and Shinichi Honiden. 2016. MuVM: Higher Order Mutation Analysis Virtual Machine for C. In ICST. 320\u2013329.","DOI":"10.1109\/ICST.2016.18"},{"key":"e_1_3_2_1_70_1","unstructured":"Roland H Untch A Jefferson Offutt and Mary Jean Harrold. 1993.  Roland H Untch A Jefferson Offutt and Mary Jean Harrold. 1993."},{"key":"e_1_3_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/154183.154265"},{"key":"e_1_3_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693094"},{"key":"e_1_3_2_1_73_1","volume-title":"Claire Le Goues, and Stephanie Forrest","author":"Weimer Westley","year":"2009","unstructured":"Westley Weimer , ThanhVu Nguyen , Claire Le Goues, and Stephanie Forrest . 2009 . Westley Weimer, ThanhVu Nguyen, Claire Le Goues, and Stephanie Forrest. 2009."},{"key":"e_1_3_2_1_74_1","unstructured":"Automatically finding patches using genetic programming. In ICSE \u201909. 364\u2013374.  Automatically finding patches using genetic programming. In ICSE \u201909. 364\u2013374."},{"key":"e_1_3_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(94)00098-0"},{"key":"e_1_3_2_1_76_1","unstructured":"Xiangjuan Yao Mark Harman and Yue Jia. 2014.  Xiangjuan Yao Mark Harman and Yue Jia. 2014."},{"key":"e_1_3_2_1_77_1","unstructured":"A study of equivalent and stubborn mutation operators using human analysis of equivalence. In ICSE. 919\u2013930.  A study of equivalent and stubborn mutation operators using human analysis of equivalence. In ICSE. 919\u2013930."},{"key":"e_1_3_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931038"},{"key":"e_1_3_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2014.27"},{"key":"e_1_3_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806863"},{"key":"e_1_3_2_1_81_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483782"},{"key":"e_1_3_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336793"},{"key":"e_1_3_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2010.5609672"}],"event":{"name":"ISSTA '17: International Symposium on Software Testing and Analysis","location":"Santa Barbara CA USA","acronym":"ISSTA '17","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"]},"container-title":["Proceedings of the 26th ACM SIGSOFT International Symposium on Software Testing and Analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3092703.3092714","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3092703.3092714","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T03:37:26Z","timestamp":1750217846000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3092703.3092714"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,7,10]]},"references-count":82,"alternative-id":["10.1145\/3092703.3092714","10.1145\/3092703"],"URL":"https:\/\/doi.org\/10.1145\/3092703.3092714","relation":{},"subject":[],"published":{"date-parts":[[2017,7,10]]},"assertion":[{"value":"2017-07-10","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}