{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,4]],"date-time":"2025-11-04T16:05:03Z","timestamp":1762272303876,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":44,"publisher":"ACM","license":[{"start":{"date-parts":[[2018,5,27]],"date-time":"2018-05-27T00:00:00Z","timestamp":1527379200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2018,5,27]]},"DOI":"10.1145\/3183519.3183554","type":"proceedings-article","created":{"date-parts":[[2018,6,12]],"date-time":"2018-06-12T18:12:32Z","timestamp":1528827152000},"page":"296-305","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":11,"title":["Smartunit"],"prefix":"10.1145","author":[{"given":"Chengyu","family":"Zhang","sequence":"first","affiliation":[{"name":"East China Normal University, China"}]},{"given":"Yichen","family":"Yan","sequence":"additional","affiliation":[{"name":"East China Normal University, China"}]},{"given":"Hanru","family":"Zhou","sequence":"additional","affiliation":[{"name":"East China Normal University, China"}]},{"given":"Yinbo","family":"Yao","sequence":"additional","affiliation":[{"name":"National Trusted Embedded Software Engineering Technology Research Center, China"}]},{"given":"Ke","family":"Wu","sequence":"additional","affiliation":[{"name":"National Trusted Embedded Software Engineering Technology Research Center, China"}]},{"given":"Ting","family":"Su","sequence":"additional","affiliation":[{"name":"Nanyang Technological University, Singapore"}]},{"given":"Weikai","family":"Miao","sequence":"additional","affiliation":[{"name":"East China Normal University, China"}]},{"given":"Geguang","family":"Pu","sequence":"additional","affiliation":[{"name":"East China Normal University, China"}]}],"member":"320","published-online":{"date-parts":[[2018,5,27]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2017.27"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"crossref","unstructured":"Saswat Anand Corina P\u0103s\u0103reanu and Willem Visser. 2007. JPF-SE: A symbolic execution extension to java pathfinder. Tools and Algorithms for the Construction and Analysis of Systems (2007) 134--138.   Saswat Anand Corina P\u0103s\u0103reanu and Willem Visser. 2007. JPF-SE: A symbolic execution extension to java pathfinder. Tools and Algorithms for the Construction and Analysis of Systems (2007) 134--138.","DOI":"10.1007\/978-3-540-71209-1_12"},{"key":"e_1_3_2_1_3_1","unstructured":"IEEE Standards Association et al. 1990. Standard glossary of software engineering terminology. IEEE Std (1990) 610--12.  IEEE Standards Association et al. 1990. Standard glossary of software engineering terminology. IEEE Std (1990) 610--12."},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10817-013-9295-4"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/2032305.2032319"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.69"},{"key":"e_1_3_2_1_7_1","first-page":"209","article-title":"KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs","volume":"8","author":"Cadar Cristian","year":"2008","journal-title":"OSDI"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/1455518.1455522"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1985995"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2408776.2408795"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"crossref","unstructured":"Leonardo De Moura and Nikolaj Bj\u00f8rner. 2008. Z3: An efficient SMT solver. Tools and Algorithms for the Construction and Analysis of Systems (2008) 337--340.   Leonardo De Moura and Nikolaj Bj\u00f8rner. 2008. Z3: An efficient SMT solver. Tools and Algorithms for the Construction and Analysis of Systems (2008) 337--340.","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025179"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/2685612"},{"key":"e_1_3_2_1_14_1","volume-title":"CAV","volume":"4590","author":"Ganesh Vijay","year":"2007"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/2486788.2486807"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065036"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090147.2094081"},{"key":"e_1_3_2_1_18_1","first-page":"151","article-title":"Automated whitebox fuzz testing","volume":"8","author":"Godefroid Patrice","year":"2008","journal-title":"NDSS"},{"key":"e_1_3_2_1_19_1","volume-title":"European Software Engineering Conference\/Foundations of Software Engineering (ESEC\/FSE) Industrial Track","volume":"29","author":"Kim Yunho","year":"2011"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337373"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"volume-title":"KLOVER: A symbolic execution and automatic test generation tool for C++ programs. In Computer Aided Verification","year":"2011","author":"Li Guodong","key":"e_1_3_2_1_22_1"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","unstructured":"Kin-Keung Ma Khoo Yit Phang Jeffrey Foster and Michael Hicks. 2011. Directed symbolic execution. Static Analysis (2011) 95--111.   Kin-Keung Ma Khoo Yit Phang Jeffrey Foster and Michael Hicks. 2011. Directed symbolic execution. Static Analysis (2011) 95--111.","DOI":"10.1007\/978-3-642-23702-7_11"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-02658-4_41"},{"volume-title":"ICFEM 2016, Tokyo, Japan, November 14--18, 2016, Proceedings. 26--40","year":"2016","author":"Miao Weikai","key":"e_1_3_2_1_25_1"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1145\/1297846.1297902"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100059"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2006.91"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1007\/11817963_38"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095430.1081750"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.86"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.5555\/2818754.2818834"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/3106237.3106298"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2014.23"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-016-5589-6"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1145\/3020266"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"crossref","unstructured":"Nikolai Tillmann and Jonathan De Halleux. 2008. Pex-white box test generation for. net. Tests and Proofs (2008) 134--153.   Nikolai Tillmann and Jonathan De Halleux. 2008. Pex-white box test generation for. net. Tests and Proofs (2008) 134--153.","DOI":"10.1007\/978-3-540-79124-9_10"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095430.1081745"},{"key":"e_1_3_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.2012.102"},{"key":"e_1_3_2_1_41_1","unstructured":"Gina Venolia Robert DeLine and Thomas LaToza. 2005. Software development at microsoft observed. Microsoft Research TR (2005).  Gina Venolia Robert DeLine and Thomas LaToza. 2005. Software development at microsoft observed. Microsoft Research TR (2005)."},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.5555\/3106091.3106098"},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001463"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859054"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/267580.267590"}],"event":{"name":"ICSE '18: 40th International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Gothenburg Sweden","acronym":"ICSE '18"},"container-title":["Proceedings of the 40th International Conference on Software Engineering: Software Engineering in Practice"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3183519.3183554","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3183519.3183554","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T01:08:12Z","timestamp":1750208892000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3183519.3183554"}},"subtitle":["empirical evaluations for automated unit testing of embedded software in industry"],"short-title":[],"issued":{"date-parts":[[2018,5,27]]},"references-count":44,"alternative-id":["10.1145\/3183519.3183554","10.1145\/3183519"],"URL":"https:\/\/doi.org\/10.1145\/3183519.3183554","relation":{},"subject":[],"published":{"date-parts":[[2018,5,27]]},"assertion":[{"value":"2018-05-27","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}