{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:55:32Z","timestamp":1760586932919,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":69,"publisher":"ACM","license":[{"start":{"date-parts":[[2019,2,16]],"date-time":"2019-02-16T00:00:00Z","timestamp":1550275200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000001","name":"National Science Foundation","doi-asserted-by":"publisher","award":["CNS-1617424,CCF-1524852,CCF-1513201"],"award-info":[{"award-number":["CNS-1617424,CCF-1524852,CCF-1513201"]}],"id":[{"id":"10.13039\/100000001","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2019,2,16]]},"DOI":"10.1145\/3302516.3307353","type":"proceedings-article","created":{"date-parts":[[2019,2,14]],"date-time":"2019-02-14T19:37:34Z","timestamp":1550173054000},"page":"193-204","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":6,"title":["Efficient concolic testing of MPI applications"],"prefix":"10.1145","author":[{"given":"Hongbo","family":"Li","sequence":"first","affiliation":[{"name":"University of California at Riverside, USA"}]},{"given":"Zizhong","family":"Chen","sequence":"additional","affiliation":[{"name":"University of California at Riverside, USA"}]},{"given":"Rajiv","family":"Gupta","sequence":"additional","affiliation":[{"name":"University of California at Riverside, USA"}]}],"member":"320","published-online":{"date-parts":[[2019,2,16]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"{n. d.}. Catching bugs with the Automated Testing System. https:\/\/computation. llnl.gov\/research\/missionsupport\/WCI\/automatedtestingsystem  {n. d.}. Catching bugs with the Automated Testing System. https:\/\/computation. llnl.gov\/research\/missionsupport\/WCI\/automatedtestingsystem"},{"key":"e_1_3_2_1_2_1","unstructured":"{n. d.}. HPL: a portable implementation of the high-performance Linpack benchmark for distributed-memory computers. http:\/\/www.netlib.org\/benchmark\/hpl\/  {n. d.}. HPL: a portable implementation of the high-performance Linpack benchmark for distributed-memory computers. http:\/\/www.netlib.org\/benchmark\/hpl\/"},{"key":"e_1_3_2_1_3_1","unstructured":"{n. d.}. Intel MPI Benchmarks User Guide. https:\/\/software.intel.com\/enus\/ imbuserguide  {n. d.}. Intel MPI Benchmarks User Guide. https:\/\/software.intel.com\/enus\/ imbuserguide"},{"key":"e_1_3_2_1_4_1","unstructured":"{n. d.}. The Yices SMT Solver. http:\/\/yices.csl.sri.com\/  {n. d.}. The Yices SMT Solver. http:\/\/yices.csl.sri.com\/"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1390630.1390662"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2480359.2429133"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966463"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.69"},{"key":"e_1_3_2_1_9_1","first-page":"209","article-title":"KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs","volume":"8","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar , Daniel Dunbar , Dawson R Engler , 2008 . KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs .. In OSDI , Vol. 8. 209 \u2013 224 . Cristian Cadar, Daniel Dunbar, Dawson R Engler, et al. 2008. KLEE: Unassisted and Automatic Generation of High-Coverage Tests for Complex Systems Programs.. In OSDI, Vol. 8. 209\u2013224.","journal-title":"OSDI"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180166"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966475"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-34188-5_18"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792734.1792766"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273484"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635918"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2015.35"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/1064978.1065036"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1145\/2090147.2094081"},{"key":"e_1_3_2_1_19_1","unstructured":"Patrice Godefroid Michael Y Levin David A Molnar etal 2008.  Patrice Godefroid Michael Y Levin David A Molnar et al. 2008."},{"key":"e_1_3_2_1_20_1","volume-title":"NDSS","volume":"8","author":"Automated","unstructured":"Automated whitebox fuzz testing .. In NDSS , Vol. 8 . 151\u2013166. Automated whitebox fuzz testing.. In NDSS, Vol. 8. 151\u2013166."},{"key":"e_1_3_2_1_21_1","unstructured":"Christian Hovy and Julian M Kunkel. 2016. Towards Automatic and Flexible Unit Test Generation for Legacy HPC Code.. In SE-HPCCSE@ SC. 1\u20138.   Christian Hovy and Julian M Kunkel. 2016. Towards Automatic and Flexible Unit Test Generation for Legacy HPC Code.. In SE-HPCCSE@ SC. 1\u20138."},{"key":"e_1_3_2_1_22_1","unstructured":"Upulee Kanewala and James M Bieman. 2014.  Upulee Kanewala and James M Bieman. 2014."},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.05.006"},{"key":"e_1_3_2_1_24_1","unstructured":"Diane Kelly and Rebecca Sanders. 2008.  Diane Kelly and Rebecca Sanders. 2008."},{"volume-title":"Proceedings of the 3rd annual conference of the Association for Software Testing (CAST 2008: Beyond the Boundaries). Citeseer, 30\u201336","author":"The","key":"e_1_3_2_1_25_1","unstructured":"The challenge of testing scientific software . In Proceedings of the 3rd annual conference of the Association for Software Testing (CAST 2008: Beyond the Boundaries). Citeseer, 30\u201336 . The challenge of testing scientific software. In Proceedings of the 3rd annual conference of the Association for Software Testing (CAST 2008: Beyond the Boundaries). Citeseer, 30\u201336."},{"key":"e_1_3_2_1_26_1","unstructured":"Dhriti Khanna Subodh Sharma C\u00e9sar Rodr\u00edguez and Rahul Purandare. 2018.  Dhriti Khanna Subodh Sharma C\u00e9sar Rodr\u00edguez and Rahul Purandare. 2018."},{"volume-title":"Symbolic Verification of MPI Programs. In International Symposium on Formal Methods. Springer, 466\u2013484","author":"Dynamic","key":"e_1_3_2_1_27_1","unstructured":"Dynamic Symbolic Verification of MPI Programs. In International Symposium on Formal Methods. Springer, 466\u2013484 . Dynamic Symbolic Verification of MPI Programs. In International Symposium on Formal Methods. Springer, 466\u2013484."},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/2337223.2337373"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693109"},{"key":"e_1_3_2_1_30_1","unstructured":"Ignacio Laguna Dong H Ahn Bronis R de Supinski Todd Gamblin Gregory L Lee Martin Schulz Saurabh Bagchi Milind Kulkarni Bowen Zhou Zhezhe Chen etal 2015.  Ignacio Laguna Dong H Ahn Bronis R de Supinski Todd Gamblin Gregory L Lee Martin Schulz Saurabh Bagchi Milind Kulkarni Bowen Zhou Zhezhe Chen et al. 2015."},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2667219"},{"key":"e_1_3_2_1_32_1","unstructured":"Kiran Lakhotia Nikolai Tillmann Mark Harman and Jonathan De Halleux. 2010.  Kiran Lakhotia Nikolai Tillmann Mark Harman and Jonathan De Halleux. 2010."},{"volume-title":"IFIP International Conference on Testing Software and Systems. Springer, 142\u2013157","key":"e_1_3_2_1_33_1","unstructured":"Flopsy-search-based floating point constraint solving for symbolic execution . In IFIP International Conference on Testing Software and Systems. Springer, 142\u2013157 . Flopsy-search-based floating point constraint solving for symbolic execution. In IFIP International Conference on Testing Software and Systems. Springer, 142\u2013157."},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1145\/2370036.2145844"},{"key":"e_1_3_2_1_35_1","unstructured":"Hongbo Li Zizhong Chen and Rajiv Gupta. 2018.  Hongbo Li Zizhong Chen and Rajiv Gupta. 2018."},{"volume-title":"Proceedings of the International Parallel and Distributed Processing Symposium. IEEE, 865\u2013874","author":"COMPI","key":"e_1_3_2_1_36_1","unstructured":"COMPI : Concolic Testing for MPI Applications . In Proceedings of the International Parallel and Distributed Processing Symposium. IEEE, 865\u2013874 . COMPI: Concolic Testing for MPI Applications. In Proceedings of the International Parallel and Distributed Processing Symposium. IEEE, 865\u2013874."},{"key":"e_1_3_2_1_37_1","volume-title":"Storage and Analysis (SC), 2012 International Conference for. IEEE, 1\u201310","author":"Li Peng","year":"2012","unstructured":"Peng Li , Guodong Li , and Ganesh Gopalakrishnan . 2012 . Parametric flows: automated behavior equivalencing for symbolic analysis of races in CUDA programs. In High Performance Computing, Networking , Storage and Analysis (SC), 2012 International Conference for. IEEE, 1\u201310 . Peng Li, Guodong Li, and Ganesh Gopalakrishnan. 2012. Parametric flows: automated behavior equivalencing for symbolic analysis of races in CUDA programs. In High Performance Computing, Networking, Storage and Analysis (SC), 2012 International Conference for. IEEE, 1\u201310."},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/SC.2014.20"},{"key":"e_1_3_2_1_39_1","unstructured":"Daniel Liew Daniel Schemmel Cristian Cadar Alastair F Donaldson Rafael Zahl and Klaus Wehrle. 2017.  Daniel Liew Daniel Schemmel Cristian Cadar Alastair F Donaldson Rafael Zahl and Klaus Wehrle. 2017."},{"volume-title":"Automated Software Engineering (ASE), 2017 32nd IEEE\/ACM International Conference on. IEEE, 601\u2013612","key":"e_1_3_2_1_40_1","unstructured":"Floating-point symbolic execution : A case study in N-version programming . In Automated Software Engineering (ASE), 2017 32nd IEEE\/ACM International Conference on. IEEE, 601\u2013612 . Floating-point symbolic execution: A case study in N-version programming. In Automated Software Engineering (ASE), 2017 32nd IEEE\/ACM International Conference on. IEEE, 601\u2013612."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.5555\/647478.727796"},{"key":"e_1_3_2_1_42_1","unstructured":"Kai Pan Xintao Wu and Tao Xie. 2011.  Kai Pan Xintao Wu and Tao Xie. 2011."},{"key":"e_1_3_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100152"},{"key":"e_1_3_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393636"},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/1791212.1791235"},{"key":"e_1_3_2_1_46_1","unstructured":"David Schaich and Thomas DeGrand. 2015.  David Schaich and Thomas DeGrand. 2015."},{"key":"e_1_3_2_1_47_1","volume-title":"Computer Physics Communications 190","author":"Parallel","year":"2015","unstructured":"Parallel software for lattice N= 4 supersymmetric Yang\u2013Mills theory. Computer Physics Communications 190 ( 2015 ), 200\u2013212. Parallel software for lattice N= 4 supersymmetric Yang\u2013Mills theory. Computer Physics Communications 190 (2015), 200\u2013212."},{"key":"e_1_3_2_1_48_1","unstructured":"Koushik Sen and Gul Agha. 2006.  Koushik Sen and Gul Agha. 2006."},{"key":"e_1_3_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1007\/11693017_25"},{"key":"e_1_3_2_1_50_1","unstructured":"Koushik Sen and Gul Agha. 2006.  Koushik Sen and Gul Agha. 2006."},{"key":"e_1_3_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1007\/11693017_25"},{"key":"e_1_3_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1007\/11817963_38"},{"key":"e_1_3_2_1_53_1","unstructured":"Koushik Sen and Gul A Agha. 2006.  Koushik Sen and Gul A Agha. 2006."},{"key":"e_1_3_2_1_54_1","unstructured":"Concolic testing of multithreaded programs and its application to testing security protocols. Technical Report.  Concolic testing of multithreaded programs and its application to testing security protocols. Technical Report."},{"key":"e_1_3_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1145\/1095430.1081750"},{"key":"e_1_3_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635872"},{"key":"e_1_3_2_1_57_1","unstructured":"Stephen F Siegel. 2007.  Stephen F Siegel. 2007."},{"volume-title":"International Workshop on Verification, Model Checking, and Abstract Interpretation. Springer, 44\u201358","author":"Model","key":"e_1_3_2_1_58_1","unstructured":"Model checking nonblocking MPI programs. In International Workshop on Verification, Model Checking, and Abstract Interpretation. Springer, 44\u201358 . Model checking nonblocking MPI programs. In International Workshop on Verification, Model Checking, and Abstract Interpretation. Springer, 44\u201358."},{"key":"e_1_3_2_1_59_1","unstructured":"Stephen F Siegel and Timothy K Zirkel. 2011.  Stephen F Siegel and Timothy K Zirkel. 2011."},{"key":"e_1_3_2_1_60_1","volume-title":"The toolkit for accurate scientific software. Mathematics in Computer Science 5, 4","author":"TASS","year":"2011","unstructured":"TASS : The toolkit for accurate scientific software. Mathematics in Computer Science 5, 4 ( 2011 ), 395\u2013426. TASS: The toolkit for accurate scientific software. Mathematics in Computer Science 5, 4 (2011), 395\u2013426."},{"key":"e_1_3_2_1_61_1","volume-title":"Marcelo d\u00e2\u0102\u0179Amorim, and Corina S P\u0103s\u0103reanu","author":"Souza Matheus","year":"2011","unstructured":"Matheus Souza , Mateus Borges , Marcelo d\u00e2\u0102\u0179Amorim, and Corina S P\u0103s\u0103reanu . 2011 . Matheus Souza, Mateus Borges, Marcelo d\u00e2\u0102\u0179Amorim, and Corina S P\u0103s\u0103reanu. 2011."},{"volume-title":"NASA Formal Methods Symposium. Springer, 359\u2013374","author":"CORAL","key":"e_1_3_2_1_62_1","unstructured":"CORAL : solving complex constraints for symbolic pathfinder . In NASA Formal Methods Symposium. Springer, 359\u2013374 . CORAL: solving complex constraints for symbolic pathfinder. In NASA Formal Methods Symposium. Springer, 359\u2013374."},{"key":"e_1_3_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.5555\/1792786.1792798"},{"key":"e_1_3_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1145\/1147403.1147409"},{"key":"e_1_3_2_1_65_1","unstructured":"X. Wu Z. Xu D. Yan T. Wu J. Yan and J. Zhang. 2016.  X. Wu Z. Xu D. Yan T. Wu J. Yan and J. Zhang. 2016."},{"volume-title":"Floating-Point Extension of Symbolic Execution Engine for Bug Detection. In 2016 23rd Asia-Pacific Software Engineering Conference (APSEC). 265\u2013272","author":"The","key":"e_1_3_2_1_66_1","unstructured":"The Floating-Point Extension of Symbolic Execution Engine for Bug Detection. In 2016 23rd Asia-Pacific Software Engineering Conference (APSEC). 265\u2013272 . The Floating-Point Extension of Symbolic Execution Engine for Bug Detection. In 2016 23rd Asia-Pacific Software Engineering Conference (APSEC). 265\u2013272."},{"key":"e_1_3_2_1_67_1","unstructured":"Tao Xie Nikolai Tillmann Jonathan de Halleux and Wolfram Schulte. 2009.  Tao Xie Nikolai Tillmann Jonathan de Halleux and Wolfram Schulte. 2009."},{"volume-title":"IEEE\/IFIP International Conference on. Citeseer, 359\u2013368","key":"e_1_3_2_1_68_1","unstructured":"Fitness-guided path exploration in dynamic symbolic execution. In Dependable Systems &amp; Networks, 2009. DSN\u201909 . IEEE\/IFIP International Conference on. Citeseer, 359\u2013368 . Fitness-guided path exploration in dynamic symbolic execution. In Dependable Systems &amp; Networks, 2009. DSN\u201909. IEEE\/IFIP International Conference on. Citeseer, 359\u2013368."},{"key":"e_1_3_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1145\/3183440.3190336"}],"event":{"name":"CC '19: 28th International Conference on Compiler Construction","acronym":"CC '19","location":"Washington DC USA"},"container-title":["Proceedings of the 28th International Conference on Compiler Construction"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3302516.3307353","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3302516.3307353","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T23:53:55Z","timestamp":1750204435000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3302516.3307353"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,2,16]]},"references-count":69,"alternative-id":["10.1145\/3302516.3307353","10.1145\/3302516"],"URL":"https:\/\/doi.org\/10.1145\/3302516.3307353","relation":{},"subject":[],"published":{"date-parts":[[2019,2,16]]},"assertion":[{"value":"2019-02-16","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}