{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:20:38Z","timestamp":1750220438173,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":34,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,12,21]],"date-time":"2020-12-21T00:00:00Z","timestamp":1608508800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by-nd\/4.0\/"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,12,21]]},"DOI":"10.1145\/3324884.3416634","type":"proceedings-article","created":{"date-parts":[[2021,1,27]],"date-time":"2021-01-27T23:39:02Z","timestamp":1611790742000},"page":"734-745","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":2,"title":["Scaling client-specific equivalence checking via impact boundary search"],"prefix":"10.1145","author":[{"given":"Nick","family":"Feng","sequence":"first","affiliation":[{"name":"University of Toronto"}]},{"given":"Federico","family":"Mora","sequence":"additional","affiliation":[{"name":"University of Calfornia"}]},{"given":"Vincent","family":"Hui","sequence":"additional","affiliation":[{"name":"University of Toronto"}]},{"given":"Marsha","family":"Chechik","sequence":"additional","affiliation":[{"name":"University of Toronto"}]}],"member":"320","published-online":{"date-parts":[[2021,1,27]]},"reference":[{"key":"e_1_3_2_1_1_1","volume-title":"Ullman","author":"Aho Alfred V.","year":"1986","unstructured":"Alfred V. Aho, Ravi Sethi, and Jeffrey D. Ullman. 1986. Compilers, Principles, Techniques. Addison Wesley."},{"key":"e_1_3_2_1_2_1","volume-title":"Robert DeLine, Bart Jacobs, and K. Rustan M. Leino.","author":"Barnett Mike","year":"2006","unstructured":"Mike Barnett, Bor-Yuh Evan Chang, Robert DeLine, Bart Jacobs, and K. Rustan M. Leino. 2006. Boogie: A Modular Reusable Verifier for Object-Oriented Programs. In Proc. of FMCO'05. Springer Berlin Heidelberg, 364--387."},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-21437-0_17"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1017\/S0960129511000193"},{"key":"e_1_3_2_1_5_1","volume-title":"Schmidt","author":"Beyer Dirk","year":"2018","unstructured":"Dirk Beyer, Sumit Gulwani, and David A. Schmidt. 2018. Combining Model Checking and Data-Flow Analysis. Springer International Publishing, Cham, 493--540."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393664"},{"key":"e_1_3_2_1_7_1","volume-title":"Proc. of OSDI'08","author":"Cadar Cristian","year":"2008","unstructured":"Cristian Cadar, Daniel Dunbar, and Dawson Engler. 2008. KLEE: Unassisted and Automatic Generation of High-coverage Tests for Complex Systems Programs. In Proc. of OSDI'08. USENIX Association, Berkeley, CA, USA, 209--224."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591104"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-008-0053-x"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/3314221.3314596"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24730-2_15"},{"key":"e_1_3_2_1_12_1","volume-title":"Edwards","author":"Conway Christopher L.","year":"2005","unstructured":"Christopher L. Conway, Kedar S. Namjoshi, Dennis Dams, and Stephen A. Edwards. 2005. Incremental Algorithms for Inter-procedural Analysis of Safety Properties. In Proc. of CAV'05. Springer, 449--461."},{"key":"e_1_3_2_1_13_1","unstructured":"Eli Bendersky. 2019. Complete C99 Parser in Pure Python. https:\/\/github.com\/eliben\/pycparser."},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-41540-6_24"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642987"},{"key":"e_1_3_2_1_16_1","unstructured":"N. Feng V. Hui F. Mora and M. Chechik. 2020. CC2. https:\/\/github.com\/CC24LIFE\/CC2."},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1472"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-39910-0_16"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/363235.363259"},{"key":"e_1_3_2_1_20_1","unstructured":"ISO. 1999. ISO\/IEC 9899:1999: Programming Languages --- C."},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/325694.325713"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1007\/s10703-016-0249-4"},{"key":"e_1_3_2_1_24_1","volume-title":"SYMDIFF: A Language-Agnostic Semantic Diff Tool for Imperative Programs. In Proc. of CAV'12","author":"Lahiri Shuvendu K.","year":"2012","unstructured":"Shuvendu K. Lahiri, Chris Hawblitzel, Ming Kawaguchi, and Henrique Reb\u00ealo. 2012. SYMDIFF: A Language-Agnostic Semantic Diff Tool for Imperative Programs. In Proc. of CAV'12. Springer-Verlag, 712--717."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491452"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(98)00091-3"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/3238147.3238178"},{"key":"e_1_3_2_1_28_1","volume-title":"Myers","author":"Myers Raymond H.","year":"1990","unstructured":"Raymond H. Myers and Raymond H. Myers. 1990. Classical and Modern Regression with Applications. Vol. 2. Duxbury Press, Belmont, CA."},{"volume-title":"Proc. of SIGSOFT FSE'08","author":"Person Suzette","key":"e_1_3_2_1_29_1","unstructured":"Suzette Person, Matthew B. Dwyer, Sebastian Elbaum, and Corina S. P\u0103s\u0103reanu. 2008. Differential Symbolic Execution. In Proc. of SIGSOFT FSE'08."},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993558"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884871"},{"key":"e_1_3_2_1_32_1","volume-title":"Proc. of FMCAD'12","author":"Sery Ondrej","year":"2012","unstructured":"Ondrej Sery, Grigory Fedyukovich, and Natasha Sharygina. 2012. Incremental Upgrade Checking by Means of Interpolation-Based Function Summaries. In Proc. of FMCAD'12. IEEE, 114--121."},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1059"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66706-5_20"}],"event":{"name":"ASE '20: 35th IEEE\/ACM International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE CS"],"location":"Virtual Event Australia","acronym":"ASE '20"},"container-title":["Proceedings of the 35th IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416634","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3324884.3416634","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T20:47:22Z","timestamp":1750193242000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3324884.3416634"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,12,21]]},"references-count":34,"alternative-id":["10.1145\/3324884.3416634","10.1145\/3324884"],"URL":"https:\/\/doi.org\/10.1145\/3324884.3416634","relation":{},"subject":[],"published":{"date-parts":[[2020,12,21]]},"assertion":[{"value":"2021-01-27","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}