{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,6]],"date-time":"2026-03-06T07:17:14Z","timestamp":1772781434248,"version":"3.50.1"},"reference-count":57,"publisher":"Zhejiang University Press","issue":"9","license":[{"start":{"date-parts":[[2020,6,26]],"date-time":"2020-06-26T00:00:00Z","timestamp":1593129600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,6,26]],"date-time":"2020-06-26T00:00:00Z","timestamp":1593129600000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Front Inform Technol Electron Eng"],"published-print":{"date-parts":[[2020,9]]},"DOI":"10.1631\/fitee.1900213","type":"journal-article","created":{"date-parts":[[2020,6,26]],"date-time":"2020-06-26T01:03:26Z","timestamp":1593133406000},"page":"1267-1284","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Modified condition\/decision coverage (MC\/DC) oriented compiler optimization for symbolic execution"],"prefix":"10.1631","volume":"21","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-7092-3658","authenticated-orcid":false,"given":"Wei-jiang","family":"Hong","sequence":"first","affiliation":[]},{"given":"Yi-jun","family":"Liu","sequence":"additional","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-0874-3231","authenticated-orcid":false,"given":"Zhen-bang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"Wei","family":"Dong","sequence":"additional","affiliation":[]},{"given":"Ji","family":"Wang","sequence":"additional","affiliation":[]}],"member":"635","published-online":{"date-parts":[[2020,6,26]]},"reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/cgo.2006.37"},{"key":"ref2","volume-title":"Compilers: Principles., Techniques, and Tools","author":"Aho","year":"1986"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1017\/9781316771273"},{"key":"ref4","volume-title":"Indexing operators to extend the reach of symbolic execution","author":"Barr","year":"2018"},{"key":"ref5","volume-title":"Software Testing Techniques","author":"Beizer","year":"2003"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/1966445.1966463"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2803205"},{"key":"ref8","first-page":"209","article-title":"KLEE: unassisted and automatic generation of high-coverage tests for complex systems programs","volume-title":"Proc 8th USENIX Symp on Oper-ating Systems Design and Implementation","author":"Cadar"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1961189.1961199"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1007\/0-387-25465-x_40"},{"key":"ref11","article-title":"Learning to accelerate symbolic execution via code transformation","volume-title":"Proc 32nd European Conf on Object-Oriented Programming","author":"Chen"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/72.80341"},{"key":"ref13","article-title":"Metamorphic Testing: a New Approach for Generating Next Test Cases","author":"Chen","year":"1998","journal-title":"Technical Report HKUST-CS98\u201301, Department of Computer Science, Hong Kong University of Science and Technology, Hong Kong, China"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/2884781.2884843"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/icst.2017.29"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1007\/bf00994018"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2499368.2451152"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/1995376.1995394"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/issre.2015.7381814"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/dasc.2000.886883"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/tse.1984.5010257"},{"key":"ref23","article-title":"EUROCAE (European Organisation for Civil Aviation Equipment)","year":"1998","journal-title":"Software Considerations in Airborne Systems and Equipment Certification, RTCA DO-178B. EUROCAE, Paris, France"},{"key":"ref24","first-page":"858","article-title":"A novel symbolic execution framework for multi-procedure program analysis","volume-title":"Proc 2nd IEEE Int Conf on Broadband Network & Multimedia Technology","author":"Fan"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70952-7_20"},{"key":"ref26","volume-title":"Software Test Automation: Effective Use of Test Execution Tools","author":"Fewster","year":"2000"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"ref28","first-page":"151","article-title":"Automated whitebox fuzz testing","volume-title":"Proc Network and Distributed System Security Symp","author":"Godefroid"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/issre.2016.51"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/dasc.2001.963305"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/tse.2010.62"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771806"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/sarnof.2015.7324662"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36577-x_40"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/360248.360252"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2345156.2254088"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/cgo.2004.1281665"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/2544173.2509553"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2813885.2737965"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23702-7_11"},{"issue":"1","key":"ref41","first-page":"100","article-title":"Differential testing for software","volume":"10","author":"Mc Keeman","year":"1998","journal-title":"Dig Techn J"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/cgo.2006.38"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1145\/3092703.3092728"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.21236\/ada482657"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/2786805.2786830"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635872"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831732"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/3020266"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-79124-9_10"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ipdps.2009.5161054"},{"key":"ref51","first-page":"1","article-title":"\u2013OVERIFY: optimizing programs for fast verification","volume-title":"14th USENIX Conf on Hot Topics in Operating Systems","author":"Wagner"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180177"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/icse.2015.78"},{"key":"ref54","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-5939-6","volume-title":"Mutation Testing for the New Century","author":"Wong","year":"2001"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/3180155.3180227"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/icse.2015.80"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/267580.267590"}],"container-title":["Frontiers of Information Technology &amp; Electronic Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1900213.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1631\/FITEE.1900213\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1631\/FITEE.1900213.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2026,2,21]],"date-time":"2026-02-21T06:36:28Z","timestamp":1771655788000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1631\/FITEE.1900213"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020,6,26]]},"references-count":57,"journal-issue":{"issue":"9","published-print":{"date-parts":[[2020,9]]}},"alternative-id":["1544"],"URL":"https:\/\/doi.org\/10.1631\/fitee.1900213","relation":{},"ISSN":["2095-9184","2095-9230"],"issn-type":[{"value":"2095-9184","type":"print"},{"value":"2095-9230","type":"electronic"}],"subject":[],"published":{"date-parts":[[2020,6,26]]},"assertion":[{"value":"26 April 2019","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"21 August 2019","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"26 June 2020","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}