{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T10:25:31Z","timestamp":1742379931949},"reference-count":74,"publisher":"Elsevier BV","issue":"1","license":[{"start":{"date-parts":[[1985,2,1]],"date-time":"1985-02-01T00:00:00Z","timestamp":476064000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[1985,2]]},"DOI":"10.1016\/0164-1212(85)90004-4","type":"journal-article","created":{"date-parts":[[2003,8,8]],"date-time":"2003-08-08T04:49:55Z","timestamp":1060318195000},"page":"15-35","source":"Crossref","is-referenced-by-count":63,"title":["Applications of symbolic evaluation"],"prefix":"10.1016","volume":"5","author":[{"given":"Lori A.","family":"Clarke","sequence":"first","affiliation":[]},{"given":"Debra J.","family":"Richardson","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0164-1212(85)90004-4_BIB1","first-page":"576","article-title":"EXDAMS\u2014Extendable Debugging and Monitoring System","volume":"34","author":"Balzer","year":"1969"},{"key":"10.1016\/0164-1212(85)90004-4_BIB2","doi-asserted-by":"crossref","DOI":"10.1016\/0004-3702(76)90011-4","article-title":"A Partial Evaluator and Its Use As A Programming Tool","volume":"7","author":"Beckman","year":"1976","journal-title":"Artificial Intelligence"},{"key":"10.1016\/0164-1212(85)90004-4_BIB3","article-title":"The Mathlab Group, Project MAC","author":"Bogen","year":"1975"},{"key":"10.1016\/0164-1212(85)90004-4_BIB4","series-title":"Proceedings of the International Conference on Reliable Software","first-page":"234","article-title":"SELECT\u2014A Formal System for Testing and Debugging Programs by Symbolic Execution","author":"Boyer","year":"1975"},{"key":"10.1016\/0164-1212(85)90004-4_BIB5","series-title":"A Computational Logic","author":"Boyer","year":"1979"},{"key":"10.1016\/0164-1212(85)90004-4_BIB6","volume":"1","author":"Brown","year":"1973"},{"key":"10.1016\/0164-1212(85)90004-4_BIB7","article-title":"The Portable Mutation Testing Suite","author":"Budd","year":"1983"},{"key":"10.1016\/0164-1212(85)90004-4_BIB8","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1109\/TSE.1979.234207","article-title":"Symbolic Evaluation and the Analysis of Programs","volume":"SE-5","author":"Cheatham","year":"1979","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(85)90004-4_BIB9","series-title":"Proceedings of the 4th International Conference of Software Engineering","first-page":"53","article-title":"A System for Program Refinement","author":"Cheatham","year":"1979"},{"key":"10.1016\/0164-1212(85)90004-4_BIB10","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1109\/TSE.1976.233817","article-title":"A System to Generate Test Data and Symbolically Execute Programs","volume":"SE-2","author":"Clarke","year":"1976","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(85)90004-4_BIB11","first-page":"43","article-title":"Automatic Test Data Selection Techniques","volume":"2","author":"Clarke","year":"1978","journal-title":"Infotech State of the Art Report on Software Testing"},{"key":"10.1016\/0164-1212(85)90004-4_BIB12","series-title":"Computer Program Testing","first-page":"65","article-title":"Symbolic Evaluation Methods\u2014Implementations and Applications","author":"Clarke","year":"1981"},{"key":"10.1016\/0164-1212(85)90004-4_BIB13","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1109\/TSE.1982.235572","article-title":"A Close Look at Domain Testing","volume":"SE-8","author":"Clarke","year":"1982","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(85)90004-4_BIB14","series-title":"Sixteenth Hawaii International Conference on System Sciences","article-title":"A Rigorous Approach to Error-Sensitive Testing","author":"Clarke","year":"1983"},{"key":"10.1016\/0164-1212(85)90004-4_BIB15","series-title":"ACM SIGSOFT\/SIGPLAN Symposium on High-Level Debugging","article-title":"The Application of Error-Sensitive Testing Strategies to Debugging","author":"Clarke","year":"1983"},{"key":"10.1016\/0164-1212(85)90004-4_BIB16","series-title":"Programming Languages and Their Compilers","author":"Cocke","year":"1970"},{"key":"10.1016\/0164-1212(85)90004-4_BIB17","series-title":"ACM SIGSOFT Rapid Prototyping Workshop","first-page":"25","article-title":"Using Symbolic Execution To Characterize Behavior","volume":"7","author":"Cohen","year":"1982"},{"key":"10.1016\/0164-1212(85)90004-4_BIB18","article-title":"Programming by Abstract Demonstration","author":"Curry","year":"1978"},{"key":"10.1016\/0164-1212(85)90004-4_BIB19","doi-asserted-by":"crossref","first-page":"233","DOI":"10.2307\/2318447","article-title":"Hilbert's Tenth Problem is Unsolvable","volume":"80","author":"Davis","year":"1973","journal-title":"American Math. Mon."},{"key":"10.1016\/0164-1212(85)90004-4_BIB20","doi-asserted-by":"crossref","DOI":"10.1016\/0020-0190(78)90067-4","article-title":"A Probabilistic Remark on Algebraic Program Testing","volume":"7","author":"DeMillo","year":"1978","journal-title":"Information Processing Lett."},{"key":"10.1016\/0164-1212(85)90004-4_BIB21","article-title":"An Interactive Program Verifier","author":"Deutsch","year":"1973"},{"key":"10.1016\/0164-1212(85)90004-4_BIB22","article-title":"Constraint Management in the ATTEST System","author":"Dillon","year":"1981"},{"key":"10.1016\/0164-1212(85)90004-4_BIB23","article-title":"Performance Enhancement in a Well-Structured Pattern Matcher Through Partial Evaluation","author":"Emanuelson","year":"1980"},{"key":"10.1016\/0164-1212(85)90004-4_BIB24","doi-asserted-by":"crossref","first-page":"350","DOI":"10.1109\/TSE.1975.6312864","article-title":"An Experimental Program-Testing Facility","volume":"SE-1","author":"Fairley","year":"1975","journal-title":"IEEE Trans. on Software Engineering"},{"key":"10.1016\/0164-1212(85)90004-4_BIB25_1","first-page":"19","article-title":"Assigning Meaning to Programs","volume":"19","author":"Floyd","year":"1967"},{"key":"10.1016\/0164-1212(85)90004-4_BIB25_2","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/362452.362489","volume":"14","author":"Floyd","year":"1971","journal-title":"Commun. ACM"},{"key":"10.1016\/0164-1212(85)90004-4_BIB26","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1109\/TSE.1980.234487","article-title":"Error Sensitive Test Case Analysis (ESTCA)","volume":"SE-6","author":"Foster","year":"1980","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(85)90004-4_BIB27","doi-asserted-by":"crossref","DOI":"10.1145\/1010925.1010935","article-title":"Sensitive Test Data for Logical Expressions","volume":"9","author":"Foster","year":"1984","journal-title":"ACM SIGSOFT Software Engineering Notes"},{"key":"10.1016\/0164-1212(85)90004-4_BIB28","doi-asserted-by":"crossref","first-page":"227","DOI":"10.1109\/TSE.1976.233819","article-title":"On Two Problems in the Generation of Program Test Paths","volume":"SE-2","author":"Gabow","year":"1976","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(85)90004-4_BIB29","doi-asserted-by":"crossref","first-page":"156","DOI":"10.1109\/TSE.1975.6312836","article-title":"Toward a Theory of Test Data Selection","volume":"SE-1","author":"Goodenough","year":"1975","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(85)90004-4_BIB30","article-title":"Theory of Testing Computer Programs","author":"Gourlay","year":"1981"},{"key":"10.1016\/0164-1212(85)90004-4_BIB31","series-title":"Workshop on Effectiveness of Testing and Proving Methods","article-title":"Development and Application of a White Box Approach to Integration Testing","author":"Haley","year":"1982"},{"key":"10.1016\/0164-1212(85)90004-4_BIB32","doi-asserted-by":"crossref","first-page":"331","DOI":"10.1145\/356674.356677","article-title":"An Introduction to Proving the Correctness of Programs","volume":"8","author":"Hantler","year":"1976","journal-title":"Computing Surveys"},{"key":"10.1016\/0164-1212(85)90004-4_BIB33","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1145\/362452.362489","article-title":"Proof of a Program: FIND","volume":"14","author":"Hoare","year":"1971","journal-title":"Commun. ACM"},{"key":"10.1016\/0164-1212(85)90004-4_BIB34","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1109\/T-C.1975.224259","article-title":"Methodology for the Generation of Program Test Data","volume":"C-24","author":"Howden","year":"1975","journal-title":"IEEE Trans. Computer"},{"key":"10.1016\/0164-1212(85)90004-4_BIB35","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/TSE.1976.233816","article-title":"Reliability of the Path Analysis Testing Strategy","volume":"SE-2","author":"Howden","year":"1976","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(85)90004-4_BIB36","doi-asserted-by":"crossref","first-page":"266","DOI":"10.1109\/TSE.1977.231144","article-title":"Symbolic Testing and the DISSECT Symbolic Evaluation System","volume":"SE-3","author":"Howden","year":"1977","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(85)90004-4_BIB37","doi-asserted-by":"crossref","DOI":"10.1007\/BF00260923","article-title":"Algebraic Program Testing","volume":"10","author":"Howden","year":"1978","journal-title":"ACTA Informatica"},{"key":"10.1016\/0164-1212(85)90004-4_BIB38","doi-asserted-by":"crossref","first-page":"381","DOI":"10.1002\/spe.4380080402","article-title":"An Evaluation of the Effectivenss of Symbolic Testing","volume":"10","author":"Howden","year":"1978","journal-title":"Software: Practice and Experience"},{"key":"10.1016\/0164-1212(85)90004-4_BIB39","doi-asserted-by":"crossref","first-page":"113","DOI":"10.1145\/356651.356652","article-title":"An Approach to Program Testing","volume":"7","author":"Huang","year":"1975","journal-title":"ACM Computing Surveys"},{"key":"10.1016\/0164-1212(85)90004-4_BIB40","article-title":"Testing Formal Specifications to Detect Design Errors","author":"Kemmerer","year":"1984"},{"key":"10.1016\/0164-1212(85)90004-4_BIB41","article-title":"A Program Verifier","author":"King","year":"1969"},{"key":"10.1016\/0164-1212(85)90004-4_BIB42","doi-asserted-by":"crossref","first-page":"385","DOI":"10.1145\/360248.360252","article-title":"Symbolic Execution and Program Testing","volume":"19","author":"King","year":"1976","journal-title":"Commun. ACM"},{"key":"10.1016\/0164-1212(85)90004-4_BIB43","series-title":"FORTRAN Codes for Mathematical Programming","author":"Land","year":"1973"},{"key":"10.1016\/0164-1212(85)90004-4_BIB44","unstructured":"J. W. Laski, A Hierarchical Approach to Program Testing, Department of Systems Design, University of Waterloo, Waterloo, Ontario, Canada, Technical Report N0.55CFW130779."},{"key":"10.1016\/0164-1212(85)90004-4_BIB45","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/TSE.1983.236871","article-title":"A Data Flow Oriented Program Testing Strategy","volume":"SE-9","author":"Laski","year":"1983","journal-title":"IEEE Transactions of Software Engineering"},{"key":"10.1016\/0164-1212(85)90004-4_BIB46","series-title":"1980 Lisp Conference","article-title":"A Session with Tinker: Interleaving Program Testing with Program Design","author":"Lieberman","year":"1980"},{"key":"10.1016\/0164-1212(85)90004-4_BIB47","series-title":"Proceedings International Conference on Reliable Software","first-page":"534","article-title":"A View of Program Verification","author":"London","year":"1975"},{"key":"10.1016\/0164-1212(85)90004-4_BIB48","series-title":"Proceedings of the International Conference on Reliable Software","first-page":"51","article-title":"Automated Generation of Test Cast Data-Sets","author":"Miller","year":"1975"},{"key":"10.1016\/0164-1212(85)90004-4_BIB49","series-title":"The Art of Software Testing","author":"Myers","year":"1979"},{"key":"10.1016\/0164-1212(85)90004-4_BIB50","series-title":"Proceedings of COMPSAC '81","first-page":"132","article-title":"On Testing With Required Elements","author":"Ntafos","year":"1981"},{"key":"10.1016\/0164-1212(85)90004-4_BIB51","series-title":"Program Flow Analysis: Theory and Applications","article-title":"Software Engineering","author":"Osterweil","year":"1981"},{"key":"10.1016\/0164-1212(85)90004-4_BIB52","series-title":"Proceedings of the Fourth International Conference of Software Engineering","first-page":"63","article-title":"Pragmatic Techniques for Program Analysis and Verification","author":"Ploedereder","year":"1979"},{"key":"10.1016\/0164-1212(85)90004-4_BIB53","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1109\/TSE.1976.233835","article-title":"On the Automated Generation of Program Test Data","volume":"SE-2","author":"Ramamorthy","year":"1976","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(85)90004-4_BIB54","series-title":"Sixth International Conference on Software Engineering","article-title":"Data Flow Analysis Techniques for Test Data Selection","author":"Rapps","year":"1982"},{"key":"10.1016\/0164-1212(85)90004-4_BIB55","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1109\/TSE.1983.236597","article-title":"An Engineering Approach to Test Data Design","volume":"SE-9","author":"Redwine","year":"1983","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(85)90004-4_BIB56","article-title":"SYMPLR, SYmbolic Multivariate Polynomial Linearization and Reduction","author":"Richardson","year":"1978"},{"key":"10.1016\/0164-1212(85)90004-4_BIB57","series-title":"Digest of the Workshop on Software Testing and Test Documentation","first-page":"19","article-title":"Theoretical Consideration in Testing Programs by Demonstrating Consistency with Specifications","author":"Richardson","year":"1978"},{"key":"10.1016\/0164-1212(85)90004-4_BIB58","series-title":"Fifth International Conference on Software Engineering","first-page":"244","article-title":"A Partition Analysis Method to Increase Program Reliability","author":"Richardson","year":"1981"},{"key":"10.1016\/0164-1212(85)90004-4_BIB59","article-title":"Specifications for Partition Analysis","author":"Richardson","year":"1981"},{"key":"10.1016\/0164-1212(85)90004-4_BIB60","series-title":"Proceedings of the IEEE Sixth International Computer Software and Applications Conference","first-page":"529","article-title":"On the Effectivenss of the Partition Analysis Method","author":"Richardson","year":"1982"},{"key":"10.1016\/0164-1212(85)90004-4_BIB61","doi-asserted-by":"crossref","first-page":"181","DOI":"10.1145\/322234.322247","article-title":"On the Use of Transcendentals for Program Testing","volume":"28","author":"Rowland","year":"1981","journal-title":"J. Assoc. Computing Machinery"},{"key":"10.1016\/0164-1212(85)90004-4_BIB62","article-title":"Pygmalion: A Creative Programming Environment","author":"Smith","year":"1975","journal-title":"Stanford Ph.D. thesis"},{"key":"10.1016\/0164-1212(85)90004-4_BIB63","series-title":"Rec. 1973 Symposium on Software Reliability","first-page":"94","article-title":"Automatic Generation of Self-Metric Software","author":"Stucki","year":"1973"},{"key":"10.1016\/0164-1212(85)90004-4_BIB64","article-title":"The Harvard Program Manipulation System","author":"Townley","year":"1976"},{"key":"10.1016\/0164-1212(85)90004-4_BIB65","doi-asserted-by":"crossref","first-page":"286","DOI":"10.1109\/TSE.1980.230474","article-title":"SADAT\u2014An Automated Testing Tool","volume":"SE-6","author":"Voges","year":"1980","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(85)90004-4_BIB66","doi-asserted-by":"crossref","first-page":"237","DOI":"10.1109\/TSE.1979.234185","article-title":"A Method for Analyzing Loop Programs","volume":"SE-5","author":"Waters","year":"1979","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(85)90004-4_BIB67","series-title":"Fifth International Conference on Software Engineering","first-page":"439","article-title":"Program Slicing","author":"Weiser","year":"1981"},{"key":"10.1016\/0164-1212(85)90004-4_BIB68","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1109\/TSE.1980.234485","article-title":"Theories of Program Testing and the Application of Revealing Subdomains","volume":"SE-6","author":"Weyuker","year":"1980","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(85)90004-4_BIB69","article-title":"An Error-Based Testing Strategy","author":"Weyuker","year":"1981"},{"key":"10.1016\/0164-1212(85)90004-4_BIB70","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1109\/TSE.1980.234486","article-title":"A Domain Strategy for Computer Program Testing","volume":"SE-6","author":"White","year":"1980","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(85)90004-4_BIB71","article-title":"A Definition of AID: the ATTEST Interface Description Language","author":"Winters","year":"1978"},{"key":"10.1016\/0164-1212(85)90004-4_BIB72","article-title":"Path Selection for Symbolic Execution Systems","author":"Woods","year":"1980"},{"key":"10.1016\/0164-1212(85)90004-4_BIB73","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1109\/TSE.1983.236870","article-title":"Testing for Perturbations of Program Statements","volume":"SE-9","author":"Zeil","year":"1983","journal-title":"IEEE Trans. Software Engineering"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0164121285900044?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0164121285900044?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,3,15]],"date-time":"2019-03-15T02:54:43Z","timestamp":1552618483000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0164121285900044"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1985,2]]},"references-count":74,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1985,2]]}},"alternative-id":["0164121285900044"],"URL":"https:\/\/doi.org\/10.1016\/0164-1212(85)90004-4","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[1985,2]]}}}