{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:25:29Z","timestamp":1729614329775,"version":"3.28.0"},"reference-count":66,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,5]]},"DOI":"10.1109\/icse.2015.104","type":"proceedings-article","created":{"date-parts":[[2015,8,17]],"date-time":"2015-08-17T21:26:34Z","timestamp":1439846794000},"page":"947-958","source":"Crossref","is-referenced-by-count":19,"title":["Dynamic Data Flow Testing of Object Oriented Systems"],"prefix":"10.1109","author":[{"given":"Giovanni","family":"Denaro","sequence":"first","affiliation":[]},{"given":"Alessandro","family":"Margara","sequence":"additional","affiliation":[]},{"given":"Mauro","family":"Pezze","sequence":"additional","affiliation":[]},{"given":"Mattia","family":"Vivanti","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"crossref","first-page":"362","DOI":"10.1007\/3-540-06859-7_145","article-title":"First version of a data flow procedure language","volume":"19","author":"dennis","year":"1974","journal-title":"Programming Symposium Ser Lecture Notes in Computer Science"},{"key":"ref38","article-title":"A graph model for parallel computation","author":"rodriguez","year":"1969","journal-title":"Massachusetts Institute of Technology Tech Rep MIT\/LCS\/TR-6"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1985793.1986036"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1858996.1859054"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595725"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/347324.348870"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/360018.360025"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007528"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048083"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491433"},{"key":"ref60","first-page":"121","article-title":"A survey of program slicing techniques","volume":"3","author":"tip","year":"1995","journal-title":"Journal of Programming Languages"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101927"},{"key":"ref61","first-page":"1","article-title":"A brief survey of program slicing","volume":"30","author":"xu","year":"2005","journal-title":"SIGSOFT Software Engineering Notes"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/1181775.1181806"},{"key":"ref28","first-page":"253","article-title":"Parameterized unit tests","author":"tillmann","year":"2005","journal-title":"Proceedings of the 13th Joint Meeting on Foundations of Software Engineering ser ESEC\/FSE '05"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831729"},{"key":"ref27","doi-asserted-by":"crossref","DOI":"10.1007\/3-540-36577-X_40","article-title":"Generalized symbolic execution for model checking and testing","author":"khurshid","year":"2003","journal-title":"Tools and Algorithms for Construction and Analysis of Systems ser LNCS 2619"},{"key":"ref65","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1007\/3-540-45875-1_15","article-title":"Visualizing memory graphs","author":"zimmermann","year":"2002","journal-title":"Revised Lectures on Software Visualization Int'l Seminar"},{"key":"ref66","first-page":"592","article-title":"Practical object-oriented back-in-time debugging","author":"lienhard","year":"2008","journal-title":"Proceedings of the 22nd European Conference on Object-Oriented Programming ECOOP '08"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.26"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232226"},{"journal-title":"Software Testing and Analysis Process Principles and Techniques","year":"2007","author":"pezz\u00e8","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568278"},{"key":"ref22","first-page":"504","article-title":"Eclat: Automatic generation and classification of test inputs","author":"pacheco","year":"2005","journal-title":"Proceedings of the 19th European conference on Object-Oriented Programming ser ECOOP'05"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/spe.602"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.37"},{"key":"ref23","first-page":"545","article-title":"Automatic testing based on design by contract","author":"ciupa","year":"2005","journal-title":"In Proceedings of Net ObjectDays 2005 - 6th Annual International Conference on Object-Oriented and Internet-based Technologies Con-cepts and Applications for a Networked World"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/566189.566191"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2001.989787"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2003.1245302"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.417"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(88)90054-3"},{"key":"ref58","article-title":"Dynamic taint analysis for automatic detection, analysis, and signature generation of exploits on commodity software","author":"newsome","year":"2005","journal-title":"Proceedings of the 12th Annual Network and Distributed System Security Symposium"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2019599.2019600"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070546"},{"key":"ref55","first-page":"2","article-title":"Using valgrind to detect undefined value errors with bit-precision","author":"seward","year":"2005","journal-title":"Proceedings of the Annual Conference on USENIX Annual Technical Conference"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321673"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1979.234184"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1145\/506315.506316"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(90)90062-Q"},{"key":"ref11","first-page":"421","article-title":"Datec: Dataflow testing of java classes","author":"denaro","year":"2009","journal-title":"ICSE Companion '09 Proceedings of the International Conference on Software Engineering (Tool Demo)"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/32.41326"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/120807.120814"},{"key":"ref13","doi-asserted-by":"crossref","first-page":"153","DOI":"10.1007\/3-540-36579-6_12","article-title":"Scaling java points-to analysis using spark","author":"lhot\u00e1k","year":"2003","journal-title":"Proceedings of the 12th International Conference on Compiler Construction ser CC '03"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/32.6194"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.294"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025179"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/2162049.2162077"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227195"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568271"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/32.238581"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1994.296778"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-78743-3_18"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1145\/193173.195402"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.18"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698890"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ICECCS.2002.1181506"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635929"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/IWAST.2013.6595804"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2013.6606563"},{"key":"ref48","article-title":"Integration testing of procedural object-oriented languages with polymorphism","author":"orso","year":"1999","journal-title":"Proceedings of the 16th International Conference on Testing Computer Software Future Trends in Testing ser TCS '99"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/1018210.1018212"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(199602)26:2<165::AID-SPE5>3.0.CO;2-K"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/32.44376"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(96)00154-9"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.4370040104"}],"event":{"name":"2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering (ICSE)","start":{"date-parts":[[2015,5,16]]},"location":"Florence, Italy","end":{"date-parts":[[2015,5,24]]}},"container-title":["2015 IEEE\/ACM 37th IEEE International Conference on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7174815\/7194545\/07194640.pdf?arnumber=7194640","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,8,29]],"date-time":"2019-08-29T13:21:56Z","timestamp":1567084916000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7194640\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,5]]},"references-count":66,"URL":"https:\/\/doi.org\/10.1109\/icse.2015.104","relation":{},"subject":[],"published":{"date-parts":[[2015,5]]}}}