{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:47:22Z","timestamp":1729626442936,"version":"3.28.0"},"reference-count":35,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016,10]]},"DOI":"10.1109\/issre.2016.51","type":"proceedings-article","created":{"date-parts":[[2016,12,8]],"date-time":"2016-12-08T16:32:13Z","timestamp":1481214733000},"page":"105-115","source":"Crossref","is-referenced-by-count":8,"title":["Evaluating the Effects of Compiler Optimizations on Mutation Testing at the Compiler IR Level"],"prefix":"10.1109","author":[{"given":"Farah","family":"Hariri","sequence":"first","affiliation":[]},{"given":"August","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Hayes","family":"Converse","sequence":"additional","affiliation":[]},{"given":"Sarfraz","family":"Khurshid","sequence":"additional","affiliation":[]},{"given":"Darko","family":"Marinov","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"journal-title":"llvm-mutate","year":"0","author":"schulte","key":"ref33"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.30"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595750"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1368088.1368111"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2380445.2380498"},{"journal-title":"Neutral Networks of Realworld Programs and their Application to Automated Software Evolution","year":"2014","author":"schulte","key":"ref34"},{"journal-title":"coreutils - GNU Core Utilities","year":"0","author":"foundation","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2009.37"},{"key":"ref12","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1109\/TSE.1977.231145","article-title":"testing programs with the aid of a compiler","volume":"se 3","author":"hamlet","year":"1977","journal-title":"IEEE Transactions on Software Engineering"},{"journal-title":"Mutation Testing for the New Century","year":"2001","author":"harman","key":"ref13"},{"key":"ref14","first-page":"5.b.3-1","article-title":"On MCIDC and implementation structure: An empirical study","author":"heimdahl","year":"2008","journal-title":"DASC"},{"key":"ref15","first-page":"233","article-title":"Using program slicing to assist in the detection of equivalent mutants","volume":"9","author":"hierons","year":"1999","journal-title":"STVR"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC-PART.2008.18"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2254064.2254088"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2004.1281665"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1689(199709)7:3<165::AID-STVR143>3.0.CO;2-U"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.21236\/ADA071795"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/CMPASS.1996.507890"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062530"},{"key":"ref6","first-page":"209","article-title":"KLEE: Unassisted and automatic generation of high-coverage tests for complex systems programs","author":"cadar","year":"2008","journal-title":"OSDI"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.103"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1007\/BF00625279"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2015.7381814"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809163"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC.PART.2007.28"},{"key":"ref1","first-page":"1338","article-title":"How to overcome the equivalent mutant problem and achieve tailored selective mutation using co-evolution","author":"adamopoulos","year":"2004","journal-title":"GECCO"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635920"},{"journal-title":"clang A C Language Family Frontend for LLVM","year":"0","key":"ref22"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2012.6227146"},{"journal-title":"Tail call optimization","year":"0","key":"ref24"},{"journal-title":"The LLVM compilation infrastructure","year":"0","key":"ref23"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/227607.227610"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.4370040303"}],"event":{"name":"2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE)","start":{"date-parts":[[2016,10,23]]},"location":"Ottawa, ON, Canada","end":{"date-parts":[[2016,10,27]]}},"container-title":["2016 IEEE 27th International Symposium on Software Reliability Engineering (ISSRE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7774240\/7774490\/07774512.pdf?arnumber=7774512","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,16]],"date-time":"2019-09-16T06:20:57Z","timestamp":1568614857000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7774512\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10]]},"references-count":35,"URL":"https:\/\/doi.org\/10.1109\/issre.2016.51","relation":{},"subject":[],"published":{"date-parts":[[2016,10]]}}}