{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,30]],"date-time":"2024-10-30T22:53:17Z","timestamp":1730328797775,"version":"3.28.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2002,7]]},"DOI":"10.1145\/566172.566191","type":"proceedings-article","created":{"date-parts":[[2004,4,19]],"date-time":"2004-04-19T17:18:43Z","timestamp":1082395123000},"page":"123-133","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":274,"title":["Korat"],"prefix":"10.1145","author":[{"given":"Chandrasekhar","family":"Boyapati","sequence":"first","affiliation":[{"name":"MIT Laboratory for Computer Science, Cambridge, MA"}]},{"given":"Sarfraz","family":"Khurshid","sequence":"additional","affiliation":[{"name":"MIT Laboratory for Computer Science, Cambridge, MA"}]},{"given":"Darko","family":"Marinov","sequence":"additional","affiliation":[{"name":"MIT Laboratory for Computer Science, Cambridge, MA"}]}],"member":"320","published-online":{"date-parts":[[2002,7]]},"reference":[{"doi-asserted-by":"publisher","key":"e_1_3_2_1_1_1","DOI":"10.1145\/319151.319164"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_2_1","DOI":"10.1002\/1099-1689(200009)10:3<149::AID-STVR206>3.0.CO;2-T"},{"key":"e_1_3_2_1_3_1","volume-title":"July","author":"Bech K.","year":"1998","unstructured":"K. Bech and E. Gamma . Test infected: Programmers love writing tests. Java Report, 3(7) , July 1998 . K. Bech and E. Gamma. Test infected: Programmers love writing tests. Java Report, 3(7), July 1998."},{"key":"e_1_3_2_1_4_1","volume-title":"Software Testing Techniques","author":"Beizer B.","year":"1990","unstructured":"B. Beizer . Software Testing Techniques . International Thomson Computer Press , 1990 . B. Beizer. Software Testing Techniques. International Thomson Computer Press, 1990."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_5_1","DOI":"10.5555\/318773.318948"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_7_1","DOI":"10.1145\/337180.337234"},{"key":"e_1_3_2_1_8_1","volume-title":"Introduction to Algorithms","author":"Cormen T. H.","year":"1990","unstructured":"T. H. Cormen , C. E. Leiserson , and R. L. Rivest . Introduction to Algorithms . The MIT Press , Cambridge, MA , 1990 . T. H. Cormen, C. E. Leiserson, and R. L. Rivest. Introduction to Algorithms. The MIT Press, Cambridge, MA, 1990."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_9_1","DOI":"10.1002\/(SICI)1097-024X(199906)29:7<577::AID-SPE246>3.0.CO;2-V"},{"key":"e_1_3_2_1_11_1","volume-title":"Design Patterns: Elements od Reusable Object-Oriented Software","author":"Gamma E.","year":"1995","unstructured":"E. Gamma , R. Helm , R. Johnson , and J. Vlissides . Design Patterns: Elements od Reusable Object-Oriented Software . Addison-Wesley Professional Computing Series. Addison-Wesley Publishing Company , New York, NY, 1995 . E. Gamma, R. Helm, R. Johnson, and J. Vlissides. Design Patterns: Elements od Reusable Object-Oriented Software. Addison-Wesley Professional Computing Series. Addison-Wesley Publishing Company, New York, NY, 1995."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_12_1","DOI":"10.1145\/263699.263717"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_13_1","DOI":"10.1145\/390016.808473"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_14_1","DOI":"10.1109\/32.588521"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_15_1","DOI":"10.5555\/647281.722765"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_16_1","DOI":"10.1145\/337180.337616"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_17_1","DOI":"10.1145\/503209.503219"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_18_1","DOI":"10.1145\/347324.383378"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_19_1","DOI":"10.1145\/503272.503276"},{"key":"e_1_3_2_1_21_1","volume-title":"Program Development in Java: Abstraction, Specification, and Object-Oriented Design","author":"Liskov B.","year":"2000","unstructured":"B. Liskov . Program Development in Java: Abstraction, Specification, and Object-Oriented Design . Addison-Wesley , 2000 . B. Liskov. Program Development in Java: Abstraction, Specification, and Object-Oriented Design. Addison-Wesley, 2000."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_22_1","DOI":"10.5555\/872023.872551"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4615-3190-6","volume-title":"Symbolic Model Checking","author":"McMillan K.","year":"1993","unstructured":"K. McMillan . Symbolic Model Checking . Kluwer Academic Publishers , 1993 . K. McMillan. Symbolic Model Checking. Kluwer Academic Publishers, 1993."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_24_1","DOI":"10.1145\/378795.378851"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_25_1","DOI":"10.5555\/1767297.1767341"},{"key":"e_1_3_2_1_26_1","volume-title":"The Unified Modeling Language Reference Manual","author":"Rumbaugh J.","year":"1998","unstructured":"J. Rumbaugh , I. Jacobson , and G. Booch . The Unified Modeling Language Reference Manual . Addison-Wesley Object Technology Series , 1998 . J. Rumbaugh, I. Jacobson, and G. Booch. The Unified Modeling Language Reference Manual. Addison-Wesley Object Technology Series, 1998."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_27_1","DOI":"10.1145\/271510.271517"},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_29_1","DOI":"10.1016\/S1571-0653(04)00311-7"},{"issue":"2","key":"e_1_3_2_1_30_1","article-title":"The encyclopedia of integer sequences","volume":"38","author":"Sloane N. J. A.","year":"1996","unstructured":"N. J. A. Sloane , S. Plouffe , J. M. Borwein , and R. M. Corless . The encyclopedia of integer sequences . SIAM Review , 38 ( 2 ), 1996 . http:\/\/www.research.att.com\/~njas\/sequences\/Seis.html. N. J. A. Sloane, S. Plouffe, J. M. Borwein, and R. M. Corless. The encyclopedia of integer sequences. SIAM Review, 38(2), 1996. http:\/\/www.research.att.com\/~njas\/sequences\/Seis.html.","journal-title":"SIAM Review"},{"key":"e_1_3_2_1_31_1","volume-title":"A Reference Manual","author":"Spivey J. M.","year":"1992","unstructured":"J. M. Spivey . The Z Notation : A Reference Manual . Prentice Hall , second edition, 1992 . J. M. Spivey. The Z Notation: A Reference Manual. Prentice Hall, second edition, 1992."},{"doi-asserted-by":"publisher","key":"e_1_3_2_1_32_1","DOI":"10.5555\/786768.786967"}],"event":{"sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering"],"acronym":"ISSTA02","name":"ISSTA02: International Symposium on Software Testing and Analysis ( co-located with WOSP 2002)","location":"Roma Italy"},"container-title":["Proceedings of the 2002 ACM SIGSOFT international symposium on Software testing and analysis"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/566172.566191","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,4]],"date-time":"2023-09-04T15:48:29Z","timestamp":1693842509000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/566172.566191"}},"subtitle":["automated testing based on Java predicates"],"short-title":[],"issued":{"date-parts":[[2002,7]]},"references-count":28,"alternative-id":["10.1145\/566172.566191","10.1145\/566172"],"URL":"https:\/\/doi.org\/10.1145\/566172.566191","relation":{"is-identical-to":[{"id-type":"doi","id":"10.1145\/566171.566191","asserted-by":"object"}]},"subject":[],"published":{"date-parts":[[2002,7]]},"assertion":[{"value":"2002-07-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}