{"id":"https:\/\/openalex.org\/W2879731808","doi":"https:\/\/doi.org\/10.1145\/3213846.3234687","title":"Test input generation with Java PathFinder: then and now (invited talk abstract)","display_name":"Test input generation with Java PathFinder: then and now (invited talk abstract)","publication_year":2018,"publication_date":"2018-07-12","ids":{"openalex":"https:\/\/openalex.org\/W2879731808","doi":"https:\/\/doi.org\/10.1145\/3213846.3234687","mag":"2879731808"},"language":"en","primary_location":{"id":"doi:10.1145\/3213846.3234687","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1145\/3213846.3234687","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https:\/\/openalex.org\/A5102146282","display_name":"Sarfraz Khurshid","orcid":null},"institutions":[{"id":"https:\/\/openalex.org\/I86519309","display_name":"The University of Texas at Austin","ror":"https:\/\/ror.org\/00hj54h04","country_code":"US","type":"education","lineage":["https:\/\/openalex.org\/I86519309"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Sarfraz Khurshid","raw_affiliation_strings":["University of Texas at Austin, USA"],"affiliations":[{"raw_affiliation_string":"University of Texas at Austin, USA","institution_ids":["https:\/\/openalex.org\/I86519309"]}]},{"author_position":"middle","author":{"id":"https:\/\/openalex.org\/A5053134485","display_name":"Corina S. P\u0103s\u0103reanu","orcid":"https:\/\/orcid.org\/0000-0002-5579-6961"},"institutions":[{"id":"https:\/\/openalex.org\/I1280536761","display_name":"Ames Research Center","ror":"https:\/\/ror.org\/02acart68","country_code":"US","type":"facility","lineage":["https:\/\/openalex.org\/I1280536761","https:\/\/openalex.org\/I4210124779"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Corina S. P\u0103s\u0103reanu","raw_affiliation_strings":["Carnegie Mellon Silicon Valley, USA \/ NASA Ames Research Center, USA"],"affiliations":[{"raw_affiliation_string":"Carnegie Mellon Silicon Valley, USA \/ NASA Ames Research Center, USA","institution_ids":["https:\/\/openalex.org\/I1280536761"]}]},{"author_position":"last","author":{"id":"https:\/\/openalex.org\/A5088454541","display_name":"Willem Visser","orcid":"https:\/\/orcid.org\/0000-0002-0913-3091"},"institutions":[{"id":"https:\/\/openalex.org\/I26092322","display_name":"Stellenbosch University","ror":"https:\/\/ror.org\/05bk57929","country_code":"ZA","type":"education","lineage":["https:\/\/openalex.org\/I26092322"]}],"countries":["ZA"],"is_corresponding":false,"raw_author_name":"Willem Visser","raw_affiliation_strings":["Stellenbosch University, South Africa"],"affiliations":[{"raw_affiliation_string":"Stellenbosch University, South Africa","institution_ids":["https:\/\/openalex.org\/I26092322"]}]}],"institutions":[],"countries_distinct_count":2,"institutions_distinct_count":3,"corresponding_author_ids":["https:\/\/openalex.org\/A5102146282"],"corresponding_institution_ids":["https:\/\/openalex.org\/I86519309"],"apc_list":null,"apc_paid":null,"fwci":0.2947,"has_fulltext":false,"cited_by_count":2,"citation_normalized_percentile":{"value":0.61012981,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":94},"biblio":{"volume":null,"issue":null,"first_page":"1","last_page":"2"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https:\/\/openalex.org\/T10743","display_name":"Software Testing and Debugging Techniques","score":1,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1712","display_name":"Software"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},"topics":[{"id":"https:\/\/openalex.org\/T10743","display_name":"Software Testing and Debugging Techniques","score":1,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1712","display_name":"Software"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T10142","display_name":"Formal Methods in Verification","score":0.9998000264167786,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1703","display_name":"Computational Theory and Mathematics"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}},{"id":"https:\/\/openalex.org\/T12423","display_name":"Software Reliability and Analysis Research","score":0.9991000294685364,"subfield":{"id":"https:\/\/openalex.org\/subfields\/1712","display_name":"Software"},"field":{"id":"https:\/\/openalex.org\/fields\/17","display_name":"Computer Science"},"domain":{"id":"https:\/\/openalex.org\/domains\/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https:\/\/openalex.org\/keywords\/pathfinder","display_name":"Pathfinder","score":0.9361144304275513},{"id":"https:\/\/openalex.org\/keywords\/computer-science","display_name":"Computer science","score":0.8534359931945801},{"id":"https:\/\/openalex.org\/keywords\/java","display_name":"Java","score":0.7435282468795776},{"id":"https:\/\/openalex.org\/keywords\/symbolic-execution","display_name":"Symbolic execution","score":0.699406623840332},{"id":"https:\/\/openalex.org\/keywords\/programming-language","display_name":"Programming language","score":0.6844533681869507},{"id":"https:\/\/openalex.org\/keywords\/software-engineering","display_name":"Software engineering","score":0.498363733291626},{"id":"https:\/\/openalex.org\/keywords\/software-testing","display_name":"Software testing","score":0.49032071232795715},{"id":"https:\/\/openalex.org\/keywords\/software","display_name":"Software","score":0.4607705771923065},{"id":"https:\/\/openalex.org\/keywords\/black-box","display_name":"Black box","score":0.41613033413887024},{"id":"https:\/\/openalex.org\/keywords\/artificial-intelligence","display_name":"Artificial intelligence","score":0.12107431888580322},{"id":"https:\/\/openalex.org\/keywords\/world-wide-web","display_name":"World Wide Web","score":0.08601099252700806}],"concepts":[{"id":"https:\/\/openalex.org\/C2778940482","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q7144753","display_name":"Pathfinder","level":2,"score":0.9361144304275513},{"id":"https:\/\/openalex.org\/C41008148","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q21198","display_name":"Computer science","level":0,"score":0.8534359931945801},{"id":"https:\/\/openalex.org\/C548217200","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q251","display_name":"Java","level":2,"score":0.7435282468795776},{"id":"https:\/\/openalex.org\/C2779639559","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q7661178","display_name":"Symbolic execution","level":3,"score":0.699406623840332},{"id":"https:\/\/openalex.org\/C199360897","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q9143","display_name":"Programming language","level":1,"score":0.6844533681869507},{"id":"https:\/\/openalex.org\/C115903868","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q80993","display_name":"Software engineering","level":1,"score":0.498363733291626},{"id":"https:\/\/openalex.org\/C2984328558","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q188522","display_name":"Software testing","level":3,"score":0.49032071232795715},{"id":"https:\/\/openalex.org\/C2777904410","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q7397","display_name":"Software","level":2,"score":0.4607705771923065},{"id":"https:\/\/openalex.org\/C94966114","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q29256","display_name":"Black box","level":2,"score":0.41613033413887024},{"id":"https:\/\/openalex.org\/C154945302","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q11660","display_name":"Artificial intelligence","level":1,"score":0.12107431888580322},{"id":"https:\/\/openalex.org\/C136764020","wikidata":"https:\/\/www.wikidata.org\/wiki\/Q466","display_name":"World Wide Web","level":1,"score":0.08601099252700806}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1145\/3213846.3234687","is_oa":false,"landing_page_url":"https:\/\/doi.org\/10.1145\/3213846.3234687","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 27th ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"score":0.4000000059604645,"display_name":"Partnerships for the goals","id":"https:\/\/metadata.un.org\/sdg\/17"}],"awards":[],"funders":[{"id":"https:\/\/openalex.org\/F4320306076","display_name":"National Science Foundation","ror":"https:\/\/ror.org\/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":18,"referenced_works":["https:\/\/openalex.org\/W1484352250","https:\/\/openalex.org\/W1518705996","https:\/\/openalex.org\/W1523720513","https:\/\/openalex.org\/W1530895039","https:\/\/openalex.org\/W1720848645","https:\/\/openalex.org\/W2065675749","https:\/\/openalex.org\/W2101512909","https:\/\/openalex.org\/W2109276114","https:\/\/openalex.org\/W2115309705","https:\/\/openalex.org\/W2132331020","https:\/\/openalex.org\/W2135274583","https:\/\/openalex.org\/W2142785340","https:\/\/openalex.org\/W2165413178","https:\/\/openalex.org\/W2171480813","https:\/\/openalex.org\/W2171683519","https:\/\/openalex.org\/W2913459036","https:\/\/openalex.org\/W4213079124","https:\/\/openalex.org\/W4253606798"],"related_works":["https:\/\/openalex.org\/W2465291283","https:\/\/openalex.org\/W3187329742","https:\/\/openalex.org\/W179718899","https:\/\/openalex.org\/W1955019684","https:\/\/openalex.org\/W2315997511","https:\/\/openalex.org\/W3101579177","https:\/\/openalex.org\/W2568432792","https:\/\/openalex.org\/W4385965400","https:\/\/openalex.org\/W4388483831","https:\/\/openalex.org\/W4319996264"],"abstract_inverted_index":{"The":[0,36,68],"paper":[1,37,73],"Test":[2],"Input":[3],"Generation":[4],"With":[5],"Java":[6,64],"PathFinder":[7,65],"was":[8,74],"published":[9],"in":[10,62],"the":[11,29,44,63,72,98],"International":[12],"Symposium":[13],"on":[14,54],"Software":[15],"Testing":[16],"and":[17,22,40,57,60,96],"Analysis":[18],"(ISSTA)":[19],"2004":[20],"Proceedings,":[21],"has":[23],"now":[24],"been":[25],"selected":[26],"to":[27,75,78],"receive":[28],"ISSTA":[30],"2018":[31],"Retrospective":[32],"Impact":[33],"Paper":[34],"Award.":[35],"described":[38],"black-box":[39],"white-box":[41],"techniques":[42,51,99],"for":[43,84,100],"automated":[45],"testing":[46],"of":[47,71],"software":[48],"systems.":[49],"These":[50],"were":[52],"based":[53],"model":[55],"checking":[56],"symbolic":[58],"execution":[59],"incorporated":[61],"analysis":[66],"tool.":[67],"main":[69],"contribution":[70],"describe":[76],"how":[77],"perform":[79],"efficient":[80],"test":[81],"input":[82],"generation":[83],"code":[85],"manipulating":[86],"complex":[87,93],"data":[88],"that":[89],"takes":[90],"into":[91],"account":[92],"method":[94],"preconditions":[95],"evaluate":[97],"generating":[101],"high":[102],"coverage":[103],"tests.":[104]},"counts_by_year":[{"year":2022,"cited_by_count":1},{"year":2018,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}