{"id":"https://openalex.org/W2907278310","doi":"https://doi.org/10.1109/cist.2018.8596397","title":"Constraint Based Testing and Verification of Java Bytecode Programs","display_name":"Constraint Based Testing and Verification of Java Bytecode Programs","publication_year":2018,"publication_date":"2018-10-01","ids":{"openalex":"https://openalex.org/W2907278310","doi":"https://doi.org/10.1109/cist.2018.8596397","mag":"2907278310"},"language":"en","primary_location":{"id":"doi:10.1109/cist.2018.8596397","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cist.2018.8596397","pdf_url":null,"source":{"id":"https://openalex.org/S4306498311","display_name":"2018 IEEE 5th International Congress on Information Science and Technology (CiSt)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 5th International Congress on Information Science and Technology (CiSt)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5058867763","display_name":"Safaa Achour","orcid":null},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":true,"raw_author_name":"Safaa Achour","raw_affiliation_strings":["LASTID Laboratory, Ibn Tofail University, K\u00e9nitra, Morocco"],"affiliations":[{"raw_affiliation_string":"LASTID Laboratory, Ibn Tofail University, K\u00e9nitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5088541702","display_name":"Mohammed Benattou","orcid":"https://orcid.org/0000-0002-9659-5138"},"institutions":[{"id":"https://openalex.org/I3121676899","display_name":"Universit\u00e9 Ibn-Tofail","ror":"https://ror.org/02wj89n04","country_code":"MA","type":"education","lineage":["https://openalex.org/I3121676899"]}],"countries":["MA"],"is_corresponding":false,"raw_author_name":"Mohammzed Benattou","raw_affiliation_strings":["LASTID Laboratory, Ibn Tofail University, K\u00e9nitra, Morocco"],"affiliations":[{"raw_affiliation_string":"LASTID Laboratory, Ibn Tofail University, K\u00e9nitra, Morocco","institution_ids":["https://openalex.org/I3121676899"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5058867763"],"corresponding_institution_ids":["https://openalex.org/I3121676899"],"apc_list":null,"apc_paid":null,"fwci":0.2947,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.65545861,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":93},"biblio":{"volume":null,"issue":null,"first_page":"64","last_page":"69"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9991999864578247,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9980999827384949,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/java-bytecode","display_name":"Java bytecode","score":0.9215856790542603},{"id":"https://openalex.org/keywords/bytecode","display_name":"Bytecode","score":0.9038398861885071},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8709681630134583},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.7399850487709045},{"id":"https://openalex.org/keywords/java","display_name":"Java","score":0.6170329451560974},{"id":"https://openalex.org/keywords/context","display_name":"Context (archaeology)","score":0.44553661346435547},{"id":"https://openalex.org/keywords/real-time-java","display_name":"Real time Java","score":0.34960320591926575},{"id":"https://openalex.org/keywords/java-annotation","display_name":"Java annotation","score":0.28837472200393677}],"concepts":[{"id":"https://openalex.org/C2777472213","wikidata":"https://www.wikidata.org/wiki/Q137496","display_name":"Java bytecode","level":5,"score":0.9215856790542603},{"id":"https://openalex.org/C2779818221","wikidata":"https://www.wikidata.org/wiki/Q837330","display_name":"Bytecode","level":3,"score":0.9038398861885071},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8709681630134583},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.7399850487709045},{"id":"https://openalex.org/C548217200","wikidata":"https://www.wikidata.org/wiki/Q251","display_name":"Java","level":2,"score":0.6170329451560974},{"id":"https://openalex.org/C2779343474","wikidata":"https://www.wikidata.org/wiki/Q3109175","display_name":"Context (archaeology)","level":2,"score":0.44553661346435547},{"id":"https://openalex.org/C132106392","wikidata":"https://www.wikidata.org/wiki/Q1373903","display_name":"Real time Java","level":3,"score":0.34960320591926575},{"id":"https://openalex.org/C168702491","wikidata":"https://www.wikidata.org/wiki/Q567345","display_name":"Java annotation","level":4,"score":0.28837472200393677},{"id":"https://openalex.org/C86803240","wikidata":"https://www.wikidata.org/wiki/Q420","display_name":"Biology","level":0,"score":0.0},{"id":"https://openalex.org/C151730666","wikidata":"https://www.wikidata.org/wiki/Q7205","display_name":"Paleontology","level":1,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/cist.2018.8596397","is_oa":false,"landing_page_url":"https://doi.org/10.1109/cist.2018.8596397","pdf_url":null,"source":{"id":"https://openalex.org/S4306498311","display_name":"2018 IEEE 5th International Congress on Information Science and Technology (CiSt)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2018 IEEE 5th International Congress on Information Science and Technology (CiSt)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":24,"referenced_works":["https://openalex.org/W2005274700","https://openalex.org/W2012685447","https://openalex.org/W2036526036","https://openalex.org/W2041687550","https://openalex.org/W2047694629","https://openalex.org/W2054193570","https://openalex.org/W2073792277","https://openalex.org/W2102936883","https://openalex.org/W2115474251","https://openalex.org/W2115787393","https://openalex.org/W2120552859","https://openalex.org/W2134298747","https://openalex.org/W2143712427","https://openalex.org/W2466388701","https://openalex.org/W2625545128","https://openalex.org/W2779411928","https://openalex.org/W3095232593","https://openalex.org/W4235199044","https://openalex.org/W6675473297","https://openalex.org/W6677355485","https://openalex.org/W6677459599","https://openalex.org/W6681177917","https://openalex.org/W6719362670","https://openalex.org/W6784943816"],"related_works":["https://openalex.org/W2787111017","https://openalex.org/W1564435947","https://openalex.org/W1598565505","https://openalex.org/W2124765047","https://openalex.org/W1521580745","https://openalex.org/W1500443504","https://openalex.org/W1572251458","https://openalex.org/W4323026556","https://openalex.org/W4388574351","https://openalex.org/W2900783539"],"abstract_inverted_index":{"In":[0],"this":[1,25,149],"paper,":[2],"we":[3,63,96,151],"propose":[4,64],"to":[5,28,45,66,73,85,104,107,153],"apply":[6],"constraint":[7],"based":[8],"testing":[9,126],"and":[10,35,43,83,134],"verification":[11,99],"of":[12,24,50,56,70,89,100,112,144],"Java":[13,33,130],"bytecode":[14,156,163,168],"programs":[15],"augmented":[16],"with":[17,148,158],"their":[18,121],"user":[19,37,136],"specifications.":[20],"The":[21],"main":[22],"objective":[23],"approach":[26],"is":[27],"detect":[29,108],"inconsistencies":[30],"between":[31],"a":[32,98],"Program":[34],"its":[36,80,105],"specification":[38],"at":[39,161],"the":[40,47,51,68,71,75,87,90,101,109,113,124,129,135,141,155,162,166],"Bytecode":[41],"level,":[42],"also":[44],"explore":[46],"execution":[48,110],"paths":[49,111],"program":[52,102,157],"searching":[53],"for":[54],"which":[55],"them":[57],"may":[58],"contain":[59],"such":[60],"inconsistencies.":[61],"Thus,":[62],"firstly":[65],"exploit":[67],"constraints":[69],"precondition":[72],"put":[74],"method":[76,114,131],"under":[77,115,132],"test":[78,92,116,133],"in":[79,123,140],"invocation":[81],"context":[82],"consequently":[84],"guide":[86],"generation":[88],"input":[91],"data.":[93],"And":[94],"secondly,":[95],"perform":[97],"relatively":[103],"post-state":[106],"that":[117],"do":[118],"not":[119,139],"respect":[120],"specifications,":[122],"unit":[125],"context.":[127],"However,":[128],"specifications":[137],"are":[138],"same":[142],"level":[143,164],"abstraction.":[145],"To":[146],"deal":[147],"problem,":[150],"suggested":[152],"specify":[154],"Pre/Post":[159],"conditions":[160],"using":[165],"static":[167],"instrumentation.":[169]},"counts_by_year":[{"year":2021,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
