{"id":"https://openalex.org/W4236837729","doi":"https://doi.org/10.1109/icse.2013.6606625","title":"Program transformations to fix C integers","display_name":"Program transformations to fix C integers","publication_year":2013,"publication_date":"2013-05-01","ids":{"openalex":"https://openalex.org/W4236837729","doi":"https://doi.org/10.1109/icse.2013.6606625"},"language":"en","primary_location":{"id":"doi:10.1109/icse.2013.6606625","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icse.2013.6606625","pdf_url":null,"source":{"id":"https://openalex.org/S4363607951","display_name":"2013 35th International Conference on Software Engineering (ICSE)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 35th International Conference on Software Engineering (ICSE)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5038934215","display_name":"Zack Coker","orcid":null},"institutions":[{"id":"https://openalex.org/I82497590","display_name":"Auburn University","ror":"https://ror.org/02v80fc35","country_code":"US","type":"education","lineage":["https://openalex.org/I82497590"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Zack Coker","raw_affiliation_strings":["Auburn University, AL, USA"],"affiliations":[{"raw_affiliation_string":"Auburn University, AL, USA","institution_ids":["https://openalex.org/I82497590"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5060527236","display_name":"Munawar Hafiz","orcid":null},"institutions":[{"id":"https://openalex.org/I82497590","display_name":"Auburn University","ror":"https://ror.org/02v80fc35","country_code":"US","type":"education","lineage":["https://openalex.org/I82497590"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Munawar Hafiz","raw_affiliation_strings":["Auburn University, AL, USA"],"affiliations":[{"raw_affiliation_string":"Auburn University, AL, USA","institution_ids":["https://openalex.org/I82497590"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5038934215"],"corresponding_institution_ids":["https://openalex.org/I82497590"],"apc_list":null,"apc_paid":null,"fwci":5.8371,"has_fulltext":false,"cited_by_count":37,"citation_normalized_percentile":{"value":0.96435644,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":90,"max":99},"biblio":{"volume":null,"issue":null,"first_page":"792","last_page":"801"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9983999729156494,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9969000220298767,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9966999888420105,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/integer","display_name":"Integer (computer science)","score":0.8738810420036316},{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7041837573051453},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.6295055150985718},{"id":"https://openalex.org/keywords/code","display_name":"Code (set theory)","score":0.5794712901115417},{"id":"https://openalex.org/keywords/nist","display_name":"NIST","score":0.5773545503616333},{"id":"https://openalex.org/keywords/program-transformation","display_name":"Program transformation","score":0.4975171387195587},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.49056166410446167},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.4504663348197937},{"id":"https://openalex.org/keywords/integer-programming","display_name":"Integer programming","score":0.42489057779312134},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4242503345012665},{"id":"https://openalex.org/keywords/source-lines-of-code","display_name":"Source lines of code","score":0.4191189706325531},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.299293577671051},{"id":"https://openalex.org/keywords/set","display_name":"Set (abstract data type)","score":0.20677140355110168},{"id":"https://openalex.org/keywords/natural-language-processing","display_name":"Natural language processing","score":0.06351929903030396}],"concepts":[{"id":"https://openalex.org/C97137487","wikidata":"https://www.wikidata.org/wiki/Q729138","display_name":"Integer (computer science)","level":2,"score":0.8738810420036316},{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7041837573051453},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.6295055150985718},{"id":"https://openalex.org/C2776760102","wikidata":"https://www.wikidata.org/wiki/Q5139990","display_name":"Code (set theory)","level":3,"score":0.5794712901115417},{"id":"https://openalex.org/C111219384","wikidata":"https://www.wikidata.org/wiki/Q6954384","display_name":"NIST","level":2,"score":0.5773545503616333},{"id":"https://openalex.org/C2778361913","wikidata":"https://www.wikidata.org/wiki/Q7248437","display_name":"Program transformation","level":2,"score":0.4975171387195587},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.49056166410446167},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.4504663348197937},{"id":"https://openalex.org/C56086750","wikidata":"https://www.wikidata.org/wiki/Q6042592","display_name":"Integer programming","level":2,"score":0.42489057779312134},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4242503345012665},{"id":"https://openalex.org/C199519371","wikidata":"https://www.wikidata.org/wiki/Q942695","display_name":"Source lines of code","level":3,"score":0.4191189706325531},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.299293577671051},{"id":"https://openalex.org/C177264268","wikidata":"https://www.wikidata.org/wiki/Q1514741","display_name":"Set (abstract data type)","level":2,"score":0.20677140355110168},{"id":"https://openalex.org/C204321447","wikidata":"https://www.wikidata.org/wiki/Q30642","display_name":"Natural language processing","level":1,"score":0.06351929903030396}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icse.2013.6606625","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icse.2013.6606625","pdf_url":null,"source":{"id":"https://openalex.org/S4363607951","display_name":"2013 35th International Conference on Software Engineering (ICSE)","issn_l":null,"issn":null,"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":null,"host_organization_name":null,"host_organization_lineage":[],"host_organization_lineage_names":[],"type":"conference"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2013 35th International Conference on Software Engineering (ICSE)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[{"id":"https://openalex.org/F4320306076","display_name":"National Science Foundation","ror":"https://ror.org/021nxhr62"}],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":22,"referenced_works":["https://openalex.org/W127238549","https://openalex.org/W1506510492","https://openalex.org/W1514298952","https://openalex.org/W1531991464","https://openalex.org/W1536898727","https://openalex.org/W1542462119","https://openalex.org/W1588398995","https://openalex.org/W1600965014","https://openalex.org/W1794765803","https://openalex.org/W2051634947","https://openalex.org/W2123527946","https://openalex.org/W2129538349","https://openalex.org/W2130908989","https://openalex.org/W2153887189","https://openalex.org/W2156858199","https://openalex.org/W2163010250","https://openalex.org/W2253113774","https://openalex.org/W3142903977","https://openalex.org/W3151395068","https://openalex.org/W6605152510","https://openalex.org/W6632216921","https://openalex.org/W6638466588"],"related_works":["https://openalex.org/W1507167368","https://openalex.org/W2384847609","https://openalex.org/W1597062518","https://openalex.org/W2467097043","https://openalex.org/W2348670029","https://openalex.org/W4245713008","https://openalex.org/W1608659702","https://openalex.org/W4237042913","https://openalex.org/W2048706733","https://openalex.org/W2064060175"],"abstract_inverted_index":{"C":[0],"makes":[1],"it":[2],"easy":[3],"to":[4,27,45,53],"misuse":[5],"integer":[6,14,38,74,138,145],"types;":[7],"even":[8],"mature":[9],"programs":[10,79],"harbor":[11],"many":[12],"badly-written":[13],"code.":[15,30,95],"Traditional":[16],"approaches":[17],"at":[18],"best":[19],"detect":[20],"these":[21,68,133],"problems;":[22],"they":[23],"cannot":[24],"guide":[25],"developers":[26],"write":[28],"correct":[29],"We":[31,96],"describe":[32],"three":[33],"program":[34,134],"transformations":[35,69,100,108,135],"that":[36],"fix":[37,137],"problems":[39,75],"-":[40],"one":[41,59],"explicitly":[42],"introduces":[43],"casts":[44],"disambiguate":[46],"type":[47,62],"mismatch,":[48],"another":[49],"adds":[50],"runtime":[51],"checks":[52],"arithmetic":[54],"operations,":[55],"and":[56,130],"the":[57,61,86,99,123],"third":[58],"changes":[60,87,112],"of":[63,73,80,94,111,117],"a":[64],"wrongly-declared":[65],"integer.":[66],"Together,":[67],"fixed":[70],"all":[71],"variants":[72],"featured":[76],"in":[77],"7,147":[78],"NIST's":[81],"SAMATE":[82],"reference":[83],"dataset,":[84],"making":[85],"automatically":[88,101],"on":[89,102,113],"over":[90,114],"15":[91],"million":[92],"lines":[93,116],"also":[97],"applied":[98],"5":[103],"open":[104],"source":[105,128],"software.":[106],"The":[107],"made":[109],"hundreds":[110],"700,000":[115],"code,":[118],"but":[119],"did":[120],"not":[121],"break":[122],"programs.":[124],"Being":[125],"integrated":[126],"with":[127,141],"code":[129],"development":[131],"process,":[132],"can":[136],"problems,":[139],"along":[140],"developers'":[142],"misconceptions":[143],"about":[144],"usage.":[146]},"counts_by_year":[{"year":2024,"cited_by_count":1},{"year":2022,"cited_by_count":2},{"year":2021,"cited_by_count":2},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":7},{"year":2018,"cited_by_count":4},{"year":2017,"cited_by_count":4},{"year":2016,"cited_by_count":3},{"year":2015,"cited_by_count":3},{"year":2014,"cited_by_count":4},{"year":2013,"cited_by_count":3}],"updated_date":"2026-04-04T16:13:02.066488","created_date":"2025-10-10T00:00:00"}
