{"id":"https://openalex.org/W4285490382","doi":"https://doi.org/10.1145/3533767.3534399","title":"Combining solution reuse and bound tightening for efficient analysis of evolving systems","display_name":"Combining solution reuse and bound tightening for efficient analysis of evolving systems","publication_year":2022,"publication_date":"2022-07-15","ids":{"openalex":"https://openalex.org/W4285490382","doi":"https://doi.org/10.1145/3533767.3534399"},"language":"en","primary_location":{"id":"doi:10.1145/3533767.3534399","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3533767.3534399","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5025973455","display_name":"Clay Stevens","orcid":"https://orcid.org/0000-0001-5399-9661"},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":true,"raw_author_name":"Clay Stevens","raw_affiliation_strings":["University of Nebraska-Lincoln, USA"],"affiliations":[{"raw_affiliation_string":"University of Nebraska-Lincoln, USA","institution_ids":["https://openalex.org/I114395901"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5030064922","display_name":"Hamid Bagheri","orcid":null},"institutions":[{"id":"https://openalex.org/I114395901","display_name":"University of Nebraska\u2013Lincoln","ror":"https://ror.org/043mer456","country_code":"US","type":"education","lineage":["https://openalex.org/I114395901"]}],"countries":["US"],"is_corresponding":false,"raw_author_name":"Hamid Bagheri","raw_affiliation_strings":["University of Nebraska-Lincoln, USA"],"affiliations":[{"raw_affiliation_string":"University of Nebraska-Lincoln, USA","institution_ids":["https://openalex.org/I114395901"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5025973455"],"corresponding_institution_ids":["https://openalex.org/I114395901"],"apc_list":null,"apc_paid":null,"fwci":1.8189,"has_fulltext":false,"cited_by_count":6,"citation_normalized_percentile":{"value":0.88129958,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":89,"max":97},"biblio":{"volume":null,"issue":null,"first_page":"89","last_page":"100"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9987999796867371,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9962999820709229,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11241","display_name":"Advanced Malware Detection Techniques","score":0.9948999881744385,"subfield":{"id":"https://openalex.org/subfields/1711","display_name":"Signal Processing"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.775978684425354},{"id":"https://openalex.org/keywords/reuse","display_name":"Reuse","score":0.7575091123580933},{"id":"https://openalex.org/keywords/overhead","display_name":"Overhead (engineering)","score":0.6329532861709595},{"id":"https://openalex.org/keywords/formal-verification","display_name":"Formal verification","score":0.5957518815994263},{"id":"https://openalex.org/keywords/domain","display_name":"Domain (mathematical analysis)","score":0.5593438744544983},{"id":"https://openalex.org/keywords/formal-methods","display_name":"Formal methods","score":0.47213178873062134},{"id":"https://openalex.org/keywords/state","display_name":"State (computer science)","score":0.4462776482105255},{"id":"https://openalex.org/keywords/computation","display_name":"Computation","score":0.42333370447158813},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.41316819190979004},{"id":"https://openalex.org/keywords/domain-analysis","display_name":"Domain analysis","score":0.41213199496269226},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.4027063548564911},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.3566133975982666},{"id":"https://openalex.org/keywords/computer-engineering","display_name":"Computer engineering","score":0.34169360995292664},{"id":"https://openalex.org/keywords/distributed-computing","display_name":"Distributed computing","score":0.32391077280044556},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3220056891441345},{"id":"https://openalex.org/keywords/theoretical-computer-science","display_name":"Theoretical computer science","score":0.2323327362537384},{"id":"https://openalex.org/keywords/algorithm","display_name":"Algorithm","score":0.20304235816001892},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.1617819368839264},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.11944785714149475},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.09844177961349487}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.775978684425354},{"id":"https://openalex.org/C206588197","wikidata":"https://www.wikidata.org/wiki/Q846574","display_name":"Reuse","level":2,"score":0.7575091123580933},{"id":"https://openalex.org/C2779960059","wikidata":"https://www.wikidata.org/wiki/Q7113681","display_name":"Overhead (engineering)","level":2,"score":0.6329532861709595},{"id":"https://openalex.org/C111498074","wikidata":"https://www.wikidata.org/wiki/Q173326","display_name":"Formal verification","level":2,"score":0.5957518815994263},{"id":"https://openalex.org/C36503486","wikidata":"https://www.wikidata.org/wiki/Q11235244","display_name":"Domain (mathematical analysis)","level":2,"score":0.5593438744544983},{"id":"https://openalex.org/C75606506","wikidata":"https://www.wikidata.org/wiki/Q1049183","display_name":"Formal methods","level":2,"score":0.47213178873062134},{"id":"https://openalex.org/C48103436","wikidata":"https://www.wikidata.org/wiki/Q599031","display_name":"State (computer science)","level":2,"score":0.4462776482105255},{"id":"https://openalex.org/C45374587","wikidata":"https://www.wikidata.org/wiki/Q12525525","display_name":"Computation","level":2,"score":0.42333370447158813},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.41316819190979004},{"id":"https://openalex.org/C15708719","wikidata":"https://www.wikidata.org/wiki/Q2271801","display_name":"Domain analysis","level":5,"score":0.41213199496269226},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.4027063548564911},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.3566133975982666},{"id":"https://openalex.org/C113775141","wikidata":"https://www.wikidata.org/wiki/Q428691","display_name":"Computer engineering","level":1,"score":0.34169360995292664},{"id":"https://openalex.org/C120314980","wikidata":"https://www.wikidata.org/wiki/Q180634","display_name":"Distributed computing","level":1,"score":0.32391077280044556},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3220056891441345},{"id":"https://openalex.org/C80444323","wikidata":"https://www.wikidata.org/wiki/Q2878974","display_name":"Theoretical computer science","level":1,"score":0.2323327362537384},{"id":"https://openalex.org/C11413529","wikidata":"https://www.wikidata.org/wiki/Q8366","display_name":"Algorithm","level":1,"score":0.20304235816001892},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.1617819368839264},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.11944785714149475},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.09844177961349487},{"id":"https://openalex.org/C134306372","wikidata":"https://www.wikidata.org/wiki/Q7754","display_name":"Mathematical analysis","level":1,"score":0.0},{"id":"https://openalex.org/C33923547","wikidata":"https://www.wikidata.org/wiki/Q395","display_name":"Mathematics","level":0,"score":0.0},{"id":"https://openalex.org/C548081761","wikidata":"https://www.wikidata.org/wiki/Q180388","display_name":"Waste management","level":1,"score":0.0}],"mesh":[],"locations_count":2,"locations":[{"id":"doi:10.1145/3533767.3534399","is_oa":false,"landing_page_url":"https://doi.org/10.1145/3533767.3534399","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Proceedings of the 31st ACM SIGSOFT International Symposium on Software Testing and Analysis","raw_type":"proceedings-article"},{"id":"pmh:oai:digitalcommons.unl.edu:cseconfwork-1333","is_oa":false,"landing_page_url":"https://digitalcommons.unl.edu/cseconfwork/334","pdf_url":null,"source":{"id":"https://openalex.org/S4306513441","display_name":"Insecta mundi","issn_l":"0749-6737","issn":["0749-6737","1942-1354","1942-1362"],"is_oa":false,"is_in_doaj":false,"is_core":false,"host_organization":"https://openalex.org/P4310316217","host_organization_name":"Center for Systematic Entomology","host_organization_lineage":["https://openalex.org/P4310316217"],"host_organization_lineage_names":["Center for Systematic Entomology"],"type":"journal"},"license":null,"license_id":null,"version":"submittedVersion","is_accepted":false,"is_published":false,"raw_source_name":"CSE Conference and Workshop Papers","raw_type":"text"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"pdf":false,"grobid_xml":false},"content_urls":null,"referenced_works_count":34,"referenced_works":["https://openalex.org/W1519503479","https://openalex.org/W1576452827","https://openalex.org/W1973938051","https://openalex.org/W1978679823","https://openalex.org/W1990880047","https://openalex.org/W2082491817","https://openalex.org/W2083755826","https://openalex.org/W2098913585","https://openalex.org/W2106692463","https://openalex.org/W2110076463","https://openalex.org/W2116675540","https://openalex.org/W2138482003","https://openalex.org/W2150189917","https://openalex.org/W2168617729","https://openalex.org/W2211424907","https://openalex.org/W2289824057","https://openalex.org/W2343825734","https://openalex.org/W2465012883","https://openalex.org/W2547023109","https://openalex.org/W2560525892","https://openalex.org/W2767371019","https://openalex.org/W2884432391","https://openalex.org/W2898878396","https://openalex.org/W2901407949","https://openalex.org/W2925729479","https://openalex.org/W3020049827","https://openalex.org/W3042771014","https://openalex.org/W3089899650","https://openalex.org/W3090398723","https://openalex.org/W3097816029","https://openalex.org/W3107210824","https://openalex.org/W3153176799","https://openalex.org/W4225968144","https://openalex.org/W4254543378"],"related_works":["https://openalex.org/W2373307420","https://openalex.org/W2954722587","https://openalex.org/W2022869446","https://openalex.org/W2150238188","https://openalex.org/W4235897526","https://openalex.org/W2560589539","https://openalex.org/W2126262188","https://openalex.org/W2157615579","https://openalex.org/W2131658855","https://openalex.org/W1485949778"],"abstract_inverted_index":{"Software":[0],"engineers":[1],"have":[2],"long":[3],"employed":[4],"formal":[5,37,44],"verification":[6,38,45,174],"to":[7,32,165],"ensure":[8],"the":[9,18,35,52,82,99,118,129,150,166,172],"safety":[10],"and":[11,124],"validity":[12],"of":[13,54,84,108,114,120,132,153],"their":[14],"system":[15,19,30,41],"designs.":[16],"As":[17],"changes---often":[20],"via":[21],"predictable,":[22],"domain-specific":[23,76,115],"operations---their":[24],"models":[25],"must":[26],"also":[27],"change,":[28],"requiring":[29],"designers":[31],"repeatedly":[33,85],"execute":[34],"same":[36],"on":[39,96],"similar":[40],"models.":[42],"State-of-the-art":[43],"techniques":[46,140,156],"can":[47,73,79],"be":[48],"expensive":[49,167],"at":[50],"scale,":[51],"cost":[53,83],"which":[55,94],"is":[56],"multiplied":[57],"by":[58,171],"repeated":[59],"analysis.":[60],"This":[61],"paper":[62],"presents":[63],"a":[64,69,160],"novel":[65],"analysis":[66,102],"technique---implemented":[67],"in":[68,163],"tool":[70],"called":[71],"SoRBoT---which":[72],"automatically":[74],"determine":[75],"optimizations":[77,116],"that":[78,146],"dramatically":[80],"reduce":[81],"analyzing":[86],"evolving":[87,143],"systems.":[88],"Different":[89],"from":[90],"all":[91,105],"prior":[92,109],"approaches,":[93],"focus":[95],"either":[97],"tightening":[98,126],"bounds":[100],"for":[101,141],"or":[103,106],"reusing":[104],"part":[107],"solutions,":[110],"SoRBoT's":[111],"automated":[112],"derivation":[113],"combines":[117],"benefits":[119],"both":[121],"solution":[122],"reuse":[123],"bound":[125],"while":[127,157],"avoiding":[128],"main":[130],"pitfalls":[131],"each.":[133],"We":[134],"experimentally":[135],"evaluate":[136],"SoRBoT":[137,147],"against":[138],"state-of-the-art":[139,155,173],"verifying":[142],"specifications,":[144],"demonstrating":[145],"substantially":[148],"exceeds":[149],"run-time":[151],"performance":[152],"those":[154],"introducing":[158],"only":[159],"negligible":[161],"overhead,":[162],"contrast":[164],"additional":[168],"computations":[169],"required":[170],"techniques.":[175]},"counts_by_year":[{"year":2025,"cited_by_count":2},{"year":2024,"cited_by_count":3},{"year":2022,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
