Team for Research in
Ubiquitous Secure Technology

Attacking Path Explosion in Constraint-Based Test Generation
Cristian Cadar, Dawson Engler, Peter Boonstoppel

Citation
Cristian Cadar, Dawson Engler, Peter Boonstoppel. "Attacking Path Explosion in Constraint-Based Test Generation". ETAPS Conference on Tools and Algorithms for the Construction and Analysis of Systems (TACAS 2008) Budapest, Hungary, March-April 2008, 2008.

Abstract
(No abstract.)

Electronic downloads


(No downloads are available for this publication.)
Citation formats  
  • HTML
    Cristian Cadar, Dawson Engler, Peter Boonstoppel. <a
    href="http://www.truststc.org/pubs/389.html"
    >Attacking Path Explosion in Constraint-Based Test
    Generation</a>, ETAPS Conference on Tools and
    Algorithms for the Construction and Analysis of Systems
    (TACAS 2008) Budapest, Hungary, March-April 2008, 2008.
  • Plain text
    Cristian Cadar, Dawson Engler, Peter Boonstoppel.
    "Attacking Path Explosion in Constraint-Based Test
    Generation". ETAPS Conference on Tools and Algorithms
    for the Construction and Analysis of Systems (TACAS 2008)
    Budapest, Hungary, March-April 2008, 2008.
  • BibTeX
    @inproceedings{CadarEnglerBoonstoppel08_AttackingPathExplosionInConstraintBasedTestGeneration,
        author = {Cristian Cadar and Dawson Engler and Peter
                  Boonstoppel},
        title = {Attacking Path Explosion in Constraint-Based Test
                  Generation},
        booktitle = {ETAPS Conference on Tools and Algorithms for the
                  Construction and Analysis of Systems (TACAS 2008)
                  Budapest, Hungary, March-April 2008},
        year = {2008},
        abstract = {(No abstract.)},
        URL = {http://www.truststc.org/pubs/389.html}
    }
    

Posted by Jessica Gamble on 7 May 2008.
For additional information, see the Publications FAQ or contact webmaster at www truststc org.

Notice: This material is presented to ensure timely dissemination of scholarly and technical work. Copyright and all rights therein are retained by authors or by other copyright holders. All persons copying this information are expected to adhere to the terms and constraints invoked by each author's copyright.