doi.org/10.1007/s10009-018-0490-9
Preview meta tags from the doi.org website.
Linked Hostnames
26- 30 links todoi.org
- 27 links toscholar.google.com
- 16 links tolink.springer.com
- 10 links towww.springernature.com
- 3 links toscholar.google.co.uk
- 3 links towww.ncbi.nlm.nih.gov
- 2 links tocitation-needed.springer.com
- 2 links tosupport.springernature.com
Thumbnail

Search Engine Appearance
https://doi.org/10.1007/s10009-018-0490-9
The Symbolic Execution Debugger (SED): a platform for interactive symbolic execution, debugging, verification and more - International Journal on Software Tools for Technology Transfer
The Symbolic Execution Debugger (SED), is an extension of the debug platform for interactive debuggers based on symbolic execution. The SED comes with a st
Bing
The Symbolic Execution Debugger (SED): a platform for interactive symbolic execution, debugging, verification and more - International Journal on Software Tools for Technology Transfer
https://doi.org/10.1007/s10009-018-0490-9
The Symbolic Execution Debugger (SED), is an extension of the debug platform for interactive debuggers based on symbolic execution. The SED comes with a st
DuckDuckGo
The Symbolic Execution Debugger (SED): a platform for interactive symbolic execution, debugging, verification and more - International Journal on Software Tools for Technology Transfer
The Symbolic Execution Debugger (SED), is an extension of the debug platform for interactive debuggers based on symbolic execution. The SED comes with a st
General Meta Tags
142- titleThe Symbolic Execution Debugger (SED): a platform for interactive symbolic execution, debugging, verification and more | International Journal on Software Tools for Technology Transfer
- charsetUTF-8
- X-UA-CompatibleIE=edge
- applicable-devicepc,mobile
- viewportwidth=device-width, initial-scale=1
Open Graph Meta Tags
6- og:urlhttps://link.springer.com/article/10.1007/s10009-018-0490-9
- og:typearticle
- og:site_nameSpringerLink
- og:titleThe Symbolic Execution Debugger (SED): a platform for interactive symbolic execution, debugging, verification and more - International Journal on Software Tools for Technology Transfer
- og:descriptionThe Symbolic Execution Debugger (SED), is an extension of the debug platform for interactive debuggers based on symbolic execution. The SED comes with a static symbolic execution engine for sequential programs, but any third-party symbolic execution engine can be integrated into the SED. An interactive debugger based on symbolic execution allows one like a traditional debugger to locate defects in the source code. The difference is that all feasible execution paths are explored at once, and thus there is no need to know input values resulting in an execution that exhibits the failure. In addition, such a debugger can be used in code reviews and to guide and present results of an analysis based on symbolic execution such as, in our case, correctness proofs. Experimental evaluations proved that the SED increases the effectiveness of code reviews and proof understanding tasks.
Twitter Meta Tags
6- twitter:site@SpringerLink
- twitter:cardsummary_large_image
- twitter:image:altContent cover image
- twitter:titleThe Symbolic Execution Debugger (SED): a platform for interactive symbolic execution, debugging, verification and more
- twitter:descriptionInternational Journal on Software Tools for Technology Transfer - The Symbolic Execution Debugger (SED), is an extension of the debug platform for interactive debuggers based on symbolic execution....
Item Prop Meta Tags
3- position1
- position2
- position3
Link Tags
9- apple-touch-icon/oscar-static/img/favicons/darwin/apple-touch-icon-6ef0829b9c.png
- canonicalhttps://link.springer.com/article/10.1007/s10009-018-0490-9
- icon/oscar-static/img/favicons/darwin/android-chrome-192x192.png
- icon/oscar-static/img/favicons/darwin/favicon-32x32.png
- icon/oscar-static/img/favicons/darwin/favicon-16x16.png
Emails
1Links
111- http://scholar.google.com/scholar_lookup?&title=A%20behavioral%20notion%20of%20subtyping&journal=ACM%20Trans.%20Program.%20Lang.%20Syst.&doi=10.1145%2F197320.197383&volume=16&issue=6&pages=1811-1841&publication_year=1994&author=Liskov%2CB&author=Wing%2CJM
- http://scholar.google.com/scholar_lookup?&title=A%20survey%20of%20program%20slicing%20techniques&journal=J.%20Program.%20Lang.&volume=3&pages=121-189&publication_year=1995&author=Tip%2CF
- http://scholar.google.com/scholar_lookup?&title=A%20visual%20interactive%20debugger%20based%20on%20symbolic%20execution&doi=10.1145%2F1858996.1859022&pages=143-146&publication_year=2010&author=H%C3%A4hnle%2CR&author=Baum%2CM&author=Bubel%2CR&author=Rothe%2CM
- http://scholar.google.com/scholar_lookup?&title=An%20interactive%20verification%20tool%20meets%20an%20IDE&pages=55-70&publication_year=2014&author=Hentschel%2CM&author=K%C3%A4sdorf%2CS&author=H%C3%A4hnle%2CR&author=Bubel%2CR
- http://scholar.google.com/scholar_lookup?&title=AutoProof%3A%20auto-active%20functional%20verification%20of%20object-oriented%20programs&pages=566-580&publication_year=2015&author=Tschannen%2CJ&author=Furia%2CCA&author=Nordio%2CM&author=Polikarpova%2CN