{"id":242936,"date":"2016-06-25T08:17:21","date_gmt":"2016-06-25T15:17:21","guid":{"rendered":"https:\/\/www.microsoft.com\/en-us\/research\/?post_type=msr-event&#038;p=242936"},"modified":"2025-08-06T12:00:20","modified_gmt":"2025-08-06T19:00:20","slug":"cstva-2016","status":"publish","type":"msr-event","link":"https:\/\/www.microsoft.com\/en-us\/research\/event\/cstva-2016\/","title":{"rendered":"CSTVA 2016"},"content":{"rendered":"\n\n<p>The 7th Workshop on Constraint Solvers in Testing, Verification, and Analysis<\/p>\n<p>Co-located with <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/issta2016.cispa.saarland\/\">ISSTA 2016<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<p>Proceedings: <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/ceur-ws.org\/Vol-1639\/\">CEUR-WS Vol. 1639<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>.<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<p align=\"left\">> The workshop proceedings of the workshop are now available as <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/ceur-ws.org\/Vol-1639\/\">CEUR-WS Volume 1639<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>.<\/p>\n<hr \/>\n<p align=\"left\">In the last decade there has been a revolutionary improvement in the efficiency and expressive power of constraint solvers (e.g., SAT, SMT and CP solvers), with a consequent impact on all manner of software engineering applications and research programs. A prime example of this impact is the rapid development and adoption of solver-based symbolic-execution techniques in myriad applications such as test generation, equivalence checking, security, automated exploit construction and fault localization. Black-box use of Boolean SAT solvers for proof-of-concept has been followed by the use of Satisfiability Modulo Theories (SMT) solvers integrating rich theories to treat these applications more thoroughly. An increasing amount of work is focussing on how best to use, tune, or extend solvers to meet the needs of particular applications. A similar theme of deeper integration of solver and application can be seen with ongoing research on Constraint Programming (CP) techniques and their use in software engineering.<\/p>\n<p align=\"left\">The workshop will focus on a broad range of topics where solvers have already made an impact, e.g., symbolic-execution based testing, as well as newer ones where their use is still nascent, e.g., testing of software product lines. The topics include, but are not limited to, the following:<\/p>\n<ul>\n<li>Constraint-based analysis of programs and models<\/li>\n<li>Constraint-based test input generation<\/li>\n<li>Constraint-based exploration of programs and models<\/li>\n<li>SMT and CP solvers for testing, verification, analysis, and synthesis<\/li>\n<li>SMT and CP solvers and their applications in computer security<\/li>\n<li>Programmable SMT and CP solvers<\/li>\n<li>Combinations of constraint solvers<\/li>\n<li>Constraint programming and software engineering<\/li>\n<li>Solvers and software product lines<\/li>\n<li>Solvers and fault localization<\/li>\n<li>Following a first meeting held with the CP conference in <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.irisa.fr\/manifestations\/2006\/CSTVA06\/\">2006<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, and subsequent editions held in <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.st.cs.uni-saarland.de\/cstva10\/\">2010<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.st.cs.uni-saarland.de\/cstva11\/\">2011<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/srg.doc.ic.ac.uk\/cstva12\/\">2012<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/cstva2013.univ-fcomte.fr\/\">2013<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, and <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/srg.doc.ic.ac.uk\/cstva14\/\">2014<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, and the organisation of two workshops gathering researchers from the CP and verification communities, namely <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.it.uu.se\/research\/group\/astra\/CPmeetsCAV\/programme.html\">CPmeetsCAV 2013<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> and <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/cp2014.a4cp.org\/workshops\/cpcav14\">CPmeetsVerification 2014<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>, the aim of the CSTVA workshop at ISSTA is to bring together researchers in SAT\/SMT, CP and software test\/analysis in order to raise the awareness of constraint solving in the research community and encourage development of new applications and extensible solvers.<\/li>\n<\/ul>\n<p><strong>Organization<\/strong><\/p>\n<ul>\n<li>Omer Tripp (Google)<\/li>\n<li>\n<div align=\"left\"><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/cwinter\/\">Christoph M. Wintersteiger\u00a0<\/a>(Microsoft Research)<\/div>\n<\/li>\n<\/ul>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<ul>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.mathieuacher.com\/\">Mathieu Acher<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (University of Rennes I\/INRIA. FR)<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.cs.unipr.it\/~bagnara\">Roberto Bagnara<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (University of Parma and BUGSENG, IT)<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.cs.bath.ac.uk\/~mjb\/\" target=\"_blank\">Martin Brain<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (University of Oxford, UK)<\/li>\n<li>\n<div align=\"left\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"https:\/\/www.simula.no\/people\/stefanod\">Stefano Di Alesio<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (Certus Centre for Software Verification and Validation, Simula Research Laboratory, NO)<\/div>\n<\/li>\n<li>\n<div align=\"left\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/researcher.watson.ibm.com\/researcher\/view.php?person=us-dolby\">Julian Dolby<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (IBM T. J. Watson, US)<\/div>\n<\/li>\n<li>\n<div align=\"left\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/sites.google.com\/site\/lpxzpurdue\/\" target=\"_blank\">Peng Liu<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (IBM T. J. Watson, US)<\/div>\n<\/li>\n<li>\n<div align=\"left\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/sat.inesc-id.pt\/~ruben\/\">Ruben Martins<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (University of Texas at Austin, US)<\/div>\n<\/li>\n<li>\n<div align=\"left\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/ti.arc.nasa.gov\/profile\/pcorina\/\" target=\"_blank\">Corina Pasareanu<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (CMU\/NASA Ames Research Center, US)<\/div>\n<\/li>\n<li>\n<div align=\"left\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.eecs.berkeley.edu\/~rabe\/\">Markus N. Rabe<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (University of California, Berkeley, US)<\/div>\n<\/li>\n<li>\n<div align=\"left\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.philipp.ruemmer.org\/\">Philipp Ruemmer<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (Uppsala University, SE)<\/div>\n<\/li>\n<li>\n<div align=\"left\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/researcher.ibm.com\/view.php?person=us-psuter\" target=\"_blank\">Philippe Suter<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (IBM T. J. Watson, US)<\/div>\n<\/li>\n<li>\n<div align=\"left\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.georg.weissenbacher.name\/\">Georg Weissenbacher<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (Vienna University of Technology, AT)<\/div>\n<\/li>\n<\/ul>\n<p>&nbsp;<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<p>The workshop will take place in Room 0.06 in the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"https:\/\/issta2016.cispa.saarland\/getting-to-issta\/\">CISPA building<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> of Saarland University.<\/p>\n<table style=\"border: 1px solid black\">\n<tbody>\n<tr>\n<td style=\"border: 1px solid black;width: 15%\" align=\"right\" width=\"15%\">9:45-10:00<\/td>\n<td style=\"border: 1px solid black;padding: 5px\">Welcome<\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">10:00-11:00<\/td>\n<td style=\"border: 1px solid black;padding: 5px\"><b>Session I: Keynote<\/b><br \/>\nVijay Ganesh: <em>An Empirical Understanding of Conflict-Driven Clause-Learning SAT Solvers<\/em> (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/06\/cstva16-ganesh.pptx\">Slides<\/a>)<br \/>\n<span style=\"font-size: small\">Chair: Christoph M. Wintersteiger<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">11:00-11:30<\/td>\n<td style=\"border: 1px solid black;padding: 5px\">Coffee Break<\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">11:30-13:00<\/td>\n<td style=\"border: 1px solid black;padding: 5px\"><strong>Session II: Bug finding<\/strong><br \/>\n<span style=\"font-size: small\">Chair: Murali Krishna Ramanathan<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">11:30-12:00<\/td>\n<td style=\"border: 1px solid black;padding: 5px\">Yavuz Koroglu and Alper Sen: <em>Design of a Modified Concolic Testing Algorithm with Smaller Constraints<\/em> (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/06\/cstva16-koroglu.pdf\">Slides<\/a>)<\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">12:00-12:30<\/td>\n<td style=\"border: 1px solid black;padding: 5px\">Hanefi Mercan and Cemal Yilmaz:<em> A Constraint Solving Problem Towards Unified Combinatorial Interaction Testing<br \/>\n<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">12:30-13:00<\/td>\n<td style=\"border: 1px solid black;padding: 5px\">Daniel Neville, Andrew Malton, Martin Brain and Daniel Kroening: <em>Towards Automated Bounded Model Checking of API Implementations<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">13:00-14:10<\/td>\n<td style=\"border: 1px solid black;padding: 5px\">Lunch<\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">14:10-15:40<\/td>\n<td style=\"border: 1px solid black;padding: 5px\"><strong>Session III: Concurrency<\/strong><br \/>\n<span style=\"font-size: small\">Chair: Vijay Ganesh<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">14:10-15:10<\/td>\n<td style=\"border: 1px solid black;padding: 5px\"><strong>Keynote II<\/strong><br \/>\nMurali Krishna Ramanathan: <em>Leveraging Constraint Solvers in Building Reliable Multithreaded Software<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">15:10-15:40<\/td>\n<td style=\"border: 1px solid black;padding: 5px\">Allan Blanchard, Nikolai Kosmatov and Fr\u00e9d\u00e9ric Loulergue: <em>A CHR-Based Solver for Weak Memory Behaviors<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">15:40-16:00<\/td>\n<td style=\"border: 1px solid black;padding: 5px\">Coffee break<\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">16:00-17:00<\/td>\n<td style=\"border: 1px solid black;padding: 5px\"><strong>Open discussion<\/strong><br \/>\n<span style=\"font-size: small\">Moderator: Christoph M. Wintersteiger<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<p>We invite three categories of submissions:<\/p>\n<ul>\n<li><em>Research papers<\/em>: Original contributions, presenting novel ideas, results or systems in constraint-based software engineering. Papers should not be published or submitted elsewhere during the time of evaluation.<\/li>\n<li><em>Tool demonstrations, short papers & fast abstracts<\/em>: Propose tool demonstrations, brief notes, or abstracts, presenting new tools, new challenges or groundbreaking results in constraint-based software engineering.<\/li>\n<li><em>Presentation-only papers<\/em>: describe work recently published or submitted elsewhere and will not be included in the proceedings. We see this as a way to provide additional access to important developments that CSTVA attendees may be unaware of. If accepted, papers in this category cannot be promoted to another category.<\/li>\n<\/ul>\n<p>Submission site: Papers should be submitted via EasyChair at <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"https:\/\/easychair.org\/conferences\/?conf=cstvaissta2016\">https:\/\/easychair.org\/conferences\/?conf=cstvaissta2016<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<p>Submitted papers must be in PDF format, formatted according to the EPiC Formatting Guidelines (see <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.easychair.org\/publications\/for_authors\">http:\/\/www.easychair.org\/publications\/for_authors<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>),<br \/>\nand must not exceed the following size limits:<\/p>\n<ul>\n<li>Research papers: max 10 pages for the main text, including figures, tables and appendices, where references may occupy up to 2 additional pages<\/li>\n<li>Tool demonstration or fast abstract: max 6 pages<\/li>\n<\/ul>\n<p>Papers in all three categories will be peer-reviewed. All accepted papers (except presentation-only) will be published in CEUR workshop proceedings (see<br \/>\n<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/ceur-ws.org\/\">http:\/\/ceur-ws.org\/<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>).<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n","protected":false},"excerpt":{"rendered":"<p>The 7th Workshop on Constraint Solvers in Testing, Verification, and Analysis (CSTVA 2016)<\/p>\n","protected":false},"featured_media":0,"template":"","meta":{"msr-url-field":"","msr-podcast-episode":"","msrModifiedDate":"","msrModifiedDateEnabled":false,"ep_exclude_from_search":false,"_classifai_error":"","msr_startdate":"2016-07-17","msr_enddate":"2016-07-17","msr_location":"Saarbr\u00fccken, Germany","msr_expirationdate":"","msr_event_recording_link":"","msr_event_link":"","msr_event_link_redirect":false,"msr_event_time":"","msr_hide_region":false,"msr_private_event":false,"msr_hide_image_in_river":0,"footnotes":""},"research-area":[],"msr-region":[239178],"msr-event-type":[197941],"msr-video-type":[],"msr-locale":[268875],"msr-program-audience":[],"msr-post-option":[],"msr-impact-theme":[],"class_list":["post-242936","msr-event","type-msr-event","status-publish","hentry","msr-region-europe","msr-event-type-conferences","msr-locale-en_us"],"msr_about":"<!-- wp:msr\/event-details {\"title\":\"CSTVA 2016\",\"backgroundColor\":\"grey\"} \/-->\n\n<!-- wp:msr\/content-tabs --><!-- wp:msr\/content-tab {\"title\":\"About\"} --><!-- wp:freeform --><p>The 7th Workshop on Constraint Solvers in Testing, Verification, and Analysis<\/p>\n<p>Co-located with <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/issta2016.cispa.saarland\/\">ISSTA 2016<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<p>Proceedings: <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/ceur-ws.org\/Vol-1639\/\">CEUR-WS Vol. 1639<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>.<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<p align=\"left\">&gt; The workshop proceedings of the workshop are now available as <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/ceur-ws.org\/Vol-1639\/\">CEUR-WS Volume 1639<\/a>.<\/p>\n<hr \/>\n<p align=\"left\">In the last decade there has been a revolutionary improvement in the efficiency and expressive power of constraint solvers (e.g., SAT, SMT and CP solvers), with a consequent impact on all manner of software engineering applications and research programs. A prime example of this impact is the rapid development and adoption of solver-based symbolic-execution techniques in myriad applications such as test generation, equivalence checking, security, automated exploit construction and fault localization. Black-box use of Boolean SAT solvers for proof-of-concept has been followed by the use of Satisfiability Modulo Theories (SMT) solvers integrating rich theories to treat these applications more thoroughly. An increasing amount of work is focussing on how best to use, tune, or extend solvers to meet the needs of particular applications. A similar theme of deeper integration of solver and application can be seen with ongoing research on Constraint Programming (CP) techniques and their use in software engineering.<\/p>\n<p align=\"left\">The workshop will focus on a broad range of topics where solvers have already made an impact, e.g., symbolic-execution based testing, as well as newer ones where their use is still nascent, e.g., testing of software product lines. The topics include, but are not limited to, the following:<\/p>\n<ul>\n<li>Constraint-based analysis of programs and models<\/li>\n<li>Constraint-based test input generation<\/li>\n<li>Constraint-based exploration of programs and models<\/li>\n<li>SMT and CP solvers for testing, verification, analysis, and synthesis<\/li>\n<li>SMT and CP solvers and their applications in computer security<\/li>\n<li>Programmable SMT and CP solvers<\/li>\n<li>Combinations of constraint solvers<\/li>\n<li>Constraint programming and software engineering<\/li>\n<li>Solvers and software product lines<\/li>\n<li>Solvers and fault localization<\/li>\n<li>Following a first meeting held with the CP conference in <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.irisa.fr\/manifestations\/2006\/CSTVA06\/\">2006<\/a>, and subsequent editions held in <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.st.cs.uni-saarland.de\/cstva10\/\">2010<\/a>, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.st.cs.uni-saarland.de\/cstva11\/\">2011<\/a>, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/srg.doc.ic.ac.uk\/cstva12\/\">2012<\/a>, <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/cstva2013.univ-fcomte.fr\/\">2013<\/a>, and <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/srg.doc.ic.ac.uk\/cstva14\/\">2014<\/a>, and the organisation of two workshops gathering researchers from the CP and verification communities, namely <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.it.uu.se\/research\/group\/astra\/CPmeetsCAV\/programme.html\">CPmeetsCAV 2013<\/a> and <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/cp2014.a4cp.org\/workshops\/cpcav14\">CPmeetsVerification 2014<\/a>, the aim of the CSTVA workshop at ISSTA is to bring together researchers in SAT\/SMT, CP and software test\/analysis in order to raise the awareness of constraint solving in the research community and encourage development of new applications and extensible solvers.<\/li>\n<\/ul>\n<p><strong>Organization<\/strong><\/p>\n<ul>\n<li>Omer Tripp (Google)<\/li>\n<li>\n<div align=\"left\"><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/cwinter\/\">Christoph M. Wintersteiger\u00a0<\/a>(Microsoft Research)<\/div>\n<\/li>\n<\/ul>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<!-- \/wp:freeform --><!-- \/wp:msr\/content-tab --><!-- wp:msr\/content-tab {\"title\":\"Program committee\"} --><!-- wp:freeform --><ul>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.mathieuacher.com\/\">Mathieu Acher<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (University of Rennes I\/INRIA. FR)<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.cs.unipr.it\/~bagnara\">Roberto Bagnara<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (University of Parma and BUGSENG, IT)<\/li>\n<li><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/www.cs.bath.ac.uk\/~mjb\/\" target=\"_blank\">Martin Brain<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (University of Oxford, UK)<\/li>\n<li>\n<div align=\"left\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"https:\/\/www.simula.no\/people\/stefanod\">Stefano Di Alesio<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (Certus Centre for Software Verification and Validation, Simula Research Laboratory, NO)<\/div>\n<\/li>\n<li>\n<div align=\"left\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/researcher.watson.ibm.com\/researcher\/view.php?person=us-dolby\">Julian Dolby<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (IBM T. J. Watson, US)<\/div>\n<\/li>\n<li>\n<div align=\"left\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"https:\/\/sites.google.com\/site\/lpxzpurdue\/\" target=\"_blank\">Peng Liu<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (IBM T. J. Watson, US)<\/div>\n<\/li>\n<li>\n<div align=\"left\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/sat.inesc-id.pt\/~ruben\/\">Ruben Martins<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (University of Texas at Austin, US)<\/div>\n<\/li>\n<li>\n<div align=\"left\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/ti.arc.nasa.gov\/profile\/pcorina\/\" target=\"_blank\">Corina Pasareanu<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (CMU\/NASA Ames Research Center, US)<\/div>\n<\/li>\n<li>\n<div align=\"left\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.eecs.berkeley.edu\/~rabe\/\">Markus N. Rabe<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (University of California, Berkeley, US)<\/div>\n<\/li>\n<li>\n<div align=\"left\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.philipp.ruemmer.org\/\">Philipp Ruemmer<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (Uppsala University, SE)<\/div>\n<\/li>\n<li>\n<div align=\"left\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" href=\"http:\/\/researcher.ibm.com\/view.php?person=us-psuter\" target=\"_blank\">Philippe Suter<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (IBM T. J. Watson, US)<\/div>\n<\/li>\n<li>\n<div align=\"left\"><a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.georg.weissenbacher.name\/\">Georg Weissenbacher<span class=\"sr-only\"> (opens in new tab)<\/span><\/a> (Vienna University of Technology, AT)<\/div>\n<\/li>\n<\/ul>\n<p>&nbsp;<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<!-- \/wp:freeform --><!-- \/wp:msr\/content-tab --><!-- wp:msr\/content-tab {\"title\":\"Program\"} --><!-- wp:freeform --><p>The workshop will take place in Room 0.06 in the <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"https:\/\/issta2016.cispa.saarland\/getting-to-issta\/\">CISPA building<\/a> of Saarland University.<\/p>\n<table style=\"border: 1px solid black\">\n<tbody>\n<tr>\n<td style=\"border: 1px solid black;width: 15%\" align=\"right\" width=\"15%\">9:45-10:00<\/td>\n<td style=\"border: 1px solid black;padding: 5px\">Welcome<\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">10:00-11:00<\/td>\n<td style=\"border: 1px solid black;padding: 5px\"><b>Session I: Keynote<\/b><br \/>\nVijay Ganesh: <em>An Empirical Understanding of Conflict-Driven Clause-Learning SAT Solvers<\/em> (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/06\/cstva16-ganesh.pptx\">Slides<\/a>)<br \/>\n<span style=\"font-size: small\">Chair: Christoph M. Wintersteiger<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">11:00-11:30<\/td>\n<td style=\"border: 1px solid black;padding: 5px\">Coffee Break<\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">11:30-13:00<\/td>\n<td style=\"border: 1px solid black;padding: 5px\"><strong>Session II: Bug finding<\/strong><br \/>\n<span style=\"font-size: small\">Chair: Murali Krishna Ramanathan<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">11:30-12:00<\/td>\n<td style=\"border: 1px solid black;padding: 5px\">Yavuz Koroglu and Alper Sen: <em>Design of a Modified Concolic Testing Algorithm with Smaller Constraints<\/em> (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/06\/cstva16-koroglu.pdf\">Slides<\/a>)<\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">12:00-12:30<\/td>\n<td style=\"border: 1px solid black;padding: 5px\">Hanefi Mercan and Cemal Yilmaz:<em> A Constraint Solving Problem Towards Unified Combinatorial Interaction Testing<br \/>\n<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">12:30-13:00<\/td>\n<td style=\"border: 1px solid black;padding: 5px\">Daniel Neville, Andrew Malton, Martin Brain and Daniel Kroening: <em>Towards Automated Bounded Model Checking of API Implementations<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">13:00-14:10<\/td>\n<td style=\"border: 1px solid black;padding: 5px\">Lunch<\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">14:10-15:40<\/td>\n<td style=\"border: 1px solid black;padding: 5px\"><strong>Session III: Concurrency<\/strong><br \/>\n<span style=\"font-size: small\">Chair: Vijay Ganesh<\/span><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">14:10-15:10<\/td>\n<td style=\"border: 1px solid black;padding: 5px\"><strong>Keynote II<\/strong><br \/>\nMurali Krishna Ramanathan: <em>Leveraging Constraint Solvers in Building Reliable Multithreaded Software<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">15:10-15:40<\/td>\n<td style=\"border: 1px solid black;padding: 5px\">Allan Blanchard, Nikolai Kosmatov and Fr\u00e9d\u00e9ric Loulergue: <em>A CHR-Based Solver for Weak Memory Behaviors<\/em><\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">15:40-16:00<\/td>\n<td style=\"border: 1px solid black;padding: 5px\">Coffee break<\/td>\n<\/tr>\n<tr>\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">16:00-17:00<\/td>\n<td style=\"border: 1px solid black;padding: 5px\"><strong>Open discussion<\/strong><br \/>\n<span style=\"font-size: small\">Moderator: Christoph M. Wintersteiger<\/span><\/td>\n<\/tr>\n<\/tbody>\n<\/table>\n<p><span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<!-- \/wp:freeform --><!-- \/wp:msr\/content-tab --><!-- wp:msr\/content-tab {\"title\":\"Submission details\"} --><!-- wp:freeform --><p>We invite three categories of submissions:<\/p>\n<ul>\n<li><em>Research papers<\/em>: Original contributions, presenting novel ideas, results or systems in constraint-based software engineering. Papers should not be published or submitted elsewhere during the time of evaluation.<\/li>\n<li><em>Tool demonstrations, short papers &amp; fast abstracts<\/em>: Propose tool demonstrations, brief notes, or abstracts, presenting new tools, new challenges or groundbreaking results in constraint-based software engineering.<\/li>\n<li><em>Presentation-only papers<\/em>: describe work recently published or submitted elsewhere and will not be included in the proceedings. We see this as a way to provide additional access to important developments that CSTVA attendees may be unaware of. If accepted, papers in this category cannot be promoted to another category.<\/li>\n<\/ul>\n<p>Submission site: Papers should be submitted via EasyChair at <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"https:\/\/easychair.org\/conferences\/?conf=cstvaissta2016\">https:\/\/easychair.org\/conferences\/?conf=cstvaissta2016<span class=\"sr-only\"> (opens in new tab)<\/span><\/a><\/p>\n<p>Submitted papers must be in PDF format, formatted according to the EPiC Formatting Guidelines (see <a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/www.easychair.org\/publications\/for_authors\">http:\/\/www.easychair.org\/publications\/for_authors<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>),<br \/>\nand must not exceed the following size limits:<\/p>\n<ul>\n<li>Research papers: max 10 pages for the main text, including figures, tables and appendices, where references may occupy up to 2 additional pages<\/li>\n<li>Tool demonstration or fast abstract: max 6 pages<\/li>\n<\/ul>\n<p>Papers in all three categories will be peer-reviewed. All accepted papers (except presentation-only) will be published in CEUR workshop proceedings (see<br \/>\n<a class=\"msr-external-link glyph-append glyph-append-open-in-new-tab glyph-append-xsmall\" target=\"_blank\" href=\"http:\/\/ceur-ws.org\/\">http:\/\/ceur-ws.org\/<span class=\"sr-only\"> (opens in new tab)<\/span><\/a>).<span id=\"label-external-link\" class=\"sr-only\" aria-hidden=\"true\">Opens in a new tab<\/span><\/p>\n<!-- \/wp:freeform --><!-- \/wp:msr\/content-tab --><!-- \/wp:msr\/content-tabs -->","tab-content":[{"id":0,"name":"About","content":"<p align=\"left\">&gt; The workshop proceedings of the workshop are now available as <a href=\"http:\/\/ceur-ws.org\/Vol-1639\/\">CEUR-WS Volume 1639<\/a>.<\/p>\r\n\r\n\r\n<hr \/>\r\n<p align=\"left\">In the last decade there has been a revolutionary improvement in the efficiency and expressive power of constraint solvers (e.g., SAT, SMT and CP solvers), with a consequent impact on all manner of software engineering applications and research programs. A prime example of this impact is the rapid development and adoption of solver-based symbolic-execution techniques in myriad applications such as test generation, equivalence checking, security, automated exploit construction and fault localization. Black-box use of Boolean SAT solvers for proof-of-concept has been followed by the use of Satisfiability Modulo Theories (SMT) solvers integrating rich theories to treat these applications more thoroughly. An increasing amount of work is focussing on how best to use, tune, or extend solvers to meet the needs of particular applications. A similar theme of deeper integration of solver and application can be seen with ongoing research on Constraint Programming (CP) techniques and their use in software engineering.<\/p>\r\n<p align=\"left\">The workshop will focus on a broad range of topics where solvers have already made an impact, e.g., symbolic-execution based testing, as well as newer ones where their use is still nascent, e.g., testing of software product lines. The topics include, but are not limited to, the following:<\/p>\r\n\r\n<ul>\r\n \t<li>Constraint-based analysis of programs and models<\/li>\r\n \t<li>Constraint-based test input generation<\/li>\r\n \t<li>Constraint-based exploration of programs and models<\/li>\r\n \t<li>SMT and CP solvers for testing, verification, analysis, and synthesis<\/li>\r\n \t<li>SMT and CP solvers and their applications in computer security<\/li>\r\n \t<li>Programmable SMT and CP solvers<\/li>\r\n \t<li>Combinations of constraint solvers<\/li>\r\n \t<li>Constraint programming and software engineering<\/li>\r\n \t<li>Solvers and software product lines<\/li>\r\n \t<li>Solvers and fault localization<\/li>\r\n \t<li>Following a first meeting held with the CP conference in <a href=\"http:\/\/www.irisa.fr\/manifestations\/2006\/CSTVA06\/\">2006<\/a>, and subsequent editions held in <a href=\"http:\/\/www.st.cs.uni-saarland.de\/cstva10\/\">2010<\/a>, <a href=\"http:\/\/www.st.cs.uni-saarland.de\/cstva11\/\">2011<\/a>, <a href=\"http:\/\/srg.doc.ic.ac.uk\/cstva12\/\">2012<\/a>, <a href=\"http:\/\/cstva2013.univ-fcomte.fr\/\">2013<\/a>, and <a href=\"http:\/\/srg.doc.ic.ac.uk\/cstva14\/\">2014<\/a>, and the organisation of two workshops gathering researchers from the CP and verification communities, namely <a href=\"http:\/\/www.it.uu.se\/research\/group\/astra\/CPmeetsCAV\/programme.html\">CPmeetsCAV 2013<\/a> and <a href=\"http:\/\/cp2014.a4cp.org\/workshops\/cpcav14\">CPmeetsVerification 2014<\/a>, the aim of the CSTVA workshop at ISSTA is to bring together researchers in SAT\/SMT, CP and software test\/analysis in order to raise the awareness of constraint solving in the research community and encourage development of new applications and extensible solvers.<\/li>\r\n<\/ul>\r\n<strong>Organization<\/strong>\r\n<ul>\r\n \t<li>Omer Tripp (Google)<\/li>\r\n \t<li>\r\n<div align=\"left\"><a href=\"https:\/\/www.microsoft.com\/en-us\/research\/people\/cwinter\/\">Christoph M. Wintersteiger\u00a0<\/a>(Microsoft Research)<\/div><\/li>\r\n<\/ul>"},{"id":1,"name":"Program committee","content":"<ul>\r\n \t<li><a href=\"http:\/\/www.mathieuacher.com\/\">Mathieu Acher<\/a> (University of Rennes I\/INRIA. FR)<\/li>\r\n \t<li><a href=\"http:\/\/www.cs.unipr.it\/~bagnara\">Roberto Bagnara<\/a> (University of Parma and BUGSENG, IT)<\/li>\r\n \t<li><a href=\"http:\/\/www.cs.bath.ac.uk\/~mjb\/\" target=\"_self\">Martin Brain<\/a> (University of Oxford, UK)<\/li>\r\n \t<li>\r\n<div align=\"left\"><a href=\"https:\/\/www.simula.no\/people\/stefanod\">Stefano Di Alesio<\/a> (Certus Centre for Software Verification and Validation, Simula Research Laboratory, NO)<\/div><\/li>\r\n \t<li>\r\n<div align=\"left\"><a href=\"http:\/\/researcher.watson.ibm.com\/researcher\/view.php?person=us-dolby\">Julian Dolby<\/a> (IBM T. J. Watson, US)<\/div><\/li>\r\n \t<li>\r\n<div align=\"left\"><a href=\"https:\/\/sites.google.com\/site\/lpxzpurdue\/\" target=\"_self\">Peng Liu<\/a> (IBM T. J. Watson, US)<\/div><\/li>\r\n \t<li>\r\n<div align=\"left\"><a href=\"http:\/\/sat.inesc-id.pt\/~ruben\/\">Ruben Martins<\/a> (University of Texas at Austin, US)<\/div><\/li>\r\n \t<li>\r\n<div align=\"left\"><a href=\"http:\/\/ti.arc.nasa.gov\/profile\/pcorina\/\" target=\"_self\">Corina Pasareanu<\/a> (CMU\/NASA Ames Research Center, US)<\/div><\/li>\r\n \t<li>\r\n<div align=\"left\"><a href=\"http:\/\/www.eecs.berkeley.edu\/~rabe\/\">Markus N. Rabe<\/a> (University of California, Berkeley, US)<\/div><\/li>\r\n \t<li>\r\n<div align=\"left\"><a href=\"http:\/\/www.philipp.ruemmer.org\/\">Philipp Ruemmer<\/a> (Uppsala University, SE)<\/div><\/li>\r\n \t<li>\r\n<div align=\"left\"><a href=\"http:\/\/researcher.ibm.com\/view.php?person=us-psuter\" target=\"_self\">Philippe Suter<\/a> (IBM T. J. Watson, US)<\/div><\/li>\r\n \t<li>\r\n<div align=\"left\"><a href=\"http:\/\/www.georg.weissenbacher.name\/\">Georg Weissenbacher<\/a> (Vienna University of Technology, AT)<\/div><\/li>\r\n<\/ul>\r\n&nbsp;"},{"id":2,"name":"Program","content":"The workshop will take place in Room 0.06 in the <a href=\"https:\/\/issta2016.cispa.saarland\/getting-to-issta\/\">CISPA building<\/a> of Saarland University.\r\n<table style=\"border: 1px solid black\">\r\n<tbody>\r\n<tr>\r\n<td style=\"border: 1px solid black;width: 15%\" align=\"right\" width=\"15%\">9:45-10:00<\/td>\r\n<td style=\"border: 1px solid black;padding: 5px\">Welcome<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">10:00-11:00<\/td>\r\n<td style=\"border: 1px solid black;padding: 5px\"><b>Session I: Keynote<\/b>\r\nVijay Ganesh: <em>An Empirical Understanding of Conflict-Driven Clause-Learning SAT Solvers<\/em> (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/06\/cstva16-ganesh.pptx\">Slides<\/a>)\r\n<span style=\"font-size: small\">Chair: Christoph M. Wintersteiger<\/span><\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">11:00-11:30<\/td>\r\n<td style=\"border: 1px solid black;padding: 5px\">Coffee Break<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">11:30-13:00<\/td>\r\n<td style=\"border: 1px solid black;padding: 5px\"><strong>Session II: Bug finding<\/strong>\r\n<span style=\"font-size: small\">Chair: Murali Krishna Ramanathan<\/span><\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">11:30-12:00<\/td>\r\n<td style=\"border: 1px solid black;padding: 5px\">Yavuz Koroglu and Alper Sen: <em>Design of a Modified Concolic Testing Algorithm with Smaller Constraints<\/em> (<a href=\"https:\/\/www.microsoft.com\/en-us\/research\/wp-content\/uploads\/2016\/06\/cstva16-koroglu.pdf\">Slides<\/a>)<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">12:00-12:30<\/td>\r\n<td style=\"border: 1px solid black;padding: 5px\">Hanefi Mercan and Cemal Yilmaz:<em> A Constraint Solving Problem Towards Unified Combinatorial Interaction Testing\r\n<\/em><\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">12:30-13:00<\/td>\r\n<td style=\"border: 1px solid black;padding: 5px\">Daniel Neville, Andrew Malton, Martin Brain and Daniel Kroening: <em>Towards Automated Bounded Model Checking of API Implementations<\/em><\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">13:00-14:10<\/td>\r\n<td style=\"border: 1px solid black;padding: 5px\">Lunch<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">14:10-15:40<\/td>\r\n<td style=\"border: 1px solid black;padding: 5px\"><strong>Session III: Concurrency<\/strong>\r\n<span style=\"font-size: small\">Chair: Vijay Ganesh<\/span><\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">14:10-15:10<\/td>\r\n<td style=\"border: 1px solid black;padding: 5px\"><strong>Keynote II<\/strong>\r\nMurali Krishna Ramanathan: <em>Leveraging Constraint Solvers in Building Reliable Multithreaded Software<\/em><\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">15:10-15:40<\/td>\r\n<td style=\"border: 1px solid black;padding: 5px\">Allan Blanchard, Nikolai Kosmatov and Fr\u00e9d\u00e9ric Loulergue: <em>A CHR-Based Solver for Weak Memory Behaviors<\/em><\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">15:40-16:00<\/td>\r\n<td style=\"border: 1px solid black;padding: 5px\">Coffee break<\/td>\r\n<\/tr>\r\n<tr>\r\n<td style=\"border: 1px solid black;width: 15%;padding: 5px\" align=\"right\" valign=\"top\">16:00-17:00<\/td>\r\n<td style=\"border: 1px solid black;padding: 5px\"><strong>Open discussion<\/strong>\r\n<span style=\"font-size: small\">Moderator: Christoph M. Wintersteiger<\/span><\/td>\r\n<\/tr>\r\n<\/tbody>\r\n<\/table>"},{"id":3,"name":"Submission details","content":"We invite three categories of submissions:\r\n<ul>\r\n \t<li><em>Research papers<\/em>: Original contributions, presenting novel ideas, results or systems in constraint-based software engineering. Papers should not be published or submitted elsewhere during the time of evaluation.<\/li>\r\n \t<li><em>Tool demonstrations, short papers &amp; fast abstracts<\/em>: Propose tool demonstrations, brief notes, or abstracts, presenting new tools, new challenges or groundbreaking results in constraint-based software engineering.<\/li>\r\n \t<li><em>Presentation-only papers<\/em>: describe work recently published or submitted elsewhere and will not be included in the proceedings. We see this as a way to provide additional access to important developments that CSTVA attendees may be unaware of. If accepted, papers in this category cannot be promoted to another category.<\/li>\r\n<\/ul>\r\nSubmission site: Papers should be submitted via EasyChair at <a href=\"https:\/\/easychair.org\/conferences\/?conf=cstvaissta2016\">https:\/\/easychair.org\/conferences\/?conf=cstvaissta2016<\/a>\r\n\r\nSubmitted papers must be in PDF format, formatted according to the EPiC Formatting Guidelines (see <a href=\"http:\/\/www.easychair.org\/publications\/for_authors\">http:\/\/www.easychair.org\/publications\/for_authors<\/a>),\r\nand must not exceed the following size limits:\r\n<ul>\r\n \t<li>Research papers: max 10 pages for the main text, including figures, tables and appendices, where references may occupy up to 2 additional pages<\/li>\r\n \t<li>Tool demonstration or fast abstract: max 6 pages<\/li>\r\n<\/ul>\r\nPapers in all three categories will be peer-reviewed. All accepted papers (except presentation-only) will be published in CEUR workshop proceedings (see\r\n<a href=\"http:\/\/ceur-ws.org\/\">http:\/\/ceur-ws.org\/<\/a>)."}],"msr_startdate":"2016-07-17","msr_enddate":"2016-07-17","msr_event_time":"","msr_location":"Saarbr\u00fccken, Germany","msr_event_link":"","msr_event_recording_link":"","msr_startdate_formatted":"July 17, 2016","msr_register_text":"Watch now","msr_cta_link":"","msr_cta_text":"","msr_cta_bi_name":"","featured_image_thumbnail":null,"event_excerpt":"The 7th Workshop on Constraint Solvers in Testing, Verification, and Analysis (CSTVA 2016)","msr_research_lab":[],"related-researchers":[],"msr_impact_theme":[],"related-academic-programs":[],"related-groups":[],"related-projects":[],"related-opportunities":[],"related-publications":[],"related-videos":[],"related-posts":[],"_links":{"self":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/242936","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event"}],"about":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/types\/msr-event"}],"version-history":[{"count":3,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/242936\/revisions"}],"predecessor-version":[{"id":1147323,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event\/242936\/revisions\/1147323"}],"wp:attachment":[{"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/media?parent=242936"}],"wp:term":[{"taxonomy":"msr-research-area","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/research-area?post=242936"},{"taxonomy":"msr-region","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-region?post=242936"},{"taxonomy":"msr-event-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-event-type?post=242936"},{"taxonomy":"msr-video-type","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-video-type?post=242936"},{"taxonomy":"msr-locale","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-locale?post=242936"},{"taxonomy":"msr-program-audience","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-program-audience?post=242936"},{"taxonomy":"msr-post-option","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-post-option?post=242936"},{"taxonomy":"msr-impact-theme","embeddable":true,"href":"https:\/\/www.microsoft.com\/en-us\/research\/wp-json\/wp\/v2\/msr-impact-theme?post=242936"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}