{"bundle_type":"pith_open_graph_bundle","bundle_version":"1.0","pith_number":"pith:2015:W5NGNWEK2ORZT53WIKRHDEEF4F","short_pith_number":"pith:W5NGNWEK","canonical_record":{"source":{"id":"1501.05821","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2015-01-23T15:07:50Z","cross_cats_sorted":[],"title_canon_sha256":"37536d8921924f1e2fc8c2efd508bab7610ecc16a6a9038f59447f0184561e66","abstract_canon_sha256":"28afe4564f11c7b8d546a5a71a72ba945731e6c9a6fa808e86331fb0c90362e1"},"schema_version":"1.0"},"canonical_sha256":"b75a66d88ad3a399f77642a2719085e16c3d8115f5a704f6ec68b8226f3c604c","source":{"kind":"arxiv","id":"1501.05821","version":1},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1501.05821","created_at":"2026-05-18T02:28:48Z"},{"alias_kind":"arxiv_version","alias_value":"1501.05821v1","created_at":"2026-05-18T02:28:48Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1501.05821","created_at":"2026-05-18T02:28:48Z"},{"alias_kind":"pith_short_12","alias_value":"W5NGNWEK2ORZ","created_at":"2026-05-18T12:29:47Z"},{"alias_kind":"pith_short_16","alias_value":"W5NGNWEK2ORZT53W","created_at":"2026-05-18T12:29:47Z"},{"alias_kind":"pith_short_8","alias_value":"W5NGNWEK","created_at":"2026-05-18T12:29:47Z"}],"events":[{"event_type":"record_created","subject_pith_number":"pith:2015:W5NGNWEK2ORZT53WIKRHDEEF4F","target":"record","payload":{"canonical_record":{"source":{"id":"1501.05821","kind":"arxiv","version":1},"metadata":{"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2015-01-23T15:07:50Z","cross_cats_sorted":[],"title_canon_sha256":"37536d8921924f1e2fc8c2efd508bab7610ecc16a6a9038f59447f0184561e66","abstract_canon_sha256":"28afe4564f11c7b8d546a5a71a72ba945731e6c9a6fa808e86331fb0c90362e1"},"schema_version":"1.0"},"canonical_sha256":"b75a66d88ad3a399f77642a2719085e16c3d8115f5a704f6ec68b8226f3c604c","receipt":{"kind":"pith_receipt","key_id":"pith-v1-2026-05","algorithm":"ed25519","signed_at":"2026-05-18T02:28:48.892780Z","signature_b64":"Lu6Mxi70HWg7waks3YlIBVZkAhuMl42Ga6YePwOWmyOE68apji7YR21J4l/thPBjDqi3KVGUIJu6TXRvOlrPBA==","signed_message":"canonical_sha256_bytes","builder_version":"pith-number-builder-2026-05-17-v1","receipt_version":"0.3","canonical_sha256":"b75a66d88ad3a399f77642a2719085e16c3d8115f5a704f6ec68b8226f3c604c","last_reissued_at":"2026-05-18T02:28:48.892395Z","signature_status":"signed_v1","first_computed_at":"2026-05-18T02:28:48.892395Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"source_kind":"arxiv","source_id":"1501.05821","source_version":1,"attestation_state":"computed"},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:28:48Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"GRk55gIFvEI1qfCqt6NIYmZ3DcECwazRiyRcWwdlw/lm0+tAesQEqWdNXM1l0cbytfxLp7ZidUv2PdFikXjTBg==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T14:18:49.842497Z"},"content_sha256":"a0430acd7b2fa5e3e5f98cd9f59f9788194f6f46160e175ec99a767b7acd9aed","schema_version":"1.0","event_id":"sha256:a0430acd7b2fa5e3e5f98cd9f59f9788194f6f46160e175ec99a767b7acd9aed"},{"event_type":"graph_snapshot","subject_pith_number":"pith:2015:W5NGNWEK2ORZT53WIKRHDEEF4F","target":"graph","payload":{"graph_snapshot":{"paper":{"title":"A Symbolic Execution Algorithm for Constraint-Based Testing of Database Programs","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","headline":"","cross_cats":[],"primary_cat":"cs.SE","authors_text":"Jean-Luc Hainaut, Micha\\\"el Marcozzi, Wim Vanhoof","submitted_at":"2015-01-23T15:07:50Z","abstract_excerpt":"In so-called constraint-based testing, symbolic execution is a common technique used as a part of the process to generate test data for imperative programs. Databases are ubiquitous in software and testing of programs manipulating databases is thus essential to enhance the reliability of software. This work proposes and evaluates experimentally a symbolic ex- ecution algorithm for constraint-based testing of database programs. First, we describe SimpleDB, a formal language which offers a minimal and well-defined syntax and seman- tics, to model common interaction scenarios between pro- grams a"},"claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1501.05821","kind":"arxiv","version":1},"verdict":{"id":null,"model_set":{},"created_at":null,"strongest_claim":"","one_line_summary":"","pipeline_version":null,"weakest_assumption":"","pith_extraction_headline":""},"references":{"count":0,"sample":[],"resolved_work":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","internal_anchors":0},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"author_claims":{"count":0,"strong_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"builder_version":"pith-number-builder-2026-05-17-v1"},"verdict_id":null},"signer":{"signer_id":"pith.science","signer_type":"pith_registry","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54"},"created_at":"2026-05-18T02:28:48Z","supersedes":[],"prev_event":null,"signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"QFB1o+ndl9KTAFPUGzE+EBBbw2tzS718V9xgDaZKLF/Z/Q7smGFj2hS9aCpa9H2kuhlGUubWDwWkttYygqOIDw==","signed_message":"open_graph_event_sha256_bytes","signed_at":"2026-05-20T14:18:49.842845Z"},"content_sha256":"bb379c40287430995e8e5afef129c52b49c962685ef70ee11ae5796b669eb6a0","schema_version":"1.0","event_id":"sha256:bb379c40287430995e8e5afef129c52b49c962685ef70ee11ae5796b669eb6a0"}],"timestamp_proofs":[],"mirror_hints":[{"mirror_type":"https","name":"Pith Resolver","base_url":"https://pith.science","bundle_url":"https://pith.science/pith/W5NGNWEK2ORZT53WIKRHDEEF4F/bundle.json","state_url":"https://pith.science/pith/W5NGNWEK2ORZT53WIKRHDEEF4F/state.json","well_known_bundle_url":"https://pith.science/.well-known/pith/W5NGNWEK2ORZT53WIKRHDEEF4F/bundle.json","status":"primary"}],"public_keys":[{"key_id":"pith-v1-2026-05","algorithm":"ed25519","format":"raw","public_key_b64":"stVStoiQhXFxp4s2pdzPNoqVNBMojDU/fJ2db5S3CbM=","public_key_hex":"b2d552b68890857171a78b36a5dccf368a953413288c353f7c9d9d6f94b709b3","fingerprint_sha256_b32_first128bits":"RVFV5Z2OI2J3ZUO7ERDEBCYNKS","fingerprint_sha256_hex":"8d4b5ee74e4693bcd1df2446408b0d54","rotates_at":null,"url":"https://pith.science/pith-signing-key.json","notes":"Pith uses this Ed25519 key to sign canonical record SHA-256 digests. Verify with: ed25519_verify(public_key, message=canonical_sha256_bytes, signature=base64decode(signature_b64))."}],"merge_version":"pith-open-graph-merge-v1","built_at":"2026-05-20T14:18:49Z","links":{"resolver":"https://pith.science/pith/W5NGNWEK2ORZT53WIKRHDEEF4F","bundle":"https://pith.science/pith/W5NGNWEK2ORZT53WIKRHDEEF4F/bundle.json","state":"https://pith.science/pith/W5NGNWEK2ORZT53WIKRHDEEF4F/state.json","well_known_bundle":"https://pith.science/.well-known/pith/W5NGNWEK2ORZT53WIKRHDEEF4F/bundle.json"},"state":{"state_type":"pith_open_graph_state","state_version":"1.0","pith_number":"pith:2015:W5NGNWEK2ORZT53WIKRHDEEF4F","merge_version":"pith-open-graph-merge-v1","event_count":2,"valid_event_count":2,"invalid_event_count":0,"equivocation_count":0,"current":{"canonical_record":{"metadata":{"abstract_canon_sha256":"28afe4564f11c7b8d546a5a71a72ba945731e6c9a6fa808e86331fb0c90362e1","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2015-01-23T15:07:50Z","title_canon_sha256":"37536d8921924f1e2fc8c2efd508bab7610ecc16a6a9038f59447f0184561e66"},"schema_version":"1.0","source":{"id":"1501.05821","kind":"arxiv","version":1}},"source_aliases":[{"alias_kind":"arxiv","alias_value":"1501.05821","created_at":"2026-05-18T02:28:48Z"},{"alias_kind":"arxiv_version","alias_value":"1501.05821v1","created_at":"2026-05-18T02:28:48Z"},{"alias_kind":"doi","alias_value":"10.48550/arxiv.1501.05821","created_at":"2026-05-18T02:28:48Z"},{"alias_kind":"pith_short_12","alias_value":"W5NGNWEK2ORZ","created_at":"2026-05-18T12:29:47Z"},{"alias_kind":"pith_short_16","alias_value":"W5NGNWEK2ORZT53W","created_at":"2026-05-18T12:29:47Z"},{"alias_kind":"pith_short_8","alias_value":"W5NGNWEK","created_at":"2026-05-18T12:29:47Z"}],"graph_snapshots":[{"event_id":"sha256:bb379c40287430995e8e5afef129c52b49c962685ef70ee11ae5796b669eb6a0","target":"graph","created_at":"2026-05-18T02:28:48Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"graph_snapshot":{"author_claims":{"count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57","strong_count":0},"builder_version":"pith-number-builder-2026-05-17-v1","claims":{"count":0,"items":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"formal_canon":{"evidence_count":0,"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"paper":{"abstract_excerpt":"In so-called constraint-based testing, symbolic execution is a common technique used as a part of the process to generate test data for imperative programs. Databases are ubiquitous in software and testing of programs manipulating databases is thus essential to enhance the reliability of software. This work proposes and evaluates experimentally a symbolic ex- ecution algorithm for constraint-based testing of database programs. First, we describe SimpleDB, a formal language which offers a minimal and well-defined syntax and seman- tics, to model common interaction scenarios between pro- grams a","authors_text":"Jean-Luc Hainaut, Micha\\\"el Marcozzi, Wim Vanhoof","cross_cats":[],"headline":"","license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2015-01-23T15:07:50Z","title":"A Symbolic Execution Algorithm for Constraint-Based Testing of Database Programs"},"references":{"count":0,"internal_anchors":0,"resolved_work":0,"sample":[],"snapshot_sha256":"258153158e38e3291e3d48162225fcdb2d5a3ed65a07baac614ab91432fd4f57"},"source":{"id":"1501.05821","kind":"arxiv","version":1},"verdict":{"created_at":null,"id":null,"model_set":{},"one_line_summary":"","pipeline_version":null,"pith_extraction_headline":"","strongest_claim":"","weakest_assumption":""}},"verdict_id":null}}],"author_attestations":[],"timestamp_anchors":[],"storage_attestations":[],"citation_signatures":[],"replication_records":[],"corrections":[],"mirror_hints":[],"record_created":{"event_id":"sha256:a0430acd7b2fa5e3e5f98cd9f59f9788194f6f46160e175ec99a767b7acd9aed","target":"record","created_at":"2026-05-18T02:28:48Z","signer":{"key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signer_id":"pith.science","signer_type":"pith_registry"},"payload":{"attestation_state":"computed","canonical_record":{"metadata":{"abstract_canon_sha256":"28afe4564f11c7b8d546a5a71a72ba945731e6c9a6fa808e86331fb0c90362e1","cross_cats_sorted":[],"license":"http://arxiv.org/licenses/nonexclusive-distrib/1.0/","primary_cat":"cs.SE","submitted_at":"2015-01-23T15:07:50Z","title_canon_sha256":"37536d8921924f1e2fc8c2efd508bab7610ecc16a6a9038f59447f0184561e66"},"schema_version":"1.0","source":{"id":"1501.05821","kind":"arxiv","version":1}},"canonical_sha256":"b75a66d88ad3a399f77642a2719085e16c3d8115f5a704f6ec68b8226f3c604c","receipt":{"algorithm":"ed25519","builder_version":"pith-number-builder-2026-05-17-v1","canonical_sha256":"b75a66d88ad3a399f77642a2719085e16c3d8115f5a704f6ec68b8226f3c604c","first_computed_at":"2026-05-18T02:28:48.892395Z","key_id":"pith-v1-2026-05","kind":"pith_receipt","last_reissued_at":"2026-05-18T02:28:48.892395Z","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","receipt_version":"0.3","signature_b64":"Lu6Mxi70HWg7waks3YlIBVZkAhuMl42Ga6YePwOWmyOE68apji7YR21J4l/thPBjDqi3KVGUIJu6TXRvOlrPBA==","signature_status":"signed_v1","signed_at":"2026-05-18T02:28:48.892780Z","signed_message":"canonical_sha256_bytes"},"source_id":"1501.05821","source_kind":"arxiv","source_version":1}}},"equivocations":[],"invalid_events":[],"applied_event_ids":["sha256:a0430acd7b2fa5e3e5f98cd9f59f9788194f6f46160e175ec99a767b7acd9aed","sha256:bb379c40287430995e8e5afef129c52b49c962685ef70ee11ae5796b669eb6a0"],"state_sha256":"45482d5a0b8858b3232712a48a639c57df1a271665fc38e2a13c7a5e7f409fb5"},"bundle_signature":{"signature_status":"signed_v1","algorithm":"ed25519","key_id":"pith-v1-2026-05","public_key_fingerprint":"8d4b5ee74e4693bcd1df2446408b0d54","signature_b64":"8vHfkHe2+vY4hZVKQmIDQuTniBm0c0ACCH1ZA6azb972+bQHkkoujuDcmPz3MhOsWfRjy5Dal2DMd3ra2/qKAA==","signed_message":"bundle_sha256_bytes","signed_at":"2026-05-20T14:18:49.844777Z","bundle_sha256":"c0a3691619dc0645381a2ababa7430456642aab1305787ad0e04bcc76a9abe2a"}}