{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,7,31]],"date-time":"2025-07-31T00:25:45Z","timestamp":1753921545220},"reference-count":24,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2006,10,31]],"date-time":"2006-10-31T00:00:00Z","timestamp":1162252800000},"content-version":"vor","delay-in-days":5296,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Software Testing Verif &amp; Rel"],"published-print":{"date-parts":[[1992,5]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>\u2018Propagation, infection, and execution analysis\u2019 (termed PIE) is used for predicting where faults can more easily hide in software. To make such predictions, programs are dynamically executed with test cases, and information concerning the test cases is collected into a histogram, each bin of which represents a single test case. The score in a bin predicts the likelihood that the test case will reveal a fault through the production of a failure (if a fault exists in the set of program locations that the test case executes). Preliminary experiments using program mutations suggest that the histogram technique presented in this paper can rank test cases according to their fault revealing ability.<\/jats:p>","DOI":"10.1002\/stvr.4370020105","type":"journal-article","created":{"date-parts":[[2006,11,18]],"date-time":"2006-11-18T06:11:05Z","timestamp":1163830265000},"page":"25-42","source":"Crossref","is-referenced-by-count":38,"title":["The revealing power of a test case"],"prefix":"10.1002","volume":"2","author":[{"given":"Jeffrey M.","family":"Voas","sequence":"first","affiliation":[]},{"given":"Keith W.","family":"Miller","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,10,31]]},"reference":[{"issue":"4","key":"e_1_2_1_2_1","first-page":"33","article-title":"Hints on test data selection: help for the practicing programmer","volume":"11","author":"De Millo R. A.","year":"1978","journal-title":"IEEE Computer"},{"issue":"4","key":"e_1_2_1_3_1","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1109\/TSE.1982.235571","article-title":"Weak mutation testing and completeness of test sets","volume":"8","author":"Howden W. E.","year":"1982","journal-title":"IEEE Transactions on Software Engineering"},{"key":"e_1_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(88)90054-3"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.6169"},{"key":"e_1_2_1_6_1","unstructured":"Marick B.(1990) \u2018Two experiments in software testing\u2019 Technical Report UIUCDCS\u2010R\u201090\u20131644 Department of Computer Science University of Illinois at Urbana\u2010Champaign."},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1977.217782"},{"key":"e_1_2_1_8_1","doi-asserted-by":"crossref","unstructured":"Morell L. J.(1984) \u2018A theory of error\u2010based testing\u2019 Technical Report TR\u20101395 Department of Computer Science University of Maryland.","DOI":"10.21236\/ADA143533"},{"key":"e_1_2_1_9_1","unstructured":"Morell L. J.(1987) \u2018A model for code\u2010based testing schemes\u2019 Fifth Annual Pacific Northwest Software Quality Conference."},{"key":"e_1_2_1_10_1","doi-asserted-by":"crossref","unstructured":"Morell L. J.(1988) \u2018Theoretical insights into fault\u2010based testing\u2019 Proceedings of the 2nd ACM SIGSOFT\/IEEE Workshop on Software Testing Analysis and Verification Banff Canada.","DOI":"10.1109\/WST.1988.5353"},{"key":"e_1_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.57623"},{"key":"e_1_2_1_12_1","unstructured":"Morell L. J.(1990) Personal discussions."},{"key":"e_1_2_1_13_1","doi-asserted-by":"crossref","unstructured":"Morell L. J.andHamlet R. G.(1981) \u2018Error propagation and elimination in computer programs\u2019 Technical Report TR\u20101065 Department of Computer Science University of Maryland.","DOI":"10.21236\/ADA105437"},{"key":"e_1_2_1_14_1","unstructured":"Offutt A. J.(1988) \u2018Automatic test data generation\u2019 Ph.D. thesis Department of Information and Computer Science Georgia Institute of Technology."},{"key":"e_1_2_1_15_1","doi-asserted-by":"crossref","unstructured":"Offutt A. J.(1989) \u2018The coupling effect: fact or fiction\u2019 Proceedings of the Third ACM SIGSOFT Symposium on Software Testing Analysis and Verification Key West Florida.","DOI":"10.1145\/75308.75324"},{"key":"e_1_2_1_16_1","unstructured":"Rapps S.andWeyuker E. J.(1982) \u2018Data flow analysis techniques for test data selection\u2019 Proceedings of the 6th International Conference on Software Engineering Tokyo Japan."},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232226"},{"key":"e_1_2_1_18_1","unstructured":"Richardson D.andThomas M.(1988) \u2018The RELAY model of error detection and its application\u2019 Proceedings of the 2nd ACM SIGSOFT\/IEEE Workshop on Software Testing Analysis and Verification Banff Canada."},{"key":"e_1_2_1_19_1","unstructured":"Shimeall T. J.(1990) \u2018CONFLICT specification\u2019 Technical Report NPSCS\u201091\u2010001 Computer Science Department Naval Postgraduate School Monterey California."},{"key":"e_1_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.153381"},{"key":"e_1_2_1_21_1","unstructured":"Voas J.andMiller K.(1991) \u2018Improving software reliability by estimating the fault hiding ability of a program before it is written\u2019 Proceedings of the 9th Software Reliability Symposium Colorado Springs Colorado U.S.A."},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.73748"},{"key":"e_1_2_1_23_1","unstructured":"Voas J.andPayne J.(1991) \u2018A parallel propagation analysis algorithm\u2019 Technical Report WM\u201091\u20102 College of William and Mary in Virginia Department of Computer Science."},{"key":"e_1_2_1_24_1","unstructured":"Woodward M. R.andHalewood K.(1988) \u2018From weak to strong dead or alive? An analysis of some mutation testing issues\u2019.Proceedings of the 2nd ACM SIGSOFT\/IEEE Workshop on Software Testing Analysis and Verification Banff Canada."},{"key":"e_1_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1983.236870"}],"container-title":["Software Testing, Verification and Reliability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fstvr.4370020105","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/stvr.4370020105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,23]],"date-time":"2023-10-23T20:12:15Z","timestamp":1698091935000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/stvr.4370020105"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1992,5]]},"references-count":24,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1992,5]]}},"alternative-id":["10.1002\/stvr.4370020105"],"URL":"https:\/\/doi.org\/10.1002\/stvr.4370020105","archive":["Portico"],"relation":{},"ISSN":["0960-0833","1099-1689"],"issn-type":[{"value":"0960-0833","type":"print"},{"value":"1099-1689","type":"electronic"}],"subject":[],"published":{"date-parts":[[1992,5]]}}}