{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,7]],"date-time":"2026-02-07T03:07:57Z","timestamp":1770433677394,"version":"3.49.0"},"reference-count":100,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2006,10,31]],"date-time":"2006-10-31T00:00:00Z","timestamp":1162252800000},"content-version":"vor","delay-in-days":4992,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Software Testing Verif &amp; Rel"],"published-print":{"date-parts":[[1993,3]]},"abstract":"<jats:title>Abstract<\/jats:title><jats:p>Many articles on software reliability models have been published in the last two decades. Because of the importance of this area and increasing interest in it, this annotated bibliography of 100 selected publications has been prepared. First, books, edited works and review papers of general interest are summarized and this is followed by separate introductions to various types of models.<\/jats:p>","DOI":"10.1002\/stvr.4370030103","type":"journal-article","created":{"date-parts":[[2006,11,17]],"date-time":"2006-11-17T18:28:02Z","timestamp":1163788082000},"page":"3-28","source":"Crossref","is-referenced-by-count":29,"title":["Software reliability models\u2014A selected annotated bibliography"],"prefix":"10.1002","volume":"3","author":[{"given":"M.","family":"Xie","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,10,31]]},"reference":[{"key":"e_1_2_1_2_1","first-page":"172","volume-title":"Software Reliability: Achievement and Assessment","author":"Anderson B. G.","year":"1987"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/0950-5849(90)90052-S"},{"key":"e_1_2_1_4_1","volume-title":"IEEE Transactions on Software Engineering","author":"Bastani F. B.","year":"1993"},{"key":"e_1_2_1_5_1","first-page":"321","volume-title":"Reliability Theory","author":"Bastani F. B.","year":"1986"},{"key":"e_1_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.60318"},{"key":"e_1_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-82846-1_11"},{"key":"e_1_2_1_8_1","unstructured":"Bendell T.andMellor P.(1986)Software Reliability: State of the Art Report Pergamon Infotech Ltd London."},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1016\/0378-3758(92)90119-D"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1007\/BFb0034284"},{"key":"e_1_2_1_11_1","first-page":"1970","volume-title":"Proceedings of the 8th IFAC Symposium on Identification and System Parameter Estimation","author":"Bittanti S.","year":"1988"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.54297"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.143100"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.210303"},{"key":"e_1_2_1_15_1","first-page":"3","volume-title":"Software Reliability: State of the Art Report","author":"Chan P. Y.","year":"1986"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1980.234477"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1287\/mnsc.10.4.786"},{"key":"e_1_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1984.5221770"},{"key":"e_1_2_1_19_1","first-page":"31","volume-title":"Software Reliability: State of the Art Report","author":"Dale C. J.","year":"1986"},{"key":"e_1_2_1_20_1","first-page":"148","volume-title":"Proceedings of the Annual Reliability and Maintainability Symposium","author":"Dickson J. C.","year":"1972"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1981.230821"},{"key":"e_1_2_1_22_1","unstructured":"Ehrlich W. K.andEmerson T. J.(1987) \u2018Modeling software failures and reliability growth during system testing\u2019 inProceedings of the 9th International Conference on Software Engineering Monterey California IEEE Computer Society pp.330\u2013336."},{"key":"e_1_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1992.285863"},{"key":"e_1_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232177"},{"key":"e_1_2_1_25_1","volume-title":"IEEE Transactions on Software Engineering","author":"Goel A. L.","year":"1985"},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1979.5220566"},{"key":"e_1_2_1_27_1","first-page":"81","volume-title":"Software Reliability: State of the Art Report","author":"Gray C. T.","year":"1986"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(87)90088-3"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312919"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1981.5221176"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/0026-2714(84)90631-0"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-266950-7.50028-1"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231890"},{"key":"e_1_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.1016\/0026-2714(90)90285-U"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1991.145366"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1002\/qre.4680080506"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1016\/0951-8320(91)90049-D"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1991.145378"},{"key":"e_1_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1991.145355"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1983.5221678"},{"key":"e_1_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1983.5221472"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1016\/0167-6377(89)90031-X"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.1137\/0906053"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.121755"},{"key":"e_1_2_1_45_1","first-page":"262","volume-title":"Proceedings of the Annual Reliability and Maintainability Symposium","author":"Lipow M.","year":"1985"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1979.5220576"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1984.5221762"},{"key":"e_1_2_1_48_1","volume-title":"Software Reliability: Achievement and Assessment","author":"Littlewood B.","year":"1987"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.58771"},{"key":"e_1_2_1_50_1","doi-asserted-by":"publisher","DOI":"10.2307\/2346781"},{"key":"e_1_2_1_51_1","first-page":"237","volume-title":"Reliability Theory and Applications","author":"Liu G.","year":"1987"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1991.145376"},{"key":"e_1_2_1_53_1","volume-title":"Software Reliability Models: Theoretical Development, Evaluation, and Applications","author":"Malaiya Y. K.","year":"1990"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/24.3749"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1016\/0950-5849(87)90320-X"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312915"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.120314"},{"key":"e_1_2_1_58_1","first-page":"327","volume-title":"Proceedings of the Annual Reliability and Maintainability Symposium","author":"Moranda P. B.","year":"1975"},{"key":"e_1_2_1_59_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1991.145346"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1975.6312856"},{"key":"e_1_2_1_61_1","volume-title":"Software Reliability: Measurement, Prediction, Application","author":"Musa J. D.","year":"1987"},{"key":"e_1_2_1_62_1","unstructured":"Musa J. D.andOkumoto K.(1984) \u2018A logarithmic Poisson execution time model for software reliability measurement\u2019 inProceedings of the 6th International Conference on Software Engineering Orlando Florida IEEE Computer Society pp.230\u2013238."},{"key":"e_1_2_1_63_1","doi-asserted-by":"publisher","DOI":"10.1016\/0026-2714(78)91139-3"},{"key":"e_1_2_1_64_1","doi-asserted-by":"publisher","DOI":"10.1147\/rd.284.0428"},{"key":"e_1_2_1_65_1","doi-asserted-by":"crossref","unstructured":"Ohba M.andChou X. M.(1989) \u2018Does imperfect debugging affect software reliability growth?\u2019 inProceedings of the 11th International Conference on Software Engineering Pittsburgh Pennsylvania IEEE Computer Society pp.237\u2013244.","DOI":"10.1109\/ICSE.1989.714425"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.207234"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1982.235728"},{"key":"e_1_2_1_68_1","volume-title":"Software Reliability Handbook","author":"Rook P.","year":"1990"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.148480"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.1016\/0143-8174(87)90099-0"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1978.231481"},{"key":"e_1_2_1_72_1","doi-asserted-by":"publisher","DOI":"10.1145\/390016.808456"},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312916"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.233463"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1016\/0026-2714(81)90059-7"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-266950-7.50029-3"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1984.6448274"},{"key":"e_1_2_1_78_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1991.145354"},{"key":"e_1_2_1_79_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1976.5214978"},{"key":"e_1_2_1_80_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231889"},{"key":"e_1_2_1_81_1","volume-title":"IEEE Software","author":"Srimani P. K.","year":"1992"},{"key":"e_1_2_1_82_1","first-page":"166","volume-title":"Reliability Achievement\u2014the Commercial Incentive","author":"St\u00e5lhane T.","year":"1989"},{"key":"e_1_2_1_83_1","unstructured":"St\u00e5lhane T.andLindqvist B. H.(1989) \u2018A general Markov model for usage dependent software \u2019 RELIABILITY '89 Brighton U. K. paper 5Ba\/2."},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1016\/0026-2714(82)90181-0"},{"key":"e_1_2_1_85_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1986.4335507"},{"key":"e_1_2_1_86_1","first-page":"379","volume-title":"Proceedings of the Annual Reliability and Maintainability Symposium","author":"Thompson W. E.","year":"1980"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.21762"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1109\/24.52617"},{"issue":"2","key":"e_1_2_1_89_1","first-page":"235","article-title":"Asymptotic properties of a class of statistical models in software reliability","volume":"19","author":"van Pul M. C.","year":"1992","journal-title":"Scandinavian Journal of Statistics"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.6196"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1016\/0143-8174(86)90053-3"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1990.0005"},{"key":"e_1_2_1_93_1","doi-asserted-by":"publisher","DOI":"10.1002\/asm.3150060404"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1142\/1390"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1992.285846"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1016\/0026-2714(93)90477-G"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.1109\/TR.1986.4335332"},{"key":"e_1_2_1_98_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232179"},{"issue":"1","key":"e_1_2_1_99_1","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1051\/ro\/1985190100871","article-title":"A software reliability growth model with two types of errors","volume":"19","author":"Yamada S.","year":"1985","journal-title":"Operations Research"},{"key":"e_1_2_1_100_1","first-page":"401","volume-title":"Reliability and Quality Control","author":"Yamada S.","year":"1986"},{"key":"e_1_2_1_101_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1992.285862"}],"container-title":["Software Testing, Verification and Reliability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fstvr.4370030103","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/stvr.4370030103","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,25]],"date-time":"2023-10-25T18:03:22Z","timestamp":1698257002000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/stvr.4370030103"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993,3]]},"references-count":100,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1993,3]]}},"alternative-id":["10.1002\/stvr.4370030103"],"URL":"https:\/\/doi.org\/10.1002\/stvr.4370030103","archive":["Portico"],"relation":{},"ISSN":["0960-0833","1099-1689"],"issn-type":[{"value":"0960-0833","type":"print"},{"value":"1099-1689","type":"electronic"}],"subject":[],"published":{"date-parts":[[1993,3]]}}}