{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,10,26]],"date-time":"2023-10-26T05:10:35Z","timestamp":1698297035549},"reference-count":10,"publisher":"Wiley","issue":"1","license":[{"start":{"date-parts":[[2006,10,31]],"date-time":"2006-10-31T00:00:00Z","timestamp":1162252800000},"content-version":"vor","delay-in-days":4686,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Software Testing Verif &amp; Rel"],"published-print":{"date-parts":[[1994,1]]},"DOI":"10.1002\/stvr.4370040106","type":"journal-article","created":{"date-parts":[[2006,11,18]],"date-time":"2006-11-18T06:12:24Z","timestamp":1163830344000},"page":"45-48","source":"Crossref","is-referenced-by-count":0,"title":["Rebuttal of the book review by R. Whitty of \u2018Software Testing Techniques\u2019 (2nd edn)"],"prefix":"10.1002","volume":"4","author":[{"given":"Boris","family":"Beizer","sequence":"first","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2006,10,31]]},"reference":[{"key":"e_1_2_1_2_1","volume-title":"Software Testing Techniques","author":"Beizer B.","year":"1990"},{"key":"e_1_2_1_3_1","unstructured":"Bender R. A.andPottorff E. L.(1970) \u2018Basic testing: a data flow analysis technique\u2019 Technical Report TR\u201000.2108 October 1970 IBM System Development Division Poughkeepsie Laboratory U.S.A."},{"key":"e_1_2_1_4_1","unstructured":"Cohen E. I.(1978) \u2018A finite domain\u2010testing strategy for computer program testing\u2019 Ph. D. dissertation June 1978 Ohio State University Columbus Ohio U.S.A."},{"key":"e_1_2_1_5_1","volume-title":"Software Metrics: a Rigorous Approach","author":"Fenton N. E.","year":"1991"},{"key":"e_1_2_1_6_1","volume-title":"Software Metrics: Establishing a Company\u2010Wide Program","author":"Grady R. B.","year":"1987"},{"issue":"3","key":"e_1_2_1_7_1","first-page":"92","article-title":"A data flow analysis approach to program testing","volume":"8","author":"Herman P. M.","year":"1976","journal-title":"The Australian Computer Journal"},{"key":"e_1_2_1_8_1","volume-title":"Testing Computer Software","author":"Kaner C.","year":"1993"},{"key":"e_1_2_1_9_1","volume-title":"The Art of Software Testing","author":"Myers G. J.","year":"1979"},{"key":"e_1_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1980.234486"},{"key":"e_1_2_1_11_1","doi-asserted-by":"crossref","unstructured":"White L. J. Cohen E. I.andChandrasekaran B. (1978) \u2018A domain strategy for computer program testing\u2019. Technical Report OSUCISRC\u2010TR\u201078\u20104 August 1978 Computer and Information Science Research Center Ohio State University Columbus Ohio U.S.A.","DOI":"10.21236\/ADA067552"}],"container-title":["Software Testing, Verification and Reliability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2Fstvr.4370040106","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1002\/stvr.4370040106","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,10,25]],"date-time":"2023-10-25T11:06:20Z","timestamp":1698231980000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/stvr.4370040106"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1994,1]]},"references-count":10,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1994,1]]}},"alternative-id":["10.1002\/stvr.4370040106"],"URL":"https:\/\/doi.org\/10.1002\/stvr.4370040106","archive":["Portico"],"relation":{},"ISSN":["0960-0833","1099-1689"],"issn-type":[{"value":"0960-0833","type":"print"},{"value":"1099-1689","type":"electronic"}],"subject":[],"published":{"date-parts":[[1994,1]]}}}