{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,13]],"date-time":"2026-03-13T01:53:22Z","timestamp":1773366802728,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":14,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540472421","type":"print"},{"value":"9783540472438","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2006]]},"DOI":"10.1007\/11902140_110","type":"book-chapter","created":{"date-parts":[[2006,10,26]],"date-time":"2006-10-26T09:35:29Z","timestamp":1161855329000},"page":"1060-1071","source":"Crossref","is-referenced-by-count":6,"title":["Coverage-Based, Prioritized Testing Using Neural Network Clustering"],"prefix":"10.1007","author":[{"given":"Nida","family":"G\u00f6k\u00e7e","sequence":"first","affiliation":[]},{"given":"Mubariz","family":"Eminov","sequence":"additional","affiliation":[]},{"given":"Fevzi","family":"Belli","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"110_CR1","volume-title":"Testing Object-Oriented Systems","author":"R.V. Binder","year":"2000","unstructured":"Binder, R.V.: Testing Object-Oriented Systems. Addison-Wesley, Reading (2000)"},{"key":"110_CR2","doi-asserted-by":"crossref","unstructured":"Bryce, R.C., Colbourn, C.J.: Test Prioritization for Pairwise Interaction Coverage. ACM SIGSOFT Software Engineering Notes\u00a030(4) (July 2005)","DOI":"10.1145\/1082983.1083275"},{"key":"110_CR3","doi-asserted-by":"crossref","unstructured":"Elbaum, S., Malishevsky, A., Rothermel, G.: Test Case Prioritization: A Family of Empirical Studies. IEEE Transactions on Software Engineering, 182\u2013191 (2002)","DOI":"10.1109\/32.988497"},{"key":"110_CR4","doi-asserted-by":"crossref","unstructured":"Cohen, D.M., Dalal, S.R., Freedman, M.L., Patton, G.C.: The AETG System: An Approach to Testing Based on Combinatorial Design. IEEE Trans. Software Engineering (1997)","DOI":"10.1109\/32.605761"},{"key":"110_CR5","doi-asserted-by":"crossref","unstructured":"Belli, F.: Finite-State Testing and analysis of Graphical User Interfaces. In: Proc. 12th Int\u2019l. Symp. Softw. Reliability Eng (ISSRE 2001), pp. 43\u201343 (2001)","DOI":"10.1109\/ISSRE.2001.989456"},{"key":"110_CR6","doi-asserted-by":"crossref","unstructured":"Belli, F., Budnik, C.J., White, L.: Event-Based Modeling, Analysis and Testing of User Interactions \u2013 Approach and Case Study. J. Software Testing, Verification & Reliability, 3\u201332 (2006)","DOI":"10.1002\/stvr.335"},{"key":"110_CR7","doi-asserted-by":"crossref","unstructured":"Belli, F., Budnik, C.J.: Test Minimization for Human-Computer Interaction. J. of Applied Intelligence (to appear)","DOI":"10.1007\/s10489-006-0008-0"},{"key":"110_CR8","doi-asserted-by":"crossref","unstructured":"Edmonds, J., Johnson, E.L.: Matching: Euler Tours and the Chinese Postman. Math. Programming, 88\u2013124 (1973)","DOI":"10.1007\/BF01580113"},{"key":"110_CR9","unstructured":"Maeda, M., Miyajima, H., Marashima, S.: An adaptive Learning and Self-deleting Neural Network for Vector Quantization. IEICE Trans. Fundamentals, 1886\u20131893 (1996)"},{"key":"110_CR10","unstructured":"Maeda, M., Miyajim, H.: Competitive Learning Algorithm Founded on Adaptivity and Sensitivity Deletion Method. IEICE Trans. Fundamentals, 2770\u20132774 (2000)"},{"key":"110_CR11","doi-asserted-by":"crossref","unstructured":"Rummelhart, D.E., Zipser, D.: Competitive Learning. J. Cognitive Science, 75\u2013112 (1985)","DOI":"10.1207\/s15516709cog0901_5"},{"key":"110_CR12","unstructured":"Eminov, M., Gokce, N.: Neural Network Clustering Using Competitive Learning Algorithm. In: Proc. TAINN 2005, pp. 161\u2013168 (2005)"},{"key":"110_CR13","unstructured":"Eminov, M.E.: Fuzzy c-Means Based Adaptive Neural Network Clustering. Proc. TAINN-2003, Int. J. Computational Intelligence, 338\u2013343 (2003)"},{"key":"110_CR14","unstructured":"Kim, D.J., Park, Y.W., Park, D.J.: A Novel Validity Index for Clusters. IEICE Trans. Inf & System, 282\u2013285 (2001)"}],"container-title":["Lecture Notes in Computer Science","Computer and Information Sciences \u2013 ISCIS 2006"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/11902140_110.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,17]],"date-time":"2020-11-17T14:56:21Z","timestamp":1605624981000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/11902140_110"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2006]]},"ISBN":["9783540472421","9783540472438"],"references-count":14,"URL":"https:\/\/doi.org\/10.1007\/11902140_110","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2006]]}}}