{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T11:58:08Z","timestamp":1743076688626,"version":"3.40.3"},"publisher-location":"Cham","reference-count":31,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030315160"},{"type":"electronic","value":"9783030315177"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-31517-7_6","type":"book-chapter","created":{"date-parts":[[2019,9,21]],"date-time":"2019-09-21T12:02:29Z","timestamp":1569067349000},"page":"77-92","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Greenify: A Game with the Purpose of Test Data Generation for Unit Testing"],"prefix":"10.1007","author":[{"given":"Sharmin","family":"Moosavi","sequence":"first","affiliation":[]},{"given":"Hassan","family":"Haghighi","sequence":"additional","affiliation":[]},{"given":"Hasti","family":"Sahabi","sequence":"additional","affiliation":[]},{"given":"Farzam","family":"Vatanzade","sequence":"additional","affiliation":[]},{"given":"Mojtaba","family":"Vahidi Asl","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,22]]},"reference":[{"key":"6_CR1","doi-asserted-by":"publisher","DOI":"10.1017\/9781316771273","volume-title":"Introduction to Software Testing","author":"P Ammann","year":"2016","unstructured":"Ammann, P., Offutt, J.: Introduction to Software Testing. Cambridge University Press, New York (2016)"},{"issue":"5","key":"6_CR2","doi-asserted-by":"publisher","first-page":"297","DOI":"10.1002\/stvr.456","volume":"22","author":"M Utting","year":"2012","unstructured":"Utting, M., Pretschner, A., Legeard, B.: A taxonomy of model-based testing approaches. Softw. Test. Verif. Reliab. 22(5), 297\u2013312 (2012)","journal-title":"Softw. Test. Verif. Reliab."},{"issue":"1","key":"6_CR3","doi-asserted-by":"publisher","first-page":"60","DOI":"10.1016\/j.jss.2009.02.022","volume":"83","author":"TY Chen","year":"2010","unstructured":"Chen, T.Y., Fei-Ching, K., Robert, G.M., Tse, T.H.: Adaptive random testing: the art of test case diversity. J. Syst. Softw. 83(1), 60\u201366 (2010)","journal-title":"J. Syst. Softw."},{"key":"6_CR4","doi-asserted-by":"crossref","unstructured":"Cadar, C., et al.: Symbolic execution for software testing in practice: preliminary assessment. In: Proceedings of the 33rd International Conference on Software Engineering, pp. 1066\u20131071. ACM (2011)","DOI":"10.1145\/1985793.1985995"},{"key":"6_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1007\/978-3-642-25231-0_1","volume-title":"Empirical Software Engineering and Verification","author":"M Harman","year":"2012","unstructured":"Harman, M., McMinn, P., de Souza, J.T., Yoo, S.: Search based software engineering: techniques, taxonomy, tutorial. In: Meyer, B., Nordio, M. (eds.) LASER 2008-2010. LNCS, vol. 7007, pp. 1\u201359. Springer, Heidelberg (2012). https:\/\/doi.org\/10.1007\/978-3-642-25231-0_1"},{"issue":"5","key":"6_CR6","doi-asserted-by":"publisher","first-page":"268","DOI":"10.3109\/00952990.2010.491879","volume":"36","author":"AM Weinstein","year":"2010","unstructured":"Weinstein, A.M.: Computer and video game addiction\u2014a comparison between game users and non-game users. Am. J. Drug Alcohol Abus. 36(5), 268\u2013276 (2010)","journal-title":"Am. J. Drug Alcohol Abus."},{"key":"6_CR7","doi-asserted-by":"crossref","unstructured":"Wightman, D.: Crowdsourcing human-based computation. In: Proceedings of the 6th Nordic Conference on Human-Computer Interaction: Extending Boundaries. ACM (2010)","DOI":"10.1145\/1868914.1868976"},{"issue":"5","key":"6_CR8","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1049\/iet-sen.2009.0092","volume":"4","author":"D Gong","year":"2010","unstructured":"Gong, D., Yao, X.: Automatic detection of infeasible paths in software testing. IET Softw. 4(5), 361\u2013370 (2010)","journal-title":"IET Softw."},{"key":"6_CR9","volume-title":"For the win: How Game Thinking Can Revolutionize Your Business","author":"K Werbach","year":"2012","unstructured":"Werbach, K., Hunter, D.: For the win: How Game Thinking Can Revolutionize Your Business. Wharton Digital Press, Philadelphia (2012)"},{"key":"6_CR10","doi-asserted-by":"crossref","unstructured":"Deterding, S., Dixon, D., Khaled, R., Nacke. L.: From game design elements to gamefulness: defining gamification. In: Proceedings of the 15th International Academic MindTrek Conference: Envisioning Future Media Environments, pp. 9\u201315. ACM (2011)","DOI":"10.1145\/2181037.2181040"},{"key":"6_CR11","doi-asserted-by":"crossref","unstructured":"Yuen, M.C., King, I., Leung. K.S.: A survey of crowdsourcing systems. In: 2011 IEEE Third International Conference on Privacy, Security, Risk and Trust (PASSAT) and 2011 IEEE Third Inernational Conference on Social Computing (SocialCom). IEEE (2011)","DOI":"10.1109\/PASSAT\/SocialCom.2011.203"},{"issue":"7","key":"6_CR12","doi-asserted-by":"publisher","first-page":"385","DOI":"10.1145\/360248.360252","volume":"19","author":"JC King","year":"1976","unstructured":"King, J.C.: symbolic execution and program testing. Commun. ACM 19(7), 385\u2013394 (1976)","journal-title":"Commun. ACM"},{"key":"6_CR13","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1093\/iwc\/iww043","volume":"30","author":"S AmiriChimeh","year":"2017","unstructured":"AmiriChimeh, S., Haghighi, H., Vahidi-Asl, M., Setayesh-Ghajar, K., Gholami-Ghavamabad, F.: Rings: a game with a purpose for test data generation. Interact. Comput 30, 1\u201330 (2017)","journal-title":"Interact. Comput"},{"key":"6_CR14","doi-asserted-by":"publisher","first-page":"57","DOI":"10.1016\/j.jss.2016.09.015","volume":"126","author":"K Mao","year":"2017","unstructured":"Mao, K., Capra, L., Harman, M., Jia, Y.: A survey of the use of crowdsourcing in software engineering. J. Syst. Softw. 126, 57\u201384 (2017)","journal-title":"J. Syst. Softw."},{"key":"6_CR15","doi-asserted-by":"crossref","unstructured":"Schmitz, B., Felicia, P., Bignami, F.: An international survey In: Gamification in Education: Breakthroughs in Research and Practice, pp. 439\u2013452. IGI Global (2018)","DOI":"10.4018\/978-1-5225-5198-0.ch023"},{"key":"6_CR16","doi-asserted-by":"crossref","unstructured":"Reeves, N., West, P., Simperl, E.: \u201cA game without competition is hardly a game\u2019\u2019: the impact of competitions on player activity in a human computation game. In: AAAI (2018)","DOI":"10.1609\/hcomp.v6i1.13329"},{"key":"6_CR17","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"497","DOI":"10.1007\/978-981-10-8848-3_47","volume-title":"Software Engineering","author":"N Prabhakar","year":"2019","unstructured":"Prabhakar, N., Singhal, A., Bansal, A., Bhatia, V.: A literature survey of applications of meta-heuristic techniques in software testing. In: Hoda, M.N., Chauhan, N., Quadri, S.M.K., Srivastava, P.R. (eds.) Software Engineering. AISC, vol. 731, pp. 497\u2013505. Springer, Singapore (2019). https:\/\/doi.org\/10.1007\/978-981-10-8848-3_47"},{"issue":"1","key":"6_CR18","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.jss.2004.02.033","volume":"75","author":"A Baker","year":"2005","unstructured":"Baker, A., Navarro, E.O., Van Der Hoek, A.: An experimental card game for teaching software engineering processes. J. Syst. Softw. 75(1), 3\u201316 (2005)","journal-title":"J. Syst. Softw."},{"key":"6_CR19","doi-asserted-by":"crossref","unstructured":"Sheth, S., Bell, J., Kaiser, G.: Halo (highly addictive, socially optimized) software engineering. In: 1st International Workshop on Games and Software Engineering, pp. 29\u201332 (2011)","DOI":"10.1145\/1984674.1984685"},{"key":"6_CR20","unstructured":"Johansson, M., Ivarsson, E.: An experiment on the effectiveness of unit testing when introducing gamification. Ph.D. thesis, Master\u2019s thesis, Chalmers University of Technology (2014)"},{"key":"6_CR21","unstructured":"Arnarsson, D., Johannesson, I.H.: Improving unit testing practices with the use of gamification (2015)"},{"key":"6_CR22","doi-asserted-by":"crossref","unstructured":"Rojas, J.M., Fraser, G.: Code defenders: a mutation testing game. In: 11th International Workshop on Mutation Analysis. IEEE (2015)","DOI":"10.1109\/ICSTW.2016.43"},{"key":"6_CR23","doi-asserted-by":"crossref","unstructured":"Navarro, E.O., van der Hoek, A.: SIMSE: an interactive simulation game for software engineering education. In: CATE, pp. 12\u201317 (2004)","DOI":"10.1145\/1007996.1008062"},{"key":"6_CR24","unstructured":"Logas, H., et al.: Software verification games: Designing Xylem, The Code of Plants\u201d. In: FDG (2014)"},{"key":"6_CR25","doi-asserted-by":"crossref","unstructured":"Dietl, W., et al.: Verification games: making verification fun. In: 14th Workshop on Formal Techniques for Java-like Programs, pp. 42\u201349 (2012)","DOI":"10.1145\/2318202.2318210"},{"key":"6_CR26","doi-asserted-by":"crossref","unstructured":"G\u00f3mez, M., et al.: Reproducing context-sensitive crashes of mobile apps using crowdsourced monitoring. In: 2016 IEEE\/ACM International Conference on Mobile Software Engineering and Systems (MOBILESoft). IEEE (2016)","DOI":"10.1145\/2897073.2897088"},{"key":"6_CR27","doi-asserted-by":"crossref","unstructured":"He, M., et al.: A crowdsourcing framework for detecting cross-browser issues in web application. In: Proceedings of the 7th Asia-Pacific Symposium on Internetware. ACM (2015)","DOI":"10.1145\/2875913.2875945"},{"issue":"3","key":"6_CR28","doi-asserted-by":"publisher","first-page":"844","DOI":"10.1007\/s10664-014-9301-4","volume":"20","author":"W Afzal","year":"2015","unstructured":"Afzal, W., et al.: An experiment on the effectiveness and efficiency of exploratory testing. Empir. Softw. Eng. 20(3), 844\u2013878 (2015)","journal-title":"Empir. Softw. Eng."},{"key":"6_CR29","doi-asserted-by":"crossref","unstructured":"Leicht, N., et al.: When is crowdsourcing advantageous? The case of crowdsourced software testing (2016)","DOI":"10.2139\/ssrn.3159166"},{"key":"6_CR30","doi-asserted-by":"publisher","first-page":"551","DOI":"10.1007\/978-1-4614-4951-5_44","volume-title":"Information Systems Development","author":"C Schneider","year":"2013","unstructured":"Schneider, C., Cheung, T.: The power of the crowd: performing usability testing using an on-demand workforce. In: Pooley, R., Coady, J., Schneider, C., Linger, H., Barry, C., Lang, M. (eds.) Information Systems Development, pp. 551\u2013560. Springer, New York (2013). https:\/\/doi.org\/10.1007\/978-1-4614-4951-5_44"},{"issue":"1","key":"6_CR31","first-page":"575","volume":"5","author":"VHM Gomide","year":"2014","unstructured":"Gomide, V.H.M., et al.: Affective crowdsourcing applied to usability testing. Int. J. Comput. Sci. Inf. Technol. 5(1), 575\u2013579 (2014)","journal-title":"Int. J. Comput. Sci. Inf. Technol."}],"container-title":["Lecture Notes in Computer Science","Fundamentals of Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-31517-7_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,9,21]],"date-time":"2023-09-21T00:13:35Z","timestamp":1695255215000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-31517-7_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030315160","9783030315177"],"references-count":31,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-31517-7_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"22 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"FSEN","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Fundamentals of Software Engineering","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Tehran","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Iran","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 May 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 May 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"8","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"fsen2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/fsen.ir\/2019\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"\u00caasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"47","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"14","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"30% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"n\/a","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"This content has been made available to all.","name":"free","label":"Free to read"}]}}