{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T23:34:33Z","timestamp":1742945673898,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer Nature Switzerland","isbn-type":[{"type":"print","value":"9783031213847"},{"type":"electronic","value":"9783031213854"}],"license":[{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2022,1,1]],"date-time":"2022-01-01T00:00:00Z","timestamp":1640995200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2022]]},"DOI":"10.1007\/978-3-031-21385-4_28","type":"book-chapter","created":{"date-parts":[[2022,12,13]],"date-time":"2022-12-13T05:03:52Z","timestamp":1670907832000},"page":"336-347","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["Testing and Integration Method Utilization for Restricted Software Development"],"prefix":"10.1007","author":[{"given":"Ahmed J.","family":"Obaid","sequence":"first","affiliation":[]},{"given":"Azmi Shawkat","family":"Abdulbaqi","sequence":"additional","affiliation":[]},{"given":"Hayder Sabeeh","family":"Hadi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2022,12,14]]},"reference":[{"key":"28_CR1","doi-asserted-by":"crossref","unstructured":"Bshouty, N.H., Gabizon, A.: Almost optimal coverfree families. In: CIAC, pp. 140\u2013151 (2017)","DOI":"10.1007\/978-3-319-57586-5_13"},{"key":"28_CR2","unstructured":"Ben-Basat, R., Goldstein, M., Segall, I.: Learning software constraints via installation attempts. CoRR, vol. abs\/1804.08902 (2018). http:\/\/arxiv.org\/abs\/1804"},{"key":"28_CR3","doi-asserted-by":"publisher","first-page":"3971","DOI":"10.1109\/ACCESS.2017.2680470","volume":"5","author":"A Abbas","year":"2017","unstructured":"Abbas, A., Siddiqui, I.F., Lee, S.U.J., Bashir, A.K.: Binary pattern for nested cardinality constraints for software product line of IoT-based feature models. IEEE Access 5, 3971\u20133980 (2017)","journal-title":"IEEE Access"},{"key":"28_CR4","doi-asserted-by":"crossref","unstructured":"Czepa, C., Tran, H., Zdun, U., Kim, T.T.T., Weiss, E., Ruhsam, C.: On the understandability of semantic constraints for behavioral software architecture compliance: a controlled experiment. In: 2017 IEEE International Conference on Software Architecture (ICSA), pp. 155\u2013164. IEEE (2017, April)\u200f","DOI":"10.1109\/ICSA.2017.10"},{"key":"28_CR5","doi-asserted-by":"crossref","unstructured":"Mancinelli, F., Boender, J., di Cosmo, R., Vouillon, J., Durak, B., Leroy, X., Treinen, R.: Managing the complexity of large free and open-source package-based software distributions. In: ACM ASE (2006)","DOI":"10.1109\/ASE.2006.49"},{"key":"28_CR6","doi-asserted-by":"crossref","unstructured":"Di Cosmo, R., Boender, J.: Using strong conflicts to detect quality issues in component-based complex systems. In: ACM ISEC (2010)","DOI":"10.1145\/1730874.1730905"},{"key":"28_CR7","unstructured":"Modelling and resolving software dependencies (2005). https:\/\/people.debian.org\/dburrows\/model.pdf"},{"key":"28_CR8","doi-asserted-by":"crossref","unstructured":"Trezentos, P., Lynce, I., Oliveira, A.L.: Aptpbo: solving the software dependency problem using pseudo-boolean optimization. In: ACM ASE (2010)","DOI":"10.1145\/1858996.1859087"},{"key":"28_CR9","doi-asserted-by":"crossref","unstructured":"Michel, C., Rueher, M.: Handling software upgradeability problems with MILP solvers. In: LoCoCo (2010)","DOI":"10.4204\/EPTCS.29.1"},{"key":"28_CR10","doi-asserted-by":"crossref","unstructured":"Tucker, C., Shuffelton, D., Jhala, R., Lerner, S.: Opium: optimal package install\/uninstall manager. In: ICSE 2007","DOI":"10.1109\/ICSE.2007.59"},{"key":"28_CR11","unstructured":"The mancoosi project (2017). http:\/\/mancoosi.org\/papers\/"},{"key":"28_CR12","doi-asserted-by":"crossref","unstructured":"Mart\u00ednez, C., Moura, L., Panario, D., Stevens, B.: Locating errors using elas, covering arrays, and adaptive testing algorithms. SIAM J. Discret. Math. (2009)","DOI":"10.1137\/080730706"},{"key":"28_CR13","doi-asserted-by":"crossref","unstructured":"Aldaco, A., Colbourn, C., Syrotiuk, V.: Locating arrays: a new experimental design for screening complex engineered systems. In: ACM OS Rev. (2015)","DOI":"10.1145\/2723872.2723878"},{"key":"28_CR14","doi-asserted-by":"crossref","unstructured":"Segall, I., Tzoref-Brill, R.: Feedback-driven combinatorial test design and execution. In: SYSTOR (2015)","DOI":"10.1145\/2757667.2757677"},{"key":"28_CR15","doi-asserted-by":"crossref","unstructured":"Yilmaz, C., Dumlu, E., Cohen, M.B., Porter, A.: Reducing masking effects in combinatorial interaction testing: a feedback driven adaptive approach. IEEE Trans. Softw. Eng. (2014)","DOI":"10.1109\/TSE.2013.53"},{"key":"28_CR16","unstructured":"Hwang, F., S\u00f3s, V.: Non-adaptive hypergeometric group testing. Studia Sci. Math. Hungar 22 (1987)"},{"key":"28_CR17","doi-asserted-by":"crossref","unstructured":"Berger, T., Levenshtein, V.: Application of coverfree codes and combinatorial designs to two-stage testing. In: Electronic Notes in Discrete Mathematics (2001)","DOI":"10.1016\/S1571-0653(04)00204-5"},{"key":"28_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"257","DOI":"10.1007\/3-540-48658-5_25","volume-title":"Advances in Cryptology \u2014 CRYPTO \u201994","author":"B Chor","year":"1994","unstructured":"Chor, B., Fiat, A., Naor, M.: Tracing traitors. In: Desmedt, Y.G. (ed.) CRYPTO 1994. LNCS, vol. 839, pp. 257\u2013270. Springer, Heidelberg (1994). https:\/\/doi.org\/10.1007\/3-540-48658-5_25"},{"key":"28_CR19","doi-asserted-by":"crossref","unstructured":"Yamada, S., Hanaoka, G., Kunihiro, N.: Two Dimensional Representation of Cover Free Families and Its Applications: Short Signatures and More (2012)","DOI":"10.1007\/978-3-642-27954-6_17"},{"key":"28_CR20","series-title":"Lecture Notes in Networks and Systems","doi-asserted-by":"publisher","first-page":"413","DOI":"10.1007\/978-981-16-0666-3_33","volume-title":"Next Generation of Internet of Things","author":"AJ Obaid","year":"2021","unstructured":"Obaid, A.J.: Wireless sensor network (WSN) routing optimization via the implementation of fuzzy ant colony (FACO) algorithm: towards enhanced energy conservation. In: Kumar, R., Mishra, B.K., Pattnaik, P.K. (eds.) Next Generation of Internet of Things. LNNS, vol. 201, pp. 413\u2013424. Springer, Singapore (2021). https:\/\/doi.org\/10.1007\/978-981-16-0666-3_33"},{"issue":"2","key":"28_CR21","doi-asserted-by":"publisher","first-page":"2179","DOI":"10.22075\/ijnaa.2021.5367","volume":"12","author":"K Ibrahim","year":"2021","unstructured":"Ibrahim, K., Obaid, A.: Fraud usage detection in internet users based on log data. Int. J. Nonlin. Anal. Appl. 12(2), 2179\u20132188 (2021). https:\/\/doi.org\/10.22075\/ijnaa.2021.5367","journal-title":"Int. J. Nonlin. Anal. Appl."},{"key":"28_CR22","unstructured":"Jones, E.L.: Grading student programs \u2013 a software testing. In: Proceedings of the Fourteenth Annual Consortium for Computing Sciences in Colleges (2000)"},{"key":"28_CR23","unstructured":"Miller, Howden, W.E.: Tutorial, Software Testing & Validation Techniques. IEEE Computer Society Press (1981). [6] Ian Somerville, Software Engineering. Addison-Wesley (2001)"},{"key":"28_CR24","unstructured":"Bach, J.: Exploratory Testing Explained, v.1.3 4\/16\/03. [8] Bentley, J.E., Wachovia Bank, Charlotte NC, Software Testing Fundamentals\u2014Concepts, Roles, and Terminology, SUGI 30"},{"key":"28_CR25","unstructured":"Myers, G.J.: The Art of Software Testing, Wiley, New York, c1979. ISBN:0471043281"},{"key":"28_CR26","unstructured":"Jenkins, N.: A Software Testing Primer (2008)"},{"key":"28_CR27","unstructured":"Sestoft, P.: Systematic software testing, Version 2 (2008)"},{"issue":"2","key":"28_CR28","first-page":"246","volume":"2","author":"S Istaq","year":"2010","unstructured":"Istaq, S., et al.: Debugging, advanced debugging and runtime analysis. Int. J. Comput. Sci. Eng. 2(2), 246\u2013249 (2010)","journal-title":"Int. J. Comput. Sci. Eng."},{"issue":"3","key":"28_CR29","first-page":"22","volume":"9","author":"A Kumar","year":"2019","unstructured":"Kumar, A.: Design of secure image fusion technique using cloud for privacy-preserving and copyright protection. Int. J. Cloud Appl. Comput. (IJCAC) 9(3), 22\u201336 (2019)","journal-title":"Int. J. Cloud Appl. Comput. (IJCAC)"},{"issue":"1","key":"28_CR30","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1186\/s13638-020-01826-x","volume":"2020","author":"A Kumar","year":"2020","unstructured":"Kumar, A., Zhang, Z.J., Lyu, H.: Object detection in real time based on improved single shot multi-box detector algorithm. EURASIP J. Wirel. Commun. Netw. 2020(1), 1\u201318 (2020). https:\/\/doi.org\/10.1186\/s13638-020-01826-x","journal-title":"EURASIP J. Wirel. Commun. Netw."},{"key":"28_CR31","unstructured":"Kumar, A.: A review on implementation of digital image watermarking techniques using LSB and DWT. In: Third International Conference on Information and Communication Technology for Sustainable Development (ICT4SD 2018), held during August 30\u201331, 2018 at Hotel Vivanta by Taj, Goa, India"},{"key":"28_CR32","volume-title":"Software Engineering, Theory and Practice","author":"SL Pfleeger","year":"2001","unstructured":"Pfleeger, S.L.: Software Engineering, Theory and Practice. Pearson Education (2001)"},{"issue":"1","key":"28_CR33","first-page":"109","volume":"3","author":"SU Farooq","year":"2010","unstructured":"Farooq, S.U., Quadri, S.M.K.: Effectiveness of software testing techniques on a measurement scale. Orient. J. Comput. Sci. Technol. 3(1), 109\u2013113 (2010)","journal-title":"Orient. J. Comput. Sci. Technol."}],"container-title":["Communications in Computer and Information Science","Artificial Intelligence and Data Science"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-031-21385-4_28","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2023,8,9]],"date-time":"2023-08-09T15:28:35Z","timestamp":1691594915000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-031-21385-4_28"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022]]},"ISBN":["9783031213847","9783031213854"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-031-21385-4_28","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2022]]},"assertion":[{"value":"14 December 2022","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICAIDS","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Artificial Intelligence and Data Science","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Hyderabad","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"India","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"17 December 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"18 December 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icaids2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icaids.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"195","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"43","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"22% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"4","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}