{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,5,16]],"date-time":"2026-05-16T04:21:34Z","timestamp":1778905294934,"version":"3.51.4"},"publisher-location":"Cham","reference-count":18,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319221823","type":"print"},{"value":"9783319221830","type":"electronic"}],"license":[{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2015,1,1]],"date-time":"2015-01-01T00:00:00Z","timestamp":1420070400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015]]},"DOI":"10.1007\/978-3-319-22183-0_29","type":"book-chapter","created":{"date-parts":[[2015,7,27]],"date-time":"2015-07-27T11:55:37Z","timestamp":1437998137000},"page":"318-324","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":30,"title":["Transformed Vargha-Delaney Effect Size"],"prefix":"10.1007","author":[{"given":"Geoffrey","family":"Neumann","sequence":"first","affiliation":[]},{"given":"Mark","family":"Harman","sequence":"additional","affiliation":[]},{"given":"Simon","family":"Poulding","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2015,7,28]]},"reference":[{"issue":"6","key":"29_CR1","doi-asserted-by":"publisher","first-page":"742","DOI":"10.1109\/TSE.2009.52","volume":"36","author":"S Ali","year":"2010","unstructured":"Ali, S., Briand, L.C., Hemmati, H., Panesar-Walawege, R.K.: A systematic review of the application and empirical investigation of search-based test case generation. IEEE Trans. Softw. Eng. 36(6), 742\u2013762 (2010)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"29_CR2","doi-asserted-by":"crossref","unstructured":"Amdahl, G.M.: Validity of the single processor approach to achieving large scale computing capabilities. In: Proceedings of the Spring Joint Computer Conference, pp. 483\u2013485. ACM, 18\u201320 April 1967","DOI":"10.1145\/1465482.1465560"},{"key":"29_CR3","doi-asserted-by":"publisher","first-page":"219","DOI":"10.1002\/stvr.1486","volume":"24","author":"A Arcuri","year":"2012","unstructured":"Arcuri, A., Briand, L.: A hitchhiker\u2019s guide to statistical tests for assessing randomized algorithms in software engineering. Softw. Test. Verif. Reliab. 24, 219\u2013250 (2012)","journal-title":"Softw. Test. Verif. Reliab."},{"key":"29_CR4","unstructured":"Department of Defense: US DOD MIL-STD 1472-F: Human engineering standard (1999)"},{"key":"29_CR5","doi-asserted-by":"crossref","unstructured":"Harman, M., Jia, Y., Zhang, Y.: Achievements, open problems and challenges for search based software testing (keynote). In: 8th IEEE International Conference on Software Testing, Verification and Validation (ICST 2014), Graz, Austria, April 2015","DOI":"10.1109\/ICST.2015.7102580"},{"issue":"14","key":"29_CR6","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1016\/S0950-5849(01)00189-6","volume":"43","author":"M Harman","year":"2001","unstructured":"Harman, M., Jones, B.F.: Search based software engineering. Inf. Softw. Technol. 43(14), 833\u2013839 (2001)","journal-title":"Inf. Softw. Technol."},{"key":"29_CR7","doi-asserted-by":"crossref","unstructured":"Harman, M., Tratt, L.: Pareto optimal search-based refactoring at the design level. In: 9th Annual Conference on Genetic and Evolutionary Computation (GECCO 2007), pp. 1106\u20131113. ACM Press, London, July 2007","DOI":"10.1145\/1276958.1277176"},{"key":"29_CR8","doi-asserted-by":"crossref","unstructured":"Hsu, H.Y., Orso, A.: Mints: a general framework and tool for supporting test-suite minimization. In: IEEE 31st International Conference on Software Engineering, ICSE 2009, pp. 419\u2013429. IEEE (2009)","DOI":"10.1109\/ICSE.2009.5070541"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Ireson, N., Ciravegna, F., Califf, M.E., Freitag, D., Kushmerick, N., Lavelli, A.: Evaluating machine learning for information extraction. In: Proceedings of the 22nd international conference on Machine learning, pp. 345\u2013352. ACM (2005)","DOI":"10.1145\/1102351.1102395"},{"key":"29_CR10","doi-asserted-by":"crossref","unstructured":"McMinn, P.: How does program structure impact the effectiveness of the crossover operator in evolutionary testing? In: 2010 Second International Symposium on Search Based Software Engineering (SSBSE), pp. 9\u201318. IEEE (2010)","DOI":"10.1109\/SSBSE.2010.11"},{"issue":"1","key":"29_CR11","doi-asserted-by":"publisher","first-page":"82","DOI":"10.1109\/JPROC.1998.658762","volume":"86","author":"GE Moore","year":"1998","unstructured":"Moore, G.E., et al.: Cramming more components onto integrated circuits. Proc. IEEE 86(1), 82\u201385 (1998)","journal-title":"Proc. IEEE"},{"issue":"5","key":"29_CR12","doi-asserted-by":"crossref","first-page":"345","DOI":"10.1002\/smr.378","volume":"20","author":"M O\u2019Keeffe","year":"2008","unstructured":"O\u2019Keeffe, M., \u00d3Cinn\u00e9die, M.: Search-based refactoring: an empirical study. J. Softw. Maint. 20(5), 345\u2013364 (2008)","journal-title":"J. Softw. Maint."},{"issue":"1","key":"29_CR13","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1007\/s00766-011-0141-0","volume":"17","author":"K Schneider","year":"2012","unstructured":"Schneider, K., Knauss, E., Houmb, S., Islam, S., J\u00fcrjens, J.: Enhancing security requirements engineering by organizational learning. Requirements Eng. 17(1), 35\u201356 (2012)","journal-title":"Requirements Eng."},{"issue":"2","key":"29_CR14","doi-asserted-by":"publisher","first-page":"216","DOI":"10.1109\/TSE.2010.9","volume":"36","author":"R Shatnawi","year":"2010","unstructured":"Shatnawi, R.: A quantitative investigation of the acceptable risk levels of object-oriented metrics in open-source systems. IEEE Trans. Software Eng. 36(2), 216\u2013225 (2010)","journal-title":"IEEE Trans. Software Eng."},{"issue":"3","key":"29_CR15","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/s40012-014-0057-1","volume":"2","author":"S Singh","year":"2014","unstructured":"Singh, S., Kahlon, K.: Object oriented software metrics threshold values at quantitative acceptable risk level. CSI Transact. ICT 2(3), 191\u2013205 (2014)","journal-title":"CSI Transact. ICT"},{"issue":"3","key":"29_CR16","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1162\/evco.1994.2.3.221","volume":"2","author":"N Srinivas","year":"1995","unstructured":"Srinivas, N., Deb, K.: Multi-objective function optimization using non-dominated sorting genetic algorithms. Evol. Comput. 2(3), 221\u2013148 (1995)","journal-title":"Evol. Comput."},{"issue":"2","key":"29_CR17","first-page":"101","volume":"25","author":"A Vargha","year":"2000","unstructured":"Vargha, A., Delaney, H.D.: A critique and improvement of the CL common language effect size statistics of McGraw and Wong. J. Educ. Behav. Stat. 25(2), 101\u2013132 (2000)","journal-title":"J. Educ. Behav. Stat."},{"issue":"2","key":"29_CR18","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1002\/stv.430","volume":"22","author":"S Yoo","year":"2012","unstructured":"Yoo, S., Harman, M.: Regression testing minimisation, selection and prioritisation: a survey. J. Softw. Test. Verif. Reliab. 22(2), 67\u2013120 (2012)","journal-title":"J. Softw. Test. Verif. Reliab."}],"container-title":["Lecture Notes in Computer Science","Search-Based Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-22183-0_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,10]],"date-time":"2024-06-10T06:18:29Z","timestamp":1718000309000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-22183-0_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015]]},"ISBN":["9783319221823","9783319221830"],"references-count":18,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-22183-0_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2015]]},"assertion":[{"value":"28 July 2015","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}}]}}