{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T04:43:55Z","timestamp":1725857035548},"publisher-location":"Cham","reference-count":38,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319393773"},{"type":"electronic","value":"9783319393780"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-39378-0_55","type":"book-chapter","created":{"date-parts":[[2016,5,28]],"date-time":"2016-05-28T03:40:51Z","timestamp":1464406851000},"page":"644-654","source":"Crossref","is-referenced-by-count":4,"title":["Classifying Mutants with Decomposition Kernel"],"prefix":"10.1007","author":[{"given":"Joanna","family":"Strug","sequence":"first","affiliation":[]},{"given":"Barbara","family":"Strug","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,5,29]]},"reference":[{"key":"55_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-319-09099-3_1","volume-title":"Tests and Proofs","author":"BK Aichernig","year":"2014","unstructured":"Aichernig, B.K., Auer, J., J\u00f6bstl, E., Koro\u0161ec, R., Krenn, W., Schlick, R., Schmidt, B.V.: Model-based mutation testing of an industrial measurement device. In: Seidl, M., Tillmann, N. (eds.) TAP 2014. LNCS, vol. 8570, pp. 1\u201319. Springer, Heidelberg (2014)"},{"key":"55_CR2","unstructured":"Acree, A.T.: On mutation, PhD Thesis, Georgia Institute of Technology, Atlanta, Georgia (1980)"},{"key":"55_CR3","doi-asserted-by":"crossref","unstructured":"Agrawal, R., Imielinski, T., Swami, A.: Mining association rules between sets of items in large databases. In: Proceedings of SIGMOD 1993, pp. 207\u2013216 (1993)","DOI":"10.1145\/170036.170072"},{"key":"55_CR4","doi-asserted-by":"crossref","unstructured":"Andrews, J.H., Briand, L.C., Labiche, Y.: Is mutation an appropriate tool for testing experiments? In: Proceedings of ICSE, pp. 402\u2013411 (2005)","DOI":"10.1109\/ICSE.2005.1553583"},{"key":"55_CR5","doi-asserted-by":"crossref","unstructured":"Borgwardt, K.M., Kriegel, H.P.: Shortest-path kernels on graphs. In: Proceedings of ICDM 2005, pp. 74\u201381 (2005)","DOI":"10.1109\/ICDM.2005.132"},{"issue":"5","key":"55_CR6","doi-asserted-by":"crossref","first-page":"1057","DOI":"10.1016\/j.patcog.2010.11.015","volume":"44","author":"H Bunke","year":"2011","unstructured":"Bunke, H., Riesen, K.: Recent advances in graph-based pattern recognition with applications in document analysis. Pattern Recognit. 44(5), 1057\u20131067 (2011)","journal-title":"Pattern Recognit."},{"key":"55_CR7","unstructured":"Ji, C., Chen, Z., Xu, B., Zhao, Z.: A novel method of mutation clustering based on domain analysis. In: Proceedings of the 21st International Conference on Software Engineering and Knowledge Engineering (2009)"},{"issue":"1","key":"55_CR8","doi-asserted-by":"crossref","first-page":"90","DOI":"10.1007\/s10009-002-0099-9","volume":"5","author":"P Chevalley","year":"2002","unstructured":"Chevalley, P., Th\u00e9venod-Fosse, P.: A mutation analysis tool for Java programs. Int. J. Softw. Tools Technol. Transf. 5(1), 90\u2013103 (2002)","journal-title":"Int. J. Softw. Tools Technol. Transf."},{"key":"55_CR9","doi-asserted-by":"crossref","unstructured":"Collins, M., Duffy, N.: New ranking algorithms for parsing and tagging, kernels over discrete structures, and the voted perceptron. In: Proceedings of ACL 2002 (2002)","DOI":"10.3115\/1073083.1073128"},{"issue":"4","key":"55_CR10","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/C-M.1978.218136","volume":"11","author":"RA DeMillo","year":"1978","unstructured":"DeMillo, R.A., Lipton, R.J., Sayward, F.G.: Hints on test data selection: help for the practicing programmer. Computer 11(4), 34\u201341 (1978)","journal-title":"Computer"},{"issue":"1","key":"55_CR11","doi-asserted-by":"crossref","first-page":"49","DOI":"10.1145\/959242.959248","volume":"5","author":"T Gartner","year":"2003","unstructured":"Gartner, T.: A survey of kernels for structured data. SIGKDD Explor. 5(1), 49\u201358 (2003)","journal-title":"SIGKDD Explor."},{"key":"55_CR12","doi-asserted-by":"crossref","unstructured":"Gartner, T.: Kernels for Structured Data. Machine Perception and Artificial Intelligence, vol. 72. World Scientific, London (2009)","DOI":"10.1142\/9789812814562"},{"issue":"1","key":"55_CR13","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1023\/B:DAMI.0000005258.31418.83","volume":"8","author":"J Han","year":"2004","unstructured":"Han, J., Pei, J., Yin, Y., Mao, R.: Mining frequent patterns without candidate generation: a frequent-pattern tree approach. Data Min. Knowl. Discov. Int. J. 8(1), 53\u201387 (2004)","journal-title":"Data Min. Knowl. Discov. Int. J."},{"key":"55_CR14","unstructured":"Haussler, D.: Convolutional kernels on discrete structures, Technical report UCSC-CRL-99-10. Computer Science Department, UC Santa Cruz (1999)"},{"key":"55_CR15","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1109\/TSE.1982.235571","volume":"8","author":"WE Howden","year":"1982","unstructured":"Howden, W.E.: Weak mutation testing and completeness of test sets. IEEE Trans. Softw. Eng. 8, 371\u2013379 (1982)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"55_CR16","unstructured":"Hussain, S.: Mutation clustering, Masters thesis, Kings College London, Strand, London (2008)"},{"key":"55_CR17","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/3-540-45372-5_2","volume-title":"Principles of Data Mining and Knowledge Discovery","author":"A Inokuchi","year":"2000","unstructured":"Inokuchi, A., Washio, T., Motoda, H.: An apriori-based algorithm for mining frequent substructures from graph data. In: Zighed, D.A., Komorowski, J., \u017bytkow, J.M. (eds.) PKDD 2000. LNCS (LNAI), vol. 1910, pp. 13\u201323. Springer, Heidelberg (2000)"},{"issue":"5","key":"55_CR18","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1109\/TSE.2010.62","volume":"37","author":"Y Jia","year":"2011","unstructured":"Jia, Y., Harman, M.: An analysis and survey of the development of mutation testing. IEEE Trans. Softw. Eng. 37(5), 649\u2013678 (2011)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"55_CR19","unstructured":"Kashima, H., Tsuda, K., Inokuchi, A.: Marginalized kernels between labeled graphs. In: ICML 2003, pp. 321\u2013328 (2003)"},{"issue":"1","key":"55_CR20","doi-asserted-by":"crossref","first-page":"39","DOI":"10.1007\/s00138-009-0208-9","volume":"22","author":"M Liwicki","year":"2011","unstructured":"Liwicki, M., Bunke, H., Pittman, J.A., Knerr, S.: Combining diverse systems for handwritten text line recognition. Mach. Vis. Appl. 22(1), 39\u201351 (2011)","journal-title":"Mach. Vis. Appl."},{"issue":"1","key":"55_CR21","doi-asserted-by":"crossref","first-page":"87","DOI":"10.1007\/s10044-010-0178-6","volume":"14","author":"M Liwicki","year":"2011","unstructured":"Liwicki, M., Schlapbach, A., Bunke, H.: Automatic gender detection using on-line and off-line information. Pattern Anal. Appl. 14(1), 87\u201392 (2011)","journal-title":"Pattern Anal. Appl."},{"key":"55_CR22","doi-asserted-by":"crossref","unstructured":"Ma, Y., Offutt, J., Kwon, Y.R.: MuJava: a mutation system for Java. In: Proceedings of ICSE 2006, pp. 827\u2013830 (2006)","DOI":"10.1145\/1134285.1134425"},{"key":"55_CR23","doi-asserted-by":"crossref","unstructured":"Mathur, A.P.: Performance, effectiveness, and reliability issues in software testing. In: Proceedings of COMPSAC 1991, pp. 604\u2013605 (1991)","DOI":"10.1109\/CMPSAC.1991.170248"},{"key":"55_CR24","unstructured":"Mathur, A.P., Krauser, E.W.: Mutant unification for improved vectorization, Purdue University, West Lafayette, IN, Technique report SERC-TR-14-P (1988)"},{"key":"55_CR25","volume-title":"The Art of Software Testing","author":"G Myers","year":"2011","unstructured":"Myers, G., Sandler, C., Badgett, T.: The Art of Software Testing. Wiley, Hoboken (2011)"},{"key":"55_CR26","doi-asserted-by":"crossref","unstructured":"Offutt, J., Untch, R.H.: Mutation 2000: uniting the orthogonal. In: Proceedings of Mutation Testing in the Twentieth and the Twenty First Centuries, pp 45\u201355 (2000)","DOI":"10.1007\/978-1-4757-5939-6_7"},{"key":"55_CR27","series-title":"Applied Condition Monitoring","doi-asserted-by":"crossref","first-page":"63","DOI":"10.1007\/978-3-319-12877-1_5","volume-title":"Stochastic Modeling of Thermal Fatigue Crack Growth","author":"V Radu","year":"2015","unstructured":"Radu, V.: Application. In: Radu, V. (ed.) Stochastic Modeling of Thermal Fatigue Crack Growth. ACM, vol. 1, pp. 63\u201370. Springer, Heidelberg (2015)"},{"key":"55_CR28","unstructured":"Roman, A.: Testing and software quality. In: PWN (2015) (in Polish)"},{"key":"55_CR29","series-title":"Advanced Lectures on Machine Learning","first-page":"41","volume-title":"A Short Introduction to Learning with Kernels","author":"B Schlkopf","year":"2003","unstructured":"Schlkopf, B.: A Short Introduction to Learning with Kernels. LNAI, vol. 2600, pp. 41\u201364. Springer, Heidelberg (2003)"},{"key":"55_CR30","volume-title":"Learning with Kernels","author":"B Schlkopf","year":"2002","unstructured":"Schlkopf, B., Smola, A.J.: Learning with Kernels. MIT Press, Cambridge (2002)"},{"key":"55_CR31","doi-asserted-by":"crossref","first-page":"1","DOI":"10.4028\/www.scientific.net\/KEM.450.1","volume":"450","author":"B Strug","year":"2011","unstructured":"Strug, B., Slusarczyk, G.: Frequent pattern mining in a design supporting system. Key Eng. Mater. 450, 1\u20134 (2011)","journal-title":"Key Eng. Mater."},{"key":"55_CR32","doi-asserted-by":"crossref","first-page":"539","DOI":"10.4028\/www.scientific.net\/KEM.572.539","volume":"572","author":"J Strug","year":"2014","unstructured":"Strug, J.: Classification of mutation operators applied to design models. Key Eng. Mater. 572, 539\u2013542 (2014)","journal-title":"Key Eng. Mater."},{"key":"55_CR33","doi-asserted-by":"crossref","first-page":"543","DOI":"10.4028\/www.scientific.net\/KEM.572.543","volume":"572","author":"J Strug","year":"2014","unstructured":"Strug, J.: Mutation testing approach to evaluation of design models. Key Eng. Mater. 572, 543\u2013546 (2014)","journal-title":"Key Eng. Mater."},{"key":"55_CR34","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"200","DOI":"10.1007\/978-3-642-34691-0_15","volume-title":"Testing Software and Systems","author":"J Strug","year":"2012","unstructured":"Strug, J., Strug, B.: Machine learning approach in mutation testing. In: Nielsen, B., Weise, C. (eds.) ICTSS 2012. LNCS, vol. 7641, pp. 200\u2013214. Springer, Heidelberg (2012)"},{"key":"55_CR35","doi-asserted-by":"crossref","first-page":"546","DOI":"10.4028\/www.scientific.net\/AMM.378.546","volume":"378","author":"J Strug","year":"2013","unstructured":"Strug, J., Strug, B.: Using structural similarity to classify tests in mutation testing. Appl. Mech. Mater. 378, 546\u2013551 (2013)","journal-title":"Appl. Mech. Mater."},{"key":"55_CR36","doi-asserted-by":"crossref","unstructured":"Untch, R.H.: Mutation-based software testing using program schemata. In: Proceedings of the 30th Annual Southeast Regional Conference, pp. 285\u2013291 (1992)","DOI":"10.1145\/503720.503749"},{"key":"55_CR37","doi-asserted-by":"crossref","unstructured":"Yan, X., Yu, P.S., Han, J.: Substructure similarity search in graph databases. In: Proceedings of International Conference on Management of Data (2005)","DOI":"10.1145\/1066157.1066244"},{"key":"55_CR38","doi-asserted-by":"crossref","unstructured":"Yan, X., Yu, P.S., Han, J.: Graph indexing, a frequent structure-based approach. In: Proceedings of International Conference on Management of Data (2004)","DOI":"10.1145\/1007568.1007607"}],"container-title":["Lecture Notes in Computer Science","Artificial Intelligence and Soft Computing"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-39378-0_55","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,8]],"date-time":"2019-09-08T20:44:41Z","timestamp":1567975481000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-39378-0_55"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319393773","9783319393780"],"references-count":38,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-39378-0_55","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}