{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,9]],"date-time":"2024-09-09T07:03:47Z","timestamp":1725865427597},"publisher-location":"Cham","reference-count":15,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319467498"},{"type":"electronic","value":"9783319467504"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-46750-4_10","type":"book-chapter","created":{"date-parts":[[2016,9,20]],"date-time":"2016-09-20T22:11:57Z","timestamp":1474409517000},"page":"158-175","source":"Crossref","is-referenced-by-count":1,"title":["Towards MC\/DC Coverage of Properties Specification Patterns"],"prefix":"10.1007","author":[{"given":"Ana C. V.","family":"de Melo","sequence":"first","affiliation":[]},{"given":"Corina S.","family":"P\u0103s\u0103reanu","sequence":"additional","affiliation":[]},{"given":"Simone","family":"Hanazumi","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,9,22]]},"reference":[{"key":"10_CR1","doi-asserted-by":"crossref","DOI":"10.1017\/CBO9780511809163","volume-title":"Introduction to Software Testing","author":"P Ammann","year":"2008","unstructured":"Ammann, P., Offutt, J.: Introduction to Software Testing, vol. 54. Cambridge University Press, Cambridge (2008)"},{"key":"10_CR2","doi-asserted-by":"crossref","unstructured":"Dwyer, M.B., Avrunin, G.S., Corbett, J.C.: Patterns in property specifications for finite-state verification. In: Proceedings of the 21st International Conference on Software Engineering, ICSE 1999, pp. 411\u2013420. ACM, New York (1999)","DOI":"10.1145\/302405.302672"},{"issue":"3","key":"10_CR3","doi-asserted-by":"crossref","first-page":"215","DOI":"10.1002\/stvr.402","volume":"19","author":"G Fraser","year":"2009","unstructured":"Fraser, G., Wotawa, F., Ammann, P.E.: Testing with model checkers: a survey. Softw. Test. Verif. Reliab. 19(3), 215\u2013261 (2009)","journal-title":"Softw. Test. Verif. Reliab."},{"issue":"6","key":"10_CR4","doi-asserted-by":"crossref","first-page":"146","DOI":"10.1145\/318774.318939","volume":"24","author":"A Gargantini","year":"1999","unstructured":"Gargantini, A., Heitmeyer, C.: Using model checking to generate tests from requirements specifications. SIGSOFT Softw. Eng. Not. 24(6), 146\u2013162 (1999)","journal-title":"SIGSOFT Softw. Eng. Not."},{"key":"10_CR5","doi-asserted-by":"crossref","unstructured":"Hanazumi, S., de Melo, A.C.V., P\u0103s\u0103reanu, C.S.: From testing purposes to formal JPF properties. In: Java PathFinder Workshop. ACM (2014)","DOI":"10.1145\/2693208.2693241"},{"key":"10_CR6","doi-asserted-by":"crossref","unstructured":"Hesari, S., Behjati, R., Yue, T.: Towards a systematic requirement-based test generation framework: industrial challenges and needs. In: Proceedings of the 2013 21st IEEE International Requirements Engineering Conference, RE 2013, pp. 261\u2013266 (2013)","DOI":"10.1109\/RE.2013.6636727"},{"key":"10_CR7","doi-asserted-by":"crossref","unstructured":"Holloway, C.: Towards understanding the DO-178C\/ED-12C assurance case. In: 7th IET International Conference on System Safety, Incorporating the Cyber Security Conference 2012, p. 14. Institution of Engineering and Technology (2012)","DOI":"10.1049\/cp.2012.1499"},{"key":"10_CR8","unstructured":"S. Patterns, June 2015. http:\/\/patterns.projects.cis.ksu.edu\/"},{"key":"10_CR9","doi-asserted-by":"crossref","unstructured":"Pecheur, C., Raimondi, F., Brat, G.: A formal analysis of requirements-based testing. In: Proceedings of the Eighteenth International Symposium on Software Testing and Analysis, ISSTA 2009, pp. 47\u201356 (2009)","DOI":"10.1145\/1572272.1572279"},{"key":"10_CR10","doi-asserted-by":"crossref","unstructured":"Pnueli, A.: The temporal logic of programs. In: SFCS 1977: Proceedings of the 18th Annual Symposium on Foundations of Computer Science, pp. 46\u201357. IEEE Computer Society, Washington, DC (1977)","DOI":"10.1109\/SFCS.1977.32"},{"key":"10_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"86","DOI":"10.1007\/978-3-540-88194-0_8","volume-title":"Formal Methods and Software Engineering","author":"A Rajan","year":"2008","unstructured":"Rajan, A., Whalen, M., Staats, M., Heimdahl, M.P.E.: Requirements coverage as an adequacy measure for conformance testing. In: Liu, S., Maibaum, T., Araki, K. (eds.) ICFEM 2008. LNCS, vol. 5256, pp. 86\u2013104. Springer, Heidelberg (2008). doi: 10.1007\/978-3-540-88194-0_8"},{"issue":"4","key":"10_CR12","doi-asserted-by":"crossref","first-page":"74","DOI":"10.1145\/2667218","volume":"58","author":"J Sametinger","year":"2015","unstructured":"Sametinger, J., Rozenblit, J., Lysecky, R., Ott, P.: Security challenges for medical devices. Commun. ACM 58(4), 74\u201382 (2015)","journal-title":"Commun. ACM"},{"key":"10_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"171","DOI":"10.1007\/978-3-642-21768-5_13","volume-title":"Tests and Proofs","author":"L Tan","year":"2011","unstructured":"Tan, L.: State coverage metrics for specification-based testing with B\u00fcchi automata. In: Gogolla, M., Wolff, B. (eds.) TAP 2011. LNCS, vol. 6706, pp. 171\u2013186. Springer, Heidelberg (2011). doi: 10.1007\/978-3-642-21768-5_13"},{"key":"10_CR14","doi-asserted-by":"crossref","unstructured":"Tan, L., Sokolsky, O., Lee, I.: Specification-based testing with linear temporal logic. In: Proceedings of the 2004 IEEE International Conference on Information Reuse and Integration, IRI 2004 (2004)","DOI":"10.1109\/IRI.2004.1431509"},{"key":"10_CR15","doi-asserted-by":"crossref","unstructured":"Whalen, M.W., Rajan, A., Heimdahl, M.P., Miller, S.P.: Coverage metrics for requirements-based testing. In: International Symposium on Software Testing and Analysis, p. 25 (2006)","DOI":"10.1145\/1146238.1146242"}],"container-title":["Lecture Notes in Computer Science","Theoretical Aspects of Computing \u2013 ICTAC 2016"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-46750-4_10","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,13]],"date-time":"2019-09-13T16:29:38Z","timestamp":1568392178000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-46750-4_10"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319467498","9783319467504"],"references-count":15,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-46750-4_10","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}