{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,26]],"date-time":"2025-03-26T04:00:25Z","timestamp":1742961625411,"version":"3.40.3"},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319591469"},{"type":"electronic","value":"9783319591476"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-59147-6_33","type":"book-chapter","created":{"date-parts":[[2017,5,16]],"date-time":"2017-05-16T21:04:08Z","timestamp":1494968648000},"page":"381-391","source":"Crossref","is-referenced-by-count":1,"title":["Using Evolutionary Computation to Improve Mutation Testing"],"prefix":"10.1007","author":[{"given":"Pedro","family":"Delgado-P\u00e9rez","sequence":"first","affiliation":[]},{"given":"Inmaculada","family":"Medina-Bulo","sequence":"additional","affiliation":[]},{"given":"Mercedes G.","family":"Merayo","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,5,18]]},"reference":[{"key":"33_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1338","DOI":"10.1007\/978-3-540-24855-2_155","volume-title":"Genetic and Evolutionary Computation \u2013 GECCO 2004","author":"K Adamopoulos","year":"2004","unstructured":"Adamopoulos, K., Harman, M., Hierons, R.M.: How to overcome the equivalent mutant problem and achieve tailored selective mutation using co-evolution. In: Deb, K. (ed.) GECCO 2004. LNCS, vol. 3103, pp. 1338\u20131349. Springer, Heidelberg (2004). doi:\n10.1007\/978-3-540-24855-2_155"},{"issue":"15","key":"33_CR2","doi-asserted-by":"crossref","first-page":"12131","DOI":"10.1016\/j.eswa.2012.04.041","volume":"39","author":"AS Banzi","year":"2012","unstructured":"Banzi, A.S., Nobre, T., Pinheiro, G.B., \u00c1rias, J.C.G., Pozo, A., Vergilio, S.R.: Selecting mutation operators with a multiobjective approach. Expert Syst. Appl. 39(15), 12131\u201312142 (2012). \nhttp:\/\/dx.doi.org\/10.1016\/j.eswa.2012.04.041","journal-title":"Expert Syst. Appl."},{"key":"33_CR3","unstructured":"Delgado-P\u00e9rez, P., Medina-Bulo, I., Segura, S., Dom\u00ednguez-Jim\u00e9nez, J.J., Garc\u00eda-Dom\u00ednguez, A.: GiGAn: evolutionary mutation testing for C++ object-oriented systems. In: The 32nd ACM Symposium on Applied Computing (SAC 2017) (2017)"},{"key":"33_CR4","doi-asserted-by":"crossref","unstructured":"Delgado-P\u00e9rez, P., Segura, S., Medina-Bulo, I.: Assessment of C++ object-oriented mutation operators: a selective mutation approach. Softw. Test. Verif. Reliab. (2017). \nhttp:\/\/dx.doi.org\/10.1002\/stvr.1630","DOI":"10.1002\/stvr.1630"},{"key":"33_CR5","doi-asserted-by":"crossref","unstructured":"Dom\u00ednguez-Jim\u00e9nez, J.J., Estero-Botaro, A., Garc\u00eda-Dom\u00ednguez, A., Medina-Bulo, I.: GAmera: an automatic mutant generation system for WS-BPEL compositions. In: Proceedings of the 7th IEEE European Conference on Web Services, pp. 97\u2013106. IEEE Computer Society Press, Eindhoven, November 2009. \nhttp:\/\/dx.doi.org\/10.1109\/ECOWS.2009.18","DOI":"10.1109\/ECOWS.2009.18"},{"issue":"10","key":"33_CR6","doi-asserted-by":"crossref","first-page":"1108","DOI":"10.1016\/j.infsof.2011.03.008","volume":"53","author":"JJ Dom\u00ednguez-Jim\u00e9nez","year":"2011","unstructured":"Dom\u00ednguez-Jim\u00e9nez, J.J., Estero-Botaro, A., Garc\u00eda-Dom\u00ednguez, A., Medina-Bulo, I.: Evolutionary mutation testing. Inf. Softw. Technol. 53(10), 1108\u20131123 (2011). \nhttp:\/\/dx.doi.org\/10.1016\/j.infsof.2011.03.008","journal-title":"Inf. Softw. Technol."},{"issue":"5\u20137","key":"33_CR7","doi-asserted-by":"crossref","first-page":"536","DOI":"10.1002\/stvr.1528","volume":"25","author":"A Estero-Botaro","year":"2015","unstructured":"Estero-Botaro, A., Palomo-Lozano, F., Medina-Bulo, I., Dom\u00ednguez-Jim\u00e9nez, J.J., Garc\u00eda-Dom\u00ednguez, A.: Quality metrics for mutation testing with applications to WS-BPEL compositions. Softw. Test. Verif. Reliab. 25(5\u20137), 536\u2013571 (2015). \nhttp:\/\/dx.doi.org\/10.1002\/stvr.1528","journal-title":"Softw. Test. Verif. Reliab."},{"key":"33_CR8","volume-title":"Genetic Algorithms in Search, Optimization and Machine Learning.","author":"DE Goldberg","year":"1989","unstructured":"Goldberg, D.E.: Genetic Algorithms in Search, Optimization and Machine Learning., 1st edn. Addison-Wesley Longman Publishing Co. Inc., Boston (1989)","edition":"1"},{"key":"33_CR9","doi-asserted-by":"crossref","unstructured":"Hierons, R., Harman, M., Danicic, S.: Using program slicing to assist in the detection of equivalent mutants. Softw. Test. Verif. Reliab. 9(4), 233\u2013262 (1999). \nhttp:\/\/dx.doi.org\/10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3","DOI":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3"},{"key":"33_CR10","doi-asserted-by":"crossref","unstructured":"Jia, Y., Harman, M.: Constructing subtle faults using higher order mutation testing. In: Proceedings of the Eighth IEEE International Working Conference on Source Code Analysis and Manipulation, 2008, pp. 249\u2013258, September 2008. \nhttp:\/\/dx.doi.org\/10.1109\/SCAM.2008.36","DOI":"10.1109\/SCAM.2008.36"},{"key":"33_CR11","doi-asserted-by":"crossref","unstructured":"Offutt, A.J., Pan, J.: Detecting equivalent mutants and the feasible path problem. In: Proceedings of the Eleventh Annual Conference on Computer Assurance, Systems Integrity. Software Safety. Process Security (COMPASS 1996), pp. 224\u2013236, June 1996. \nhttp:\/\/dx.doi.org\/10.1109\/CMPASS.1996.507890","DOI":"10.1109\/CMPASS.1996.507890"},{"key":"33_CR12","doi-asserted-by":"crossref","unstructured":"de Oliveira, A.A.L., Camilo-Junior, C.G., Vincenzi, A.M.R.: A coevolutionary algorithm to automatic test case selection and mutant in mutation testing. In: Proceedings of the IEEE Congress on Evolutionary Computation (CEC 2013), pp. 829\u2013836, June 2013. \nhttp:\/\/dx.doi.org\/10.1109\/CEC.2013.6557654","DOI":"10.1109\/CEC.2013.6557654"},{"key":"33_CR13","doi-asserted-by":"crossref","unstructured":"Omar, E., Ghosh, S., Whitley, D.: HOMAJ: a tool for higher order mutation testing in AspectJ and Java. In: Proceedings of the IEEE Seventh International Conference on Software Testing, Verification and Validation Workshops (ICSTW 2014), pp. 165\u2013170, March 2014. \nhttp:\/\/dx.doi.org\/10.1109\/ICSTW.2014.19","DOI":"10.1109\/ICSTW.2014.19"},{"issue":"Part 3","key":"33_CR14","doi-asserted-by":"crossref","first-page":"298","DOI":"10.1016\/j.scico.2014.05.012","volume":"95","author":"M Papadakis","year":"2014","unstructured":"Papadakis, M., Delamaro, M., Traon, Y.L.: Mitigating the effects of equivalent mutants with mutant classification strategies. Sci. Comput. Program. 95(Part 3), 298\u2013319 (2014). \nhttp:\/\/dx.doi.org\/10.1016\/j.scico.2014.05.012\n\n, special Section: ACM SAC-SVT 2013 + Bytecode 2013","journal-title":"Sci. Comput. Program."},{"key":"33_CR15","doi-asserted-by":"crossref","unstructured":"Papadakis, M., Jia, Y., Harman, M., Le Traon, Y.: Trivial compiler equivalence: a large scale empirical study of a simple, fast and effective equivalent mutant detection technique. In: Proceedings of the 37th International Conference on Software Engineering - Volume 1 (ICSE 2015), pp. 936\u2013946. IEEE Press, Piscataway (2015). \nhttp:\/\/dx.doi.org\/10.1109\/ICSE.2015.103","DOI":"10.1109\/ICSE.2015.103"},{"key":"33_CR16","unstructured":"Pargas, R.P., Harrold, M.J., Peck, R.R.: Test-data generation using genetic algorithms. Softw. Test. Verif. Reliab. 9(4), 263\u2013282 (1999). \nhttp:\/\/dx.doi.org\/10.1002\/(SICI)1099-1689(199912)9:4<263::AIDSTVR190>3.0.CO;2-Y"},{"issue":"5","key":"33_CR17","doi-asserted-by":"crossref","first-page":"353","DOI":"10.1002\/stvr.1473","volume":"23","author":"D Schuler","year":"2013","unstructured":"Schuler, D., Zeller, A.: Covering and uncovering equivalent mutants. Softw. Test. Verif. Reliab. 23(5), 353\u2013374 (2013). \nhttp:\/\/dx.doi.org\/10.1002\/stvr.1473","journal-title":"Softw. Test. Verif. Reliab."},{"key":"33_CR18","doi-asserted-by":"crossref","unstructured":"Schwarz, B., Schuler, D., Zeller, A.: Breeding high-impact mutations. In: Proceedings of the 4th IEEE International Conference on Software Testing, Verification, and Validation Workshops (ICSTW 2011), pp. 382\u2013387 (2011). \nhttp:\/\/dx.doi.org\/10.1109\/ICSTW.2011.56","DOI":"10.1109\/ICSTW.2011.56"},{"issue":"3","key":"33_CR19","doi-asserted-by":"crossref","first-page":"80","DOI":"10.1109\/MS.2010.79","volume":"27","author":"M Usaola","year":"2010","unstructured":"Usaola, M., Mateo, P.: Mutation testing cost reduction techniques: a survey. IEEE Softw. 27(3), 80\u201386 (2010). \nhttp:\/\/dx.doi.org\/10.1109\/MS.2010.79","journal-title":"IEEE Softw."},{"issue":"3","key":"33_CR20","doi-asserted-by":"crossref","first-page":"163","DOI":"10.1016\/0950-5849(93)90053-6","volume":"35","author":"MR Woodward","year":"1993","unstructured":"Woodward, M.R.: Mutation testing - its origin and evolution. Inf. Softw. Technol. 35(3), 163\u2013169 (1993). \nhttp:\/\/dx.doi.org\/10.1016\/0950-5849(93)90053-6","journal-title":"Inf. Softw. Technol."},{"key":"33_CR21","unstructured":"Xanthakis, S., Ellis, C., Skourlas, C., Le Gall, A., Katsikas, S., Karapoulios, K.: Application of genetic algorithms to software testing. In: Proceedings of the 5th International Conference on Software Engineering and Applications, pp. 625\u2013636 (1992)"},{"key":"33_CR22","doi-asserted-by":"crossref","unstructured":"Zhang, L., Gligoric, M., Marinov, D., Khurshid, S.: Operator-based and random mutant selection: better together. In: Proceedings of the IEEE\/ACM 28th International Conference on Automated Software Engineering (ASE 2013), pp. 92\u2013102, November 2013. \nhttp:\/\/dx.doi.org\/10.1109\/ASE.2013.6693070","DOI":"10.1109\/ASE.2013.6693070"},{"key":"33_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, L., Hou, S.S., Hu, J.J., Xie, T., Mei, H.: Is operator-based mutant selection superior to random mutant selection? In: Proceedings of the 32nd ACM\/IEEE International Conference on Software Engineering - Volume 1 (ICSE 2010), pp. 435\u2013444, ACM, New York (2010). \nhttp:\/\/dx.doi.org\/10.1145\/1806799.1806863","DOI":"10.1145\/1806799.1806863"}],"container-title":["Lecture Notes in Computer Science","Advances in Computational Intelligence"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-59147-6_33","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,27]],"date-time":"2017-06-27T02:25:07Z","timestamp":1498530307000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-59147-6_33"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319591469","9783319591476"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-59147-6_33","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2017]]}}}