{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,1]],"date-time":"2026-02-01T20:15:18Z","timestamp":1769976918296,"version":"3.49.0"},"publisher-location":"Cham","reference-count":27,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319614724","type":"print"},{"value":"9783319614731","type":"electronic"}],"license":[{"start":{"date-parts":[[2017,1,1]],"date-time":"2017-01-01T00:00:00Z","timestamp":1483228800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017]]},"DOI":"10.1007\/978-3-319-61473-1_9","type":"book-chapter","created":{"date-parts":[[2017,6,19]],"date-time":"2017-06-19T15:10:41Z","timestamp":1497885041000},"page":"121-137","source":"Crossref","is-referenced-by-count":13,"title":["Generating Efficient Mutation Operators for Search-Based Model-Driven Engineering"],"prefix":"10.1007","author":[{"given":"Daniel","family":"Str\u00fcber","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2017,6,20]]},"reference":[{"issue":"14","key":"9_CR1","doi-asserted-by":"crossref","first-page":"833","DOI":"10.1016\/S0950-5849(01)00189-6","volume":"43","author":"M Harman","year":"2001","unstructured":"Harman, M., Jones, B.F.: Search-based software engineering. Inf. Softw. Technol. 43(14), 833\u2013839 (2001)","journal-title":"Inf. Softw. Technol."},{"key":"9_CR2","doi-asserted-by":"crossref","first-page":"1081","DOI":"10.1002\/smr.1804","volume":"28","author":"M Fleck","year":"2016","unstructured":"Fleck, M., Troya, J., Wimmer, M.: Search-based model transformations. Softw. Evol. Process 28, 1081\u20131117 (2016)","journal-title":"Softw. Evol. Process"},{"key":"9_CR3","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"104","DOI":"10.1007\/978-3-662-49665-7_7","volume-title":"Fundamental Approaches to Software Engineering","author":"C Debreceni","year":"2016","unstructured":"Debreceni, C., R\u00e1th, I., Varr\u00f3, D., Carlos, X., Mendialdua, X., Trujillo, S.: Automated model merge by design space exploration. In: Stevens, P., W\u0105sowski, A. (eds.) FASE 2016. LNCS, vol. 9633, pp. 104\u2013121. Springer, Heidelberg (2016). doi: 10.1007\/978-3-662-49665-7_7"},{"key":"9_CR4","doi-asserted-by":"crossref","unstructured":"Fleck, M., Troya, J., Kessentini, M., Wimmer, M., Alkhazi, B.: Model transformation modularization as a many-objective optimization problem. IEEE Trans. Softw. Eng. (2017)","DOI":"10.1109\/TSE.2017.2654255"},{"key":"9_CR5","doi-asserted-by":"crossref","unstructured":"Abdeen, H., Varr\u00f3, D., Sahraoui, H., Nagy, A.S., Debreceni, C., Heged\u00fcs, \u00c1., Horv\u00e1th, \u00c1.: Multi-objective optimization in rule-based design space exploration. In: ASE, pp. 289\u2013300. ACM (2014)","DOI":"10.1145\/2642937.2643005"},{"key":"9_CR6","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"79","DOI":"10.1007\/978-3-319-42064-6_6","volume-title":"Theory and Practice of Model Transformations","author":"M Fleck","year":"2016","unstructured":"Fleck, M., Troya, J., Wimmer, M.: Search-based model transformations with MOMoT. In: Van Gorp, P., Engels, G. (eds.) ICMT 2016. LNCS, vol. 9765, pp. 79\u201387. Springer, Cham (2016). doi: 10.1007\/978-3-319-42064-6_6"},{"key":"9_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"317","DOI":"10.1007\/978-3-319-50230-4_24","volume-title":"Software Technologies: Applications and Foundations","author":"S Zschaler","year":"2016","unstructured":"Zschaler, S., Mandow, L.: Towards model-based optimisation: using domain knowledge explicitly. In: Milazzo, P., Varr\u00f3, D., Wimmer, M. (eds.) STAF 2016. LNCS, vol. 9946, pp. 317\u2013329. Springer, Cham (2016). doi: 10.1007\/978-3-319-50230-4_24"},{"key":"9_CR8","unstructured":"Fleck, M., Troya, J., Wimmer, M.: The class responsibility assignment case. In: TTC, pp. 1\u20138 (2016)"},{"key":"9_CR9","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-642-16145-2_9","volume-title":"Model Driven Engineering Languages and Systems","author":"T Arendt","year":"2010","unstructured":"Arendt, T., Biermann, E., Jurack, S., Krause, C., Taentzer, G.: Henshin: advanced concepts and tools for in-place EMF model transformations. In: Petriu, D.C., Rouquette, N., Haugen, \u00d8. (eds.) MODELS 2010. LNCS, vol. 6394, pp. 121\u2013135. Springer, Heidelberg (2010). doi: 10.1007\/978-3-642-16145-2_9"},{"key":"9_CR10","doi-asserted-by":"crossref","unstructured":"Woodward, J.R., Swan, J.: The automatic generation of mutation operators for genetic algorithms. In: GECCO, pp. 67\u201374 (2012)","DOI":"10.1145\/2330784.2330796"},{"key":"9_CR11","volume-title":"Graph Algorithms and NP-Completeness","author":"K Mehlhorn","year":"1984","unstructured":"Mehlhorn, K.: Graph Algorithms and NP-Completeness. Springer, New York (1984)"},{"key":"9_CR12","unstructured":"Tichy, M., Krause, C., Liebel, G.: Detecting performance bad smells for Henshin model transformations. In: AMT (2013)"},{"key":"9_CR13","unstructured":"Born, K., Schulz, S., Str\u00fcber, D., John, S.: Solving the class responsibility assignment case with Henshin and a genetic algorithm. In: TTC, pp. 45\u201354 (2016)"},{"key":"9_CR14","doi-asserted-by":"crossref","unstructured":"Nagy, A.S., Sz\u00e1rnyas, G.: Class responsiblity assignment case: a Viatra-DSE solution. In: TTC, pp. 39\u201344 (2016)","DOI":"10.1007\/978-1-4842-1922-5_9"},{"key":"9_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"89","DOI":"10.1007\/978-3-319-40530-8_6","volume-title":"Graph Transformation","author":"D Str\u00fcber","year":"2016","unstructured":"Str\u00fcber, D., Schulz, S.: A tool environment for managing families of model transformation rules. In: Echahed, R., Minas, M. (eds.) ICGT 2016. LNCS, vol. 9761, pp. 89\u2013101. Springer, Cham (2016). doi: 10.1007\/978-3-319-40530-8_6"},{"key":"9_CR16","unstructured":"Str\u00fcber, D.: Model-driven engineering in the large: refactoring techniques for models and model transformation systems. Ph.D. thesis, Philipps-Universit\u00e4t Marburg (2016)"},{"key":"9_CR17","doi-asserted-by":"crossref","first-page":"161","DOI":"10.1016\/B978-0-12-420232-0.00004-0","volume":"92","author":"MW Mkaouer","year":"2014","unstructured":"Mkaouer, M.W., Kessentini, M.: Model transformation using multiobjective optimization. Adv. Comput. 92, 161\u2013202 (2014)","journal-title":"Adv. Comput."},{"key":"9_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-319-42064-6_12","volume-title":"Theory and Practice of Model Transformations","author":"T Kehrer","year":"2016","unstructured":"Kehrer, T., Taentzer, G., Rindt, M., Kelter, U.: Automatically deriving the specification of model editing operations from meta-models. In: Van Gorp, P., Engels, G. (eds.) ICMT 2016. LNCS, vol. 9765, pp. 173\u2013188. Springer, Cham (2016). doi: 10.1007\/978-3-319-42064-6_12"},{"key":"9_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"36","DOI":"10.1007\/978-3-319-42064-6_3","volume-title":"Theory and Practice of Model Transformations","author":"S Popoola","year":"2016","unstructured":"Popoola, S., Kolovos, D.S., Rodriguez, H.H.: EMG: a domain-specific transformation language for synthetic model generation. In: Van Gorp, P., Engels, G. (eds.) ICMT 2016. LNCS, vol. 9765, pp. 36\u201351. Springer, Cham (2016). doi: 10.1007\/978-3-319-42064-6_3"},{"key":"9_CR20","doi-asserted-by":"crossref","unstructured":"Troya, J., Bergmayr, A., Burgue\u00f1o, L., Wimmer, M.: Towards systematic mutations for and with ATL model transformations. In: Workshop on Mutation Analysis, pp. 1\u201310 (2015)","DOI":"10.1109\/ICSTW.2015.7107455"},{"key":"9_CR21","unstructured":"Alhwikem, F., Paige, R.F., Rose, L., Alexander, R.: A systematic approach for designing mutation operators for MDE languages. In: MoDEVVa, pp. 54\u201359 (2016)"},{"key":"9_CR22","doi-asserted-by":"crossref","unstructured":"G\u00f3mez-Abajo, P., Guerra, E., de Lara, J.: A domain-specific language for model mutation and its application to the automated generation of exercises. In: Computer Languages, Systems & Structures (2016)","DOI":"10.1016\/j.cl.2016.11.001"},{"key":"9_CR23","doi-asserted-by":"crossref","unstructured":"Smullen, D., Gillett, J., Heron, J., Rahnamayan, S.: Genetic algorithm with self-adaptive mutation controlled by chromosome similarity. In: CEC, pp. 504\u2013511. IEEE (2014)","DOI":"10.1109\/CEC.2014.6900591"},{"key":"9_CR24","doi-asserted-by":"crossref","unstructured":"Martin, M.A., Tauritz, D.R.: Evolving black-box search algorithms employing genetic programming. In: GECCO, companion volume, pp. 1497\u20131504. ACM (2013)","DOI":"10.1145\/2464576.2482728"},{"key":"9_CR25","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"122","DOI":"10.1007\/978-3-662-49665-7_8","volume-title":"Fundamental Approaches to Software Engineering","author":"D Str\u00fcber","year":"2016","unstructured":"Str\u00fcber, D., Rubin, J., Arendt, T., Chechik, M., Taentzer, G., Pl\u00f6ger, J.: RuleMerger: automatic construction of variability-based model transformation rules. In: Stevens, P., W\u0105sowski, A. (eds.) FASE 2016. LNCS, vol. 9633, pp. 122\u2013140. Springer, Heidelberg (2016). doi: 10.1007\/978-3-662-49665-7_8"},{"key":"9_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/978-3-319-42064-6_13","volume-title":"Theory and Practice of Model Transformations","author":"D Str\u00fcber","year":"2016","unstructured":"Str\u00fcber, D., Pl\u00f6ger, J., Acre\u0163oaie, V.: Clone detection for graph-based model transformation languages. In: Van Gorp, P., Engels, G. (eds.) ICMT 2016. LNCS, vol. 9765, pp. 191\u2013206. Springer, Cham (2016). doi: 10.1007\/978-3-319-42064-6_13"},{"key":"9_CR27","doi-asserted-by":"crossref","unstructured":"Ahmadian, A.S., Str\u00fcber, D., Riediger, V., J\u00fcrjens, J.: Model-based privacy analysis in industrial ecosystems. In: ECMFA. Springer (2017)","DOI":"10.1007\/978-3-319-61482-3_13"}],"container-title":["Lecture Notes in Computer Science","Theory and Practice of Model Transformation"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-61473-1_9","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,29]],"date-time":"2022-07-29T21:18:27Z","timestamp":1659129507000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-61473-1_9"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017]]},"ISBN":["9783319614724","9783319614731"],"references-count":27,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-61473-1_9","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2017]]}}}