{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,3,16]],"date-time":"2026-03-16T10:15:37Z","timestamp":1773656137306,"version":"3.50.1"},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"value":"9783540220114","type":"print"},{"value":"9783540248415","type":"electronic"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-24841-5_16","type":"book-chapter","created":{"date-parts":[[2010,8,8]],"date-time":"2010-08-08T16:28:22Z","timestamp":1281284902000},"page":"200-212","source":"Crossref","is-referenced-by-count":8,"title":["Good Random Testing"],"prefix":"10.1007","author":[{"given":"Kwok Ping","family":"Chan","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Tsong Yueh","family":"Chen","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Dave","family":"Towey","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","reference":[{"key":"16_CR1","unstructured":"Association for Computer Machinery, Collected Algorithms from ACM, Vol. I, II, III, Association for Computer Machinery (1980)"},{"key":"16_CR2","first-page":"129","volume-title":"Computer Program Testing","author":"T.A. Budd","year":"1981","unstructured":"Budd, T.A.: Mutation Analysis: Ideas, Examples, Problems and Prospects. In: Chandrasekaran, B., Radicci, S. (eds.) Computer Program Testing, pp. 129\u2013148. North-Holland, Amsterdam (1981)"},{"issue":"12","key":"16_CR3","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1016\/0950-5849(96)01103-2","volume":"28","author":"F.T. Chan","year":"1996","unstructured":"Chan, F.T., Chen, T.Y., Mak, I.K., Yu, Y.T.: Proportional Sampling Strategy: Guidelines for Software Testing. Information and Software Technology\u00a028(12), 775\u2013782 (1996)","journal-title":"Information and Software Technology"},{"key":"16_CR4","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"368","DOI":"10.1007\/3-540-44947-7_28","volume-title":"Reliable Software Technologies \u2013 Ada-Europe 2003","author":"K.P. Chan","year":"2003","unstructured":"Chan, K.P., Chen, T.Y., Towey, D.: Normalized Restricted Random Testing. In: Rosen, J.-P., Strohmeier, A. (eds.) Ada-Europe 2003. LNCS, vol.\u00a02655, pp. 368\u2013381. Springer, Heidelberg (2003)"},{"key":"16_CR5","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"321","DOI":"10.1007\/3-540-47984-8_35","volume-title":"Software Quality - ECSQ 2002","author":"K.P. Chan","year":"2002","unstructured":"Chan, K.P., Chen, T.Y., Towey, D.: Restricted Random Testing. In: Kontio, J., Conradi, R. (eds.) ECSQ 2002. LNCS, vol.\u00a02349, pp. 321\u2013330. Springer, Heidelberg (2002)"},{"key":"16_CR6","unstructured":"Chen, T.Y., Leung, H., Mak, I.K.: Adaptive Random Testing (submitted for publication)"},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/S0164-1212(01)00028-0","volume":"58","author":"T.Y. Chen","year":"2001","unstructured":"Chen, T.Y., Tse, T.H., Yu, Y.T.: Proportional Sampling Strategy: A Compendium and Some Insights. The Journal of Systems and Software\u00a058, 65\u201381 (2001)","journal-title":"The Journal of Systems and Software"},{"issue":"3","key":"16_CR8","doi-asserted-by":"publisher","first-page":"92","DOI":"10.1145\/365181.365217","volume":"44","author":"E.W. Dijkstra","year":"2001","unstructured":"Dijkstra, E.W.: The End of Computing Science? Communications of the ACM\u00a044(3), 92 (2001)","journal-title":"Communications of the ACM"},{"key":"16_CR9","first-page":"970","volume-title":"Encyclopedia of Software Engineering","author":"R. Hamlet","year":"1984","unstructured":"Hamlet, R.: Random Testing. In: Marciniak, J. (ed.) Encyclopedia of Software Engineering, pp. 970\u2013978. Wiley, Chichester (1984)"},{"issue":"1-4","key":"16_CR10","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1016\/S0020-0255(00)00059-1","volume":"129","author":"H. Leung","year":"2000","unstructured":"Leung, H., Tse, T.H., Chan, F.T., Chen, T.Y.: Test Case Selection with and without Replacement. Information Sciences\u00a0129(1-4), 81\u2013103 (2000)","journal-title":"Information Sciences"},{"issue":"9","key":"16_CR11","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1016\/0950-5849(88)90037-7","volume":"30","author":"P.S. Loo","year":"1988","unstructured":"Loo, P.S., Tsai, W.K.: Random Testing Revisited. Information and Software Technology\u00a030(9), 402\u2013417 (1988)","journal-title":"Information and Software Technology"},{"key":"16_CR12","volume-title":"Numerical Recipes","author":"W.H. Press","year":"1986","unstructured":"Press, W.H., Flannery, B.P., Teulolsky, S.A., Vetterling, W.T.: Numerical Recipes. Cambridge University Press, Cambridge (1986)"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Simons, C.L., Parmee, I.C., Coward, P.D.: 35 years on: to what extent has software engineering design achieved its goals? IEE Proc.-Softw.\u00a0150(6) (December 2003)","DOI":"10.1049\/ip-sen:20031198"},{"issue":"8","key":"16_CR14","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1145\/280324.280335","volume":"41","author":"S. Slaughter","year":"1998","unstructured":"Slaughter, S., Harter, D.E., Krishnan, M.S.: Evaluating the Cost of Software. Communications of the ACM\u00a041(8), 67\u201373 (1998)","journal-title":"Communications of the ACM"},{"issue":"3","key":"16_CR15","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1109\/MS.2003.1196320","volume":"20","author":"J.M. Voas","year":"2003","unstructured":"Voas, J.M.: Guest Editor\u2019s Introduction: Assuring Software Quality Assurance. IEEE Software\u00a020(3), 48\u201349 (2003)","journal-title":"IEEE Software"},{"key":"16_CR16","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1016\/S0019-9958(65)90241-X","volume":"8","author":"L.A. Zadeh","year":"1965","unstructured":"Zadeh, L.A.: Fuzzy Sets. Information and Control\u00a08, 338\u2013353 (1965)","journal-title":"Information and Control"}],"container-title":["Lecture Notes in Computer Science","Reliable Software Technologies - Ada-Europe 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-24841-5_16.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,5,2]],"date-time":"2021-05-02T23:13:36Z","timestamp":1619997216000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-24841-5_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540220114","9783540248415"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-24841-5_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"value":"0302-9743","type":"print"},{"value":"1611-3349","type":"electronic"}],"subject":[],"published":{"date-parts":[[2004]]}}}