{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T20:26:28Z","timestamp":1725567988030},"publisher-location":"Berlin, Heidelberg","reference-count":21,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783540235262"},{"type":"electronic","value":"9783540301820"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2004]]},"DOI":"10.1007\/978-3-540-30182-0_91","type":"book-chapter","created":{"date-parts":[[2010,10,24]],"date-time":"2010-10-24T23:50:40Z","timestamp":1287964240000},"page":"907-916","source":"Crossref","is-referenced-by-count":8,"title":["Software Testing via Model Checking"],"prefix":"10.1007","author":[{"given":"Fevzi","family":"Belli","sequence":"first","affiliation":[]},{"given":"Bari\u015f","family":"G\u00fcldali","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"91_CR1","doi-asserted-by":"crossref","unstructured":"Ammann, P., Black, P.E., Majurski, W.: Using Model Checking to Generate Tests from Specifications. In: ICFEM, pp. 46\u201354 (1998)","DOI":"10.6028\/NIST.IR.6166"},{"key":"91_CR2","unstructured":"Ammann, P., Black, P.E., Ding, W.: Model Checkers in Software Testing. NIST-IR 6777, National Institute of Standards and Technology (2002)"},{"key":"91_CR3","volume-title":"Software Testing Techniques","author":"B. Beizer","year":"1990","unstructured":"Beizer, B.: Software Testing Techniques. Van Nostrand Reinhold, New York (1990)"},{"key":"91_CR4","first-page":"34","volume-title":"Proc. 12th ISSRE","author":"F. Belli","year":"2001","unstructured":"Belli, F.: Finite-State Testing and Analysis of Graphical User Interfaces. In: Proc. 12th ISSRE, pp. 34\u201343. IEEE Computer Society Press, Los Alamitos (2001)"},{"key":"91_CR5","volume-title":"Testing Object-Oriented Systems","author":"R.V. Binder","year":"2000","unstructured":"Binder, R.V.: Testing Object-Oriented Systems. Addison-Wesley, Reading (2000)"},{"key":"91_CR6","first-page":"91","volume-title":"Proc. COMPSAC 2002","author":"J.P. Bowen","year":"2002","unstructured":"Bowen, J.P., et al.: FORTEST: Formal Methods and Testing. In: Proc. COMPSAC 2002, pp. 91\u2013101. IEEE Computer Society Press, Los Alamitos (2002)"},{"key":"91_CR7","first-page":"1","volume-title":"Proc. Int. Cong. on Logic, Methodology, and Philosophy of Science","author":"J.R. B\u00fcchi","year":"1962","unstructured":"B\u00fcchi, J.R.: On a decision method in restricted second order arithmetic. In: Proc. Int. Cong. on Logic, Methodology, and Philosophy of Science, pp. 1\u201311. Stanford University Press, Stanford (1962)"},{"key":"91_CR8","first-page":"118","volume-title":"Proc. of the 1996 SPIN Workshop","author":"J. Callahan","year":"1996","unstructured":"Callahan, J., Schneider, F., Easterbrook, S.: Automated Software Testing Using Model-Checking. In: Proc. of the 1996 SPIN Workshop, pp. 118\u2013127. Rutgers University, New Brunswick (1996)"},{"key":"91_CR9","doi-asserted-by":"crossref","unstructured":"Chow, T.S.: Testing Software Designed Modeled by Finite-State Machines. IEEE Trans. Software Eng., 178\u2013187 (1978)","DOI":"10.1109\/TSE.1978.231496"},{"key":"91_CR10","volume-title":"Model Checking","author":"E.M. Clarke","year":"2000","unstructured":"Clarke, E.M., Grumberg, O., Peled, D.: Model Checking. MIT Press, Cambridge (2000)"},{"key":"91_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"384","DOI":"10.1007\/BFb0035401","volume-title":"Tools and Algorithms for the Construction and Analysis of Systems","author":"A. Engels","year":"1997","unstructured":"Engels, A., Feijs, L.M.G., Mauw, S.: Test Generation for Intelligent Networks Using Model Checking. In: Brinksma, E. (ed.) TACAS 1997. LNCS, vol.\u00a01217, pp. 384\u2013398. Springer, Heidelberg (1997)"},{"key":"91_CR12","doi-asserted-by":"crossref","unstructured":"Gargantini, A., Heitmeyer, C.: Using Model Checking to Generate Tests from Requirements Specification. In: Proc. ESEC\/FSE 1999, ACM SIGSOFT, pp. 146\u2013162 (1999)","DOI":"10.1007\/3-540-48166-4_10"},{"key":"91_CR13","doi-asserted-by":"crossref","unstructured":"Ghosh, S., Mathur, A.P.: Interface Mutation. In: Software Testing, Verif. and Reliability, pp. 227\u2013247 (2001)","DOI":"10.1002\/stvr.239"},{"key":"91_CR14","doi-asserted-by":"crossref","unstructured":"Holzmann, G.J.: The Model Checker SPIN. IEEE Trans. Software Eng., 279\u2013295 (1997)","DOI":"10.1109\/32.588521"},{"key":"91_CR15","unstructured":"Object Management Group. UML specification version 1.3 (1999)"},{"key":"91_CR16","doi-asserted-by":"crossref","unstructured":"Offutt, J., Liu, S., Abdurazik, A., Ammann, P.: Generating Test Data From State-Based Specifications. In: Software Testing, Verif., and Reliability, pp. 25\u201353 (2003)","DOI":"10.1002\/stvr.264"},{"key":"91_CR17","unstructured":"Okun, V., Black, P.E., Yesha, Y.: Testing with Model Checker: Insuring Fault Visibility. WSEAS Transactions on Systems, 77\u201382 (2003)"},{"key":"91_CR18","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4757-3540-6","volume-title":"Software Reliability Methods","author":"D. Peled","year":"2001","unstructured":"Peled, D.: Software Reliability Methods. Springer, Heidelberg (2001)"},{"key":"91_CR19","doi-asserted-by":"crossref","unstructured":"Peled, D., Vardi, M.Y., Yannakakis, M.: Black Box Checking. Journal of Automata, Languages and Combinatorics, 225\u2013246 (2002)","DOI":"10.1007\/978-0-387-35578-8_13"},{"key":"91_CR20","doi-asserted-by":"crossref","unstructured":"Wolper, P.: Constructing Automata from Temporal Logic Formulas: A Tutorial. In: Proc. European Educational Forum: School on Formal Methods and Performance Analysis, pp. 261\u2013277 (2000)","DOI":"10.1007\/3-540-44667-2_7"},{"key":"91_CR21","doi-asserted-by":"crossref","unstructured":"Zhu, H., Hall, P.A.V., May, J.H.R.: Unit Test Coverage and Adequacy. ACM Comp. Surveys, 366\u2013427 (1997)","DOI":"10.1145\/267580.267590"}],"container-title":["Lecture Notes in Computer Science","Computer and Information Sciences - ISCIS 2004"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-540-30182-0_91.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,12]],"date-time":"2021-11-12T16:03:25Z","timestamp":1636733005000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-540-30182-0_91"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2004]]},"ISBN":["9783540235262","9783540301820"],"references-count":21,"URL":"https:\/\/doi.org\/10.1007\/978-3-540-30182-0_91","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2004]]}}}