{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,5]],"date-time":"2024-09-05T17:50:25Z","timestamp":1725558625883},"publisher-location":"Berlin, Heidelberg","reference-count":20,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642139765"},{"type":"electronic","value":"9783642139772"}],"license":[{"start":{"date-parts":[[2010,1,1]],"date-time":"2010-01-01T00:00:00Z","timestamp":1262304000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2010]]},"DOI":"10.1007\/978-3-642-13977-2_6","type":"book-chapter","created":{"date-parts":[[2010,6,29]],"date-time":"2010-06-29T11:35:48Z","timestamp":1277811348000},"page":"55-60","source":"Crossref","is-referenced-by-count":1,"title":["Proof Process Evaluation with Mutation Analysis"],"prefix":"10.1007","author":[{"given":"Lydie","family":"du Bousquet","sequence":"first","affiliation":[]},{"given":"Michel","family":"L\u00e9vy","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","unstructured":"Agrawal, H., Demillo, R., Hathaway, R., Hsu, W.M., Hsu, W., Krauser, E., Martin, R.J., Mathur, A., Spafford, E.: Design of Mutant Operators for the C Programming Language. Technical Report SERC-TR-41-P, Soft. Eng. Research Center, Dep. of Computer Science, Purdue Univ., Indiana (1989)"},{"key":"6_CR2","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1007\/s10270-004-0058-x","volume":"4","author":"W. Ahrendt","year":"2005","unstructured":"Ahrendt, W., Baar, T., Beckert, B., Bubel, R., Giese, M., H\u00e4hnle, R., Menzel, W., Mostowski, W., Roth, A., Schlager, S., Schmitt, P.H.: The KeY tool. Software and System Modeling\u00a04, 32\u201354 (2005)","journal-title":"Software and System Modeling"},{"key":"6_CR3","doi-asserted-by":"publisher","first-page":"402","DOI":"10.1109\/ICSE.2005.1553583","volume-title":"27th International Conference on Software Engineering (ICSE 2005)","author":"J.H. Andrews","year":"2005","unstructured":"Andrews, J.H., Briand, L.C., Labiche, Y.: Is mutation an appropriate tool for testing experiments? In: 27th International Conference on Software Engineering (ICSE 2005), St. Louis, Missouri, USA, May 2005, pp. 402\u2013411. ACM, New York (2005)"},{"key":"6_CR4","unstructured":"Budd, T.A.: Mutation analysis of program test data. Phd thesis, Yale University, New Haven, CT, USA (1980)"},{"key":"6_CR5","doi-asserted-by":"crossref","unstructured":"Burdy, L., Requet, A., Lanet, J.-L.: Java applet correctness: a developer-oriented approach. In: The 12th International FME Symposium, Pisa, Italy (September 2003)","DOI":"10.1007\/978-3-540-45236-2_24"},{"issue":"4","key":"6_CR6","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/C-M.1978.218136","volume":"11","author":"R.A. DeMillo","year":"1978","unstructured":"DeMillo, R.A., Lipton, R.J., Sayward, F.G.: Hints on test data selection: Help for the practicing programmer. Computer\u00a011(4), 34\u201341 (1978)","journal-title":"Computer"},{"key":"6_CR7","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"622","DOI":"10.1007\/3-540-48119-2_35","volume-title":"FM\u201999 - Formal Methods","author":"L. Bousquet du","year":"1999","unstructured":"du Bousquet, L.: Feature interaction detection using testing and model-checking, experience report. In: Wing, J.M., Woodcock, J.C.P., Davies, J. (eds.) FM 1999. LNCS, vol.\u00a01708, pp. 622\u2013641. Springer, Heidelberg (1999)"},{"key":"6_CR8","doi-asserted-by":"crossref","unstructured":"du Bousquet, L., Ledru, Y., Maury, O., Oriat, C., Lanet, J.-L.: Reusing a JML specification dedicated to verification for testing, and vice-versa: case studies. Journal of Automatic Reasoning (2009) (to appear)","DOI":"10.1007\/s10817-009-9132-y"},{"key":"6_CR9","series-title":"Lecture Notes in Computer Science","volume-title":"FME \u201994: Industrial Benefit of Formal Methods","author":"A.S. Evans","year":"1994","unstructured":"Evans, A.S.: Specifying and Verifying Concurrent Systems Using Z. In: Naftalin, M., Bertr\u00e1n, M., Denvir, T. (eds.) FME 1994. LNCS, vol.\u00a0873. Springer, Heidelberg (1994)"},{"key":"6_CR10","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-540-30482-1_10","volume-title":"Formal Methods and Software Engineering","author":"J.-C. Filli\u00e2tre","year":"2004","unstructured":"Filli\u00e2tre, J.-C., March\u00e9, C.: Multi-prover verification of c programs. In: Davies, J., Schulte, W., Barnett, M. (eds.) ICFEM 2004. LNCS, vol.\u00a03308, pp. 15\u201329. Springer, Heidelberg (2004)"},{"key":"6_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"173","DOI":"10.1007\/978-3-540-73368-3_21","volume-title":"Computer Aided Verification","author":"J.-C. Filli\u00e2tre","year":"2007","unstructured":"Filli\u00e2tre, J.-C., March\u00e9, C.: The why\/krakatoa\/caduceus platform for deductive program verification. In: Damm, W., Hermanns, H. (eds.) CAV 2007. LNCS, vol.\u00a04590, pp. 173\u2013177. Springer, Heidelberg (2007)"},{"key":"6_CR12","unstructured":"Jia, Y., Harman, M.: An Analysis and Survey of the Development of Mutation Testing. Technical Report TR-09-06, CREST Centre, King\u2019s College London, London, UK (2009)"},{"key":"6_CR13","unstructured":"Laleau, R., Ledru, Y., Bert, D., Bouquet, F., Lemoine, M., Dubois, C., Donzeau-Gouge, V., Vignes, S.: Using computer science modeling techniques for airport security certification. In: The 1st Int. Conf. on Research Challenges in Information Science (RCIS), pp. 61\u201372 (2007)"},{"issue":"3","key":"6_CR14","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1145\/1072997.1072998","volume":"14","author":"M.F. Lau","year":"2005","unstructured":"Lau, M.F., Yu, Y.T.: An extended fault class hierarchy for specification-based testing. ACM Trans. Softw. Eng. Methodol.\u00a014(3), 247\u2013276 (2005)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"6_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"354","DOI":"10.1007\/978-3-540-30476-0_29","volume-title":"Automated Technology for Verification and Analysis","author":"T.-C. Lee","year":"2004","unstructured":"Lee, T.-C., Hsiung, P.-A.: Mutation coverage estimation for model checking. In: Wang, F. (ed.) ATVA 2004. LNCS, vol.\u00a03299, pp. 354\u2013368. Springer, Heidelberg (2004)"},{"key":"6_CR16","volume-title":"The Art of Software Testing","author":"G. Myers","year":"1979","unstructured":"Myers, G.: The Art of Software Testing. Wiley-Interscience, Hoboken (1979)"},{"key":"6_CR17","doi-asserted-by":"crossref","DOI":"10.1007\/978-1-4613-0089-2","volume-title":"Automated Theorem Proving: Theory and Practice","author":"M. Newborn","year":"2001","unstructured":"Newborn, M.: Automated Theorem Proving: Theory and Practice. Springer, Heidelberg (2001)"},{"issue":"3","key":"6_CR18","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1002\/(SICI)1099-1689(199709)7:3<165::AID-STVR143>3.0.CO;2-U","volume":"7","author":"A.J. Offutt","year":"1997","unstructured":"Offutt, A.J., Pan, J.: Automatically detecting equivalent mutants and infeasible paths. Softw. Test., Verif. Reliab.\u00a07(3), 165\u2013192 (1997)","journal-title":"Softw. Test., Verif. Reliab."},{"key":"6_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1007\/3-540-45510-8_2","volume-title":"Modeling and Verification of Parallel Processes","author":"J.M. Rushby","year":"2001","unstructured":"Rushby, J.M.: Theorem proving for verification. In: Cassez, F., Jard, C., Rozoy, B., Dermot, M. (eds.) MOVEP 2000. LNCS, vol.\u00a02067, pp. 39\u201357. Springer, Heidelberg (2001)"},{"key":"6_CR20","first-page":"340","volume-title":"The 10th Asia-Pacific Software Engineering Conference","author":"T. Srivatanakul","year":"2003","unstructured":"Srivatanakul, T., Clark, J.A., Stepney, S., Polack, F.: Challenging formal specifications by mutation: a csp security example. In: The 10th Asia-Pacific Software Engineering Conference, USA, p. 340. IEEE, Los Alamitos (2003)"}],"container-title":["Lecture Notes in Computer Science","Tests and Proofs"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-13977-2_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,19]],"date-time":"2019-05-19T19:24:48Z","timestamp":1558293888000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-13977-2_6"}},"subtitle":["Extended Abstract"],"short-title":[],"issued":{"date-parts":[[2010]]},"ISBN":["9783642139765","9783642139772"],"references-count":20,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-13977-2_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2010]]}}}