{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,6]],"date-time":"2024-09-06T03:32:54Z","timestamp":1725593574210},"publisher-location":"Berlin, Heidelberg","reference-count":17,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642222023"},{"type":"electronic","value":"9783642222030"}],"license":[{"start":{"date-parts":[[2011,1,1]],"date-time":"2011-01-01T00:00:00Z","timestamp":1293840000000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011]]},"DOI":"10.1007\/978-3-642-22203-0_13","type":"book-chapter","created":{"date-parts":[[2011,6,28]],"date-time":"2011-06-28T00:26:28Z","timestamp":1309220788000},"page":"143-150","source":"Crossref","is-referenced-by-count":1,"title":["A Framework to Assure the Quality of Sanity Check Process"],"prefix":"10.1007","author":[{"given":"Rabia","family":"Sammi","sequence":"first","affiliation":[]},{"given":"Iram","family":"Masood","sequence":"additional","affiliation":[]},{"given":"Shunaila","family":"Jabeen","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","volume-title":"Proceedings of Southeastcon 1989, Energy and Information Technologies in the Southeast, vol","author":"S. Lahouar","year":"1989","unstructured":"Lahouar, S., Rahoman, S.: Design and implementation of an expert system for data sanity checking. In: Proceedings of Southeastcon 1989, Energy and Information Technologies in the Southeast, vol, April 9-12, 1989, IEEE, Los Alamitos (1989), doi:10.1109\/SECON.1989.132347"},{"key":"13_CR2","unstructured":"Lev-Yehudi, Y., Perry, A.: Implementing Automatic testing is not so automatic: Lessons learned from an implementation experiment in Magic Software Enterprises (1997)"},{"key":"13_CR3","doi-asserted-by":"crossref","unstructured":"Filho, W.P.P.: Quality Gates in Use-Case Driven Development. In: Proceedings of the 2006 international workshop on Software quality, WoSQ 2006 (2006), ISBN:1-59593-399-9","DOI":"10.1145\/1137702.1137710"},{"key":"13_CR4","unstructured":"Lassenius, K.R.C.: Pacing Software Product Development: A Framework and Practical Implementation Guidelines (2006), ISBN 951-22-8382-4"},{"issue":"3","key":"13_CR5","doi-asserted-by":"publisher","first-page":"116","DOI":"10.1109\/MC.1996.485905","volume":"29","author":"C. Jones","year":"1996","unstructured":"Jones, C.: By popular demand: Software estimating rules of thumb. Computer\u00a029(3), 116 (1996), doi:10.1109\/MC.1996.4859","journal-title":"Computer"},{"key":"13_CR6","volume-title":"Proceedings of the 11th Asia-Pacific Software Engineering Conference (APSEC 2004).","author":"D. Sundmark","year":"2004","unstructured":"Sundmark, D., M\u00f6ller, A., Nolin, M.: Monitoring Software Components- A Novel Software Engineering Approach. In: Proceedings of the 11th Asia-Pacific Software Engineering Conference (APSEC 2004). IEEE Computer Society, Los Alamitos (2004)"},{"key":"13_CR7","doi-asserted-by":"crossref","unstructured":"Mead, N., Stehney, T.: Security Quality Requirements Engineering (SQUARE) Methodology (2005)","DOI":"10.21236\/ADA443493"},{"key":"13_CR8","unstructured":"Li, S., Xu, J., Deng, L.: Periodic Partial Validation: Cost-effective Source Code Validation Process in Cross-platform Software Development Environment. In: Proceedings of the 10th IEEE Pacific Rim International Symposium on Dependable Computing, PRDC 2004 (2004)"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Weller, E.F.: Lessons from three years of inspection data. Journal of IEEE software\u00a010(5) (1993)","DOI":"10.1109\/52.232397"},{"key":"13_CR10","doi-asserted-by":"crossref","unstructured":"Trappe, W., Zhang, Y., Nath, B.: MIAMI: Methods and Infrastructure for the Assurance of Measurement Information. In: Proceedings of the 2nd International VLDB Workshop on Data Management for Sensor Networks (2005)","DOI":"10.1145\/1080885.1080888"},{"key":"13_CR11","doi-asserted-by":"publisher","DOI":"10.1007\/11915072_18","volume-title":"Using ORM-Based Models as a Foundation for a Data Quality Firewall in an Advanced Generation Data Warehouse","author":"B. Piprani","year":"2006","unstructured":"Piprani, B.: Using ORM-Based Models as a Foundation for a Data Quality Firewall in an Advanced Generation Data Warehouse. Springer, Heidelberg (2006)"},{"key":"13_CR12","volume-title":"A common criteria based security requirements engineering process for the development of secure information systems","author":"D. Mellado","year":"2006","unstructured":"Mellado, D., Fern\u00e1ndez-Medina, E., Piattini, M.: A common criteria based security requirements engineering process for the development of secure information systems. Elsevier, Amsterdam (2006)"},{"key":"13_CR13","volume-title":"Ice Edge Detection and Icewater Classification Utilizing the ERS-1 and TOPEX Altimeters","author":"R.E. Coulter","year":"1994","unstructured":"Coulter, R.E.: Ice Edge Detection and Icewater Classification Utilizing the ERS-1 and TOPEX Altimeters. IEEE, Los Alamitos (1994)"},{"key":"13_CR14","volume-title":"Regression Testing in an Industrial Environment","author":"A.K. Onoma","year":"1998","unstructured":"Onoma, A.K., Tsai, W.K., Poonawala, M.H., Suganuma, H.: Regression Testing in an Industrial Environment. ACM Press, New York (1998)"},{"key":"13_CR15","unstructured":"IEEE standards, (IEEE Std 610.12-1990)"},{"key":"13_CR16","first-page":"1","volume":"00","author":"M.A. Fecko","year":"2002","unstructured":"Fecko, M.A., Lott, C.M.: Lessons learned from automating tests for an operations support system, Pract. Exper.\u00a000, 1\u201323 (2002)","journal-title":"Pract. Exper."},{"key":"13_CR17","doi-asserted-by":"publisher","first-page":"367","DOI":"10.1109\/COMPSAC.2006.166","volume":"2","author":"N.Y. Zhao","year":"2006","unstructured":"Zhao, N.Y., Shum, M.W.: Technical Solution to Automate Smoke Test Using Rational Functional Tester and Virtualization Technology. 30th Annual International Conference on Computer Software and Applications Conference (COMPSAC 2006)\u00a02, 367 (2006), doi:10.1109\/COMPSAC.2006.166","journal-title":"30th Annual International Conference on Computer Software and Applications Conference (COMPSAC 2006)"}],"container-title":["Communications in Computer and Information Science","Software Engineering and Computer Systems"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-22203-0_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,12]],"date-time":"2019-06-12T12:19:10Z","timestamp":1560341950000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-22203-0_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011]]},"ISBN":["9783642222023","9783642222030"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-22203-0_13","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2011]]}}}