{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,6]],"date-time":"2025-11-06T12:05:55Z","timestamp":1762430755268},"publisher-location":"Berlin, Heidelberg","reference-count":30,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642389153"},{"type":"electronic","value":"9783642389160"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-38916-0_1","type":"book-chapter","created":{"date-parts":[[2013,6,10]],"date-time":"2013-06-10T02:13:47Z","timestamp":1370830427000},"page":"1-19","source":"Crossref","is-referenced-by-count":15,"title":["Incremental Refinement Checking for Test Case Generation"],"prefix":"10.1007","author":[{"given":"Bernhard K.","family":"Aichernig","sequence":"first","affiliation":[]},{"given":"Elisabeth","family":"J\u00f6bstl","sequence":"additional","affiliation":[]},{"given":"Matthias","family":"Kegele","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"1_CR1","doi-asserted-by":"crossref","unstructured":"Abrial, J.R.: Modeling in Event-B: System and Software Engineering. Cambridge University Press (2010)","DOI":"10.1017\/CBO9781139195881"},{"key":"1_CR2","doi-asserted-by":"crossref","unstructured":"Aichernig, B.K., Brandl, H., J\u00f6bstl, E., Krenn, W.: Efficient mutation killers in action. In: ICST, pp. 120\u2013129. IEEE (2011)","DOI":"10.1109\/ICST.2011.57"},{"issue":"1-2","key":"1_CR3","doi-asserted-by":"publisher","first-page":"33","DOI":"10.1007\/s00165-008-0083-6","volume":"21","author":"B.K. Aichernig","year":"2009","unstructured":"Aichernig, B.K., He, J.: Mutation testing in UTP. Formal Aspects of Computing\u00a021(1-2), 33\u201364 (2009)","journal-title":"Formal Aspects of Computing"},{"key":"1_CR4","doi-asserted-by":"crossref","unstructured":"Aichernig, B.K., J\u00f6bstl, E.: Efficient refinement checking for model-based mutation testing. In: QSIC, pp. 21\u201330. IEEE (2012)","DOI":"10.1109\/QSIC.2012.58"},{"key":"1_CR5","doi-asserted-by":"crossref","unstructured":"Aichernig, B.K., J\u00f6bstl, E.: Towards symbolic model-based mutation testing: Combining reachability and refinement checking. In: MBT. EPTCS, vol.\u00a080, pp. 88\u2013102 (2012)","DOI":"10.4204\/EPTCS.80.7"},{"key":"1_CR6","doi-asserted-by":"crossref","unstructured":"Aichernig, B.K., J\u00f6bstl, E.: Towards symbolic model-based mutation testing: Pitfalls in expressing semantics as constraints. In: ICST, pp. 752\u2013757. IEEE (2012)","DOI":"10.1109\/ICST.2012.169"},{"key":"1_CR7","doi-asserted-by":"crossref","unstructured":"Aichernig, B.K., Peischl, B., Weiglhofer, M., Wotawa, F.: Protocol conformance testing a SIP registrar: An industrial application of formal methods. In: SEFM, pp. 215\u2013224. IEEE (2007)","DOI":"10.1109\/SEFM.2007.31"},{"key":"1_CR8","doi-asserted-by":"crossref","unstructured":"Ammann, P., Black, P.E., Majurski, W.: Using model checking to generate tests from specifications. In: ICFEM, pp. 46\u201354. IEEE (1998)","DOI":"10.6028\/NIST.IR.6166"},{"key":"1_CR9","doi-asserted-by":"crossref","unstructured":"Back, R.J., Kurki-Suonio, R.: Decentralization of process nets with centralized control. In: PODC, pp. 131\u2013142. ACM (1983)","DOI":"10.1145\/800221.806716"},{"key":"1_CR10","first-page":"17","volume":"12","author":"R.J. Back","year":"1991","unstructured":"Back, R.J., Sere, K.: Stepwise refinement of action systems. Structured Programming\u00a012, 17\u201330 (1991)","journal-title":"Structured Programming"},{"key":"1_CR11","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"103","DOI":"10.1007\/3-540-45139-0_7","volume-title":"Model Checking Software","author":"T. Ball","year":"2001","unstructured":"Ball, T., Rajamani, S.K.: Automatically validating temporal safety properties of interfaces. In: Dwyer, M.B. (ed.) SPIN 2001. LNCS, vol.\u00a02057, pp. 103\u2013122. Springer, Heidelberg (2001)"},{"key":"1_CR12","doi-asserted-by":"publisher","first-page":"505","DOI":"10.1007\/s10009-007-0044-z","volume":"9","author":"D. Beyer","year":"2007","unstructured":"Beyer, D., Henzinger, T.A., Jhala, R., Majumdar, R.: The software model checker BLAST. STTT\u00a09, 505\u2013525 (2007)","journal-title":"STTT"},{"issue":"2","key":"1_CR13","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1016\/j.entcs.2007.08.002","volume":"190","author":"S. Boroday","year":"2007","unstructured":"Boroday, S., Petrenko, A., Groz, R.: Can a model checker generate tests for non-deterministic systems? Electr. Notes Theor. Comput. Sci.\u00a0190(2), 3\u201319 (2007)","journal-title":"Electr. Notes Theor. Comput. Sci."},{"issue":"1","key":"1_CR14","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/0096-0551(85)90011-6","volume":"10","author":"T.A. Budd","year":"1985","unstructured":"Budd, T.A., Gopal, A.S.: Program testing by specification mutation. Computer Languages\u00a010(1), 63\u201373 (1985)","journal-title":"Computer Languages"},{"key":"1_CR15","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"191","DOI":"10.1007\/BFb0033845","volume-title":"Programming Languages: Implementations, Logics, and Programs","author":"M. Carlsson","year":"1997","unstructured":"Carlsson, M., Ottosson, G., Carlson, B.: An open-ended finite domain constraint solver. In: Hartel, P.H., Kuchen, H. (eds.) PLILP 1997. LNCS, vol.\u00a01292, pp. 191\u2013206. Springer, Heidelberg (1997)"},{"issue":"4","key":"1_CR16","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/C-M.1978.218136","volume":"11","author":"R. DeMillo","year":"1978","unstructured":"DeMillo, R., Lipton, R., Sayward, F.: Hints on test data selection: Help for the practicing programmer. IEEE Computer\u00a011(4), 34\u201341 (1978)","journal-title":"IEEE Computer"},{"key":"1_CR17","doi-asserted-by":"crossref","unstructured":"Dijkstra, E., Scholten, C.: Predicate Calculus and Program Semantics. Texts and Monographs in Computer Science. Springer (1990)","DOI":"10.1007\/978-1-4612-3228-5"},{"issue":"3","key":"1_CR18","doi-asserted-by":"publisher","first-page":"215","DOI":"10.1002\/stvr.402","volume":"19","author":"G. Fraser","year":"2009","unstructured":"Fraser, G., Wotawa, F., Ammann, P.E.: Testing with model checkers: a survey. Softw. Test. Verif. Reliab.\u00a019(3), 215\u2013261 (2009)","journal-title":"Softw. Test. Verif. Reliab."},{"key":"1_CR19","doi-asserted-by":"crossref","unstructured":"Gotlieb, A., Botella, B., Rueher, M.: Automatic test data generation using constraint solving techniques. In: ISSTA, pp. 53\u201362 (1998)","DOI":"10.1145\/271775.271790"},{"issue":"4","key":"1_CR20","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/TSE.1977.231145","volume":"3","author":"R.G. Hamlet","year":"1977","unstructured":"Hamlet, R.G.: Testing programs with the aid of a compiler. IEEE Trans. Software Eng.\u00a03(4), 279\u2013290 (1977)","journal-title":"IEEE Trans. Software Eng."},{"key":"1_CR21","unstructured":"Hoare, C., He, J.: Unifying Theories of Programming. Prentice-Hall (1998)"},{"issue":"5","key":"1_CR22","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/TSE.2010.62","volume":"37","author":"Y. Jia","year":"2011","unstructured":"Jia, Y., Harman, M.: An analysis and survey of the development of mutation testing. IEEE Trans. Software Eng.\u00a037(5), 649\u2013678 (2011)","journal-title":"IEEE Trans. Software Eng."},{"key":"1_CR23","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"258","DOI":"10.1007\/978-3-540-85762-4_18","volume-title":"Theoretical Aspects of Computing - ICTAC 2008","author":"S. Nogueira","year":"2008","unstructured":"Nogueira, S., Sampaio, A., Mota, A.M.: Guided test generation from CSP models. In: Fitzgerald, J.S., Haxthausen, A.E., Yenigun, H. (eds.) ICTAC 2008. LNCS, vol.\u00a05160, pp. 258\u2013273. Springer, Heidelberg (2008)"},{"key":"1_CR24","unstructured":"Okun, V., Black, P.E., Yesha, Y.: Testing with model checker: Insuring fault visibility. In: 2002 WSEAS Int. Conf. on System Science, Applied Mathematics & Computer Science, and Power Engineering Systems, pp. 1351\u20131356 (2003)"},{"key":"1_CR25","unstructured":"Roscoe, A.W.: Model-checking CSP, ch. 21. Prentice-Hall (1994)"},{"key":"1_CR26","unstructured":"Stocks, P.A.: Applying formal methods to software testing. Ph.D. thesis, Department of computer science, University of Queensland (1993)"},{"issue":"3","key":"1_CR27","first-page":"103","volume":"17","author":"J. Tretmans","year":"1996","unstructured":"Tretmans, J.: Test generation with inputs, outputs and repetitive quiescence. Software - Concepts and Tools\u00a017(3), 103\u2013120 (1996)","journal-title":"Software - Concepts and Tools"},{"key":"1_CR28","doi-asserted-by":"crossref","unstructured":"Utting, M., Pretschner, A., Legeard, B.: A taxonomy of model-based testing approaches. Softw. Test. Verif. Reliab. (2011)","DOI":"10.1002\/stvr.456"},{"key":"1_CR29","doi-asserted-by":"crossref","unstructured":"Whittemore, J., Kim, J., Sakallah, K.: SATIRE: A new incremental satisfiability engine. In: DAC, pp. 542\u2013545. ACM (2001)","DOI":"10.1145\/378239.379019"},{"key":"1_CR30","doi-asserted-by":"crossref","unstructured":"Wotawa, F., Nica, M., Aichernig, B.K.: Generating distinguishing tests using the Minion constraint solver. In: ICST, pp. 325\u2013330. IEEE (2010)","DOI":"10.1109\/ICSTW.2010.11"}],"container-title":["Lecture Notes in Computer Science","Tests and Proofs"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-38916-0_1","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,14]],"date-time":"2019-05-14T00:21:10Z","timestamp":1557793270000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-38916-0_1"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642389153","9783642389160"],"references-count":30,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-38916-0_1","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}