{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,7]],"date-time":"2024-09-07T20:19:17Z","timestamp":1725740357164},"publisher-location":"Berlin, Heidelberg","reference-count":16,"publisher":"Springer Berlin Heidelberg","isbn-type":[{"type":"print","value":"9783642392733"},{"type":"electronic","value":"9783642392740"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013]]},"DOI":"10.1007\/978-3-642-39274-0_6","type":"book-chapter","created":{"date-parts":[[2013,7,11]],"date-time":"2013-07-11T01:07:42Z","timestamp":1373504862000},"page":"48-59","source":"Crossref","is-referenced-by-count":2,"title":["Using Regular Grammars for Event-Based Testing"],"prefix":"10.1007","author":[{"given":"Fevzi","family":"Belli","sequence":"first","affiliation":[]},{"given":"Mutlu","family":"Beyaz\u0131t","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"6_CR1","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1338","DOI":"10.1007\/978-3-540-24855-2_155","volume-title":"Genetic and Evolutionary Computation \u2013 GECCO 2004","author":"K. Adamopoulos","year":"2004","unstructured":"Adamopoulos, K., Harman, M., Hierons, R.: How to Overcome the Equivalent Mutant Problem and Achieve Tailored Selective Mutation Using Co-evolution. In: Deb, K., Tari, Z. (eds.) GECCO 2004. LNCS, vol.\u00a03103, pp. 1338\u20131349. Springer, Heidelberg (2004)"},{"issue":"2-3","key":"6_CR2","doi-asserted-by":"publisher","first-page":"280","DOI":"10.1007\/s00165-003-0011-8","volume":"15","author":"B.K. Aichernig","year":"2003","unstructured":"Aichernig, B.K.: Mutation Testing in the Refinement Calculus. Formal Aspects of Computing Journal\u00a015(2-3), 280\u2013295 (2003)","journal-title":"Formal Aspects of Computing Journal"},{"key":"6_CR3","first-page":"46","volume-title":"Proceedings of the 2nd IEEE International Conference on Formal Engineering Methods (ICFEM 1998)","author":"P.E. Ammann","year":"1998","unstructured":"Ammann, P.E., Black, P.E., Majurski, W.: Using Model Checking to Generate Tests from Specifications. In: Proceedings of the 2nd IEEE International Conference on Formal Engineering Methods (ICFEM 1998), pp. 46\u201354. IEEE Computer Society, Washington, DC (1998)"},{"key":"6_CR4","unstructured":"Beizer, B.: Software Testing Techniques. Van Nostrand Reinhold, New York (1990)"},{"key":"6_CR5","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/ISSRE.2001.989456","volume-title":"Proceedings of the 12th International Symposium on Software Reliability Engineering (ISSRE 2001)","author":"F. Belli","year":"2001","unstructured":"Belli, F.: Finite-State Testing and Analysis of Graphical User Interfaces. In: Proceedings of the 12th International Symposium on Software Reliability Engineering (ISSRE 2001), pp. 34\u201343. IEEE Computer Society, Washington, DC (2001)"},{"key":"6_CR6","doi-asserted-by":"publisher","first-page":"277","DOI":"10.1016\/B978-0-12-396526-4.00006-0","volume":"85","author":"F. Belli","year":"2012","unstructured":"Belli, F., Beyaz\u0131t, M., G\u00fcler, N.: Event-Oriented, Model-Based GUI Testing and Reliability Assessment\u2014Approach and Case Study. Advances in Computers\u00a085, 277\u2013326 (2012)","journal-title":"Advances in Computers"},{"key":"6_CR7","doi-asserted-by":"publisher","first-page":"198","DOI":"10.1109\/SERE-C.2012.24","volume-title":"Proceedings of the 6th International Conference on Software Security and Reliability (SERE-C 2012)","author":"F. Belli","year":"2012","unstructured":"Belli, F., Beyaz\u0131t, M., Memon, A.: Testing is an Event-Centric Activity. In: Proceedings of the 6th International Conference on Software Security and Reliability (SERE-C 2012), pp. 198\u2013206. IEEE Computer Society, Washington, DC (2012)"},{"key":"6_CR8","first-page":"9","volume-title":"Proceedings of the 2nd Workshop on Mutation Analysis (MUTATION 2006)","author":"F. Belli","year":"2006","unstructured":"Belli, F., Budnik, C.J., Wong, W.E.: Basic operations for generating behavioral mutants. In: Proceedings of the 2nd Workshop on Mutation Analysis (MUTATION 2006), pp. 9\u201318. IEEE Computer Society, Washington, DC (2006)"},{"issue":"1","key":"6_CR9","doi-asserted-by":"publisher","first-page":"63","DOI":"10.1016\/0096-0551(85)90011-6","volume":"10","author":"T.A. Budd","year":"1985","unstructured":"Budd, T.A., Gopal, A.S.: Program Testing by Specification Mutation. Computer Languages\u00a010(1), 63\u201373 (1985)","journal-title":"Computer Languages"},{"key":"6_CR10","doi-asserted-by":"publisher","first-page":"192","DOI":"10.1109\/ICSTW.2009.37","volume-title":"International Conference on Software Testing, Verification and Validation Workshops (ICSTW 2009)","author":"B.J.M. Gr\u00fcn","year":"2009","unstructured":"Gr\u00fcn, B.J.M., Schuler, D., Zeller, A.: The Impact of Equivalent Mutants. In: International Conference on Software Testing, Verification and Validation Workshops (ICSTW 2009), pp. 192\u2013199. IEEE Computer Society, Washington, DC (2009)"},{"key":"6_CR11","unstructured":"Hollmann, A.: Model-Based Mutation Testing for Test Generation and Adequacy Analysis. Ph.D. Thesis, University of Paderborn, Paderborn (2011)"},{"key":"6_CR12","volume-title":"Introduction to Automata Theory, Languages and Computation","author":"J.E. Hopcroft","year":"2006","unstructured":"Hopcroft, J.E., Motwani, R., Ullman, J.D.: Introduction to Automata Theory, Languages and Computation, 3rd edn. Addison-Wesley, Boston (2006)","edition":"3"},{"issue":"3","key":"6_CR13","doi-asserted-by":"publisher","first-page":"331","DOI":"10.1145\/1072997.1073000","volume":"14","author":"P. Klint","year":"2005","unstructured":"Klint, P., L\u00e4mmel, R., Verhoef, C.: Toward an engineering discipline for grammarware. ACM Transactions on Software Engineering and Methodology\u00a014(3), 331\u2013380 (2005)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"6_CR14","first-page":"12","volume-title":"Proceedings of the 2nd Workshop on Mutation Analysis (MUTATION 2006)","author":"A.J. Offutt","year":"2006","unstructured":"Offutt, A.J., Ammann, P., Liu, L.: Mutation Testing Implements Grammar-Based Testing. In: Proceedings of the 2nd Workshop on Mutation Analysis (MUTATION 2006), pp. 12\u201321. IEEE Computer Society, Washington, DC (2006)"},{"key":"6_CR15","unstructured":"Utting, M., Legeard, B.: Practical Model-Based Testing: A Tools Approach. Morgan Kaufmann Publishers Inc., San Francisco (2006)"},{"issue":"4","key":"6_CR16","doi-asserted-by":"publisher","first-page":"366","DOI":"10.1145\/267580.267590","volume":"29","author":"H. Zhu","year":"1997","unstructured":"Zhu, H., Hall, P.A., May, J.H.: Software Unit Test Coverage and Adequacy. ACM Computing Surveys\u00a029(4), 366\u2013427 (1997)","journal-title":"ACM Computing Surveys"}],"container-title":["Lecture Notes in Computer Science","Implementation and Application of Automata"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-642-39274-0_6","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,15]],"date-time":"2019-05-15T18:42:13Z","timestamp":1557945733000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-642-39274-0_6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013]]},"ISBN":["9783642392733","9783642392740"],"references-count":16,"URL":"https:\/\/doi.org\/10.1007\/978-3-642-39274-0_6","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2013]]}}}