{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,8]],"date-time":"2025-11-08T17:50:19Z","timestamp":1762624219701,"version":"3.37.3"},"reference-count":63,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T00:00:00Z","timestamp":1568160000000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"},{"start":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T00:00:00Z","timestamp":1568160000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/4.0"}],"funder":[{"DOI":"10.13039\/100009567","name":"Budapest University of Technology and Economics","doi-asserted-by":"crossref","id":[{"id":"10.13039\/100009567","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Softw Tools Technol Transfer"],"published-print":{"date-parts":[[2020,2]]},"abstract":"<jats:title>Abstract<\/jats:title>\n<jats:p>When custom modeling tools are used for designing complex safety-critical systems (e.g., critical cyber-physical systems), the tools themselves need to be validated by systematic testing to prevent tool-specific bugs reaching the system. Testing of such modeling tools relies upon an automatically generated set of models as a test suite. While many software testing practices recommend that this test suite should be diverse, model diversity has not been studied systematically for graph models. In the paper, we propose different diversity metrics for models by generalizing and exploiting neighborhood and predicate shapes as abstraction. We evaluate such shape-based diversity metrics using various distance functions in the context of mutation testing of graph constraints and access policies for two separate industrial DSLs. Furthermore, we evaluate the quality (i.e., bug detection capability) of different (random and consistent) model generation techniques for mutation testing purposes.<\/jats:p>","DOI":"10.1007\/s10009-019-00530-6","type":"journal-article","created":{"date-parts":[[2019,9,11]],"date-time":"2019-09-11T15:02:56Z","timestamp":1568214176000},"page":"57-78","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":19,"title":["Diversity of graph models and graph generators in mutation testing"],"prefix":"10.1007","volume":"22","author":[{"given":"Oszk\u00e1r","family":"Semer\u00e1th","sequence":"first","affiliation":[]},{"given":"Rebeka","family":"Farkas","sequence":"additional","affiliation":[]},{"given":"G\u00e1bor","family":"Bergmann","sequence":"additional","affiliation":[]},{"given":"D\u00e1niel","family":"Varr\u00f3","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,9,11]]},"reference":[{"key":"530_CR1","doi-asserted-by":"crossref","unstructured":"Al-Refai, M., Cazzola, W., Ghosh. S.: A fuzzy logic based approach for model-based regression test selection. In: MoDELS, pp. 55\u201362. IEEE (2017)","DOI":"10.1109\/MODELS.2017.17"},{"key":"530_CR2","doi-asserted-by":"crossref","unstructured":"Almendros-Jim\u00e9nez, J.M., Becerra-Ter\u00f3n, A.: Automatic generation of ecore models for testing ATL transformations. In: MEDI, volume 9893 of LNCS, pp. 16\u201330. Springer (2016)","DOI":"10.1007\/978-3-319-45547-1_2"},{"key":"530_CR3","doi-asserted-by":"publisher","first-page":"653","DOI":"10.1002\/stvr.1532","volume":"25","author":"V Aranega","year":"2015","unstructured":"Aranega, V., Mottu, J., Etien, A., Degueule, T., Baudry, B., Dekeyser, J.: Towards an automation of the mutation analysis dedicated to model transformation. Softw. Test. Verif. Reliab. 25, 653\u2013683 (2015)","journal-title":"Softw. Test. Verif. Reliab."},{"key":"530_CR4","volume-title":"General Topology I: Basic Concepts and Constructions Dimension Theory","author":"A Arkhangel\u2019skii","year":"2012","unstructured":"Arkhangel\u2019skii, A., Fedorchuk, V.: General Topology I: Basic Concepts and Constructions Dimension Theory, vol. 17. Springer, Berlin (2012)"},{"key":"530_CR5","unstructured":"AtlanMod Team (Inria, Mines-Nantes, Lina). EMF random instantiator. \nhttps:\/\/github.com\/atlanmod\/mondo-atlzoo-benchmark\/tree\/master\/fr.inria.atlanmod.instantiator"},{"key":"530_CR6","doi-asserted-by":"crossref","unstructured":"Batot, E., Sahraoui, H.A.: A generic framework for model-set selection for the unification of testing and learning MDE tasks. In: MoDELS, pp. 374\u2013384. ACM (2016)","DOI":"10.1145\/2976767.2976785"},{"key":"530_CR7","doi-asserted-by":"crossref","unstructured":"Baudry, B., Monperrus, M., Mony, C., Chauvel, F., Fleurey, F., Clarke, S.: Diversify: ecology-inspired software evolution for diversity emergence. In: CSMR-WCRE, pp. 395\u2013398. IEEE (2014)","DOI":"10.1109\/CSMR-WCRE.2014.6747203"},{"key":"530_CR8","doi-asserted-by":"crossref","unstructured":"Bergmann, G., Debreceni, C., R\u00e1th, I., Varr\u00f3, D.: Query-based access control for secure collaborative modeling using bidirectional transformations. In: MoDELS, pp. 351\u2013361. ACM (2016)","DOI":"10.1145\/2976767.2976793"},{"key":"530_CR9","doi-asserted-by":"publisher","first-page":"355","DOI":"10.1016\/j.infsof.2014.07.003","volume":"58","author":"A Bertolino","year":"2015","unstructured":"Bertolino, A., Daoudagh, S., Kateb, D.E., Henard, C., Traon, Y.L., Lonetti, F., Marchetti, E., Mouelhi, T., Papadakis, M.: Similarity testing for access control. Inf. Softw. Technol. 58, 355\u2013372 (2015)","journal-title":"Inf. Softw. Technol."},{"key":"530_CR10","doi-asserted-by":"crossref","unstructured":"Bertolino, A., Daoudagh, S., Lonetti, F., Marchetti, E.: XACMUT: XACML 2.0 mutants generator. In: ICST Workshops, pp. 28\u201333. IEEE (2013)","DOI":"10.1109\/ICSTW.2013.11"},{"key":"530_CR11","unstructured":"Bordbar, B., Anastasakis, K.: UML2ALLOY: A tool for lightweight modelling of discrete event systems. In: IADIS AC, pp. 209\u2013216. IADIS (2005)"},{"key":"530_CR12","doi-asserted-by":"crossref","unstructured":"Brottier, E., Fleurey, F., Steel, J., Baudry, B., Traon, Y.L.: Metamodel-based test generation for model transformations: an algorithm and a tool. In: ISSRE, pp. 85\u201394. IEEE (2006)","DOI":"10.1109\/ISSRE.2006.27"},{"key":"530_CR13","doi-asserted-by":"crossref","unstructured":"B\u00fcttner, F., Egea, M., Cabot, J., Gogolla, M.: Verification of ATL transformations using transformation models and model finders. In: ICFEM, volume 7635 of LNCS, pp. 198\u2013213. Springer (2012)","DOI":"10.1007\/978-3-642-34281-3_16"},{"key":"530_CR14","doi-asserted-by":"crossref","unstructured":"Cabot, J., Claris\u00f3, R., Riera, D.: UMLtoCSP: a tool for the formal verification of UML\/OCL models using constraint programming. In: ASE, pp. 547\u2013548. ACM (2007)","DOI":"10.1145\/1321631.1321737"},{"key":"530_CR15","doi-asserted-by":"crossref","unstructured":"Cabot, J., Claris\u00f3, R., Riera, D.: Verification of UML\/OCL class diagrams using constraint programming. In: ICST workshops, pp. 73\u201380. IEEE (2008)","DOI":"10.1109\/ICSTW.2008.54"},{"key":"530_CR16","unstructured":"Darabos, A., Pataricza, A., Varr\u00f3, D.: Towards testing the implementation of graph transformations. In: GTVMT, ENTCS. Elsevier (2006)"},{"key":"530_CR17","doi-asserted-by":"crossref","unstructured":"de Moura, L., Bj\u00f8rner, N.: Z3: An efficient SMT solver. In: TACAS 2008, volume 4963 of LNCS, pp. 337\u2013340. Springer (2008)","DOI":"10.1007\/978-3-540-78800-3_24"},{"key":"530_CR18","doi-asserted-by":"publisher","first-page":"1737","DOI":"10.1007\/s10270-017-0631-8","volume":"18","author":"C Debreceni","year":"2017","unstructured":"Debreceni, C., Bergmann, G., R\u00e1th, I., Varr\u00f3, D.: Enforcing fine-grained access control for secure collaborative modelling using bidirectional transformations. Softw. Syst. Model. 18, 1737\u20131769 (2017)","journal-title":"Softw. Syst. Model."},{"issue":"4","key":"530_CR19","doi-asserted-by":"publisher","first-page":"479","DOI":"10.1007\/s10270-008-0095-y","volume":"8","author":"K Ehrig","year":"2009","unstructured":"Ehrig, K., K\u00fcster, J.M., Taentzer, G.: Generating instance models from meta models. Softw. Syst. Model. 8(4), 479\u2013500 (2009)","journal-title":"Softw. Syst. Model."},{"key":"530_CR20","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1007\/s10270-007-0074-8","volume":"8","author":"F Fleurey","year":"2007","unstructured":"Fleurey, F., Baudry, B., Muller, P., Le Traon, Y.: Towards dependable model transformations: qualifying input test data. Softw. Syst. Model. 8, 185\u2013203 (2007)","journal-title":"Softw. Syst. Model."},{"key":"530_CR21","unstructured":"Godik, S., T. M. (eds): eXtensible access control markup language (XACML) version 1.0. 02 (2003)"},{"key":"530_CR22","doi-asserted-by":"crossref","unstructured":"Gogolla, M., Vallecillo, A., Burgue\u00f1o, L., Hilken, F.: Employing classifying terms for testing model transformations. In: MoDELS, pp. 312\u2013321. IEEE (2015)","DOI":"10.1109\/MODELS.2015.7338262"},{"key":"530_CR23","doi-asserted-by":"crossref","unstructured":"G\u00f3mez, A., Mendialdua, X., Bergmann, G., Cabot, J., Debreceni, C., Garmendia, A., Kolovos, D.S., de Lara, J., Trujillo, S.: On the opportunities of scalable modeling technologies: an experience report on wind turbines control applications development. In: ECMFA, volume 10376 of LNCS, pp. 300\u2013315. Springer (2017)","DOI":"10.1007\/978-3-319-61482-3_18"},{"key":"530_CR24","doi-asserted-by":"crossref","unstructured":"Gonz\u00e1lez, C.A., Cabot, J.: Test data generation for model transformations combining partition and constraint analysis. In: ICMT, volume 8568 of LNCS, pp. 25\u201341. Springer (2014)","DOI":"10.1007\/978-3-319-08789-4_3"},{"issue":"2","key":"530_CR25","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1007\/s10270-013-0369-x","volume":"14","author":"E Guerra","year":"2015","unstructured":"Guerra, E., Soeken, M.: Specification-driven model transformation testing. Softw. Syst. Model. 14(2), 623\u2013644 (2015)","journal-title":"Softw. Syst. Model."},{"key":"530_CR26","doi-asserted-by":"publisher","first-page":"885","DOI":"10.1007\/s10270-016-0568-3","volume":"17","author":"F Hilken","year":"2018","unstructured":"Hilken, F., Gogolla, M., Burgue\u00f1o, L., Vallecillo, A.: Testing models and model transformations using classifying terms. Softw. Syst. Model. 17, 885\u2013912 (2018)","journal-title":"Softw. Syst. Model."},{"key":"530_CR27","doi-asserted-by":"crossref","unstructured":"Hu, C.T., Kuhn, D.R., Yaga, D.J.: Verification and test methods for access control policies\/models. Special Publication (NIST SP) 800-192, National Institute of Standards and Technology (2017)","DOI":"10.6028\/NIST.SP.800-192"},{"key":"530_CR28","unstructured":"Iyengar, S.S.: Metadata driven system for effecting extensible data interchange based on universal modeling language UML, meta object facility MOF and extensible markup language XML standards (2005)"},{"key":"530_CR29","doi-asserted-by":"publisher","first-page":"256","DOI":"10.1145\/505145.505149","volume":"2","author":"D Jackson","year":"2002","unstructured":"Jackson, D.: Alloy: a lightweight object modelling notation. ACM Trans. Softw. Eng. Methodol. 2, 256\u2013290 (2002)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"key":"530_CR30","doi-asserted-by":"crossref","unstructured":"Jackson, E.K., Levendovszky, T., Balasubramanian, D.: Reasoning about metamodeling with formal specifications and automatic proofs. In: MoDELS, volume 6981 of LNCS, pp. 653\u2013667. Springer (2011)","DOI":"10.1007\/978-3-642-24485-8_48"},{"key":"530_CR31","doi-asserted-by":"crossref","unstructured":"Jackson, E.K., Simko, G., Sztipanovits, J.: Diversely enumerating system-level architectures. In: EMSOFT, pp. 11:1\u201311:10. IEEE (2013)","DOI":"10.1109\/EMSOFT.2013.6658589"},{"issue":"5","key":"530_CR32","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/TSE.2010.62","volume":"37","author":"Y Jia","year":"2011","unstructured":"Jia, Y., Harman, M.: An analysis and survey of the development of mutation testing. IEEE Trans. Softw. Eng. 37(5), 649\u2013678 (2011)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"530_CR33","doi-asserted-by":"crossref","unstructured":"Kang, E., Jackson, E., Schulte, W.: An approach for effective design space exploration. In: Monterey Workshop, volume 6662 of LNCS, pp. 33\u201354. Springer (2010)","DOI":"10.1007\/978-3-642-21292-5_3"},{"key":"530_CR34","first-page":"59","volume":"7","author":"D Le Berre","year":"2010","unstructured":"Le Berre, D., Parrain, A.: The sat4j library, release 2.2. J. Satisf. Boolean Model. Comput. 7, 59\u201364 (2010)","journal-title":"J. Satisf. Boolean Model. Comput."},{"key":"530_CR35","doi-asserted-by":"crossref","unstructured":"Martin, E., Xie, T.: A fault model and mutation testing of access control policies. In: WWW, pp. 667\u2013676. ACM (2007)","DOI":"10.1145\/1242572.1242663"},{"key":"530_CR36","doi-asserted-by":"crossref","unstructured":"Micskei, Z., Szatm\u00e1ri, Z., Ol\u00e1h, J., Majzik, I.: A concept for testing robustness and safety of the context-aware behaviour of autonomous systems. In: KES-AMSTA, volume 7327 of LNCS, pp. 504\u2013513. Springer (2012)","DOI":"10.1007\/978-3-642-30947-2_55"},{"key":"530_CR37","doi-asserted-by":"crossref","unstructured":"Mottu, J., Baudry, B., Traon, Y.L.: Mutation analysis testing for model transformations. In: ECMDA-FA, volume 4066 of LNCS, pp. 376\u2013390. Springer (2006)","DOI":"10.1007\/11787044_28"},{"key":"530_CR38","doi-asserted-by":"crossref","unstructured":"Mottu, J., Sen, S., Cadavid, J.J., Baudry, B.: Discovering model transformation pre-conditions using automatically generated test models. In: ISSRE, pp. 88\u201399. IEEE (2015)","DOI":"10.1109\/ISSRE.2015.7381802"},{"key":"530_CR39","unstructured":"The Object Management Group. Object Constraint Language, v2.0 (2006)"},{"key":"530_CR40","doi-asserted-by":"crossref","unstructured":"Ratiu, D., Voelter, M.: Automated testing of DSL implementations: experiences from building mbeddr. In: AST@ICSE, pp. 15\u201321. ACM (2016)","DOI":"10.1145\/2896921.2896922"},{"key":"530_CR41","unstructured":"Reid, S.: An empirical analysis of equivalence partitioning, boundary value analysis and random testing. In: IEEE METRICS, pp. 64\u201373. IEEE (1997)"},{"key":"530_CR42","doi-asserted-by":"publisher","unstructured":"Rensink, A.: Isomorphism checking in GROOVE. Electron. Commun. Eur. Assoc. Softw. Sci. Technol. (2006). \nhttps:\/\/doi.org\/10.14279\/tuj.eceasst.1.77.84","DOI":"10.14279\/tuj.eceasst.1.77.84"},{"key":"530_CR43","doi-asserted-by":"publisher","first-page":"39","DOI":"10.1016\/j.entcs.2006.01.022","volume":"157","author":"A Rensink","year":"2006","unstructured":"Rensink, A., Distefano, D.: Abstract graph transformation. Electron. Notes Theor. Comput. Sci. 157, 39\u201359 (2006)","journal-title":"Electron. Notes Theor. Comput. Sci."},{"key":"530_CR44","doi-asserted-by":"crossref","unstructured":"Reps, T.W., Sagiv, S., Wilhelm, R.: Static program analysis via 3-valued logic. In: CAV, volume 3114 of LNCS, pp. 15\u201330. Springer (2004)","DOI":"10.1007\/978-3-540-27813-9_2"},{"key":"530_CR45","unstructured":"Scheidgen, M.: Generation of large random models for benchmarking. In: BigMDE@STAF, volume 1406 of CEUR Workshop Proceedings, pp. 1\u201310. CEUR-WS.org (2015)"},{"key":"530_CR46","doi-asserted-by":"crossref","unstructured":"Sch\u00f6nb\u00f6ck, J., Kappel, G., Wimmer, M., Kusel, A., Retschitzegger, W., Schwinger, W.: TETRABox\u2014a generic white-box testing framework for model transformations. In: APSEC, pp. 75\u201382. IEEE (2013)","DOI":"10.1109\/APSEC.2013.21"},{"key":"530_CR47","doi-asserted-by":"publisher","first-page":"357","DOI":"10.1007\/s10270-015-0485-x","volume":"16","author":"O Semer\u00e1th","year":"2017","unstructured":"Semer\u00e1th, O., Barta, \u00c1., Horv\u00e1th, \u00c1., Szatm\u00e1ri, Z., Varr\u00f3, D.: Formal validation of domain-specific languages with derived features and well-formedness constraints. Softw. Syst. Model. 16, 357\u2013392 (2017)","journal-title":"Softw. Syst. Model."},{"key":"530_CR48","doi-asserted-by":"crossref","unstructured":"Semer\u00e1th, O., Nagy, A.S., Varr\u00f3, D.: A graph solver for the automated generation of consistent domain-specific models. In: ICSE, pp. 969\u2013980. ACM (2018)","DOI":"10.1145\/3180155.3180186"},{"key":"530_CR49","doi-asserted-by":"crossref","unstructured":"Semer\u00e1th, O., Varr\u00f3, D.: Graph constraint evaluation over partial models by constraint rewriting. In: ICMT, volume 10374 of LNCS, pp. 138\u2013154. Springer (2017)","DOI":"10.1007\/978-3-319-61473-1_10"},{"key":"530_CR50","doi-asserted-by":"crossref","unstructured":"Semer\u00e1th, O., Varr\u00f3, D.: Iterative generation of diverse models for testing specifications of DSL tools. In: FASE, volume 10802 of LNCS, pp. 227\u2013245. Springer (2018)","DOI":"10.1007\/978-3-319-89363-1_13"},{"key":"530_CR51","doi-asserted-by":"crossref","unstructured":"Semer\u00e1th, O., V\u00f6r\u00f6s, A., Varr\u00f3, D.: Iterative and incremental model generation by logic solvers. In: FASE, volume 9633 of LNCS, pp. 87\u2013103. Springer (2016)","DOI":"10.1007\/978-3-662-49665-7_6"},{"key":"530_CR52","doi-asserted-by":"crossref","unstructured":"Sen, S., Baudry, B., Mottu, J.: Automatic model generation strategies for model transformation testing. In: ICMT, volume 5563 of LNCS, pp. 148\u2013164. Springer (2009)","DOI":"10.1007\/978-3-642-02408-5_11"},{"key":"530_CR53","unstructured":"The Eclipse Project. Eclipse modeling framework. \nwww.eclipse.org\/emf"},{"key":"530_CR54","unstructured":"The Eclipse Project. EMF DiffMerge. \nhttp:\/\/wiki.eclipse.org\/EMF_DiffMerge"},{"key":"530_CR55","unstructured":"The Eclipse Project. MDT Papyrus. \nhttp:\/\/www.eclipse.org\/modeling\/mdt\/papyrus\/"},{"key":"530_CR56","doi-asserted-by":"crossref","unstructured":"Torlak, E., Jackson, D.: Kodkod: a relational model finder. In: TACAS, volume 4424 of LNCS, pp. 632\u2013647. Springer (2007)","DOI":"10.1007\/978-3-540-71209-1_49"},{"key":"530_CR57","doi-asserted-by":"crossref","unstructured":"Torrini, P., Heckel, R., R\u00e1th, I.: Stochastic simulation of graph transformation systems. In: FASE, volume 6013 of LNCS, pp. 154\u2013157. Springer (2010)","DOI":"10.1007\/978-3-642-12029-9_11"},{"key":"530_CR58","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1016\/j.scico.2014.01.004","volume":"98","author":"Z Ujhelyi","year":"2015","unstructured":"Ujhelyi, Z., Bergmann, G., Heged\u00fcs, \u00c1., Horv\u00e1th, \u00c1., Izs\u00f3, B., R\u00e1th, I., Szatm\u00e1ri, Z., Varr\u00f3, D.: EMF-IncQuery: an integrated development environment for live model queries. Sci. Comput. Program. 98, 80\u201399 (2015)","journal-title":"Sci. Comput. Program."},{"key":"530_CR59","doi-asserted-by":"crossref","unstructured":"Vallecillo, A., Gogolla, M., Burgue\u00f1o, L., Wimmer, M., Hamann, L.: Formal specification and testing of model transformations. In: SFM, volume 7320 of LNCS, pp. 399\u2013437. Springer (2012)","DOI":"10.1007\/978-3-642-30982-3_11"},{"key":"530_CR60","doi-asserted-by":"publisher","first-page":"214","DOI":"10.1016\/j.scico.2007.05.004","volume":"68","author":"D Varr\u00f3","year":"2007","unstructured":"Varr\u00f3, D., Balogh, A.: The model transformation language of the VIATRA2 framework. Sci. Comput. Program. 68, 214\u2013234 (2007)","journal-title":"Sci. Comput. Program."},{"key":"530_CR61","doi-asserted-by":"crossref","unstructured":"Varr\u00f3, D., Semer\u00e1th, O., Sz\u00e1rnyas, G., Horv\u00e1th, \u00c1.: Towards the automated generation of consistent, diverse, scalable and realistic graph models. In: Graph Transformation, Specifications, and Nets, volume 10800 of LNCS, pp. 285\u2013312. Springer (2018)","DOI":"10.1007\/978-3-319-75396-6_16"},{"key":"530_CR62","doi-asserted-by":"crossref","unstructured":"Wang, J., Kim, S., Carrington, D.A.: Verifying metamodel coverage of model transformations. In: ASWEC, pp. 270\u2013282. IEEE (2006)","DOI":"10.1109\/ASWEC.2006.55"},{"key":"530_CR63","unstructured":"Yakindu Statechart Tools. Yakindu. \nhttp:\/\/statecharts.org\/"}],"container-title":["International Journal on Software Tools for Technology Transfer"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10009-019-00530-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10009-019-00530-6\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10009-019-00530-6.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,9,10]],"date-time":"2020-09-10T17:35:01Z","timestamp":1599759301000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10009-019-00530-6"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,9,11]]},"references-count":63,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2020,2]]}},"alternative-id":["530"],"URL":"https:\/\/doi.org\/10.1007\/s10009-019-00530-6","relation":{},"ISSN":["1433-2779","1433-2787"],"issn-type":[{"type":"print","value":"1433-2779"},{"type":"electronic","value":"1433-2787"}],"subject":[],"published":{"date-parts":[[2019,9,11]]},"assertion":[{"value":"11 September 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}