{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T07:20:29Z","timestamp":1740122429979,"version":"3.37.3"},"reference-count":86,"publisher":"Springer Science and Business Media LLC","issue":"3","license":[{"start":{"date-parts":[[2018,3,17]],"date-time":"2018-03-17T00:00:00Z","timestamp":1521244800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"funder":[{"DOI":"10.13039\/501100002790","name":"Canadian Network for Research and Innovation in Machining Technology, Natural Sciences and Engineering Research Council of Canada","doi-asserted-by":"publisher","id":[{"id":"10.13039\/501100002790","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Autom Softw Eng"],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1007\/s10515-018-0232-y","type":"journal-article","created":{"date-parts":[[2018,3,17]],"date-time":"2018-03-17T10:55:36Z","timestamp":1521284136000},"page":"531-568","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Black-box tree test case generation through diversity"],"prefix":"10.1007","volume":"25","author":[{"given":"Ali","family":"Shahbazi","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Mahsa","family":"Panahandeh","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"James","family":"Miller","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2018,3,17]]},"reference":[{"issue":"6","key":"232_CR1","doi-asserted-by":"publisher","first-page":"742","DOI":"10.1109\/TSE.2009.52","volume":"36","author":"S Ali","year":"2010","unstructured":"Ali, S., Briand, L.C., Hemmati, H., Panesar-Walawege, R.K.: A systematic review of the application and empirical investigation of search-based test case generation. IEEE Trans. Softw. Eng. 36(6), 742\u2013762 (2010). https:\/\/doi.org\/10.1109\/TSE.2009.52","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"4","key":"232_CR2","doi-asserted-by":"publisher","first-page":"418","DOI":"10.1109\/12.2185","volume":"37","author":"PE Ammann","year":"1988","unstructured":"Ammann, P.E., Knight, J.C.: Data diversity: an approach to software fault tolerance. IEEE Trans. Comput. 37(4), 418\u2013425 (1988). https:\/\/doi.org\/10.1109\/12.2185","journal-title":"IEEE Trans. Comput."},{"issue":"8","key":"232_CR3","doi-asserted-by":"publisher","first-page":"1978","DOI":"10.1016\/j.jss.2013.02.061","volume":"86","author":"S Anand","year":"2013","unstructured":"Anand, S., et al.: An orchestrated survey of methodologies for automated software test case generation. J. Syst. Softw. 86(8), 1978\u20132001 (2013). https:\/\/doi.org\/10.1016\/j.jss.2013.02.061","journal-title":"J. Syst. Softw."},{"issue":"8","key":"232_CR4","doi-asserted-by":"publisher","first-page":"608","DOI":"10.1109\/TSE.2006.83","volume":"32","author":"JH Andrews","year":"2006","unstructured":"Andrews, J.H., Briand, L.C., Labiche, Y., Namin, A.S.: Using mutation analysis for assessing and comparing testing coverage criteria. IEEE Trans. Softw. Eng. 32(8), 608\u2013624 (2006). https:\/\/doi.org\/10.1109\/TSE.2006.83","journal-title":"IEEE Trans. Softw. Eng."},{"key":"232_CR5","doi-asserted-by":"publisher","unstructured":"Arcuri, A., Briand, L.: Adaptive random testing: An illusion of effectiveness? In: Proceedings of the 2011 International Symposium on Software Testing and Analysis. ISSTA\u201911. ACM, New York, pp. 265\u2013275 (2011). https:\/\/doi.org\/10.1145\/2001420.2001452","DOI":"10.1145\/2001420.2001452"},{"key":"232_CR6","doi-asserted-by":"publisher","unstructured":"Bai, X., Dong, W., Tsai, W.T., Chen, Y.: WSDL-based automatic test case generation for Web services testing. In: IEEE International Workshop Service-Oriented System Engineering, 2005. SOSE 2005, pp. 207\u2013212 (2005). https:\/\/doi.org\/10.1109\/SOSE.2005.43","DOI":"10.1109\/SOSE.2005.43"},{"key":"232_CR7","doi-asserted-by":"crossref","unstructured":"Barbosa, D., Mendelzon, A.O., Keenleyside, J., Lyons, K.: ToXgene: an extensible template-based data generator for XML. In: In WebDB, pp. 49\u201354 (2002)","DOI":"10.1145\/564691.564769"},{"key":"232_CR8","doi-asserted-by":"publisher","first-page":"87","DOI":"10.2307\/248704","volume":"1989","author":"JJ Baroudi","year":"1989","unstructured":"Baroudi, J.J., Orlikowski, W.J.: The problem of statistical power in MIS research. MIS Q. 1989, 87\u2013106 (1989)","journal-title":"MIS Q."},{"key":"232_CR9","doi-asserted-by":"publisher","unstructured":"Bartolini, C., Bertolino, A., Marchetti, E., Polini, A.: WS-TAXI: a WSDL-based testing tool for web services. In: International Conference on Software Testing Verification and Validation, 2009. ICST\u201909, pp. 326\u2013335 (2009). https:\/\/doi.org\/10.1109\/ICST.2009.28","DOI":"10.1109\/ICST.2009.28"},{"issue":"4","key":"232_CR11","first-page":"551","volume":"78","author":"F Benford","year":"1938","unstructured":"Benford, F.: The law of anomalous numbers. Proc. Am. Philos. Soc. 78(4), 551\u2013572 (1938)","journal-title":"Proc. Am. Philos. Soc."},{"issue":"2011","key":"232_CR12","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1214\/11-PS175","volume":"8","author":"A Berger","year":"2011","unstructured":"Berger, A., Hill, T.P.: A basic theory of Benford\u2019s Law. Probab. Surv. 8(2011), 1\u2013126 (2011a)","journal-title":"Probab. Surv."},{"issue":"1","key":"232_CR13","doi-asserted-by":"publisher","first-page":"85","DOI":"10.1007\/s00283-010-9182-3","volume":"33","author":"A Berger","year":"2011","unstructured":"Berger, A., Hill, T.P.: Benford\u2019s law strikes back: no simple explanation in sight for mathematical gem. Math. Intell. 33(1), 85\u201391 (2011b). https:\/\/doi.org\/10.1007\/s00283-010-9182-3","journal-title":"Math. Intell."},{"key":"232_CR14","doi-asserted-by":"publisher","unstructured":"Bertolino, A., Gao, J., Marchetti, E., Polini, A.: Automatic test data generation for XML schema-based partition testing. In: Proceedings of the 2nd International Workshop on Automation of Software Test. AST\u201907, pp. 4 . IEEE Computer Society, Washington, DC (2007a). https:\/\/doi.org\/10.1109\/AST.2007.6","DOI":"10.1109\/AST.2007.6"},{"key":"232_CR15","doi-asserted-by":"publisher","first-page":"114","DOI":"10.1007\/978-3-540-71876-5_8","volume-title":"Rapid Integration of Software Engineering Techniques. Lecture Notes in Computer Science","author":"A Bertolino","year":"2007","unstructured":"Bertolino, A., Gao, J., Marchetti, E., Polini, A.: Systematic generation of XML instances to test complex software applications. In: Guelfi, N., Buchs, D. (eds.) Rapid Integration of Software Engineering Techniques. Lecture Notes in Computer Science, pp. 114\u2013129. Springer, Berlin (2007). https:\/\/doi.org\/10.1007\/978-3-540-71876-5_8"},{"key":"232_CR16","doi-asserted-by":"publisher","unstructured":"Bertolino, A., Gao, J., Marchetti, E., Polini, A.: TAXI\u2014a tool for XML-based testing. In: Companion to the Proceedings of the 29th International Conference on Software Engineering. ICSE COMPANION\u201907, pp. 53\u201354. IEEE Computer Society, Washington, DC (2007c). https:\/\/doi.org\/10.1109\/ICSECOMPANION.2007.72","DOI":"10.1109\/ICSECOMPANION.2007.72"},{"key":"232_CR17","doi-asserted-by":"publisher","unstructured":"Bishop, P.G.: The variation of software survival time for different operational input profiles (or why you can wait a long time for a big bug to fail). In: The 23rd International Symposium on Fault-Tolerant Computing, 1993. FTCS-23. Digest of Papers, pp. 98\u2013107 (1993). https:\/\/doi.org\/10.1109\/FTCS.1993.627312","DOI":"10.1109\/FTCS.1993.627312"},{"key":"232_CR18","doi-asserted-by":"publisher","DOI":"10.21236\/ADA068118","volume-title":"Mutation Analysis","author":"TA Budd","year":"1979","unstructured":"Budd, T.A., Lipton, R.J., DeMillo, R.A., Sayward, F.G.: Mutation Analysis. Department of Computer Science, Yale University, New Haven (1979)"},{"key":"232_CR19","unstructured":"Buttler, D.: A short survey of document structure similarity algorithms. In: The 5th International Conference on Internet Computing (2004)"},{"issue":"12","key":"232_CR20","doi-asserted-by":"publisher","first-page":"775","DOI":"10.1016\/0950-5849(96)01103-2","volume":"38","author":"FT Chan","year":"1996","unstructured":"Chan, F.T., Chen, T.Y., Mak, I.K., Yu, Y.T.: Proportional sampling strategy: guidelines for software testing practitioners. Inf. Softw. Technol. 38(12), 775\u2013782 (1996). https:\/\/doi.org\/10.1016\/0950-5849(96)01103-2","journal-title":"Inf. Softw. Technol."},{"key":"232_CR21","doi-asserted-by":"crossref","first-page":"321","DOI":"10.1007\/3-540-47984-8_35","volume-title":"Software Quality\u2014ECSQ 2002. Lecture Notes in Computer Science","author":"K Chan","year":"2002","unstructured":"Chan, K., Chen, T., Towey, D.: Restricted Random Testing. In: Kontio, J., Conradi, R. (eds.) Software Quality\u2014ECSQ 2002. Lecture Notes in Computer Science, pp. 321\u2013330. Springer, Berlin (2002)"},{"issue":"1","key":"232_CR22","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1016\/S0164-1212(01)00028-0","volume":"58","author":"TY Chen","year":"2001","unstructured":"Chen, T.Y., Tse, T.H., Yu, Y.T.: Proportional sampling strategy: a compendium and some insights. J. Syst. Softw. 58(1), 65\u201381 (2001). https:\/\/doi.org\/10.1016\/S0164-1212(01)00028-0","journal-title":"J. Syst. Softw."},{"key":"232_CR23","first-page":"3156","volume-title":"Advances in Computer Science\u2014ASIAN 2004. Lecture Notes in Computer Science","author":"TY Chen","year":"2005","unstructured":"Chen, T.Y., Leung, H., Mak, I.K.: Adaptive Random Testing. In: Maher, M. (ed.) Advances in Computer Science\u2014ASIAN 2004. Lecture Notes in Computer Science, pp. 3156\u20133157. Springer, Berlin (2005)"},{"issue":"5","key":"232_CR24","doi-asserted-by":"publisher","first-page":"591","DOI":"10.1016\/j.jss.2005.05.029","volume":"79","author":"TY Chen","year":"2006","unstructured":"Chen, T.Y., Kuo, F.-C., Merkel, R.: On the statistical properties of testing effectiveness measures. J. Syst. Softw. 79(5), 591\u2013601 (2006). https:\/\/doi.org\/10.1016\/j.jss.2005.05.029","journal-title":"J. Syst. Softw."},{"issue":"1","key":"232_CR25","doi-asserted-by":"publisher","first-page":"226","DOI":"10.1109\/TR.2013.2240898","volume":"62","author":"TY Chen","year":"2013","unstructured":"Chen, T.Y., Kuo, F.-C., Liu, H., Wong, W.E.: Code coverage of adaptive random testing. IEEE Trans. Reliab. 62(1), 226\u2013237 (2013). https:\/\/doi.org\/10.1109\/TR.2013.2240898","journal-title":"IEEE Trans. Reliab."},{"key":"232_CR26","doi-asserted-by":"publisher","unstructured":"Ciupa, I., Leitner, A., Oriol, M., Meyer, B.: ARTOO: adaptive random testing for object-oriented software. In: ACM\/IEEE 30th International Conference on Software Engineering, 2008. ICSE\u201908, pp. 71\u201380 (2008). https:\/\/doi.org\/10.1145\/1368088.1368099","DOI":"10.1145\/1368088.1368099"},{"key":"232_CR27","volume-title":"Statistical Power Analysis for the Behavioral Sciences","author":"J Cohen","year":"1988","unstructured":"Cohen, J.: Statistical Power Analysis for the Behavioral Sciences. Lawrence Erlbaum, Mahwah (1988)"},{"issue":"1","key":"232_CR28","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1037\/0033-2909.112.1.155","volume":"112","author":"J Cohen","year":"1992","unstructured":"Cohen, J.: A power primer. Psychol. Bull. 112(1), 155\u2013159 (1992)","journal-title":"Psychol. Bull."},{"issue":"4","key":"232_CR29","doi-asserted-by":"publisher","first-page":"748","DOI":"10.1016\/j.is.2010.12.003","volume":"36","author":"R Connor","year":"2011","unstructured":"Connor, R., Simeoni, F., Iakovos, M., Moss, R.: A bounded distance metric for comparing tree structure. Inf. Syst. 36(4), 748\u2013764 (2011). https:\/\/doi.org\/10.1016\/j.is.2010.12.003","journal-title":"Inf. Syst."},{"key":"232_CR30","doi-asserted-by":"crossref","unstructured":"De Jong, K.A., Spears, W.M.: An analysis of the interacting roles of population size and crossover in genetic algorithms. In: Parallel Problem Solving from Nature, pp. 38\u201347. Springer (1991)","DOI":"10.1007\/BFb0029729"},{"issue":"2","key":"232_CR31","doi-asserted-by":"publisher","first-page":"182","DOI":"10.1109\/4235.996017","volume":"6","author":"K Deb","year":"2002","unstructured":"Deb, K., Pratap, A., Agarwal, S., Meyarivan, T.: A fast and elitist multiobjective genetic algorithm: NSGA-II. IEEE Trans. Evol. Comput. 6(2), 182\u2013197 (2002). https:\/\/doi.org\/10.1109\/4235.996017","journal-title":"IEEE Trans. Evol. Comput."},{"key":"232_CR32","doi-asserted-by":"publisher","unstructured":"Downey, A.B.: The structural cause of file size distributions. In: Proceedings of 9th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems, 2001, pp 361\u2013370 (2001). https:\/\/doi.org\/10.1109\/MASCOT.2001.948888","DOI":"10.1109\/MASCOT.2001.948888"},{"issue":"4","key":"232_CR33","doi-asserted-by":"publisher","first-page":"438","DOI":"10.1109\/TSE.1984.5010257","volume":"SE-10","author":"JW Duran","year":"1984","unstructured":"Duran, J.W., Ntafos, S.C.: An evaluation of random testing. IEEE Trans. Softw. Eng. SE-10(4), 438\u2013444 (1984). https:\/\/doi.org\/10.1109\/TSE.1984.5010257","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"1","key":"232_CR34","first-page":"17","volume":"5","author":"C Durtschi","year":"2004","unstructured":"Durtschi, C., Hillison, W., Pacini, C.: The effective use of Benford\u2019s law to assist in detecting fraud in accounting data. J. Forensic Acc. 5(1), 17\u201334 (2004)","journal-title":"J. Forensic Acc."},{"key":"232_CR35","doi-asserted-by":"publisher","unstructured":"Feldt, R., Poulding, S.: Finding test data with specific properties via metaheuristic search. In: 2013 IEEE 24th International Symposium on Software Reliability Engineering (ISSRE), pp. 350\u2013359 (2013). https:\/\/doi.org\/10.1109\/ISSRE.2013.6698888","DOI":"10.1109\/ISSRE.2013.6698888"},{"issue":"1\u20132","key":"232_CR36","doi-asserted-by":"publisher","first-page":"155","DOI":"10.1016\/0951-8320(91)90052-9","volume":"32","author":"GB Finelli","year":"1991","unstructured":"Finelli, G.B.: NASA software failure characterization experiments. Reliab. Eng. Syst. Saf. 32(1\u20132), 155\u2013169 (1991). https:\/\/doi.org\/10.1016\/0951-8320(91)90052-9","journal-title":"Reliab. Eng. Syst. Saf."},{"key":"232_CR37","unstructured":"Forrester, J.E., Miller, B.P.: An empirical study of the robustness of windows NT applications using random testing. In: Proceedings of the 4th conference on USENIX Windows Systems Symposium, pp. 59\u201368. USENIX Association, Berkeley, CA (2000)"},{"issue":"3","key":"232_CR38","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1016\/S0164-1212(96)00154-9","volume":"38","author":"PG Frankl","year":"1997","unstructured":"Frankl, P.G., Weiss, S.N., Hu, C.: All-uses versus mutation testing: an experimental comparison of effectiveness. Syst. Softw. 38(3), 235\u2013253 (1997). https:\/\/doi.org\/10.1016\/S0164-1212(96)00154-9","journal-title":"Syst. Softw."},{"key":"232_CR39","doi-asserted-by":"publisher","unstructured":"Fraser, G., Arcuri, A.: EvoSuite: automatic test suite generation for object-oriented software. In: Proceedings of the 19th ACM SIGSOFT Symposium and the 13th European Conference on Foundations of Software Engineering. ESEC\/FSE\u201911, pp. 416\u2013419. ACM, New York (2011). https:\/\/doi.org\/10.1145\/2025113.2025179","DOI":"10.1145\/2025113.2025179"},{"key":"232_CR40","doi-asserted-by":"crossref","unstructured":"Ganesh, V., Kiezun, A., Artzi, S., Guo, P.J., Hooimeijer, P., Ernst, M.: HAMPI: a string solver for testing, analysis and vulnerability detection. In: Computer Aided Verification, pp. 1\u201319 (2011)","DOI":"10.1007\/978-3-642-22110-1_1"},{"issue":"1","key":"232_CR41","doi-asserted-by":"publisher","first-page":"229","DOI":"10.1081\/SAC-120028442","volume":"33","author":"CL Geyer","year":"2004","unstructured":"Geyer, C.L., Williamson, P.P.: Detecting fraud in data sets using benford\u2019s law. Commun. Stat. Simul. Comput. 33(1), 229\u2013246 (2004). https:\/\/doi.org\/10.1081\/SAC-120028442","journal-title":"Commun. Stat. Simul. Comput."},{"key":"232_CR42","doi-asserted-by":"crossref","unstructured":"Godefroid, P. Random testing for security: blackbox vs. whitebox fuzzing. In: Proceedings of the 2nd international workshop on Random testing: co-located with the 22nd IEEE\/ACM International Conference on Automated Software Engineering (ASE 2007). RT\u201907, pp. 1. ACM, New York (2007)","DOI":"10.1145\/1292414.1292416"},{"issue":"6","key":"232_CR43","doi-asserted-by":"publisher","first-page":"213","DOI":"10.1145\/1064978.1065036","volume":"40","author":"P Godefroid","year":"2005","unstructured":"Godefroid, P., Klarlund, N., Sen, K.: DART: directed automated random testing. SIGPLAN Not. 40(6), 213\u2013223 (2005). https:\/\/doi.org\/10.1145\/1064978.1065036","journal-title":"SIGPLAN Not."},{"issue":"14","key":"232_CR44","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1016\/S0950-5849(01)00189-6","volume":"43","author":"M Harman","year":"2001","unstructured":"Harman, M., Jones, B.F.: Search-based software engineering. Inf. Softw. Technol. 43(14), 833\u2013839 (2001). https:\/\/doi.org\/10.1016\/S0950-5849(01)00189-6","journal-title":"Inf. Softw. Technol."},{"key":"232_CR45","doi-asserted-by":"publisher","unstructured":"Harman, M.: The current state and future of search based software engineering. In: 2007 Future of Software Engineering. FOSE\u201907, pp. 342\u2013357. IEEE Computer Society, Washington, DC (2007). https:\/\/doi.org\/10.1109\/FOSE.2007.29","DOI":"10.1109\/FOSE.2007.29"},{"key":"232_CR46","doi-asserted-by":"crossref","unstructured":"Havrikov, N., H\u00f6schele, M., Galeotti, J.P., Zeller, A.: XMLMate: evolutionary XML test generation. In: Proceedings of the 22nd ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 719\u2013722 (2014)","DOI":"10.1145\/2635868.2661666"},{"issue":"4","key":"232_CR47","doi-asserted-by":"publisher","first-page":"322","DOI":"10.1080\/00029890.1995.11990578","volume":"102","author":"TP Hill","year":"1995","unstructured":"Hill, T.P.: The significant-digit phenomenon. Am. Math. Mon. 102(4), 322\u2013327 (1995)","journal-title":"Am. Math. Mon."},{"issue":"1","key":"232_CR48","doi-asserted-by":"publisher","first-page":"137","DOI":"10.1016\/0304-3975(95)80029-9","volume":"143","author":"T Jiang","year":"1995","unstructured":"Jiang, T., Wang, L., Zhang, K.: Alignment of trees\u2014an alternative to tree edit. Theor. Comput. Sci. 143(1), 137\u2013148 (1995). https:\/\/doi.org\/10.1016\/0304-3975(95)80029-9","journal-title":"Theor. Comput. Sci."},{"key":"232_CR49","doi-asserted-by":"crossref","unstructured":"Just, R., Jalali, D., Inozemtseva, L., Ernst, M.D., Holmes, R., Fraser, G.: Are mutants a valid substitute for real faults in software testing. In: International Symposium on the Foundations of Software Engineering (FSE) (2014) (to appear)","DOI":"10.1145\/2635868.2635929"},{"key":"232_CR50","doi-asserted-by":"publisher","unstructured":"Lee, S.C., Offutt, J.: Generating test cases for XML-based Web component interactions using mutation analysis. In: Proceedings of 12th International Symposium on Software Reliability Engineering, 2001. ISSRE 2001, pp. 200\u2013209 (2001). https:\/\/doi.org\/10.1109\/ISSRE.2001.989474","DOI":"10.1109\/ISSRE.2001.989474"},{"key":"232_CR51","unstructured":"Lipner, S., Howard, M.: The Trustworthy Computing Security Development Lifecycle document (SDL) (2005). https:\/\/msdn.microsoft.com\/en-us\/library\/ms995349.aspx"},{"issue":"99","key":"232_CR52","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1109\/TSMC.2014.2318019","volume":"PP","author":"J Lv","year":"2014","unstructured":"Lv, J., Hu, H., Cai, K.Y., Chen, T.Y.: Adaptive and random partition software testing. IEEE Trans. Syst. Man. Cybern. Syst. PP(99), 1 (2014). https:\/\/doi.org\/10.1109\/TSMC.2014.2318019","journal-title":"IEEE Trans. Syst. Man. Cybern. Syst."},{"issue":"2","key":"232_CR53","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1002\/stvr.308","volume":"15","author":"Y-S Ma","year":"2005","unstructured":"Ma, Y.-S., Offutt, J., Kwon, Y.R.: MuJava: an automated class mutation system. Softw. Test. Verif. Reliab. 15(2), 97\u2013133 (2005). https:\/\/doi.org\/10.1002\/stvr.308","journal-title":"Softw. Test. Verif. Reliab."},{"key":"232_CR54","doi-asserted-by":"publisher","unstructured":"Mayer, J., Schneckenburger, C.: An empirical analysis and comparison of random testing techniques. In: Proceedings of the 2006 ACM\/IEEE International Symposium on Empirical Software Engineering. ISESE\u201906, pp. 105\u2013114. ACM, New York (2006). https:\/\/doi.org\/10.1145\/1159733.1159751","DOI":"10.1145\/1159733.1159751"},{"key":"232_CR55","doi-asserted-by":"publisher","first-page":"87","DOI":"10.1007\/978-3-642-00399-8_8","volume-title":"New Frontiers in Applied Data Mining. Lecture Notes in Computer Science","author":"A Muller-Molina","year":"2009","unstructured":"Muller-Molina, A., Hirata, K., Shinohara, T.: A tree distance function based on multi-sets. In: Chawla, S., et al. (eds.) New Frontiers in Applied Data Mining. Lecture Notes in Computer Science, pp. 87\u201398. Springer, Berlin (2009)"},{"issue":"1","key":"232_CR56","doi-asserted-by":"publisher","first-page":"39","DOI":"10.2307\/2369148","volume":"4","author":"S Newcomb","year":"1881","unstructured":"Newcomb, S.: Note on the frequency of use of the different digits in natural numbers. Am. J. Math. 4(1), 39\u201340 (1881)","journal-title":"Am. J. Math."},{"key":"232_CR57","unstructured":"Nierman, A., Jagadish, H.V.: Evaluating structural similarity in XML documents. In: Proceedings of 5th International Workshop on the Web and Databases (WebDB 2002), pp. 61\u201366, Madison, Wisconsin (2002)"},{"issue":"1997","key":"232_CR58","first-page":"52","volume":"16","author":"MJ Nigrini","year":"1997","unstructured":"Nigrini, M.J., Mittermaier, L.J.: The use of Benford\u2019s law as an aid in analytical procedures. Auditing 16(1997), 52\u201367 (1997)","journal-title":"Auditing"},{"issue":"5","key":"232_CR59","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1022494.1022529","volume":"29","author":"J Offutt","year":"2004","unstructured":"Offutt, J., Xu, W.: Generating test cases for web services using data perturbation. SIGSOFT Softw. Eng. Notes 29(5), 1\u201310 (2004). https:\/\/doi.org\/10.1145\/1022494.1022529","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"232_CR60","doi-asserted-by":"crossref","unstructured":"Pacheco, C., Lahiri, S.K., Ball, T.: Finding errors in .NET with feedback-directed random testing. In: Proceedings of the 2008 International Symposium on Software Testing and Analysis. ISSTA\u201908, pp. 87\u201396. ACM, New York (2008)","DOI":"10.1145\/1390630.1390643"},{"key":"232_CR61","doi-asserted-by":"publisher","unstructured":"Pacheco, C., Lahiri, S.K., Ernst, M.D., Ball, T.: Feedback-directed random test generation. In: 29th International Conference on Software Engineering, 2007. ICSE 2007, pp. 75\u201384 (2007). https:\/\/doi.org\/10.1109\/ICSE.2007.37","DOI":"10.1109\/ICSE.2007.37"},{"issue":"7","key":"232_CR62","doi-asserted-by":"publisher","first-page":"521","DOI":"10.1080\/00029890.1976.11994162","volume":"83","author":"RA Raimi","year":"1976","unstructured":"Raimi, R.A.: The first digit problem. Am. Math. Mon. 83(7), 521\u2013538 (1976)","journal-title":"Am. Math. Mon."},{"key":"232_CR63","doi-asserted-by":"publisher","unstructured":"Santelices, R., Harrold, M.J., Orso, A.: Precisely detecting runtime change interactions for evolving software. In: 2010 3rd International Conference on Software Testing, Verification and Validation (ICST), pp. 429\u2013438 (2010). https:\/\/doi.org\/10.1109\/ICST.2010.29","DOI":"10.1109\/ICST.2010.29"},{"key":"232_CR64","doi-asserted-by":"publisher","unstructured":"Santelices, R., Harrold, M.J.: Exploiting program dependencies for scalable multiple-path symbolic execution. In: Proceedings of the 19th International Symposium on Software Testing and Analysis. ISSTA, pp. 195\u2013206. ACM, New York (2010). https:\/\/doi.org\/10.1145\/1831708.1831733","DOI":"10.1145\/1831708.1831733"},{"key":"232_CR65","unstructured":"Scheemaecke, M.D.: NanoXML (2001). http:\/\/nanoxml.sourceforge.net\/orig"},{"key":"232_CR66","doi-asserted-by":"publisher","unstructured":"Schneckenburger, C., Mayer, J.: Towards the determination of typical failure patterns. In: 4th International Workshop on Software Quality Assurance: In Conjunction with the 6th ESEC\/FSE Joint Meeting. SOQUA\u201907, pp. 90\u201393. ACM, New York (2007). https:\/\/doi.org\/10.1145\/1295074.1295091","DOI":"10.1145\/1295074.1295091"},{"issue":"6","key":"232_CR67","doi-asserted-by":"publisher","first-page":"184","DOI":"10.1016\/0020-0190(77)90064-3","volume":"6","author":"SM Selkow","year":"1977","unstructured":"Selkow, S.M.: The tree-to-tree editing problem. Inf. Process. Lett. 6(6), 184\u2013186 (1977)","journal-title":"Inf. Process. Lett."},{"key":"232_CR68","doi-asserted-by":"publisher","first-page":"361","DOI":"10.1109\/TSE.2015.2487958","volume":"42","author":"A Shahbazi","year":"2015","unstructured":"Shahbazi, A.: Miller J (2015) Black-box string test case generation through a multi-objective optimization. IEEE Trans. Under Revis. Softw. Eng. 42, 361\u2013378 (2015)","journal-title":"IEEE Trans. Under Revis. Softw. Eng."},{"issue":"4","key":"232_CR69","doi-asserted-by":"publisher","first-page":"864","DOI":"10.1109\/TKDE.2013.53","volume":"26","author":"A Shahbazi","year":"2014","unstructured":"Shahbazi, A., Miller, J.: Extended subtree: a new similarity function for tree structured data. IEEE Trans. Knowl. Data Eng. 26(4), 864\u2013877 (2014). https:\/\/doi.org\/10.1109\/TKDE.2013.53","journal-title":"IEEE Trans. Knowl. Data Eng."},{"issue":"2","key":"232_CR70","doi-asserted-by":"publisher","first-page":"163","DOI":"10.1109\/TSE.2012.18","volume":"39","author":"A Shahbazi","year":"2013","unstructured":"Shahbazi, A., Tappenden, A.F., Miller, J.: Centroidal Voronoi tessellations\u2014a new approach to random testing. IEEE Trans. Softw. Eng. 39(2), 163\u2013183 (2013). https:\/\/doi.org\/10.1109\/TSE.2012.18","journal-title":"IEEE Trans. Softw. Eng."},{"key":"232_CR71","doi-asserted-by":"publisher","unstructured":"Sneed, H.M., Huang, S.: WSDLTest\u2014a tool for testing web services. In: 8th IEEE International Symposium on Web Site Evolution, 2006. WSE\u201906, pp. 14\u201321 (2006) https:\/\/doi.org\/10.1109\/WSE.2006.24","DOI":"10.1109\/WSE.2006.24"},{"key":"232_CR72","doi-asserted-by":"crossref","unstructured":"Spears, W.M.: Adapting crossover in evolutionary algorithms. In: Proceedings of the 4th Annual Conference on Evolutionary Programming, pp. 367\u2013384. MIT Press (1995)","DOI":"10.7551\/mitpress\/2887.003.0035"},{"key":"232_CR73","unstructured":"StAX.: Home of the original Stax (2006). http:\/\/stax.codehaus.org"},{"key":"232_CR74","doi-asserted-by":"crossref","first-page":"115","DOI":"10.1111\/j.2517-6161.1970.tb00821.x","volume":"1970","author":"MA Stephens","year":"1970","unstructured":"Stephens, M.A.: Use of the Kolmogorov\u2013Smirnov, Cramer\u2013Von Mises and related statistics without extensive tables. J. R. Stat. Soc. Ser. B 1970, 115\u2013122 (1970)","journal-title":"J. R. Stat. Soc. Ser. B"},{"issue":"3","key":"232_CR75","doi-asserted-by":"publisher","first-page":"422","DOI":"10.1145\/322139.322143","volume":"26","author":"K-C Tai","year":"1979","unstructured":"Tai, K.-C.: The tree-to-tree correction problem. J. ACM 26(3), 422\u2013433 (1979). https:\/\/doi.org\/10.1145\/322139.322143","journal-title":"J. ACM"},{"issue":"2","key":"232_CR76","doi-asserted-by":"publisher","first-page":"221","DOI":"10.1142\/S0218001488000157","volume":"2","author":"E Tanaka","year":"1988","unstructured":"Tanaka, E., Tanaka, K.: The tree-to-tree editing problem. Int. J. Pattern Recog. Artif. Intell. 2(2), 221\u2013240 (1988)","journal-title":"Int. J. Pattern Recog. Artif. Intell."},{"issue":"4","key":"232_CR77","doi-asserted-by":"publisher","first-page":"619","DOI":"10.1109\/TR.2009.2034288","volume":"58","author":"AF Tappenden","year":"2009","unstructured":"Tappenden, A.F., Miller, J.: A novel evolutionary approach for adaptive random testing. IEEE Trans. Reliab. 58(4), 619\u2013633 (2009). https:\/\/doi.org\/10.1109\/TR.2009.2034288","journal-title":"IEEE Trans. Reliab."},{"key":"232_CR78","doi-asserted-by":"crossref","unstructured":"Tappenden, A., Beatty, P., Miller, J., Geras, A., Smith, M. (2005) Agile security testing of web-based systems via HTTPUnit. In: Agile Conference, 2005. Proceedings. pp. 29\u201338. http:\/\/dx.doi.org\/10.1109\/ADC.2005.11","DOI":"10.1109\/ADC.2005.11"},{"key":"232_CR79","doi-asserted-by":"publisher","unstructured":"Valiente, G.: An efficient bottom-up distance between trees. In: Proceedings 8th International Symposium on String Processing and Information Retrieval, 2001. SPIRE 2001, pp. 212\u2013219 (2001). https:\/\/doi.org\/10.1109\/SPIRE.2001.989761","DOI":"10.1109\/SPIRE.2001.989761"},{"key":"232_CR80","doi-asserted-by":"publisher","unstructured":"Vanderveen, P., Janzen, M., Tappenden, A.F.: A web service test generator. In: 2014 IEEE International Conference on Software Maintenance and Evolution (ICSME), pp. 516\u2013520 (2014). https:\/\/doi.org\/10.1109\/ICSME.2014.85","DOI":"10.1109\/ICSME.2014.85"},{"issue":"1","key":"232_CR81","doi-asserted-by":"publisher","first-page":"127","DOI":"10.1016\/S0031-3203(99)00199-5","volume":"34","author":"JTL Wang","year":"2001","unstructured":"Wang, J.T.L., Zhang, K.: Finding similar consensus between trees: an algorithm and a distance hierarchy. Pattern Recognit. 34(1), 127\u2013137 (2001). https:\/\/doi.org\/10.1016\/S0031-3203(99)00199-5","journal-title":"Pattern Recognit."},{"issue":"3","key":"232_CR82","doi-asserted-by":"publisher","first-page":"247","DOI":"10.1109\/TSE.1980.234486","volume":"SE-6","author":"LJ White","year":"1980","unstructured":"White, L.J., Cohen, E.I.: A domain strategy for computer program testing. IEEE Trans. Softw. Eng. SE-6(3), 247\u2013257 (1980). https:\/\/doi.org\/10.1109\/TSE.1980.234486","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"232_CR83","doi-asserted-by":"publisher","first-page":"65","DOI":"10.1007\/BF00175354","volume":"4","author":"D Whitley","year":"1994","unstructured":"Whitley, D.: A genetic algorithm tutorial. Stat. Comput. 4(2), 65\u201385 (1994)","journal-title":"Stat. Comput."},{"key":"232_CR84","doi-asserted-by":"publisher","unstructured":"Xu, W., Offutt, J., Luo, J.: Testing Web services by XML perturbation. In: 16th IEEE International Symposium on Software Reliability Engineering, 2005. ISSRE 2005, vol. 10, pp.\u2013266 (2005). https:\/\/doi.org\/10.1109\/ISSRE.2005.44","DOI":"10.1109\/ISSRE.2005.44"},{"key":"232_CR85","doi-asserted-by":"publisher","unstructured":"Yang, R., Kalnis, P., Tung, A.K.H.: Similarity evaluation on tree-structured data. In: Proceedings of the 2005 ACM SIGMOD International Conference on Management of Data. SIGMOD\u201905, pp. 754\u2013765. ACM, New York (2005). https:\/\/doi.org\/10.1145\/1066157.1066243","DOI":"10.1145\/1066157.1066243"},{"key":"232_CR86","doi-asserted-by":"publisher","unstructured":"Yoshikawa, T., Shimura, K., Ozawa, T.: Random program generator for Java JIT compiler test system. In: Proceedings of 3rd International Conference on Quality Software, 2003, pp. 20\u201323 (2003). https:\/\/doi.org\/10.1109\/QSIC.2003.1319081","DOI":"10.1109\/QSIC.2003.1319081"},{"issue":"6","key":"232_CR87","doi-asserted-by":"publisher","first-page":"1245","DOI":"10.1137\/0218082","volume":"18","author":"K Zhang","year":"1989","unstructured":"Zhang, K.: Shasha D (1989) Simple fast algorithms for the editing distance between trees and related problems. SIAM J. Comput. 18(6), 1245\u20131262 (1989)","journal-title":"SIAM J. Comput."}],"container-title":["Automated Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10515-018-0232-y\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-018-0232-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10515-018-0232-y.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,7,2]],"date-time":"2024-07-02T02:53:02Z","timestamp":1719888782000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10515-018-0232-y"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,3,17]]},"references-count":86,"journal-issue":{"issue":"3","published-print":{"date-parts":[[2018,9]]}},"alternative-id":["232"],"URL":"https:\/\/doi.org\/10.1007\/s10515-018-0232-y","relation":{},"ISSN":["0928-8910","1573-7535"],"issn-type":[{"type":"print","value":"0928-8910"},{"type":"electronic","value":"1573-7535"}],"subject":[],"published":{"date-parts":[[2018,3,17]]},"assertion":[{"value":"20 January 2016","order":1,"name":"received","label":"Received","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"9 March 2018","order":2,"name":"accepted","label":"Accepted","group":{"name":"ArticleHistory","label":"Article History"}},{"value":"17 March 2018","order":3,"name":"first_online","label":"First Online","group":{"name":"ArticleHistory","label":"Article History"}}]}}