{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,12]],"date-time":"2025-06-12T04:46:30Z","timestamp":1749703590550},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2007,2,21]],"date-time":"2007-02-21T00:00:00Z","timestamp":1172016000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2007,7,13]]},"DOI":"10.1007\/s10664-006-9034-0","type":"journal-article","created":{"date-parts":[[2007,2,20]],"date-time":"2007-02-20T11:15:10Z","timestamp":1171970110000},"page":"417-444","source":"Crossref","is-referenced-by-count":9,"title":["Experimenting with software testbeds for evaluating new technologies"],"prefix":"10.1007","volume":"12","author":[{"given":"Mikael","family":"Lindvall","sequence":"first","affiliation":[]},{"given":"Ioana","family":"Rus","sequence":"additional","affiliation":[]},{"given":"Paolo","family":"Donzelli","sequence":"additional","affiliation":[]},{"given":"Atif","family":"Memon","sequence":"additional","affiliation":[]},{"given":"Marvin","family":"Zelkowitz","sequence":"additional","affiliation":[]},{"given":"Aysu","family":"Betin-Can","sequence":"additional","affiliation":[]},{"given":"Tevfik","family":"Bultan","sequence":"additional","affiliation":[]},{"given":"Chris","family":"Ackermann","sequence":"additional","affiliation":[]},{"given":"Bettina","family":"Anders","sequence":"additional","affiliation":[]},{"given":"Sima","family":"Asgari","sequence":"additional","affiliation":[]},{"given":"Victor","family":"Basili","sequence":"additional","affiliation":[]},{"given":"Lorin","family":"Hochstein","sequence":"additional","affiliation":[]},{"given":"J\u00f6rg","family":"Fellmann","sequence":"additional","affiliation":[]},{"given":"Forrest","family":"Shull","sequence":"additional","affiliation":[]},{"given":"Roseanne","family":"Tvedt","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Pech","sequence":"additional","affiliation":[]},{"given":"Daniel","family":"Hirschbach","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2007,2,21]]},"reference":[{"key":"9034_CR1","doi-asserted-by":"crossref","unstructured":"Asgari S, Basili V, Costa P, Donzelli P, Hochstein L, Lindvall M, Rus I, Shull I, Tvedt R, Zelkowitz M (2004) Empirical-based estimation of the effect on software dependability of a technique for architecture conformance verification, ICSE\/DSN 2004 twin workshop on architecting dependable systems (WADS 2004), Edinburgh, Scotland","DOI":"10.1049\/ic:20040493"},{"issue":"6","key":"9034_CR2","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1109\/MS.2004.30","volume":"21","author":"V Basili","year":"2004","unstructured":"Basili V, Donzelli P, Asgari S (2004) A unified model of dependability: capturing dependability in context. IEEE Softw 21(6):19\u201325","journal-title":"IEEE Softw"},{"key":"9034_CR3","doi-asserted-by":"crossref","unstructured":"Bhansali S, Nii HP (1992) Software design by reusing architectures. Proceedings of the Seventh Knowledge-Based Software Engineering Conference, McLean, Virginia, USA, pp 100\u2013109","DOI":"10.1109\/KBSE.1992.252904"},{"key":"9034_CR4","doi-asserted-by":"crossref","unstructured":"BetinCan A, Bultan T, Lindvall M, Lux B, Topp S (2005) Application of design for verification with concurrency controllers to air traffic control software. In: Proceedings of 20th IEEE\/ACM international conference on automated software engineering, pp 14\u201323","DOI":"10.1145\/1101908.1101914"},{"key":"9034_CR5","unstructured":"Boehm B, Huang L, Jain A, Madachy R (2003) The nature of information system dependability\u2014a stakeholder\/value approach. USC Technical Report"},{"key":"9034_CR6","unstructured":"Brat G, Havelund K, Park S, Visser W (2000) Java PathFinder\u2014a second generation of a Java model checker. In: Proceedings of the workshop on advances in verification, July 2000, Chicago, USA"},{"key":"9034_CR7","volume-title":"The mythical man-month","author":"FP Brooks","year":"1995","unstructured":"Brooks FP (1995) The mythical man-month. Addison Wesley, Reading, MA"},{"key":"9034_CR8","doi-asserted-by":"crossref","unstructured":"Bultan T, Yavuz-Kahveci T (2001) Action language verifier. In: Proc. 16th IEEE international conference on automated software engineering, San Diego, USA, 382\u2013386","DOI":"10.1109\/ASE.2001.989834"},{"key":"9034_CR9","unstructured":"Dennis G (2003) TSAFE: building a trusted computing base for air traffic control software. Masters Thesis, Computer Science Dept., Massachusetts Inst. Technology"},{"issue":"1","key":"9034_CR10","doi-asserted-by":"crossref","first-page":"107","DOI":"10.1016\/j.jss.2005.03.011","volume":"79","author":"P Donzelli","year":"2006","unstructured":"Donzelli P, Basili V (2006) A practical framework for eliciting and modeling system dependability requirements: experience from the NASA high dependability computing project. J Syst Softw 79(1):107\u2013119","journal-title":"J Syst Softw"},{"key":"9034_CR11","unstructured":"Erzberger H (2001) The automated airspace concept. In: 4th USA\/Europe air traffic management R&D seminar, Santa Fe, New-Mexico, USA"},{"key":"9034_CR12","unstructured":"Erzberger H (2004) Transforming the NAS: the next generation air traffic control system. In: 24th International Congress of the Aeronautical Sciences, Yokohama, Japan"},{"key":"9034_CR13","unstructured":"Godfrey MW, Lee EHS (2000) Secrets from the Monster: extracting Mozilla\u2019s software architecture. In: Proc 2nd symp. constructing software engineering tools (CoSET00), Limerick, Ireland, June. ACM Press, New York"},{"key":"9034_CR14","unstructured":"Huynh D, Zelkowitz MV, Basili VR, Rus I (2003) Modeling dependability for a diverse set of stakeholders (Fast abstracts), Distributed Systems and Networks, San Francisco, CA, June, B6\u2013B7"},{"key":"9034_CR15","unstructured":"International Federation for Information Processing (IFIP WG-10.4) http:\/\/www.dependability.org"},{"key":"9034_CR16","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-7091-9170-5","volume-title":"Dependability: basic concepts and terminology, dependable computing and fault tolerance","author":"J-C Laprie","year":"1992","unstructured":"Laprie J-C (1992) Dependability: basic concepts and terminology, dependable computing and fault tolerance. Springer-Verlag, Vienna, Austria"},{"key":"9034_CR17","doi-asserted-by":"crossref","unstructured":"Lehman MM (1996) Laws of software evolution revisited. In: European Workshop Software Process Technology, Nancy, France, October 1996. Springer, Berlin Heidelberg New York, pp 108\u2013124","DOI":"10.1007\/BFb0017737"},{"key":"9034_CR18","volume-title":"Program evolution: processes of software change","author":"MM Lehman","year":"1985","unstructured":"Lehman MM, Belady LA (1985) Program evolution: processes of software change. Harcourt Brace Jovanovich, London"},{"key":"9034_CR19","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1007\/s11334-005-0007-z","volume":"1","author":"M Lindvall","year":"2005","unstructured":"Lindvall M, Rus I, Shull F, Zelkowitz MV, Donzelli P, Memon A, Basili VR, Costa P, Tvedt RT, Hochstein L, Asgari S, Ackermann C, Pech D (2005) An evolutionary testbed for software technology evaluation. NASA Journal of Innovations in Systems and Software Engineering 1:3\u201311","journal-title":"NASA Journal of Innovations in Systems and Software Engineering"},{"key":"9034_CR20","doi-asserted-by":"crossref","unstructured":"Memon A, Soffa M, Pollack ME (2001) Coverage criteria for GUI testing. 8th European software engineering conference (ESEC) and 9th ACM SIGSOFT international symposium on the foundations of software engineering (FSE-9). Vienna University of Technology, Austria, pp 256\u2013267","DOI":"10.1145\/503209.503244"},{"key":"9034_CR21","doi-asserted-by":"crossref","unstructured":"Memon A, Banerjee I, Nagarajan A (2003) What test oracle should I use for effective GUI testing? In: IEEE international conference on automated software engineering (ASE\u201903), Montreal, Canada, pp 164\u2013173","DOI":"10.1109\/ASE.2003.1240304"},{"key":"9034_CR22","doi-asserted-by":"crossref","first-page":"27","DOI":"10.1002\/smr.305","volume":"17","author":"A Memon","year":"2005","unstructured":"Memon A, Nagarajan A, Xie Q (2005) Automating regression testing for evolving GUI software. Journal of Software Maintenance and Evolution: Research and Practice 17:27\u201364","journal-title":"Journal of Software Maintenance and Evolution: Research and Practice"},{"key":"9034_CR23","unstructured":"Miodonski P, Forster T, Knodel J, Lindvall M, Muthig D (2004) Evaluation of software architechtures with eclipse, Institute for Empirical Software Engineering (IESE)-Report 107.04\/E, Kaiserslautern, Germany"},{"key":"9034_CR24","unstructured":"Randel B (1998) Dependability, a unifying concept. In: Proceedings of computer security, dependability and assurance: from needs to solutions, Williamsburg, VA. IEEE, Computer Society Press, Los Alamitos, CA, pp 16\u201325"},{"key":"9034_CR25","unstructured":"Rus I, Basili V, Zelkowitz M, Boehm B (2002) Empirical evaluation techniques and methods used for achieving and assessing high dependability. Workshop on dependability benchmarking, The international conference of dependable systems & networks , June, Washington , DC, pp F19\u2013F20"},{"key":"9034_CR26","doi-asserted-by":"crossref","unstructured":"Tvedt RT, R Costa P, Lindvall M (2002) Does the code match the design? A process for architecture evaluation. In: IEEE, Proceedings of the international conference on software maintenance. Montreal, Canada, pp 393\u2013401","DOI":"10.1109\/ICSM.2002.1167796"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-006-9034-0.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-006-9034-0\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-006-9034-0","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,30]],"date-time":"2019-05-30T17:15:08Z","timestamp":1559236508000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-006-9034-0"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2007,2,21]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2007,7,13]]}},"alternative-id":["9034"],"URL":"https:\/\/doi.org\/10.1007\/s10664-006-9034-0","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2007,2,21]]}}}