{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T03:51:16Z","timestamp":1760586676331},"reference-count":20,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2013,8,8]],"date-time":"2013-08-08T00:00:00Z","timestamp":1375920000000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Empir Software Eng"],"published-print":{"date-parts":[[2014,4]]},"DOI":"10.1007\/s10664-013-9267-7","type":"journal-article","created":{"date-parts":[[2013,8,7]],"date-time":"2013-08-07T05:47:56Z","timestamp":1375854476000},"page":"378-417","source":"Crossref","is-referenced-by-count":8,"title":["Effectiveness for detecting faults within and outside the scope of testing techniques: an independent replication"],"prefix":"10.1007","volume":"19","author":[{"given":"Cecilia","family":"Apa","sequence":"first","affiliation":[]},{"given":"Oscar","family":"Dieste","sequence":"additional","affiliation":[]},{"given":"Edison G.","family":"Espinosa G.","sequence":"additional","affiliation":[]},{"given":"Efra\u00edn R.","family":"Fonseca C.","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,8,8]]},"reference":[{"key":"9267_CR1","unstructured":"Basili VR (1992) Software modeling and measurement: the goal\/question\/metric paradigm. Tech. Rep. UMIACS TR-92-96, Departament of Computer Science, University of Maryland, College Park"},{"key":"9267_CR2","unstructured":"Basili VR, Selby RW (1985) Comparing the effectiveness of software testing strategies. Tech. Rep. TR-1501, Departament of Computer Science, University of Maryland, College Park"},{"key":"9267_CR3","doi-asserted-by":"crossref","first-page":"78","DOI":"10.1109\/TSE.1987.232881","volume":"SE-13","author":"VR Basili","year":"1987","unstructured":"Basili VR, Selby RW (1987) Comparing the effectiveness of software testing strategies. IEEE Trans Softw Eng SE-13:78\u201396","journal-title":"IEEE Trans Softw Eng"},{"key":"9267_CR4","doi-asserted-by":"crossref","first-page":"69","DOI":"10.2307\/2530496","volume":"36","author":"BW Brown","year":"1980","unstructured":"Brown BW (1980) The crossover experiment for clinical trials. Biometrics 36:69\u201370","journal-title":"Biometrics"},{"key":"9267_CR5","unstructured":"Carver JC (2010) Towards reporting guidelines for experimental replications: a proposal. In: Proceedings of the 1st international workshop on Replication in Empirical Software Engineering Research (RESER). Cape Town, South Africa, 4 May 2010"},{"key":"9267_CR6","unstructured":"G\u00f3mez O (2012) Tipolog\u00eda de Replicaciones para la S\u00edntesis de Experimentos en Ingenier\u00eda del Software. PhD thesis, Universidad Polit\u00e9cnica de Madrid"},{"key":"9267_CR7","doi-asserted-by":"crossref","unstructured":"G\u00f3mez O, Juristo N, Vegas S (2010) Replications types in experimental disciplines. In: Proceedings of the 2010 ACM-IEEE international symposium on empirical software engineering and measurement, no. 3. Bolzano-Bozen, Italy, pp 1\u201310","DOI":"10.1145\/1852786.1852790"},{"key":"9267_CR8","unstructured":"Graham JW, Schafer JL (1999) On the performance of multiple imputation for multivariate data with small sample size. In: Hoyle RH (ed) Statistical strategies for small sample research. Sage Publications, pp 1\u201329"},{"key":"9267_CR9","doi-asserted-by":"crossref","unstructured":"Juristo N, Vegas S (2003) Functional testing, structural testing and code reading: what fault do they each detect? In: Empirical Methods and Studies in Software Engineering Experiences from ESERNET, vol 2785(12), pp 208\u2013232","DOI":"10.1007\/978-3-540-45143-3_12"},{"key":"9267_CR10","unstructured":"Juristo N, Vegas S, Apa C (2013) Effectiveness for detecting faults within and outside the scope of testing techniques: a controlled experiment. Available at http:\/\/www.grise.upm.es\/reports.php . Accessed 15 May 2013"},{"key":"9267_CR11","doi-asserted-by":"crossref","unstructured":"Kamsties E, Lott C (1995) An empirical evaluation of three defect-detection techniques. In: Fifth European Software Engineering Conference (ESEC \u201995). Lecture Notes in Computer Science, vol 989, pp 362\u2013383","DOI":"10.1007\/3-540-60406-5_25"},{"issue":"1","key":"9267_CR12","doi-asserted-by":"crossref","first-page":"19","DOI":"10.1016\/S0895-4356(98)00138-3","volume":"52","author":"WN Kernan","year":"1999","unstructured":"Kernan WN, Viscoli CM, Makuch RW, Brass LM, Horwitz RI (1999) Stratified randomization for clinical trials. J Clin Epidemiol 52(1):19\u201326","journal-title":"J Clin Epidemiol"},{"key":"9267_CR13","doi-asserted-by":"crossref","unstructured":"Kitchenham B, Fry J, Linkman S (2003) The case against cross-over designs in software engineering. In: Eleventh annual international workshop on software technology and engineering practice, pp 65\u201367","DOI":"10.1109\/STEP.2003.32"},{"key":"9267_CR14","unstructured":"Meyers LS, Gamst G, Guarino AJ (2006) Applied multivariate reseach: design and interpretation. Sage Publication"},{"key":"9267_CR15","doi-asserted-by":"crossref","unstructured":"Myers GJ (1978) A controlled experiment in program testing and code walkthroughs\/inspections. In: Communications of the ACM, vol 21, pp 760\u2013768","DOI":"10.1145\/359588.359602"},{"key":"9267_CR16","doi-asserted-by":"crossref","unstructured":"Richy F, Ethgen O, Bruy\u00e8re O, Deceulaer F, Reginster J (2004) From sample size to effect-size: Small study effect investigation (ssei). In: The Internet Journal of Epidemiology, vol 1","DOI":"10.5580\/1ccb"},{"issue":"11","key":"9267_CR17","doi-asserted-by":"crossref","first-page":"763","DOI":"10.1016\/S0950-5849(97)00028-1","volume":"39","author":"M Roper","year":"1997","unstructured":"Roper M, Wood M, Miller J (1997) An empirical evaluation of defect detection techniques. Inform Softw Technol 39(11):763\u2013775","journal-title":"Inform Softw Technol"},{"key":"9267_CR18","doi-asserted-by":"crossref","unstructured":"Senn S (2002) Cross-over trials in clinical research, 2nd edn. Wiley","DOI":"10.1002\/0470854596"},{"key":"9267_CR19","doi-asserted-by":"crossref","first-page":"733","DOI":"10.1109\/TSE.2005.97","volume":"31","author":"DI Sj\u00f8berg","year":"2005","unstructured":"Sj\u00f8berg DI, Han\u00a0Hannay JE, Hansen O, Kampenes VB, Karahasanovic A, Liborg N-K, Rekdal AC (2005) A survey of controlled experiments in software engineering. IEEE Trans Softw Eng 31:733\u2013753","journal-title":"IEEE Trans Softw Eng"},{"key":"9267_CR20","doi-asserted-by":"crossref","unstructured":"Wood M, Roper M, Brooks A, Miller J (1997) Comparing and combining software defect detection techniques: a replicated empirical study. In: Proceedings of the 6th European software engineering conference held jointly with the 5th ACM SIGSOFT international symposium on foundations of software engineering. Zurich, Switzerland, pp 262\u2013277","DOI":"10.1145\/267896.267915"}],"container-title":["Empirical Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-013-9267-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s10664-013-9267-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s10664-013-9267-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,7,20]],"date-time":"2019-07-20T10:03:17Z","timestamp":1563616997000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s10664-013-9267-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,8,8]]},"references-count":20,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2014,4]]}},"alternative-id":["9267"],"URL":"https:\/\/doi.org\/10.1007\/s10664-013-9267-7","relation":{},"ISSN":["1382-3256","1573-7616"],"issn-type":[{"value":"1382-3256","type":"print"},{"value":"1573-7616","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,8,8]]}}}