{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,1]],"date-time":"2025-11-01T09:07:18Z","timestamp":1761988038555,"version":"3.32.0"},"reference-count":13,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2005,3,1]],"date-time":"2005-03-01T00:00:00Z","timestamp":1109635200000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J Comput Sci Technol"],"published-print":{"date-parts":[[2005,3]]},"DOI":"10.1007\/s11390-005-0250-7","type":"journal-article","created":{"date-parts":[[2005,4,19]],"date-time":"2005-04-19T08:09:59Z","timestamp":1113898199000},"page":"250-257","source":"Crossref","is-referenced-by-count":3,"title":["Analysis of Software Test Item Generation?? Comparison Between High Skilled and Low Skilled Engineers"],"prefix":"10.1007","volume":"20","author":[{"given":"Masayuki","family":"Hirayama","sequence":"first","affiliation":[]},{"given":"Osamu","family":"Mizuno","sequence":"additional","affiliation":[]},{"given":"Tohru","family":"Kikuno","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"CR1","unstructured":"Broekman B, Notenboom E. Testing Embedded Software. Addison-Wesley, 2003."},{"key":"CR2","unstructured":"Marks D M. Testing Very Big Systems. McGraw-Hill, 1992."},{"key":"CR3","unstructured":"Musa J D. Software Reliability Engineering: Faster Development and Testing. McGraw-Hill, 1998."},{"key":"CR4","unstructured":"Kim Y C et al. An adaptive use case design driven testing. In Proc. 15th ISCA, 2000. pp.165?168."},{"key":"CR5","unstructured":"Leveson N G. Safeware: System Safety and Computers. Addison-Wesley, MA, 1995."},{"key":"CR6","doi-asserted-by":"crossref","unstructured":"Knight J C, Nakano L G. Software test techniques for system fault-tree analysis. In Proc. SAFECOMP 97, 1997, pp.369?380.","DOI":"10.1007\/978-1-4471-0997-6_29"},{"issue":"2","key":"CR7","doi-asserted-by":"crossref","first-page":"111","DOI":"10.1016\/S0951-8320(98)00028-3","volume":"63","author":"M Cepin","year":"1999","unstructured":"Cepin M, Mavko B. Fault tree developed by an object-based method improves requirements specification for safety-related system. Journal of Reliability Engineering and System Safety, 1999, 63(2): 111?125.","journal-title":"Journal of Reliability Engineering and System Safety"},{"key":"CR8","doi-asserted-by":"crossref","unstructured":"Dugan J B et al. Developing a high-quality software tool for fault tree analysis. In Proc. 8th ISSRE, 1, 1999, pp.222?231.","DOI":"10.1109\/ISSRE.1999.809327"},{"key":"CR9","doi-asserted-by":"crossref","unstructured":"Voas J M, Miller K W. An automated code-based fault-tree mitigation technique. In Proc. 14th SAFECOMP, 1995, pp.59?72.","DOI":"10.1007\/978-1-4471-3054-3_5"},{"key":"CR10","unstructured":"Tamura K, Okayasu J, Hirayama M. A software testing method based on hazard analysis and planning. In Proc. 9th International Symposium on Software Reliability Engineering, 1998, pp.103?110."},{"key":"CR11","unstructured":"Eriksson H E, Penker M. UML Toolkit. John-Wiley & Sons, 1997."},{"key":"CR12","doi-asserted-by":"crossref","unstructured":"Reese J D, Leveson N G. Software deviation analysis. In Proc. 19th International Conference on Software Engineering, 1997, pp.250?260.","DOI":"10.1145\/253228.253281"},{"key":"CR13","doi-asserted-by":"crossref","unstructured":"Tsuchiya T, Terada H, Kim E M, Kikuno T. Deviation of safety requirements for safety analysis of object-oriented design specification. In Proc. 21st Annual International Computer Software & Applications Conference, 1997, pp.252?255.","DOI":"10.1109\/CMPSAC.1997.624809"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-005-0250-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-005-0250-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-005-0250-7","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,12,31]],"date-time":"2024-12-31T19:51:40Z","timestamp":1735674700000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-005-0250-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2005,3]]},"references-count":13,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2005,3]]}},"alternative-id":["250"],"URL":"https:\/\/doi.org\/10.1007\/s11390-005-0250-7","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"type":"print","value":"1000-9000"},{"type":"electronic","value":"1860-4749"}],"subject":[],"published":{"date-parts":[[2005,3]]}}}