{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T12:12:23Z","timestamp":1763467943320,"version":"3.37.0"},"reference-count":22,"publisher":"Springer Science and Business Media LLC","issue":"2","license":[{"start":{"date-parts":[[2009,3,1]],"date-time":"2009-03-01T00:00:00Z","timestamp":1235865600000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["J. Comput. Sci. Technol."],"published-print":{"date-parts":[[2009,3]]},"DOI":"10.1007\/s11390-009-9224-5","type":"journal-article","created":{"date-parts":[[2009,4,8]],"date-time":"2009-04-08T18:56:37Z","timestamp":1239216997000},"page":"284-293","source":"Crossref","is-referenced-by-count":15,"title":["Test-Data Generation Guided by Static Defect Detection"],"prefix":"10.1007","volume":"24","author":[{"given":"Dan","family":"Hao","sequence":"first","affiliation":[]},{"given":"Lu","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Ming-Hao","family":"Liu","sequence":"additional","affiliation":[]},{"given":"He","family":"Li","sequence":"additional","affiliation":[]},{"given":"Jia-Su","family":"Sun","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2009,4,12]]},"reference":[{"doi-asserted-by":"crossref","unstructured":"Liu M, Gao Y, Shan J, Liu J, Zhang L, Sun J. An approach to test data generation for killing multiple mutants. In Proc. the 22nd IEEE International Conference on Software Maintenance, Philadelphia, USA, Sept. 24\u201327, 2006, pp.113\u2013122.","key":"9224_CR1","DOI":"10.1109\/ICSM.2006.13"},{"unstructured":"Beizer B. Software Testing Techniques. 2nd Edition, Van Nostrand Reinhold, 1990.","key":"9224_CR2"},{"key":"9224_CR3","volume-title":"The Art of Software Testing","author":"G Myers","year":"1979","unstructured":"Myers G. The Art of Software Testing. New York: John Wiley & Sons, USA, 1979."},{"unstructured":"Sommerville I. Software Engineering. 4th Edition, Addison-Wesley Publishing Company Inc., 1992.","key":"9224_CR4"},{"doi-asserted-by":"crossref","unstructured":"Stoerzer M, Ryder B G, Ren X, Tip F. Finding failure-inducing changes in Java programs using change classification. In Proc. the 14th ACM SIGSOFT Symposium on Foundations of Software Engineering, Portland, USA, Nov. 5\u201311, 2006, pp.57\u201368.","key":"9224_CR5","DOI":"10.1145\/1181775.1181783"},{"key":"9224_CR6","volume-title":"Software Engineering: A Practitioner\u2019s Approach","author":"R Pressman","year":"2001","unstructured":"Pressman R. Software Engineering: A Practitioner\u2019s Approach. Boston: McGraw Hill, 2001."},{"unstructured":"Edvardson K. A survey on automatic test data generation. In Proc. the 2nd Conference on Computer Science and Engineering, Link\u00f6ping, Sweden, October 1999, pp.21\u201328.","key":"9224_CR7"},{"doi-asserted-by":"crossref","unstructured":"Korel B, Al-Yami A M. Assertion-oriented automated test data generation. In Proc. the 18th International Conference on Software Engineering, Berlin, Germany, March 25\u201330, 1996, pp.71\u201380.","key":"9224_CR8","DOI":"10.1109\/ICSE.1996.493403"},{"unstructured":"http:\/\/tomcat.apache.org\/ .","key":"9224_CR9"},{"unstructured":"http:\/\/lucene.apache.org\/ .","key":"9224_CR10"},{"unstructured":"http:\/\/velocity.apache.org\/ .","key":"9224_CR11"},{"unstructured":"http:\/\/www.agitar.com\/developers\/junit_factory.html .","key":"9224_CR12"},{"doi-asserted-by":"crossref","unstructured":"Ayewah N, Pugh W, Morgenthaler J D, Penix J, Zhou Y. Evaluating static analysis defect warnings on production software. In Proc. the 7th ACM SIGPLAN-SIGSOFT Workshop on Program Analysis for Software Tools and Engineering, San Diego, California, USA, June 2007, pp.1\u20138.","key":"9224_CR13","DOI":"10.1145\/1251535.1251536"},{"unstructured":"http:\/\/pmd.sourceforge.net .","key":"9224_CR14"},{"unstructured":"http:\/\/artho.com\/jlint .","key":"9224_CR15"},{"doi-asserted-by":"crossref","unstructured":"Flanagan C, Leino K R M, Lillibridge M, Nelson G, Saxe J B, Stata R. Extended static checking for Java. In Proc. the 2002 ACM SIGPLAN Conference on Programming Language Design and Implementation, Berlin, Germany, June 17\u201319, 2002, pp.234\u2013245.","key":"9224_CR16","DOI":"10.1145\/512557.512558"},{"doi-asserted-by":"crossref","unstructured":"Rutar N, Almazan C B, Foster J S. A comparison of bug finding tools for Java. In Proc. the 15th International Symposium on Software Reliability Engineering, Saint-Malo, France, Nov. 2\u20135, 2004, pp.245\u2013256.","key":"9224_CR17","DOI":"10.1109\/ISSRE.2004.1"},{"issue":"1","key":"9224_CR18","first-page":"63","volume":"5","author":"R Ferguson","year":"1996","unstructured":"Ferguson R, Korel B. The chaining approach for software test data generation. IEEE Transactions on Software Engineering, January 1996, 5(1): 63\u201386.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"5","key":"9224_CR19","doi-asserted-by":"crossref","first-page":"387","DOI":"10.1007\/BF00995175","volume":"8","author":"E J Weyuker","year":"1979","unstructured":"Weyuker E J. The applicability of program schema results to programs. International Journal of Computer Information Sciences, 1979, 8(5): 387\u2013403.","journal-title":"International Journal of Computer Information Sciences"},{"issue":"4","key":"9224_CR20","doi-asserted-by":"crossref","first-page":"293","DOI":"10.1109\/TSE.1976.233835","volume":"SE-2","author":"C Ramamoorthy","year":"1976","unstructured":"Ramamoorthy C, Ho S, Chen W. On the automated generation of program test data. IEEE Transactions on Software Engineering, 1976, SE-2(4): 293\u2013300.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"9224_CR21","doi-asserted-by":"crossref","first-page":"223","DOI":"10.1109\/TSE.1976.233818","volume":"SE-(3)","author":"W Miller","year":"1976","unstructured":"Miller W, Spooner D L. Automatic generation of floating-point test data. IEEE Transactions on Software Engineering, 1976, SE-(3): 223\u2013226.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"12","key":"9224_CR22","doi-asserted-by":"crossref","first-page":"1187","DOI":"10.1016\/j.infsof.2006.06.007","volume":"48","author":"J J Li","year":"2006","unstructured":"Li J J, Weiss D, Yee D. Prioritize code for testing to improve code coverage of complex software. Information and Software Technology, 2006, 48(12): 1187\u20131198.","journal-title":"Information and Software Technology"}],"container-title":["Journal of Computer Science and Technology"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-009-9224-5.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11390-009-9224-5\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11390-009-9224-5","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,2,8]],"date-time":"2025-02-08T22:24:28Z","timestamp":1739053468000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11390-009-9224-5"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2009,3]]},"references-count":22,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2009,3]]}},"alternative-id":["9224"],"URL":"https:\/\/doi.org\/10.1007\/s11390-009-9224-5","relation":{},"ISSN":["1000-9000","1860-4749"],"issn-type":[{"type":"print","value":"1000-9000"},{"type":"electronic","value":"1860-4749"}],"subject":[],"published":{"date-parts":[[2009,3]]}}}