{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,8,12]],"date-time":"2025-08-12T21:28:38Z","timestamp":1755034118898},"reference-count":36,"publisher":"Springer Science and Business Media LLC","issue":"6","license":[{"start":{"date-parts":[[2013,9,28]],"date-time":"2013-09-28T00:00:00Z","timestamp":1380326400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Front. Comput. Sci."],"published-print":{"date-parts":[[2013,12]]},"DOI":"10.1007\/s11704-013-3024-3","type":"journal-article","created":{"date-parts":[[2013,9,28]],"date-time":"2013-09-28T03:42:42Z","timestamp":1380339762000},"page":"822-837","source":"Crossref","is-referenced-by-count":16,"title":["Generating test data for both path coverage and fault detection using genetic algorithms"],"prefix":"10.1007","volume":"7","author":[{"given":"Dunwei","family":"Gong","sequence":"first","affiliation":[]},{"given":"Yan","family":"Zhang","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2013,9,28]]},"reference":[{"key":"3024_CR1","volume-title":"The art of software testing","author":"G Myers","year":"1979","unstructured":"Myers G. The art of software testing. New York: Wiley, 1979"},{"key":"3024_CR2","volume-title":"Software testing techniques","author":"B Beizer","year":"1990","unstructured":"Beizer B. Software testing techniques. New York: Van Nostrand Rheinhold, 1990"},{"key":"3024_CR3","volume-title":"The economic impacts of inadequate infrastructure for software testing","author":"G Tassey","year":"2002","unstructured":"Tassey G. The economic impacts of inadequate infrastructure for software testing. Gaithersburg: National Institute of Standards and Technology, 2002"},{"key":"3024_CR4","first-page":"111","volume-title":"Proceedings of IEEE International Conference on Software Testing Verification and Validation Workshops, ICST\u2019 09","author":"H Gross","year":"2009","unstructured":"Gross H, Kruse P M, Wegener J. Evolutionary white-box software test with the evotest framework, a progress report. In: Proceedings of IEEE International Conference on Software Testing Verification and Validation Workshops, ICST\u2019 09. 2009, 111\u2013120"},{"issue":"8","key":"3024_CR5","doi-asserted-by":"crossref","first-page":"870","DOI":"10.1109\/32.57624","volume":"16","author":"B Korel","year":"1990","unstructured":"Korel B. Automated software test data generation. IEEE Transactions on Software Engineering, 1990, 16(8): 870\u2013879","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"11","key":"3024_CR6","doi-asserted-by":"crossref","first-page":"1883","DOI":"10.1016\/j.jss.2007.12.809","volume":"81","author":"A A Sofokleous","year":"2008","unstructured":"Sofokleous A A, Andreou A S. Automatic, evolutionary test data generation for dynamic software testing. The Journal of Systems and Software, 2008, 81(11): 1883\u20131898","journal-title":"The Journal of Systems and Software"},{"issue":"6","key":"3024_CR7","first-page":"1299","volume":"38","author":"D W Gong","year":"2010","unstructured":"Gong D W, Zhang Y. Novel evolutionary generation approach of test data for multiple paths. Acta Electronica Sinica, 2010, 38(6): 1299\u20131304","journal-title":"Acta Electronica Sinica"},{"issue":"12","key":"3024_CR8","doi-asserted-by":"crossref","first-page":"2222","DOI":"10.1016\/j.jss.2011.06.028","volume":"84","author":"D W Gong","year":"2011","unstructured":"Gong D W, Zhang W Q, Yao X J. Evolutionary generation of test data for many paths coverage based on grouping. The Journal of Systems and Software, 2011, 84(12): 2222\u20132233","journal-title":"The Journal of Systems and Software"},{"issue":"11","key":"3024_CR9","doi-asserted-by":"crossref","first-page":"2531","DOI":"10.1016\/j.jss.2012.05.071","volume":"85","author":"D W Gong","year":"2012","unstructured":"Gong D W, Tian T, Yao X J. Grouping target paths for evolutionary generation of test data in parallel. The Journal of Systems and Software, 2012, 85(11): 2531\u20132540","journal-title":"The Journal of Systems and Software"},{"issue":"5","key":"3024_CR10","first-page":"1011","volume":"40","author":"Y Zhang","year":"2012","unstructured":"Zhang Y, Gong DW. Evolutionary genetation of test data for path coverage based on automatic reduction of searchspace. Acta Electronica Sinica, 2012, 40(5): 1011\u20131016","journal-title":"Acta Electronica Sinica"},{"issue":"3","key":"3024_CR11","doi-asserted-by":"crossref","first-page":"811","DOI":"10.1016\/j.cor.2007.10.028","volume":"36","author":"M Caserta","year":"2009","unstructured":"Caserta M, Uribe A M. Tabu search-based metaheuristic algorithm for software system reliability problems. Computers & Operations Research, 2009, 36(3): 811\u2013822","journal-title":"Computers & Operations Research"},{"key":"3024_CR12","doi-asserted-by":"crossref","first-page":"1121","DOI":"10.1145\/1276958.1277178","volume-title":"Proceedings of Genetic and Evolutionary Computation Conference, GECCO\u2019 07","author":"A Windisch","year":"2007","unstructured":"Windisch A, Wappler S, Wegener J. Applying particle swarm optimization to software testing. In: Proceedings of Genetic and Evolutionary Computation Conference, GECCO\u2019 07. 2007, 1121\u20131128"},{"key":"3024_CR13","doi-asserted-by":"crossref","first-page":"232","DOI":"10.1109\/ICSTW.2008.19","volume-title":"Proceedings of IEEE International Conference on Software Testing Verification and Validation Workshop, ICST\u2019 08","author":"R Sagarna","year":"2008","unstructured":"Sagarna R, Yao X. Handling constraints for search based software test data generation. In: Proceedings of IEEE International Conference on Software Testing Verification and Validation Workshop, ICST\u2019 08. 2008, 232\u2013240"},{"key":"3024_CR14","doi-asserted-by":"crossref","first-page":"41","DOI":"10.1109\/ASPEC.2007.73","volume-title":"Proceedings of the 14th Asia-Pacific Software Engineering Conference, APSEC\u2019 07","author":"A S Ghiduk","year":"2007","unstructured":"Ghiduk A S, Harrold MJ. Using genetic algorithms to aid test data generation for data flow coverage. In: Proceedings of the 14th Asia-Pacific Software Engineering Conference, APSEC\u2019 07. 2007, 41\u201348"},{"key":"3024_CR15","first-page":"1098","volume-title":"Proceedings of Genetic and Evolutionary Computation Conference, GECCO\u2019 07","author":"M Harman","year":"2007","unstructured":"Harman M, Lakhotia K, McMinn P. A multi-objective approach to search-based test data generation. In: Proceedings of Genetic and Evolutionary Computation Conference, GECCO\u2019 07. 2007, 1098\u20131105"},{"key":"3024_CR16","first-page":"664","volume-title":"Proceedings of International Conference on Intelligent Computing, ICIC\u2019 11","author":"D W Gong","year":"2011","unstructured":"Gong D W, Zhang Y. Generating test data for both paths coverage and faults detection using genetic algorithms. In: Proceedings of International Conference on Intelligent Computing, ICIC\u2019 11. 2011, 664\u2013671"},{"issue":"1","key":"3024_CR17","first-page":"109","volume":"32","author":"J H Shan","year":"2004","unstructured":"Shan J H, Wang J, Qi Z C. Survey on path-wise automatic generation of test data. Acta Electronica Sinica, 2004, 32(1): 109\u2013113","journal-title":"Acta Electronica Sinica"},{"issue":"1","key":"3024_CR18","doi-asserted-by":"crossref","first-page":"60","DOI":"10.1016\/j.jss.2009.02.022","volume":"83","author":"T Y Chen","year":"2010","unstructured":"Chen T Y, Kuo F C, Merkel R G. Adaptive random testing: the art of test case diversity. The Journal of Systems and Software, 2010, 83(1): 60\u201366","journal-title":"The Journal of Systems and Software"},{"issue":"21","key":"3024_CR19","doi-asserted-by":"crossref","first-page":"4057","DOI":"10.1016\/j.ins.2008.06.020","volume":"178","author":"Z Ding","year":"2008","unstructured":"Ding Z, Zhang K, Hua J. A rigorous approach towards test case generation. Information Sciences, 2008, 178(21): 4057\u20134079","journal-title":"Information Sciences"},{"key":"3024_CR20","volume-title":"Adaptation in natural and artificial systems","author":"J H Holland","year":"1975","unstructured":"Holland J H. Adaptation in natural and artificial systems. Michigan: The University of Michigan, 1975"},{"key":"3024_CR21","first-page":"625","volume-title":"Proceedings of the 5th International Conference on Software Engineering, ICSE\u2019 92","author":"S Xanthakis","year":"1992","unstructured":"Xanthakis S, Ellis C, Skourlas C. Application of genetic algorithms to software testing. In: Proceedings of the 5th International Conference on Software Engineering, ICSE\u2019 92. 1992, 625\u2013636"},{"issue":"2","key":"3024_CR22","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1002\/stvr.294","volume":"14","author":"P McMinn","year":"2004","unstructured":"McMinn P. Search-based software test data generation: a survey. Software Testing, Verification and Reliability, 2004, 14(2): 105\u2013156","journal-title":"Software Testing, Verification and Reliability"},{"issue":"5","key":"3024_CR23","doi-asserted-by":"crossref","first-page":"1191","DOI":"10.1016\/j.jss.2012.11.045","volume":"86","author":"A Pachauri","year":"2013","unstructured":"Pachauri A, Srivastava G. Automated test data generation for branch testing using genetic algorithm: an improved approach using branch ordering, memory and elitism. The Journal of Systems and Software, 2013, 86(5): 1191\u20131208","journal-title":"The Journal of Systems and Software"},{"issue":"2","key":"3024_CR24","doi-asserted-by":"crossref","first-page":"183","DOI":"10.1007\/s10664-006-9026-0","volume":"12","author":"M Xiao","year":"2007","unstructured":"Xiao M, Mohamed E A, Reformat M. Empirical evaluation of optimization algorithms when used in goal-oriented automated test data generation techniques. Empirical Software Engineering, 2007, 12(2): 183\u2013239","journal-title":"Empirical Software Engineering"},{"issue":"15","key":"3024_CR25","doi-asserted-by":"crossref","first-page":"3075","DOI":"10.1016\/j.ins.2007.11.024","volume":"178","author":"A Arcuri","year":"2008","unstructured":"Arcuri A, Yao X. Search based software testing of object-oriented containers. Information Sciences, 2008, 178(15): 3075\u20133095","journal-title":"Information Sciences"},{"issue":"10","key":"3024_CR26","doi-asserted-by":"crossref","first-page":"3144","DOI":"10.1016\/j.cor.2007.01.015","volume":"35","author":"O Buhler","year":"2008","unstructured":"Buhler O, Wegener J. Evolutionary functional testing. Computers & Operations Research, 2008, 35(10): 3144\u20133160","journal-title":"Computers & Operations Research"},{"key":"3024_CR27","first-page":"140","volume-title":"Proceedings of International Symposium on Software Testing and Analysis, ISSTA\u2019 07","author":"S Yoo","year":"2007","unstructured":"Yoo S, Harman M. Areto efficient multi-objective test case selection. In: Proceedings of International Symposium on Software Testing and Analysis, ISSTA\u2019 07. 2007, 140\u2013150"},{"issue":"5","key":"3024_CR28","first-page":"1","volume":"31","author":"Z H Yang","year":"2008","unstructured":"Yang Z H, Gong Y Z, Xiao Q, Wang Y W. A defect model based testing system. Journal of Beijing University of Posts and Telecommunications, 2008, 31(5): 1\u20134","journal-title":"Journal of Beijing University of Posts and Telecommunications"},{"issue":"10","key":"3024_CR29","doi-asserted-by":"crossref","first-page":"3107","DOI":"10.1016\/j.cor.2007.01.012","volume":"35","author":"M A Ahmed","year":"2008","unstructured":"Ahmed M A, Hermadi I. GA-based multiple paths test data generator. Computer & Operations Research, 2008, 35(10): 3107\u20133124","journal-title":"Computer & Operations Research"},{"key":"3024_CR30","volume-title":"Software testing","author":"Y Z Gong","year":"2008","unstructured":"Gong Y Z, Zhao R L, Zhang W, Zhao H Q. Software testing. Beijing: China Machine Press, 2008"},{"key":"3024_CR31","volume-title":"Multi-objective optimization using evolutionary algorithms","author":"K Deb","year":"2009","unstructured":"Deb K. Multi-objective optimization using evolutionary algorithms. American: John Wiley & Sons Inc., 2009"},{"key":"3024_CR32","volume-title":"Genetic algorithms and engineering optimization","author":"G N Xuan","year":"2004","unstructured":"Xuan G N, Cheng R W. Genetic algorithms and engineering optimization. Beijing: Tsinghua University Press, 2004"},{"issue":"5","key":"3024_CR33","doi-asserted-by":"crossref","first-page":"649","DOI":"10.1109\/TSE.2010.62","volume":"37","author":"Y Jia","year":"2011","unstructured":"Jia Y, Harman M. An analysis and survey of the development of mutation testing. IEEE Transactions on Software Engineering, 2011, 37(5): 649\u2013678","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"4","key":"3024_CR34","doi-asserted-by":"crossref","first-page":"405","DOI":"10.1007\/s10664-005-3861-2","volume":"10","author":"D Hyunsook","year":"2005","unstructured":"Hyunsook D, Sebastian E, Gregg R. Supporting controlled experimentation with testing techniques: an infrastructure and its potential impact. Empirical Software Engineering: An International Journal, 2005, 10(4): 405\u2013435","journal-title":"Empirical Software Engineering: An International Journal"},{"issue":"6","key":"3024_CR35","doi-asserted-by":"crossref","first-page":"534","DOI":"10.1016\/j.infsof.2007.06.003","volume":"50","author":"H Zhong","year":"2008","unstructured":"Zhong H, Zhang L, Mei H. An experimental study of four typical test suite reduction techniques. Information and Software Technology, 2008, 50(6): 534\u2013546","journal-title":"Information and Software Technology"},{"key":"3024_CR36","doi-asserted-by":"crossref","first-page":"191","DOI":"10.1109\/ICSE.1994.296778","volume-title":"Proceedings of 16th International Conference on Software Engineering, ICSE\u2019 94","author":"M Hutchins","year":"1994","unstructured":"Hutchins M, Foster H, Goradia T. Experiments of the effectiveness of data flow and control flow-based test adequacy criteria. In: Proceedings of 16th International Conference on Software Engineering, ICSE\u2019 94. 1994, 191\u2013200"}],"container-title":["Frontiers of Computer Science"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-013-3024-3.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s11704-013-3024-3\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s11704-013-3024-3","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,6,1]],"date-time":"2019-06-01T21:01:18Z","timestamp":1559422878000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s11704-013-3024-3"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,9,28]]},"references-count":36,"journal-issue":{"issue":"6","published-print":{"date-parts":[[2013,12]]}},"alternative-id":["3024"],"URL":"https:\/\/doi.org\/10.1007\/s11704-013-3024-3","relation":{},"ISSN":["2095-2228","2095-2236"],"issn-type":[{"value":"2095-2228","type":"print"},{"value":"2095-2236","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,9,28]]}}}