{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,4,5]],"date-time":"2026-04-05T05:11:41Z","timestamp":1775365901924,"version":"3.50.1"},"reference-count":26,"publisher":"Springer Science and Business Media LLC","issue":"4","license":[{"start":{"date-parts":[[2016,7,11]],"date-time":"2016-07-11T00:00:00Z","timestamp":1468195200000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":["Int J Syst Assur Eng Manag"],"published-print":{"date-parts":[[2016,12]]},"DOI":"10.1007\/s13198-016-0510-7","type":"journal-article","created":{"date-parts":[[2016,7,11]],"date-time":"2016-07-11T05:37:23Z","timestamp":1468215443000},"page":"462-468","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":26,"title":["Optimal release and patching time of software with warranty"],"prefix":"10.1007","volume":"7","author":[{"given":"Yogita","family":"Kansal","sequence":"first","affiliation":[]},{"given":"Gurinder","family":"Singh","sequence":"additional","affiliation":[]},{"given":"Uday","family":"Kumar","sequence":"additional","affiliation":[]},{"given":"P. K.","family":"Kapur","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,7,11]]},"reference":[{"issue":"3","key":"510_CR1","doi-asserted-by":"crossref","first-page":"465","DOI":"10.1287\/mnsc.1050.0440","volume":"52","author":"A Arora","year":"2006","unstructured":"Arora A, Caulkins JP, Telang R (2006) Research note: sell first, fix later: impact of patching on software quality. Manag Sci 52(3):465\u2013471","journal-title":"Manag Sci"},{"key":"510_CR2","first-page":"657","volume":"54","author":"Hasan Cavusoglu","year":"2008","unstructured":"Cavusoglu Hasan, Cavusoglu Huseyin, Zhang Jun (2008) Security patch management: share the burden or share the damage? INFORMS 54:657\u2013670","journal-title":"INFORMS"},{"issue":"3","key":"510_CR3","doi-asserted-by":"crossref","first-page":"462","DOI":"10.1287\/ijoc.2014.0638","volume":"27","author":"D Dey","year":"2015","unstructured":"Dey D, Lahiri A, Zhang G (2015) Optimal policies for security patch management. INFORMS J Comput 27(3):462\u2013477","journal-title":"INFORMS J Comput"},{"issue":"03","key":"510_CR4","doi-asserted-by":"crossref","first-page":"241","DOI":"10.1142\/S0218539397000175","volume":"04","author":"T Dohi","year":"1997","unstructured":"Dohi T, Kaio N, Osaki S (1997) Optimal Software Release Policies with Debugging Time Lag. Int J Reliab, Qual Saf Eng 04(03):241\u2013255","journal-title":"Int J Reliab, Qual Saf Eng"},{"key":"510_CR5","unstructured":"HP (2015). http:\/\/www.zdnet.com\/hp-to-begin-charging-for-firmware-updates-and-service-packs-for-servers-7000026110 . Accessed 29 Jan 2016"},{"key":"510_CR6","doi-asserted-by":"crossref","first-page":"139","DOI":"10.1016\/j.jss.2004.10.014","volume":"77","author":"CY Huang","year":"2005","unstructured":"Huang CY (2005) Cost-reliability-optimal release policy for software reliability models incorporating improvements in testing efficiency. J Syst Softw 77:139\u2013155","journal-title":"J Syst Softw"},{"issue":"3, Part 1 of 2","key":"510_CR7","doi-asserted-by":"crossref","first-page":"635","DOI":"10.1287\/isre.1110.0379","volume":"23","author":"Z Jiang","year":"2012","unstructured":"Jiang Z, Sarkar S, Jacob VS (2012) Post-release testing and software release policy for enterprise-level systems. Inf Syst Res 23(3, Part 1 of 2):635\u2013657","journal-title":"Inf Syst Res"},{"key":"510_CR8","doi-asserted-by":"crossref","first-page":"2547","DOI":"10.1080\/00207728908910332","volume":"20","author":"PK Kapur","year":"1989","unstructured":"Kapur PK, Garg RB (1989) Cost-reliability optimum release policies for software system under penalty cost. Int J Syst Sci 20:2547\u20132562","journal-title":"Int J Syst Sci"},{"issue":"9","key":"510_CR9","doi-asserted-by":"crossref","first-page":"1563","DOI":"10.1080\/00207729108910731","volume":"22","author":"PK Kapur","year":"1991","unstructured":"Kapur PK, Garg RB (1991) Optimal software release policies for software systems with testing effort. Int J Syst Sci 22(9):1563\u20131571","journal-title":"Int J Syst Sci"},{"key":"510_CR10","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/s13198-014-0221-x","volume":"5","author":"PK Kapur","year":"2014","unstructured":"Kapur PK, Singh O, Shrivastava AK (2014a) Optimal price and testing time of a software under warranty and two types of imperfect debugging. Int J Syst Assur Eng Manag 5:120\u2013126","journal-title":"Int J Syst Assur Eng Manag"},{"key":"510_CR11","unstructured":"Kapur PK, Shrivastava AK (2015) When to release and stop testing of a software: A new Insight, published in conference proceedings of international conference on reliability, infocom technology and optimization (trends and future directions), held during October 2-4, 2015 at Amity University Uttar Pradesh, Noida., pp 1\u20136"},{"key":"510_CR12","first-page":"165","volume":"28","author":"PK Kapur","year":"1994","unstructured":"Kapur PK, Agarwal S, Garg RB (1994) Bi-criterion release policy for exponential software reliabilitygrowth models. Rech Op\/Op Res 28:165\u2013180","journal-title":"Rech Op\/Op Res"},{"key":"510_CR13","doi-asserted-by":"crossref","DOI":"10.1007\/978-0-85729-204-9","volume-title":"Software reliability assessment with OR applications","author":"PK Kapur","year":"2011","unstructured":"Kapur PK, Pham H, Gupta A, Jha PC (2011) Software reliability assessment with OR applications. Springer Series in Reliability Engineering, London"},{"key":"510_CR14","unstructured":"Kapur P.K, Khatri S.K, Singh O, Shrivastava A.K, (2014). When to stop testing under warranty using SRGM with change point, In the IEEE Xplore conference proceeding of International Conference on IT in Business, Industry & Govt., CSIBIG held during March 8\u20139, 2014 at Sri Aurobindo Institute of Technology Indore Ujjain Highway Indore, pp. 200\u2013206"},{"key":"510_CR15","doi-asserted-by":"crossref","first-page":"120","DOI":"10.1007\/s13198-014-0221-x","volume":"5","author":"PK Kapur","year":"2014","unstructured":"Kapur PK, Singh O, Shrivastava AK (2014c) Optimal price and testing time of a software under warranty and two types of imperfect debugging. Int J Syst Assurance Engineering and Management 5:120\u2013126","journal-title":"Int J Syst Assurance Engineering and Management"},{"key":"510_CR16","doi-asserted-by":"publisher","DOI":"10.1177\/1748006x15586507","author":"C Luo","year":"2015","unstructured":"Luo C, Okamura H, Dohi T (2015) Optimal planning for open source software updates. Proc IMechE Part O: J Risk Reliab. doi: 10.1177\/1748006x15586507","journal-title":"Proc IMechE Part O: J Risk Reliab"},{"key":"510_CR17","doi-asserted-by":"crossref","unstructured":"Okamura H, Tokuzane M, Dohi T (2009) Optimal security patch release timing under non-homogeneous vulnerability-discovery processes, Proceedings of the 20th international symposium on software reliability engineering (ISSRE \u201809), Mysuru, India, pp 120\u20138","DOI":"10.1109\/ISSRE.2009.19"},{"key":"510_CR18","doi-asserted-by":"crossref","first-page":"315","DOI":"10.1016\/0164-1212(79)90033-5","volume":"1","author":"K Okumoto","year":"1980","unstructured":"Okumoto K, Goel AL (1980) Optimum release time for software systems based on reliability and coat criteria. J Syst Softw 1:315\u2013318","journal-title":"J Syst Softw"},{"issue":"1","key":"510_CR19","doi-asserted-by":"crossref","first-page":"71","DOI":"10.1109\/12.743412","volume":"48","author":"H Pham","year":"1999","unstructured":"Pham H, Zhang X (1999) A software cost model with warranty and risk costs. IEEE Trans Comp 48(1):71\u201375","journal-title":"IEEE Trans Comp"},{"issue":"1","key":"510_CR20","doi-asserted-by":"crossref","first-page":"83","DOI":"10.1007\/s13198-014-0246-1","volume":"6","author":"O Singh","year":"2015","unstructured":"Singh O, Kapur PK, Shrivastava AK, Kumar V (2015) Release time problem with multiple constraints. Int J Syst Assur Eng Manag 6(1):83\u201391","journal-title":"Int J Syst Assur Eng Manag"},{"key":"510_CR21","unstructured":"The 30-year-old prank that became the first computer virus, http:\/\/www.theregister.co.uk\/2012\/12\/14\/first_virus_elk_cloner_creator_interviewed\/"},{"key":"510_CR22","first-page":"69","volume":"29","author":"A Wood","year":"1996","unstructured":"Wood A (1996) Predicting software reliability. IEEE 29:69\u201377","journal-title":"IEEE"},{"key":"510_CR23","doi-asserted-by":"crossref","DOI":"10.1007\/978-4-431-54565-1","volume-title":"Software reliability modeling: fundamentals and applications","author":"S Yamada","year":"2014","unstructured":"Yamada S (2014) Software reliability modeling: fundamentals and applications. Springer, Tokyo\/Heidelberg"},{"key":"510_CR24","doi-asserted-by":"crossref","first-page":"46","DOI":"10.1016\/0377-2217(87)90135-4","volume":"31","author":"S Yamada","year":"1987","unstructured":"Yamada S, Osaki S (1987) Optimal software release policies with simultaneous cost and reliability requirements. Eur J Oper Res 31:46\u201351","journal-title":"Eur J Oper Res"},{"key":"510_CR25","doi-asserted-by":"crossref","first-page":"323","DOI":"10.1016\/S0951-8320(00)00069-7","volume":"70","author":"B Yang","year":"2000","unstructured":"Yang B, Xie M (2000) A study of operational and testing reliability in software reliability analysis. Reliab Eng Syst Saf 70:323\u2013329","journal-title":"Reliab Eng Syst Saf"},{"issue":"2","key":"510_CR26","first-page":"338","volume":"39","author":"WY Yun","year":"1990","unstructured":"Yun WY, Bai DS (1990) Optimum software release policy with random life cycle. IEEE Trans Reliab 39(2):338\u2013353","journal-title":"IEEE Trans Reliab"}],"container-title":["International Journal of System Assurance Engineering and Management"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-016-0510-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/article\/10.1007\/s13198-016-0510-7\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/s13198-016-0510-7.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,9,10]],"date-time":"2019-09-10T20:10:41Z","timestamp":1568146241000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/s13198-016-0510-7"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,7,11]]},"references-count":26,"journal-issue":{"issue":"4","published-print":{"date-parts":[[2016,12]]}},"alternative-id":["510"],"URL":"https:\/\/doi.org\/10.1007\/s13198-016-0510-7","relation":{},"ISSN":["0975-6809","0976-4348"],"issn-type":[{"value":"0975-6809","type":"print"},{"value":"0976-4348","type":"electronic"}],"subject":[],"published":{"date-parts":[[2016,7,11]]}}}