{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2023,12,3]],"date-time":"2023-12-03T11:50:36Z","timestamp":1701604236706},"reference-count":23,"publisher":"Elsevier BV","issue":"2","license":[{"start":{"date-parts":[[1988,3,1]],"date-time":"1988-03-01T00:00:00Z","timestamp":573177600000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Journal of Systems and Software"],"published-print":{"date-parts":[[1988,3]]},"DOI":"10.1016\/0164-1212(88)90003-9","type":"journal-article","created":{"date-parts":[[2003,9,3]],"date-time":"2003-09-03T13:06:23Z","timestamp":1062594383000},"page":"91-104","source":"Crossref","is-referenced-by-count":4,"title":["Complexity of the EQUATE testing strategy"],"prefix":"10.1016","volume":"8","author":[{"given":"Steven J.","family":"Zeil","sequence":"first","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/0164-1212(88)90003-9_BIB1","first-page":"48","article-title":"Software and its impact: A quantitative assessment","volume":"19","author":"Boehm","year":"1973","journal-title":"Datamation"},{"key":"10.1016\/0164-1212(88)90003-9_BIB2","series-title":"Computer Program Testing","first-page":"129","article-title":"Mutation analysis: Ideas, examples, problems and prospects","author":"Budd","year":"1981"},{"key":"10.1016\/0164-1212(88)90003-9_BIB3","article-title":"The Portable Mutation Testing Suite","author":"Budd","year":"1983"},{"key":"10.1016\/0164-1212(88)90003-9_BIB4","doi-asserted-by":"crossref","first-page":"380","DOI":"10.1109\/TSE.1982.235572","article-title":"A close look at domain testing","volume":"SE-8","author":"Clarke","year":"1982","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(88)90003-9_BIB5","doi-asserted-by":"crossref","first-page":"34","DOI":"10.1109\/C-M.1978.218136","article-title":"Hints on test data selection: Help for the practicing programmer","volume":"11","author":"DeMillo","year":"1978","journal-title":"Computer"},{"key":"10.1016\/0164-1212(88)90003-9_BIB6","doi-asserted-by":"crossref","first-page":"258","DOI":"10.1109\/TSE.1980.234487","article-title":"Error sensitive test cases analysis (ESTCA)","volume":"SE-6","author":"Foster","year":"1980","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(88)90003-9_BIB7","doi-asserted-by":"crossref","first-page":"211","DOI":"10.1145\/357139.357140","article-title":"Data-abstraction implementation, specification, and testing","volume":"3","author":"Gannon","year":"1981","journal-title":"ACM TOPLAS"},{"key":"10.1016\/0164-1212(88)90003-9_BIB8","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1109\/TSE.1977.231145","article-title":"Testing programs with the aid of a compiler","volume":"SE-3","author":"Hamlet","year":"1977","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(88)90003-9_BIB9","doi-asserted-by":"crossref","first-page":"554","DOI":"10.1109\/T-C.1975.224259","article-title":"Methodology for the generation of program test data","volume":"C-24","author":"Howden","year":"1975","journal-title":"IEEE Trans. Computers"},{"key":"10.1016\/0164-1212(88)90003-9_BIB10","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1007\/BF00260923","article-title":"Algebraic program testing","volume":"10","author":"Howden","year":"1978","journal-title":"Acta Informatica"},{"key":"10.1016\/0164-1212(88)90003-9_BIB11","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1109\/TSE.1980.230467","article-title":"Functional program testing","volume":"SE-6","author":"Howden","year":"1980","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(88)90003-9_BIB12","doi-asserted-by":"crossref","first-page":"371","DOI":"10.1109\/TSE.1982.235571","article-title":"Weak mutation testing and completeness of test sets","volume":"SE-8","author":"Howden","year":"1982","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(88)90003-9_BIB13","doi-asserted-by":"crossref","first-page":"347","DOI":"10.1109\/TSE.1983.236871","article-title":"A data flow oriented program testing strategy","volume":"SE-9","author":"Laski","year":"1983","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(88)90003-9_BIB14","series-title":"The Art of Software Testing","author":"Myers","year":"1979"},{"key":"10.1016\/0164-1212(88)90003-9_BIB15","doi-asserted-by":"crossref","first-page":"795","DOI":"10.1109\/TSE.1984.5010308","article-title":"On required elements testing","volume":"SE-10","author":"Ntafos","year":"1984","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(88)90003-9_BIB16","doi-asserted-by":"crossref","first-page":"367","DOI":"10.1109\/TSE.1985.232226","article-title":"Selecting software test data using data flow information","volume":"SE-11","author":"Rapps","year":"1985","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(88)90003-9_BIB17","series-title":"Proc. IEEE Computer Soc. Int. Conf. on Ada Applications and Environments","first-page":"137","article-title":"ARCADIA: A software development environment research project","author":"Taylor","year":"1986"},{"key":"10.1016\/0164-1212(88)90003-9_BIB18","doi-asserted-by":"crossref","first-page":"247","DOI":"10.1109\/TSE.1980.234486","article-title":"A domain strategy for computer program testing","volume":"SE-6","author":"White","year":"1980","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(88)90003-9_BIB19","doi-asserted-by":"crossref","first-page":"335","DOI":"10.1109\/TSE.1983.236870","article-title":"Testing for perturbations of program statements","volume":"SE-9","author":"Zeil","year":"1983","journal-title":"IEEE Trans. Software Engineering"},{"key":"10.1016\/0164-1212(88)90003-9_BIB20_1","series-title":"Proc. 7th Int. Conf. on Software Engineering","first-page":"257","article-title":"Perturbation testing for computation errors","author":"Zeil","year":"1984"},{"key":"10.1016\/0164-1212(88)90003-9_BIB20_2","author":"Zeil","year":"1983"},{"key":"10.1016\/0164-1212(88)90003-9_BIB21","article-title":"Testing for Equivalent Algebraic Terms\u2014EQUATE","author":"Zeil","year":"1985"},{"key":"10.1016\/0164-1212(88)90003-9_BIB22","series-title":"Proc. Work-shop on Software Testing","first-page":"142","article-title":"The EQUATE testing strategy","author":"Zeil","year":"1986"}],"container-title":["Journal of Systems and Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0164121288900039?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:0164121288900039?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,2,25]],"date-time":"2019-02-25T05:55:55Z","timestamp":1551074155000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/0164121288900039"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1988,3]]},"references-count":23,"journal-issue":{"issue":"2","published-print":{"date-parts":[[1988,3]]}},"alternative-id":["0164121288900039"],"URL":"https:\/\/doi.org\/10.1016\/0164-1212(88)90003-9","relation":{},"ISSN":["0164-1212"],"issn-type":[{"value":"0164-1212","type":"print"}],"subject":[],"published":{"date-parts":[[1988,3]]}}}