{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,4]],"date-time":"2022-04-04T09:32:58Z","timestamp":1649064778436},"reference-count":20,"publisher":"Elsevier BV","issue":"1-4","license":[{"start":{"date-parts":[[2000,11,1]],"date-time":"2000-11-01T00:00:00Z","timestamp":973036800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.elsevier.com\/tdm\/userlicense\/1.0\/"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Information Sciences"],"published-print":{"date-parts":[[2000,11]]},"DOI":"10.1016\/s0020-0255(00)00058-x","type":"journal-article","created":{"date-parts":[[2003,4,7]],"date-time":"2003-04-07T17:32:24Z","timestamp":1049736744000},"page":"105-118","source":"Crossref","is-referenced-by-count":3,"title":["The universal safeness of test allocation strategies for partition testing"],"prefix":"10.1016","volume":"129","author":[{"given":"Tsong Yueh","family":"Chen","sequence":"first","affiliation":[]},{"given":"Yuen Tak","family":"Yu","sequence":"additional","affiliation":[]}],"member":"78","reference":[{"key":"10.1016\/S0020-0255(00)00058-X_BIB1","doi-asserted-by":"crossref","unstructured":"F.T. Chan, I.K. Mak, T.Y. Chen, S.M. Shen, On the effectiveness of the optimally refined proportional sampling strategy, in: Proceedings of the International Conference on Software Technology and Engineering Practice, 1999, pp. 95\u2013104","DOI":"10.1109\/STEP.1999.798483"},{"issue":"12","key":"10.1016\/S0020-0255(00)00058-X_BIB2","doi-asserted-by":"crossref","first-page":"775","DOI":"10.1016\/0950-5849(96)01103-2","article-title":"Proportional sampling strategy: guidelines for software testing practitioners","volume":"38","author":"Chan","year":"1996","journal-title":"Information and Software Technology"},{"key":"10.1016\/S0020-0255(00)00058-X_BIB3","doi-asserted-by":"crossref","unstructured":"T.Y. Chen, Y.T. Yu, On the maximin algorithms for test allocations in partition testing. Information and Software Technology, accepted for publication","DOI":"10.1016\/S0950-5849(00)00141-5"},{"issue":"12","key":"10.1016\/S0020-0255(00)00058-X_BIB4","doi-asserted-by":"crossref","first-page":"977","DOI":"10.1109\/32.368132","article-title":"On the relationship between partition and random testing","volume":"20","author":"Chen","year":"1994","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"7","key":"10.1016\/S0020-0255(00)00058-X_BIB5","doi-asserted-by":"crossref","first-page":"619","DOI":"10.1093\/comjnl\/39.7.619","article-title":"Constraints for safe partition testing strategies","volume":"39","author":"Chen","year":"1996","journal-title":"The Computer Journal"},{"issue":"2","key":"10.1016\/S0020-0255(00)00058-X_BIB6","doi-asserted-by":"crossref","first-page":"109","DOI":"10.1109\/32.485221","article-title":"On the expected number of failures detected by subdomain testing and random testing","volume":"22","author":"Chen","year":"1996","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"4","key":"10.1016\/S0020-0255(00)00058-X_BIB7","doi-asserted-by":"crossref","first-page":"438","DOI":"10.1109\/TSE.1984.5010257","article-title":"An evaluation of random testing","volume":"10","author":"Duran","year":"1984","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"10.1016\/S0020-0255(00)00058-X_BIB8","doi-asserted-by":"crossref","first-page":"202","DOI":"10.1109\/32.221133","article-title":"A formal analysis of the fault-detecting ability of testing methods","volume":"19","author":"Frankl","year":"1993","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"10.1016\/S0020-0255(00)00058-X_BIB9","doi-asserted-by":"crossref","first-page":"219","DOI":"10.1109\/32.372149","article-title":"Optimal test distributions for software failure cost estimation","volume":"21","author":"Gutjahr","year":"1995","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"12","key":"10.1016\/S0020-0255(00)00058-X_BIB10","doi-asserted-by":"crossref","first-page":"1402","DOI":"10.1109\/32.62448","article-title":"Partition testing does not inspire confidence","volume":"16","author":"Hamlet","year":"1990","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S0020-0255(00)00058-X_BIB11","series-title":"Encyclopedia of Software Engineering","first-page":"970","article-title":"Random testing","author":"Hamlet","year":"1994"},{"key":"10.1016\/S0020-0255(00)00058-X_BIB12","unstructured":"G.H. Hardy, J.E. Littlewood, G. Polya, Inequalities, second ed., Cambridge University Press, Cambridge, 1952"},{"issue":"2","key":"10.1016\/S0020-0255(00)00058-X_BIB13","doi-asserted-by":"crossref","first-page":"162","DOI":"10.1109\/TSE.1980.230467","article-title":"Functional program testing","volume":"6","author":"Howden","year":"1980","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1016\/S0020-0255(00)00058-X_BIB14","unstructured":"N. Li, Y.K. Malaiya, On input profile selection for software testing, in: Proceedings of the Fifth International Symposium on Software Reliability Engineering, 1994, pp. 196\u2013205"},{"issue":"7","key":"10.1016\/S0020-0255(00)00058-X_BIB15","doi-asserted-by":"crossref","first-page":"402","DOI":"10.1016\/0950-5849(88)90037-7","article-title":"Random testing revisited","volume":"30","author":"Loo","year":"1988","journal-title":"Information and Software Technology"},{"issue":"2","key":"10.1016\/S0020-0255(00)00058-X_BIB16","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/52.199724","article-title":"Operational profiles in software-reliability engineering","volume":"10","author":"Musa","year":"1993","journal-title":"IEEE Software"},{"issue":"12","key":"10.1016\/S0020-0255(00)00058-X_BIB17","doi-asserted-by":"crossref","first-page":"1477","DOI":"10.1109\/TSE.1985.231892","article-title":"Partition analysis: a method combining testing and verification","volume":"11","author":"Richardson","year":"1985","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"7","key":"10.1016\/S0020-0255(00)00058-X_BIB18","doi-asserted-by":"crossref","first-page":"687","DOI":"10.1109\/32.238569","article-title":"On some reliability estimation problems in random and partition testing","volume":"19","author":"Tsoukalas","year":"1993","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"7","key":"10.1016\/S0020-0255(00)00058-X_BIB19","doi-asserted-by":"crossref","first-page":"703","DOI":"10.1109\/32.83906","article-title":"Analyzing partition testing strategies","volume":"17","author":"Weyuker","year":"1991","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"3","key":"10.1016\/S0020-0255(00)00058-X_BIB20","doi-asserted-by":"crossref","first-page":"236","DOI":"10.1109\/TSE.1980.234485","article-title":"Theories of program testing and the application of revealing subdomains","volume":"6","author":"Weyuker","year":"1980","journal-title":"IEEE Transactions on Software Engineering"}],"container-title":["Information Sciences"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S002002550000058X?httpAccept=text\/xml","content-type":"text\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/api.elsevier.com\/content\/article\/PII:S002002550000058X?httpAccept=text\/plain","content-type":"text\/plain","content-version":"vor","intended-application":"text-mining"}],"deposited":{"date-parts":[[2019,4,20]],"date-time":"2019-04-20T19:58:36Z","timestamp":1555790316000},"score":1,"resource":{"primary":{"URL":"https:\/\/linkinghub.elsevier.com\/retrieve\/pii\/S002002550000058X"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000,11]]},"references-count":20,"journal-issue":{"issue":"1-4","published-print":{"date-parts":[[2000,11]]}},"alternative-id":["S002002550000058X"],"URL":"https:\/\/doi.org\/10.1016\/s0020-0255(00)00058-x","relation":{},"ISSN":["0020-0255"],"issn-type":[{"value":"0020-0255","type":"print"}],"subject":[],"published":{"date-parts":[[2000,11]]}}}