{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,19]],"date-time":"2025-05-19T04:02:11Z","timestamp":1747627331774,"version":"3.40.5"},"reference-count":5,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[2001,11,1]],"date-time":"2001-11-01T00:00:00Z","timestamp":1004572800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2001,11,1]],"date-time":"2001-11-01T00:00:00Z","timestamp":1004572800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Annals of Software Engineering"],"published-print":{"date-parts":[[2001,11]]},"DOI":"10.1023\/a:1012539118784","type":"journal-article","created":{"date-parts":[[2002,12,29]],"date-time":"2002-12-29T19:13:07Z","timestamp":1041189187000},"page":"79-88","source":"Crossref","is-referenced-by-count":0,"title":["Discovering Unanticipated Software Output Modes"],"prefix":"10.1007","volume":"11","author":[{"given":"Jeffrey M.","family":"Voas","sequence":"first","affiliation":[]}],"member":"297","reference":[{"key":"380442_CR1","volume-title":"European Major Hazards","author":"B.H.E. Harvey","year":"1984","unstructured":"Harvey, B.H.E. (1984), European Major Hazards, Oyez Scientific and Technical Services, London."},{"issue":"4","key":"380442_CR2","doi-asserted-by":"crossref","first-page":"73","DOI":"10.1109\/52.595959","volume":"14","author":"J. Voas","year":"1997","unstructured":"Voas, J., F. Charron, G. McGraw, K. Miller, and M. Friedman (1997), \u201cPredicting How Badly 'Good' Software Can Behave,\u201d IEEE Software 14, 4, 73-83.","journal-title":"IEEE Software"},{"key":"380442_CR3","volume-title":"Software Fault Injection: Inoculating Programs Against Errors","author":"J. Voas","year":"1998","unstructured":"Voas, J. and G. McGraw (1998), Software Fault Injection: Inoculating Programs Against Errors, Wiley, New York."},{"issue":"10","key":"380442_CR4","doi-asserted-by":"crossref","first-page":"1192","DOI":"10.1145\/63039.63042","volume":"31","author":"S.K. Park","year":"1988","unstructured":"Park, S.K., K. Miller (1988), \u201cRandom Number Generators: Good Ones Are Hard to Find,\u201d Communications of the ACM 31, 10, 1192-1201.","journal-title":"Communications of the ACM"},{"key":"380442_CR5","unstructured":"Watt, G., J. Chang, and A. Rathore (2000), \u201cDynamic Safety Threading in Software Hazard Sensitivity Analysis,\u201d In Proc. of the 18th International System Safety Conference, Ft.Worth, TX, pp. 206-213."}],"container-title":["Annals of Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1012539118784.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1012539118784\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1012539118784.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,18]],"date-time":"2025-05-18T14:20:56Z","timestamp":1747578056000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1012539118784"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2001,11]]},"references-count":5,"journal-issue":{"issue":"1","published-print":{"date-parts":[[2001,11]]}},"alternative-id":["380442"],"URL":"https:\/\/doi.org\/10.1023\/a:1012539118784","relation":{},"ISSN":["1022-7091","1573-7489"],"issn-type":[{"type":"print","value":"1022-7091"},{"type":"electronic","value":"1573-7489"}],"subject":[],"published":{"date-parts":[[2001,11]]}}}