{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,18]],"date-time":"2025-05-18T14:40:08Z","timestamp":1747579208243,"version":"3.40.5"},"reference-count":31,"publisher":"Springer Science and Business Media LLC","issue":"1","license":[{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[1997,1,1]],"date-time":"1997-01-01T00:00:00Z","timestamp":852076800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Annals of Software Engineering"],"published-print":{"date-parts":[[1997,1]]},"DOI":"10.1023\/a:1018970928797","type":"journal-article","created":{"date-parts":[[2003,2,19]],"date-time":"2003-02-19T22:07:13Z","timestamp":1045692433000},"page":"11-29","source":"Crossref","is-referenced-by-count":1,"title":["Modeling reliability growth during non\u2010representative testing"],"prefix":"10.1007","volume":"4","author":[{"given":"Brian","family":"Mitchell","sequence":"first","affiliation":[]},{"given":"Steven J.","family":"Zeil","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"2","key":"326152_CR1","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1145\/356876.356879","volume":"14","author":"W. Adrion","year":"1982","unstructured":"Adrion, W., M.A. Branstad, and J.C. Cherniavski (1982), \u201cValidation, Verification, and Testing of Computer Software,\u201d Computing Surveys 14,2, 159\u2013192.","journal-title":"Computing Surveys"},{"key":"326152_CR2","unstructured":"Budd, T.A. (1983). \u201cThe Portable Mutation Testing Suite,\u201d Technical Report TR 83-8, University of Arizona."},{"issue":"1","key":"326152_CR3","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1109\/32.210303","volume":"19","author":"R.W. Butler","year":"1993","unstructured":"Butler, R.W. and G.B. Finelli (1993), \u201cThe Infeasibility of Quantifying the Reliability of Life-Critical Real-Time Software,\u201d IEEE Transactions on Software Engineering 19,1, 3\u201312.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"326152_CR4","series-title":"Technical Report","volume-title":"A Time\/Structure Based Model for Estimating Software Reliability","author":"M.-H. Chen","year":"1992","unstructured":"Chen, M.-H., J.R. Horgan, A.P. Mathur, and V.J. Rego (1992), \u201cA Time\/Structure Based Model for Estimating Software Reliability,\u201d Technical Report SERC-TR-117-P, Purdue University, West Lafayette, IN."},{"issue":"11","key":"326152_CR5","doi-asserted-by":"publisher","first-page":"1318","DOI":"10.1109\/32.41326","volume":"15","author":"L.A. Clarke","year":"1989","unstructured":"Clarke, L.A., A. Podgurski, D.J. Richardson, and S.J. Zeil (1989), \u201cA Formal Evaluation of Data Flow Path Selection Criteria,\u201d IEEE Transactions on Software Engineering 15,11, 1318\u20131332.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"6","key":"326152_CR6","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1109\/52.60601","volume":"7","author":"R.H. Cobb","year":"1990","unstructured":"Cobb, R.H. and H.D. Mills (1990), \u201cEngineering Software Under Statistical Quality Control,\u201d IEEE Software 7,6, 44\u201354.","journal-title":"IEEE Software"},{"key":"326152_CR7","volume-title":"Order Statistics","author":"H.A. David","year":"1981","unstructured":"David, H.A. (1981), Order Statistics, John Wiley and Sons, Second Edition, New York, NY.","edition":"Second Edition"},{"issue":"4","key":"326152_CR8","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/C-M.1978.218136","volume":"11","author":"R.A. DeMillo","year":"1978","unstructured":"DeMillo, R.A., F.G. Sayward, and R.J. Lipton (1978), \u201cHints on Test Data Selection: Help for the Practicing Programmer,\u201d Computer 11,4, 34\u201341.","journal-title":"Computer"},{"issue":"10","key":"326152_CR9","doi-asserted-by":"publisher","first-page":"1483","DOI":"10.1109\/32.6194","volume":"14","author":"P.G. Frankl","year":"1988","unstructured":"Frankl, P.G. and E.J. Weyuker (1988), \u201cAn Applicable Family of Data Flow Testing Criteria,\u201d IEEE Transactions on Software Engineering 14,10, 1483\u20131498.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"4","key":"326152_CR10","doi-asserted-by":"publisher","first-page":"21","DOI":"10.1109\/52.143097","volume":"9","author":"R. Hamlet","year":"1992","unstructured":"Hamlet, R. (1992), \u201cAre We Testing for True Reliability?\u201d IEEE Software 9,4, 21\u201327.","journal-title":"IEEE Software"},{"issue":"12","key":"326152_CR11","doi-asserted-by":"publisher","first-page":"1402","DOI":"10.1109\/32.62448","volume":"16","author":"R. Hamlet","year":"1990","unstructured":"Hamlet, R. and R. Taylor (1990), \u201cPartition Testing Does Not Inspire Confidence,\u201d IEEE Transactions on Software Engineering 16,12, 1402\u20131411.","journal-title":"IEEE Transactions on Software Engineering"},{"key":"326152_CR12","first-page":"89","volume-title":"Proceedings of the International Symposium on Software Testing and Analysis","author":"R. Hamlet","year":"1993","unstructured":"Hamlet, R. and J. Voas (1993), \u201cFaults on Its Sleeve: Amplifying Software Reliability Testing,\u201d In Proceedings of the International Symposium on Software Testing and Analysis, Volume 18, ACM\/SIGSOFT, Baltimore, MD, pp. 89\u201398."},{"key":"326152_CR13","doi-asserted-by":"publisher","first-page":"338","DOI":"10.1109\/ISSRE.1994.341400","volume-title":"Fifth International Symposium on Software Reliability Engineering (ISSRE 94)","author":"M.A. Hoppa","year":"1994","unstructured":"Hoppa, M.A. and L.W. Wilson (1994), \u201cSome Effects of Fault Recovery Order on Software Reliability Models,\u201d In Fifth International Symposium on Software Reliability Engineering (ISSRE 94), IEEE Computer Society Press, Los Alamitos, CA, pp. 338\u2013342."},{"key":"326152_CR14","doi-asserted-by":"publisher","first-page":"143","DOI":"10.1109\/ISSRE.1994.341366","volume-title":"Fifth International Symposium on Software Reliability Engineering (ISSRE 94)","author":"W.E. Howden","year":"1994","unstructured":"Howden, W.E. and Y. Huang (1994), \u201cSoftware Trustability,\u201d In Fifth International Symposium on Software Reliability Engineering (ISSRE 94), IEEE Computer Society Press, Los Alamitos, CA, pp. 143\u2013151."},{"key":"326152_CR15","first-page":"465","volume-title":"Statistical Computer Reliability Engineering","author":"Z. Jelinski","year":"1972","unstructured":"Jelinski, Z. and P.B. Moranda (1972), \u201cSoftware Reliability Research,\u201d In Statistical Computer Reliability Engineering, W. Freiberger, Ed., Academic Press, New York, NY, pp. 465\u2013497."},{"issue":"1","key":"326152_CR16","doi-asserted-by":"crossref","first-page":"96","DOI":"10.1109\/TSE.1986.6312924","volume":"SE-12","author":"J. Knight","year":"1986","unstructured":"Knight, J. and N. Leveson (1986), \u201cAn Experimental Evaluation of the Assumption of Independence in Multiversion Programming,\u201d IEEE Transactions on Software Engineering SE-12,1, 96\u2013109.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"2","key":"326152_CR17","doi-asserted-by":"publisher","first-page":"50","DOI":"10.1109\/52.268956","volume":"11","author":"R.C. Linger","year":"1994","unstructured":"Linger, R.C. (1994), \u201cCleanroom Process Model,\u201d IEEE Software 11,2, 50\u201358.","journal-title":"IEEE Software"},{"issue":"5","key":"326152_CR18","doi-asserted-by":"publisher","first-page":"489","DOI":"10.1109\/TSE.1980.230790","volume":"SE-6","author":"B. Littlewood","year":"1980","unstructured":"Littlewood, B. (1980), \u201cTheories of Software Reliability: How Good Are They and How Can They Be Improved?,\u201d IEEE Transactions on Software Engineering SE-6,5, 489\u2013500.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"4","key":"326152_CR19","doi-asserted-by":"publisher","first-page":"313","DOI":"10.1109\/TR.1981.5221099","volume":"R-30","author":"B. Littlewood","year":"1981","unstructured":"Littlewood, B. (1981), \u201cStochastic Reliability-Growth: A Model for Fault-Removal in Computer-Programs and Hardware-Designs,\u201d IEEE Transactions on Reliability R-30,4, 313\u2013320.","journal-title":"IEEE Transactions on Reliability"},{"key":"326152_CR20","doi-asserted-by":"publisher","first-page":"186","DOI":"10.1109\/ISSRE.1994.341373","volume-title":"Fifth International Symposium on Software Reliability Engineering (ISSRE 94)","author":"Y.K. Malaiya","year":"1994","unstructured":"Malaiya, Y.K., N. Li, J. Bieman, R. Karich, and B. Skibbe (1994), \u201cThe Relationship Between Test Coverage and Reliability,\u201d In Fifth International Symposium on Software Reliability Engineering (ISSRE 94), IEEE Compute Society Press, Los Alamitos, CA, pp. 186\u2013195."},{"key":"326152_CR21","doi-asserted-by":"publisher","first-page":"506","DOI":"10.1109\/ICSE.1996.493445","volume-title":"Proceedings of the 18th International Conference on Software Engineering","author":"B. Mitchell","year":"1996","unstructured":"Mitchell, B. and S.J. Zeil (1996), \u201cA Reliability Model Combining Representative and Directed Testing,\u201d In Proceedings of the 18th International Conference on Software Engineering, IEEE Computer Society Press, Los Alamitos, CA, pp. 506\u2013514."},{"key":"326152_CR22","series-title":"Technical report","volume-title":"Software Reliability Data","author":"J.D. Musa","year":"1979","unstructured":"Musa, J.D. (1979), \u201cSoftware Reliability Data,\u201d Technical report, Data and Analysis Center for Software, Utica, NY."},{"issue":"2","key":"326152_CR23","doi-asserted-by":"publisher","first-page":"14","DOI":"10.1109\/52.199724","volume":"10","author":"J.D. Musa","year":"1993","unstructured":"Musa, J.D. (1993), \u201cOperational Profiles in Software-Reliability Engineering,\u201d IEEE Software 10,2, 14\u201332.","journal-title":"IEEE Software"},{"key":"326152_CR24","volume-title":"Software Reliability: Measurement, Prediction, Application","author":"J.D. Musa","year":"1987","unstructured":"Musa, J.D., A. Iannino, and K. Okumoto (1987), Software Reliability: Measurement, Prediction, Application, McGraw-Hill, New York, NY."},{"key":"326152_CR25","doi-asserted-by":"crossref","unstructured":"Podgurski, A., C. Yang, and W. Masri (1993), \u201cPartitioned Testing, Stratified Sampling, and Cluster Analysis,\u201d In Proceedings of the First ACM SIGSOFT Symposium on the Foundations of Software Engineering, pp. 169\u2013181. Also published as Software Engineering Notes 18, 5.","DOI":"10.1145\/167049.167076"},{"key":"326152_CR26","unstructured":"Voas, J. (1991), \u201cPreliminary Observations on Program Testability,\u201d In Proceedings of the Pacific Northwest Quality Conference, Pacific Northwest Quality Conference, OR, pp. 235\u2013247."},{"issue":"8","key":"326152_CR27","doi-asserted-by":"publisher","first-page":"717","DOI":"10.1109\/32.153381","volume":"18","author":"J.M. Voas","year":"1992","unstructured":"Voas, J.M. (1992), \u201cPIE: A Dynamic Failure-Based Technique,\u201d IEEE Transactions on Software Engineering 18,8, 717\u2013727.","journal-title":"IEEE Transactions on Software Engineering"},{"issue":"2","key":"326152_CR28","doi-asserted-by":"publisher","first-page":"80","DOI":"10.1109\/MS.1985.230356","volume":"2","author":"M.D. Weiser","year":"1985","unstructured":"Weiser, M.D., J.D. Gannon, and P.R. McMullin (1985), \u201cComparison of Structural Test Coverage Metrics,\u201d IEEE Software 2,2, 80\u201385.","journal-title":"IEEE Software"},{"key":"326152_CR29","first-page":"335","volume-title":"Advances in Computers","author":"L.J. White","year":"1987","unstructured":"White, L.J. (1987), \u201cSoftware Testing and Verification,\u201d In Advances in Computers, M. Yovits, Ed., Volume 26, Academic Press, London, UK, pp. 335\u2013391."},{"issue":"2","key":"326152_CR30","doi-asserted-by":"publisher","first-page":"53","DOI":"10.1002\/stvr.4370020203","volume":"2","author":"C. Wild","year":"1992","unstructured":"Wild, C., S. Zeil, J. Chen, and G. Feng (1992), \u201cEmploying Accumulated Knowledge to Refine Test Cases,\u201d Software Testing, Verification, and Reliability 2,2, 53\u201368.","journal-title":"Software Testing, Verification, and Reliability"},{"issue":"6","key":"326152_CR31","doi-asserted-by":"publisher","first-page":"737","DOI":"10.1109\/32.24727","volume":"15","author":"S.J. Zeil","year":"1989","unstructured":"Zeil, S.J. (1989), \u201cPerturbation Testing for Domain Errors,\u201d IEEE Transactions on Software Engineering 15,6, 737\u2013746.","journal-title":"IEEE Transactions on Software Engineering"}],"container-title":["Annals of Software Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1018970928797.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/article\/10.1023\/A:1018970928797\/fulltext.html","content-type":"text\/html","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1023\/A:1018970928797.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,18]],"date-time":"2025-05-18T14:12:12Z","timestamp":1747577532000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1023\/A:1018970928797"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,1]]},"references-count":31,"journal-issue":{"issue":"1","published-print":{"date-parts":[[1997,1]]}},"alternative-id":["326152"],"URL":"https:\/\/doi.org\/10.1023\/a:1018970928797","relation":{},"ISSN":["1022-7091","1573-7489"],"issn-type":[{"type":"print","value":"1022-7091"},{"type":"electronic","value":"1573-7489"}],"subject":[],"published":{"date-parts":[[1997,1]]}}}