{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:15:25Z","timestamp":1729635325979,"version":"3.28.0"},"reference-count":20,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2013,11]]},"DOI":"10.1109\/ase.2013.6693122","type":"proceedings-article","created":{"date-parts":[[2014,1,6]],"date-time":"2014-01-06T12:07:25Z","timestamp":1389010045000},"page":"616-621","source":"Crossref","is-referenced-by-count":8,"title":["Randomizing regression tests using game theory"],"prefix":"10.1109","author":[{"given":"Nupul","family":"Kukreja","sequence":"first","affiliation":[]},{"given":"William G. J.","family":"Halfond","sequence":"additional","affiliation":[]},{"given":"Milind","family":"Tambe","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/1961258.1961279"},{"key":"17","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-12586-7"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.1997.630875"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973031.013"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1515\/9781400829460"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1109\/32.962562"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973031"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1017\/S0003055407070244"},{"key":"12","doi-asserted-by":"crossref","first-page":"225","DOI":"10.1007\/3-540-29263-2_11","article-title":"Value-based management of software testing","author":"ramler","year":"2006","journal-title":"Value-Based Software Engineering"},{"key":"3","first-page":"65","article-title":"Prisoners dilemma in software testing","author":"feijs","year":"2001","journal-title":"7e Nederlandse Testdag"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1002\/stv.430"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/BF00939867"},{"key":"1","volume":"200","author":"basar","year":"1995","journal-title":"Dynamic Noncooperative Game Theory"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1063\/1.2809809"},{"journal-title":"Selecting the Most Appropriate Framework for Value Based Requirements Prioritization","year":"0","author":"kukreja","key":"7"},{"key":"6","first-page":"119","article-title":"A history-based test prioritization technique for regression testing in resource constrained environments","author":"kim","year":"2002","journal-title":"Proceedings - International Conference on Software Engineering"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511973031.008"},{"key":"4","article-title":"Planning poker or how to avoid analysis paralysis while release planning","volume":"3","author":"grenning","year":"2002","journal-title":"Hawthorn Woods Renaissance Software Consulting"},{"journal-title":"The Delphi Method","year":"1975","author":"linstone","key":"9"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2008.4658075"}],"event":{"name":"2013 IEEE\/ACM 28th International Conference on Automated Software Engineering (ASE)","start":{"date-parts":[[2013,11,11]]},"location":"Silicon Valley, CA, USA","end":{"date-parts":[[2013,11,15]]}},"container-title":["2013 28th IEEE\/ACM International Conference on Automated Software Engineering (ASE)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6684409\/6693054\/06693122.pdf?arnumber=6693122","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T01:23:04Z","timestamp":1498094584000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6693122\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,11]]},"references-count":20,"URL":"https:\/\/doi.org\/10.1109\/ase.2013.6693122","relation":{},"subject":[],"published":{"date-parts":[[2013,11]]}}}