{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T04:08:26Z","timestamp":1747886906027,"version":"3.41.0"},"reference-count":36,"publisher":"IEEE","license":[{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2025,3,31]],"date-time":"2025-03-31T00:00:00Z","timestamp":1743379200000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2025,3,31]]},"DOI":"10.1109\/icst62969.2025.10988927","type":"proceedings-article","created":{"date-parts":[[2025,5,20]],"date-time":"2025-05-20T17:05:21Z","timestamp":1747760721000},"page":"244-254","source":"Crossref","is-referenced-by-count":0,"title":["Many-Objective Neuroevolution for Testing Games"],"prefix":"10.1109","author":[{"given":"Patric","family":"Feldmeier","sequence":"first","affiliation":[{"name":"University of Passau,Germany"}]},{"given":"Katrin","family":"Schmelz","sequence":"additional","affiliation":[{"name":"University of Passau,Germany"}]},{"given":"Gordon","family":"Fraser","sequence":"additional","affiliation":[{"name":"University of Passau,Germany"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1145\/3551349.3556939"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3663532.3664467"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-319-66299-2_1"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2015.7102604"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/CEC45853.2021.9504953"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.38"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1049\/sfw2.12104"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.294"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(01)00190-2"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.17"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-022-10255-x"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/115372.115320"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/1553374.1553380"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1162\/106365602320169811"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1276958.1277275"},{"key":"ref16","first-page":"193","article-title":"Why ants are hard","volume-title":"Proceedings of the Annual Conference on Genetic Programming. IEEE","author":"Langdon","year":"1998"},{"key":"ref17","first-page":"329","article-title":"Exploiting open-endedness to solve problems through the search for novelty","volume-title":"Proceedings of the International Conference on the Synthesis and Simulation of Living Systems (ALIFE\u201908)","author":"Lehman","year":"2008"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.sorms.2015.08.001"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/4235.996017"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/3583131.3590448"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177730491.MR0022058.Zbl0041.26103"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.2307\/1165329"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/AST52587.2021.00018"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568226"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/CoG47356.2020.9231552"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/3510003.3510625"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TG.2019.2947597"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2019.00077"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/3130859.3131439"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TEVC.2005.856210"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2013.2294713"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/tciaig.2009.2038365"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TCIAIG.2016.2535416"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1609\/aiide.v4i1.18681"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/CIVTS.2013.6612283"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2463372.2463534"}],"event":{"name":"2025 IEEE Conference on Software Testing, Verification and Validation (ICST)","start":{"date-parts":[[2025,3,31]]},"location":"Napoli, Italy","end":{"date-parts":[[2025,4,4]]}},"container-title":["2025 IEEE Conference on Software Testing, Verification and Validation (ICST)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx8\/10988917\/10988918\/10988927.pdf?arnumber=10988927","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:16:56Z","timestamp":1747808216000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10988927\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2025,3,31]]},"references-count":36,"URL":"https:\/\/doi.org\/10.1109\/icst62969.2025.10988927","relation":{},"subject":[],"published":{"date-parts":[[2025,3,31]]}}}