{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,12,23]],"date-time":"2025-12-23T15:41:12Z","timestamp":1766504472827},"reference-count":28,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2015,4]]},"DOI":"10.1109\/icstw.2015.7107453","type":"proceedings-article","created":{"date-parts":[[2015,5,14]],"date-time":"2015-05-14T20:37:48Z","timestamp":1431635868000},"page":"1-6","source":"Crossref","is-referenced-by-count":11,"title":["Mutation testing in practice using Ruby"],"prefix":"10.1109","author":[{"given":"Nan","family":"Li","sequence":"first","affiliation":[]},{"given":"Michael","family":"West","sequence":"additional","affiliation":[]},{"given":"Anthony","family":"Escalona","sequence":"additional","affiliation":[]},{"given":"Vinicius H. S.","family":"Durelli","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"article-title":"Amazon elastic compute cloud","year":"2006","author":"inc","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.191"},{"key":"ref12","first-page":"95","article-title":"Schema-based mutation analysis: A new test data adequacy assessment method","author":"untch","year":"1995","journal-title":"Clemson Department of Computer Science Technical report"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1988.93697"},{"key":"ref14","first-page":"171","author":"krauser","year":"1988","journal-title":"High performance testing on SIMD machines"},{"key":"ref15","first-page":"257","article-title":"Mutation testing of software using a MIMD computer","author":"offutt","year":"1992","journal-title":"1992 International Conference on Parallel Processing"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1471"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.308"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.20"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/227607.227610"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.49"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2009.30"},{"article-title":"Behavior driven development for Rbuy","year":"2009","author":"chelimsky","key":"ref27"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1145\/567446.567468"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568278"},{"key":"ref5","article-title":"Is mutation an appropriate tool for testing experiments?","author":"andrews","year":"2005","journal-title":"Proceedings of the 27th International Conference on Software Engineering"},{"article-title":"Mutation testing tool for Ruby","year":"2012","author":"schirp","key":"ref8"},{"article-title":"Statement coverage for Ruby","year":"2010","author":"olszowka","key":"ref7"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/32.238581"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"article-title":"Description of method-level mutation operators for Java","year":"2015","author":"ma","key":"ref20"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.08.024"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380210704"},{"key":"ref24","article-title":"Mutation operators for Ada","author":"offutt","year":"1996","journal-title":"Technical Report ISSE-TR-96-09"},{"key":"ref23","article-title":"Design of mutant operators for the C programming language","author":"agrawal","year":"1989","journal-title":"Technical Report SERC-TR-41-P"},{"journal-title":"Atlassian","article-title":"Jira issue tracking product","year":"2002","key":"ref26"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.33"}],"event":{"name":"2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW)","start":{"date-parts":[[2015,4,13]]},"location":"Graz, Austria","end":{"date-parts":[[2015,4,17]]}},"container-title":["2015 IEEE Eighth International Conference on Software Testing, Verification and Validation Workshops (ICSTW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7100633\/7107396\/07107453.pdf?arnumber=7107453","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,3,24]],"date-time":"2017-03-24T18:33:43Z","timestamp":1490380423000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7107453\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2015,4]]},"references-count":28,"URL":"https:\/\/doi.org\/10.1109\/icstw.2015.7107453","relation":{},"subject":[],"published":{"date-parts":[[2015,4]]}}}