{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T22:15:31Z","timestamp":1729635331336,"version":"3.28.0"},"reference-count":19,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2011,9]]},"DOI":"10.1109\/socc.2011.6085105","type":"proceedings-article","created":{"date-parts":[[2011,11,23]],"date-time":"2011-11-23T16:54:27Z","timestamp":1322067267000},"page":"207-212","source":"Crossref","is-referenced-by-count":2,"title":["CGA: Combining cluster analysis with genetic algorithm for regression suite reduction of microprocessors"],"prefix":"10.1109","author":[{"given":"Liucheng","family":"Guo","sequence":"first","affiliation":[]},{"given":"Jiangfang","family":"Yi","sequence":"additional","affiliation":[]},{"given":"Liang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Xiaoyin","family":"Wang","sequence":"additional","affiliation":[]},{"given":"Dong","family":"Tong","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"crossref","first-page":"102","DOI":"10.1109\/MDT.2004.1277902","article-title":"Automatic test program generation: A case study","volume":"21","author":"corno","year":"2004","journal-title":"IEEE Design & Test of Computers"},{"journal-title":"Data Mining Concepts and Techniques","year":"2006","author":"kamber","key":"17"},{"journal-title":"A Genetic Algorithm for Resource-Constrained Scheduling","year":"1996","author":"wall","key":"18"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2007.06.003"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1016\/S0306-4379(01)00008-4"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1096-908X(199901\/02)11:1<19::AID-SMR182>3.0.CO;2-M"},{"key":"14","first-page":"133","article-title":"A genetic algorithm for test-suite reduction","volume":"1","author":"ma","year":"2005","journal-title":"IEEE International Conference on Systems Man and Cybernetics"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1023\/A:1019225027893"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1016\/0377-2217(95)00159-X"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1016\/j.tcs.2008.03.020"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1109\/APSEC.1997.640195"},{"key":"10","doi-asserted-by":"publisher","DOI":"10.1142\/S0218126602000446"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1145\/240518.240599"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0255(03)00060-4"},{"journal-title":"Computers and Intractability A Guide to the Theory of NP-Completeness","year":"1979","author":"garey","key":"6"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.11.706"},{"journal-title":"Effective Functional Verification Principles and Processes","year":"2006","author":"vasudevan","key":"4"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1145\/152388.152391"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1287\/moor.4.3.233"}],"event":{"name":"2011 IEEE 24th International SOC Conference (SOCC)","start":{"date-parts":[[2011,9,26]]},"location":"Taipei, Taiwan","end":{"date-parts":[[2011,9,28]]}},"container-title":["2011 IEEE International SOC Conference"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6076821\/6085068\/06085105.pdf?arnumber=6085105","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,20]],"date-time":"2017-06-20T06:15:22Z","timestamp":1497939322000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6085105\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2011,9]]},"references-count":19,"URL":"https:\/\/doi.org\/10.1109\/socc.2011.6085105","relation":{},"subject":[],"published":{"date-parts":[[2011,9]]}}}