{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,28]],"date-time":"2025-09-28T04:11:11Z","timestamp":1759032671530,"version":"3.37.3"},"reference-count":55,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"3","license":[{"start":{"date-parts":[[2018,9,1]],"date-time":"2018-09-01T00:00:00Z","timestamp":1535760000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61633005","61773080"],"award-info":[{"award-number":["61633005","61773080"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IEEE Trans. Rel."],"published-print":{"date-parts":[[2018,9]]},"DOI":"10.1109\/tr.2018.2833449","type":"journal-article","created":{"date-parts":[[2018,6,27]],"date-time":"2018-06-27T18:36:02Z","timestamp":1530124562000},"page":"802-831","source":"Crossref","is-referenced-by-count":6,"title":["Test-Algebra-Based Fault Location Analysis for the Concurrent Combinatorial Testing"],"prefix":"10.1109","volume":"67","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9562-3865","authenticated-orcid":false,"given":"Guanqiu","family":"Qi","sequence":"first","affiliation":[]},{"given":"Wei-Tek","family":"Tsai","sequence":"additional","affiliation":[]},{"given":"Charles J.","family":"Colbourn","sequence":"additional","affiliation":[]},{"given":"Jie","family":"Luo","sequence":"additional","affiliation":[]},{"given":"Zhiqin","family":"Zhu","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/HPCSIM.2009.5192685"},{"key":"ref38","first-page":"1","article-title":"Expected time to detection of interaction faults","author":"bryce","year":"2011","journal-title":"J Comb Math Comb Comput"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831736"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/1883612.1883618"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.319"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/302405.302640"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/1276958.1277173"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1080\/00401706.1998.10485524"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/ISESE.2004.1334893"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010257"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.52"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1007512.1007519"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.146"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCSW.2012.46"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/CLOUD.2012.49"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4612-1478-6"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1002\/j.1538-7305.1992.tb00164.x"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/4372.4375"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70719"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/52.536462"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1134\/S0361768811030029"},{"key":"ref25","article-title":"Covering arrays and hash families","volume":"29","author":"colbourn","year":"2011","journal-title":"Information Security Coding Theory and Related Combinatorics (NATO Science for Peace and Security Series - D Information and Communication Security)"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/ISADS.2015.53"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2014.11"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.1998.731623"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.149"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/SEW.2006.26"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2014.13"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/IWAST.2013.6595786"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.08.001"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1109\/SERE.2014.26"},{"journal-title":"Testing Computer Software","year":"1999","author":"kaner","key":"ref12"},{"key":"ref13","first-page":"1","article-title":"Certified tester foundation level syllabus","author":"muller","year":"2011","journal-title":"Journal of International Software Testing Qualifications Board"},{"year":"2018","key":"ref14","article-title":"Software testing"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.319"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.85"},{"key":"ref17","first-page":"320","author":"chen","year":"2005","journal-title":"Adaptive Random Testing"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.15"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ECBS.2011.9"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1007\/s11704-016-5081-x"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-981-10-4481-6"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-60566-731-7.ch014"},{"key":"ref5","first-page":"63","article-title":"Scalable saas\n indexing algorithms with automated redundancy and recovery management","volume":"7","author":"tsai","year":"2013","journal-title":"Int J Software Informatics"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2017.10.005"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/32.605761"},{"article-title":"Practical\n combinatorial testing","year":"2017","author":"kuhn","key":"ref49"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2017.07.003"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.117"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698916"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1145\/2001420.2001460"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-31612-8_15"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1109\/CLUSTR.2006.311882"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1016\/j.simpat.2016.08.003"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.149"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/SOSE.2015.12"}],"container-title":["IEEE Transactions on Reliability"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/24\/8452065\/08398472.pdf?arnumber=8398472","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:09:20Z","timestamp":1642003760000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8398472\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,9]]},"references-count":55,"journal-issue":{"issue":"3"},"URL":"https:\/\/doi.org\/10.1109\/tr.2018.2833449","relation":{},"ISSN":["0018-9529","1558-1721"],"issn-type":[{"type":"print","value":"0018-9529"},{"type":"electronic","value":"1558-1721"}],"subject":[],"published":{"date-parts":[[2018,9]]}}}