{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T20:01:23Z","timestamp":1760299283676,"version":"3.37.3"},"reference-count":105,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"10","license":[{"start":{"date-parts":[[2016,10,1]],"date-time":"2016-10-01T00:00:00Z","timestamp":1475280000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"funder":[{"name":"Spanish Ministry of Economy and Competitiveness","award":["TIN2010-20057-C03-01","TIN2013-46928-C3-1-R"],"award-info":[{"award-number":["TIN2010-20057-C03-01","TIN2013-46928-C3-1-R"]}]},{"name":"Principality of Asturias","award":["GRUPIN14-007"],"award-info":[{"award-number":["GRUPIN14-007"]}]},{"DOI":"10.13039\/501100008530","name":"ERDF","doi-asserted-by":"crossref","id":[{"id":"10.13039\/501100008530","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2016,10,1]]},"DOI":"10.1109\/tse.2016.2519032","type":"journal-article","created":{"date-parts":[[2016,1,18]],"date-time":"2016-01-18T14:08:40Z","timestamp":1453126120000},"page":"941-959","source":"Crossref","is-referenced-by-count":11,"title":["Coverage-Aware Test Database Reduction"],"prefix":"10.1109","volume":"42","author":[{"ORCID":"https:\/\/orcid.org\/0000-0002-1091-934X","authenticated-orcid":false,"given":"Javier","family":"Tuya","sequence":"first","affiliation":[]},{"given":"Claudio","family":"de la Riva","sequence":"additional","affiliation":[]},{"given":"Maria Jose","family":"Suarez-Cabal","sequence":"additional","affiliation":[]},{"given":"Raquel","family":"Blanco","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2006.27"},{"article-title":"An analysis of the effectiveness of different coverage criteria for testing relational database schema integrity constraints","year":"2015","author":"mcminn","key":"ref38"},{"key":"ref33","first-page":"123","article-title":"Exploring test adequacy for database systems","author":"willmor","year":"0","journal-title":"3rd UK Software Testing Research Workshop"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/940071.940086"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101935"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610403"},{"key":"ref37","first-page":"584","article-title":"Structural coverage criteria for testing SQL queries","volume":"15","author":"su\u00e1rez-cabal","year":"2009","journal-title":"J Universal Comput Sci"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/1041685.1029929"},{"key":"ref35","first-page":"230","article-title":"Data flow testing of SQL-based active database applications","author":"leitao","year":"0","journal-title":"Proc 3rd Int Conf Software Engineering"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/1342211.1342228"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2008.33"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.86"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/1698750.1698754"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2013.15"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/MUTATION.2006.13"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2014.26"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.462"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2009.43"},{"key":"ref101","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628053"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100056"},{"key":"ref100","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100138"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2011.63"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/32.48939"},{"key":"ref51","first-page":"161","article-title":"Automatic generation of database instances for white-box testing","author":"zhang","year":"0","journal-title":"Proc 25th Comput Softw Appl Conf"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/2491529"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100152"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1007\/s10515-014-0158-y"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/1273463.1273484"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/1808266.1808276"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2014.23"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2011.5767876"},{"key":"ref52","first-page":"238","article-title":"Query-aware test generation using a relational constraint solver","author":"khalek","year":"0","journal-title":"Proc 23rd IEEE\/ACM Int Conf Autom Softw Eng"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.386"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.424"},{"journal-title":"Software and Systems Engineering - Software Testing - Part 1 Concepts and Definitions","year":"2013","key":"ref3"},{"article-title":"An investigation of three forms of the modified condition decision coverage (MCDC) criterion","year":"2001","author":"chilenski","key":"ref6"},{"year":"1992","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1002\/stv.430"},{"key":"ref49","article-title":"Multi-RQP: Generating test databases for the functional testing of OLTP application","author":"binnig","year":"0","journal-title":"Proceedings of the 1st International Workshop on Testing Database Systems"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/1594156.1594164"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.256"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134301"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/1385269.1385277"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2007.367896"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC-PART.2006.28"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1145\/347324.348954"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809163"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062486"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.286"},{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2013.6557874"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2013.04.004"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2011.6080803"},{"key":"ref70","first-page":"285","article-title":"Regression testing of database applications","author":"daou","year":"0","journal-title":"Proc ACM Symp Appl Comput"},{"article-title":"Data lineage: A survey","year":"2009","author":"ikeda","key":"ref76"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1145\/1376616.1376716"},{"key":"ref74","first-page":"227","article-title":"Data provenance: A categorization of existing approaches","author":"glavic","year":"0","journal-title":"In Proc of Datenbanksysteme in Business Technologie und Web (BTW2007)"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1145\/1084805.1084812"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-002-0083-8"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-53974-9_7"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1838126.1838133"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/1594156.1594163"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.47"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1145\/1988842.1988843"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.206"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/s00778-006-0028-8"},{"key":"ref66","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s00778-006-0028-8","article-title":"A framework for efficient regression tests on database applications","volume":"16","author":"haftmann","year":"2007","journal-title":"VLDB J"},{"key":"ref67","first-page":"212","article-title":"Regression test case selection for testing database applications","volume":"3","author":"sharma","year":"2013","journal-title":"International Journal of Innovative Technology and Exploring Engineering"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.4018\/978-1-59140-255-8.ch008"},{"journal-title":"Information Technology - Database Languages &#x2013; SQL","year":"1999","key":"ref2"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.2005.15"},{"key":"ref1","article-title":"NoSQL Database: New era of databases for big data analytics - classification, characteristics and comparison","volume":"6","author":"moniruzzaman","year":"2013","journal-title":"International Journal Database Theory and Application"},{"key":"ref95","doi-asserted-by":"publisher","DOI":"10.1145\/319732.319745"},{"key":"ref94","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.457"},{"article-title":"Automating structural tests using evolutionary algorithms","year":"2000","author":"baresel","key":"ref93"},{"key":"ref92","doi-asserted-by":"publisher","DOI":"10.1162\/evco.2006.14.1.41"},{"key":"ref105","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2610388"},{"key":"ref91","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.1998.732680"},{"key":"ref104","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2012.31"},{"key":"ref90","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.100"},{"key":"ref103","doi-asserted-by":"publisher","DOI":"10.1145\/1982595.1982606"},{"key":"ref102","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.308"},{"key":"ref98","first-page":"402","article-title":"Is mutation an appropriate tool for testing experiments?","author":"andrews","year":"0","journal-title":"Proc 27th Int l Conf Software Eng"},{"key":"ref99","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635929"},{"key":"ref96","first-page":"23","article-title":"Optimization of nested SQL-queries revisted","author":"ganski","year":"0","journal-title":"Proc ACM SIGMOD Int Conf Manage Data"},{"year":"2015","key":"ref97"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1414004.1414011"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1097-024X(19980410)28:4<347::AID-SPE145>3.0.CO;2-L"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(99)00048-5"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/ICSM.1998.738487"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.256"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/362384.362685"},{"journal-title":"The Relational Model for Database Management version 2","year":"1990","author":"codd","key":"ref16"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2000.839437"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.06.009"},{"article-title":"Perm: Efficient provenance support for relational databases","year":"2010","author":"glavic","key":"ref81"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.03.009"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1109\/ICDE.2009.15"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2005.27"},{"article-title":"Lineage tracing in data warehouses","year":"2002","author":"cui","key":"ref83"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-44503-X_20"},{"key":"ref89","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.294"},{"key":"ref85","doi-asserted-by":"publisher","DOI":"10.1145\/1516360.1516472"},{"key":"ref86","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-41660-6_16"},{"key":"ref87","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(01)00189-6"},{"key":"ref88","doi-asserted-by":"publisher","DOI":"10.1145\/2379776.2379787"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/7590232\/07384760.pdf?arnumber=7384760","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T11:39:33Z","timestamp":1641987573000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/7384760\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,10,1]]},"references-count":105,"journal-issue":{"issue":"10"},"URL":"https:\/\/doi.org\/10.1109\/tse.2016.2519032","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2016,10,1]]}}}