{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,12]],"date-time":"2025-10-12T20:09:27Z","timestamp":1760299767365,"version":"3.37.3"},"reference-count":84,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"5","license":[{"start":{"date-parts":[[2019,5,1]],"date-time":"2019-05-01T00:00:00Z","timestamp":1556668800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/creativecommons.org\/licenses\/by\/3.0\/legalcode"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2019,5,1]]},"DOI":"10.1109\/tse.2017.2786286","type":"journal-article","created":{"date-parts":[[2017,12,27]],"date-time":"2017-12-27T19:36:54Z","timestamp":1514403414000},"page":"427-463","source":"Crossref","is-referenced-by-count":12,"title":["Automatic Detection and Removal of Ineffective Mutants for the Mutation Analysis of Relational Database Schemas"],"prefix":"10.1109","volume":"45","author":[{"ORCID":"https:\/\/orcid.org\/0000-0001-9137-7433","authenticated-orcid":false,"given":"Phil","family":"McMinn","sequence":"first","affiliation":[]},{"ORCID":"https:\/\/orcid.org\/0000-0003-4479-9478","authenticated-orcid":false,"given":"Chris J.","family":"Wright","sequence":"additional","affiliation":[]},{"given":"Colton J.","family":"McCurdy","sequence":"additional","affiliation":[]},{"given":"Gregory M.","family":"Kapfhammer","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.06.030"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1007\/BF00625279"},{"key":"ref70","article-title":"Regression testing","author":"kapfhammer","year":"2010","journal-title":"Encyclopaedia of Software Eng"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483773"},{"key":"ref77","doi-asserted-by":"publisher","DOI":"10.1080\/07421222.1996.11518099"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380210704"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.4370040303"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC-PART.2008.18"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2010.56"},{"key":"ref78","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2491431"},{"key":"ref79","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.03.009"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1242572.1242663"},{"key":"ref32","first-page":"1137","article-title":"Mutation operators for cognitive agent programs","author":"savarimuthu","year":"2013","journal-title":"Proc Int Conf Auton Agents and Multi Agent Syst"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2222444.2222460"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.31"},{"key":"ref37","first-page":"936","article-title":"Trivial compiler equivalence: a large scale empirical study of a simple, fast and effective equivalent mutant detection technique","author":"papadakis","year":"2015","journal-title":"Proceedings of the International Conference on Software Engineering ICSE'94"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.162"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1145\/2479440.2479449"},{"key":"ref34","first-page":"278","article-title":"A generic metamodel for security policies mutation","author":"mouelhi","year":"2008","journal-title":"Proc 3rd Int Workshop Mutation Testing"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2016.01.007"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(93)90005-I"},{"key":"ref61","first-page":"ii-257","article-title":"Mutation testing of software using a MIMD computer","author":"offutt","year":"1992","journal-title":"Proc Int Conf Parallel Process"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.1991.170202"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2016.17"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100138"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2015.7107456"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/154183.154265"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134425"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2631832"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/1982595.1982606"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483782"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2012.31"},{"article-title":"A comprehensive framework for testing database-centric applications","year":"2007","author":"kapfhammer","key":"ref2"},{"article-title":"What's the value of your data?","year":"2015","author":"glikman","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.30"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.93"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2931037.2931040"},{"year":"2003","key":"ref24"},{"key":"ref23","first-page":"591","article-title":"The million song dataset","author":"bertin-mahieux","year":"2011","journal-title":"Proc Int Conf Music Inform Retrieval"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2016.04.012"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/32.57624"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1145\/2002951.2002955"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC.PART.2007.12"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1109\/ICSME.2016.92"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1993.346062"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1689(199912)9:4<205::AID-STVR186>3.0.CO;2-X"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1145\/2897010.2897017"},{"key":"ref54","first-page":"101","article-title":"A critique and improvement of the CL common language effect size statistics of McGraw and Wong","volume":"25","author":"vargha","year":"2000","journal-title":"Journal of Educational and Behavioral Statistics"},{"journal-title":"Database System Concepts","year":"2010","author":"silberschatz","key":"ref53"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1486"},{"key":"ref10","first-page":"1243","article-title":"Simple and realistic data generation","author":"houkj\u00e6r","year":"2006","journal-title":"Proc 32nd Int Conf Very Large Data Bases"},{"article-title":"Basic mistakes in database testing.","year":"2011","author":"guz","key":"ref11"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1689(199709)7:3<165::AID-STVR143>3.0.CO;2-U"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.47"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2818639"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2013.15"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2014.26"},{"key":"ref82","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2017.61"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1342211.1342228"},{"key":"ref81","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2005.27"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"key":"ref84","doi-asserted-by":"publisher","DOI":"10.1145\/2896921.2896933"},{"key":"ref18","article-title":"Software testing","author":"kapfhammer","year":"2004","journal-title":"The Computer Science Handbook"},{"key":"ref83","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568265"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2009.37"},{"key":"ref80","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.462"},{"year":"2016","key":"ref4"},{"year":"2016","key":"ref3"},{"key":"ref6","article-title":"Amazon: Our cloud powered Obama's campaign","author":"butler","year":"2012","journal-title":"Netw World"},{"article-title":"Five popular databases for mobile.","year":"2014","author":"roukounaki","key":"ref5"},{"article-title":"Releasing the StackLite dataset of Stack Overflow questions and tags.","year":"2016","author":"robinson","key":"ref8"},{"year":"2016","key":"ref7"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100152"},{"article-title":"With the recent prevelance of NoSQL databases why would I use a SQL database?","year":"2010","author":"marisic","key":"ref9"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2006.06.009"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1145\/186258.186523"},{"key":"ref48","article-title":"Mining challenge 2013: Stack overflow","author":"bacchelli","year":"2013","journal-title":"Procs of the Working Conf on Mining Software Repositories"},{"article-title":"Mutation analysis of relational database schemas","year":"2015","author":"wright","key":"ref47"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-24855-2_155"},{"year":"2017","key":"ref41"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/32.92910"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2015.07.009"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/8714098\/08240964.pdf?arnumber=8240964","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,12]],"date-time":"2022-01-12T16:26:26Z","timestamp":1642004786000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/8240964\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019,5,1]]},"references-count":84,"journal-issue":{"issue":"5"},"URL":"https:\/\/doi.org\/10.1109\/tse.2017.2786286","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2019,5,1]]}}}