{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,19]],"date-time":"2025-06-19T04:11:35Z","timestamp":1750306295172,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":39,"publisher":"ACM","license":[{"start":{"date-parts":[[2016,5,14]],"date-time":"2016-05-14T00:00:00Z","timestamp":1463184000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Government of the Republic of Ecuador's Department of Higher Education, Science, Technology and Innovation (Senescyt)"}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,5,14]]},"DOI":"10.1145\/2889160.2889190","type":"proceedings-article","created":{"date-parts":[[2016,5,16]],"date-time":"2016-05-16T12:27:23Z","timestamp":1463401643000},"page":"374-383","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":3,"title":["Impact of CS programs on the quality of test cases generation"],"prefix":"10.1145","author":[{"given":"Omar S.","family":"G\u00f3mez","sequence":"first","affiliation":[{"name":"Prometeo-Senescyt and Escuela Superior Polit\u00e9cnica de Chimborazo, Riobamba, Ecuador"}]},{"given":"Sira","family":"Vegas","sequence":"additional","affiliation":[{"name":"Universidad Polit\u00e9cnica de Madrid, Boadilla del Monte, Spain"}]},{"given":"Natalia","family":"Juristo","sequence":"additional","affiliation":[{"name":"Universidad Polit\u00e9cnica de Madrid, Spain and University of Oulu, Oulu, Finland"}]}],"member":"320","published-online":{"date-parts":[[2016,5,14]]},"reference":[{"volume-title":"Association for Computing Machinery (ACM) and IEEE Computer Society. ACM","year":"2013","author":"Computer Science Curricula CM.","key":"e_1_3_2_1_1_1"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1002\/0470114754"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/69605.2085"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232881"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.5555\/79060"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1109\/MC.1987.1663532"},{"key":"e_1_3_2_1_7_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2005.57"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.903172"},{"volume-title":"Rand McNally","year":"1976","author":"Cook T.","key":"e_1_3_2_1_9_1"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.1145\/2460999.2461009"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSEET.2010.29"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.12.051"},{"volume-title":"Intl Thomson Business Pr","year":"2008","author":"Graham D.","key":"e_1_3_2_1_13_1"},{"volume-title":"Encuentro Nacional de Ciencias de la Computaci\u00f3n, (ENC2014), Ocotl\u00e1n de Morelos, Oaxaca, M\u00e9xico, noviembre","year":"2014","author":"G\u00f3mez O. S.","key":"e_1_3_2_1_14_1"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.5555\/42384"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/0471722146"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1980.230467"},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.5555\/786770.787074"},{"key":"e_1_3_2_1_19_1","unstructured":"IEEE. Ieee guide for software verification and validation plans. IEEE Std 1059-1993 pages i--87 1994.  IEEE. Ieee guide for software verification and validation plans. IEEE Std 1059-1993 pages i--87 1994."},{"volume-title":"Third, Edition. AUERBACH, 3 edition","year":"2008","author":"Jorgensen P. C.","key":"e_1_3_2_1_20_1"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3304-4"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"crossref","unstructured":"N.\n      Juristo\n     and \n      S.\n      Vegas\n  . \n  Functional testing structural testing and code reading: What fault type do they each detect? In R\n  . Conradi and A. Wang editors Empirical Methods and Studies in Software Engineering volume \n  2765\n   of \n  Lecture Notes in Computer Science pages \n  208\n  --\n  232\n  . \n  Springer Berlin -Heidelberg 2003\n  .  N. Juristo and S. Vegas. Functional testing structural testing and code reading: What fault type do they each detect? In R. Conradi and A. Wang editors Empirical Methods and Studies in Software Engineering volume 2765 of Lecture Notes in Computer Science pages 208--232. Springer Berlin -Heidelberg 2003.","DOI":"10.1007\/978-3-540-45143-3_12"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.113"},{"key":"e_1_3_2_1_24_1","doi-asserted-by":"publisher","DOI":"10.5555\/645385.651507"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICCSIT.2009.5234587"},{"volume-title":"Structured Programming","year":"1979","author":"Linger R. C.","key":"e_1_3_2_1_26_1"},{"volume-title":"The craft of software testing: subsystem testing including object-based and object-oriented testing","year":"1995","author":"Marick B.","key":"e_1_3_2_1_27_1"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.5555\/983238"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1093\/biomet\/78.3.691"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.5555\/987680.987730"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(97)00028-1"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1007\/978-1-4757-3692-2"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.28945\/295"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/857197.857886"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/AERO.1995.468919"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/CSEET.2011.5876141"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.18260\/1-2--21511"},{"key":"e_1_3_2_1_38_1","first-page":"933","volume-title":"IEEE SMC '99 Conference Proceedings. 1999 IEEE International Conference on","volume":"1","author":"Yan C. H.","year":"1999"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1109\/HASE.2011.12"}],"event":{"name":"ICSE '16: 38th International Conference on Software Engineering","sponsor":["ACM Association for Computing Machinery","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS\\TCSE TC on Software Engineering","IEEE-CS\\DATC IEEE Computer Society"],"location":"Austin Texas","acronym":"ICSE '16"},"container-title":["Proceedings of the 38th International Conference on Software Engineering Companion"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2889160.2889190","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2889160.2889190","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:39:11Z","timestamp":1750221551000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2889160.2889190"}},"subtitle":["an empirical study"],"short-title":[],"issued":{"date-parts":[[2016,5,14]]},"references-count":39,"alternative-id":["10.1145\/2889160.2889190","10.1145\/2889160"],"URL":"https:\/\/doi.org\/10.1145\/2889160.2889190","relation":{},"subject":[],"published":{"date-parts":[[2016,5,14]]},"assertion":[{"value":"2016-05-14","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}