{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:35:07Z","timestamp":1763458507596,"version":"3.45.0"},"publisher-location":"New York, NY, USA","reference-count":28,"publisher":"ACM","license":[{"start":{"date-parts":[[2017,8,25]],"date-time":"2017-08-25T00:00:00Z","timestamp":1503619200000},"content-version":"vor","delay-in-days":365,"URL":"http:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100000161","name":"National Institute of Standards and Technology","doi-asserted-by":"publisher","award":["70NANB15H199"],"award-info":[{"award-number":["70NANB15H199"]}],"id":[{"id":"10.13039\/100000161","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2016,8,25]]},"DOI":"10.1145\/2970276.2970325","type":"proceedings-article","created":{"date-parts":[[2016,8,26]],"date-time":"2016-08-26T08:40:09Z","timestamp":1472200809000},"page":"637-647","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":19,"title":["Applying combinatorial test data generation to big data applications"],"prefix":"10.1145","author":[{"given":"Nan","family":"Li","sequence":"first","affiliation":[{"name":"Medidata Solutions, USA"}]},{"given":"Yu","family":"Lei","sequence":"additional","affiliation":[{"name":"University of Texas at Arlington, USA"}]},{"given":"Haider Riaz","family":"Khan","sequence":"additional","affiliation":[{"name":"Medidata Solutions, USA"}]},{"given":"Jingshu","family":"Liu","sequence":"additional","affiliation":[{"name":"Medidata Solutions, USA"}]},{"given":"Yun","family":"Guo","sequence":"additional","affiliation":[{"name":"George Mason University, USA"}]}],"member":"320","published-online":{"date-parts":[[2016,8,25]]},"reference":[{"key":"e_1_3_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.14778\/2367502.2367530"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.5555\/1355340"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/1989323.1989395"},{"key":"e_1_3_2_1_4_1","doi-asserted-by":"publisher","DOI":"10.5555\/1083592.1083719"},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062495"},{"key":"e_1_3_2_1_6_1","unstructured":"pages 146\u2013155 May 2005."},{"key":"e_1_3_2_1_7_1","volume-title":"http:\/\/checkstyle.sourceforge.net\/, last access","author":"Burn O.","year":"2016","unstructured":"O. Burn. Checkstyle. Online, 2001. http:\/\/checkstyle.sourceforge.net\/, last access April 2016."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1145\/347324.348954"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.605761"},{"key":"e_1_3_2_1_10_1","volume-title":"http:\/\/www.pentaho.com\/, last access","author":"P. Corporation","year":"2016","unstructured":"P. Corporation. Pentaho. Online, 2004. http:\/\/www.pentaho.com\/, last access April 2016."},{"key":"e_1_3_2_1_11_1","volume-title":"https:\/\/github.com\/AlDanial\/cloc, last access","author":"Danial A.","year":"2016","unstructured":"A. Danial. CLOC. Online, 2006. https:\/\/github.com\/AlDanial\/cloc, last access April 2016."},{"key":"e_1_3_2_1_12_1","volume-title":"http:\/\/sqoop.apache.org\/, last access","author":"Foundation A. S.","year":"2014","unstructured":"A. S. Foundation. Apache Sqoop. Online, 2011. http:\/\/sqoop.apache.org\/, last access Sept 2014."},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1145\/1065010.1065036"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/191839.191886"},{"key":"e_1_3_2_1_15_1","volume-title":"Online, 2009","author":"Hoffmann M.","year":"2016","unstructured":"M. Hoffmann, B. Janiczak, E. Mandrikov, and M. Friedenhagen. Jacoco code coverage tool. Online, 2009. http:\/\/eclemma.org\/jacoco\/, last access April 2016."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/ACCESS.2014.2332453"},{"key":"e_1_3_2_1_17_1","volume-title":"https:\/\/jenkins-ci.org\/, last access","author":"Kawaguchi K.","year":"2016","unstructured":"K. Kawaguchi. Jenkins. Online, 2011. https:\/\/jenkins-ci.org\/, last access April 2016."},{"key":"e_1_3_2_1_18_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.24"},{"key":"e_1_3_2_1_19_1","volume-title":"Online, 2009","author":"Kuhn R.","year":"2015","unstructured":"R. Kuhn, R. Kacker, and Y. Lei. Automated combinatorial testing for software (ACTS). Online, 2009. http:\/\/csrc.nist.gov\/groups\/SNS\/acts\/, last access May 2015."},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.v18:3"},{"key":"e_1_3_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.36"},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693083"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2015.7102619"},{"key":"e_1_3_2_1_24_1","series-title":"Lecture Notes in Computer Science","first-page":"154","volume-title":"Advancing Big Data Benchmarks","author":"Ming Z.","unstructured":"Z. Ming, C. Luo, W. Gao, R. Han, Q. Yang, L. Wang, and J. Zhan. Bdgs: A scalable big data generator suite in big data benchmarking. In Advancing Big Data Benchmarks, volume 8585 of Lecture Notes in Computer Science, pages 138\u2013154. Springer International Publishing, 2014."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1145\/1559845.1559873"},{"volume-title":"http:\/\/www.sonarqube.org\/, last access","year":"2016","key":"e_1_3_2_1_26_1","unstructured":"SonarSource. Sonarqube. Online, 2001. http:\/\/www.sonarqube.org\/, last access April 2016."},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1145\/2393596.2393637"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100093"}],"event":{"name":"ASE'16: ACM\/IEEE International Conference on Automated Software Engineering","sponsor":["SIGAI ACM Special Interest Group on Artificial Intelligence","SIGSOFT ACM Special Interest Group on Software Engineering","IEEE-CS Computer Society"],"location":"Singapore Singapore","acronym":"ASE'16"},"container-title":["Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970325","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970276.2970325","content-type":"application\/pdf","content-version":"vor","intended-application":"syndication"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/2970276.2970325","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,11,18]],"date-time":"2025-11-18T09:28:58Z","timestamp":1763458138000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/2970276.2970325"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016,8,25]]},"references-count":28,"alternative-id":["10.1145\/2970276.2970325","10.1145\/2970276"],"URL":"https:\/\/doi.org\/10.1145\/2970276.2970325","relation":{},"subject":[],"published":{"date-parts":[[2016,8,25]]},"assertion":[{"value":"2016-08-25","order":3,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}