{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:25:46Z","timestamp":1750220746600,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":35,"publisher":"ACM","license":[{"start":{"date-parts":[[2020,6,27]],"date-time":"2020-06-27T00:00:00Z","timestamp":1593216000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"name":"Australian Research Council","award":["LP160101691"],"award-info":[{"award-number":["LP160101691"]}]},{"name":"National Natural Science Foundation of China","award":["61872167"],"award-info":[{"award-number":["61872167"]}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2020,6,27]]},"DOI":"10.1145\/3387940.3391482","type":"proceedings-article","created":{"date-parts":[[2020,9,25]],"date-time":"2020-09-25T15:22:00Z","timestamp":1601047320000},"page":"396-403","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["ARCAMETES"],"prefix":"10.1145","author":[{"given":"Darryl","family":"Jarman","sequence":"first","affiliation":[{"name":"Adobe, Inc., Lehi, Utah, USA"}]},{"given":"Riley","family":"Smith","sequence":"additional","affiliation":[{"name":"Adobe, Inc., Lehi, Utah, USA"}]},{"given":"Owen","family":"Johnston","sequence":"additional","affiliation":[{"name":"Adobe, Inc., Lehi, Utah, USA"}]},{"given":"Dave","family":"Towey","sequence":"additional","affiliation":[{"name":"School of Computer Science, University of Nottingham Ningbo China, Ningbo, Zhejiang, China"}]},{"given":"Zhi Quan","family":"Zhou","sequence":"additional","affiliation":[{"name":"School of Computing &amp; IT, University of Wollongong, Wollongong, NSW, Australia"}]}],"member":"320","published-online":{"date-parts":[[2020,9,25]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"Accessed: 2020-01-18. NIST\/SEMATECH e-Handbook of Statistical Methods. https:\/\/www.itl.nist.gov\/div898\/handbook\/eda\/section3\/eda35.htm  Accessed: 2020-01-18. NIST\/SEMATECH e-Handbook of Statistical Methods. https:\/\/www.itl.nist.gov\/div898\/handbook\/eda\/section3\/eda35.htm"},{"key":"e_1_3_2_1_2_1","unstructured":"Accessed: 2020-01-18. NIST\/SEMATECH e-Handbook of Statistical Methods. https:\/\/www.itl.nist.gov\/div898\/handbook\/eda\/section3\/4plot.htm  Accessed: 2020-01-18. NIST\/SEMATECH e-Handbook of Statistical Methods. https:\/\/www.itl.nist.gov\/div898\/handbook\/eda\/section3\/4plot.htm"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1145\/170035.170072"},{"key":"e_1_3_2_1_4_1","volume-title":"Metamorphic Testing: A New Approach for Generating Next Test Cases. Technical Report HKUST-CS98-01. Department of Computer Science","author":"Chen T. Y.","year":"1998","unstructured":"T. Y. Chen , S. C. Cheung , and S. M. Yiu . 1998 . Metamorphic Testing: A New Approach for Generating Next Test Cases. Technical Report HKUST-CS98-01. Department of Computer Science , Hong Kong University of Science and Technology , Hong Kong . T. Y. Chen, S. C. Cheung, and S. M. Yiu. 1998. Metamorphic Testing: A New Approach for Generating Next Test Cases. Technical Report HKUST-CS98-01. Department of Computer Science, Hong Kong University of Science and Technology, Hong Kong."},{"key":"e_1_3_2_1_5_1","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1145\/3143561","article-title":"Metamorphic Testing: A Review of Challenges and Opportunities","volume":"51","author":"Chen Tsong Yueh","year":"2018","unstructured":"Tsong Yueh Chen , Fei-Ching Kuo , Huai Liu , Pak-Lok Poon , Dave Towey , T. H. Tse , and Zhi Quan Zhou . 2018 . Metamorphic Testing: A Review of Challenges and Opportunities . ACM Computing Surveys 51 , 1 (Jan. 2018), 4:1-4:27. https:\/\/doi.org\/10.1145\/3143561 10.1145\/3143561 Tsong Yueh Chen, Fei-Ching Kuo, Huai Liu, Pak-Lok Poon, Dave Towey, T. H. Tse, and Zhi Quan Zhou. 2018. Metamorphic Testing: A Review of Challenges and Opportunities. ACM Computing Surveys 51, 1 (Jan. 2018), 4:1-4:27. https:\/\/doi.org\/10.1145\/3143561","journal-title":"ACM Computing Surveys"},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(02)00129-5"},{"key":"e_1_3_2_1_7_1","unstructured":"Aaron Clauset. Accessed: 2020-01-18. A Brief Primer on Probability Distributions. http:\/\/tuvalu.santafe.edu\/~aaronc\/courses\/7000\/csci7000-001_2011_L0.pdf  Aaron Clauset. Accessed: 2020-01-18. A Brief Primer on Probability Distributions. http:\/\/tuvalu.santafe.edu\/~aaronc\/courses\/7000\/csci7000-001_2011_L0.pdf"},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1214\/aoms\/1177706374"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1080\/01621459.1961.10482090"},{"key":"e_1_3_2_1_10_1","volume-title":"Differential Testing: A New Approach to Change Detection. 549--552. https:\/\/doi.org\/10.1145\/1295014.1295038","author":"Evans Bob","year":"2007","unstructured":"Bob Evans and Alberto Savoia . 2007 . Differential Testing: A New Approach to Change Detection. 549--552. https:\/\/doi.org\/10.1145\/1295014.1295038 10.1145\/1295014.1295038 Bob Evans and Alberto Savoia. 2007. Differential Testing: A New Approach to Change Detection. 549--552. https:\/\/doi.org\/10.1145\/1295014.1295038"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/JSEN.2013.2263381"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.5812\/ijem.3505"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2007.4385527"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1109\/MET.2019.00017"},{"key":"e_1_3_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2013.6698899"},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1594"},{"volume-title":"Accessed: 2020-01-18","author":"Richard Kuhn D.","key":"e_1_3_2_1_17_1","unstructured":"D. Richard Kuhn and Raghu N. Kacker . Accessed: 2020-01-18 . Computer Security Resource Center : Automated Combinatorial Testing for Software. https:\/\/csrc.nist.gov\/projects\/automated-combinatorial-testing-for-software D. Richard Kuhn and Raghu N. Kacker. Accessed: 2020-01-18. Computer Security Resource Center: Automated Combinatorial Testing for Software. https:\/\/csrc.nist.gov\/projects\/automated-combinatorial-testing-for-software"},{"key":"e_1_3_2_1_18_1","volume-title":"Introduction to Combinatorial Testing","author":"Kuhn D. Richard","unstructured":"D. Richard Kuhn , Raghu N. Kacker , and Yu Lei . 2013. Introduction to Combinatorial Testing ( 1 st ed.). Chapman & Hall\/CRC. D. Richard Kuhn, Raghu N. Kacker, and Yu Lei. 2013. Introduction to Combinatorial Testing (1st ed.). Chapman & Hall\/CRC.","edition":"1"},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1145\/3387940.3392694"},{"key":"e_1_3_2_1_20_1","volume-title":"A Partial Oracle for Uniformity Statistics. Software Quality Journal (07","author":"Patel Krishna","year":"2019","unstructured":"Krishna Patel and Robert Hierons . 2019. A Partial Oracle for Uniformity Statistics. Software Quality Journal (07 2019 ). https:\/\/doi.org\/10.1007\/s11219-019-09459-0 10.1007\/s11219-019-09459-0 Krishna Patel and Robert Hierons. 2019. A Partial Oracle for Uniformity Statistics. Software Quality Journal (07 2019). https:\/\/doi.org\/10.1007\/s11219-019-09459-0"},{"key":"e_1_3_2_1_21_1","unstructured":"M. Pezz\u00e8 and M. Young. 2008. Software Testing and Analysis: Process Principles and Techniques. Wiley New York.  M. Pezz\u00e8 and M. Young. 2008. Software Testing and Analysis: Process Principles and Techniques. Wiley New York."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2016.2532875"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2764464"},{"key":"e_1_3_2_1_24_1","volume-title":"Zhi Quan Zhou, and Tsong Yueh Chen. in press. Metamorphic Testing: Testing the Untestable","author":"Segura Sergio","year":"2018","unstructured":"Sergio Segura , Dave Towey , Zhi Quan Zhou, and Tsong Yueh Chen. in press. Metamorphic Testing: Testing the Untestable . IEEE Software ( in press). https:\/\/doi.org\/10.1109\/MS. 2018 .2875968 10.1109\/MS.2018.2875968 Sergio Segura, Dave Towey, Zhi Quan Zhou, and Tsong Yueh Chen. in press. Metamorphic Testing: Testing the Untestable. IEEE Software (in press). https:\/\/doi.org\/10.1109\/MS.2018.2875968"},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2019.00052"},{"key":"e_1_3_2_1_26_1","volume-title":"Proceedings of the 2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW). 190--193","author":"Smith R.","year":"2019","unstructured":"R. Smith , D. Jarman , R. Kacker , R. Kuhn , D. Simos , L. Kampel , M. Leithner , and G. Gosney . 2019. Applying Combinatorial Testing to Large-Scale Data Processing at Adobe . In Proceedings of the 2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW). 190--193 . https:\/\/doi.org\/10.1109\/ICSTW. 2019 .00051 10.1109\/ICSTW.2019.00051 R. Smith, D. Jarman, R. Kacker, R. Kuhn, D. Simos, L. Kampel, M. Leithner, and G. Gosney. 2019. Applying Combinatorial Testing to Large-Scale Data Processing at Adobe. In Proceedings of the 2019 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW). 190--193. https:\/\/doi.org\/10.1109\/ICSTW.2019.00051"},{"key":"e_1_3_2_1_27_1","volume-title":"in press. METRIC+: A Metamorphic Relation Identification Technique Based on Input plus Output Domains","author":"Sun Chang-Ai","year":"2019","unstructured":"Chang-Ai Sun , An Fu , Pak-Lok Poon , Xiaoyuan Xie , Huai Liu , and Tsong Yueh Chen . in press. METRIC+: A Metamorphic Relation Identification Technique Based on Input plus Output Domains . IEEE Transactions on Software Engineering ( in press). https:\/\/doi.org\/10.1109\/TSE. 2019 .2934848 10.1109\/TSE.2019.2934848 Chang-Ai Sun, An Fu, Pak-Lok Poon, Xiaoyuan Xie, Huai Liu, and Tsong Yueh Chen. in press. METRIC+: A Metamorphic Relation Identification Technique Based on Input plus Output Domains. IEEE Transactions on Software Engineering (in press). https:\/\/doi.org\/10.1109\/TSE.2019.2934848"},{"key":"e_1_3_2_1_28_1","volume-title":"Binns","author":"Sunderland Kelly M.","year":"2019","unstructured":"Kelly M. Sunderland , Derek Beaton , Julia Fraser , Donna Kwan , Paula M. McLaughlin , Manuel Montero-Odasso , Alicia J. Peltsch , Frederico Pieruccini-Faria , Demetrios J. Sahlas , Richard H. Swartz , ONDRI Investigators , Stephen C. Strother , and Malcolm A . Binns . 2019 . The Utility of Multivariate Outlier Detection Techniques for Data Quality Evaluation in Large Studies : An Application within the ONDRI project. BMC Medical Research Methodology 19 (2019). https:\/\/doi.org\/10.1186\/s12874-019-0737-5 10.1186\/s12874-019-0737-5 Kelly M. Sunderland, Derek Beaton, Julia Fraser, Donna Kwan, Paula M. McLaughlin, Manuel Montero-Odasso, Alicia J. Peltsch, Frederico Pieruccini-Faria, Demetrios J. Sahlas, Richard H. Swartz, ONDRI Investigators, Stephen C. Strother, and Malcolm A. Binns. 2019. The Utility of Multivariate Outlier Detection Techniques for Data Quality Evaluation in Large Studies: An Application within the ONDRI project. BMC Medical Research Methodology 19 (2019). https:\/\/doi.org\/10.1186\/s12874-019-0737-5"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1145\/1150402.1150451"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1145\/1644873.1644876"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.11.920"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1145\/2642937.2642994"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.camwa.2007.02.010"},{"key":"e_1_3_2_1_34_1","volume-title":"Tsong Yueh Chen, and Dave Towey. in press. Metamorphic Relations for Enhancing System Understanding and Use","author":"Zhou Zhi Quan","year":"2018","unstructured":"Zhi Quan Zhou , Liqun Sun , Tsong Yueh Chen, and Dave Towey. in press. Metamorphic Relations for Enhancing System Understanding and Use . IEEE Transactions on Software Engineering ( in press). https:\/\/doi.org\/10.1109\/TSE. 2018 .2876433 10.1109\/TSE.2018.2876433 Zhi Quan Zhou, Liqun Sun, Tsong Yueh Chen, and Dave Towey. in press. Metamorphic Relations for Enhancing System Understanding and Use. IEEE Transactions on Software Engineering (in press). https:\/\/doi.org\/10.1109\/TSE.2018.2876433"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2015.2478001"}],"event":{"name":"ICSE '20: 42nd International Conference on Software Engineering","sponsor":["SIGSOFT ACM Special Interest Group on Software Engineering","KIISE Korean Institute of Information Scientists and Engineers","IEEE CS"],"location":"Seoul Republic of Korea","acronym":"ICSE '20"},"container-title":["Proceedings of the IEEE\/ACM 42nd International Conference on Software Engineering Workshops"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387940.3391482","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3387940.3391482","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T22:38:46Z","timestamp":1750199926000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3387940.3391482"}},"subtitle":["A Learning Approach for Metamorphic Exploration and Testing"],"short-title":[],"issued":{"date-parts":[[2020,6,27]]},"references-count":35,"alternative-id":["10.1145\/3387940.3391482","10.1145\/3387940"],"URL":"https:\/\/doi.org\/10.1145\/3387940.3391482","relation":{},"subject":[],"published":{"date-parts":[[2020,6,27]]},"assertion":[{"value":"2020-09-25","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}