{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,6,18]],"date-time":"2025-06-18T04:13:24Z","timestamp":1750220004325,"version":"3.41.0"},"publisher-location":"New York, NY, USA","reference-count":46,"publisher":"ACM","license":[{"start":{"date-parts":[[2022,2,24]],"date-time":"2022-02-24T00:00:00Z","timestamp":1645660800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.acm.org\/publications\/policies\/copyright_policy#Background"}],"funder":[{"DOI":"10.13039\/100010661","name":"Horizon 2020 Framework Programme","doi-asserted-by":"publisher","award":["957212"],"award-info":[{"award-number":["957212"]}],"id":[{"id":"10.13039\/100010661","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001858","name":"Vinnova","doi-asserted-by":"publisher","award":["SmartDelta"],"award-info":[{"award-number":["SmartDelta"]}],"id":[{"id":"10.13039\/501100001858","id-type":"DOI","asserted-by":"publisher"}]}],"content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":[],"published-print":{"date-parts":[[2022,2,24]]},"DOI":"10.1145\/3511430.3511433","type":"proceedings-article","created":{"date-parts":[[2022,2,15]],"date-time":"2022-02-15T20:01:15Z","timestamp":1644955275000},"page":"1-11","update-policy":"https:\/\/doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":0,"title":["Human-based Test Design versus Automated Test Generation: A Literature Review and Meta-Analysis"],"prefix":"10.1145","author":[{"given":"Ted","family":"Kurmaku","sequence":"first","affiliation":[{"name":"Malardalen University, Sweden"}]},{"given":"Eduard Paul","family":"Enoiu","sequence":"additional","affiliation":[{"name":"Malardalen University, Sweden"}]},{"given":"Musa","family":"Kumrija","sequence":"additional","affiliation":[{"name":"Malardalen University, Sweden"}]}],"member":"320","published-online":{"date-parts":[[2022,2,24]]},"reference":[{"key":"e_1_3_2_1_1_1","unstructured":"[n. d.]. Decision Coverage Testing. https:\/\/www.tutorialspoint.com\/software_testing_dictionary\/decision_coverage_testing.htm  [n. d.]. Decision Coverage Testing. https:\/\/www.tutorialspoint.com\/software_testing_dictionary\/decision_coverage_testing.htm"},{"key":"e_1_3_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2013.02.061"},{"key":"e_1_3_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2005.12.014"},{"key":"e_1_3_2_1_4_1","unstructured":"Angela Boland Gemma Cherry and Rumona Dickson. 2017. Doing a systematic review: A student\u2019s guide. (2017).  Angela Boland Gemma Cherry and Rumona Dickson. 2017. Doing a systematic review: A student\u2019s guide. (2017)."},{"volume-title":"Introduction to meta-analysis","author":"Borenstein Michael","key":"e_1_3_2_1_5_1","unstructured":"Michael Borenstein , Larry\u00a0 V Hedges , Julian\u00a0 PT Higgins , and Hannah\u00a0 R Rothstein . 2011. Introduction to meta-analysis . John Wiley & Sons . Michael Borenstein, Larry\u00a0V Hedges, Julian\u00a0PT Higgins, and Hannah\u00a0R Rothstein. 2011. Introduction to meta-analysis. John Wiley & Sons."},{"key":"e_1_3_2_1_6_1","doi-asserted-by":"publisher","DOI":"10.1145\/2768829"},{"key":"e_1_3_2_1_7_1","volume-title":"Proceedings of Pacific Northwest Software Quality Conference. IEEE Press. Citeseer.","author":"Clarke M","year":"1998","unstructured":"James\u00a0 M Clarke . 1998 . Automated test generation from a behavioral model . In Proceedings of Pacific Northwest Software Quality Conference. IEEE Press. Citeseer. James\u00a0M Clarke. 1998. Automated test generation from a behavioral model. In Proceedings of Pacific Northwest Software Quality Conference. IEEE Press. Citeseer."},{"key":"e_1_3_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"e_1_3_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1145\/3053430"},{"key":"e_1_3_2_1_10_1","doi-asserted-by":"publisher","DOI":"10.5555\/2819009.2819154"},{"key":"e_1_3_2_1_11_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2007.21"},{"key":"e_1_3_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2017.44"},{"key":"e_1_3_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2016.15"},{"key":"e_1_3_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483774"},{"key":"e_1_3_2_1_15_1","volume-title":"Efficiency of software testing techniques: A controlled experiment replication and network meta-analysis. e-Informatica Software Engineering Journal 11, 1","author":"G\u00f3mez S","year":"2017","unstructured":"Omar\u00a0 S G\u00f3mez , Karen Cort\u00e9s-Verd\u00edn , and C\u00e9sar\u00a0 J Pardo . 2017. Efficiency of software testing techniques: A controlled experiment replication and network meta-analysis. e-Informatica Software Engineering Journal 11, 1 ( 2017 ). Omar\u00a0S G\u00f3mez, Karen Cort\u00e9s-Verd\u00edn, and C\u00e9sar\u00a0J Pardo. 2017. Efficiency of software testing techniques: A controlled experiment replication and network meta-analysis. e-Informatica Software Engineering Journal 11, 1 (2017)."},{"key":"e_1_3_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1109\/EmpiRE.2014.6890115"},{"key":"e_1_3_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1145\/3196321.3196363"},{"key":"e_1_3_2_1_18_1","unstructured":"M Harrer P Cuijpers TA Furukawa and DD Ebert. 2019. Doing meta-analysis in R: a hands-on guide. PROTECT Lab Erlangen(2019).  M Harrer P Cuijpers TA Furukawa and DD Ebert. 2019. Doing meta-analysis in R: a hands-on guide. PROTECT Lab Erlangen(2019)."},{"key":"e_1_3_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.46"},{"key":"e_1_3_2_1_20_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.51"},{"key":"e_1_3_2_1_21_1","unstructured":"G Kapfhammer. 2004. The Computer Science Handbook chapter Software Testing.  G Kapfhammer. 2004. The Computer Science Handbook chapter Software Testing."},{"key":"e_1_3_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806887"},{"key":"e_1_3_2_1_23_1","doi-asserted-by":"publisher","DOI":"10.1109\/METRIC.2004.1357885"},{"volume-title":"Evidence-based software engineering and systematic reviews. Vol.\u00a04","author":"Kitchenham Barbara\u00a0Ann","key":"e_1_3_2_1_24_1","unstructured":"Barbara\u00a0Ann Kitchenham , David Budgen , and Pearl Brereton . 2015. Evidence-based software engineering and systematic reviews. Vol.\u00a04 . CRC press . Barbara\u00a0Ann Kitchenham, David Budgen, and Pearl Brereton. 2015. Evidence-based software engineering and systematic reviews. Vol.\u00a04. CRC press."},{"key":"e_1_3_2_1_25_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2013.57"},{"key":"e_1_3_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2014.33"},{"key":"e_1_3_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1587\/transinf.E97.D.1109"},{"key":"e_1_3_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2016.41"},{"key":"e_1_3_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2015.7107402"},{"key":"e_1_3_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2014.29"},{"key":"e_1_3_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.5555\/1077276.1077279"},{"key":"e_1_3_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0164-1212(00)00024-8"},{"key":"e_1_3_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1109\/ESEM.2009.5315981"},{"key":"e_1_3_2_1_34_1","doi-asserted-by":"publisher","DOI":"10.5555\/983238"},{"key":"e_1_3_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1145\/1062455.1062529"},{"key":"e_1_3_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1109\/SEAA.2012.42"},{"key":"e_1_3_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2013.82"},{"key":"e_1_3_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1177\/1356389008097871"},{"key":"e_1_3_2_1_39_1","doi-asserted-by":"publisher","DOI":"10.1145\/2591062.2591180"},{"volume-title":"Meta-Analysis with","author":"Schwarzer Guido","key":"e_1_3_2_1_40_1","unstructured":"Guido Schwarzer , James\u00a0 R Carpenter , and Gerta R\u00fccker . 2015. Multivariate meta-analysis . In Meta-Analysis with R. Springer , 165\u2013185. Guido Schwarzer, James\u00a0R Carpenter, and Gerta R\u00fccker. 2015. Multivariate meta-analysis. In Meta-Analysis with R. Springer, 165\u2013185."},{"key":"e_1_3_2_1_41_1","doi-asserted-by":"publisher","DOI":"10.1109\/MSR.2019.00028"},{"key":"e_1_3_2_1_42_1","doi-asserted-by":"crossref","unstructured":"Mario\u00a0Linares Vasquez Carlos Bernal-C\u00e1rdenas Kevin Moran and Denys Poshyvanyk. 2018. How do Developers Test Android Applications?arXiv preprint arXiv:1801.06268(2018).  Mario\u00a0Linares Vasquez Carlos Bernal-C\u00e1rdenas Kevin Moran and Denys Poshyvanyk. 2018. How do Developers Test Android Applications?arXiv preprint arXiv:1801.06268(2018).","DOI":"10.1109\/ICSME.2017.47"},{"key":"e_1_3_2_1_43_1","volume-title":"Confidence intervals for the amount of heterogeneity in meta-analysis. Statistics in medicine 26, 1","author":"Viechtbauer Wolfgang","year":"2007","unstructured":"Wolfgang Viechtbauer . 2007. Confidence intervals for the amount of heterogeneity in meta-analysis. Statistics in medicine 26, 1 ( 2007 ), 37\u201352. Wolfgang Viechtbauer. 2007. Confidence intervals for the amount of heterogeneity in meta-analysis. Statistics in medicine 26, 1 (2007), 37\u201352."},{"key":"e_1_3_2_1_44_1","volume-title":"App testing now consumes a quarter of IT budget. CIO Insight","author":"Vizard M","year":"2013","unstructured":"M Vizard . 2013. App testing now consumes a quarter of IT budget. CIO Insight ( 2013 ). M Vizard. 2013. App testing now consumes a quarter of IT budget. CIO Insight (2013)."},{"key":"e_1_3_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/2771783.2771818"},{"key":"e_1_3_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.31"}],"event":{"name":"ISEC 2022: 15th Innovations in Software Engineering Conference","acronym":"ISEC 2022","location":"Gandhinagar India"},"container-title":["15th Innovations in Software Engineering Conference"],"original-title":[],"link":[{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511430.3511433","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/3511430.3511433","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,6,17]],"date-time":"2025-06-17T17:51:03Z","timestamp":1750182663000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/3511430.3511433"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2022,2,24]]},"references-count":46,"alternative-id":["10.1145\/3511430.3511433","10.1145\/3511430"],"URL":"https:\/\/doi.org\/10.1145\/3511430.3511433","relation":{},"subject":[],"published":{"date-parts":[[2022,2,24]]},"assertion":[{"value":"2022-02-24","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}