{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,27]],"date-time":"2025-10-27T21:05:31Z","timestamp":1761599131907,"version":"3.40.4"},"reference-count":28,"publisher":"Wiley","license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/creativecommons.org\/licenses\/by\/3.0\/"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61203304","61375067","BK2012566","2012QNA41"],"award-info":[{"award-number":["61203304","61375067","BK2012566","2012QNA41"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["61203304","61375067","BK2012566","2012QNA41"],"award-info":[{"award-number":["61203304","61375067","BK2012566","2012QNA41"]}],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["61203304","61375067","BK2012566","2012QNA41"],"award-info":[{"award-number":["61203304","61375067","BK2012566","2012QNA41"]}],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100012226","name":"Fundamental Research Funds for the Central Universities","doi-asserted-by":"crossref","award":["61203304","61375067","BK2012566","2012QNA41"],"award-info":[{"award-number":["61203304","61375067","BK2012566","2012QNA41"]}],"id":[{"id":"10.13039\/501100012226","id-type":"DOI","asserted-by":"crossref"}]}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Computational Intelligence and Neuroscience"],"published-print":{"date-parts":[[2014]]},"abstract":"<jats:p>The application of genetic algorithms in automatically generating test data has aroused broad concerns and obtained delightful achievements in recent years. However, the efficiency of genetic algorithm-based test data generation for path testing needs to be further improved. In this paper, we establish a mathematical model of generating test data for multiple paths coverage. Then, a multipopulation genetic algorithm with individual sharing is presented to solve the established model. We not only analyzed the performance of the proposed method theoretically, but also applied it to various programs under test. The experimental results show that the proposed method can improve the efficiency of generating test data for many paths\u2019 coverage significantly.<\/jats:p>","DOI":"10.1155\/2014\/591294","type":"journal-article","created":{"date-parts":[[2014,10,16]],"date-time":"2014-10-16T21:07:51Z","timestamp":1413493671000},"page":"1-12","source":"Crossref","is-referenced-by-count":18,"title":["Genetic Algorithm-Based Test Data Generation for Multiple Paths via Individual Sharing"],"prefix":"10.1155","volume":"2014","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-3207-703X","authenticated-orcid":true,"given":"Xiangjuan","family":"Yao","sequence":"first","affiliation":[{"name":"College of Science, China University of Mining and Technology, Xuzhou, Jiangsu 221116, China"}]},{"given":"Dunwei","family":"Gong","sequence":"additional","affiliation":[{"name":"School of Information and Electrical Engineering, China University of Mining and Technology, Xuzhou, Jiangsu 221116, China"}]}],"member":"311","reference":[{"year":"1990","key":"6"},{"issue":"3","key":"12","first-page":"215","volume":"2","year":"1976","journal-title":"IEEE Transactions on Software Engineering"},{"key":"21","doi-asserted-by":"publisher","DOI":"10.1109\/32.57624"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1504\/IJBIC.2013.053045"},{"first-page":"970","volume-title":"Random testing","year":"1994","key":"17"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1016\/j.ins.2011.01.025"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1486"},{"year":"2011","key":"22"},{"issue":"2","key":"29","doi-asserted-by":"crossref","first-page":"167","DOI":"10.1002\/(SICI)1097-024X(199902)29:2<167::AID-SPE225>3.0.CO;2-V","volume":"29","year":"1999","journal-title":"Software, Practice and Experience"},{"issue":"5","key":"34","first-page":"553","volume":"41","year":"2005","journal-title":"Journal of Nanjing University (Natural Sciences)"},{"issue":"3","key":"26","first-page":"223","volume":"2","year":"1976","journal-title":"IEEE Transactions on Software Engineering"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/937503.937505"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.294"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1007\/s00521-011-0568-8"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2005.06.006"},{"key":"2","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-010-9117-4"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/32.988709"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2007.01.015"},{"key":"32","doi-asserted-by":"publisher","DOI":"10.1142\/S021819400600277X"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1135"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1142\/S0218194002001074"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1002\/spe.684"},{"issue":"3","key":"25","doi-asserted-by":"crossref","first-page":"494","DOI":"10.23919\/CJE.2014.10851197","volume":"23","year":"2014","journal-title":"Chinese Journal of Electronics"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(01)00190-2"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1016\/j.cor.2007.01.012"},{"issue":"6","key":"16","first-page":"1299","volume":"38","year":"2010","journal-title":"Acta Electronica Sinica"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2014.01.001"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.11.045"}],"container-title":["Computational Intelligence and Neuroscience"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/downloads.hindawi.com\/journals\/cin\/2014\/591294.pdf","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/cin\/2014\/591294.xml","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"http:\/\/downloads.hindawi.com\/journals\/cin\/2014\/591294.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,5]],"date-time":"2025-05-05T05:32:58Z","timestamp":1746423178000},"score":1,"resource":{"primary":{"URL":"http:\/\/www.hindawi.com\/journals\/cin\/2014\/591294\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"references-count":28,"alternative-id":["591294","591294"],"URL":"https:\/\/doi.org\/10.1155\/2014\/591294","relation":{},"ISSN":["1687-5265","1687-5273"],"issn-type":[{"type":"print","value":"1687-5265"},{"type":"electronic","value":"1687-5273"}],"subject":[],"published":{"date-parts":[[2014]]}}}