{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2022,4,3]],"date-time":"2022-04-03T12:48:51Z","timestamp":1648990131065},"reference-count":31,"publisher":"Walter de Gruyter GmbH","issue":"-1","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,1,12]]},"DOI":"10.2478\/v10233-011-0030-4","type":"journal-article","created":{"date-parts":[[2012,1,13]],"date-time":"2012-01-13T04:57:13Z","timestamp":1326430633000},"source":"Crossref","is-referenced-by-count":0,"title":["Experience with instantiating an automated testing process in the context of incremental and evolutionary software development"],"prefix":"10.2478","volume":"-1","author":[{"given":"Janusz","family":"G\u00f3rski","sequence":"first","affiliation":[]},{"given":"Michal","family":"Witkowicz","sequence":"additional","affiliation":[]}],"member":"374","reference":[{"key":"1","volume-title":"Software Engineering","author":"I. Sommerville","year":"2007"},{"key":"2","volume-title":"Software Testing","author":"R. Patton","year":"2006"},{"key":"3","doi-asserted-by":"crossref","DOI":"10.1142\/9789812564429","volume-title":"Software Maintenance Concepts and Practice","author":"P. Grubb","year":"2003"},{"key":"4","first-page":"204","article-title":"Trust-it - a framework for trust cases","author":"J. G\u00f3rski","year":"2007"},{"key":"5","volume-title":"Trust-it research project","author":"J. G\u00f3rski","year":"2011"},{"key":"6","volume-title":"Ajax in Action","author":"D. Crane","year":"2006"},{"key":"7","volume-title":"Understanding AJAX: Using JavaScript to Create Rich Internet Applications","author":"J. Eichorn","year":"2006"},{"key":"8","article-title":"Testing techniques applied to ajax web applications","author":"A. Marchetto","year":"2007"},{"key":"9","unstructured":"A. Mesbah, \"Analysis and testing of ajax-based single-page web applications,\" Ph.D. dissertation, Delft University of Technology, 2009."},{"key":"10","unstructured":"NOR-STA, \"Support for achieving and assessing conformance to norms and standards,\" (04.11.2011). [Online]. Available: <a target=\"_blank\" href='http:\/\/www.nor-sta.eu\/'>http:\/\/www.nor-sta.eu\/<\/a>"},{"key":"11","first-page":"35","volume-title":"Zwinno\u015b\u0107 i dyscyplina w in\u017cynierii oprogramowania","author":"L. Cyra","year":"2007"},{"key":"12","unstructured":"PostgreSQL. (10.06.2010). [Online]. Available: <a target=\"_blank\" href='http:\/\/www.postgresql.org\/'>http:\/\/www.postgresql.org\/<\/a>"},{"key":"13","unstructured":"JBoss. (10.06. 2010). [Online]. Available: <a target=\"_blank\" href='http:\/\/www.jboss.org\/'>http:\/\/www.jboss.org\/<\/a>"},{"key":"14","volume-title":"JavaScript: The Definitive Guide","author":"D. Flanagan","year":"2001"},{"key":"15","unstructured":"SunMicrosystems, \"Developer resources for java technology,\" (10.06.2010). [Online]. Available: <a target=\"_blank\" href='http:\/\/java.sun.com\/'>http:\/\/java.sun.com\/<\/a>"},{"key":"16","unstructured":"W3C, \"Simple object access protocol,\" (10.06.2010). [Online]. Available: <a target=\"_blank\" href='http:\/\/www.w3.org\/TR\/soap\/'>http:\/\/www.w3.org\/TR\/soap\/<\/a>"},{"issue":"6","key":"17","doi-asserted-by":"crossref","first-page":"47","DOI":"10.1109\/MC.2003.1204375","article-title":"Iterative and incremental development: A brief history","volume":"36","author":"C. Larman","year":"2003","journal-title":"Computer"},{"key":"18","unstructured":"PCMagazine-Encyclopedia, \"Iterative development,\" (06.04.2011). [Online]. Available: <a target=\"_blank\" href='http:\/\/www.pcmag.com\/encyclopedia\/'>http:\/\/www.pcmag.com\/encyclopedia\/<\/a>"},{"key":"19","volume-title":"Agile and Iterative Development: A Manager's Guide","author":"C. Larman","year":"2003"},{"key":"20","unstructured":"Mantis. (10.06.2010). [Online]. Available: <a target=\"_blank\" href='http:\/\/www.mantisbt.org\/'>http:\/\/www.mantisbt.org\/<\/a>"},{"key":"21","unstructured":"Subversion. (10.06.2010). [Online]. Available: <a target=\"_blank\" href='http:\/\/subversion.tigris.org\/'>http:\/\/subversion.tigris.org\/<\/a>"},{"key":"22","unstructured":"Testng. (10.06.2010). [Online]. Available: <a target=\"_blank\" href='http:\/\/testng.org\/'>http:\/\/testng.org\/<\/a>"},{"key":"23","unstructured":"Selenium, \"Selenium web application testing system.\" [Online]. Available: <a target=\"_blank\" href='http:\/\/seleniumhq.org\/projects\/remote-control\/'>http:\/\/seleniumhq.org\/projects\/remote-control\/<\/a>"},{"key":"24","unstructured":"W3C, \"Extensible markup language,\" (10.06.2010). [Online]. Available: <a target=\"_blank\" href='http:\/\/www.w3.org\/XML\/'>http:\/\/www.w3.org\/XML\/<\/a>"},{"key":"25","first-page":"92","article-title":"Refactoring test code","author":"A. Deursen","year":"2001"},{"key":"26","first-page":"492","article-title":"The dimensions of maintenance","author":"E. Swanson","year":"1976"},{"key":"27","volume-title":"Advanced Software Testing - Vol. 2: Guide to the Istqb Advanced Certification as an Advanced Test Manager","volume":"2","author":"R. Black","year":"2009"},{"issue":"8","key":"28","first-page":"28","article-title":"Advanced risk based test results reporting: putting residual quality risk measurement in motion","volume":"7","author":"R. Black","year":"2010","journal-title":"Software Test & Quality Assurance"},{"key":"29","unstructured":"R. Black, K. Young, and P. Nash, \"A case study in successful risk-based testing at ca,\" (06.04.2011). [Online]. Available: <a target=\"_blank\" href='http:\/\/www.softed.com\/resources\/'>http:\/\/www.softed.com\/resources\/<\/a>"},{"key":"30","doi-asserted-by":"crossref","first-page":"3","DOI":"10.1002\/stvr.310","article-title":"Theory and practice of risk-based testing","volume":"15","author":"F. Redmill","year":"2005","journal-title":"Software Testing, Verification and Reliability"},{"key":"31","unstructured":"Y. Jia and M. Harman, \"An analysis and survey of the development of mutation testing,\" CREST Centre, King's College London, Technical Report TR-09-06, 2009."}],"container-title":["e-Informatica Software Engineering Journal"],"original-title":[],"link":[{"URL":"https:\/\/www.degruyter.com\/view\/j\/einfo.ahead-of-print\/v10233-011-0030-4\/v10233-011-0030-4.pdf","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,5,30]],"date-time":"2020-05-30T16:04:20Z","timestamp":1590854660000},"score":1,"resource":{"primary":{"URL":"https:\/\/www.degruyter.com\/doi\/10.2478\/v10233-011-0030-4"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,1,12]]},"references-count":31,"journal-issue":{"issue":"-1"},"URL":"https:\/\/doi.org\/10.2478\/v10233-011-0030-4","relation":{},"ISSN":["1897-7979"],"issn-type":[{"value":"1897-7979","type":"print"}],"subject":[],"published":{"date-parts":[[2012,1,12]]}}}