diff --git a/final_literature_bib.bib b/final_literature_bib.bib index e199da4..46e9258 100644 --- a/final_literature_bib.bib +++ b/final_literature_bib.bib @@ -1,7 +1,7 @@ %% This BibTeX bibliography file was created using BibDesk. %% http://bibdesk.sourceforge.net/ -%% Created for ZhuQianqian at 2017-07-23 21:26:08 +0800 +%% Created for ZhuQianqian at 2017-08-16 15:14:25 +0200 %% Saved with string encoding Unicode (UTF-8) @@ -43,10 +43,10 @@ @article{ye2013whitening Year = {2013}} @inproceedings{flores2008testing, - Author = {Flores, Andres and Usaola, Macario Polo}, + Author = {Flores, Andres and Polo, Macario}, Booktitle = {Software Maintenance, 2008. ICSM 2008. IEEE International Conference on}, Date-Added = {2017-07-23 12:44:42 +0000}, - Date-Modified = {2017-07-23 12:44:42 +0000}, + Date-Modified = {2017-08-16 07:40:00 +0000}, Organization = {IEEE}, Pages = {327--336}, Title = {Testing-based assessment process for upgrading component systems}, diff --git a/final_paper_sum.csv b/final_paper_sum.csv index 1cd254e..5b895de 100644 --- a/final_paper_sum.csv +++ b/final_paper_sum.csv @@ -1,7 +1,7 @@ paper,role,testing activities,test level,testing strategies,tool availability,tool type,mutation tool,mutation operator,equivalent mutant detection,cost reduction techniques,language,subject size,subject availability,mutant analysis AbouTrab et al.\cite{aboutrab2013testing},A,test strategy evaluation,n/a,spec.,N,hand.,,well,n/a,n/a,C,n/a,N, -Aichernig et al.\cite{aichernig2011efficient},G,test data generation,int.,spec. (E),Y,exi.,$\mu$java,not suff.,n/a,n/a,java,n/a,N, -Aichernig et al.\cite{aichernig2015killing},G,test data generation,n/a,spec. (E),Y,exi.,$\mu$java,well,manual invest.,n/a,UML,S,N, +Aichernig et al.\cite{aichernig2011efficient},G,test data generation,int.,spec. (E),Y,exi.,$\mu$-java,not suff.,n/a,n/a,java,n/a,N, +Aichernig et al.\cite{aichernig2015killing},G,test data generation,n/a,spec. (E),Y,exi.,$\mu$-java,well,manual invest.,n/a,UML,S,N, Ali et al.\cite{ali2007state},A,test strategy evaluation,int.,spec.,N,n/a,,well,n/a,n/a,java,P,Y, Andrews et al.\cite{andrews2003general} , A , test oracle,unit,spec.,N,self.,Self-written,well, n/a , mutant sample, C ,"P, S",N, Andrews et al.\cite{andrews2006using} , A , test strategy evaluation ,n/a,struc. ,N,exi. , \cite{andrews2003general} ,well, not killed as equivalent , mutant sample, C ,S,Y,* @@ -48,13 +48,13 @@ Fraser and Zeller\cite{fraser2012mutation} ,G," test data generation, test oracl Fraser et al.\cite{fraser2013does},G,test data generation,unit,struc. ,Y,exi.,MAJOR,n/a,n/a,fixed number,java,"P, S",Y, Fraser et al.\cite{fraser2015achieving},G,test data generation,unit,struc. (E),Y,part.,EvoSuite,well,no invest.,"mutant sample, weak mutation",Java,n/a,Y, Gay et al.\cite{gay2015automated},G,test oracle,unit,struc. (E),N,n/a,,well,model checker,fixed number,simulink,n/a,N, -Gay et al.\cite{gay2015risks} , A ," test data generation, test suite reduction",unit,"struc., struc. (E)",N,exi. , \cite{rajan2008requirements} ,not suff.,model checker,"fixed number, weak mutation", Lustre ,"P, S",N, -Gligoric et al.\cite{gligoric2013comparing} , A , test strategy evaluation ,n/a,struc. ,N,"exi., exi. "," Javalanche, \cite{andrews2003general} ",not suff.,no invest.,n/a," Java, C ","S, M",Y, +Gay et al.\cite{gay2015risks} , A ," test data generation, test-suite reduction",unit,"struc., struc. (E)",N,exi. , \cite{rajan2008requirements} ,not suff.,model checker,"fixed number, weak mutation", Lustre ,"P, S",N, +Gligoric et al.\cite{gligoric2013comparing} , A , test strategy evaluation ,n/a,struc. ,"Y,N",exi.," Javalanche, \cite{andrews2003general} ",not suff.,no invest.,n/a," Java, C ","S, M",Y, Gonzalez-Sanchez et al.\cite{gonzalez2011prioritizing},A,fault localisation,n/a,"struc., struc. (E)",Y,part.,Zoltar,n/a,n/a,n/a,C,"S, M",Y, Gopinath et al.\cite{gopinath2014code} , A , test strategy evaluation ,unit,struc. ,Y,exi., PIT ,n/a, n/a , n/a, Java ,"P, S, M",Y, Gupta and Jalote\cite{gupta2007test},A,"fault localisation, program repairing",unit,others,N,hand.,manual,well,n/a,n/a,java,S,N, Hao et al.\cite{hao2012demand},G,test-suite reduction,n/a,struc. (E),Y,exi.,"Proteum, MuJava",n/a,n/a,mutant sample,"java, c","P, S",Y, -Hao et al.\cite{hao2014unified} , A , test case prioritisation ," unit, sys.",struc. ,Y,exi.," \cite{andrews2003general}, Mujava, Javalance ",n/a, n/a ,fixed number," Java, C ","S, M",Y, +Hao et al.\cite{hao2014unified} , A , test case prioritisation ," unit, sys.",struc. ,Y,exi.," \cite{andrews2003general}, Mujava, Javalanche ",n/a, n/a ,fixed number," Java, C ","S, M",Y, Harman et al.\cite{harman2011strong} ,G, test data generation ,n/a,struc. (E),Y,exi., MiLu ,not suff., not killed as equivalent ,higher-order, C ,S,N, Hennessy and Power\cite{hennessy2008analysing} , A , test-suite reduction ,other,others,N,self.,Self-written,well, n/a ,weak mutation,C++ Grammar ,"S, M",Y, Hofer and Wotawa\cite{hofer2014does},A,fault localisation,other,others,N,n/a,,well,n/a,n/a,spread-sheet,n/a,Y, @@ -67,7 +67,7 @@ Inozemtseva et al.\cite{inozemtseva2014coverage} , A , test strategy evaluation Jamrozik et al.\cite{jamrozik2012augmented},G,test data generation,unit,struc. (E),N,n/a,,n/a,n/a,n/a,C\#,n/a,N, Jee et al.\cite{jee2014automated},A,test data generation,unit,struc. ,N,n/a,,well,n/a,n/a,PLC,n/a,N, Jolly et al.\cite{jolly2012automated} , A , test strategy evaluation , unit ,spec.,N,exi. , Mutant Power ,n/a, n/a ,fixed number, C\# ,M,N, -Kanewala and Bieman\cite{kanewala2013using},A,test oracle,unit,others,Y,exi.,$\mu$java,well,n/a,n/a,java,P,N, +Kanewala and Bieman\cite{kanewala2013using},A,test oracle,unit,others,Y,exi.,$\mu$-java,well,n/a,n/a,java,P,N, Kapfhammer et al.\cite{kapfhammer2013search},A,test data generation,other,others,N,n/a,,well,n/a,n/a,SQL ,n/a,N, Khalil and Labiche\cite{khalil2010round},A,test strategy evaluation,n/a,spec.,Y,exi.,MuJava,well, not killed as equivalent ,n/a,java,S,Y, Kim et al.\cite{kim2001investigating} , A , test strategy evaluation ,n/a,"spec., struc. ",N,self.,Self-written,not suff., n/a , n/a, Java ,"P, S",N,* @@ -120,7 +120,7 @@ Schuler and Zeller\cite{schuler2013checked},A,test strategy evaluation,unit,stru Segura et al.\cite{segura2010automated},A,test data generation,n/a,spec.,Y,exi.,MuClipse,well,manual invest.,n/a,java,S,Y, Shahamiri et al.\cite{shahamiri2012artificial},A,test oracle,n/a,spec.,N,n/a,,not suff.,n/a,n/a,C\#,n/a,N, Shelton et al.\cite{shelton2012adding},G,development scheme evaluation,unit,others,Y,exi.,MuJava,n/a,manual invest.,n/a,java,n/a,N,* -Shi et al. \cite{shi2015measuring} , A , test strategy evaluation ,n/a,sim. ,Y,Self-written, mutate.py ,not suff., manual invest. ,fixed number, C ,"S, M",Y, +Shi et al. \cite{shi2015measuring} , A , test strategy evaluation ,n/a,sim. ,Y,self., mutate.py ,not suff., manual invest. ,fixed number, C ,"S, M",Y, Shi et al.\cite{shi2014balancing} ,G, test-suite reduction ,n/a,"struc., struc. (E)",Y,exi., PIT ,well, n/a , n/a, Java ,"P, S",Y, Shi et al.\cite{shi2015comparing},A,test-suite reduction,unit,struc. ,Y,exi.,PIT,n/a,n/a,n/a,java,"S, M",Y, Shrestha and Rutherford\cite{shrestha2011empirical},A,test oracle,unit,struc. ,Y,exi.,MuJava,well,manual invest.,n/a,java,"P, S",Y, @@ -129,7 +129,7 @@ Smith and Williams\cite{smith2009should},G,test strategy evaluation,unit,struc. Staats et al.\cite{staats2011better} ,A,test oracle,n/a,others,N,n/a,,n/a,model checker,fixed number,Lustre,n/a,N, Staats et al.\cite{staats2012automated} ,G,test oracle,unit,struc. (E),N,exi. , \cite{rajan2008requirements} ,not suff.,model checker,fixed number, Lustre ,S,N, Staats et al.\cite{staats2012oracle},A,test case prioritisation,unit,struc. ,Y,exi.,Sofya,well,n/a,fixed number,java,S,N, -Stephan and Cordy\cite{stephan2014model},A,model clone detection,n/a,others,N,n/a,,well,n/a,random mutation,simulink,n/a,N, +Stephan and Cordy\cite{stephan2014model},A,model clone detection,n/a,others,N,n/a,,well,n/a,mutant sample,simulink,n/a,N, Tan and Edwards\cite{tan2008evaluating},A,"test data generation, test strategy evaluation",unit,struc. ,N,exi. ,sulu tool,well,n/a,n/a,sulu,n/a,N, Tasiran et al.\cite{tasiran2012location},A,test strategy evaluation,n/a,struc. ,N,n/a,,well,n/a,n/a,java,n/a,N, Tuya et al.\cite{tuya2010full} , A , test strategy evaluation ,other,struc. ,Y,exi., SQLMutation ,well,"reduce likelihood, manual invest.", n/a, SQL ,n/a,Y, @@ -158,3 +158,15 @@ Zhang et al.\cite{zhang2011empirical} , A , test-suite reduction , unit ,struc. Zhang et al.\cite{zhang2014search},A,test oracle,n/a,spec.,Y,exi.,MuClipse,not suff.,n/a,n/a,"java, C/C++",S,Y, Zhou and Frankl\cite{zhou2011jdama} , A ," test data generation, test strategy evaluation ",n/a,struc. ,Y,exi., JDAMA (based on SQLMutation) ,well,"reduce likelihood, manual invest.", weak mutation," Java, sql",n/a,Y, Offutt et al.\cite{offutt1995procedures},G,test-suite reduction,unit,struc. (E),Y,exi., Mothra,well,n/a,n/a,Fortran,P,N, +Rojas et al.\cite{rojas2015combining},G,test data generation,unit,"struc., struc. (E)",Y,exi.,EvoSuite,well,n/a,n/a,java,M,N, +Dadeau et al.\cite{dadeau2011mutation},G,test data generation,n/a,spec. (E),N,self.,,well,n/a,n/a,HLPSL,n/a,N,* +Polo et al.\cite{polo2007integrating},A,test data generation,unit,struc. ,Y,exi.,MuJava,well,manual invest.,n/a,java,S,Y, +Flores and Polo\cite{flores2012testing},A,test strategy evaluation,int.,spec.,N,exi.,"MuClipse, testooj",well,n/a,n/a,java,n/a,Y, +Vincenzi et al.\cite{vincenzi2001unit},G,test data generation,"unit, int.",struc. (E),Y,exi.,"Proteum, Proteum/IM",well,manual invest.,selection strategy,C,S,Y,* +Rutherford et al.\cite{rutherford2006simulation},A,test strategy evaluation,sys.,spec.,Y,exi.,MuJava,not suff.,manual invest.,n/a,java,S,N, +Mariani et al.\cite{mariani2007compatibility},A,"test data generation, test case prioritisation",int.,spec.,N,hand.,,well,manual invest.,n/a,java,n/a,N, +Edwards\cite{edwards2001framework},A,"test data generation, test oracle","unit, int.",spec.,N,n/a,,well,manual invest.,n/a,C++,n/a,N, +Flores and Polo\cite{flores2008testing},A,test strategy evaluation,int.,spec.,N,exi.,"MuClipse, testooj",well,n/a,n/a,java,n/a,Y, +Ye and Jacobsen\cite{ye2013whitening},A,"test data generation, test strategy evaluation",int.,hybrid ,N,hand.,,not suff., not killed as equivalent ,n/a,n/a,S,N, +Briand et al.\cite{briand2006automated},G,"test data generation, test-suite reduction,test strategy evaluation",n/a,"spec., spec. (E)",N,hand.,,not suff.,manual invest.,mutant sample,EJB,n/a,N, +Bartolini et al.\cite{bartolini2011bringing},A,test-suite reduction,n/a,hybrid ,N,hand.,,not suff.,n/a,selection strategy,PHP,S,Y, diff --git a/guide_sum.csv b/guide_sum.csv index 1f7ede1..1672f46 100644 --- a/guide_sum.csv +++ b/guide_sum.csv @@ -45,6 +45,10 @@ Staats et al.\cite{staats2012automated} ,test oracle,rank variables (for test or Hou et al.\cite{hou2007applying},test strategy evaluation,Propose Interface-Contract Mutation coverage as a test adequacy criterion,Hand-seeded + mutation,different operators Smith and Williams\cite{smith2009should},test strategy evaluation,use mutation coverage to generate test data,mutation, Chen et al.\cite{chen2002can} ,test strategy evaluation ,use mutants to estimate fault-exposing potential,Hand-seeded , -Hao et al.\cite{hao2012demand},test-suite reduction,"use mutants to collect statistics on loss in fault-detection capability at the level of individual statements for various levels of confidence, and use these to construct a fault-detection- loss table",Hand-seeded + mutation,later version + evaluation set +Hao et al.\cite{hao2012demand},test-suite reduction,"use mutants to collect statistics on loss in fault-detection capability at the level of individual statements for various levels of confidence, and use these to construct a fault-detection-loss table",Hand-seeded + mutation,later version + evaluation set Offutt et al.\cite{offutt1995procedures},test-suite reduction,use traces of mutants and prior faults to train the predication model (decision tree),real , Shi et al.\cite{shi2014balancing} ,test-suite reduction ,to kill same mutants as the requirement,mutation , +Rojas et al.\cite{rojas2015combining},test data generation ,generate weak mutant killable conditions,coverage, +Dadeau et al.\cite{dadeau2011mutation},test data generation ,generate test data to kill mutants,mutation, +Vincenzi et al.\cite{vincenzi2001unit},test data generation,generate test data to kill mutants,mutation, +Briand et al.\cite{briand2006automated},test-suite reduction,use mutation analysis as an indicator of test cases with high fault detection capability to select test cases,no evaluation, diff --git a/mutation_operator_sum.csv b/mutation_operator_sum.csv index 75b4332..dd6c72f 100644 --- a/mutation_operator_sum.csv +++ b/mutation_operator_sum.csv @@ -80,7 +80,7 @@ Stephan and Cordy\cite{stephan2014model},specification,simulink, Tan and Edwards\cite{tan2008evaluating},"arithmetic op, relational op, conditional op, conditional exp, statement deletion, program",sulu,sulu tool Tasiran et al.\cite{tasiran2012location},"concurrent mutation, program",java, Tuya et al.\cite{tuya2010full} ,"arithmetic op, conditional op, relational op, absolute value, constant, variable, SQL-specific, program", SQL , SQLMutation -Vergilio et al.\cite{vergilio2006constraint},"bomb statement, conditional exp, statement deletion, return statement, goto label, control-flow disruption, while statement, do-while statement, loop trap, statement swap, brace, switch statement, arithmetic op, bitwise op, conditional op, shift op, relational op, assignment o, parentheses, type, variable, constant, program",C,Proteum +Vergilio et al.\cite{vergilio2006constraint},"bomb statement, conditional exp, statement deletion, return statement, goto label, control-flow disruption, while statement, do statement, loop trap, statement swap, brace, switch statement, arithmetic op, bitwise op, conditional op, shift op, relational op, assignment op, parentheses, type, variable, constant, program",C,Proteum von Mayrhauser et al.\cite{von2000planner},specification,n/a, Wang et al.\cite{wang2010correlating},"arithmetic op, relational op, conditional op, bitwise op, assignment op, shift op,OO-specific, Java-specific, program",Java,MuClipse Watanabe and Sakamura\cite{watanabe1996specification},"relational op, constant, method call, program",Specification (Z notation), @@ -97,3 +97,11 @@ Zhang et al.\cite{zhang2010test} ,"absolute value, arithmetic op, conditional op Zhang et al.\cite{zhang2011empirical} ,"arithmetic op, relational op, conditional op, bitwise op, assignment op, shift op, program", Java , MuJava Zhou and Frankl\cite{zhou2011jdama} ,"arithmetic op, conditional op, relational op, absolute value, constant, variable, SQL-specific, program",sql, JDAMA (based on SQLMutation) Offutt et al.\cite{offutt1995procedures},"constant, variable, arithmetic op, relational op, conditional op, statement deletion, return statement, goto label, do statement, bomb statement, absolute value, program",Fortran, Mothra +Rojas et al.\cite{rojas2015combining},"arithmetic op, relational op, constant, variable, conditional op, statement deletion, OO-specific, bitwise op, program",, +Dadeau et al.\cite{dadeau2011mutation},specification,, +Polo et al.\cite{polo2007integrating},"arithmetic op, relational op, conditional op, bitwise op, assignment op, shift op,OO-specific, Java-specific, program",, +Flores and Polo\cite{flores2012testing},"arithmetic op, relational op, conditional op, bitwise op, assignment op, shift op,OO-specific, Java-specific, Interface mutation, program",, +Vincenzi et al.\cite{vincenzi2001unit},"bomb statement, conditional exp, statement deletion, return statement, goto label, control-flow disruption, while statement, do statement, loop trap, statement swap, brace, switch statement, arithmetic op, bitwise op, conditional op, shift op, relational op, assignment op, parentheses, type, variable, constant, interface mutation, program",, +Mariani et al.\cite{mariani2007compatibility},"interface mutation, program",, +Edwards\cite{edwards2001framework},"absolute value, arithmetic op, conditional op, relational op, program",, +Flores and Polo\cite{flores2008testing},"arithmetic op, relational op, conditional op, bitwise op, assignment op, shift op,OO-specific, Java-specific, Interface mutation, program",, diff --git a/second_round_selection.bib b/second_round_selection.bib index 1f0d14c..0bf948a 100644 --- a/second_round_selection.bib +++ b/second_round_selection.bib @@ -16,7 +16,6 @@ @article{Aichernig2015716 Note = {cited By 1}, Number = {8}, Pages = {716-748}, - Source = {Scopus}, Title = {Killing strategies for model-based mutation testing}, Volume = {25}, Year = {2015}} @@ -29,7 +28,6 @@ @article{McMinn2015 Journal = {ACM Transactions on Software Engineering and Methodology}, Note = {cited By 0}, Number = {1}, - Source = {Scopus}, Title = {The effectiveness of test coverage criteria for relational database schema integrity constraints}, Volume = {25}, Year = {2015}} @@ -43,7 +41,6 @@ @article{Gay20151119 Note = {cited By 1}, Number = {11}, Pages = {1119-1137}, - Source = {Scopus}, Title = {Automated Oracle Data Selection Support}, Volume = {41}, Year = {2015}} @@ -56,7 +53,6 @@ @article{Fraser2015783 Note = {cited By 2}, Number = {3}, Pages = {783-812}, - Source = {Scopus}, Title = {Achieving scalable mutation-based generation of whole test suites}, Volume = {20}, Year = {2015}} @@ -70,7 +66,6 @@ @article{Mirshokraie2015429 Note = {cited By 1}, Number = {5}, Pages = {429-444}, - Source = {Scopus}, Title = {Guided mutation testing for JavaScript web applications}, Volume = {41}, Year = {2015}} @@ -84,7 +79,6 @@ @article{Belli2015113 Note = {cited By 0}, Number = {2}, Pages = {113-134}, - Source = {Scopus}, Title = {Exploiting model morphology for event-based testing}, Volume = {41}, Year = {2015}} @@ -96,7 +90,6 @@ @conference{Tiran2015 Doi = {10.1109/ICST.2015.7102614}, Journal = {2015 IEEE 8th International Conference on Software Testing, Verification and Validation, ICST 2015 - Proceedings}, Note = {cited By 0}, - Source = {Scopus}, Title = {Incremental model-based mutation testing}, Year = {2015}} @@ -107,7 +100,6 @@ @conference{Lorber2015 Doi = {10.1109/ICST.2015.7102615}, Journal = {2015 IEEE 8th International Conference on Software Testing, Verification and Validation, ICST 2015 - Proceedings}, Note = {cited By 0}, - Source = {Scopus}, Title = {Model-based mutation testing of synchronous and asynchronous real-time systems}, Year = {2015}} @@ -119,7 +111,6 @@ @article{Arcaini2015629 Note = {cited By 0}, Number = {5-7}, Pages = {629-652}, - Source = {Scopus}, Title = {Using mutation to assess fault detection capability of model review}, Volume = {25}, Year = {2015}} @@ -131,7 +122,6 @@ @conference{Bardin2015 Doi = {10.1109/ICST.2015.7102607}, Journal = {2015 IEEE 8th International Conference on Software Testing, Verification and Validation, ICST 2015 - Proceedings}, Note = {cited By 0}, - Source = {Scopus}, Title = {Sound and quasi-complete detection of infeasible test requirements}, Year = {2015}} @@ -143,7 +133,6 @@ @article{Dadeau2015684 Note = {cited By 0}, Number = {5-7}, Pages = {684-711}, - Source = {Scopus}, Title = {Model-based mutation testing from security protocols in HLPSL}, Volume = {25}, Year = {2015}} @@ -156,7 +145,6 @@ @article{Papadakis2015605 Note = {cited By 1}, Number = {5-7}, Pages = {605-628}, - Source = {Scopus}, Title = {Metallaxis-FL: Mutation-based fault localization}, Volume = {25}, Year = {2015}} @@ -168,7 +156,6 @@ @article{Patrick2015328 Journal = {Journal of Systems and Software}, Note = {cited By 0}, Pages = {328-342}, - Source = {Scopus}, Title = {Subdomain-based test data generation}, Volume = {103}, Year = {2015}} @@ -180,7 +167,6 @@ @conference{DiNardo2015 Doi = {10.1109/ICST.2015.7102589}, Journal = {2015 IEEE 8th International Conference on Software Testing, Verification and Validation, ICST 2015 - Proceedings}, Note = {cited By 0}, - Source = {Scopus}, Title = {Generating complex and faulty test data through model-based mutation analysis}, Year = {2015}} @@ -190,7 +176,6 @@ @conference{Mirshokraie2014453 Journal = {2014 International Symposium on Software Testing and Analysis, ISSTA 2014 - Proceedings}, Note = {cited By 0}, Pages = {453-456}, - Source = {Scopus}, Title = {Effective test generation and adequacy assessment for javascript-based web applications}, Year = {2014}, Bdsk-Url-1 = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-84942791192&partnerID=40&md5=9b4a42d65ed68ee1a258477cf6ce8b4f}} @@ -202,7 +187,6 @@ @conference{Edwards2014354 Journal = {36th International Conference on Software Engineering, ICSE Companion 2014 - Proceedings}, Note = {cited By 2}, Pages = {354-363}, - Source = {Scopus}, Title = {Comparing test quality measures for assessing student-written tests}, Year = {2014}} @@ -214,7 +198,6 @@ @conference{Papadakis20141 Journal = {Proceedings - IEEE 7th International Conference on Software Testing, Verification and Validation, ICST 2014}, Note = {cited By 7}, Pages = {1-10}, - Source = {Scopus}, Title = {Sampling program inputs with mutation analysis: Going beyond combinatorial interaction testing}, Year = {2014}} @@ -226,7 +209,6 @@ @conference{Stephan2014633 Journal = {Proceedings - 30th International Conference on Software Maintenance and Evolution, ICSME 2014}, Note = {cited By 2}, Pages = {633-638}, - Source = {Scopus}, Title = {Model clone detector evaluation using mutation analysis}, Year = {2014}} @@ -238,7 +220,6 @@ @conference{Moon2014153 Journal = {Proceedings - IEEE 7th International Conference on Software Testing, Verification and Validation, ICST 2014}, Note = {cited By 4}, Pages = {153-162}, - Source = {Scopus}, Title = {Ask the Mutants: Mutating faulty programs for fault localization}, Year = {2014}} @@ -250,7 +231,6 @@ @article{Jee2014608 Note = {cited By 2}, Number = {8}, Pages = {608-628}, - Source = {Scopus}, Title = {Automated test case generation for FBD programs implementing reactor protection system software}, Volume = {24}, Year = {2014}} @@ -263,7 +243,6 @@ @conference{Rubab20141 Journal = {Proceedings - International Conference on Quality Software}, Note = {cited By 0}, Pages = {1-10}, - Source = {Scopus}, Title = {Model-based testing of obligations}, Year = {2014}} @@ -275,7 +254,6 @@ @conference{Kanewala20131 Journal = {2013 IEEE 24th International Symposium on Software Reliability Engineering, ISSRE 2013}, Note = {cited By 5}, Pages = {1-10}, - Source = {Scopus}, Title = {Using machine learning techniques to detect metamorphic relations for programs without test oracles}, Year = {2013}} @@ -287,7 +265,6 @@ @article{Schuler2013531 Note = {cited By 4}, Number = {7}, Pages = {531-551}, - Source = {Scopus}, Title = {Checked coverage: An indicator for oracle quality}, Volume = {23}, Year = {2013}} @@ -300,7 +277,6 @@ @conference{Stephan20131261 Journal = {Proceedings - International Conference on Software Engineering}, Note = {cited By 1}, Pages = {1261-1264}, - Source = {Scopus}, Title = {Using mutation analysis for a model-clone detector comparison framework}, Year = {2013}} @@ -312,7 +288,6 @@ @conference{Deng201384 Journal = {Proceedings - IEEE 6th International Conference on Software Testing, Verification and Validation, ICST 2013}, Note = {cited By 3}, Pages = {84-93}, - Source = {Scopus}, Title = {Empirical evaluation of the statement deletion mutation operator}, Year = {2013}} @@ -324,7 +299,6 @@ @conference{Kapfhammer201331 Journal = {Proceedings - IEEE 6th International Conference on Software Testing, Verification and Validation, ICST 2013}, Note = {cited By 5}, Pages = {31-40}, - Source = {Scopus}, Title = {Search-based testing of relational schema integrity constraints across multiple database management systems}, Year = {2013}} @@ -336,7 +310,6 @@ @article{Schuler2013353 Note = {cited By 10}, Number = {5}, Pages = {353-374}, - Source = {Scopus}, Title = {Covering and Uncovering Equivalent Mutants}, Volume = {23}, Year = {2013}} @@ -350,7 +323,6 @@ @article{Baker2013787 Note = {cited By 9}, Number = {6}, Pages = {787-805}, - Source = {Scopus}, Title = {An empirical evaluation of mutation testing for improving the test quality of safety-critical software}, Volume = {39}, Year = {2013}} @@ -363,7 +335,6 @@ @article{Aboutrab20131209 Note = {cited By 5}, Number = {5}, Pages = {1209-1223}, - Source = {Scopus}, Title = {Testing real-time embedded systems using timed automata based approaches}, Volume = {86}, Year = {2013}} @@ -376,7 +347,6 @@ @conference{Staats2012311 Journal = {Proceedings - International Symposium on Software Reliability Engineering, ISSRE}, Note = {cited By 9}, Pages = {311-320}, - Source = {Scopus}, Title = {Oracle-centric test case prioritization}, Year = {2012}} @@ -388,7 +358,6 @@ @conference{Mottu2012291 Journal = {Proceedings - International Symposium on Software Reliability Engineering, ISSRE}, Note = {cited By 8}, Pages = {291-300}, - Source = {Scopus}, Title = {Static analysis of model transformations for effective test generation}, Year = {2012}} @@ -399,7 +368,6 @@ @conference{Jamrozik2012254 Journal = {2012 27th IEEE/ACM International Conference on Automated Software Engineering, ASE 2012 - Proceedings}, Note = {cited By 8}, Pages = {254-257}, - Source = {Scopus}, Title = {Augmented dynamic symbolic execution}, Year = {2012}} @@ -411,7 +379,6 @@ @article{Shahamiri2012303 Note = {cited By 7}, Number = {3}, Pages = {303-334}, - Source = {Scopus}, Title = {Artificial Neural Networks as multi-networks automated test oracle}, Volume = {19}, Year = {2012}} @@ -424,7 +391,6 @@ @conference{Staats2012870 Journal = {Proceedings - International Conference on Software Engineering}, Note = {cited By 18}, Pages = {870-880}, - Source = {Scopus}, Title = {Automated oracle creation support, or: How I learned to stop worrying about fault propagation and love mutation testing}, Year = {2012}} @@ -436,7 +402,6 @@ @conference{Jolly2012400 Journal = {Proceedings - IEEE 5th International Conference on Software Testing, Verification and Validation, ICST 2012}, Note = {cited By 5}, Pages = {400-409}, - Source = {Scopus}, Title = {Automated unit testing of a SCADA control software: An industrial case study based on action research}, Year = {2012}} @@ -448,7 +413,6 @@ @conference{Bertolino2012842 Journal = {Proceedings - IEEE 5th International Conference on Software Testing, Verification and Validation, ICST 2012}, Note = {cited By 12}, Pages = {842-849}, - Source = {Scopus}, Title = {Automatic XACML requests generation for policy testing}, Year = {2012}} @@ -460,7 +424,6 @@ @conference{Schieferdecker2012814 Journal = {Proceedings - IEEE 5th International Conference on Software Testing, Verification and Validation, ICST 2012}, Note = {cited By 1}, Pages = {814}, - Source = {Scopus}, Title = {Model-based fuzz testing}, Year = {2012}} @@ -472,7 +435,6 @@ @conference{Elrakaiby2012673 Journal = {Proceedings - IEEE 5th International Conference on Software Testing, Verification and Validation, ICST 2012}, Note = {cited By 4}, Pages = {673-680}, - Source = {Scopus}, Title = {Testing obligation policy enforcement using mutation analysis}, Year = {2012}} @@ -484,7 +446,6 @@ @conference{Shelton2012878 Journal = {Proceedings - IEEE 5th International Conference on Software Testing, Verification and Validation, ICST 2012}, Note = {cited By 2}, Pages = {878-886}, - Source = {Scopus}, Title = {Adding criteria-based tests to test driven development}, Year = {2012}} @@ -496,7 +457,6 @@ @conference{Papadakis2012691 Journal = {Proceedings - IEEE 5th International Conference on Software Testing, Verification and Validation, ICST 2012}, Note = {cited By 10}, Pages = {691-700}, - Source = {Scopus}, Title = {Using mutants to locate "unknown" faults}, Year = {2012}} @@ -508,7 +468,6 @@ @article{Xu2012267 Note = {cited By 4}, Number = {4}, Pages = {267-293}, - Source = {Scopus}, Title = {Testing aspect-oriented programs with finite state machines}, Volume = {22}, Year = {2012}} @@ -522,7 +481,6 @@ @article{Fraser2012278 Note = {cited By 63}, Number = {2}, Pages = {278-292}, - Source = {Scopus}, Title = {Mutation-driven generation of unit tests and oracles}, Volume = {38}, Year = {2012}} @@ -535,7 +493,6 @@ @article{Miller201233 Note = {cited By 7}, Number = {1}, Pages = {33-63}, - Source = {Scopus}, Title = {A case study in model-based testing of specifications and implementations}, Volume = {22}, Year = {2012}} @@ -548,7 +505,6 @@ @article{Chae20112053 Note = {cited By 1}, Number = {12}, Pages = {2053-2064}, - Source = {Scopus}, Title = {An automated approach to reducing test suites for testing retargeted C compilers for embedded systems}, Volume = {84}, Year = {2011}} @@ -561,7 +517,6 @@ @article{Delamare2011215 Note = {cited By 3}, Number = {3}, Pages = {215-239}, - Source = {Scopus}, Title = {An approach for testing pointcut descriptors in AspectJ}, Volume = {21}, Year = {2011}} @@ -574,7 +529,6 @@ @conference{Schuler201190 Journal = {Proceedings - 4th IEEE International Conference on Software Testing, Verification, and Validation, ICST 2011}, Note = {cited By 13}, Pages = {90-99}, - Source = {Scopus}, Title = {Assessing oracle quality with checked coverage}, Year = {2011}} @@ -586,7 +540,6 @@ @conference{Belli2011249 Journal = {Proceedings - 4th IEEE International Conference on Software Testing, Verification, and Validation, ICST 2011}, Note = {cited By 3}, Pages = {249-258}, - Source = {Scopus}, Title = {Mutation testing of "go-back" functions based on pushdown automata}, Year = {2011}} @@ -598,7 +551,6 @@ @conference{Aichernig2011120 Journal = {Proceedings - 4th IEEE International Conference on Software Testing, Verification, and Validation, ICST 2011}, Note = {cited By 14}, Pages = {120-129}, - Source = {Scopus}, Title = {Efficient mutation killers in action}, Year = {2011}} @@ -610,7 +562,6 @@ @conference{Lazaar2011319 Journal = {Proceedings - 4th IEEE International Conference on Software Testing, Verification, and Validation, ICST 2011}, Note = {cited By 2}, Pages = {319-326}, - Source = {Scopus}, Title = {A framework for the automatic correction of constraint programs}, Year = {2011}} @@ -622,7 +573,6 @@ @conference{Shrestha2011110 Journal = {Proceedings - 4th IEEE International Conference on Software Testing, Verification, and Validation, ICST 2011}, Note = {cited By 6}, Pages = {110-119}, - Source = {Scopus}, Title = {An empirical evaluation of assertions as oracles}, Year = {2011}} @@ -634,7 +584,6 @@ @article{Xie2011544 Note = {cited By 25}, Number = {4}, Pages = {544-558}, - Source = {Scopus}, Title = {Testing and validating machine learning classifiers by metamorphic testing}, Volume = {84}, Year = {2011}} @@ -646,7 +595,6 @@ @conference{Zhang2010 Doi = {10.1109/ICSM.2010.5609672}, Journal = {IEEE International Conference on Software Maintenance, ICSM}, Note = {cited By 4}, - Source = {Scopus}, Title = {Test generation via Dynamic Symbolic Execution for mutation testing}, Year = {2010}} @@ -658,7 +606,6 @@ @conference{Papadakis2010121 Journal = {Proceedings - International Symposium on Software Reliability Engineering, ISSRE}, Note = {cited By 27}, Pages = {121-130}, - Source = {Scopus}, Title = {Automatic mutation test case generation via dynamic symbolic execution}, Year = {2010}} @@ -670,7 +617,6 @@ @conference{Brandl20103 Journal = {Proceedings - International Conference on Quality Software}, Note = {cited By 11}, Pages = {3-12}, - Source = {Scopus}, Title = {Automated conformance verification of hybrid systems}, Year = {2010}} @@ -682,7 +628,6 @@ @conference{Wang2010151 Journal = {Proceedings - International Conference on Quality Software}, Note = {cited By 1}, Pages = {151-160}, - Source = {Scopus}, Title = {Correlating context-awareness and mutation analysis for pervasive computing systems}, Year = {2010}} @@ -693,7 +638,6 @@ @conference{Fraser2010147 Journal = {ISSTA'10 - Proceedings of the 2010 International Symposium on Software Testing and Analysis}, Note = {cited By 52}, Pages = {147-157}, - Source = {Scopus}, Title = {Mutation-driven generation of unit tests and oracles}, Year = {2010}} @@ -704,7 +648,6 @@ @conference{Ferrari201051 Journal = {Proceedings - International Conference on Software Engineering}, Note = {cited By 7}, Pages = {51-58}, - Source = {Scopus}, Title = {Automating the mutation testing of aspect-oriented Java programs}, Year = {2010}} @@ -716,7 +659,6 @@ @conference{Segura201035 Journal = {ICST 2010 - 3rd International Conference on Software Testing, Verification and Validation}, Note = {cited By 19}, Pages = {35-44}, - Source = {Scopus}, Title = {Automated test data generation on the analyses of feature models: A metamorphic testing approach}, Year = {2010}} @@ -728,7 +670,6 @@ @conference{Xu2010265 Journal = {ICST 2010 - 3rd International Conference on Software Testing, Verification and Validation}, Note = {cited By 4}, Pages = {265-274}, - Source = {Scopus}, Title = {Prioritizing state-based aspect tests}, Year = {2010}} @@ -740,7 +681,6 @@ @conference{Wang200945 Journal = {Proceedings - International Conference on Software Engineering}, Note = {cited By 52}, Pages = {45-55}, - Source = {Scopus}, Title = {Taming coincidental correctness: Coverage refinement with context patterns to improve fault localization}, Year = {2009}} @@ -752,7 +692,6 @@ @conference{Ali200976 Journal = {ASE2009 - 24th IEEE/ACM International Conference on Automated Software Engineering}, Note = {cited By 24}, Pages = {76-87}, - Source = {Scopus}, Title = {Evaluating the accuracy of fault localization techniques}, Year = {2009}} @@ -764,7 +703,6 @@ @article{Smith20091819 Note = {cited By 9}, Number = {11}, Pages = {1819-1832}, - Source = {Scopus}, Title = {Should software testers use mutation analysis to augment a test set?}, Volume = {82}, Year = {2009}} @@ -777,7 +715,6 @@ @conference{Bandyopadhyay2009121 Journal = {Proceedings - 2nd International Conference on Software Testing, Verification, and Validation, ICST 2009}, Note = {cited By 14}, Pages = {121-130}, - Source = {Scopus}, Title = {Test input generation using UML sequence and state machines models}, Year = {2009}} @@ -789,7 +726,6 @@ @article{Smith2009341 Note = {cited By 17}, Number = {3}, Pages = {341-369}, - Source = {Scopus}, Title = {On guiding the augmentation of an automated test suite via mutation analysis}, Volume = {14}, Year = {2009}} @@ -801,7 +737,6 @@ @conference{Pinte2008927 Journal = {Proceedings - International Conference on Software Engineering}, Note = {cited By 4}, Pages = {927-928}, - Source = {Scopus}, Title = {Techniques and tools for the automatic generation of optimal test data at code, model and interface level}, Year = {2008}} @@ -813,7 +748,6 @@ @conference{Pretschner2008338 Journal = {Proceedings of the 1st International Conference on Software Testing, Verification and Validation, ICST 2008}, Note = {cited By 28}, Pages = {338-347}, - Source = {Scopus}, Title = {Model-based tests for access control policies 1}, Year = {2008}} @@ -825,7 +759,6 @@ @conference{Tan200862 Journal = {Proceedings of the 1st International Conference on Software Testing, Verification and Validation, ICST 2008}, Note = {cited By 2}, Pages = {62-71}, - Source = {Scopus}, Title = {Evaluating automated unit testing in Sulu}, Year = {2008}} @@ -837,7 +770,6 @@ @article{Hennessy2008343 Note = {cited By 6}, Number = {4}, Pages = {343-368}, - Source = {Scopus}, Title = {Analysing the effectiveness of rule-coverage as a reduction criterion for test suites of grammar-based software}, Volume = {13}, Year = {2008}} @@ -850,7 +782,6 @@ @article{Zhan2008262 Note = {cited By 24}, Number = {2}, Pages = {262-285}, - Source = {Scopus}, Title = {A search-based framework for automatic testing of MATLAB/Simulink models}, Volume = {81}, Year = {2008}} @@ -863,7 +794,6 @@ @conference{Koster2007state Journal = {ESEC/FSE'07: 6th Joint Meeting of the European Software Engineering Conference and the ACM SIGSOFT Symposium on the Foundations of Software Engineering - Companion Papers}, Note = {cited By 7}, Pages = {541-544}, - Source = {Scopus}, Title = {State coverage: A structural test adequacy criterion for behavior checking}, Year = {2007}} @@ -875,7 +805,6 @@ @conference{Cheon2007410 Journal = {Proceedings - International Conference on Quality Software}, Note = {cited By 1}, Pages = {410-414}, - Source = {Scopus}, Title = {Abstraction in assertion-based test oracles}, Year = {2007}} @@ -886,7 +815,6 @@ @conference{Shan200643 Journal = {Proceedings - International Conference on Software Engineering}, Note = {cited By 1}, Pages = {43-49}, - Source = {Scopus}, Title = {Testing software modelling tools using data mutation}, Year = {2006}} @@ -898,7 +826,6 @@ @conference{Liu2006113 Journal = {IEEE International Conference on Software Maintenance, ICSM}, Note = {cited By 12}, Pages = {113-122}, - Source = {Scopus}, Title = {An approach to test data generation for killing multiple mutants}, Year = {2006}} @@ -909,7 +836,6 @@ @conference{Mayer2006105 Journal = {ISESE'06 - Proceedings of the 5th ACM-IEEE International Symposium on Empirical Software Engineering}, Note = {cited By 24}, Pages = {105-114}, - Source = {Scopus}, Title = {An empirical analysis and comparison of random testing techniques}, Volume = {2006}, Year = {2006}} @@ -922,7 +848,6 @@ @conference{Mayer200685 Journal = {Proceedings - International Conference on Quality Software}, Note = {cited By 7}, Pages = {85-92}, - Source = {Scopus}, Title = {On random testing of image processing applications}, Year = {2006}} @@ -934,7 +859,6 @@ @article{Andrews2006608 Note = {cited By 180}, Number = {8}, Pages = {608-624}, - Source = {Scopus}, Title = {Using mutation analysis for assessing and comparing testing coverage criteria}, Volume = {32}, Year = {2006}} @@ -947,7 +871,6 @@ @article{LeTraon2006571 Note = {cited By 33}, Number = {8}, Pages = {571-586}, - Source = {Scopus}, Title = {Design by contract to improve software vigilance}, Volume = {32}, Year = {2006}} @@ -960,7 +883,6 @@ @article{Vergilio2006756 Note = {cited By 7}, Number = {6}, Pages = {756-771}, - Source = {Scopus}, Title = {Constraint based structural testing criteria}, Volume = {79}, Year = {2006}} @@ -973,7 +895,6 @@ @article{Baudry200573 Note = {cited By 38}, Number = {2}, Pages = {73-96}, - Source = {Scopus}, Title = {From genetic to bacteriological algorithms for mutation-based testing}, Volume = {15}, Year = {2005}} @@ -985,7 +906,6 @@ @article{Yoon200445 Note = {cited By 6}, Number = {1}, Pages = {45-70}, - Source = {Scopus}, Title = {Effective test case selection for component customization and its application to enterprise JavaBeans}, Volume = {14}, Year = {2004}, @@ -999,7 +919,6 @@ @conference{Lyu2003119 Journal = {Proceedings - International Symposium on Software Reliability Engineering, ISSRE}, Note = {cited By 26}, Pages = {119-130}, - Source = {Scopus}, Title = {An empirical study on testing and fault tolerance for software reliability engineering}, Volume = {2003-January}, Year = {2003}} @@ -1012,7 +931,6 @@ @conference{Baudry2002195 Journal = {Proceedings - International Symposium on Software Reliability Engineering, ISSRE}, Note = {cited By 14}, Pages = {195-206}, - Source = {Scopus}, Title = {Genes and bacteria for automatic test cases optimization in the.NET environment}, Volume = {2002-January}, Year = {2002}} @@ -1025,7 +943,6 @@ @article{Vincenzi2001249 Note = {cited By 11}, Number = {4}, Pages = {249-268}, - Source = {Scopus}, Title = {Unit and integration testing strategies for C programs using mutation}, Volume = {11}, Year = {2001}} @@ -1038,7 +955,6 @@ @article{Kim2001207 Note = {cited By 31}, Number = {4}, Pages = {207-225}, - Source = {Scopus}, Title = {Investigating the effectiveness of object-oriented testing strategies using the mutation method}, Volume = {11}, Year = {2001}} @@ -1049,7 +965,6 @@ @conference{Lee2001200 Journal = {Proceedings of the International Symposium on Software Reliability Engineering, ISSRE}, Note = {cited By 33}, Pages = {200-209}, - Source = {Scopus}, Title = {Generating test cases for XML-based web component interactions using mutation analysis}, Year = {2001}, Bdsk-Url-1 = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-0035691797&partnerID=40&md5=683c1abef53c231abd651e5a805fd89a}} @@ -1060,7 +975,6 @@ @conference{Chevalley2001254 Journal = {Proceedings of the International Symposium on Software Reliability Engineering, ISSRE}, Note = {cited By 8}, Pages = {254-263}, - Source = {Scopus}, Title = {An empirical evaluation of statistical testing designed from UML state diagrams: The flight guidance system case study}, Year = {2001}, Bdsk-Url-1 = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-0035685353&partnerID=40&md5=197b0e975dc18145cd6d1f2f43d9b7f2}} @@ -1071,7 +985,6 @@ @conference{vonMayrhauser2000186 Journal = {Proceedings of the International Symposium on Software Reliability Engineering, ISSRE}, Note = {cited By 3}, Pages = {186-195}, - Source = {Scopus}, Title = {Planner based error recovery testing}, Year = {2000}, Bdsk-Url-1 = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-0034539297&partnerID=40&md5=cd893c443100c228930a95f949677b55}} @@ -1082,7 +995,6 @@ @conference{Baudry20004 Journal = {Proceedings of the International Symposium on Software Reliability Engineering, ISSRE}, Note = {cited By 10}, Pages = {4-17}, - Source = {Scopus}, Title = {Building trust into OO components using a genetic analogy}, Year = {2000}, Bdsk-Url-1 = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-0034546778&partnerID=40&md5=cf0e0256b8ca2f7e3a5057d0bf03898c}} @@ -1095,7 +1007,6 @@ @article{Edwards2000249 Note = {cited By 20}, Number = {4}, Pages = {249-262}, - Source = {Scopus}, Title = {Black-box testing using flowgraphs: An experimental assessment of effectiveness and automation potential}, Volume = {10}, Year = {2000}} @@ -1106,7 +1017,6 @@ @conference{Woodward2000168 Journal = {Proceedings of the ACM SIGSOFT 2000 International Symposium on Software Testing and Analysis}, Note = {cited By 5}, Pages = {168-172}, - Source = {Scopus}, Title = {Testability, fault size and the domain-to-range ratio: An eternal triangle}, Year = {2000}, Bdsk-Url-1 = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-0034592888&partnerID=40&md5=aa21c51b78edf201937f6039fdfa5f82}} @@ -1119,7 +1029,6 @@ @article{JeffersonOffutt199949 Note = {cited By 39}, Number = {1}, Pages = {49-62}, - Source = {Scopus}, Title = {Generating test data from SOFL specifications}, Volume = {49}, Year = {1999}} @@ -1130,7 +1039,6 @@ @conference{Watanabe199581 Journal = {Proceedings - International Conference on Software Engineering}, Note = {cited By 1}, Pages = {81-89}, - Source = {Scopus}, Title = {Specification-based adaptive test case generation strategy for open operating system standards}, Year = {1995}, Bdsk-Url-1 = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-0029490423&partnerID=40&md5=93fa091d4834a29827ddcc7e7eb3c7ce}} @@ -1142,7 +1050,6 @@ @article{Laski199581 Note = {cited By 6}, Number = {2}, Pages = {81-105}, - Source = {Scopus}, Title = {Error masking in computer programs}, Volume = {5}, Year = {1995}, @@ -1156,7 +1063,6 @@ @article{Weyuker1994353 Note = {cited By 144}, Number = {5}, Pages = {353-363}, - Source = {Scopus}, Title = {Automatically Generating Test Data from a Boolean Specification}, Volume = {20}, Year = {1994}} @@ -1169,7 +1075,6 @@ @article{DeMillo1993109 Note = {cited By 67}, Number = {2}, Pages = {109-127}, - Source = {Scopus}, Title = {Experimental results from an automatic test case generator}, Volume = {2}, Year = {1993}} @@ -1182,7 +1087,6 @@ @article{Lyu1993179 Note = {cited By 31}, Number = {2}, Pages = {179-189}, - Source = {Scopus}, Title = {Improving the N-Version Programming Process Through the Evolution of a Design Paradigm}, Volume = {42}, Year = {1993}} @@ -1195,7 +1099,6 @@ @article{DeMillo1991900 Note = {cited By 383}, Number = {9}, Pages = {900-910}, - Source = {Scopus}, Title = {Constraint-based automatic test data generation}, Volume = {17}, Year = {1991}} @@ -1206,7 +1109,6 @@ @conference{Howden1982235 Journal = {Proceedings - International Conference on Software Engineering}, Note = {cited By 5}, Pages = {235-243}, - Source = {Scopus}, Title = {COMPLETENESS CRITERIA FOR TESTING ELEMENTARY PROGRAM FUNCTIONS.}, Year = {1982}, Bdsk-Url-1 = {https://www.scopus.com/inward/record.uri?eid=2-s2.0-0019893235&partnerID=40&md5=3a67cf44c8cc9d05b67813b66591c0fe}}