{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,8]],"date-time":"2024-09-08T12:10:32Z","timestamp":1725797432079},"publisher-location":"Cham","reference-count":17,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319099392"},{"type":"electronic","value":"9783319099408"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-09940-8_13","type":"book-chapter","created":{"date-parts":[[2014,7,20]],"date-time":"2014-07-20T21:05:10Z","timestamp":1405890310000},"page":"184-198","source":"Crossref","is-referenced-by-count":11,"title":["Towards Automated A\/B Testing"],"prefix":"10.1007","author":[{"given":"Giordano","family":"Tamburrelli","sequence":"first","affiliation":[]},{"given":"Alessandro","family":"Margara","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"key":"13_CR1","unstructured":"Genetify, \n \n https:\/\/github.com\/gregdingle\/genetify\/wiki\n \n \n (accessed February 25, 2014)"},{"key":"13_CR2","unstructured":"JBoss AOP, \n \n http:\/\/www.jboss.org\/jbossaop\n \n \n (accessed February 25, 2014)"},{"key":"13_CR3","unstructured":"The A\/B Test: Inside the Technology Thats Changing the Rules of Business, \n \n http:\/\/www.wired.com\/business\/2012\/04\/ff_abtesting\n \n \n (accessed February 25, 2014)"},{"key":"13_CR4","doi-asserted-by":"crossref","unstructured":"Afzal, W., Torkar, R., Feldt, R.: A systematic review of search-based testing for non-functional system properties. Inf. Softw. Technol. (2009)","DOI":"10.1016\/j.infsof.2008.12.005"},{"key":"13_CR5","first-page":"1105","volume-title":"ACM SIGKDD, KDD 2009","author":"T. Crook","year":"2009","unstructured":"Crook, T., Frasca, B., Kohavi, R., Longbotham, R.: Seven pitfalls to avoid when running controlled experiments on the web. In: ACM SIGKDD, KDD 2009, pp. 1105\u20131114. ACM, New York (2009)"},{"issue":"2-4","key":"13_CR6","doi-asserted-by":"publisher","first-page":"311","DOI":"10.1016\/S0045-7825(99)00389-8","volume":"186","author":"K. Deb","year":"2000","unstructured":"Deb, K.: An efficient constraint handling method for genetic algorithms. Computer Methods in Applied Mechanics and Engineering\u00a0186(2-4), 311\u2013338 (2000)","journal-title":"Computer Methods in Applied Mechanics and Engineering"},{"issue":"14","key":"13_CR7","doi-asserted-by":"publisher","first-page":"833","DOI":"10.1016\/S0950-5849(01)00189-6","volume":"43","author":"M. Harman","year":"2001","unstructured":"Harman, M., Jones, B.F.: Search-based software engineering. Information and Software Technology\u00a043(14), 833\u2013839 (2001)","journal-title":"Information and Software Technology"},{"key":"13_CR8","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"220","DOI":"10.1007\/BFb0053381","volume-title":"ECOOP \u201997 - Object-Oriented Programming","author":"G. Kiczales","year":"1997","unstructured":"Kiczales, G., Lamping, J., Mendhekar, A., Maeda, C., Lopes, C., Loingtier, J.-M., Irwin, J.: Aspect-oriented programming. In: Ak\u015fit, M., Matsuoka, S. (eds.) ECOOP 1997. LNCS, vol.\u00a01241, pp. 220\u2013242. Springer, Heidelberg (1997)"},{"key":"13_CR9","doi-asserted-by":"crossref","unstructured":"Kohavi, R., Deng, A., Frasca, B., Longbotham, R., Walker, T., Xu, Y.: Trustworthy online controlled experiments: Five puzzling outcomes explained. In: ACM SIGKDD, pp. 786\u2013794. ACM (2012)","DOI":"10.1145\/2339530.2339653"},{"key":"13_CR10","first-page":"1168","volume-title":"ACM SIGKDD, KDD 2013","author":"R. Kohavi","year":"2013","unstructured":"Kohavi, R., Deng, A., Frasca, B., Walker, T., Xu, Y., Pohlmann, N.: Online controlled experiments at large scale. In: ACM SIGKDD, KDD 2013, pp. 1168\u20131176. ACM, New York (2013)"},{"key":"13_CR11","doi-asserted-by":"crossref","unstructured":"Kohavi, R., Henne, R.M., Sommerfield, D.: Practical guide to controlled experiments on the web: Listen to your customers not to the hippo. In: ACM SIGKDD, pp. 959\u2013967. ACM (2007)","DOI":"10.1145\/1281192.1281295"},{"issue":"2","key":"13_CR12","doi-asserted-by":"publisher","first-page":"31","DOI":"10.1145\/1964897.1964905","volume":"12","author":"R. Kohavi","year":"2011","unstructured":"Kohavi, R., Longbotham, R.: Unexpected results in online controlled experiments. ACM SIGKDD\u00a012(2), 31\u201335 (2011)","journal-title":"ACM SIGKDD"},{"key":"13_CR13","unstructured":"Koza, J.R.: Genetic programming: On the programming of computers by means of natural selection, vol.\u00a01. MIT Press (1992)"},{"key":"13_CR14","unstructured":"Meffert, K., Rotstan, N., Knowles, C., Sangiorgi, U.: JGAP - Java Genetic Algorithms and Genetic Programming Package (2014)"},{"key":"13_CR15","doi-asserted-by":"crossref","unstructured":"O\u2019Keeffe, M., Cinneide, M.O.: Search-based software maintenance. In: Proceedings of the 10th European Conference on Software Maintenance and Reengineering, CSMR 2006, p. 10, 260 (March 2006)","DOI":"10.1109\/CSMR.2006.49"},{"issue":"4","key":"13_CR16","doi-asserted-by":"publisher","first-page":"203","DOI":"10.1016\/j.cosrev.2010.06.001","volume":"4","author":"O. R\u00e4ih\u00e4","year":"2010","unstructured":"R\u00e4ih\u00e4, O.: A survey on search-based software design. Computer Science Review\u00a04(4), 203\u2013249 (2010)","journal-title":"Computer Science Review"},{"key":"13_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"crossref","first-page":"88","DOI":"10.1007\/978-3-540-69062-7_8","volume-title":"Requirements Engineering: Foundation for Software Quality","author":"Y. Zhang","year":"2008","unstructured":"Zhang, Y., Finkelstein, A., Harman, M.: Search based requirements optimisation: Existing work and challenges. In: Rolland, C. (ed.) REFSQ 2008. LNCS, vol.\u00a05025, pp. 88\u201394. Springer, Heidelberg (2008)"}],"container-title":["Lecture Notes in Computer Science","Search-Based Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-09940-8_13","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,5,27]],"date-time":"2019-05-27T13:58:34Z","timestamp":1558965514000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-09940-8_13"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319099392","9783319099408"],"references-count":17,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-09940-8_13","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2014]]}}}