{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,5,28]],"date-time":"2024-05-28T07:06:13Z","timestamp":1716879973263},"reference-count":30,"publisher":"Institution of Engineering and Technology (IET)","issue":"2","license":[{"start":{"date-parts":[[2013,4,1]],"date-time":"2013-04-01T00:00:00Z","timestamp":1364774400000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/onlinelibrary.wiley.com\/termsAndConditions#vor"},{"start":{"date-parts":[[2013,4,1]],"date-time":"2013-04-01T00:00:00Z","timestamp":1364774400000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IET softw."],"published-print":{"date-parts":[[2013,4]]},"DOI":"10.1049\/iet-sen.2012.0074","type":"journal-article","created":{"date-parts":[[2013,5,16]],"date-time":"2013-05-16T12:02:19Z","timestamp":1368705739000},"page":"104-117","source":"Crossref","is-referenced-by-count":25,"title":["Metaheuristic approach for constructing functional test\u2010suites"],"prefix":"10.1049","volume":"7","author":[{"given":"Himer","family":"Avila-George","sequence":"first","affiliation":[{"name":"Instituto Tecnol\u00f3gico Superior de Salvatierra Madero 303 Salvatierra Gto. 48900 Mexico"}]},{"given":"Jose","family":"Torres-Jimenez","sequence":"additional","affiliation":[{"name":"Information Technology Laboratory CINVESTAV-TAMAULIPAS Ciudad Victoria Tamps. Mexico"}]},{"given":"Loreto","family":"Gonzalez-Hernandez","sequence":"additional","affiliation":[{"name":"Information Technology Laboratory CINVESTAV-TAMAULIPAS Ciudad Victoria Tamps. Mexico"}]},{"given":"Vicente","family":"Hern\u00e1ndez","sequence":"additional","affiliation":[{"name":"Instituto de Instrumentaci\u00f3n para Imagen Molecular (I3M), Centro mixto CSIC Universitat Polit\u00e8cnica de Val\u00e8ncia \u2013 CIEMAT Camino de Vera s\/n Valencia 46022 Spain"}]}],"member":"265","published-online":{"date-parts":[[2013,4]]},"reference":[{"key":"e_1_2_7_2_1","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2009.0079"},{"key":"e_1_2_7_3_1","doi-asserted-by":"crossref","unstructured":"Cohen M.B. Colbourn C.J. Ling A.C.H.: \u2018Augmenting simulated annealing to build interaction test suites\u2019.Proc. 14th Int. Symp. on Software Reliability Engineering ISSRE 2003 2003 pp.394\u2013405 IEEE Computer Society doi: 10.1109\/ISSRE.2003.1251061","DOI":"10.1109\/ISSRE.2003.1251061"},{"key":"e_1_2_7_4_1","unstructured":"Kuhn D.R. Reilly M.J.: \u2018An investigation of the applicability of design of experiments to software testing\u2019.Proc. 27th Annual NASA Goddard Software Engineering Workshop (SEW-27\u203202) SEW'02 Washington DC USA December2002 pp.91\u201395 IEEE Computer Society"},{"key":"e_1_2_7_5_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2004.24"},{"key":"e_1_2_7_6_1","unstructured":"Cohen M.B. Colbourn C.J. Ling A.C.H.: \u2018Augmenting simulated annealing to build interaction test suites\u2019.Proc. 14th Int. Symp. Software Reliability Engineering (ISSRE'03) 2003 pp.394\u2013405 IEEE Computer Society"},{"key":"e_1_2_7_7_1","unstructured":"Stardom J.: \u2018Metaheuristics and the search for covering and packing arrays\u2019. Master's thesis Simon Fraser University 2001"},{"key":"e_1_2_7_8_1","doi-asserted-by":"publisher","DOI":"10.1002\/jcd.20065"},{"key":"e_1_2_7_9_1","unstructured":"Williams A.W. Probert R.L.: \u2018A practical strategy for testing pair-wise coverage of network interfaces\u2019.Proc. Seventh Int. Symp. on Software Reliability Engineering ISSRE'96 1996 pp.246\u2013256 IEEE Computer Society"},{"key":"e_1_2_7_10_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2007.11.021"},{"key":"e_1_2_7_11_1","doi-asserted-by":"crossref","unstructured":"Williams A.W.: \u2018Determination of test configurations for pair-wise interaction coverage\u2019.Proc. IFIP TC6\/WG6.1 13th Int. Conf. on Testing Communicating Systems: Tools and Techniques TestCom'00 2000 pp.59\u201374","DOI":"10.1007\/978-0-387-35516-0_4"},{"key":"e_1_2_7_12_1","doi-asserted-by":"publisher","DOI":"10.1002\/jcd.10059"},{"key":"e_1_2_7_13_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.536462"},{"key":"e_1_2_7_14_1","unstructured":"Tung Y.-W. Aldiwan W.S.: \u2018Automating test case generation for the new generation mission software system\u2019.IEEE Aerospace Conf. Proc. 2000 vol.1 pp.431\u2013437"},{"key":"e_1_2_7_15_1","doi-asserted-by":"crossref","unstructured":"Lei Y. Kacker R. Richard Kuhn D. Okun V. Lawrence J.: \u2018IPOG: A general strategy for t-way software testing\u2019.Proc. 14th Annual IEEE Int. Conf. and Workshops on the Engineering of Computer-Based Systems (ECBS'07) 2007 pp.549\u2013556","DOI":"10.1109\/ECBS.2007.47"},{"key":"e_1_2_7_16_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.365"},{"key":"e_1_2_7_17_1","unstructured":"McDowell A.G.: \u2018All-pairs testing\u2019 2011.http:\/\/www.mcdowella.demon.co.uk\/allPairs.html; last accessed on June 21 2011"},{"key":"e_1_2_7_18_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0166-218X(03)00291-9"},{"issue":"03","key":"e_1_2_7_19_1","doi-asserted-by":"crossref","first-page":"20","DOI":"10.1142\/S1793830912500334","article-title":"Construction of mixed covering arrays of strengths 2 through 6 using a Tabu search approach","volume":"4","author":"Gonzalez-Hernandez L.","year":"2012","journal-title":"Discrete Math. Algorith. Appl."},{"key":"e_1_2_7_20_1","doi-asserted-by":"crossref","unstructured":"Martinez-Pena J. Torres-Jimenez J. Rangel-Valdez N. Avila-George H.: \u2018A heuristic approach for constructing ternary covering arrays using trinomial coefficients\u2019.IBERAMIA 2010 pp.572\u2013581","DOI":"10.1007\/978-3-642-16952-6_58"},{"key":"e_1_2_7_21_1","unstructured":"Shiba T. Tsuchiya T. Kikuno T.: \u2018Using artificial life techniques to generate test cases for combinatorial testing\u2019.Proc. 28th Annual Int. on Computer Software and Applications Conf. 2004. COMPSAC 2004 2004 vol.1 pp.72\u201377"},{"key":"e_1_2_7_22_1","doi-asserted-by":"publisher","DOI":"10.1287\/opre.37.6.865"},{"key":"e_1_2_7_23_1","doi-asserted-by":"publisher","DOI":"10.1057\/palgrave.jors.2600728"},{"key":"e_1_2_7_24_1","unstructured":"Aarts E.H.L. Laarhoven V.: \u2018A new polynomial time cooling schedule\u2019.Int. Conf. Computer Aided Design 1985"},{"key":"e_1_2_7_25_1","doi-asserted-by":"crossref","unstructured":"Atiqullah M.: \u2018An efficient simple cooling schedule for simulated annealing\u2019.Computational Science and Its Applications \u2013 ICCSA 2004 Heidelberg 2004 (LNCS 3045) pp.396\u2013404","DOI":"10.1007\/978-3-540-24767-8_41"},{"key":"e_1_2_7_26_1","doi-asserted-by":"publisher","DOI":"10.1016\/j.disc.2006.06.036"},{"key":"e_1_2_7_27_1","unstructured":"Lei Y. Tai K.-C.: \u2018In-parameter-order: a test generation strategy for pairwise testing\u2019.Third IEEE Int. Symp. on High-Assurance Systems Engineering HASE'98 1998 pp.254\u2013261"},{"key":"e_1_2_7_28_1","unstructured":"Jenkins B.: \u2018Jenny: A pairwise testing tool\u2019.2011.http:\/\/burtleburtle.net\/bob\/math\/jenny.html; last accessed on June 22 2011"},{"key":"e_1_2_7_29_1","first-page":"382","article-title":"MiTS: a new approach of Tabu search for constructing mixed covering arrays","volume":"6438","author":"Gonzalez-Hernandez L.","year":"2010","journal-title":"LNAI"},{"key":"e_1_2_7_30_1","doi-asserted-by":"crossref","unstructured":"Kuhn D.R. Kacker R.N. Lei Y.: \u2018Practical combinatorial testing\u2019. Technical Report National Institute of Standards and Technology 2010","DOI":"10.6028\/NIST.SP.800-142"},{"key":"e_1_2_7_31_1","doi-asserted-by":"publisher","DOI":"10.1007\/s11227-012-0763-0"}],"container-title":["IET Software"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-sen.2012.0074","content-type":"application\/pdf","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full-xml\/10.1049\/iet-sen.2012.0074","content-type":"application\/xml","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/pdf\/10.1049\/iet-sen.2012.0074","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,2,6]],"date-time":"2021-02-06T13:54:21Z","timestamp":1612619661000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1049\/iet-sen.2012.0074"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2013,4]]},"references-count":30,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2013,4]]}},"alternative-id":["10.1049\/iet-sen.2012.0074"],"URL":"https:\/\/doi.org\/10.1049\/iet-sen.2012.0074","archive":["Portico"],"relation":{},"ISSN":["1751-8806","1751-8814"],"issn-type":[{"value":"1751-8806","type":"print"},{"value":"1751-8814","type":"electronic"}],"subject":[],"published":{"date-parts":[[2013,4]]}}}