{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,19]],"date-time":"2025-03-19T11:09:52Z","timestamp":1742382592844},"reference-count":51,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"6","license":[{"start":{"date-parts":[[1993,6,1]],"date-time":"1993-06-01T00:00:00Z","timestamp":738892800000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[1993,6]]},"DOI":"10.1109\/32.232020","type":"journal-article","created":{"date-parts":[[2002,8,24]],"date-time":"2002-08-24T23:09:11Z","timestamp":1030230551000},"page":"533-553","source":"Crossref","is-referenced-by-count":65,"title":["An analysis of test data selection criteria using the RELAY model of fault detection"],"prefix":"10.1109","volume":"19","author":[{"given":"D.J.","family":"Richardson","sequence":"first","affiliation":[]},{"given":"M.C.","family":"Thompson","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/75308.75319"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1992.753494"},{"key":"ref33","author":"myers","year":"1979","journal-title":"Wiley Series in Business Data Processing"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/32.57623"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/WST.1988.5353"},{"key":"ref30","doi-asserted-by":"crossref","DOI":"10.21236\/ADA143533","author":"morell","year":"1984","journal-title":"A Theory of Error-Based Testing"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232226"},{"key":"ref36","author":"podgurski","year":"1989","journal-title":"Significance of Program Dependences for Software Testing Debugging and Maintenance"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/32.58784"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010308"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1983.236871"},{"key":"ref27","first-page":"16","author":"howden","year":"1978","journal-title":"Tutorial Software Testing and Validation Techniques"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/MS.1985.230345"},{"key":"ref2","author":"budd","year":"1983","journal-title":"The Portable Mutation Testing Suite"},{"key":"ref1","first-page":"129","author":"budd","year":"1981","journal-title":"Computer Program Testing"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1145\/73560.73573"},{"key":"ref22","first-page":"16","author":"howden","year":"1978","journal-title":"Tutorial Software Testing and Validation Techniques"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233816"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/MS.1985.231754"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1982.235571"},{"key":"ref26","author":"howden","year":"1987","journal-title":"ser Software Engineering and Technology"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6313016"},{"key":"ref50","article-title":"Perturbation testing for computation errors","author":"zeil","year":"1984","journal-title":"Proc Seventh Int Conf Software Eng"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1109\/32.24727"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/32.92910"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/359636.359712"},{"key":"ref40","author":"richardson","year":"1986","journal-title":"A formal framework for test data selection criteria"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1980.234487"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/1010914.1010921"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/1010925.1010935"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1012443.1012451"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1981.230831"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1975.6312836"},{"key":"ref19","doi-asserted-by":"crossref","first-page":"279","DOI":"10.1109\/TSE.1977.231145","article-title":"testing programs with the aid of a compiler","volume":"se 3","author":"hamlet","year":"1977","journal-title":"IEEE Transactions on Software Engineering"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1982.235572"},{"key":"ref3","author":"budd","year":"1980","journal-title":"Two notions of correctness and their relation to testing"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/32.41326"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/32.41326"},{"key":"ref8","author":"demillo","year":"1979","journal-title":"Program mutation A new approach to program testing"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1983.236870"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/WST.1988.5369"},{"key":"ref46","author":"weyuker","year":"1981","journal-title":"An error-based testing strategy"},{"key":"ref45","article-title":"Information flow transfer in the RELAY model","author":"thompson","year":"1993","journal-title":"Proc ACM SIGSOFT Int Symp Software Testing and Analysis (ISSTA '93)"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1980.234486"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/25.4.465"},{"key":"ref42","author":"richardson","year":"1986","journal-title":"RELAY A new model of error detection"},{"key":"ref41","author":"richardson","year":"1986","journal-title":"An analysis of test data selection criteria using the Relay model of error detection"},{"key":"ref44","author":"thompson","year":"1991","journal-title":"An investigation of fault-based testing using the RELAY model"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1109\/WST.1988.5378"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx1\/32\/5998\/00232020.pdf?arnumber=232020","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,11,29]],"date-time":"2021-11-29T20:08:50Z","timestamp":1638216530000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/232020\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1993,6]]},"references-count":51,"journal-issue":{"issue":"6"},"URL":"https:\/\/doi.org\/10.1109\/32.232020","relation":{},"ISSN":["0098-5589"],"issn-type":[{"value":"0098-5589","type":"print"}],"subject":[],"published":{"date-parts":[[1993,6]]}}}