{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T19:15:32Z","timestamp":1729624532379,"version":"3.28.0"},"reference-count":47,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014,3]]},"DOI":"10.1109\/icst.2014.37","type":"proceedings-article","created":{"date-parts":[[2014,6,4]],"date-time":"2014-06-04T16:38:45Z","timestamp":1401899925000},"page":"243-252","source":"Crossref","is-referenced-by-count":37,"title":["Cause Reduction for Quick Testing"],"prefix":"10.1109","author":[{"given":"Alex","family":"Groce","sequence":"first","affiliation":[]},{"given":"Mohammed Amin","family":"Alipour","sequence":"additional","affiliation":[]},{"given":"Chaoqiang","family":"Zhang","sequence":"additional","affiliation":[]},{"given":"Yang","family":"Chen","sequence":"additional","affiliation":[]},{"given":"John","family":"Regehr","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"19","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025179"},{"key":"35","first-page":"342","author":"cleve","year":"2005","journal-title":"Locating Causes of Program Failures"},{"year":"0","key":"17"},{"key":"36","first-page":"1","article-title":"Isolating cause-effect chains from computer programs","author":"zeller","year":"2002","journal-title":"Foundations of Software Engineering"},{"key":"18","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2010.54"},{"key":"33","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-48166-4_16"},{"key":"15","doi-asserted-by":"publisher","DOI":"10.1145\/367008.367015"},{"key":"34","doi-asserted-by":"publisher","DOI":"10.1145\/566172.566211"},{"key":"16","doi-asserted-by":"publisher","DOI":"10.1145\/1810295.1810314"},{"key":"39","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2004.12.023"},{"key":"13","doi-asserted-by":"publisher","DOI":"10.1145\/2491956.2462173"},{"key":"14","doi-asserted-by":"publisher","DOI":"10.1002\/stv.430"},{"key":"37","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134307"},{"key":"11","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2003.1201188"},{"key":"38","doi-asserted-by":"crossref","first-page":"92","DOI":"10.1007\/978-3-540-24732-6_7","article-title":"Minimization of counterexamples in SPIN","author":"gastin","year":"2004","journal-title":"SPIN Workshop on Model Checking of Software"},{"key":"12","doi-asserted-by":"publisher","DOI":"10.1145\/1101908.1101949"},{"journal-title":"Comparing Automated Unit Testing Strategies","year":"0","author":"andrews","key":"21"},{"key":"20","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.46"},{"key":"43","article-title":"Procedures for reducing the size of coverage-based test sets","author":"offutt","year":"1995","journal-title":"Proc Twelfth int'L Conf Testing Computer Softw"},{"key":"42","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.70756"},{"key":"41","first-page":"100","article-title":"Differential testing for software","volume":"10","author":"mckeeman","year":"1998","journal-title":"Digital Technical J Digital Equipment Corporation"},{"key":"40","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321698"},{"key":"45","doi-asserted-by":"publisher","DOI":"10.1145\/1146238.1146240"},{"key":"44","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2009.5070541"},{"key":"47","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.256"},{"key":"46","doi-asserted-by":"publisher","DOI":"10.1023\/B:SQJO.0000034708.84524.22"},{"journal-title":"Introducing Jsfunfuzz","year":"2007","author":"ruderman","key":"22"},{"key":"23","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483769"},{"key":"24","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2012.1"},{"year":"0","author":"ruderman","key":"25"},{"key":"26","first-page":"267","article-title":"Minimization of randomized unit test cases","volume":"2005","author":"lei","year":"2005","journal-title":"Proceedings - International Symposium on Software Reliability Engineering ISSRE"},{"key":"27","doi-asserted-by":"publisher","DOI":"10.1016\/S0020-0190(96)00135-4"},{"key":"28","doi-asserted-by":"publisher","DOI":"10.1109\/32.962562"},{"year":"0","key":"29"},{"key":"3","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"2","article-title":"Establishing flight software reliability: Testing, model checking, constraintsolving, monitoring and learning","author":"groce","year":"0","journal-title":"Annals of Mathematics and Artificial Intelligence"},{"key":"1","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.68"},{"key":"10","doi-asserted-by":"crossref","first-page":"145","DOI":"10.1007\/s10009-007-0059-5","article-title":"An approach for experimentally evaluating effectiveness and efficiency of coverage criteria for software testing","volume":"10","author":"gupta","year":"2008","journal-title":"International Journal on Software Tools for Technology Transfer"},{"key":"30","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2005.1553583"},{"key":"7","doi-asserted-by":"publisher","DOI":"10.1145\/2338965.2336763"},{"key":"6","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2007.37"},{"key":"32","first-page":"335","article-title":"Testcase reduction for C compiler bugs","author":"regehr","year":"2012","journal-title":"Conference on Programming Language Design and Implementation"},{"key":"5","doi-asserted-by":"publisher","DOI":"10.1145\/351240.351266"},{"key":"31","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806863"},{"key":"4","doi-asserted-by":"publisher","DOI":"10.1145\/347324.348938"},{"key":"9","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2008.12"},{"key":"8","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993532"}],"event":{"name":"2014 IEEE Seventh International Conference on Software Testing, Verification and Validation (ICST)","start":{"date-parts":[[2014,3,31]]},"location":"Cleveland, OH, USA","end":{"date-parts":[[2014,4,4]]}},"container-title":["2014 IEEE Seventh International Conference on Software Testing, Verification and Validation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/6823818\/6823846\/06823886.pdf?arnumber=6823886","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,22]],"date-time":"2017-06-22T10:21:34Z","timestamp":1498126894000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/6823886\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014,3]]},"references-count":47,"URL":"https:\/\/doi.org\/10.1109\/icst.2014.37","relation":{},"subject":[],"published":{"date-parts":[[2014,3]]}}}