{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,2,21]],"date-time":"2025-02-21T09:59:40Z","timestamp":1740131980691,"version":"3.37.3"},"reference-count":72,"publisher":"Institute of Electrical and Electronics Engineers (IEEE)","issue":"8","license":[{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/ieeexplore.ieee.org\/Xplorehelp\/downloads\/license-information\/IEEE.html"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2023,8,1]],"date-time":"2023-08-01T00:00:00Z","timestamp":1690848000000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"funder":[{"DOI":"10.13039\/501100001809","name":"National Natural Science Foundation of China","doi-asserted-by":"publisher","award":["62072226","62102176"],"id":[{"id":"10.13039\/501100001809","id-type":"DOI","asserted-by":"publisher"}]},{"DOI":"10.13039\/501100004608","name":"Natural Science Foundation of Jiangsu Province","doi-asserted-by":"publisher","award":["BK20221439"],"id":[{"id":"10.13039\/501100004608","id-type":"DOI","asserted-by":"publisher"}]},{"name":"Douyin Group (HK) Limited"},{"name":"CCF-Huawei Populus Grove Fund"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["IIEEE Trans. Software Eng."],"published-print":{"date-parts":[[2023,8]]},"DOI":"10.1109\/tse.2023.3285357","type":"journal-article","created":{"date-parts":[[2023,6,13]],"date-time":"2023-06-13T17:17:38Z","timestamp":1686676658000},"page":"4097-4114","source":"Crossref","is-referenced-by-count":3,"title":["Enhancing Fault Injection Testing of Service Systems via Fault-Tolerance Bottleneck"],"prefix":"10.1109","volume":"49","author":[{"ORCID":"https:\/\/orcid.org\/0000-0003-1383-5421","authenticated-orcid":false,"given":"Huayao","family":"Wu","sequence":"first","affiliation":[{"name":"Department of Computer Science and Technology, State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0009-0001-3088-8923","authenticated-orcid":false,"given":"Senyao","family":"Yu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-5786-0894","authenticated-orcid":false,"given":"Xintao","family":"Niu","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-9575-1012","authenticated-orcid":false,"given":"Changhai","family":"Nie","sequence":"additional","affiliation":[{"name":"Department of Computer Science and Technology, State Key Laboratory for Novel Software Technology, Nanjing University, Nanjing, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0001-6065-6958","authenticated-orcid":false,"given":"Yu","family":"Pei","sequence":"additional","affiliation":[{"name":"Department of Computing, Hong Kong Polytechnic University, Hung Hom, Hong Kong"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-2607-4556","authenticated-orcid":false,"given":"Qiang","family":"He","sequence":"additional","affiliation":[{"name":"National Engineering Research Center for Big Data Technology and System, Services Computing Technology and System Lab, Cluster and Grid Computing Lab, School of Computer Science and Technology, Huazhong University of Science and Technology, Wuhan, China"}]},{"ORCID":"https:\/\/orcid.org\/0000-0002-7868-5471","authenticated-orcid":false,"given":"Yun","family":"Yang","sequence":"additional","affiliation":[{"name":"Department of Computing Technologies, Swinburne University of Technology, Melbourne, VIC, Australia"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1007\/s11432-015-5313-y"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1145\/3388922"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2021.111061"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2013.189"},{"key":"ref5","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2016.2567392"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2017.2681667"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2018.2808519"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2019.2929389"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/TCC.2020.2968522"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2018.2816644"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1007\/s10586-020-03108-z"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/3125497"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338916"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1109\/ICDCS.2016.11"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1145\/2723372.2723711"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1109\/ICWS49710.2020.00027"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/3472883.3487005"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/12.238482"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/2.585157"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/TC.2003.1228509"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2841425"},{"year":"2016","key":"ref22","article-title":"Chaos monkey"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-SEIP.2019.00012"},{"key":"ref24","first-page":"238","article-title":"FATE and DESTINI: A framework for cloud recovery testing","volume-title":"Proc. USENIX Symp. Netw. Syst. Des. Implementation","author":"Gunawi"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/2048066.2048082"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/2524211.2524217"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2019.2954384"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1016\/j.jnca.2022.103334"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2017.30"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3043023"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2004.14"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1145\/3341301.3359645"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/3324884.3416548"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1109\/TPDS.2016.2575829"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2020.3025289"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1145\/2987550.2987555"},{"key":"ref37","first-page":"249","article-title":"Simple testing can prevent most critical failures: An analysis of production failures in distributed data-intensive systems","volume-title":"Proc. USENIX Symp. Operating Syst. Des. Implementation","author":"Yuan"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1145\/3155112.3155114"},{"year":"2016","key":"ref39","article-title":"SockShop: A microservice demo application"},{"year":"2019","key":"ref40","article-title":"TrainTicket: A benchmark microservice system"},{"key":"ref41","doi-asserted-by":"publisher","DOI":"10.1109\/TSC.2009.18"},{"key":"ref42","doi-asserted-by":"publisher","DOI":"10.1016\/B978-0-12-803843-7.00009-0"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1016\/j.compind.2018.03.027"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1109\/TR.2015.2452933"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2887384"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE5003.2020.00014"},{"key":"ref47","doi-asserted-by":"publisher","DOI":"10.1145\/3468264.3468543"},{"key":"ref48","doi-asserted-by":"publisher","DOI":"10.1109\/IWQOS52092.2021.9521340"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1002\/smr.2452"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-030-00761-4_11"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/3338906.3338961"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1007\/s10664-021-10088-0"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.1486"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1145\/3476105"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2018.2850755"},{"key":"ref56","doi-asserted-by":"publisher","DOI":"10.1145\/2523616.2523622"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.124"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/2857274.2889274"},{"key":"ref59","doi-asserted-by":"publisher","DOI":"10.1145\/3158134"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1109\/MS.2016.60"},{"key":"ref61","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2019.2954871"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1109\/TDSC.2021.3069715"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ISSREW51248.2020.00057"},{"key":"ref64","doi-asserted-by":"publisher","DOI":"10.1016\/j.future.2021.04.001"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1007\/11408901_19"},{"key":"ref66","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC47002.2019.00044"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/3461648.3463851"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1109\/PRDC55274.2022.00027"},{"key":"ref69","doi-asserted-by":"publisher","DOI":"10.1109\/DSN.2019.00025"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.2015.67"},{"key":"ref71","doi-asserted-by":"publisher","DOI":"10.1145\/3542946"},{"key":"ref72","first-page":"1","article-title":"Co-evolving tracing and fault injection with box of pain","volume-title":"Proc. 11th USENIX Workshop Hot Topics Cloud Comput.","author":"Bittman"}],"container-title":["IEEE Transactions on Software Engineering"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/32\/10217078\/10149456.pdf?arnumber=10149456","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2024,6,6]],"date-time":"2024-06-06T17:06:22Z","timestamp":1717693582000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/10149456\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2023,8]]},"references-count":72,"journal-issue":{"issue":"8"},"URL":"https:\/\/doi.org\/10.1109\/tse.2023.3285357","relation":{},"ISSN":["0098-5589","1939-3520","2326-3881"],"issn-type":[{"type":"print","value":"0098-5589"},{"type":"electronic","value":"1939-3520"},{"type":"electronic","value":"2326-3881"}],"subject":[],"published":{"date-parts":[[2023,8]]}}}