iBet uBet web content aggregator. Adding the entire web to your favor.
iBet uBet web content aggregator. Adding the entire web to your favor.



Link to original content: https://api.crossref.org/works/10.1145/267580.267590
{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,20]],"date-time":"2024-09-20T15:34:33Z","timestamp":1726846473409},"reference-count":213,"publisher":"Association for Computing Machinery (ACM)","issue":"4","content-domain":{"domain":["dl.acm.org"],"crossmark-restriction":true},"short-container-title":["ACM Comput. Surv."],"published-print":{"date-parts":[[1997,12]]},"abstract":"Objective measurement of test quality is one of the key issues in software testing. It has been a major research focus for the last two decades. Many test criteria have been proposed and studied for this purpose. Various kinds of rationales have been presented in support of one criterion or another. We survey the research work in this area. The notion of adequacy criteria is examined together with its role in software dynamic testing. A review of criteria classification is followed by a summary of the methods for comparison and assessment of criteria.<\/jats:p>","DOI":"10.1145\/267580.267590","type":"journal-article","created":{"date-parts":[[2002,7,27]],"date-time":"2002-07-27T11:32:04Z","timestamp":1027769524000},"page":"366-427","update-policy":"http:\/\/dx.doi.org\/10.1145\/crossmark-policy","source":"Crossref","is-referenced-by-count":782,"title":["Software unit test coverage and adequacy"],"prefix":"10.1145","volume":"29","author":[{"given":"Hong","family":"Zhu","sequence":"first","affiliation":[{"name":"Nanjing Univ., Nanjing, China"}]},{"given":"Patrick A. V.","family":"Hall","sequence":"additional","affiliation":[{"name":"The Open Univ., Milton Keynes, UK"}]},{"given":"John H. R.","family":"May","sequence":"additional","affiliation":[{"name":"The Open Univ., Milton Keynes, UK"}]}],"member":"320","published-online":{"date-parts":[[1997,12]]},"reference":[{"key":"e_1_2_1_1_1","doi-asserted-by":"publisher","DOI":"10.1145\/356876.356879"},{"key":"e_1_2_1_2_1","doi-asserted-by":"publisher","DOI":"10.1145\/143062.143096"},{"key":"e_1_2_1_3_1","doi-asserted-by":"publisher","DOI":"10.1109\/CMPASS.1992.235766"},{"key":"e_1_2_1_4_1","first-page":"69","volume-title":"Proceedings of the Ninth Annual Conference on Computer Assurance","author":"AMMANN P.","year":"1994","unstructured":"AMMANN , P. AND OFFUTT , J. 1994 . Using formal methods to derive test frames in categorypartition testing . In Proceedings of the Ninth Annual Conference on Computer Assurance ( Gaithersburg, MD, June), IEEE , 69 - 79 .]] AMMANN, P. AND OFFUTT, J. 1994. Using formal methods to derive test frames in categorypartition testing. In Proceedings of the Ninth Annual Conference on Computer Assurance (Gaithersburg, MD, June), IEEE, 69-79.]]"},{"key":"e_1_2_1_5_1","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1990.0011"},{"key":"e_1_2_1_6_1","volume-title":"Proceedings of the 19th Annual Hawaii International Conference on System Sciences, 158-163","author":"BAKER A. L.","year":"1986","unstructured":"BAKER , A. L. , HOWATT , J. W. , AND BIEMAN , J. M. 1986 . Criteria for finite sets of paths that characterize control flow . In Proceedings of the 19th Annual Hawaii International Conference on System Sciences, 158-163 .]] BAKER, A. L., HOWATT, J. W., AND BIEMAN, J. M. 1986. Criteria for finite sets of paths that characterize control flow. In Proceedings of the 19th Annual Hawaii International Conference on System Sciences, 158-163.]]"},{"key":"e_1_2_1_8_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.232881"},{"key":"e_1_2_1_9_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1982.235428"},{"key":"e_1_2_1_10_1","volume-title":"Software Testing Techniques","author":"BEIZER B.","unstructured":"BEIZER , B. 1983. Software Testing Techniques . Van Nostrand Reinhold , New York .]] BEIZER, B. 1983. Software Testing Techniques. Van Nostrand Reinhold, New York.]]"},{"key":"e_1_2_1_11_1","volume-title":"Software System Testing and Quality Assurance","author":"BEIZER B.","unstructured":"BEIZER , B. 1984. Software System Testing and Quality Assurance . Van Nostrand Reinhold , New York .]] BEIZER, B. 1984. Software System Testing and Quality Assurance. Van Nostrand Reinhold, New York.]]"},{"key":"e_1_2_1_12_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.233488"},{"key":"e_1_2_1_13_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00417425"},{"key":"e_1_2_1_14_1","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1991.0040"},{"key":"e_1_2_1_15_1","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1992.0005"},{"key":"e_1_2_1_16_1","doi-asserted-by":"publisher","DOI":"10.1147\/sj.223.0229"},{"key":"e_1_2_1_17_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(86)90004-X"},{"key":"e_1_2_1_18_1","first-page":"129","article-title":"Mutation analysis: Ideas, examples, problems and prospects. In Computer Program Testing, Chandrasekaran and Radicchi, Eds","author":"BUDD T.A.","year":"1981","unstructured":"BUDD , T.A. 1981 . Mutation analysis: Ideas, examples, problems and prospects. In Computer Program Testing, Chandrasekaran and Radicchi, Eds ., North Holland , 129 - 148 .]] BUDD, T.A. 1981. Mutation analysis: Ideas, examples, problems and prospects. In Computer Program Testing, Chandrasekaran and Radicchi, Eds., North Holland, 129-148.]]","journal-title":"North Holland"},{"key":"e_1_2_1_19_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00625279"},{"key":"e_1_2_1_20_1","volume-title":"Proceedings of National Computer Conference, 623-627","author":"BUDD T. A.","year":"1978","unstructured":"BUDD , T. A. , LIPTON , R. J. , SAYWARD , F. G. , AND DEMILLO , R.A. 1978 . The design of a prototype mutation system for program testing . In Proceedings of National Computer Conference, 623-627 .]] BUDD, T. A., LIPTON, R. J., SAYWARD, F. G., AND DEMILLO, R.A. 1978. The design of a prototype mutation system for program testing. In Proceedings of National Computer Conference, 623-627.]]"},{"key":"e_1_2_1_21_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.73751"},{"key":"e_1_2_1_22_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.256853"},{"key":"e_1_2_1_23_1","unstructured":"CHANDRASEKARAN B. AND RADICCHI S. (EDS.) 1981. Computer Program Testing North- Holland.]] CHANDRASEKARAN B. AND RADICCHI S. (EDS.) 1981. Computer Program Testing North- Holland.]]"},{"key":"e_1_2_1_24_1","volume-title":"Model Theory. North-Holland","author":"CHANG C. C.","unstructured":"CHANG , C. C. AND KEISLER , H.J. 1973. Model Theory. North-Holland , Amsterdam .]] CHANG, C. C. AND KEISLER, H.J. 1973. Model Theory. North-Holland, Amsterdam.]]"},{"key":"e_1_2_1_25_1","first-page":"9","article-title":"Testing the limits of test technology","author":"CHANG Y.-F.","year":"1991","unstructured":"CHANG , Y.-F. AND AOYAMA , M. 1991 . Testing the limits of test technology . IEEE Softw. ( March ), 9 - 11 .]] CHANG, Y.-F. AND AOYAMA, M. 1991. Testing the limits of test technology. IEEE Softw. (March), 9-11.]]","journal-title":"IEEE Softw."},{"key":"e_1_2_1_26_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.233489"},{"key":"e_1_2_1_27_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.87287"},{"key":"e_1_2_1_28_1","doi-asserted-by":"publisher","DOI":"10.1145\/75308.75316"},{"key":"e_1_2_1_29_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.233196"},{"key":"e_1_2_1_30_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1982.235572"},{"key":"e_1_2_1_31_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.41326"},{"key":"e_1_2_1_32_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312914"},{"key":"e_1_2_1_33_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/31.1.17"},{"key":"e_1_2_1_34_1","first-page":"75","volume-title":"Proceedings of 13th Minnowbrook Workshop on Software Engineering (July 24-27","author":"DEMILLO R. A.","year":"1990","unstructured":"DEMILLO , R. A. AND MATHUR , A. P. 1990 . On the use of software artifacts to evaluate the effectiveness of mutation analysis for detecting errors in production software . In Proceedings of 13th Minnowbrook Workshop on Software Engineering (July 24-27 , Blue Mountain Lake, NY) , 75 - 77 .]] DEMILLO, R. A. AND MATHUR, A. P. 1990. On the use of software artifacts to evaluate the effectiveness of mutation analysis for detecting errors in production software. In Proceedings of 13th Minnowbrook Workshop on Software Engineering (July 24-27, Blue Mountain Lake, NY), 75-77.]]"},{"key":"e_1_2_1_35_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.92910"},{"key":"e_1_2_1_36_1","doi-asserted-by":"publisher","DOI":"10.1145\/151257.151258"},{"key":"e_1_2_1_37_1","doi-asserted-by":"publisher","DOI":"10.1109\/WST.1988.5369"},{"key":"e_1_2_1_38_1","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"e_1_2_1_39_1","volume-title":"Software Testing and Evaluation","author":"DEMILLO R. A.","unstructured":"DEMILLO , R. A. , MCCRACKEN , W. M. , MATIN , R. J. , AND PASSUFIUME , J.F. 1987. Software Testing and Evaluation , Benjamin-Cummings , Redwood City, CA .]] DEMILLO, R. A., MCCRACKEN, W. M., MATIN, R. J., AND PASSUFIUME, J.F. 1987. Software Testing and Evaluation, Benjamin-Cummings, Redwood City, CA.]]"},{"key":"e_1_2_1_40_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.73749"},{"key":"e_1_2_1_41_1","volume-title":"Structured Programming, by O.-J. Dahl, E. W. Dijkstra, and C. A. R. Hoare","author":"DIJKSTRA E.W.","unstructured":"DIJKSTRA , E.W. 1972. Notes on structured programming . In Structured Programming, by O.-J. Dahl, E. W. Dijkstra, and C. A. R. Hoare , Academic Press .]] DIJKSTRA, E.W. 1972. Notes on structured programming. In Structured Programming, by O.-J. Dahl, E. W. Dijkstra, and C. A. R. Hoare, Academic Press.]]"},{"key":"e_1_2_1_42_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232227"},{"key":"e_1_2_1_43_1","doi-asserted-by":"publisher","DOI":"10.5555\/12868.12877"},{"key":"e_1_2_1_44_1","doi-asserted-by":"publisher","DOI":"10.1109\/24.85452"},{"key":"e_1_2_1_45_1","doi-asserted-by":"publisher","DOI":"10.1145\/382296.382699"},{"key":"e_1_2_1_46_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010257"},{"key":"e_1_2_1_47_1","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1992.0036"},{"key":"e_1_2_1_48_1","volume-title":"Software metrics--a rigorous approach","author":"FENTON N.E.","unstructured":"FENTON , N.E. 1991. Software metrics--a rigorous approach . Chapman & amp; Hall, London.]] FENTON, N.E. 1991. Software metrics--a rigorous approach. Chapman & Hall, London.]]"},{"key":"e_1_2_1_49_1","doi-asserted-by":"publisher","DOI":"10.5555\/3929.3930"},{"key":"e_1_2_1_50_1","first-page":"250","volume-title":"Proceedings of the Seventh International Conference on Software Engineering","author":"FORMAN I. R.","year":"1984","unstructured":"FORMAN , I. R. 1984 . An algebra for data flow anomaly detection . In Proceedings of the Seventh International Conference on Software Engineering ( Orlando, FL) , 250 - 256 .]] FORMAN, I. R. 1984. An algebra for data flow anomaly detection. In Proceedings of the Seventh International Conference on Software Engineering (Orlando, FL), 250-256.]]"},{"key":"e_1_2_1_51_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1980.234487"},{"key":"e_1_2_1_52_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.238581"},{"key":"e_1_2_1_53_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.6194"},{"key":"e_1_2_1_54_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.221133"},{"key":"e_1_2_1_55_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.245738"},{"key":"e_1_2_1_56_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.87281"},{"key":"e_1_2_1_57_1","doi-asserted-by":"publisher","DOI":"10.1145\/113445.113472"},{"key":"e_1_2_1_58_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.87284"},{"key":"e_1_2_1_59_1","unstructured":"GAUDEL M.-C. AND MARRE B. 1988. Algebraic specifications and software testing: Theory and application. In Rapport LRI 407.]] GAUDEL M.-C. AND MARRE B. 1988. Algebraic specifications and software testing: Theory and application. In Rapport LRI 407.]]"},{"key":"e_1_2_1_60_1","doi-asserted-by":"publisher","DOI":"10.1145\/62959.62965"},{"key":"e_1_2_1_61_1","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1992.0029"},{"key":"e_1_2_1_62_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(67)91165-5"},{"key":"e_1_2_1_63_1","article-title":"Toward a theory of test data selection","author":"GOODENOUGH J. B.","year":"1975","unstructured":"GOODENOUGH , J. B. AND GERHART , S. L. 1975 . Toward a theory of test data selection . IEEE Trans. Softw. Eng. SE-3 ( June ).]] GOODENOUGH, J. B. AND GERHART, S. L. 1975. Toward a theory of test data selection. IEEE Trans. Softw. Eng. SE-3 (June).]]","journal-title":"IEEE Trans. Softw. Eng. SE-3"},{"key":"e_1_2_1_64_1","first-page":"44","volume-title":"Current Trends in Programming Methodology","volume":"2","author":"GOODENOUGH J. B.","year":"1977","unstructured":"GOODENOUGH , J. B. AND GERHART , S. L. 1977 . Toward a theory of testing: Data selection criteria . In Current Trends in Programming Methodology , Vol. 2 , R. T. Yeh, Ed., Prentice- Hall, Englewood Cliffs, NJ , 44 - 79 .]] GOODENOUGH, J. B. AND GERHART, S. L. 1977. Toward a theory of testing: Data selection criteria. In Current Trends in Programming Methodology, Vol. 2, R. T. Yeh, Ed., Prentice- Hall, Englewood Cliffs, NJ, 44-79.]]"},{"key":"e_1_2_1_66_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1983.235433"},{"key":"e_1_2_1_67_1","doi-asserted-by":"publisher","DOI":"10.1016\/0950-5849(91)90023-5"},{"key":"e_1_2_1_69_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.62448"},{"key":"e_1_2_1_70_1","doi-asserted-by":"publisher","DOI":"10.5555\/257572.257600"},{"key":"e_1_2_1_71_1","doi-asserted-by":"publisher","DOI":"10.1145\/75309.75313"},{"key":"e_1_2_1_72_1","first-page":"4","article-title":"Testing programs with the aid of a compiler","volume":"3","author":"HAMLET R.G.","year":"1977","unstructured":"HAMLET , R.G. 1977 . Testing programs with the aid of a compiler . IEEE Trans. Softw. Eng. 3 , 4 (July), 279-290.]] HAMLET, R.G. 1977. Testing programs with the aid of a compiler. IEEE Trans. Softw. Eng. 3, 4 (July), 279-290.]]","journal-title":"IEEE Trans. Softw. Eng."},{"key":"e_1_2_1_73_1","doi-asserted-by":"publisher","DOI":"10.1145\/143062.143093"},{"key":"e_1_2_1_74_1","doi-asserted-by":"publisher","DOI":"10.1145\/75308.75327"},{"key":"e_1_2_1_75_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.73750"},{"key":"e_1_2_1_76_1","doi-asserted-by":"publisher","DOI":"10.1145\/1499402.1499451"},{"key":"e_1_2_1_77_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1986.6312926"},{"key":"e_1_2_1_78_1","first-page":"266","article-title":"Assessing a class of software tools","author":"HENNELL M. A.","year":"1984","unstructured":"HENNELL , M. A. , HEDLEY , D. , AND RIDDELL , I. J. 1984 . Assessing a class of software tools . In Proceedings of the Seventh ICSE , 266 - 277 .]] HENNELL, M. A., HEDLEY, D., AND RIDDELL, I. J. 1984. Assessing a class of software tools. In Proceedings of the Seventh ICSE, 266-277.]]","journal-title":"Proceedings of the Seventh ICSE"},{"key":"e_1_2_1_79_1","first-page":"3","article-title":"A data flow analysis approach to program testing","volume":"8","author":"HERMAN P.","year":"1976","unstructured":"HERMAN , P. 1976 . A data flow analysis approach to program testing . Aust. Comput. J. 8 , 3 (Nov.), 92-96.]] HERMAN, P. 1976. A data flow analysis approach to program testing. Aust. Comput. J. 8, 3 (Nov.), 92-96.]]","journal-title":"Aust. Comput. J."},{"key":"e_1_2_1_80_1","unstructured":"HETZEL W. 1984. The Complete Guide to Software Testing Collins.]] HETZEL W. 1984. The Complete Guide to Software Testing Collins.]]"},{"key":"e_1_2_1_82_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.92913"},{"key":"e_1_2_1_83_1","doi-asserted-by":"publisher","DOI":"10.1145\/120807.120815"},{"key":"e_1_2_1_84_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.136170"},{"key":"e_1_2_1_85_1","first-page":"5","article-title":"Methodology for the generation of program test data","volume":"24","author":"HOWDEN W.E.","year":"1975","unstructured":"HOWDEN , W.E. 1975 . Methodology for the generation of program test data . IEEE Trans. Comput. 24 , 5 (May), 554-560.]] HOWDEN, W.E. 1975. Methodology for the generation of program test data. IEEE Trans. Comput. 24, 5 (May), 554-560.]]","journal-title":"IEEE Trans. Comput."},{"key":"e_1_2_1_86_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233816"},{"key":"e_1_2_1_87_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1977.231144"},{"key":"e_1_2_1_88_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00260923"},{"key":"e_1_2_1_89_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1978.231514"},{"key":"e_1_2_1_90_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380080402"},{"key":"e_1_2_1_91_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1980.230467"},{"key":"e_1_2_1_92_1","doi-asserted-by":"publisher","DOI":"10.1016\/0164-1212(79)90032-3"},{"key":"e_1_2_1_93_1","volume-title":"Proceedings of Fifth International Conference on Software Engineering (March), 235-243","author":"HOWDEN W.E.","year":"1981","unstructured":"HOWDEN , W.E. 1981 . Completeness criteria for testing elementary program functions . In Proceedings of Fifth International Conference on Software Engineering (March), 235-243 .]] HOWDEN, W.E. 1981. Completeness criteria for testing elementary program functions. In Proceedings of Fifth International Conference on Software Engineering (March), 235-243.]]"},{"key":"e_1_2_1_94_1","doi-asserted-by":"publisher","DOI":"10.1145\/356876.356880"},{"key":"e_1_2_1_95_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1982.235571"},{"key":"e_1_2_1_96_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.1985.231754"},{"key":"e_1_2_1_97_1","doi-asserted-by":"publisher","DOI":"10.5555\/9769.9770"},{"key":"e_1_2_1_98_1","volume-title":"Functional program testing and analysis","author":"HOWDEN W.E.","unstructured":"HOWDEN , W.E. 1987. Functional program testing and analysis . McGraw-Hill , New York .]] HOWDEN, W.E. 1987. Functional program testing and analysis. McGraw-Hill, New York.]]"},{"key":"e_1_2_1_99_1","doi-asserted-by":"publisher","DOI":"10.5555\/257734.257766"},{"key":"e_1_2_1_100_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/30.1.63"},{"key":"e_1_2_1_101_1","volume-title":"Software Engineer's Reference Book","author":"INCE D.C.","unstructured":"INCE , D.C. 1991. Software testing . In Software Engineer's Reference Book , J. A. McDermid, Ed., Butterworth-Heinemann (Chapter 19).]] INCE, D.C. 1991. Software testing. In Software Engineer's Reference Book, J. A. McDermid, Ed., Butterworth-Heinemann (Chapter 19).]]"},{"key":"e_1_2_1_102_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232551"},{"key":"e_1_2_1_103_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231535"},{"key":"e_1_2_1_104_1","volume-title":"Software Tools in Pascal","author":"KERNIGHAN B. W.","unstructured":"KERNIGHAN , B. W. AND PLAUGER , P. J. 1981. Software Tools in Pascal , Addison-Wesley , Reading, MA .]] KERNIGHAN, B. W. AND PLAUGER, P. J. 1981. Software Tools in Pascal, Addison-Wesley, Reading, MA.]]"},{"key":"e_1_2_1_105_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380210704"},{"key":"e_1_2_1_106_1","doi-asserted-by":"publisher","DOI":"10.1016\/0950-5849(92)90146-G"},{"key":"e_1_2_1_107_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0022-0000(74)80043-7"},{"key":"e_1_2_1_108_1","volume-title":"Additive and Polynomial Representations","author":"KRANTZ D. H.","unstructured":"KRANTZ , D. H. , LUCE , R. D. , SUPPES , P. , AND TVER - SKY , A. 1971. Foundations of Measurement , Vol. 1 : Additive and Polynomial Representations . Academic Press , New York .]] KRANTZ, D. H., LUCE, R. D., SUPPES, P., AND TVER- SKY, A. 1971. Foundations of Measurement, Vol. 1: Additive and Polynomial Representations. Academic Press, New York.]]"},{"key":"e_1_2_1_109_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.90444"},{"key":"e_1_2_1_110_1","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1989.0012"},{"key":"e_1_2_1_111_1","first-page":"33","article-title":"A data flow oriented program testing strategy","author":"LASKI J.","year":"1983","unstructured":"LASKI , J. AND KOREL , B. 1983 . A data flow oriented program testing strategy . IEEE Trans. Softw. Eng. SE-9 , ( May ), 33 - 43 .]] LASKI, J. AND KOREL, B. 1983. A data flow oriented program testing strategy. IEEE Trans. Softw. Eng. SE-9, (May), 33-43.]]","journal-title":"IEEE Trans. Softw. Eng. SE-9"},{"key":"e_1_2_1_112_1","doi-asserted-by":"publisher","DOI":"10.5555\/257572.257599"},{"key":"e_1_2_1_113_1","doi-asserted-by":"publisher","DOI":"10.1109\/CMPASS.1989.76036"},{"key":"e_1_2_1_114_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.73745"},{"key":"e_1_2_1_115_1","volume-title":"Proceedings of the 20th Annual Hawaii International Conference on System Sciences, 478-487","author":"LINDQUIST T. E.","year":"1987","unstructured":"LINDQUIST , T. E. AND JENKINS , g. R. 1987 . Test case generation with IOGEN . In Proceedings of the 20th Annual Hawaii International Conference on System Sciences, 478-487 .]] LINDQUIST, T. E. AND JENKINS, g.R. 1987. Test case generation with IOGEN. In Proceedings of the 20th Annual Hawaii International Conference on System Sciences, 478-487.]]"},{"key":"e_1_2_1_116_1","doi-asserted-by":"publisher","DOI":"10.1145\/163359.163373"},{"key":"e_1_2_1_118_1","volume-title":"Representation, Axiomatization, and Invariance","author":"LUCE R. D.","unstructured":"LUCE , R. D. , KRANTZ , D. H. , SUPPES , P. , AND TVER - SKY , A. 1990. Foundations of Measurement , Vol. 3 : Representation, Axiomatization, and Invariance . Academic Press , San Diego .]] LUCE, R. D., KRANTZ, D. H., SUPPES, P., AND TVER- SKY, A. 1990. Foundations of Measurement, Vol. 3: Representation, Axiomatization, and Invariance. Academic Press, San Diego.]]"},{"key":"e_1_2_1_119_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.256855"},{"key":"e_1_2_1_120_1","doi-asserted-by":"publisher","DOI":"10.1145\/120807.120825"},{"key":"e_1_2_1_121_1","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.1991.170248"},{"key":"e_1_2_1_122_1","first-page":"3","article-title":"A Conceptual model of software testing","volume":"1","author":"MARSHALL A. C.","year":"1991","unstructured":"MARSHALL , A. C. 1991 . A Conceptual model of software testing . J. Softw. Test. Ver. Rel. 1 , 3 (Dec.), 5-16.]] MARSHALL, A. C. 1991. A Conceptual model of software testing. J. Softw. Test. Ver. Rel. 1, 3 (Dec.), 5-16.]]","journal-title":"J. Softw. Test. Ver. Rel."},{"key":"e_1_2_1_123_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1976.233837"},{"key":"e_1_2_1_124_1","volume-title":"IEEE Computer Society Press","author":"MCCABE T. J.","unstructured":"MCCABE , T. J. (ED.) 1983. Structured Testing. IEEE Computer Society Press , Los Alamitos, CA .]] MCCABE, T. J. (ED.) 1983. Structured Testing. IEEE Computer Society Press, Los Alamitos, CA.]]"},{"key":"e_1_2_1_125_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232549"},{"key":"e_1_2_1_126_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1983.236869"},{"key":"e_1_2_1_127_1","volume-title":"Report No. 2","author":"MEEK B.","unstructured":"MEEK , B. AND SIU , K.K. 1988. The effectiveness of error seeding. Alvey Project SE\/064: Quality evaluation of programming language processors , Report No. 2 , Computing Centre , King's College London , Oct.]] MEEK, B. AND SIU, K.K. 1988. The effectiveness of error seeding. Alvey Project SE\/064: Quality evaluation of programming language processors, Report No. 2, Computing Centre, King's College London, Oct.]]"},{"key":"e_1_2_1_128_1","volume-title":"Tutorial: Software Testing and Validation Techniques","author":"MILLER E.","year":"1981","unstructured":"MILLER , E. AND HOWDEN , W.E. 1981 . Tutorial: Software Testing and Validation Techniques , ( 2 nd ed.). IEEE Computer Society Press , Los Alamitos, CA .]] MILLER, E. AND HOWDEN, W.E. 1981. Tutorial: Software Testing and Validation Techniques, (2nd ed.). IEEE Computer Society Press, Los Alamitos, CA.]]","edition":"2"},{"key":"e_1_2_1_129_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.120314"},{"key":"e_1_2_1_130_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.57623"},{"key":"e_1_2_1_131_1","doi-asserted-by":"publisher","DOI":"10.1145\/954627.954633"},{"key":"e_1_2_1_132_1","volume-title":"The Art of Software Testing","author":"MYERS G.J.","unstructured":"MYERS , G.J. 1979. The Art of Software Testing . John Wiley and Sons , New York .]] MYERS, G.J. 1979. The Art of Software Testing. John Wiley and Sons, New York.]]"},{"key":"e_1_2_1_133_1","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1992.0002"},{"key":"e_1_2_1_134_1","volume-title":"Proceedings of the Seventh International Conference on Software Engineering, 250-256","author":"NTAFOS S. C.","year":"1984","unstructured":"NTAFOS , S. C. 1984 . An evaluation of required element testing strategies . In Proceedings of the Seventh International Conference on Software Engineering, 250-256 .]] NTAFOS, S. C. 1984. An evaluation of required element testing strategies. In Proceedings of the Seventh International Conference on Software Engineering, 250-256.]]"},{"key":"e_1_2_1_135_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010308"},{"key":"e_1_2_1_136_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.6165"},{"key":"e_1_2_1_137_1","doi-asserted-by":"publisher","DOI":"10.1145\/75308.75324"},{"key":"e_1_2_1_138_1","doi-asserted-by":"publisher","DOI":"10.1145\/125489.125473"},{"key":"e_1_2_1_139_1","doi-asserted-by":"publisher","DOI":"10.1145\/120807.120826"},{"key":"e_1_2_1_140_1","doi-asserted-by":"publisher","DOI":"10.5555\/257572.257597"},{"key":"e_1_2_1_141_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.156901"},{"key":"e_1_2_1_142_1","doi-asserted-by":"publisher","DOI":"10.1145\/62959.62964"},{"key":"e_1_2_1_143_1","doi-asserted-by":"publisher","DOI":"10.1145\/120807.120814"},{"key":"e_1_2_1_144_1","volume-title":"Testing in Software Development","author":"OULD M. A.","unstructured":"OULD , M. A. AND UNWIN , C. , EDS. 1986. Testing in Software Development . Cambridge University Press , New York .]] OULD, M. A. AND UNWIN, C., EDS. 1986. Testing in Software Development. Cambridge University Press, New York.]]"},{"key":"e_1_2_1_145_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1975.6312853"},{"key":"e_1_2_1_146_1","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.1978.810478"},{"key":"e_1_2_1_147_1","doi-asserted-by":"publisher","DOI":"10.1145\/120807.120820"},{"key":"e_1_2_1_148_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.87282"},{"key":"e_1_2_1_149_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.238573"},{"key":"e_1_2_1_150_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.1985.231755"},{"key":"e_1_2_1_151_1","volume-title":"Proceedings of the 15th ICSE (May), 287-301","author":"PIWOWARSKI P.","year":"1993","unstructured":"PIWOWARSKI , P. , OHBA , M. , AND CARUSO , J. 1993 . Coverage measurement experience during function testing . In Proceedings of the 15th ICSE (May), 287-301 .]] PIWOWARSKI, P., OHBA, M., AND CARUSO, J. 1993. Coverage measurement experience during function testing. In Proceedings of the 15th ICSE (May), 287-301.]]"},{"key":"e_1_2_1_152_1","doi-asserted-by":"publisher","DOI":"10.1145\/75308.75328"},{"key":"e_1_2_1_153_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.58784"},{"key":"e_1_2_1_154_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.233487"},{"key":"e_1_2_1_155_1","unstructured":"PROGRAM ANALYSIS LTD. UK. 1992. Testbed technical description. May.]] PROGRAM ANALYSIS LTD. UK. 1992. Testbed technical description. May.]]"},{"key":"e_1_2_1_156_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232226"},{"key":"e_1_2_1_157_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.231892"},{"key":"e_1_2_1_158_1","doi-asserted-by":"publisher","DOI":"10.1145\/143062.143100"},{"key":"e_1_2_1_159_1","doi-asserted-by":"publisher","DOI":"10.1109\/WST.1988.5378"},{"key":"e_1_2_1_160_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.232020"},{"key":"e_1_2_1_162_1","volume-title":"Encyclopedia of Mathematics and Its Applications","author":"ROBERTS F.S.","unstructured":"ROBERTS , F.S. 1979. Measurement Theory , Encyclopedia of Mathematics and Its Applications , Vol. 7 . Addison-Wesley , Reading, MA .]] ROBERTS, F.S. 1979. Measurement Theory, Encyclopedia of Mathematics and Its Applications, Vol. 7. Addison-Wesley, Reading, MA.]]"},{"key":"e_1_2_1_163_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.233205"},{"key":"e_1_2_1_164_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1985.232225"},{"key":"e_1_2_1_165_1","volume-title":"Models and estimates","author":"RUDNER B.","unstructured":"RUDNER , B. 1977. Seeding\/tagging estimation of software errors : Models and estimates . Rome Air Development Centre , Rome, NY , RADC-TR-77-15, also AD-A036 655.]] RUDNER, B. 1977. Seeding\/tagging estimation of software errors: Models and estimates. Rome Air Development Centre, Rome, NY, RADC-TR-77-15, also AD-A036 655.]]"},{"key":"e_1_2_1_166_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1987.233197"},{"key":"e_1_2_1_167_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.73747"},{"key":"e_1_2_1_168_1","volume-title":"Software Test- Works--Software Testers Workbench System. Software Research","author":"SOFTWARE RESEARCH","unstructured":"SOFTWARE RESEARCH . 1992. Software Test- Works--Software Testers Workbench System. Software Research , Inc .]] SOFTWARE RESEARCH. 1992. Software Test- Works--Software Testers Workbench System. Software Research, Inc.]]"},{"key":"e_1_2_1_169_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.245736"},{"key":"e_1_2_1_170_1","doi-asserted-by":"publisher","DOI":"10.5555\/257572.257664"},{"key":"e_1_2_1_171_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.73746"},{"key":"e_1_2_1_172_1","volume-title":"Geometrical, Threshold, and Probabilistic Representations","author":"SUPPES P.","unstructured":"SUPPES , P. , KRANTZ , D. H. , LUCE , R. D. , AND TVER - SKY , A. 1989. Foundations of Measurement , Vol. 2 : Geometrical, Threshold, and Probabilistic Representations . Academic Press , San Diego .]] SUPPES, P., KRANTZ, D. H., LUCE, R. D., AND TVER- SKY, A. 1989. Foundations of Measurement, Vol. 2: Geometrical, Threshold, and Probabilistic Representations. Academic Press, San Diego.]]"},{"key":"e_1_2_1_173_1","doi-asserted-by":"publisher","DOI":"10.5555\/257572.257631"},{"key":"e_1_2_1_174_1","first-page":"330","article-title":"An empirical study of a model for program error prediction","author":"TAKAHASHI M.","year":"1985","unstructured":"TAKAHASHI , M. AND KAMAYACHI , Y. 1985 . An empirical study of a model for program error prediction . IEEE , 330 - 336 .]] TAKAHASHI, M. AND KAMAYACHI, Y. 1985. An empirical study of a model for program error prediction. IEEE, 330-336.]]","journal-title":"IEEE"},{"key":"e_1_2_1_175_1","unstructured":"THAYER R. LIPOW M. AND NELSON E. 1978. Software Reliability. North-Holland.]] THAYER R. LIPOW M. AND NELSON E. 1978. Software Reliability. North-Holland.]]"},{"key":"e_1_2_1_176_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.48939"},{"key":"e_1_2_1_177_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.238569"},{"key":"e_1_2_1_178_1","doi-asserted-by":"publisher","DOI":"10.1016\/0020-0190(88)90162-7"},{"key":"e_1_2_1_179_1","doi-asserted-by":"publisher","DOI":"10.5555\/257572.257633"},{"key":"e_1_2_1_180_1","doi-asserted-by":"publisher","DOI":"10.1145\/1968.1972"},{"key":"e_1_2_1_181_1","doi-asserted-by":"publisher","DOI":"10.1109\/52.73748"},{"key":"e_1_2_1_182_1","doi-asserted-by":"publisher","DOI":"10.1109\/MS.1985.230356"},{"key":"e_1_2_1_183_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.6196"},{"key":"e_1_2_1_184_1","doi-asserted-by":"publisher","DOI":"10.1007\/BF00995175"},{"key":"e_1_2_1_185_1","doi-asserted-by":"publisher","DOI":"10.1137\/0208047"},{"key":"e_1_2_1_186_1","doi-asserted-by":"publisher","DOI":"10.1093\/comjnl\/25.4.465"},{"key":"e_1_2_1_187_1","doi-asserted-by":"publisher","DOI":"10.1145\/69575.357231"},{"key":"e_1_2_1_188_1","doi-asserted-by":"publisher","DOI":"10.5555\/15550.15553"},{"key":"e_1_2_1_189_1","doi-asserted-by":"publisher","DOI":"10.1145\/62959.62963"},{"key":"e_1_2_1_190_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.6178"},{"key":"e_1_2_1_191_1","doi-asserted-by":"publisher","DOI":"10.1109\/WST.1988.5374"},{"key":"e_1_2_1_192_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.241773"},{"key":"e_1_2_1_193_1","doi-asserted-by":"publisher","DOI":"10.1016\/S0019-9958(83)80050-3"},{"key":"e_1_2_1_194_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.83906"},{"key":"e_1_2_1_195_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1980.234485"},{"key":"e_1_2_1_196_1","first-page":"13","article-title":"Basic mathematical definitions and results in testing. In Computer Program Testing, B. Chandrasekaran and S. Radicchi, Eds","author":"WHITE L.J.","year":"1981","unstructured":"WHITE , L.J. 1981 . Basic mathematical definitions and results in testing. In Computer Program Testing, B. Chandrasekaran and S. Radicchi, Eds ., North-Holland , 13 - 24 .]] WHITE, L.J. 1981. Basic mathematical definitions and results in testing. In Computer Program Testing, B. Chandrasekaran and S. Radicchi, Eds., North-Holland, 13-24.]]","journal-title":"North-Holland"},{"key":"e_1_2_1_197_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1980.234486"},{"key":"e_1_2_1_198_1","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380211007"},{"key":"e_1_2_1_199_1","doi-asserted-by":"publisher","DOI":"10.1016\/0920-5489(93)90036-Q"},{"key":"e_1_2_1_200_1","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.4370020403"},{"key":"e_1_2_1_201_1","first-page":"2","article-title":"Employing accumulated knowledge to refine test cases","volume":"2","author":"WILD C.","year":"1992","unstructured":"WILD , C. , ZEIL , S. , CHEN , J. , AND FENG , G. 1992 . Employing accumulated knowledge to refine test cases . J. Softw. Test. Ver. Rel. 2 , 2 (July), 53-68.]] WILD, C., ZEIL, S., CHEN, J., AND FENG, G. 1992. Employing accumulated knowledge to refine test cases. J. Softw. Test. Ver. Rel. 2, 2 (July), 53-68.]]","journal-title":"J. Softw. Test. Ver. Rel."},{"key":"e_1_2_1_202_1","first-page":"304","article-title":"Can domain testing overcome loop analysis","author":"WISZNIEWSKI B.W.","year":"1985","unstructured":"WISZNIEWSKI , B.W. 1985 . Can domain testing overcome loop analysis ? IEEE , 304 - 309 .]] WISZNIEWSKI, B.W. 1985. Can domain testing overcome loop analysis? IEEE, 304-309.]]","journal-title":"IEEE"},{"key":"e_1_2_1_203_1","first-page":"3","article-title":"Concerning ordered mutation testing of relational operators","volume":"1","author":"WOODWARD M. R.","year":"1991","unstructured":"WOODWARD , M. R. 1991 . Concerning ordered mutation testing of relational operators . J. Softw. Test. Ver. Rel. 1 , 3 (Dec.), 35-40.]] WOODWARD, M. R. 1991. Concerning ordered mutation testing of relational operators. J. Softw. Test. Ver. Rel. 1, 3 (Dec.), 35-40.]]","journal-title":"J. Softw. Test. Ver. Rel."},{"key":"e_1_2_1_204_1","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1993.0027"},{"key":"e_1_2_1_205_1","doi-asserted-by":"publisher","DOI":"10.1109\/WST.1988.5370"},{"key":"e_1_2_1_206_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1980.230473"},{"key":"e_1_2_1_208_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.6195"},{"key":"e_1_2_1_209_1","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1983.236870"},{"key":"e_1_2_1_210_1","first-page":"257","volume-title":"Proceedings of Seventh International Conference on Software Engineering","author":"ZEIL S.J.","year":"1984","unstructured":"ZEIL , S.J. 1984 . Perturbation testing for computation errors . In Proceedings of Seventh International Conference on Software Engineering ( Orlando, FL) , 257 - 265 .]] ZEIL, S.J. 1984. Perturbation testing for computation errors. In Proceedings of Seventh International Conference on Software Engineering (Orlando, FL), 257-265.]]"},{"key":"e_1_2_1_211_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.24727"},{"key":"e_1_2_1_212_1","doi-asserted-by":"publisher","DOI":"10.1145\/136586.136590"},{"key":"e_1_2_1_213_1","first-page":"194","article-title":"Axiomatic assessment of control flow based software test adequacy criteria","author":"ZHU H.","year":"1995","unstructured":"ZHU , H. 1995 a. Axiomatic assessment of control flow based software test adequacy criteria . Softw. Eng. J. ( Sept. ), 194 - 204 .]] ZHU, H. 1995a. Axiomatic assessment of control flow based software test adequacy criteria. Softw. Eng. J. (Sept.), 194-204.]]","journal-title":"Softw. Eng. J."},{"key":"e_1_2_1_214_1","unstructured":"ZHU H. 1995b. An induction theory of software testing. Sci. China 38 (Supp.) (Sept.) 58-72.]] ZHU H. 1995b. An induction theory of software testing. Sci. China 38 (Supp.) (Sept.) 58-72.]]"},{"key":"e_1_2_1_215_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.491648"},{"key":"e_1_2_1_216_1","doi-asserted-by":"publisher","DOI":"10.1002\/(SICI)1099-1689(199603)6:1<3::AID-STVR108>3.0.CO;2-D"},{"key":"e_1_2_1_219_1","doi-asserted-by":"publisher","DOI":"10.1049\/sej.1993.0004"},{"key":"e_1_2_1_220_1","first-page":"2","article-title":"Inductive inference and software testing","volume":"2","author":"ZHU H.","year":"1992","unstructured":"ZHU , H. , HALL , P. A. V., AND MAY , J. 1992 . Inductive inference and software testing . J. Softw. Test. Ver. Rel. 2 , 2 (July), 69-82.]] ZHU, H., HALL, P. A. V., AND MAY, J. 1992. Inductive inference and software testing. J. Softw. Test. Ver. Rel. 2, 2 (July), 69-82.]]","journal-title":"J. Softw. Test. Ver. Rel."},{"key":"e_1_2_1_221_1","volume-title":"Proceedings of IMA First Conference (Sept.","author":"ZHU H.","year":"1994","unstructured":"ZHU , H. , HALL , P. A. V., AND MAY , J. 1994 . Understanding software test adequacy--an axiomatic and measurement approach. In Mathematics of Dependable Systems , Proceedings of IMA First Conference (Sept. , London), Oxford University Press, Oxford.]] ZHU, H., HALL, P. A. V., AND MAY, J. 1994. Understanding software test adequacy--an axiomatic and measurement approach. In Mathematics of Dependable Systems, Proceedings of IMA First Conference (Sept., London), Oxford University Press, Oxford.]]"},{"key":"e_1_2_1_222_1","doi-asserted-by":"publisher","DOI":"10.1109\/32.16609"}],"container-title":["ACM Computing Surveys"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/dl.acm.org\/doi\/pdf\/10.1145\/267580.267590","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,12,30]],"date-time":"2022-12-30T18:52:44Z","timestamp":1672426364000},"score":1,"resource":{"primary":{"URL":"https:\/\/dl.acm.org\/doi\/10.1145\/267580.267590"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[1997,12]]},"references-count":213,"journal-issue":{"issue":"4","published-print":{"date-parts":[[1997,12]]}},"alternative-id":["10.1145\/267580.267590"],"URL":"https:\/\/doi.org\/10.1145\/267580.267590","relation":{},"ISSN":["0360-0300","1557-7341"],"issn-type":[{"value":"0360-0300","type":"print"},{"value":"1557-7341","type":"electronic"}],"subject":[],"published":{"date-parts":[[1997,12]]},"assertion":[{"value":"1997-12-01","order":2,"name":"published","label":"Published","group":{"name":"publication_history","label":"Publication History"}}]}}