{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,5,22]],"date-time":"2025-05-22T04:08:35Z","timestamp":1747886915978,"version":"3.41.0"},"reference-count":40,"publisher":"IEEE","license":[{"start":{"date-parts":[[2012,4,1]],"date-time":"2012-04-01T00:00:00Z","timestamp":1333238400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-029"},{"start":{"date-parts":[[2012,4,1]],"date-time":"2012-04-01T00:00:00Z","timestamp":1333238400000},"content-version":"stm-asf","delay-in-days":0,"URL":"https:\/\/doi.org\/10.15223\/policy-037"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2012,4]]},"DOI":"10.1109\/icst.2012.178","type":"proceedings-article","created":{"date-parts":[[2012,5,25]],"date-time":"2012-05-25T18:58:04Z","timestamp":1337972284000},"page":"794-803","source":"Crossref","is-referenced-by-count":4,"title":["Search-Based Stress Testing of Wireless Network Protocol Stacks"],"prefix":"10.1109","author":[{"given":"Matthias","family":"Woehrle","sequence":"first","affiliation":[{"name":"Embedded Software Group, Delft Univ. of Technol., Delft, Netherlands"}]}],"member":"263","reference":[{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2008.12.005"},{"key":"ref2","article-title":"Constraint Logic Programming using Eclipse","author":"Apt","year":"2007","journal-title":"Cambridge University Press"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-23716-4_6"},{"key":"ref4","doi-asserted-by":"publisher","DOI":"10.1109\/ISoLA.2006.16"},{"key":"ref5","first-page":"265","article-title":"PermaDAQ: A scientific instrument for precision sensing and data recovery in environmental extremes","volume-title":"Proc. 8th ACM\/IEEE Int\u2019l Conference on Information Processing in Sensor Networks (IPSN 2009)","author":"Beutel","year":"2009"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36970-8_35"},{"volume-title":"Many-Objective Optimization and Hypervol-ume Based Search.","year":"2009","author":"Brockhoff","key":"ref7"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/CEC.2007.4424730"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/1182807.1182838"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1145\/1068009.1068189"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1016\/S0950-5849(01)00195-1"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1145\/1276958.1277174"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1002\/spe.1135"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-36970-8_37"},{"key":"ref15","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.5"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1644038.1644040"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1145\/1276958.1277175"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2009.71"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1145\/378993.379006"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1016\/j.peva.2008.10.007"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/SICE.2002.1195369"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1145\/1023663.1023679"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2010.07.027"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1145\/1321631.1321698"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1145\/958491.958506"},{"key":"ref26","article-title":"Trickle: a self-regulating algorithm for code propagation and maintenance in wireless sensor networks","volume":"1","author":"Levis","year":"2004","journal-title":"Proc. 1st Symposium on Networked Systems Design and Implementation"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1145\/1791212.1791234"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2007.38"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.294"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1145\/1809111.1809122"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2008.13"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1093\/acprof:oso\/9780198506263.001.0001"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1145\/1791212.1791235"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2107502.2107533"},{"key":"ref35","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04045-0_18"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-04368-0_21"},{"key":"ref37","first-page":"625","article-title":"Application of genetic algorithms to software testing","volume-title":"Proc. 5th Int\u2019l Conference on Software Engineering and its Applications","author":"Xanthakis"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2011.37"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1109\/32.988498"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-540-70928-2_64"}],"event":{"name":"2012 IEEE Fifth International Conference on Software Testing, Verification and Validation (ICST)","start":{"date-parts":[[2012,4,17]]},"location":"Montreal, QC, Canada","end":{"date-parts":[[2012,4,21]]}},"container-title":["2012 IEEE Fifth International Conference on Software Testing, Verification and Validation"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx5\/6200016\/6200080\/06200190.pdf?arnumber=6200190","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,21]],"date-time":"2025-05-21T06:22:51Z","timestamp":1747808571000},"score":1,"resource":{"primary":{"URL":"https:\/\/ieeexplore.ieee.org\/document\/6200190\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2012,4]]},"references-count":40,"URL":"https:\/\/doi.org\/10.1109\/icst.2012.178","relation":{},"subject":[],"published":{"date-parts":[[2012,4]]}}}