{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,10,22]],"date-time":"2024-10-22T16:22:24Z","timestamp":1729614144977,"version":"3.28.0"},"reference-count":32,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2017,3]]},"DOI":"10.1109\/icstw.2017.18","type":"proceedings-article","created":{"date-parts":[[2017,4,17]],"date-time":"2017-04-17T20:32:10Z","timestamp":1492461130000},"page":"65-68","source":"Crossref","is-referenced-by-count":4,"title":["Targeted Mutation: Efficient Mutation Analysis for Testing Non-Functional Properties"],"prefix":"10.1109","author":[{"given":"Bjorn","family":"Lisper","sequence":"first","affiliation":[]},{"given":"Birgitta","family":"Lindstrom","sequence":"additional","affiliation":[]},{"given":"Pasqualina","family":"Potena","sequence":"additional","affiliation":[]},{"given":"Mehrdad","family":"Saadatmand","sequence":"additional","affiliation":[]},{"given":"Markus","family":"Bohlin","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2014.20"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.13"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2012.08.024"},{"key":"ref10","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2016.41"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1145\/1347375.1347389"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.1984.5010248"},{"key":"ref13","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635929"},{"key":"ref14","doi-asserted-by":"publisher","DOI":"10.1145\/24039.24041"},{"key":"ref15","first-page":"482","article-title":"Sweet a tool for wcet flow analysis","author":"lisper","year":"0"},{"key":"ref16","first-page":"113","article-title":"Mutation testing for the new century","author":"maldonado","year":"0","journal-title":"2001 ch Proteum A Family of Tools to Support Specification and Program Testing Based on Mutation"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2011.18"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1109\/IWAST.2009.5069045"},{"key":"ref19","doi-asserted-by":"publisher","DOI":"10.1109\/SEUS.2005.12"},{"key":"ref28","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.33"},{"key":"ref4","first-page":"352","article-title":"Inter-class mutation operators for Java","author":"ma","year":"2002","journal-title":"Proceedings of the 3th International Symposium on Software Reliability Engineering (ISSRE"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2013.20"},{"key":"ref3","doi-asserted-by":"publisher","DOI":"10.1002\/spe.4380210704"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1109\/ISSRE.2007.27"},{"key":"ref29","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.162"},{"key":"ref5","article-title":"Design of mutant operators for the C programming language","author":"agrawal","year":"1989","journal-title":"Software Engineering Research Center Purdue University Tech Rep SERC-TR-41-P"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1016\/j.jss.2009.06.030"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1016\/j.entcs.2006.10.010"},{"key":"ref2","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809163"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2015.7107456"},{"key":"ref1","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"ref20","doi-asserted-by":"crossref","first-page":"5","DOI":"10.1007\/s10664-010-9133-9","article-title":"WCET analysis of modern processors using multicriteria optimisation","volume":"16","author":"bate","year":"2011","journal-title":"Empirical Software Engineering"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/REAL.2002.1181582"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1109\/ECRTS.2012.31"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1007\/978-3-642-38916-0_2"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1109\/RTAS.2009.16"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1145\/1566445.1566540"},{"key":"ref25","doi-asserted-by":"publisher","DOI":"10.1109\/COMPSAC.2012.93"}],"event":{"name":"2017 IEEE International Conference on Software Testing, Verification and Validation: Workshops (ICSTW)","start":{"date-parts":[[2017,3,13]]},"location":"Tokyo","end":{"date-parts":[[2017,3,17]]}},"container-title":["2017 IEEE International Conference on Software Testing, Verification and Validation Workshops (ICSTW)"],"original-title":[],"link":[{"URL":"http:\/\/xplorestaging.ieee.org\/ielx7\/7898633\/7899015\/07899035.pdf?arnumber=7899035","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2017,6,25]],"date-time":"2017-06-25T14:57:06Z","timestamp":1498402626000},"score":1,"resource":{"primary":{"URL":"http:\/\/ieeexplore.ieee.org\/document\/7899035\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2017,3]]},"references-count":32,"URL":"https:\/\/doi.org\/10.1109\/icstw.2017.18","relation":{},"subject":[],"published":{"date-parts":[[2017,3]]}}}