callback( { "result":{ "query":":facetid:toc:\"db/journals/stvr/stvr14.bht\"", "status":{ "@code":"200", "text":"OK" }, "time":{ "@unit":"msecs", "text":"210.04" }, "completions":{ "@total":"1", "@computed":"1", "@sent":"1", "c":{ "@sc":"20", "@dc":"20", "@oc":"20", "@id":"43484469", "text":":facetid:toc:db/journals/stvr/stvr14.bht" } }, "hits":{ "@total":"20", "@computed":"20", "@sent":"20", "@first":"0", "hit":[{ "@score":"1", "@id":"6005862", "info":{"authors":{"author":{"@pid":"26/263","text":"Sarika Agarwal"}},"title":"Testing Web Security: Assessing the Security of Web Sites and Applications. By Steven Splaine. Published by John Wiley and Sons, New York, USA, 2002 ISBN 0-471-23281-5, 345 pages.","venue":"Softw. Test. Verification Reliab.","volume":"14","number":"4","pages":"284-285","year":"2004","type":"Journal Articles","access":"closed","key":"journals/stvr/Agarwal04","doi":"10.1002/STVR.307","ee":"https://doi.org/10.1002/stvr.307","url":"https://dblp.org/rec/journals/stvr/Agarwal04"}, "url":"URL#6005862" }, { "@score":"1", "@id":"6005863", "info":{"authors":{"author":[{"@pid":"11/6933-2","text":"Kirill Bogdanov 0002"},{"@pid":"73/5445","text":"Mike Holcombe"}]},"title":"Refinement in statechart testing.","venue":"Softw. Test. Verification Reliab.","volume":"14","number":"3","pages":"189-211","year":"2004","type":"Journal Articles","access":"closed","key":"journals/stvr/BogdanovH04","doi":"10.1002/STVR.301","ee":"https://doi.org/10.1002/stvr.301","url":"https://dblp.org/rec/journals/stvr/BogdanovH04"}, "url":"URL#6005863" }, { "@score":"1", "@id":"6005864", "info":{"authors":{"author":[{"@pid":"13/2075","text":"David Chays"},{"@pid":"79/3181","text":"Yuetang Deng"},{"@pid":"f/PGFrankl","text":"Phyllis G. Frankl"},{"@pid":"77/1702","text":"Saikat Dan"},{"@pid":"88/5849","text":"Filippos I. Vokolos"},{"@pid":"55/1672","text":"Elaine J. Weyuker"}]},"title":"An AGENDA for testing relational database applications.","venue":"Softw. Test. Verification Reliab.","volume":"14","number":"1","pages":"17-44","year":"2004","type":"Journal Articles","access":"closed","key":"journals/stvr/ChaysDFDVW04","doi":"10.1002/STVR.286","ee":"https://doi.org/10.1002/stvr.286","url":"https://dblp.org/rec/journals/stvr/ChaysDFDVW04"}, "url":"URL#6005864" }, { "@score":"1", "@id":"6005865", "info":{"authors":{"author":[{"@pid":"c/JohnAClark","text":"John A. Clark"},{"@pid":"h/MarkHarman","text":"Mark Harman"},{"@pid":"h/RobertMHierons","text":"Robert M. Hierons"}]},"title":"Editorial: Software testing in the United Kingdom.","venue":"Softw. Test. Verification Reliab.","volume":"14","number":"3","pages":"165-166","year":"2004","type":"Journal Articles","access":"closed","key":"journals/stvr/ClarkHH04","doi":"10.1002/STVR.302","ee":"https://doi.org/10.1002/stvr.302","url":"https://dblp.org/rec/journals/stvr/ClarkHH04"}, "url":"URL#6005865" }, { "@score":"1", "@id":"6005866", "info":{"authors":{"author":[{"@pid":"58/3190","text":"Séverine Colin"},{"@pid":"03/4157","text":"Bruno Legeard"},{"@pid":"86/3384","text":"Fabien Peureux"}]},"title":"Preamble computation in automated test case generation using constraint logic programming.","venue":"Softw. Test. Verification Reliab.","volume":"14","number":"3","pages":"213-235","year":"2004","type":"Journal Articles","access":"closed","key":"journals/stvr/ColinLP04","doi":"10.1002/STVR.300","ee":"https://doi.org/10.1002/stvr.300","url":"https://dblp.org/rec/journals/stvr/ColinLP04"}, "url":"URL#6005866" }, { "@score":"1", "@id":"6005867", "info":{"authors":{"author":{"@pid":"10/5351","text":"Isabel Evans"}},"title":"A Practitioner's Guide to Software Test Design. By Lee Copeland. Published by Artech House, Norwood, MA, USA, 2004, ISBN 1-58053-791-X, 320 pages.","venue":"Softw. Test. Verification Reliab.","volume":"14","number":"4","pages":"283-284","year":"2004","type":"Journal Articles","access":"closed","key":"journals/stvr/Evans04","doi":"10.1002/STVR.305","ee":"https://doi.org/10.1002/stvr.305","url":"https://dblp.org/rec/journals/stvr/Evans04"}, "url":"URL#6005867" }, { "@score":"1", "@id":"6005868", "info":{"authors":{"author":{"@pid":"65/4952","text":"Ian Gilchrist"}},"title":"Book Reviews.","venue":"Softw. Test. Verification Reliab.","volume":"14","number":"1","pages":"71-72","year":"2004","type":"Journal Articles","access":"closed","key":"journals/stvr/Gilchrist04","doi":"10.1002/STVR.289","ee":"https://doi.org/10.1002/stvr.289","url":"https://dblp.org/rec/journals/stvr/Gilchrist04"}, "url":"URL#6005868" }, { "@score":"1", "@id":"6005869", "info":{"authors":{"author":{"@pid":"37/6670","text":"Michael A. Hennell"}},"title":"Guest Editorial: An industrial viewpoint.","venue":"Softw. Test. Verification Reliab.","volume":"14","number":"4","pages":"241-242","year":"2004","type":"Journal Articles","access":"closed","key":"journals/stvr/Hennell04","doi":"10.1002/STVR.311","ee":"https://doi.org/10.1002/stvr.311","url":"https://dblp.org/rec/journals/stvr/Hennell04"}, "url":"URL#6005869" }, { "@score":"1", "@id":"6005870", "info":{"authors":{"author":{"@pid":"h/RobertMHierons","text":"Robert M. Hierons"}},"title":"Book Reviews.","venue":"Softw. Test. Verification Reliab.","volume":"14","number":"1","pages":"72-73","year":"2004","type":"Journal Articles","access":"closed","key":"journals/stvr/Hierons04","doi":"10.1002/STVR.290","ee":"https://doi.org/10.1002/stvr.290","url":"https://dblp.org/rec/journals/stvr/Hierons04"}, "url":"URL#6005870" }, { "@score":"1", "@id":"6005871", "info":{"authors":{"author":[{"@pid":"97/1900","text":"Kalpesh Kapoor"},{"@pid":"b/JonathanPBowen","text":"Jonathan P. Bowen"}]},"title":"Experimental evaluation of the tolerance for control-flow test criteria.","venue":"Softw. Test. Verification Reliab.","volume":"14","number":"3","pages":"167-187","year":"2004","type":"Journal Articles","access":"closed","key":"journals/stvr/KapoorB04","doi":"10.1002/STVR.303","ee":"https://doi.org/10.1002/stvr.303","url":"https://dblp.org/rec/journals/stvr/KapoorB04"}, "url":"URL#6005871" }, { "@score":"1", "@id":"6005872", "info":{"authors":{"author":[{"@pid":"71/3546-2","text":"Diane Kelly 0002"},{"@pid":"79/535","text":"Terry Shepard"}]},"title":"Eight maxims for software inspectors.","venue":"Softw. Test. Verification Reliab.","volume":"14","number":"4","pages":"243-256","year":"2004","type":"Journal Articles","access":"closed","key":"journals/stvr/KellyS04","doi":"10.1002/STVR.295","ee":"https://doi.org/10.1002/stvr.295","url":"https://dblp.org/rec/journals/stvr/KellyS04"}, "url":"URL#6005872" }, { "@score":"1", "@id":"6005873", "info":{"authors":{"author":{"@pid":"63/6810","text":"Silke Kuball"}},"title":"Book Reviews.","venue":"Softw. Test. Verification Reliab.","volume":"14","number":"2","pages":"158-159","year":"2004","type":"Journal Articles","access":"closed","key":"journals/stvr/Kuball04","doi":"10.1002/STVR.293","ee":"https://doi.org/10.1002/stvr.293","url":"https://dblp.org/rec/journals/stvr/Kuball04"}, "url":"URL#6005873" }, { "@score":"1", "@id":"6005874", "info":{"authors":{"author":[{"@pid":"17/6244","text":"Ljubomir Lazic"},{"@pid":"81/4198","text":"Dusan M. Velasevic"}]},"title":"Applying simulation and design of experiments to the embedded software testing process.","venue":"Softw. Test. Verification Reliab.","volume":"14","number":"4","pages":"257-282","year":"2004","type":"Journal Articles","access":"closed","key":"journals/stvr/LazicV04","doi":"10.1002/STVR.299","ee":"https://doi.org/10.1002/stvr.299","url":"https://dblp.org/rec/journals/stvr/LazicV04"}, "url":"URL#6005874" }, { "@score":"1", "@id":"6005875", "info":{"authors":{"author":[{"@pid":"03/4157","text":"Bruno Legeard"},{"@pid":"86/3384","text":"Fabien Peureux"},{"@pid":"43/3091","text":"Mark Utting"}]},"title":"Controlling test case explosion in test generation from B formal models.","venue":"Softw. Test. Verification Reliab.","volume":"14","number":"2","pages":"81-103","year":"2004","type":"Journal Articles","access":"closed","key":"journals/stvr/LegeardPU04","doi":"10.1002/STVR.287","ee":"https://doi.org/10.1002/stvr.287","url":"https://dblp.org/rec/journals/stvr/LegeardPU04"}, "url":"URL#6005875" }, { "@score":"1", "@id":"6005876", "info":{"authors":{"author":{"@pid":"33/13","text":"Phil McMinn"}},"title":"Search-based software test data generation: a survey.","venue":"Softw. Test. Verification Reliab.","volume":"14","number":"2","pages":"105-156","year":"2004","type":"Journal Articles","access":"closed","key":"journals/stvr/McMinn04","doi":"10.1002/STVR.294","ee":"https://doi.org/10.1002/stvr.294","url":"https://dblp.org/rec/journals/stvr/McMinn04"}, "url":"URL#6005876" }, { "@score":"1", "@id":"6005877", "info":{"authors":{"author":{"@pid":"89/1748","text":"Felix Redmill"}},"title":"Exploring risk-based testing and its implications.","venue":"Softw. Test. Verification Reliab.","volume":"14","number":"1","pages":"3-15","year":"2004","type":"Journal Articles","access":"closed","key":"journals/stvr/Redmill04","doi":"10.1002/STVR.288","ee":"https://doi.org/10.1002/stvr.288","url":"https://dblp.org/rec/journals/stvr/Redmill04"}, "url":"URL#6005877" }, { "@score":"1", "@id":"6005878", "info":{"authors":{"author":{"@pid":"94/3808","text":"Marc Roper"}},"title":"Book Reviews.","venue":"Softw. Test. Verification Reliab.","volume":"14","number":"2","pages":"157-158","year":"2004","type":"Journal Articles","access":"closed","key":"journals/stvr/Roper04","doi":"10.1002/STVR.296","ee":"https://doi.org/10.1002/stvr.296","url":"https://dblp.org/rec/journals/stvr/Roper04"}, "url":"URL#6005878" }, { "@score":"1", "@id":"6005879", "info":{"authors":{"author":{"@pid":"73/4267","text":"Lee J. White"}},"title":"Editorial: Software testing as related to project risk.","venue":"Softw. Test. Verification Reliab.","volume":"14","number":"1","pages":"1-2","year":"2004","type":"Journal Articles","access":"closed","key":"journals/stvr/White04","doi":"10.1002/STVR.291","ee":"https://doi.org/10.1002/stvr.291","url":"https://dblp.org/rec/journals/stvr/White04"}, "url":"URL#6005879" }, { "@score":"1", "@id":"6005880", "info":{"authors":{"author":{"@pid":"w/MartinRWoodward","text":"Martin R. Woodward"}},"title":"Editorial: A test of time across the generations.","venue":"Softw. Test. Verification Reliab.","volume":"14","number":"2","pages":"79-80","year":"2004","type":"Journal Articles","access":"closed","key":"journals/stvr/Woodward04","doi":"10.1002/STVR.297","ee":"https://doi.org/10.1002/stvr.297","url":"https://dblp.org/rec/journals/stvr/Woodward04"}, "url":"URL#6005880" }, { "@score":"1", "@id":"6005881", "info":{"authors":{"author":[{"@pid":"14/16","text":"Hoijin Yoon"},{"@pid":"85/3037","text":"Byoungju Choi"}]},"title":"Effective test case selection for component customization and its application to Enterprise JavaBeans.","venue":"Softw. Test. Verification Reliab.","volume":"14","number":"1","pages":"45-70","year":"2004","type":"Journal Articles","access":"closed","key":"journals/stvr/YoonC04","doi":"10.1002/STVR.276","ee":"https://doi.org/10.1002/stvr.276","url":"https://dblp.org/rec/journals/stvr/YoonC04"}, "url":"URL#6005881" } ] } } } )