{"id":"https://openalex.org/W2090890505","doi":"https://doi.org/10.1002/stvr.4370030305","title":"Software testing using analysis and design based techniques","display_name":"Software testing using analysis and design based techniques","publication_year":1993,"publication_date":"1993-09-01","ids":{"openalex":"https://openalex.org/W2090890505","doi":"https://doi.org/10.1002/stvr.4370030305","mag":"2090890505"},"language":"en","primary_location":{"id":"doi:10.1002/stvr.4370030305","is_oa":false,"landing_page_url":"https://doi.org/10.1002/stvr.4370030305","pdf_url":null,"source":{"id":"https://openalex.org/S83624231","display_name":"Software Testing Verification and Reliability","issn_l":"0960-0833","issn":["0960-0833","1099-1689"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Software Testing, Verification and Reliability","raw_type":"journal-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5077078698","display_name":"Marc Roper","orcid":"https://orcid.org/0000-0001-6794-4637"},"institutions":[{"id":"https://openalex.org/I181647926","display_name":"University of Strathclyde","ror":"https://ror.org/00n3w3b69","country_code":"GB","type":"education","lineage":["https://openalex.org/I181647926"]}],"countries":["GB"],"is_corresponding":true,"raw_author_name":"Marc Roper","raw_affiliation_strings":["Department of Computer Science, University of Strathclyde, Glasgow, G1 1XH, U.K","Department of Computer Science, University of Strathclyde, Glasgow G1 1XH, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Strathclyde, Glasgow, G1 1XH, U.K","institution_ids":["https://openalex.org/I181647926"]},{"raw_affiliation_string":"Department of Computer Science, University of Strathclyde, Glasgow G1 1XH, U.K","institution_ids":["https://openalex.org/I181647926"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5003737593","display_name":"Ab Rashid Bin Ab Rahim","orcid":null},"institutions":[{"id":"https://openalex.org/I181647926","display_name":"University of Strathclyde","ror":"https://ror.org/00n3w3b69","country_code":"GB","type":"education","lineage":["https://openalex.org/I181647926"]}],"countries":["GB"],"is_corresponding":false,"raw_author_name":"Ab Rashid Bin Ab Rahim","raw_affiliation_strings":["Department of Computer Science, University of Strathclyde, Glasgow, G1 1XH, U.K","Department of Computer Science, University of Strathclyde, Glasgow G1 1XH, U.K"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, University of Strathclyde, Glasgow, G1 1XH, U.K","institution_ids":["https://openalex.org/I181647926"]},{"raw_affiliation_string":"Department of Computer Science, University of Strathclyde, Glasgow G1 1XH, U.K","institution_ids":["https://openalex.org/I181647926"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":2,"corresponding_author_ids":["https://openalex.org/A5077078698"],"corresponding_institution_ids":["https://openalex.org/I181647926"],"apc_list":{"value":3760,"currency":"USD","value_usd":3760},"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":3,"citation_normalized_percentile":{"value":0.28675873,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"3","issue":"3-4","first_page":"165","last_page":"179"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9998999834060669,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9998000264167786,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.7447586059570312},{"id":"https://openalex.org/keywords/white-box-testing","display_name":"White-box testing","score":0.5318697690963745},{"id":"https://openalex.org/keywords/data-flow-diagram","display_name":"Data flow diagram","score":0.5135102868080139},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.49339333176612854},{"id":"https://openalex.org/keywords/software-walkthrough","display_name":"Software walkthrough","score":0.4855053424835205},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.4749191701412201},{"id":"https://openalex.org/keywords/test-case","display_name":"Test case","score":0.4205652177333832},{"id":"https://openalex.org/keywords/keyword-driven-testing","display_name":"Keyword-driven testing","score":0.41596049070358276},{"id":"https://openalex.org/keywords/code-coverage","display_name":"Code coverage","score":0.41090816259384155},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.41013872623443604},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.4017728567123413},{"id":"https://openalex.org/keywords/reliability-engineering","display_name":"Reliability engineering","score":0.3460204005241394},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.3247971534729004},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.228920578956604},{"id":"https://openalex.org/keywords/database","display_name":"Database","score":0.21042132377624512},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.1372772455215454},{"id":"https://openalex.org/keywords/engineering","display_name":"Engineering","score":0.12440288066864014},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.11379224061965942}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.7447586059570312},{"id":"https://openalex.org/C162443782","wikidata":"https://www.wikidata.org/wiki/Q1066228","display_name":"White-box testing","level":5,"score":0.5318697690963745},{"id":"https://openalex.org/C489000","wikidata":"https://www.wikidata.org/wiki/Q747385","display_name":"Data flow diagram","level":2,"score":0.5135102868080139},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.49339333176612854},{"id":"https://openalex.org/C46110900","wikidata":"https://www.wikidata.org/wiki/Q11702993","display_name":"Software walkthrough","level":5,"score":0.4855053424835205},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.4749191701412201},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.4205652177333832},{"id":"https://openalex.org/C169168650","wikidata":"https://www.wikidata.org/wiki/Q1675637","display_name":"Keyword-driven testing","level":5,"score":0.41596049070358276},{"id":"https://openalex.org/C53942775","wikidata":"https://www.wikidata.org/wiki/Q1211721","display_name":"Code coverage","level":3,"score":0.41090816259384155},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.41013872623443604},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.4017728567123413},{"id":"https://openalex.org/C200601418","wikidata":"https://www.wikidata.org/wiki/Q2193887","display_name":"Reliability engineering","level":1,"score":0.3460204005241394},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.3247971534729004},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.228920578956604},{"id":"https://openalex.org/C77088390","wikidata":"https://www.wikidata.org/wiki/Q8513","display_name":"Database","level":1,"score":0.21042132377624512},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.1372772455215454},{"id":"https://openalex.org/C127413603","wikidata":"https://www.wikidata.org/wiki/Q11023","display_name":"Engineering","level":0,"score":0.12440288066864014},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.11379224061965942},{"id":"https://openalex.org/C152877465","wikidata":"https://www.wikidata.org/wiki/Q208042","display_name":"Regression analysis","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1002/stvr.4370030305","is_oa":false,"landing_page_url":"https://doi.org/10.1002/stvr.4370030305","pdf_url":null,"source":{"id":"https://openalex.org/S83624231","display_name":"Software Testing Verification and Reliability","issn_l":"0960-0833","issn":["0960-0833","1099-1689"],"is_oa":false,"is_in_doaj":false,"is_core":true,"host_organization":"https://openalex.org/P4310320595","host_organization_name":"Wiley","host_organization_lineage":["https://openalex.org/P4310320595"],"host_organization_lineage_names":["Wiley"],"type":"journal"},"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Software Testing, Verification and Reliability","raw_type":"journal-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":6,"referenced_works":["https://openalex.org/W49111815","https://openalex.org/W1984560806","https://openalex.org/W2023147618","https://openalex.org/W2053081075","https://openalex.org/W2111990314","https://openalex.org/W2611162829"],"related_works":["https://openalex.org/W2406153572","https://openalex.org/W2153601374","https://openalex.org/W3012177943","https://openalex.org/W2742066076","https://openalex.org/W3041119275","https://openalex.org/W2599955979","https://openalex.org/W223068689","https://openalex.org/W4328028537","https://openalex.org/W2136978836","https://openalex.org/W4286303819"],"abstract_inverted_index":{"Abstract":[0],"This":[1,73],"paper":[2,172],"presents":[3],"a":[4,33,57,132],"way":[5,58],"of":[6,18,42,66,119,135,178,182],"generating":[7],"acceptance":[8,155],"and":[9,26,96,111,139],"systems":[10,24],"test":[11,136,147],"data":[12,68,137],"from":[13,79],"documents":[14],"produced":[15],"as":[16,166],"part":[17],"the":[19,49,64,71,80,87,105,116,124,127,148,162,176,183],"traditional":[20],"structured":[21],"approaches":[22],"to":[23,36,39,62,83,92,114,146],"analysis":[25,38],"design.":[27],"Entity\u2010relationship":[28],"diagrams":[29,53],"are":[30,54,90,102,109],"analysed":[31,55],"in":[32,56],"fashion":[34],"similar":[35],"boundary\u2010value":[37],"generate":[40],"combinations":[41],"entities":[43,125],"that":[44,59,86,98,142],"should":[45],"be":[46,144,159],"supported":[47],"by":[48,123,174],"system.":[50,72,128],"Data":[51],"flow":[52],"generates":[60],"tests":[61,101,112],"exercise":[63],"passage":[65],"each":[67],"item":[69],"through":[70],"information":[74],"is":[75,131],"augmented":[76],"with":[77],"details":[78],"process":[81],"specifications":[82,88],"ensure,":[84],"firstly,":[85],"themselves":[89],"tested":[91],"branch":[93],"coverage":[94],"level":[95],"secondly,":[97],"no":[99],"infeasible":[100],"generated.":[103],"Finally,":[104],"\u2018entity":[106],"life":[107],"histories\u2019":[108],"examined":[110],"generated":[113],"evaluate":[115],"full":[117],"range":[118],"possible":[120],"states":[121],"experienced":[122],"within":[126],"The":[129,171],"result":[130],"common":[133],"pool":[134],"requirements":[138],"expected":[140],"results":[141,177],"may":[143,158],"used":[145],"corresponding":[149],"development":[150,164],"stage":[151,165],"(typically,":[152],"system":[153],"or":[154,157,168],"testing)":[156],"fed":[160],"into":[161],"next":[163],"walkthrough":[167],"review":[169],"data.":[170],"concludes":[173],"presenting":[175],"an":[179],"initial":[180],"evaluation":[181],"methods.":[184]},"counts_by_year":[{"year":2017,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
