{"id":"https://openalex.org/W2549834911","doi":"https://doi.org/10.1109/icitcs.2016.7740354","title":"Model-Based Testing and Exploratory Testing: Is Synergy Possible?","display_name":"Model-Based Testing and Exploratory Testing: Is Synergy Possible?","publication_year":2016,"publication_date":"2016-09-01","ids":{"openalex":"https://openalex.org/W2549834911","doi":"https://doi.org/10.1109/icitcs.2016.7740354","mag":"2549834911"},"language":"en","primary_location":{"id":"doi:10.1109/icitcs.2016.7740354","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitcs.2016.7740354","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 6th International Conference on IT Convergence and Security (ICITCS)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5085950015","display_name":"Karel Frajt\u00e1k","orcid":"https://orcid.org/0000-0003-4133-2805"},"institutions":[{"id":"https://openalex.org/I44504214","display_name":"Czech Technical University in Prague","ror":"https://ror.org/03kqpb082","country_code":"CZ","type":"education","lineage":["https://openalex.org/I44504214"]}],"countries":["CZ"],"is_corresponding":true,"raw_author_name":"Karel Frajtak","raw_affiliation_strings":["Department of Computer Science, Czech Technical University, Karlovo, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Czech Technical University, Karlovo, Czech Republic","institution_ids":["https://openalex.org/I44504214"]}]},{"author_position":"middle","author":{"id":"https://openalex.org/A5025223600","display_name":"Miroslav Bure\u0161","orcid":"https://orcid.org/0000-0002-2994-7826"},"institutions":[{"id":"https://openalex.org/I44504214","display_name":"Czech Technical University in Prague","ror":"https://ror.org/03kqpb082","country_code":"CZ","type":"education","lineage":["https://openalex.org/I44504214"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Miroslav Bures","raw_affiliation_strings":["Department of Computer Science, Czech Technical University, Karlovo, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Czech Technical University, Karlovo, Czech Republic","institution_ids":["https://openalex.org/I44504214"]}]},{"author_position":"last","author":{"id":"https://openalex.org/A5070117038","display_name":"Ivan Jel\u00ednek","orcid":null},"institutions":[{"id":"https://openalex.org/I44504214","display_name":"Czech Technical University in Prague","ror":"https://ror.org/03kqpb082","country_code":"CZ","type":"education","lineage":["https://openalex.org/I44504214"]}],"countries":["CZ"],"is_corresponding":false,"raw_author_name":"Ivan Jelinek","raw_affiliation_strings":["Department of Computer Science, Czech Technical University, Karlovo, Czech Republic"],"affiliations":[{"raw_affiliation_string":"Department of Computer Science, Czech Technical University, Karlovo, Czech Republic","institution_ids":["https://openalex.org/I44504214"]}]}],"institutions":[],"countries_distinct_count":1,"institutions_distinct_count":3,"corresponding_author_ids":["https://openalex.org/A5085950015"],"corresponding_institution_ids":["https://openalex.org/I44504214"],"apc_list":null,"apc_paid":null,"fwci":4.1691,"has_fulltext":false,"cited_by_count":28,"citation_normalized_percentile":{"value":0.94684035,"is_in_top_1_percent":false,"is_in_top_10_percent":true},"cited_by_percentile_year":{"min":89,"max":98},"biblio":{"volume":"8","issue":null,"first_page":"1","last_page":"6"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":1.0,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T10260","display_name":"Software Engineering Research","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1710","display_name":"Information Systems"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12127","display_name":"Software System Performance and Reliability","score":0.9995999932289124,"subfield":{"id":"https://openalex.org/subfields/1705","display_name":"Computer Networks and Communications"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8029083013534546},{"id":"https://openalex.org/keywords/manual-testing","display_name":"Manual testing","score":0.6571848392486572},{"id":"https://openalex.org/keywords/intuition","display_name":"Intuition","score":0.6005457639694214},{"id":"https://openalex.org/keywords/keyword-driven-testing","display_name":"Keyword-driven testing","score":0.5686202645301819},{"id":"https://openalex.org/keywords/test-strategy","display_name":"Test strategy","score":0.533202588558197},{"id":"https://openalex.org/keywords/white-box-testing","display_name":"White-box testing","score":0.5267851948738098},{"id":"https://openalex.org/keywords/model-based-testing","display_name":"Model-based testing","score":0.5111683011054993},{"id":"https://openalex.org/keywords/non-regression-testing","display_name":"Non-regression testing","score":0.511043906211853},{"id":"https://openalex.org/keywords/process","display_name":"Process (computing)","score":0.49411824345588684},{"id":"https://openalex.org/keywords/system-testing","display_name":"System testing","score":0.47146540880203247},{"id":"https://openalex.org/keywords/black-box-testing","display_name":"Black-box testing","score":0.4500218331813812},{"id":"https://openalex.org/keywords/software-testing","display_name":"Software testing","score":0.4254091680049896},{"id":"https://openalex.org/keywords/test-case","display_name":"Test case","score":0.3753354549407959},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.3717104196548462},{"id":"https://openalex.org/keywords/data-mining","display_name":"Data mining","score":0.36989015340805054},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3658024072647095},{"id":"https://openalex.org/keywords/machine-learning","display_name":"Machine learning","score":0.2930928170681},{"id":"https://openalex.org/keywords/software-system","display_name":"Software system","score":0.242211252450943},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.14263471961021423},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.11633527278900146}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8029083013534546},{"id":"https://openalex.org/C182122060","wikidata":"https://www.wikidata.org/wiki/Q6752328","display_name":"Manual testing","level":5,"score":0.6571848392486572},{"id":"https://openalex.org/C132010649","wikidata":"https://www.wikidata.org/wiki/Q189222","display_name":"Intuition","level":2,"score":0.6005457639694214},{"id":"https://openalex.org/C169168650","wikidata":"https://www.wikidata.org/wiki/Q1675637","display_name":"Keyword-driven testing","level":5,"score":0.5686202645301819},{"id":"https://openalex.org/C188598960","wikidata":"https://www.wikidata.org/wiki/Q7705805","display_name":"Test strategy","level":3,"score":0.533202588558197},{"id":"https://openalex.org/C162443782","wikidata":"https://www.wikidata.org/wiki/Q1066228","display_name":"White-box testing","level":5,"score":0.5267851948738098},{"id":"https://openalex.org/C165825675","wikidata":"https://www.wikidata.org/wiki/Q1399743","display_name":"Model-based testing","level":4,"score":0.5111683011054993},{"id":"https://openalex.org/C86469151","wikidata":"https://www.wikidata.org/wiki/Q917415","display_name":"Non-regression testing","level":5,"score":0.511043906211853},{"id":"https://openalex.org/C98045186","wikidata":"https://www.wikidata.org/wiki/Q205663","display_name":"Process (computing)","level":2,"score":0.49411824345588684},{"id":"https://openalex.org/C7166840","wikidata":"https://www.wikidata.org/wiki/Q1199682","display_name":"System testing","level":2,"score":0.47146540880203247},{"id":"https://openalex.org/C24169984","wikidata":"https://www.wikidata.org/wiki/Q879969","display_name":"Black-box testing","level":5,"score":0.4500218331813812},{"id":"https://openalex.org/C2984328558","wikidata":"https://www.wikidata.org/wiki/Q188522","display_name":"Software testing","level":3,"score":0.4254091680049896},{"id":"https://openalex.org/C128942645","wikidata":"https://www.wikidata.org/wiki/Q1568346","display_name":"Test case","level":3,"score":0.3753354549407959},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.3717104196548462},{"id":"https://openalex.org/C124101348","wikidata":"https://www.wikidata.org/wiki/Q172491","display_name":"Data mining","level":1,"score":0.36989015340805054},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3658024072647095},{"id":"https://openalex.org/C119857082","wikidata":"https://www.wikidata.org/wiki/Q2539","display_name":"Machine learning","level":1,"score":0.2930928170681},{"id":"https://openalex.org/C149091818","wikidata":"https://www.wikidata.org/wiki/Q2429814","display_name":"Software system","level":3,"score":0.242211252450943},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.14263471961021423},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.11633527278900146},{"id":"https://openalex.org/C138885662","wikidata":"https://www.wikidata.org/wiki/Q5891","display_name":"Philosophy","level":0,"score":0.0},{"id":"https://openalex.org/C111472728","wikidata":"https://www.wikidata.org/wiki/Q9471","display_name":"Epistemology","level":1,"score":0.0},{"id":"https://openalex.org/C152877465","wikidata":"https://www.wikidata.org/wiki/Q208042","display_name":"Regression analysis","level":2,"score":0.0}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/icitcs.2016.7740354","is_oa":false,"landing_page_url":"https://doi.org/10.1109/icitcs.2016.7740354","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"2016 6th International Conference on IT Convergence and Security (ICITCS)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[{"display_name":"Quality Education","id":"https://metadata.un.org/sdg/4","score":0.6600000262260437}],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":20,"referenced_works":["https://openalex.org/W109116489","https://openalex.org/W1495937243","https://openalex.org/W1812630525","https://openalex.org/W2011539648","https://openalex.org/W2018567346","https://openalex.org/W2028980140","https://openalex.org/W2046039173","https://openalex.org/W2078499983","https://openalex.org/W2101848183","https://openalex.org/W2105063825","https://openalex.org/W2125000816","https://openalex.org/W2142711791","https://openalex.org/W2159143689","https://openalex.org/W2161592485","https://openalex.org/W2184473079","https://openalex.org/W3045060270","https://openalex.org/W4247316974","https://openalex.org/W4385195157","https://openalex.org/W4399042884","https://openalex.org/W6686452151"],"related_works":["https://openalex.org/W3214776400","https://openalex.org/W3197709817","https://openalex.org/W2915670848","https://openalex.org/W2405892333","https://openalex.org/W2004139619","https://openalex.org/W2335749738","https://openalex.org/W2952740084","https://openalex.org/W2767512594","https://openalex.org/W2113385454","https://openalex.org/W2181413133"],"abstract_inverted_index":{"Model-based":[0],"testing":[1,34,83,117,120,200],"represents":[2,36],"an":[3,37],"efficient":[4],"method":[5],"to":[6,61,77,85,123,179,189],"detect":[7],"software":[8],"defects.":[9],"This":[10,164],"approach":[11,35],"has":[12,68,178],"a":[13,47,108],"limitation,":[14],"when":[15,89,141],"the":[16,19,50,63,79,82,90,114,130,138,170,199],"model":[17,48,128],"of":[18,49,81,113,129,169],"system":[20,172],"under":[21],"test":[22,88,95,190],"is":[23,75,132,147,162],"inconsistent,":[24],"incomplete,":[25],"or,":[26],"does":[27,44],"not":[28,45,98],"exist":[29],"at":[30],"all.":[31],"An":[32],"exploratory":[33,119,139],"alternative":[38],"for":[39],"such":[40],"situations:":[41],"initially":[42],"it":[43,74],"require":[46],"tested":[51,171],"system.":[52,64],"The":[53,127],"testers":[54],"are":[55,97,106,186],"using":[56],"their":[57,125],"skills":[58],"and":[59,93,118,121,135,153,156,175],"intuition":[60],"explore":[62],"Nevertheless,":[65],"this":[66,103],"technique":[67,109],"also":[69,187],"its":[70],"disadvantages.":[71],"For":[72],"example,":[73],"hard":[76],"measure":[78],"effectiveness":[80],"or":[84],"re-evaluate":[86],"certain":[87],"explored":[91,174,181],"path":[92],"exercised":[94],"cases":[96],"being":[99],"documented":[100],"properly.":[101],"In":[102],"paper,":[104],"we":[105],"proposing":[107],"that":[110,159,193],"utilizes":[111],"advantages":[112],"both":[115],"model-based":[116],"tries":[122],"eliminate":[124],"issues.":[126],"application":[131],"dynamically":[133],"created":[134],"updated":[136],"in":[137,198],"stage":[140],"state":[142],"data":[143],"(the":[144],"page":[145],"user":[146],"currently":[148],"on,":[149],"all":[150],"input,":[151],"action":[152],"link":[154],"elements)":[155],"every":[157],"step":[158],"was":[160],"taken":[161],"recorded.":[163],"structure":[165],"documents":[166],"what":[167,176],"parts":[168,177],"were":[173],"be":[180,195],"later":[182,197],"on.":[183],"Recorded":[184],"steps":[185],"converted":[188],"case":[191],"scenario":[192],"can":[194],"reused":[196],"process.":[201]},"counts_by_year":[{"year":2025,"cited_by_count":1},{"year":2022,"cited_by_count":5},{"year":2021,"cited_by_count":4},{"year":2020,"cited_by_count":4},{"year":2019,"cited_by_count":5},{"year":2018,"cited_by_count":3},{"year":2017,"cited_by_count":2},{"year":2015,"cited_by_count":2},{"year":2013,"cited_by_count":1},{"year":2012,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
