{"id":"https://openalex.org/W2138734674","doi":"https://doi.org/10.1109/taic-part.2006.16","title":"Justifying Software Testing in the 21st Century","display_name":"Justifying Software Testing in the 21st Century","publication_year":2006,"publication_date":"2006-10-24","ids":{"openalex":"https://openalex.org/W2138734674","doi":"https://doi.org/10.1109/taic-part.2006.16","mag":"2138734674"},"language":"en","primary_location":{"id":"doi:10.1109/taic-part.2006.16","is_oa":false,"landing_page_url":"https://doi.org/10.1109/taic-part.2006.16","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Testing: Academic &amp; Industrial Conference - Practice And Research Techniques (TAIC PART'06)","raw_type":"proceedings-article"},"type":"article","indexed_in":["crossref"],"open_access":{"is_oa":false,"oa_status":"closed","oa_url":null,"any_repository_has_fulltext":false},"authorships":[{"author_position":"first","author":{"id":"https://openalex.org/A5074595825","display_name":"Ian Gilchrist","orcid":null},"institutions":[],"countries":[],"is_corresponding":true,"raw_author_name":"I. Gilchrist","raw_affiliation_strings":["IPL Information Processing Limited, UK","IPL Information Processing Ltd"],"affiliations":[{"raw_affiliation_string":"IPL Information Processing Limited, UK","institution_ids":[]},{"raw_affiliation_string":"IPL Information Processing Ltd","institution_ids":[]}]}],"institutions":[],"countries_distinct_count":0,"institutions_distinct_count":1,"corresponding_author_ids":["https://openalex.org/A5074595825"],"corresponding_institution_ids":[],"apc_list":null,"apc_paid":null,"fwci":0.0,"has_fulltext":false,"cited_by_count":1,"citation_normalized_percentile":{"value":0.22435897,"is_in_top_1_percent":false,"is_in_top_10_percent":false},"cited_by_percentile_year":{"min":90,"max":94},"biblio":{"volume":"10","issue":null,"first_page":"23","last_page":"28"},"is_retracted":false,"is_paratext":false,"is_xpac":false,"primary_topic":{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},"topics":[{"id":"https://openalex.org/T10743","display_name":"Software Testing and Debugging Techniques","score":0.9879000186920166,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T11689","display_name":"Adversarial Robustness in Machine Learning","score":0.9775999784469604,"subfield":{"id":"https://openalex.org/subfields/1702","display_name":"Artificial Intelligence"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}},{"id":"https://openalex.org/T12423","display_name":"Software Reliability and Analysis Research","score":0.9722999930381775,"subfield":{"id":"https://openalex.org/subfields/1712","display_name":"Software"},"field":{"id":"https://openalex.org/fields/17","display_name":"Computer Science"},"domain":{"id":"https://openalex.org/domains/3","display_name":"Physical Sciences"}}],"keywords":[{"id":"https://openalex.org/keywords/computer-science","display_name":"Computer science","score":0.8051233291625977},{"id":"https://openalex.org/keywords/dependability","display_name":"Dependability","score":0.6186602711677551},{"id":"https://openalex.org/keywords/compiler","display_name":"Compiler","score":0.6175360679626465},{"id":"https://openalex.org/keywords/executable","display_name":"Executable","score":0.6100955605506897},{"id":"https://openalex.org/keywords/programming-language","display_name":"Programming language","score":0.5801195502281189},{"id":"https://openalex.org/keywords/code-coverage","display_name":"Code coverage","score":0.5095670223236084},{"id":"https://openalex.org/keywords/software-verification","display_name":"Software verification","score":0.49893951416015625},{"id":"https://openalex.org/keywords/software-engineering","display_name":"Software engineering","score":0.48895490169525146},{"id":"https://openalex.org/keywords/source-code","display_name":"Source code","score":0.4456160068511963},{"id":"https://openalex.org/keywords/principal","display_name":"Principal (computer security)","score":0.4453151524066925},{"id":"https://openalex.org/keywords/development-testing","display_name":"Development testing","score":0.4196249842643738},{"id":"https://openalex.org/keywords/software-development","display_name":"Software development","score":0.3941517770290375},{"id":"https://openalex.org/keywords/software","display_name":"Software","score":0.3841332793235779},{"id":"https://openalex.org/keywords/software-quality","display_name":"Software quality","score":0.36787107586860657},{"id":"https://openalex.org/keywords/software-construction","display_name":"Software construction","score":0.36053013801574707},{"id":"https://openalex.org/keywords/operating-system","display_name":"Operating system","score":0.19253918528556824}],"concepts":[{"id":"https://openalex.org/C41008148","wikidata":"https://www.wikidata.org/wiki/Q21198","display_name":"Computer science","level":0,"score":0.8051233291625977},{"id":"https://openalex.org/C77019957","wikidata":"https://www.wikidata.org/wiki/Q2689057","display_name":"Dependability","level":2,"score":0.6186602711677551},{"id":"https://openalex.org/C169590947","wikidata":"https://www.wikidata.org/wiki/Q47506","display_name":"Compiler","level":2,"score":0.6175360679626465},{"id":"https://openalex.org/C160145156","wikidata":"https://www.wikidata.org/wiki/Q778586","display_name":"Executable","level":2,"score":0.6100955605506897},{"id":"https://openalex.org/C199360897","wikidata":"https://www.wikidata.org/wiki/Q9143","display_name":"Programming language","level":1,"score":0.5801195502281189},{"id":"https://openalex.org/C53942775","wikidata":"https://www.wikidata.org/wiki/Q1211721","display_name":"Code coverage","level":3,"score":0.5095670223236084},{"id":"https://openalex.org/C33054407","wikidata":"https://www.wikidata.org/wiki/Q6504747","display_name":"Software verification","level":5,"score":0.49893951416015625},{"id":"https://openalex.org/C115903868","wikidata":"https://www.wikidata.org/wiki/Q80993","display_name":"Software engineering","level":1,"score":0.48895490169525146},{"id":"https://openalex.org/C43126263","wikidata":"https://www.wikidata.org/wiki/Q128751","display_name":"Source code","level":2,"score":0.4456160068511963},{"id":"https://openalex.org/C144559511","wikidata":"https://www.wikidata.org/wiki/Q2986279","display_name":"Principal (computer security)","level":2,"score":0.4453151524066925},{"id":"https://openalex.org/C63406617","wikidata":"https://www.wikidata.org/wiki/Q5266714","display_name":"Development testing","level":5,"score":0.4196249842643738},{"id":"https://openalex.org/C529173508","wikidata":"https://www.wikidata.org/wiki/Q638608","display_name":"Software development","level":3,"score":0.3941517770290375},{"id":"https://openalex.org/C2777904410","wikidata":"https://www.wikidata.org/wiki/Q7397","display_name":"Software","level":2,"score":0.3841332793235779},{"id":"https://openalex.org/C117447612","wikidata":"https://www.wikidata.org/wiki/Q1412670","display_name":"Software quality","level":4,"score":0.36787107586860657},{"id":"https://openalex.org/C186846655","wikidata":"https://www.wikidata.org/wiki/Q3398377","display_name":"Software construction","level":4,"score":0.36053013801574707},{"id":"https://openalex.org/C111919701","wikidata":"https://www.wikidata.org/wiki/Q9135","display_name":"Operating system","level":1,"score":0.19253918528556824}],"mesh":[],"locations_count":1,"locations":[{"id":"doi:10.1109/taic-part.2006.16","is_oa":false,"landing_page_url":"https://doi.org/10.1109/taic-part.2006.16","pdf_url":null,"source":null,"license":null,"license_id":null,"version":"publishedVersion","is_accepted":true,"is_published":true,"raw_source_name":"Testing: Academic &amp; Industrial Conference - Practice And Research Techniques (TAIC PART'06)","raw_type":"proceedings-article"}],"best_oa_location":null,"sustainable_development_goals":[],"awards":[],"funders":[],"has_content":{"grobid_xml":false,"pdf":false},"content_urls":null,"referenced_works_count":1,"referenced_works":["https://openalex.org/W2010882009"],"related_works":["https://openalex.org/W3203913427","https://openalex.org/W3011478170","https://openalex.org/W2183150436","https://openalex.org/W2807488133","https://openalex.org/W2141736632","https://openalex.org/W1504312648","https://openalex.org/W4303622658","https://openalex.org/W2154761093","https://openalex.org/W4320058740","https://openalex.org/W2407460520"],"abstract_inverted_index":{"The":[0,17,65,137],"role":[1],"of":[2,63,134,139,145],"testing":[3,22,59,128],"as":[4,108],"a":[5,13,36,61,103],"software":[6,26,47],"verification":[7,56,141],"activity":[8],"was":[9],"directly":[10],"challenged":[11],"at":[12],"recent":[14],"practitioners'":[15],"conference.":[16],"speaker's":[18],"points":[19],"were":[20],"that":[21,28,33,89,127],"cannot":[23],"usefully":[24],"demonstrate":[25],"dependability,":[27],"it":[29,43,124],"is":[30,35,100,125,129,148],"over-costly,":[31],"and":[32,78],"there":[34,84,99],"case":[37],"to":[38,54,94,111,155],"be":[39],"made":[40],"for":[41,87],"omitting":[42],"from":[44],"the":[45,106,109,130,156],"(high-integrity)":[46],"development":[48],"process":[49],"altogether.":[50],"This":[51],"paper":[52],"attempts":[53],"contrast":[55],"techniques":[57,68],"including":[58],"against":[60],"variety":[62],"criteria.":[64],"principal":[66],"rival":[67],"considered":[69],"include":[70],"two":[71],"relatively":[72],"new":[73],"ones:":[74],"advanced":[75],"defect":[76],"detection":[77],"formal":[79],"verification.":[80],"In":[81],"both":[82],"cases":[83],"are":[85,120],"grounds":[86],"saying":[88],"their":[90],"use":[91],"will":[92],"lead":[93],"'better'":[95],"source":[96,113],"code,":[97],"but":[98,151],"still":[101],"ultimately":[102],"reliance":[104],"on":[105],"compiler":[107],"means":[110,144],"turn":[112],"code":[114,146],"into":[115],"executable":[116],"code.":[117],"Since":[118],"compilers":[119],"generally":[121],"flawed":[122],"themselves":[123],"argued":[126],"only":[131],"'ultimate":[132],"guarantee'":[133],"correct":[135],"execution.":[136],"option":[138],"bypassing":[140],"altogether":[142],"by":[143],"generation":[147],"also":[149],"considered,":[150],"makes":[152],"no":[153],"difference":[154],"overall":[157],"argument":[158]},"counts_by_year":[{"year":2019,"cited_by_count":1}],"updated_date":"2025-11-06T03:46:38.306776","created_date":"2025-10-10T00:00:00"}
