{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,10,16]],"date-time":"2025-10-16T06:31:39Z","timestamp":1760596299682,"version":"3.28.0"},"reference-count":76,"publisher":"IEEE","content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018,4]]},"DOI":"10.1109\/icst.2018.00036","type":"proceedings-article","created":{"date-parts":[[2018,5,28]],"date-time":"2018-05-28T20:33:35Z","timestamp":1527539615000},"page":"285-296","source":"Crossref","is-referenced-by-count":11,"title":["Approximate Transformations as Mutation Operators"],"prefix":"10.1109","author":[{"given":"Farah","family":"Hariri","sequence":"first","affiliation":[]},{"given":"August","family":"Shi","sequence":"additional","affiliation":[]},{"given":"Owolabi","family":"Legunsen","sequence":"additional","affiliation":[]},{"given":"Milos","family":"Gligoric","sequence":"additional","affiliation":[]},{"given":"Sarfraz","family":"Khurshid","sequence":"additional","affiliation":[]},{"given":"Sasa","family":"Misailovic","sequence":"additional","affiliation":[]}],"member":"263","reference":[{"key":"ref73","doi-asserted-by":"publisher","DOI":"10.1145\/2540708.2540710"},{"key":"ref72","doi-asserted-by":"publisher","DOI":"10.1109\/MICRO.2016.7783745"},{"key":"ref71","first-page":"233","article-title":"Enabling mutation testing for android apps","author":"v\u00e1squez","year":"2017","journal-title":"ESEC\/FSE"},{"key":"ref70","doi-asserted-by":"publisher","DOI":"10.1145\/154183.154265"},{"key":"ref76","doi-asserted-by":"publisher","DOI":"10.1145\/267580.267590"},{"key":"ref74","doi-asserted-by":"publisher","DOI":"10.1145\/2568225.2568265"},{"key":"ref39","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950361"},{"key":"ref75","doi-asserted-by":"publisher","DOI":"10.1002\/stv.430"},{"key":"ref38","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2013.6693142"},{"key":"ref33","doi-asserted-by":"publisher","DOI":"10.1109\/TSE.2010.62"},{"key":"ref32","doi-asserted-by":"publisher","DOI":"10.1109\/TAIC-PART.2008.18"},{"key":"ref31","doi-asserted-by":"publisher","DOI":"10.1145\/2491411.2494586"},{"key":"ref30","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2015.14"},{"key":"ref37","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950322"},{"key":"ref36","doi-asserted-by":"publisher","DOI":"10.1109\/ASE.2011.6100138"},{"key":"ref35","first-page":"654","article-title":"Are mutants a valid substitute for real faults in software testing?","author":"just","year":"2014","journal-title":"FSE"},{"key":"ref34","doi-asserted-by":"publisher","DOI":"10.1145\/2610384.2628053"},{"key":"ref60","doi-asserted-by":"publisher","DOI":"10.1145\/1595696.1595750"},{"key":"ref62","doi-asserted-by":"publisher","DOI":"10.1145\/2635868.2635921"},{"journal-title":"llvm-mutate","year":"0","author":"schulte","key":"ref61"},{"key":"ref63","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2016.40"},{"key":"ref28","first-page":"105","article-title":"Evaluating the effects of compiler optimizations on mutation testing at the compiler IR level","author":"hariri","year":"2016","journal-title":"ISSRE"},{"key":"ref64","first-page":"237","article-title":"Comparing and combining test-suite reduction and regression test selection","author":"shi","year":"2015","journal-title":"FSE"},{"key":"ref27","doi-asserted-by":"publisher","DOI":"10.1109\/ETS.2013.6569370"},{"key":"ref65","doi-asserted-by":"publisher","DOI":"10.1145\/2025113.2025133"},{"year":"0","key":"ref66"},{"key":"ref29","first-page":"80","article-title":"MUSEUM: debugging real-world multilingual programs using mutation analysis","volume":"82","author":"hong","year":"2017","journal-title":"IST"},{"key":"ref67","doi-asserted-by":"publisher","DOI":"10.1145\/2872362.2872402"},{"key":"ref68","doi-asserted-by":"publisher","DOI":"10.1016\/j.infsof.2011.03.010"},{"key":"ref69","article-title":"Llfi: An intermediate code level fault injector for soft computing applications","author":"thomas","year":"2013","journal-title":"SELSE"},{"year":"0","key":"ref2"},{"journal-title":"Commons-io","year":"0","key":"ref1"},{"key":"ref20","doi-asserted-by":"publisher","DOI":"10.1109\/C-M.1978.218136"},{"key":"ref22","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE-NIER.2017.15"},{"key":"ref21","doi-asserted-by":"publisher","DOI":"10.1145\/2737924.2737969"},{"key":"ref24","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2016.45"},{"key":"ref23","doi-asserted-by":"publisher","DOI":"10.1145\/2483760.2483773"},{"key":"ref26","doi-asserted-by":"publisher","DOI":"10.1109\/ISLPED.2011.5993675"},{"key":"ref25","first-page":"325","article-title":"Mutation operators for UML class diagrams","author":"granda","year":"2016","journal-title":"CAiSE"},{"key":"ref50","doi-asserted-by":"publisher","DOI":"10.1109\/CGO.2017.7863739"},{"key":"ref51","doi-asserted-by":"publisher","DOI":"10.1145\/227607.227610"},{"key":"ref59","doi-asserted-by":"crossref","first-page":"53","DOI":"10.1145\/2666356.2594302","article-title":"Stochastic optimization of floating-point programs with tunable precision","volume":"49","author":"schkufza","year":"2014","journal-title":"ACM SIGPLAN Notices"},{"key":"ref58","doi-asserted-by":"publisher","DOI":"10.1145\/1993498.1993518"},{"key":"ref57","doi-asserted-by":"publisher","DOI":"10.1145\/2503210.2503296"},{"key":"ref56","doi-asserted-by":"crossref","DOI":"10.1145\/2666357.2597812","article-title":"Asac: Automatic sensitivity analysis for approximate computing","author":"roy","year":"2014","journal-title":"SIGPLAN LCTES"},{"key":"ref55","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2012.161"},{"key":"ref54","doi-asserted-by":"publisher","DOI":"10.1007\/s11219-011-9142-y"},{"key":"ref53","doi-asserted-by":"publisher","DOI":"10.1109\/ICSTW.2015.7107457"},{"key":"ref52","doi-asserted-by":"publisher","DOI":"10.1109\/ICSE.1993.346062"},{"journal-title":"Tailored mutants fit bugs better","year":"2016","author":"allamanis","key":"ref10"},{"key":"ref11","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2014.13"},{"key":"ref40","doi-asserted-by":"publisher","DOI":"10.1145\/1950365.1950391"},{"key":"ref12","doi-asserted-by":"publisher","DOI":"10.1017\/CBO9780511809163"},{"key":"ref13","first-page":"402","article-title":"Is mutation an appropriate tool for testing experiments?","author":"andrews","year":"2005","journal-title":"ICSE"},{"year":"0","key":"ref14"},{"key":"ref15","first-page":"623","article-title":"The design of a prototype mutation system for program testing","author":"budd","year":"1899","journal-title":"AFIPS"},{"key":"ref16","doi-asserted-by":"publisher","DOI":"10.1145\/1831708.1831713"},{"key":"ref17","doi-asserted-by":"publisher","DOI":"10.1109\/QSIC.2005.27"},{"key":"ref18","doi-asserted-by":"publisher","DOI":"10.1145\/2463209.2488873"},{"journal-title":"Proteum-A tool for the assessment of test adequacy for C programs users guide","year":"0","author":"delamaro","key":"ref19"},{"year":"0","key":"ref4"},{"journal-title":"Real world mutation testing","year":"0","key":"ref3"},{"key":"ref6","doi-asserted-by":"publisher","DOI":"10.1145\/2465351.2465355"},{"journal-title":"Tensorflow Large-scale machine learning on heterogeneous distributed systems","year":"2016","author":"abadi","key":"ref5"},{"key":"ref8","doi-asserted-by":"publisher","DOI":"10.1109\/ICST.2015.7102584"},{"key":"ref7","doi-asserted-by":"publisher","DOI":"10.1145\/2950290.2950324"},{"key":"ref49","doi-asserted-by":"publisher","DOI":"10.1145\/1806799.1806808"},{"key":"ref9","doi-asserted-by":"publisher","DOI":"10.1145\/2970276.2970361"},{"key":"ref46","doi-asserted-by":"publisher","DOI":"10.1109\/CMPSAC.1991.170248"},{"key":"ref45","doi-asserted-by":"publisher","DOI":"10.1049\/iet-sen.2008.0038"},{"key":"ref48","first-page":"309","article-title":"Chisel: Reliability- and accuracy-aware optimization of approximate computational kernels","author":"misailovic","year":"2014","journal-title":"OOPSLA"},{"journal-title":"Exploring the Effectiveness of Loop Perforation for Quality of Service Profiling","year":"2010","author":"misailovic","key":"ref47"},{"key":"ref42","first-page":"535","article-title":"How does regression test prioritization perform in real-world software evolution?","author":"lu","year":"2016","journal-title":"ICSE"},{"key":"ref41","first-page":"153:1","article-title":"Image perforation: Automatically accelerating image pipelines by intelligently skipping samples","volume":"35","author":"lou","year":"2016","journal-title":"SIGGRAPH"},{"key":"ref44","doi-asserted-by":"publisher","DOI":"10.1145\/1134285.1134425"},{"key":"ref43","doi-asserted-by":"publisher","DOI":"10.1002\/stvr.308"}],"event":{"name":"2018 IEEE 11th International Conference on Software Testing, Verification and Validation (ICST)","start":{"date-parts":[[2018,4,9]]},"location":"Vasteras","end":{"date-parts":[[2018,4,13]]}},"container-title":["2018 IEEE 11th International Conference on Software Testing, Verification and Validation (ICST)"],"original-title":[],"link":[{"URL":"https:\/\/linproxy.fan.workers.dev:443\/http\/xplorestaging.ieee.org\/ielx7\/8365877\/8367020\/08367056.pdf?arnumber=8367056","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,1,26]],"date-time":"2022-01-26T01:04:17Z","timestamp":1643159057000},"score":1,"resource":{"primary":{"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/ieeexplore.ieee.org\/document\/8367056\/"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018,4]]},"references-count":76,"URL":"https:\/\/linproxy.fan.workers.dev:443\/https\/doi.org\/10.1109\/icst.2018.00036","relation":{},"subject":[],"published":{"date-parts":[[2018,4]]}}}