{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,24]],"date-time":"2026-02-24T18:54:55Z","timestamp":1771959295904,"version":"3.50.1"},"reference-count":61,"publisher":"Wiley","issue":"2","license":[{"start":{"date-parts":[[2015,9,1]],"date-time":"2015-09-01T00:00:00Z","timestamp":1441065600000},"content-version":"tdm","delay-in-days":5722,"URL":"http:\/\/doi.wiley.com\/10.1002\/tdm_license_1.1"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":["Softw. Test. Verif. Reliab."],"published-print":{"date-parts":[[2000,6]]},"DOI":"10.1002\/1099-1689(200006)10:2<77::aid-stvr197>3.0.co;2-e","type":"journal-article","created":{"date-parts":[[2002,9,10]],"date-time":"2002-09-10T20:18:13Z","timestamp":1031689093000},"page":"77-109","source":"Crossref","is-referenced-by-count":80,"title":["Regression test selection for C++ software"],"prefix":"10.1002","volume":"10","author":[{"given":"Gregg","family":"Rothermel","sequence":"first","affiliation":[]},{"given":"Mary Jean","family":"Harrold","sequence":"additional","affiliation":[]},{"given":"Jeinay","family":"Dedhia","sequence":"additional","affiliation":[]}],"member":"311","published-online":{"date-parts":[[2000]]},"reference":[{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB1","author":"Agrawal","year":"1993","unstructured":"Incremental regression testing. In Proceedings of the Conference on Software Maintenance?1993 September 1993; 348-357."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB2","author":"Ball","year":"1998","unstructured":"On the limit of control flow analysis for regression test selection. In Proceedings of the 1998 International Symposium on Software Testing and Analysis (ISSTA 98) March 1998; 134-142."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB3","doi-asserted-by":"crossref","first-page":"498","DOI":"10.1109\/32.624306","volume":"23","author":"Binkley","year":"1997","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB4","first-page":"211","volume-title":"Proceedings of the 16th International Conference on Software Engineering, Sorrento, Italy, May 1994","author":"Chen","year":"1994","unstructured":"TestTube: a system for selective regression testing. In Proceedings of the 16th International Conference on Software Engineering, Sorrento, Italy, May 1994, IEEE Computer Society Press, Los Alamitos, CA, May 1994; 211-220."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB5","author":"Harrold","year":"1988","unstructured":"An incremental approach to unit testing during maintenance. In Proceedings of the Conference on Software Maintenance_1988 October 1988; 362-367."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB6","author":"Leung","year":"1990","unstructured":"A study of integration testing and software regression at the integration level. In Proceedings of the Conference on Software Maintenance_1990 November 1990; 290-300."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB7","author":"Ostrand","year":"1988","unstructured":"Using dataflow analysis for regression testing. In Proceedings of the Sixth Annual Pacific Northwest Software Quality Conference, September 1988; 233-247."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB8","doi-asserted-by":"crossref","first-page":"173","DOI":"10.1145\/248233.248262","volume":"6","author":"Rothermel","year":"1997","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB9","author":"Vokolos","year":"1997","unstructured":"Pythia: a regression test selection tool based on textual differencing. In ENCRESS '97, Third International Conference on Reliability, Quality, and Safety of Software Intensive Systems, May 1997."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB10","author":"White","year":"1992","unstructured":"A firewall concept for both control-flow and data-flow in regression integration testing. In Proceedings of the Conference on Software Maintenance, 1992 November 1992; 262-270."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB11","first-page":"68","volume-title":"Proceedings of the 14th International Conference on Software Engineering, Melbourne, Australia, May 1992","author":"Harrold","year":"1992","unstructured":"Incremental testing of object-oriented class structures. In Proceedings of the 14th International Conference on Software Engineering, Melbourne, Australia, May 1992, ACM Press, NY, 1992; 68-80."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB12","doi-asserted-by":"crossref","first-page":"217","DOI":"10.1002\/(SICI)1096-908X(199707\/08)9:4<217::AID-SMR152>3.0.CO;2-2","volume":"9","author":"Hsia","year":"1997","journal-title":"Software Maintenance: Research and Practice"},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB13","doi-asserted-by":"crossref","first-page":"75","DOI":"10.1145\/226239.226256","volume":"38","author":"Kung","year":"1995","journal-title":"Communications of the ACM"},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB14","doi-asserted-by":"crossref","first-page":"21","DOI":"10.1016\/0164-1212(95)00047-X","volume":"32","author":"Kung","year":"1996","journal-title":"The Journal of Systems and Software"},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB15","doi-asserted-by":"crossref","first-page":"14","DOI":"10.1109\/ICSM.1994.336793","volume-title":"Proceedings of the Conference on Software Maintenance_1994","author":"Rothermel","year":"1994","unstructured":"Selecting regression tests for object-oriented software. In Proceedings of the Conference on Software Maintenance_1994 September 1994, IEEE Computer Society Press, Los Alamitos, 1994; 14-25."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB16","first-page":"45","volume":"5","author":"Smith","year":"1992","journal-title":"Journal of Object-Oriented Programming"},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB17","doi-asserted-by":"crossref","first-page":"1128","DOI":"10.1109\/TSE.1986.6313008","volume":"12","author":"Weyuker","year":"1986","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB18","doi-asserted-by":"crossref","first-page":"165","DOI":"10.1145\/120807.120822","volume-title":"Proceedings of the Fourth Symposium on Testing, Analysis, and Verification (TAV4)","author":"Doong","year":"1991","unstructured":"Case studies on testing object-oriented programs. In Proceedings of the Fourth Symposium on Testing, Analysis, and Verification (TAV4), Victoria, BC, October 1991, ACM Press, NY, 165-177."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB19","author":"Hoffman","year":"1993","unstructured":"Graph-based module testing. In Proceedings of the 16th Australian Computer Science Conference February 1993; 479-487."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB20","author":"Turner","year":"1993","unstructured":"The state-based testing of object-oriented programs. In Proceedings of the Conference on Software Maintenance, 1993, September 1993; 302-311."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB21","volume-title":"Techniques, and Tools","author":"Aho","year":"1986","unstructured":"Compilers: Principles, Techniques, and Tools. Addison-Wesley, Reading, MA, 1986."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB22","author":"Landi","year":"1992","unstructured":"A safe approximate algorithm for interprocedural pointer aliasing. In Proceedings of SIGPLAN '92 Conference on Programming Language Design and Implementation June 1992; 235-248."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB23","doi-asserted-by":"crossref","first-page":"377","DOI":"10.1016\/0168-9002(90)91464-M","volume":"293","author":"Brown","year":"1990","journal-title":"Nuclear Instruments and Methods in Physics Research, Section A"},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB24","first-page":"404","volume-title":"Proceedings of the Conference on Software Maintenance_1988","author":"Dogsa","year":"1988","unstructured":"CAMOTE_computer aided module testing and design environment. In Proceedings of the Conference on Software Maintenance_1988, IEEE Computer Society Press, Los Alamitos, CA, October 1988; 404-408."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB25","first-page":"97","volume-title":"Proceedings of the Third Workshop on Software Testing, Analysis, and Verification (TAV3), Key West, FL, December 1989","author":"Hoffman","year":"1989","unstructured":"Module test case generation. In Proceedings of the Third Workshop on Software Testing, Analysis, and Verification (TAV3), Key West, FL, December 1989, ACM Press, 1989; 97-102."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB26","doi-asserted-by":"crossref","first-page":"81","DOI":"10.1109\/ICSM.1989.65196","volume-title":"Proceedings of the Conference on Software Maintenance_1989 October 1989","author":"Ziegler","year":"1989","unstructured":"An Ada based real-time closed-loop integration and regression test tool. In Proceedings of the Conference on Software Maintenance_1989 October 1989, IEEE Computer Society Press, Los Alamitos, CA, 1989; 81-90."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB27","first-page":"487","volume-title":"Proceedings of the 2nd European Software Engineering Conference (ESEC '89), September 1989","author":"Lewis","year":"1989","unstructured":"Assay_a tool to support regression testing. In Proceedings of the 2nd European Software Engineering Conference (ESEC '89), September 1989, Springer-Verlag, 1989; 487-496."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB28","doi-asserted-by":"crossref","first-page":"270","DOI":"10.1145\/152388.152391","volume":"2","author":"Harrold","year":"1993","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB29","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/52.43047","volume":"16","author":"Hartmann","year":"1990","journal-title":"IEEE Software"},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB30","author":"Taha","unstructured":"An approach to software fault localization and revalidation based on incremental data flow analysis. In Proceedings of the 13th Annual International Computer Software and Applications Conference September 1989; 527-534."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB31","first-page":"41","volume-title":"17th International Conference on Software Engineering","author":"Wong","year":"1995","unstructured":"Effect of test set minimization on fault detection effectiveness. In 17th International Conference on Software Engineering April 1995, Seattle, WA, IEEE Computer Society Press, Los Alamitos, CA, April 1995; 41-50."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB32","first-page":"41","volume-title":"Proceedings of the Conference on Software Maintenance_1992","author":"Binkley","year":"1992","unstructured":"Using semantic differencing to reduce the cost of regression testing. In Proceedings of the Conference on Software Maintenance_1992, IEEE Computer Society Press, Los Alamitos, CA, November 1992; 41-50."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB33","first-page":"60","volume-title":"Proceedings of the Conference on Software Maintenance_1989","author":"Leung","year":"1989","unstructured":"Insights into regression testing. In Proceedings of the Conference on Software Maintenance_1989 October 1989, IEEE Computer Society Press, Los Alamitos, CA, 60-69."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB34","author":"Fischer","year":"1981","unstructured":"A methodology for retesting modified software. In Proceedings of the National Telecommunications Conference B-6-3, November 1981; 1-6."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB35","author":"Gupta","year":"1992","unstructured":"An approach to regression testing using slicing. In Proceedings of the Conference on Software Maintenance_1992 November 1992; 299-308."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB36","author":"Rothermel","year":"1993","unstructured":"A safe, efficient algorithm for regression test selection. In Proceedings of the Conference on Software Maintenance_1993 September 1993; 358-367."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB37","first-page":"169","volume-title":"Proceedings of the 1994 International Symposium on Software Testing and Analysis (ISSTA 94) August 1994","author":"Rothermel","year":"1994","unstructured":"Selecting tests and identifying test coverage requirements for modified software. In Proceedings of the 1994 International Symposium on Software Testing and Analysis (ISSTA 94) August 1994, Seattle, WA, ACM Press, NY, 1994; 169-184."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB38","author":"Sherlund","year":"1995","unstructured":"Logical modification oriented software testing. In Proceedings of the Twelfth International Conference on Testing Computer Software June 1995; Frontier Technologies."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB39","first-page":"26","volume-title":"Proceedings of the Conference on Software Maintenance_1994","author":"von","year":"1994","unstructured":"Domain based regression testing. In Proceedings of the Conference on Software Maintenance_1994 September 1994, IEEE Computer Society Press, Los Alamitos, CA, 1994; 26-35."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB40","author":"Yau","year":"1987","unstructured":"A method for revalidating modified programs in the maintenance phase. In Proceedings of COMPSAC '87: The Eleventh Annual International Computer Software and Applications Conference October 1987; 272-277."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB41","doi-asserted-by":"crossref","first-page":"529","DOI":"10.1109\/32.536955","volume":"22","author":"Rothermel","year":"1996","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB42","author":"Leung","year":"1991","unstructured":"A cost model to compare regression test strategies. In Proceedings of the Conference on Software Maintenance_1991 October 1991; 201-208."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB43","first-page":"13","volume":"2","author":"Perry","year":"1990","journal-title":"Journal of Object-Oriented Programming"},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB44","author":"Rothermel","year":"1996","unstructured":"Efficient, effective regression testing using safe test selection techniques. Technical Report 96-101, Clemson University, SC, January 1996."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB45","author":"Harrold","year":"1996","unstructured":"A coherent family of analyzable graph representations for object-oriented software. Technical Report OSU-CISRC-11\/96-TR60, The Ohio State University, November 1996."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB46","author":"Harrold","year":"1994","unstructured":"Performing dataflow testing on classes. In Second ACM SIGSOFT Symposium on the Foundations of Software Engineering, December 1994; 154-163."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB47","first-page":"495","volume-title":"18th International Conference on Software Engineering","author":"Larsen","year":"1996","unstructured":"Slicing object-oriented software. In 18th International Conference on Software Engineering, Berlin, Germany, March 1996, IEEE Computer Society Press, Los Alamitos, CA, 1996; 495-505."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB48","author":"Liang","year":"1998","unstructured":"Slicing objects using system dependence graphs. In Proceedings of the 1998 International Conference on Software Maintenance November 1998; 358-367."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB49","author":"Emami","year":"1994","unstructured":"Context-sensitive interprocedural points-to analysis in the presence of function pointers. Proceedings of the ACM SIGPLAN'94 Conference on Programming Language Design and Implementation June 1994; 242-256."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB50","author":"Pande","year":"1996","unstructured":"Compile time analysis of C and C++ systems. PhD dissertation, Rutgers University, New Brunswick, NJ, May 1996."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB51","author":"Pande","year":"1995","unstructured":"Static type determination in C++. Technical Report LCSR-TR-250, Rutgers University, July 1995."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB52","doi-asserted-by":"crossref","first-page":"433","DOI":"10.1145\/253228.253371","volume-title":"Proceedings of the 19th International Conference on Software Engineering","author":"Tonella","year":"1997","unstructured":"Flow insensitive C++ pointers and polymorphism analysis and its application to slicing. In Proceedings of the 19th International Conference on Software Engineering May 1997; Boston, MA; 433-442."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB53","doi-asserted-by":"crossref","first-page":"208","DOI":"10.1109\/TSE.1976.233816","volume":"2","author":"Howden","year":"1976","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB54","author":"Rogue Wave Software","unstructured":"Rogue Wave Software. Tools.h++ Introduction and Reference Manual, Version 6, Corvallis, OR, January 1996."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB55","doi-asserted-by":"crossref","first-page":"401","DOI":"10.1109\/32.689399","volume":"24","author":"Rothermel","year":"1998","journal-title":"IEEE Transactions on Software Engineering"},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB56","first-page":"69","volume":"40","author":"Fiedler","year":"1989","journal-title":"Hewlett-Packard Journal"},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB57","author":"Cheatham","year":"1990","unstructured":"Testing object-oriented software systems. In Proceedings of the 1990 Computer Science Conference 1990; 161-165."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB58","doi-asserted-by":"crossref","first-page":"319","DOI":"10.1145\/24039.24041","volume":"9","author":"Ferrante","year":"1987","journal-title":"ACM Transactions on Programming Languages and Systems"},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB59","doi-asserted-by":"crossref","first-page":"209","DOI":"10.1002\/smr.4360020403","volume":"2","author":"Leung","year":"1990","journal-title":"Journal of Software Maintenance: Research and Practice"},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB60","author":"White","year":"1997","unstructured":"A firewall approach for the regression testing of object-oriented software. In Conference Proceedings: Quality Week 1997, May 1997."},{"key":"10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E-BIB61","author":"Rosenblum","year":"1997","unstructured":"An empirical comparison of regression test selection techniques. In Proceedings of the International Workshop for Empirical Studies of Software Maintenance October 1997; 89-94."}],"container-title":["Software Testing, Verification and Reliability"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/api.wiley.com\/onlinelibrary\/tdm\/v1\/articles\/10.1002%2F1099-1689(200006)10:2%3C77::AID-STVR197%3E3.0.CO;2-E","content-type":"unspecified","content-version":"vor","intended-application":"text-mining"},{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/full\/10.1002\/1099-1689(200006)10:2%3C77::AID-STVR197%3E3.0.CO;2-E","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,7,1]],"date-time":"2021-07-01T06:24:49Z","timestamp":1625120689000},"score":1,"resource":{"primary":{"URL":"https:\/\/onlinelibrary.wiley.com\/doi\/10.1002\/1099-1689(200006)10:2<77::AID-STVR197>3.0.CO;2-E"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2000]]},"references-count":61,"journal-issue":{"issue":"2","published-print":{"date-parts":[[2000,6]]}},"URL":"https:\/\/doi.org\/10.1002\/1099-1689(200006)10:2<77::aid-stvr197>3.0.co;2-e","relation":{},"ISSN":["0960-0833","1099-1689"],"issn-type":[{"value":"0960-0833","type":"print"},{"value":"1099-1689","type":"electronic"}],"subject":[],"published":{"date-parts":[[2000]]}}}