{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2024,9,11]],"date-time":"2024-09-11T05:59:10Z","timestamp":1726034350455},"publisher-location":"Cham","reference-count":23,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030243043"},{"type":"electronic","value":"9783030243050"}],"license":[{"start":{"date-parts":[[2019,1,1]],"date-time":"2019-01-01T00:00:00Z","timestamp":1546300800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2019]]},"DOI":"10.1007\/978-3-030-24305-0_29","type":"book-chapter","created":{"date-parts":[[2019,6,28]],"date-time":"2019-06-28T08:02:51Z","timestamp":1561708971000},"page":"388-402","update-policy":"http:\/\/dx.doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":0,"title":["Comparison of Test Groups Based on Behavior and Package Hierarchy"],"prefix":"10.1007","author":[{"given":"B\u00e9la","family":"Vancsics","sequence":"first","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2019,6,29]]},"reference":[{"key":"29_CR1","doi-asserted-by":"crossref","unstructured":"Balogh, G., Gergely, T., Besz\u00e9des, A., Gyim\u00f3thy, T.: Are my unit tests in the right package? In: 2016 IEEE 16th International Working Conference on Source Code Analysis and Manipulation (SCAM), pp. 137\u2013146. IEEE (2016)","DOI":"10.1109\/SCAM.2016.10"},{"issue":"2","key":"29_CR2","doi-asserted-by":"publisher","first-page":"465","DOI":"10.11591\/ijeecs.v4.i2.pp465-472","volume":"4","author":"S Barman","year":"2016","unstructured":"Barman, S., Gope, H.L., Islam, M.M., Hasan, M.M., Salma, U.: Clustering techniques for software engineering. Indonesian J. Electr. Eng. Comput. Sci. 4(2), 465\u2013472 (2016)","journal-title":"Indonesian J. Electr. Eng. Comput. Sci."},{"key":"29_CR3","doi-asserted-by":"publisher","DOI":"10.1007\/3-540-28349-8_2","volume-title":"Grouping Multidimensional Data","author":"P Berkhin","year":"2006","unstructured":"Berkhin, P.: A survey of clustering data mining techniques. In: Kogan, J., Nicholas, C., Teboulle, M. (eds.) Grouping Multidimensional Data. Springer, Heidelberg (2006). https:\/\/doi.org\/10.1007\/3-540-28349-8_2"},{"issue":"5","key":"29_CR4","doi-asserted-by":"publisher","first-page":"603","DOI":"10.1109\/34.1000236","volume":"24","author":"D Comaniciu","year":"2002","unstructured":"Comaniciu, D., Meer, P.: Mean shift: a robust approach toward feature space analysis. IEEE Trans. Pattern Anal. Mach. Intell. 24(5), 603\u2013619 (2002)","journal-title":"IEEE Trans. Pattern Anal. Mach. Intell."},{"key":"29_CR5","unstructured":"Ester, M., Kriegel, H.P., Sander, J., Xu, X., et al.: A density-based algorithm for discovering clusters in large spatial databases with noise. In: KDD, vol. 96, 226\u2013231 (1996)"},{"issue":"5814","key":"29_CR6","doi-asserted-by":"publisher","first-page":"972","DOI":"10.1126\/science.1136800","volume":"315","author":"BJ Frey","year":"2007","unstructured":"Frey, B.J., Dueck, D.: Clustering by passing messages between data points. Science 315(5814), 972\u2013976 (2007)","journal-title":"Science"},{"key":"29_CR7","doi-asserted-by":"publisher","DOI":"10.1137\/1.9780898718348","volume-title":"Data Clustering: Theory, Algorithms, and Applications","author":"G Gan","year":"2007","unstructured":"Gan, G., Ma, C., Wu, J.: Data Clustering: Theory, Algorithms, and Applications. Society for Industrial and Applied Mathematics, Philadelphia (2007)"},{"key":"29_CR8","unstructured":"Horv\u00e1th, F., et al.: Test suite evaluation using code coverage based metrics. In: Proceedings of the 14th Symposium on Programming Languages and Software Tools (SPLST2015), pp. 46\u201360, October 2015"},{"key":"29_CR9","doi-asserted-by":"crossref","unstructured":"Kicsi, A., Vid\u00e1cs, L., Besz\u00e9des, A., Kocsis, F., Kov\u00e1cs, I.: Information retrieval based feature analysis for product line adoption in 4gl systems. In: Proceedings of the 17th International Conference on Computational Science and Its Applications - ICCSA 2017, pp. 1\u20136. IEEE (2017)","DOI":"10.1109\/ICCSA.2017.7999651"},{"key":"29_CR10","unstructured":"Kleinberg, J.: An impossibility theorem for clustering. In: NIPS, vol. 15, pp. 463\u2013470 (2002)"},{"key":"29_CR11","doi-asserted-by":"publisher","first-page":"44","DOI":"10.1016\/j.bdr.2017.09.002","volume":"11","author":"B Lorbeer","year":"2017","unstructured":"Lorbeer, B., Kosareva, A., Deva, B., Softi\u0107, D., Ruppel, P., K\u00fcpper, A.: Variations on the clustering algorithm Birch. Big Data Res. 11, 44\u201353 (2017)","journal-title":"Big Data Res."},{"issue":"2","key":"29_CR12","doi-asserted-by":"publisher","first-page":"227","DOI":"10.1016\/S0164-1212(03)00234-6","volume":"73","author":"CH Lung","year":"2004","unstructured":"Lung, C.H., Zaman, M., Nandi, A.: Applications of clustering techniques to software partitioning, recovery and restructuring. J. Syst. Softw. 73(2), 227\u2013244 (2004)","journal-title":"J. Syst. Softw."},{"key":"29_CR13","unstructured":"Maletic, J.I., Marcus, A.: Supporting program comprehension using semantic and structural information. In: Proceedings of the 23rd International Conference on Software Engineering, pp. 103\u2013112. IEEE Computer Society (2001)"},{"key":"29_CR14","unstructured":"Mitchell, B.: Clustering software systems to identify subsystem structures. Department of Mathematics & Computer Science Drexel University, Philadelphia (2006)"},{"key":"29_CR15","unstructured":"Rosenberg, A., Hirschberg, J.: V-measure: A conditional entropy-based external cluster evaluation measure. In: Proceedings of the 2007 Joint Conference on Empirical Methods in Natural Language Processing and Computational Natural Language Learning (EMNLP-CoNLL) (2007)"},{"key":"29_CR16","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1155\/2012\/792024","volume":"2012","author":"M Shtern","year":"2012","unstructured":"Shtern, M., Tzerpos, V.: Clustering methodologies for software engineering. Adv. Softw. Eng. 2012, 1 (2012)","journal-title":"Adv. Softw. Eng."},{"key":"29_CR17","first-page":"583","volume":"3","author":"A Strehl","year":"2002","unstructured":"Strehl, A., Ghosh, J.: Cluster ensembles-a knowledge reuse framework for combining multiple partitions. J. Mach. Learn. Res. 3, 583\u2013617 (2002)","journal-title":"J. Mach. Learn. Res."},{"key":"29_CR18","doi-asserted-by":"crossref","unstructured":"Tabacznyj, C.: Abstract clustering for program comprehension. In: Proceedings of the 4th Irish conference on Formal Methods, pp. 93\u2013108. British Computer Society (2000)","DOI":"10.14236\/ewic\/IWFM2000.7"},{"key":"29_CR19","doi-asserted-by":"crossref","unstructured":"Tengeri, D., Besz\u00e9des, A., Havas, D., Gyim\u00f3thy, T.: Toolset and program repository for code coverage-based test suite analysis and manipulation. In: 2014 IEEE 14th International Working Conference on Source Code Analysis and Manipulation (SCAM), pp. 47\u201352. IEEE (2014)","DOI":"10.1109\/SCAM.2014.38"},{"key":"29_CR20","doi-asserted-by":"crossref","unstructured":"Tengeri, D., Horv\u00e1th, F., Besz\u00e9des, \u00c1., Gergely, T., Gyim\u00f3thy, T.: Negative effects of bytecode instrumentation on Java source code coverage. In: Proceedings of the 23rd IEEE International Conference on Software Analysis, Evolution, and Reengineering (SANER 2016), pp. 225\u2013235, March 2016","DOI":"10.1109\/SANER.2016.61"},{"key":"29_CR21","doi-asserted-by":"crossref","unstructured":"Van Rompaey, B., Demeyer, S.: Exploring the composition of unit test suites. In: 2008 23rd IEEE\/ACM International Conference on Automated Software Engineering-Workshops, ASE Workshops, pp. 11\u201320. IEEE (2008)","DOI":"10.1109\/ASEW.2008.4686316"},{"key":"29_CR22","first-page":"2837","volume":"11","author":"NX Vinh","year":"2010","unstructured":"Vinh, N.X., Epps, J., Bailey, J.: Information theoretic measures for clusterings comparison: Variants, properties, normalization and correction for chance. J. Mach. Learn. Res. 11, 2837\u20132854 (2010)","journal-title":"J. Mach. Learn. Res."},{"key":"29_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, T., Ramakrishnan, R., Livny, M.: Birch: an efficient data clustering method for very large databases. In: ACM Sigmod Record, vol. 25, pp. 103\u2013114. ACM (1996)","DOI":"10.1145\/235968.233324"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2019"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-24305-0_29","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,12,1]],"date-time":"2019-12-01T05:53:19Z","timestamp":1575179599000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-24305-0_29"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2019]]},"ISBN":["9783030243043","9783030243050"],"references-count":23,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-24305-0_29","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2019]]},"assertion":[{"value":"29 June 2019","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Saint Petersburg","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Russia","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2019","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"1 July 2019","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 July 2019","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"19","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2019","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/www.iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}