{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,9,9]],"date-time":"2025-09-09T21:11:16Z","timestamp":1757452276833,"version":"3.40.3"},"publisher-location":"Cham","reference-count":25,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030587925"},{"type":"electronic","value":"9783030587932"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-58793-2_35","type":"book-chapter","created":{"date-parts":[[2020,8,30]],"date-time":"2020-08-30T23:04:02Z","timestamp":1598828642000},"page":"439-448","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Dataset of Regressions in Web Applications Detected by End-to-End Tests"],"prefix":"10.1007","author":[{"given":"\u00d3scar","family":"Soto-S\u00e1nchez","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Michel","family":"Maes-Bermejo","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Micael","family":"Gallego","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]},{"given":"Francisco","family":"Gort\u00e1zar","sequence":"additional","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,8,31]]},"reference":[{"key":"35_CR1","doi-asserted-by":"crossref","unstructured":"Bertolino, A., Calabr\u00f3, A., De Angelis, G., Gallego, M., Garc\u00eda, B., Gort\u00e1zar, F.: When the testing gets tough, the tough get ElasTest. In: Proceedings of the 40th International Conference on Software Engineering: Companion Proceeedings, pp. 17\u201320. ACM (2018)","DOI":"10.1145\/3183440.3183497"},{"issue":"3","key":"35_CR2","doi-asserted-by":"publisher","first-page":"445","DOI":"10.1007\/s11219-012-9181-z","volume":"21","author":"C Catal","year":"2013","unstructured":"Catal, C., Mishra, D.: Test case prioritization: a systematic mapping study. Softw. Qual. J. 21(3), 445\u2013478 (2013)","journal-title":"Softw. Qual. J."},{"key":"35_CR3","doi-asserted-by":"publisher","unstructured":"Dallmeier, V., Zimmermann, T.: Extraction of bug localization benchmarks from history. In: Proceedings of the Twenty-second IEEE\/ACM International Conference on Automated Software Engineering ASE 2007, pp. 433\u2013436. ACM, New York (2007). https:\/\/doi.org\/10.1145\/1321631.1321702. http:\/\/doi.acm.org\/10.1145\/1321631.1321702","DOI":"10.1145\/1321631.1321702"},{"key":"35_CR4","doi-asserted-by":"publisher","unstructured":"Dao, T., Zhang, L., Meng, N.: How does execution information help with information-retrieval based bug localization? In: 2017 IEEE\/ACM 25th International Conference on Program Comprehension (ICPC), pp. 241\u2013250, May 2017. https:\/\/doi.org\/10.1109\/ICPC.2017.29","DOI":"10.1109\/ICPC.2017.29"},{"key":"35_CR5","doi-asserted-by":"crossref","unstructured":"DeMarco, F., Xuan, J., Le Berre, D., Monperrus, M.: Automatic repair of buggy if conditions and missing preconditions with SMT. In: Proceedings of the 6th International Workshop on Constraints in Software Testing, Verification, and Analysis, pp. 30\u201339. ACM (2014)","DOI":"10.1145\/2593735.2593740"},{"issue":"4","key":"35_CR6","doi-asserted-by":"publisher","first-page":"405","DOI":"10.1007\/s10664-005-3861-2","volume":"10","author":"H Do","year":"2005","unstructured":"Do, H., Elbaum, S., Rothermel, G.: Supporting controlled experimentation with testing techniques: an infrastructure and its potential impact. Empirical Softw. Eng. 10(4), 405\u2013435 (2005)","journal-title":"Empirical Softw. Eng."},{"key":"35_CR7","doi-asserted-by":"crossref","unstructured":"Durieux, T., Martinez, M., Monperrus, M., Sommerard, R., Xuan, J.: Automatic repair of real bugs: an experience report on the defects4J dataset (2015)","DOI":"10.1007\/s10664-016-9470-4"},{"key":"35_CR8","unstructured":"Gort\u00e1zar, F., et al.: The elastest platform: supporting automation of end-to-end testing of large complex applications (2018)"},{"key":"35_CR9","doi-asserted-by":"crossref","unstructured":"Gortaz\u00e1r, F., Gallego, M., Garc\u00eda, B., Carella, G.A., Pauls, M., Gheorghe-Pop, I.D.: Elastest-an open source project for testing distributed applications with failure injection. In: 2017 IEEE Conference on Network Function Virtualization and Software Defined Networks (NFV-SDN), pp. 1\u20132. IEEE (2017)","DOI":"10.1109\/NFV-SDN.2017.8169851"},{"key":"35_CR10","doi-asserted-by":"crossref","unstructured":"Gyimesi, P., et al.: BugsJS: a benchmark of Javascript bugs. In: Proceedings of 12th IEEE International Conference on Software Testing, Verification and Validation (ICST) (2019)","DOI":"10.1109\/ICST.2019.00019"},{"issue":"5","key":"35_CR11","doi-asserted-by":"publisher","first-page":"769","DOI":"10.1007\/s11704-016-6112-3","volume":"10","author":"D Hao","year":"2016","unstructured":"Hao, D., Zhang, L., Mei, H.: Test-case prioritization: achievements and challenges. Front. Comput. Sci. 10(5), 769\u2013777 (2016). https:\/\/doi.org\/10.1007\/s11704-016-6112-3","journal-title":"Front. Comput. Sci."},{"key":"35_CR12","unstructured":"Hutchins, M., Foster, H., Goradia, T., Ostrand, T.: Experiments on the effectiveness of dataflow-and control-flow-based test adequacy criteria. In: Proceedings of 16th International Conference on Software Engineering, pp. 191\u2013200. IEEE (1994)"},{"key":"35_CR13","doi-asserted-by":"publisher","unstructured":"Just, R., Jalali, D., Ernst, M.D.: Defects4J: a database of existing faults to enable controlled testing studies for Java programs. In: Proceedings of the 2014 International Symposium on Software Testing and Analysis ISSTA 2014, pp. 437\u2013440. ACM, New York (2014). https:\/\/doi.org\/10.1145\/2610384.2628055. http:\/\/doi.acm.org\/10.1145\/2610384.2628055","DOI":"10.1145\/2610384.2628055"},{"issue":"1","key":"35_CR14","doi-asserted-by":"publisher","first-page":"54","DOI":"10.1109\/TSE.2011.104","volume":"38","author":"C Le Goues","year":"2012","unstructured":"Le Goues, C., Nguyen, T., Forrest, S., Weimer, W.: GenProg: a generic method for automatic software repair. IEEE Trans. Softw. Eng. 38(1), 54\u201372 (2012)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"35_CR15","doi-asserted-by":"publisher","unstructured":"Memon, A., et al.: Taming google-scale continuous testing. In: Proceedings of the 39th International Conference on Software Engineering: Software Engineering in Practice TrackICSE-SEIP 2017, pp. 233\u2013242. IEEE Press, Piscataway (2017). https:\/\/doi.org\/10.1109\/ICSE-SEIP.2017.16","DOI":"10.1109\/ICSE-SEIP.2017.16"},{"issue":"1\u20134","key":"35_CR16","doi-asserted-by":"publisher","first-page":"251","DOI":"10.1007\/BF01840446","volume":"1","author":"EW Myers","year":"1986","unstructured":"Myers, E.W.: Ano (ND) difference algorithm and its variations. Algorithmica 1(1\u20134), 251\u2013266 (1986)","journal-title":"Algorithmica"},{"key":"35_CR17","doi-asserted-by":"publisher","unstructured":"Neelofar, Javed, M.Y., Mohsin, H.: An automated approach for software bug classification. In: 2012 Sixth International Conference on Complex, Intelligent, and Software Intensive Systems, pp. 414\u2013419, July 2012. https:\/\/doi.org\/10.1109\/CISIS.2012.132","DOI":"10.1109\/CISIS.2012.132"},{"key":"35_CR18","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"218","DOI":"10.1007\/978-3-540-77966-7_18","volume-title":"Hardware and Software: Verification and Testing","author":"D Nir","year":"2008","unstructured":"Nir, D., Tyszberowicz, S., Yehudai, A.: Locating regression bugs. In: Yorav, K. (ed.) HVC 2007. LNCS, vol. 4899, pp. 218\u2013234. Springer, Heidelberg (2008). https:\/\/doi.org\/10.1007\/978-3-540-77966-7_18"},{"key":"35_CR19","doi-asserted-by":"publisher","unstructured":"Pingclasai, N., Hata, H., Matsumoto, K.: Classifying bug reports to bugs and other requests using topic modeling. In: 2013 20th Asia-Pacific Software Engineering Conference (APSEC), vol. 2, pp. 13\u201318, December 2013. https:\/\/doi.org\/10.1109\/APSEC.2013.105","DOI":"10.1109\/APSEC.2013.105"},{"key":"35_CR20","doi-asserted-by":"crossref","unstructured":"Qi, Z., Long, F., Achour, S., Rinard, M.: An analysis of patch plausibility and correctness for generate-and-validate patch generation systems. In: Proceedings of the 2015 International Symposium on Software Testing and Analysis, pp. 24\u201336. ACM (2015)","DOI":"10.1145\/2771783.2771791"},{"key":"35_CR21","doi-asserted-by":"crossref","unstructured":"Saha, R., Lyu, Y., Lam, W., Yoshida, H., Prasad, M.: Bugs. jar: a large-scale, diverse dataset of real-world java bugs. In: 2018 IEEE\/ACM 15th International Conference on Mining Software Repositories (MSR), pp. 10\u201313. IEEE (2018)","DOI":"10.1145\/3196398.3196473"},{"key":"35_CR22","doi-asserted-by":"crossref","unstructured":"Spacco, J., Strecker, J., Hovemeyer, D., Pugh, W.: Software repository mining with marmoset: an automated programming project snapshot and testing system. In: ACM SIGSOFT Software Engineering Notes, vol. 30, pp. 1\u20135. ACM (2005)","DOI":"10.1145\/1082983.1083149"},{"key":"35_CR23","unstructured":"Xuan, J., et al.: Nopol: Automatic repair of conditional statement bugs in large-scale object-oriented programs. IEEE Trans. Softw. Eng. (2015, Underreview)"},{"issue":"2","key":"35_CR24","doi-asserted-by":"publisher","first-page":"67","DOI":"10.1002\/stv.430","volume":"22","author":"S Yoo","year":"2012","unstructured":"Yoo, S., Harman, M.: Regression testing minimization, selection and prioritization: a survey. Softw. Testing Verification Reliabil. 22(2), 67\u2013120 (2012)","journal-title":"Softw. Testing Verification Reliabil."},{"key":"35_CR25","doi-asserted-by":"publisher","unstructured":"Zhou, J., Zhang, H., Lo, D.: Where should the bugs be fixed? more accurate information retrieval-based bug localization based on bug reports. In: 2012 34th International Conference on Software Engineering (ICSE), pp. 14\u201324, June 2012. https:\/\/doi.org\/10.1109\/ICSE.2012.6227210","DOI":"10.1109\/ICSE.2012.6227210"}],"container-title":["Communications in Computer and Information Science","Quality of Information and Communications Technology"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-58793-2_35","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,4,24]],"date-time":"2021-04-24T00:33:51Z","timestamp":1619224431000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-58793-2_35"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030587925","9783030587932"],"references-count":25,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-58793-2_35","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"31 August 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"QUATIC","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on the Quality of Information and Communications Technology","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Faro","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Portugal","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"9 September 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"11 September 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"quatic2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/2020.quatic.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"EasyChair","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"81","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"27","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"12","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"33% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"No","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"The conference was held virtually due to the COVID-19 pandemic.","order":10,"name":"additional_info_on_review_process","label":"Additional Info on Review Process","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}