{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,25]],"date-time":"2025-03-25T19:12:30Z","timestamp":1742929950256,"version":"3.40.3"},"publisher-location":"Cham","reference-count":37,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030630065"},{"type":"electronic","value":"9783030630072"}],"license":[{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"tdm","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2020,1,1]],"date-time":"2020-01-01T00:00:00Z","timestamp":1577836800000},"content-version":"vor","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2020]]},"DOI":"10.1007\/978-3-030-63007-2_16","type":"book-chapter","created":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T00:02:39Z","timestamp":1606089759000},"page":"205-216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":1,"title":["Increasing Mutation Testing Effectiveness by Combining Lower Order Mutants to Construct Higher Order Mutants"],"prefix":"10.1007","author":[{"given":"Quang-Vu","family":"Nguyen","sequence":"first","affiliation":[],"role":[{"role":"author","vocabulary":"crossref"}]}],"member":"297","published-online":{"date-parts":[[2020,11,23]]},"reference":[{"issue":"4","key":"16_CR1","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/TSE.1977.231145","volume":"3","author":"RG Hamlet","year":"1977","unstructured":"Hamlet, R.G.: Testing programs with the aid of a compiler. IEEE Trans. Softw. Eng. (SE) 3(4), 279\u2013290 (1977)","journal-title":"IEEE Trans. Softw. Eng. (SE)"},{"issue":"4","key":"16_CR2","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/C-M.1978.218136","volume":"11","author":"RA DeMillo","year":"1978","unstructured":"DeMillo, R.A., Lipton, R.J., Sayward, F.G.: Hints on test data selection: help for the practicing programmer. IEEE Comput. 11(4), 34\u201341 (1978)","journal-title":"IEEE Comput."},{"key":"16_CR3","doi-asserted-by":"publisher","first-page":"1379","DOI":"10.1016\/j.infsof.2009.04.016","volume":"51","author":"Y Jia","year":"2009","unstructured":"Jia, Y., Harman, M.: Higher order mutation testing. Inform. Softw. Technol. 51, 1379\u20131393 (2009)","journal-title":"Inform. Softw. Technol."},{"key":"16_CR4","doi-asserted-by":"crossref","unstructured":"Harman, M., Jia, Y., Langdon, W.B.: A manifesto for higher order mutation testing. In: Third International Conference on Software Testing, Verification, and Validation Workshops (2010)","DOI":"10.1109\/ICSTW.2010.13"},{"issue":"5","key":"16_CR5","doi-asserted-by":"publisher","first-page":"649","DOI":"10.1109\/TSE.2010.62","volume":"37","author":"Y Jia","year":"2011","unstructured":"Jia, Y., Harman, M.: An analysis and survey of the development of mutation testing. IEEE Trans. Softw. Eng. 37(5), 649\u2013678 (2011)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"16_CR6","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"157","DOI":"10.1007\/978-3-319-06569-4_12","volume-title":"Advanced Computational Methods for Knowledge Engineering","author":"QV Nguyen","year":"2014","unstructured":"Nguyen, Q.V., Madeyski, L.: Problems of mutation testing and higher order mutation testing. In: van Do, T., Thi, H.A.L., Nguyen, N.T. (eds.) Advanced Computational Methods for Knowledge Engineering. AISC, vol. 282, pp. 157\u2013172. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-06569-4_12"},{"key":"16_CR7","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/125489.125473","volume":"1","author":"AJ Offutt","year":"1992","unstructured":"Offutt, A.J.: Investigations of the software testing coupling effect. ACM Trans. Softw. Eng. Methodol. 1, 5\u201320 (1992)","journal-title":"ACM Trans. Softw. Eng. Methodol."},{"issue":"2","key":"16_CR8","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1002\/stvr.392","volume":"19","author":"M Polo","year":"2008","unstructured":"Polo, M., Piattini, M., Garcia-Rodriguez, I.: Decreasing the cost of mutation testing with second-order mutants. Softw. Test. Verification Reliab. 19(2), 111\u2013131 (2008)","journal-title":"Softw. Test. Verification Reliab."},{"key":"16_CR9","doi-asserted-by":"crossref","unstructured":"Kintis, M., Papadakis, M., Malevris, N.: Evaluating mutation testing alternatives: a collateral experiment. In: Proceedings 17th Asia Pacifc Software Engineering. Conference (APSEC) (2010)","DOI":"10.1109\/APSEC.2010.42"},{"key":"16_CR10","doi-asserted-by":"crossref","unstructured":"Papadakis, M., Malevris, N.: An empirical evaluation of the first and second order mutation testing strategies. In: Proceedings of the 2010 Third International Conference on Software Testing, Verification, and Validation Workshops, ser. ICSTW\u201910, Computer Society, pp. 90\u201399. IEEE (2010)","DOI":"10.1109\/ICSTW.2010.50"},{"issue":"1","key":"16_CR11","doi-asserted-by":"publisher","first-page":"23","DOI":"10.1109\/TSE.2013.44","volume":"40","author":"L Madeyski","year":"2014","unstructured":"Madeyski, L., Orzeszyna, W., Torkar, R., J\u00f3zala, M.: Overcoming the equivalent mutant problem: a systematic literature review and a comparative experiment of second order mutation. IEEE Trans. Softw. Eng. 40(1), 23\u201342 (2014)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"16_CR12","doi-asserted-by":"crossref","unstructured":"Omar, E., Ghosh, S.: An exploratory study of higher order mutation testing in aspect-oriented programming. In: IEEE 23rd International Symposium on Software Reliability Engineering (2012)","DOI":"10.1109\/ISSRE.2012.6"},{"key":"16_CR13","doi-asserted-by":"crossref","unstructured":"Jia, Y., Harman, M.: Constructing subtle faults using higher order mutation testing. In: Proceedings Eighth Int\u2019l Working Conference Source Code Analysis and Manipulation (2008)","DOI":"10.1109\/SCAM.2008.36"},{"key":"16_CR14","doi-asserted-by":"crossref","unstructured":"Omar, E., Ghosh, S., Whitley, D.: Constructing subtle higher order mutants for java and aspectJ programs. In: International Symposium on Software Reliability Engineering, pp. 340\u2013349 (2013)","DOI":"10.1109\/ISSRE.2013.6698887"},{"key":"16_CR15","doi-asserted-by":"crossref","unstructured":"Omar, E., Ghosh, S., Whitley, D.: Comparing search techniques for fnding subtle higher order mutants. In: Proceedings of the 2014 Annual Conference on Genetic and Evolutionary Computation, pp. 1271\u20131278 (2014)","DOI":"10.1145\/2576768.2598286"},{"key":"16_CR16","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"164","DOI":"10.1007\/978-3-642-17578-7_17","volume-title":"Advances in Software Engineering","author":"F Belli","year":"2010","unstructured":"Belli, F., G\u00fcler, N., Hollmann, A., Suna, G., Y\u0131ld\u0131z, E.: Model-based higher-order mutation analysis. In: Kim, T., Kim, H.K., Khan, M.K., Kiumi, A., Fang, W., \u015al\u0119zak, D. (eds.) ASEA 2010. CCIS, vol. 117, pp. 164\u2013173. Springer, Heidelberg (2010). https:\/\/doi.org\/10.1007\/978-3-642-17578-7_17"},{"issue":"3","key":"16_CR17","first-page":"13","volume":"2","author":"AO Akinde","year":"2012","unstructured":"Akinde, A.O.: Using higher order mutation for reducing equivalent mutants in mutation testing. Asian J. Comput. Sci. Inform. Technol. 2(3), 13\u201318 (2012)","journal-title":"Asian J. Comput. Sci. Inform. Technol."},{"key":"16_CR18","doi-asserted-by":"crossref","unstructured":"Langdon, W.B., Harman, M., Jia, Y.: Multi-objective higher order mutation testing with genetic programming. In: Proceedings Fourth Testing: Academic and Industrial Conference Practice and Research (2009)","DOI":"10.1109\/TAICPART.2009.18"},{"issue":"12","key":"16_CR19","doi-asserted-by":"publisher","first-page":"2416","DOI":"10.1016\/j.jss.2010.07.027","volume":"83","author":"WB Langdon","year":"2010","unstructured":"Langdon, W.B., Harman, M., Jia, Y.: Efficient multi-objective higher order mutation testing with genetic programming. J. Syst. Softw. 83(12), 2416\u20132430 (2010)","journal-title":"J. Syst. Softw."},{"key":"16_CR20","series-title":"Advances in Intelligent Systems and Computing","doi-asserted-by":"publisher","first-page":"391","DOI":"10.1007\/978-3-319-17996-4_35","volume-title":"Advanced Computational Methods for Knowledge Engineering","author":"QV Nguyen","year":"2015","unstructured":"Nguyen, Q.V., Madeyski, L.: Searching for strongly subsuming higher order mutants by applying multi-objective optimization algorithm. In: Le Thi, H.A., Nguyen, N.T., Do, T.V. (eds.) Advanced Computational Methods for Knowledge Engineering. AISC, vol. 358, pp. 391\u2013402. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-17996-4_35"},{"issue":"1-2","key":"16_CR21","doi-asserted-by":"publisher","first-page":"48","DOI":"10.1080\/01969722.2016.1128763","volume":"47","author":"QV Nguyen","year":"2016","unstructured":"Nguyen, Q.V., Madeyski, L.: Empirical evaluation of multi-objective optimization algorithms searching for higher order mutants. Cybern. Syst. Int. J. 47(1-2), 48\u201368 (2016)","journal-title":"Cybern. Syst. Int. J."},{"key":"16_CR22","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"235","DOI":"10.1007\/978-3-662-49381-6_23","volume-title":"Intelligent Information and Database Systems","author":"QV Nguyen","year":"2016","unstructured":"Nguyen, Q.V., Madeyski, L.: Higher order mutation testing to drive development of new test cases: an empirical comparison of three strategies. In: Nguyen, N.T., Trawi\u0144ski, B., Fujita, H., Hong, T.P. (eds.) ACIIDS 2016. LNCS (LNAI), vol. 9621, pp. 235\u2013244. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49381-6_23"},{"key":"16_CR23","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"245","DOI":"10.1007\/978-3-662-49381-6_24","volume-title":"Intelligent Information and Database Systems","author":"QV Nguyen","year":"2016","unstructured":"Nguyen, Q.V., Madeyski, L.: On the relationship between the order of mutation testing and the properties of generated higher order mutants. In: Nguyen, N.T., Trawi\u0144ski, B., Fujita, H., Hong, T.P. (eds.) ACIIDS 2016. LNCS (LNAI), vol. 9621, pp. 245\u2013254. Springer, Heidelberg (2016). https:\/\/doi.org\/10.1007\/978-3-662-49381-6_24"},{"key":"16_CR24","doi-asserted-by":"publisher","first-page":"1173","DOI":"10.3233\/jifs-169117","volume":"32","author":"QV Nguyen","year":"2017","unstructured":"Nguyen, Q.V., Madeyski, L.: Addressing mutation testing problems by applying multi-objective optimization algorithms and higher order mutation. J. Intell. Fuzzy Syst. 32, 1173\u20131182 (2017). https:\/\/doi.org\/10.3233\/jifs-169117","journal-title":"J. Intell. Fuzzy Syst."},{"key":"16_CR25","series-title":"Lecture Notes in Computer Science (Lecture Notes in Artificial Intelligence)","doi-asserted-by":"publisher","first-page":"664","DOI":"10.1007\/978-3-319-75417-8_62","volume-title":"Intelligent Information and Database Systems","author":"QV Nguyen","year":"2018","unstructured":"Nguyen, Q.V., Pham, D.T.H.: Is higher order mutant harder to kill than first order mutant. An experimental study. In: Nguyen, N.T., Hoang, D.H., Hong, T.P., Pham, H., Trawi\u0144ski, B. (eds.) ACIIDS 2018. LNCS (LNAI), vol. 10751, pp. 664\u2013673. Springer, Cham (2018). https:\/\/doi.org\/10.1007\/978-3-319-75417-8_62"},{"key":"16_CR26","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-540-73460-4_20","volume-title":"Product-Focused Software Process Improvement","author":"L Madeyski","year":"2007","unstructured":"Madeyski, L.: On the effects of pair programming on thoroughness and fault-finding effectiveness of unit tests. In: M\u00fcnch, J., Abrahamsson, P. (eds.) PROFES 2007. LNCS, vol. 4589, pp. 207\u2013221. Springer, Heidelberg (2007). https:\/\/doi.org\/10.1007\/978-3-540-73460-4_20"},{"issue":"3","key":"16_CR27","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1002\/spip.382","volume":"13","author":"L Madeyski","year":"2008","unstructured":"Madeyski, L.: The impact of pair programming on thoroughness and fault detection effectiveness of unit tests suites. Softw. Process Improv. Pract. 13(3), 281\u2013295 (2008). https:\/\/doi.org\/10.1002\/spip.382","journal-title":"Softw. Process Improv. Pract."},{"issue":"2","key":"16_CR28","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.infsof.2009.08.007","volume":"52","author":"L Madeyski","year":"2010","unstructured":"Madeyski, L.: The impact of test-first programming on branch coverage and mutation score indicator of unit tests: an experiment. Inform. Softw. Technol. 52(2), 169\u2013184 (2010). https:\/\/doi.org\/10.1016\/j.infsof.2009.08.007","journal-title":"Inform. Softw. Technol."},{"issue":"1","key":"16_CR29","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1049\/iet-sen.2008.0038","volume":"4","author":"L Madeyski","year":"2010","unstructured":"Madeyski, L., Radyk, N.: Judy - a mutation testing tool for java. IET Softw. 4(1), 32\u201342 (2010). https:\/\/doi.org\/10.1049\/iet-sen.2008.0038","journal-title":"IET Softw."},{"key":"16_CR30","doi-asserted-by":"crossref","unstructured":"Zhu, Q., Panichella, A., Zaidman, A., An investigation of compression techniques to speed up mutation testing. In: 2018 IEEE 11th International Conference on Software Testing, Verification and Validation (ICST), Vasteras, pp. 274\u2013284 (2018)","DOI":"10.1109\/ICST.2018.00035"},{"key":"16_CR31","doi-asserted-by":"crossref","unstructured":"Jimenez, M., et al.: Are mutants really natural. A study on how naturalness helps mutant selection. In: The International Symposium on Empirical Software Engineering and Measurement (ESEM) (2018)","DOI":"10.1145\/3239235.3240500"},{"key":"16_CR32","doi-asserted-by":"crossref","unstructured":"Saber, T., Delavernhe, F., Papadakis, M., O\u2019Neill, M., Ventresque, A.: A hybrid algorithm for multi-objective test case selection. In: 2018 IEEE Congress on Evolutionary Computation (CEC), Rio de Janeiro, pp. 1\u20138 (2018)","DOI":"10.1109\/CEC.2018.8477875"},{"key":"16_CR33","unstructured":"Abuljadayel, A., Wedyan, F.: An investigation of compression techniques to speed up mutation testing. In: International Journal of Intelligent Systems and Applications, January 2018"},{"issue":"4","key":"16_CR34","doi-asserted-by":"publisher","first-page":"379","DOI":"10.2478\/fcds-2019-0019","volume":"44","author":"T Lewowski","year":"2019","unstructured":"Lewowski, T., Madeyski, L.: Mutants as patches: towards a formal approach to mutation testing. Found. Comput. Decis. Sci. 44(4), 379\u2013405 (2019)","journal-title":"Found. Comput. Decis. Sci."},{"key":"16_CR35","doi-asserted-by":"publisher","unstructured":"Zhang, J.M., Harman, M., Ma, L., Liu, Y.: Machine learning testing: survey, landscapes and horizons. In: IEEE Transactions on Software Engineering (2019). https:\/\/doi.org\/10.1109\/tse.2019.2962027","DOI":"10.1109\/tse.2019.2962027"},{"key":"16_CR36","doi-asserted-by":"publisher","unstructured":"Bokaei, N.N., Keyvanpour, M.R.: A comparative study of whole issues and challenges in mutation testing. In: 2019 5th Conference on Knowledge Based Engineering and Innovation (KBEI), Tehran, Iran, pp. 745\u2013754 (2019). https:\/\/doi.org\/10.1109\/kbei.2019.8735019","DOI":"10.1109\/kbei.2019.8735019"},{"key":"16_CR37","doi-asserted-by":"publisher","first-page":"158264","DOI":"10.1109\/access.2019.2950171","volume":"7","author":"MR Naeem","year":"2019","unstructured":"Naeem, M.R., Lin, T., Naeem, H., Ullah, F., Saeed, S.: Scalable mutation testing using predictive analysis of deep learning model. IEEE Access 7, 158264\u2013158283 (2019). https:\/\/doi.org\/10.1109\/access.2019.2950171","journal-title":"IEEE Access"}],"container-title":["Lecture Notes in Computer Science","Computational Collective Intelligence"],"original-title":[],"language":"en","link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-63007-2_16","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2020,11,23]],"date-time":"2020-11-23T00:10:49Z","timestamp":1606090249000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-030-63007-2_16"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2020]]},"ISBN":["9783030630065","9783030630072"],"references-count":37,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-63007-2_16","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2020]]},"assertion":[{"value":"23 November 2020","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCCI","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Collective Intelligence","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Da Nang","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vietnam","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2020","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"30 November 2020","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"3 December 2020","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"12","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccci2020","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccci.pwr.edu.pl\/2020\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}}]}}