{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:02:27Z","timestamp":1743091347135,"version":"3.40.3"},"publisher-location":"Cham","reference-count":36,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783030870065"},{"type":"electronic","value":"9783030870072"}],"license":[{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"},{"start":{"date-parts":[[2021,1,1]],"date-time":"2021-01-01T00:00:00Z","timestamp":1609459200000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2021]]},"DOI":"10.1007\/978-3-030-87007-2_15","type":"book-chapter","created":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T17:02:22Z","timestamp":1631293342000},"page":"201-216","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":2,"title":["A Novel Approach to Test Case Prioritization for Software Regression Tests"],"prefix":"10.1007","author":[{"given":"Tulin","family":"Boyar","sequence":"first","affiliation":[]},{"given":"Mert","family":"Oz","sequence":"additional","affiliation":[]},{"given":"Ekin","family":"Oncu","sequence":"additional","affiliation":[]},{"given":"Mehmet S.","family":"Aktas","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2021,9,11]]},"reference":[{"key":"15_CR1","unstructured":"Patel, K.M., et al.: A study of regression testing for trade me website. In: CS & IT Conference Proceedings. CS & IT Conference Proceedings (2021)"},{"key":"15_CR2","doi-asserted-by":"crossref","unstructured":"Rothermel, G., et al.: Test case prioritization: an empirical study. In: Proceedings IEEE International Conference on Software Maintenance-1999 (ICSM 1999). Software Maintenance for Business Change (Cat. No. 99CB36360), pp. 179\u2013188. IEEE (1999)","DOI":"10.1109\/ICSM.1999.792604"},{"issue":"2","key":"15_CR3","doi-asserted-by":"publisher","first-page":"159","DOI":"10.1109\/32.988497","volume":"28","author":"S Elbaum","year":"2002","unstructured":"Elbaum, S., Malishevsky, A.G., Rothermel, G.: Test case prioritization: a family of empirical studies. IEEE Trans. Softw. Eng. 28(2), 159\u2013182 (2002)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"15_CR4","unstructured":"Testinium Homepage. http:\/\/www.testinium.com. Accessed 17 May 2021"},{"key":"15_CR5","unstructured":"Kurt, D., S\u00f6zer, H.: Ge\u00e7mi\u015fe d\u00f6n\u00fck hata tespit oranlar\u0131n\u0131n zamanla de\u011fi\u015fen etkisine g\u00f6re regresyon testlerinin \u00f6nceliklendirilmesi. In: CEUR Workshop Proceedings. CEUR-WS (2014)"},{"key":"15_CR6","doi-asserted-by":"publisher","first-page":"152","DOI":"10.1016\/j.procs.2016.03.020","volume":"79","author":"A Ansari","year":"2016","unstructured":"Ansari, A., et al.: Optimized regression test using test case prioritization. Procedia Comput. Sci. 79, 152\u2013160 (2016)","journal-title":"Procedia Comput. Sci."},{"key":"15_CR7","doi-asserted-by":"crossref","unstructured":"Alazzam, I., Nahar, K.M.O.: Combined source code approach for test case prioritization. In: Proceedings of the 2018 International Conference on Information Science and System, pp. 12\u201315 (2018)","DOI":"10.1145\/3209914.3209936"},{"issue":"6","key":"15_CR8","first-page":"113","volume":"5","author":"T Muthusamy","year":"2014","unstructured":"Muthusamy, T., Seetharaman, K.: Effectiveness of test case prioritization techniques based on regression testing. Int. J. Softw. Eng. Appl. 5(6), 113 (2014)","journal-title":"Int. J. Softw. Eng. Appl."},{"key":"15_CR9","doi-asserted-by":"crossref","unstructured":"Staats, M., Loyola, P., Rothermel, G.: Oracle-centric test case prioritization. In: IEEE 23rd International Symposium on Software Reliability Engineering, vol. 2012, pp. 311\u2013320. IEEE (2012)","DOI":"10.1109\/ISSRE.2012.13"},{"issue":"5","key":"15_CR10","doi-asserted-by":"publisher","first-page":"169","DOI":"10.3923\/ajit.2012.169.180","volume":"11","author":"S Raju","year":"2012","unstructured":"Raju, S., Uma, G.V.: An efficient method to achieve effective test case prioritization in regression testing using prioritization factors. Asian J. Inf. Technol. 11(5), 169\u2013180 (2012)","journal-title":"Asian J. Inf. Technol."},{"issue":"6","key":"15_CR11","first-page":"31","volume":"8","author":"M Shahid","year":"2014","unstructured":"Shahid, M., Ibrahim, S.: A new code based test case prioritization technique. Int. J. Softw. Eng. Appl. 8(6), 31\u201338 (2014)","journal-title":"Int. J. Softw. Eng. Appl."},{"key":"15_CR12","doi-asserted-by":"crossref","unstructured":"Zhang, L., et al.: Bridging the gap between the total and additional test-case prioritization strategies. In: 2013 35th International Conference on Software Engineering (ICSE), pp. 192\u2013201. IEEE (2013)","DOI":"10.1109\/ICSE.2013.6606565"},{"issue":"10","key":"15_CR13","doi-asserted-by":"publisher","first-page":"823","DOI":"10.4236\/jsea.2012.510095","volume":"5","author":"M Yoon","year":"2012","unstructured":"Yoon, M., et al.: A test case prioritization through correlation of requirement and risk. J. Softw. Eng. Appl. 5(10), 823 (2012)","journal-title":"J. Softw. Eng. Appl."},{"key":"15_CR14","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"309","DOI":"10.1007\/978-981-10-8527-7_25","volume-title":"Data Science and Analytics","author":"S Misra","year":"2018","unstructured":"Misra, S., Adewumi, A., Maskeli\u016bnas, R., Dama\u0161evi\u010dius, R., Cafer, F.: Unit testing in global software development environment. In: Panda, B., Sharma, S., Roy, N.R. (eds.) REDSET 2017. CCIS, vol. 799, pp. 309\u2013317. Springer, Singapore (2018). https:\/\/doi.org\/10.1007\/978-981-10-8527-7_25"},{"key":"15_CR15","doi-asserted-by":"publisher","first-page":"40111","DOI":"10.1109\/ACCESS.2021.3063158","volume":"9","author":"N Aljawabrah","year":"2021","unstructured":"Aljawabrah, N., et al.: Automated recovery and visualization of test-to-code traceability (TCT) links: an evaluation. IEEE Access 9, 40111\u201340123 (2021)","journal-title":"IEEE Access"},{"key":"15_CR16","doi-asserted-by":"crossref","unstructured":"Jonathan, O., Omoregbe, N., Misra, S.: Empirical comparison of cross-validation and test data on internet traffic classification methods. In: Journal of Physics: Conference Series, p. 012044. IOP Publishing (2019)","DOI":"10.1088\/1742-6596\/1299\/1\/012044"},{"key":"15_CR17","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"585","DOI":"10.1007\/978-3-319-42092-9_44","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2016","author":"N Jatana","year":"2016","unstructured":"Jatana, N., Suri, B., Misra, S., Kumar, P., Choudhury, A.R.: Particle swarm based evolution and generation of test data using mutation testing. In: Gervasi, O., et al. (eds.) ICCSA 2016. LNCS, vol. 9790, pp. 585\u2013594. Springer, Cham (2016). https:\/\/doi.org\/10.1007\/978-3-319-42092-9_44"},{"key":"15_CR18","doi-asserted-by":"crossref","unstructured":"Singhal, S., Suri, B., Misra, S.: An empirical study of regression test suite reduction using MHBG\\_TCS tool. In: Proceedings International Conference Computation Network Information (ICCNI), pp. 1\u20135 (2017)","DOI":"10.1109\/ICCNI.2017.8123805"},{"key":"15_CR19","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"449","DOI":"10.1007\/978-3-319-09156-3_32","volume-title":"Computational Science and Its Applications \u2013 ICCSA 2014","author":"MN Nawar","year":"2014","unstructured":"Nawar, M.N., Ragheb, M.M.: Multi-heuristic based algorithm for test case prioritization. In: Murgante, B., et al. (eds.) ICCSA 2014. LNCS, vol. 8583, pp. 449\u2013460. Springer, Cham (2014). https:\/\/doi.org\/10.1007\/978-3-319-09156-3_32"},{"key":"15_CR20","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"15","DOI":"10.1007\/978-3-030-60029-7_2","volume-title":"Web Information Systems and Applications","author":"X Lin","year":"2020","unstructured":"Lin, X., et al.: Test case minimization for regression testing of composite service based on modification impact analysis. In: Wang, G., Lin, X., Hendler, J., Song, W., Xu, Z., Liu, G. (eds.) WISA 2020. LNCS, vol. 12432, pp. 15\u201326. Springer, Cham (2020). https:\/\/doi.org\/10.1007\/978-3-030-60029-7_2"},{"issue":"2","key":"15_CR21","doi-asserted-by":"publisher","first-page":"447","DOI":"10.1007\/s13369-017-2796-4","volume":"43","author":"PK Arora","year":"2018","unstructured":"Arora, P.K., Bhatia, R.: A systematic review of agent-based test case generation for regression testing. Arabian J. Sci. Eng. 43(2), 447\u2013470 (2018)","journal-title":"Arabian J. Sci. Eng."},{"issue":"5","key":"15_CR22","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1145\/274946.274960","volume":"41","author":"AK Onoma","year":"1998","unstructured":"Onoma, A.K., et al.: Regression testing in an industrial environment. Commun. ACM 41(5), 81\u201386 (1998)","journal-title":"Commun. ACM"},{"key":"15_CR23","unstructured":"Malishevsky, A.G., et al.: Cost-cognizant test case prioritization. Technical Report TR-UNL-CSE-2006-0004, University of Nebraska-Lincoln (2006)"},{"issue":"2","key":"15_CR24","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/2685614","volume":"24","author":"D Hao","year":"2014","unstructured":"Hao, D., et al.: A unified test case prioritization approach. ACM Trans. Softw. Eng. Methodol. (TOSEM) 24(2), 1\u201331 (2014)","journal-title":"ACM Trans. Softw. Eng. Methodol. (TOSEM)"},{"key":"15_CR25","doi-asserted-by":"crossref","unstructured":"Jeffrey, D., Gupta, N.: Test case prioritization using relevant slices. In: 30th Annual International Computer Software and Applications Conference (COMPSAC 2006), pp. 411\u2013420. IEEE (2006)","DOI":"10.1109\/COMPSAC.2006.80"},{"key":"15_CR26","doi-asserted-by":"crossref","unstructured":"Jiang, B., et al.: Adaptive random test case prioritization. In: 2009 IEEE\/ACM International Conference on Automated Software Engineering, pp. 233\u2013244. IEEE (2009)","DOI":"10.1109\/ASE.2009.77"},{"issue":"10","key":"15_CR27","doi-asserted-by":"publisher","first-page":"929","DOI":"10.1109\/32.962562","volume":"27","author":"G Rothermel","year":"2001","unstructured":"Rothermel, G., et al.: Prioritizing test cases for regression testing. IEEE Trans. Softw. Eng. 27(10), 929\u2013948 (2001)","journal-title":"IEEE Trans. Softw. Eng."},{"issue":"2","key":"15_CR28","doi-asserted-by":"publisher","first-page":"307","DOI":"10.1142\/S0218194016500133","volume":"26","author":"MS Aktas","year":"2016","unstructured":"Aktas, M.S., Kapdan, M.: Structural code clone detection methodology using software metrics. Int. J. Softw. Eng. Knowl. Eng. 26(2), 307\u2013332 (2016)","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"key":"15_CR29","doi-asserted-by":"crossref","unstructured":"Aktas, M.S., Kapdan, M.: Implementation of analytical hierarchy process in detecting structural code clones. In: The 17th International Conference on Computational Science and its Applications (ICCSA 2017) (2017)","DOI":"10.1007\/978-3-319-62404-4_48"},{"key":"15_CR30","unstructured":"Ozturk, S., et al.: Test case prioritization related to code quality. In: The 2013 International Conference on Software Engineering Research and Practice (SERP-13) (2013)"},{"key":"15_CR31","doi-asserted-by":"crossref","unstructured":"Uygun, Y., et al.: On the large-scale graph data processing for user interface testing in big data science projects. In: 2020 IEEE Big Data, 6th International Workshop to Improve Big Data Science Project Team Processes (2020)","DOI":"10.1109\/BigData50022.2020.9378153"},{"key":"15_CR32","doi-asserted-by":"crossref","unstructured":"Tekin, C., et al.: Opinion mining on usability testing data. In: IEEE SIU Conference, Gaziantep, Turkey (2020)","DOI":"10.1109\/SIU49456.2020.9302349"},{"key":"15_CR33","doi-asserted-by":"crossref","unstructured":"Akpinar, P., et al.: Web application testing with model based testing method: case study. In: 2nd International Conference on Electrical, Communication and Computer Engineering, Turkey (2020)","DOI":"10.1109\/ICECCE49384.2020.9179238"},{"key":"15_CR34","doi-asserted-by":"crossref","unstructured":"Kapdan, M., Aktas, M., Yigit, M.: On the structural code clone detection problem: a survey and software metric based approach. In: ICCSA 2014: Computational Science and its Applications - ICCSA 2014, pp. 492\u2013507 (2014)","DOI":"10.1007\/978-3-319-09156-3_35"},{"key":"15_CR35","doi-asserted-by":"crossref","unstructured":"Guveyi, E., Aktas, M., Kalipsiz, O.: Human factor on software quality: a systematic literature review. In: ICCSA 2020: Computational Science and its Applications - ICCSA 2020 (2020)","DOI":"10.1007\/978-3-030-58811-3_65"},{"key":"15_CR36","doi-asserted-by":"crossref","unstructured":"Guveyi, E., Aktas, M., Kalipsiz, O.: Impact of personal factors on software quality. In: UYMS 2020 (2020)","DOI":"10.1109\/UYMS50627.2020.9247063"}],"container-title":["Lecture Notes in Computer Science","Computational Science and Its Applications \u2013 ICCSA 2021"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-030-87007-2_15","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2021,9,10]],"date-time":"2021-09-10T17:04:43Z","timestamp":1631293483000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-030-87007-2_15"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2021]]},"ISBN":["9783030870065","9783030870072"],"references-count":36,"URL":"https:\/\/doi.org\/10.1007\/978-3-030-87007-2_15","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2021]]},"assertion":[{"value":"11 September 2021","order":1,"name":"first_online","label":"First Online","group":{"name":"ChapterHistory","label":"Chapter History"}},{"value":"ICCSA","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Computational Science and Its Applications","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Cagliari","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Italy","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2021","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"13 September 2021","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"16 September 2021","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"21","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"iccsa2021","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"https:\/\/iccsa.org\/","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Single-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Customed version of CyberChair 4","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"1588","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"466","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"18","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"29% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"2,5","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"8","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information (provided by the conference organizers)"}}]}}