{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2026,2,10]],"date-time":"2026-02-10T19:55:01Z","timestamp":1770753301370,"version":"3.50.0"},"publisher-location":"Cham","reference-count":101,"publisher":"Springer International Publishing","isbn-type":[{"value":"9783319065687","type":"print"},{"value":"9783319065694","type":"electronic"}],"license":[{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"tdm","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"},{"start":{"date-parts":[[2014,1,1]],"date-time":"2014-01-01T00:00:00Z","timestamp":1388534400000},"content-version":"vor","delay-in-days":0,"URL":"https:\/\/www.springernature.com\/gp\/researchers\/text-and-data-mining"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2014]]},"DOI":"10.1007\/978-3-319-06569-4_12","type":"book-chapter","created":{"date-parts":[[2014,4,11]],"date-time":"2014-04-11T20:16:15Z","timestamp":1397247375000},"page":"157-172","source":"Crossref","is-referenced-by-count":25,"title":["Problems of Mutation Testing and Higher Order Mutation Testing"],"prefix":"10.1007","author":[{"given":"Quang Vu","family":"Nguyen","sequence":"first","affiliation":[]},{"given":"Lech","family":"Madeyski","sequence":"additional","affiliation":[]}],"member":"297","reference":[{"issue":"4","key":"12_CR1","doi-asserted-by":"publisher","first-page":"34","DOI":"10.1109\/C-M.1978.218136","volume":"11","author":"R.A. DeMillo","year":"1978","unstructured":"DeMillo, R.A., Lipton, R.J., Sayward, F.G.: Hints on test data selection: help for the practicing programmer. IEEE Computer\u00a011(4), 34\u201341 (1978)","journal-title":"IEEE Computer"},{"issue":"4","key":"12_CR2","doi-asserted-by":"publisher","first-page":"279","DOI":"10.1109\/TSE.1977.231145","volume":"SE-3","author":"R.G. Hamlet","year":"1977","unstructured":"Hamlet, R.G.: Testing programs with the aid of a compiler. IEEE Transactions on Software Engineering\u00a0SE-3(4), 279\u2013290 (1977)","journal-title":"IEEE Transactions on Software Engineering"},{"key":"12_CR3","doi-asserted-by":"publisher","first-page":"1379","DOI":"10.1016\/j.infsof.2009.04.016","volume":"51","author":"Y. Jia","year":"2009","unstructured":"Jia, Y., Harman, M.: Higher order mutation testing. Information and Software Technology\u00a051, 1379\u20131393 (2009)","journal-title":"Information and Software Technology"},{"key":"12_CR4","doi-asserted-by":"crossref","unstructured":"Harman, M., Jia, Y., Langdon, W.B.: A Manifesto for Higher Order Mutation Testing. In: Third International Conf. on Software Testing, Verification, and Validation Workshops (2010)","DOI":"10.1109\/ICSTW.2010.13"},{"issue":"6","key":"12_CR5","doi-asserted-by":"publisher","first-page":"957","DOI":"10.1016\/j.infsof.2008.12.005","volume":"51","author":"W. Afzal","year":"2009","unstructured":"Afzal, W., Torkar, R., Feldt, R.: A systematic review of search-based testing for non-functional system properties. Information and Software Technology\u00a051(6), 957\u2013976 (2009)","journal-title":"Information and Software Technology"},{"key":"12_CR6","first-page":"342","volume-title":"Future of Software Engineering 2007","author":"M. Harman","year":"2007","unstructured":"Harman, M.: The current state and future of search based software engineering. In: Briand, L., Wolf, A. (eds.) Future of Software Engineering 2007, pp. 342\u2013357. IEEE Computer Society Press, Los Alamitos (2007)"},{"key":"12_CR7","unstructured":"Harman, M., Mansouri, A., Zhang, Y.: Search based software engineering: A comprehensive analysis and review of trends techniques and applications. Technical Report TR-09-03, Department of Computer Science, King\u2019s College London (2009)"},{"key":"12_CR8","unstructured":"Raiha, O.: A survey on search based software design. Technical Report Technical Report D-2009-1, Department of Computer Sciences, University of Tamper (2009)"},{"key":"12_CR9","doi-asserted-by":"crossref","unstructured":"Langdon, W.B., Harman, M., Jia, Y.: Efficient multi-objective higher order mutation testing with genetic programming. The Journal of Systems and Software 83 (2010)","DOI":"10.1016\/j.jss.2010.07.027"},{"key":"12_CR10","doi-asserted-by":"crossref","unstructured":"Jia, Y., Harman, M.: Constructing Subtle Faults Using Higher Order Mutation Testing. In: Proc. Eighth Int\u2019l Working Conf. Source Code Analysis and Manipulation (2008)","DOI":"10.1109\/SCAM.2008.36"},{"key":"12_CR11","doi-asserted-by":"publisher","first-page":"94","DOI":"10.1109\/TAIC-PART.2008.18","volume-title":"Proceedings of the 3rd Testing: Academic and Industrial Conference Practice and Research Techniques (TAIC PART 2008)","author":"Y. Jia","year":"2008","unstructured":"Jia, Y., Harman, M.: MILU: A Customizable, Runtime-Optimized Higher Order Mutation Testing Tool for the Full C Language. In: Proceedings of the 3rd Testing: Academic and Industrial Conference Practice and Research Techniques (TAIC PART 2008), pp. 94\u201398. IEEE Computer Society, Windsor (2008)"},{"issue":"1","key":"12_CR12","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/125489.125473","volume":"1","author":"A.J. Offutt","year":"1992","unstructured":"Offutt, A.J.: Investigations of the software testing coupling effect. ACM Transactions on Software Engineering and Methodology\u00a01(1), 5\u201320 (1992)","journal-title":"ACM Transactions on Software Engineering and Methodology"},{"key":"12_CR13","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1338","DOI":"10.1007\/978-3-540-24855-2_155","volume-title":"Genetic and Evolutionary Computation \u2013 GECCO 2004","author":"K. Adamopoulos","year":"2004","unstructured":"Adamopoulos, K., Harman, M., Hierons, R.M.: How to Overcome the Equivalent Mutant Problem and Achieve Tailored Selective Mutation Using Co-evolution. In: Deb, K., Tari, Z. (eds.) GECCO 2004. LNCS, vol.\u00a03103, pp. 1338\u20131349. Springer, Heidelberg (2004)"},{"key":"12_CR14","unstructured":"Acree, A.T.: On Mutation. PhD thesis, Georgia Inst. of Technology (1980)"},{"key":"12_CR15","unstructured":"Budd, T.A.: Mutation Analysis of Program Test Data. PhD thesis, Yale Univ. (1980)"},{"key":"12_CR16","doi-asserted-by":"crossref","unstructured":"DeMillo, R.A., Guindi, D.S., King, K.N., McCracken, W.M., Offutt, A.J.: An Extended Overview of the Mothra Software Testing Environment. In: Proceedings of the Second Workshop on Software Testing, Verification, and Analysis, pp. 142\u2013151 (1988)","DOI":"10.1109\/WST.1988.5369"},{"key":"12_CR17","unstructured":"Sahinoglu, M., Spafford, E.H.: A Bayes Sequential Statistical Procedure for Approving Software Products. In: Proc. IFIP Conf. Approving Software Products, pp. 43\u201356 (1990)"},{"issue":"7","key":"12_CR18","first-page":"685","volume":"21","author":"K.N. King","year":"1991","unstructured":"King, K.N., Offutt, A.J.: A Fortran Language System for Mutation-Based Software Testing. Software: Practice and Experience\u00a021(7), 685\u2013718 (1991)","journal-title":"Software: Practice and Experience"},{"key":"12_CR19","unstructured":"Mathur, A.P., Wong, W.E.: An Empirical Comparison of Mutation and Data Flow Based Test Adequacy Criteria. Technical Report, Purdue Univ. (1993)"},{"key":"12_CR20","unstructured":"Wong, W.E.: On Mutation and Data Flow. PhD thesis, Purdue Univ. (1993)"},{"key":"12_CR21","unstructured":"Hussain, S.: Mutation Clustering. Master\u2019s thesis, King\u2019s College London (2008)"},{"key":"12_CR22","unstructured":"Ji, C., Chen, Z., Xu, B., Zhao, Z.: A Novel Method of Mutation Clustering Based on Domain Analysis. In: Proc. 21st Int\u2019l Conf. Software Eng. and Knowledge Eng. (2009)"},{"key":"12_CR23","unstructured":"Agrawal, H., DeMillo, R.A., Hathaway, B., Hsu, W., Krauser, E.W., Martin, R.J., Mathur, A.P., Spafford, E.: Design of Mutant Operators for the C Programming Language. Technical Report SERC-TR-41-P, Purdue Univ. (1989)"},{"key":"12_CR24","doi-asserted-by":"crossref","unstructured":"Mathur, A.P.: Performance, Effectiveness, and Reliability Issues in Software Testing. In: Proc. Fifth Int\u2019l Computer Software and Applications Conf., pp. 604\u2013605 (1991)","DOI":"10.1109\/CMPSAC.1991.170248"},{"key":"12_CR25","doi-asserted-by":"crossref","unstructured":"Offutt, A.J., Rothermel, G., Zapf, C.: An Experimental Evaluation of Selective Mutation. In: Proc. 15th Int\u2019l Conf. Software Eng., pp. 100\u2013107 (1993)","DOI":"10.1109\/ICSE.1993.346062"},{"issue":"3","key":"12_CR26","doi-asserted-by":"publisher","first-page":"185","DOI":"10.1016\/0164-1212(94)00098-0","volume":"31","author":"W.E. Wong","year":"1995","unstructured":"Wong, W.E., Mathur, A.P.: Reducing the Cost of Mutation Testing: An Empirical Study. J. Systems and Software\u00a031(3), 185\u2013196 (1995)","journal-title":"J. Systems and Software"},{"key":"12_CR27","doi-asserted-by":"crossref","unstructured":"Offutt, A.J., Lee, A., Rothermel, G., Untch, R.H., Zapf, C.: An Experimental Determination of Sufficient Mutant Operators. ACM Trans. Soft. Eng. and Methodology (1996)","DOI":"10.1145\/227607.227610"},{"issue":"4","key":"12_CR28","doi-asserted-by":"publisher","first-page":"205","DOI":"10.1002\/(SICI)1099-1689(199912)9:4<205::AID-STVR186>3.0.CO;2-X","volume":"9","author":"E.S. Mresa","year":"1999","unstructured":"Mresa, E.S., Bottaci, L.: Efficiency of Mutation Operators and Selective Mutation Strategies: An Empirical Study. Software Testing, Verification, and Reliability\u00a09(4), 205\u2013232 (1999)","journal-title":"Software Testing, Verification, and Reliability"},{"issue":"2","key":"12_CR29","doi-asserted-by":"publisher","first-page":"113","DOI":"10.1002\/stvr.226","volume":"11","author":"E.F. Barbosa","year":"2001","unstructured":"Barbosa, E.F., Maldonado, J.C., Vincenzi, A.M.R.: Toward the Determination of Sufficient Mutant Operators for C. Software Testing, Verification, and Reliability\u00a011(2), 113\u2013136 (2001)","journal-title":"Software Testing, Verification, and Reliability"},{"key":"12_CR30","doi-asserted-by":"crossref","unstructured":"Namin, A.S., Andrews, J.H.: Finding Sufficient Mutation Operators via Variable Reduction. In: Proc. Second Workshop Mutation Analysis, p. 5 (2006)","DOI":"10.1109\/MUTATION.2006.7"},{"key":"12_CR31","doi-asserted-by":"crossref","unstructured":"Namin, A.S., Andrews, J.H.: On Sufficiency of Mutants. In: Proc. 29th Int\u2019l Conf. Software Eng., pp. 73\u201374 (2007)","DOI":"10.1109\/ICSECOMPANION.2007.56"},{"key":"12_CR32","doi-asserted-by":"crossref","unstructured":"Namin, A.S., Andrews, J.H., Murdoch, D.J.: Sufficient Mutation Operators for Measuring Test Effectiveness. In: Proc. 30th Int\u2019l Conf. Software Eng., pp. 351\u2013360 (2008)","DOI":"10.1145\/1368088.1368136"},{"issue":"2","key":"12_CR33","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1002\/stvr.392","volume":"19","author":"M. Polo","year":"2008","unstructured":"Polo, M., Piattini, M., Garcia-Rodriguez, I.: Decreasing the Cost of Mutation Testing with Second-Order Mutants. Software Testing, Verification, and Reliability\u00a019(2), 111\u2013131 (2008)","journal-title":"Software Testing, Verification, and Reliability"},{"key":"12_CR34","doi-asserted-by":"crossref","unstructured":"Purushothaman, R., Perry, D.E.: Toward Understanding the Rhetoric of small source code changes. IEEE Transactions on Software Engineering\u00a031(6) (2005)","DOI":"10.1109\/TSE.2005.74"},{"key":"12_CR35","doi-asserted-by":"crossref","unstructured":"Langdon, W.B., Harman, M., Jia, Y.: Multi Objective Higher Order Mutation Testing with Genetic Programming. In: Proc. Fourth Testing: Academic and Industrial Conf. Practice and Research (2009)","DOI":"10.1109\/TAICPART.2009.18"},{"issue":"4","key":"12_CR36","doi-asserted-by":"publisher","first-page":"371","DOI":"10.1109\/TSE.1982.235571","volume":"8","author":"W.E. Howden","year":"1982","unstructured":"Howden, W.E.: Weak Mutation Testing and Completeness of Test Sets. IEEE Trans. Soft. Eng.\u00a08(4), 371\u2013379 (1982)","journal-title":"IEEE Trans. Soft. Eng."},{"key":"12_CR37","unstructured":"Girgis, M.R., Woodward, M.R.: An Integrated System for Program Testing Using WeakMutation and Data Flow Analysis. In: Proc. Eighth Int\u2019l Conf. Software Eng. (1985)"},{"key":"12_CR38","unstructured":"Horgan, J.R., Mathur, A.P.: Weak Mutation is Probably Strong Mutation. Technical Report SERC-TR-83-P, Purdue Univ. (1990)"},{"key":"12_CR39","unstructured":"Woodward, M.R.: Mutation Testing-An Evolving Technique. In: Proc. IEE Colloquium on Software Testing for Critical Systems, pp. 3\/1\u20133\/6 (1990)"},{"key":"12_CR40","doi-asserted-by":"crossref","unstructured":"Marick, B.: The Weak Mutation Hypothesis. In: Proc. Fourth Symp. Software Testing, Analysis and Verification, pp. 190\u2013199 (1991)","DOI":"10.1145\/120807.120825"},{"key":"12_CR41","doi-asserted-by":"crossref","unstructured":"Offutt, A.J., Lee, S.D.: How Strong is Weak Mutation. In: Proc. Fourth Symp. Software Testing, Analysis and Verification, pp. 200\u2013213 (1991)","DOI":"10.1145\/120807.120826"},{"issue":"5","key":"12_CR42","doi-asserted-by":"publisher","first-page":"337","DOI":"10.1109\/32.286422","volume":"20","author":"A.J. Offutt","year":"1994","unstructured":"Offutt, A.J., Lee, S.D.: An Empirical Evaluation of Weak Mutation. IEEE Trans. Software Eng.\u00a020(5), 337\u2013344 (1994)","journal-title":"IEEE Trans. Software Eng."},{"key":"12_CR43","unstructured":"Woodward, M.R., Halewood, K.: From Weak to Strong Dead or Alive? An Analysis of Some Mutationtesting Issues. In: Proc. Second Workshop on Software Testing, Verification, and Analysis, pp. 152\u2013158 (1988)"},{"key":"12_CR44","doi-asserted-by":"crossref","unstructured":"Jackson, D., Woodward, M.R.: Parallel Firm Mutation of Java Programs. In: Proc. First Workshop on Mutation Analysis, pp. 55\u201361 (2000)","DOI":"10.1007\/978-1-4757-5939-6_10"},{"issue":"7","key":"12_CR45","doi-asserted-by":"publisher","first-page":"177","DOI":"10.1145\/960114.29669","volume":"22","author":"A.J. Offutt","year":"1987","unstructured":"Offutt, A.J., King, K.N.: A Fortran 77 Interpreter for Mutation Analysis. ACM SIGPLAN Notices\u00a022(7), 177\u2013188 (1987)","journal-title":"ACM SIGPLAN Notices"},{"issue":"2","key":"12_CR46","doi-asserted-by":"publisher","first-page":"135","DOI":"10.1016\/0164-1212(93)90005-I","volume":"20","author":"B. Choi","year":"1993","unstructured":"Choi, B., Mathur, A.P.: High-Performance Mutation Testing. J. Systems and Software\u00a020(2), 135\u2013152 (1993)","journal-title":"J. Systems and Software"},{"key":"12_CR47","unstructured":"Delamaro, M.E.: Proteum-A Mutation Analysis Based Testing Environment. Master\u2019s thesis, Univ. of Sao Paulo (1993)"},{"key":"12_CR48","unstructured":"Delamaro, M.E., Maldonado, J.C.: Proteum: A Tool for the Assessment of Test Adequacy for C Programs. In: Proc. Conf. Performability in Computing Systems (1996)"},{"key":"12_CR49","doi-asserted-by":"crossref","unstructured":"DeMillo, R.A., Krauser, E.W., Mathur, A.P.: Compiler-Integrated Program Mutation. In: Proc. Fifth Ann. Computer Software and Applications Conf., pp. 351\u2013356 (1991)","DOI":"10.1109\/CMPSAC.1991.170202"},{"key":"12_CR50","unstructured":"Krauser, E.W.: Compiler-Integrated Software Testing. PhD thesis, Purdue Univ. (1991)"},{"key":"12_CR51","doi-asserted-by":"crossref","unstructured":"Untch, R.H.: Mutation-Based Software Testing Using Program Schemata. In: Proc. 30th Ann. Southeast Regional Conf., pp. 285\u2013291 (1992)","DOI":"10.1145\/503720.503749"},{"key":"12_CR52","unstructured":"Mathur, A.P.: CS 406 Software Engineering I. Course Project Handout (1992)"},{"key":"12_CR53","doi-asserted-by":"crossref","unstructured":"Untch, R.H., Offutt, A.J., Harrold, M.J.: Mutation Analysis Using Mutant Schemata. In: Proc. Int\u2019l Symp. Software Testing and Analysis, pp. 139\u2013148 (1993)","DOI":"10.1145\/174146.154265"},{"key":"12_CR54","unstructured":"Untch, R.H.: Schema-Based Mutation Analysis: A New Test Data Adequacy Assessment Method. PhD thesis, Clemson Univ. (1995)"},{"issue":"5","key":"12_CR55","first-page":"1","volume":"29","author":"A.J. Offutt","year":"2004","unstructured":"Offutt, A.J., Ma, Y.S., Kwon, Y.R.: An Experimental Mutation System for Java. ACM SIGSOFT Software Eng. Notes\u00a029(5), 1\u20134 (2004)","journal-title":"ACM SIGSOFT Software Eng. Notes"},{"issue":"2","key":"12_CR56","doi-asserted-by":"publisher","first-page":"97","DOI":"10.1002\/stvr.308","volume":"15","author":"Y.S. Ma","year":"2005","unstructured":"Ma, Y.S., Offutt, A.J., Kwon, Y.R.: MuJava: An Automated Class Mutation System. Software Testing, Verification, and Reliability\u00a015(2), 97\u2013133 (2005)","journal-title":"Software Testing, Verification, and Reliability"},{"key":"12_CR57","doi-asserted-by":"crossref","unstructured":"Ma, Y.S., Offutt, A.J., Kwon, Y.R.: MuJava: A Mutation System for Java. In: Proc. 28th Int\u2019l Conf. Software Eng., pp. 827\u2013830 (2006)","DOI":"10.1145\/1134285.1134425"},{"key":"12_CR58","doi-asserted-by":"crossref","unstructured":"Schuler, D., Dallmeier, V., Zeller, A.: Efficient Mutation Testing by Checking Invariant Violations. In: Proc. Int\u2019l Symp. Software Testing and Analysis (2009)","DOI":"10.1145\/1572272.1572282"},{"key":"12_CR59","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"202","DOI":"10.1007\/11774129_26","volume-title":"Extreme Programming and Agile Processes in Software Engineering","author":"B. Bogacki","year":"2006","unstructured":"Bogacki, B., Walter, B.: Evaluation of Test Code Quality with Aspect-Oriented Mutations. In: Abrahamsson, P., Marchesi, M., Succi, G. (eds.) XP 2006. LNCS, vol.\u00a04044, pp. 202\u2013204. Springer, Heidelberg (2006)"},{"key":"12_CR60","series-title":"IFIP","first-page":"273","volume-title":"Soft. Eng. Techniques: Design for Quality","author":"B. Bogacki","year":"2007","unstructured":"Bogacki, B., Walter, B.: Aspect-Oriented Response Injection: An Alternative to Classical Mutation Testing. In: Sacha, K. (ed.) Soft. Eng. Techniques: Design for Quality. IFIP, pp. 273\u2013282. Springer, Boston (2007)"},{"key":"12_CR61","unstructured":"Mathur, A.P., Krauser, E.W.: Mutant Unification for Improved Vectorization. Technical Report SERC-TR-14-P, Purdue Univ. (1988)"},{"key":"12_CR62","unstructured":"Krauser, E.W., Mathur, A.P., Rego, V.J.: High Performance Software Testing on SIMD Machines. In: Proc. Second Workshop on Software Testing, Verification and Analysis (1988)"},{"issue":"5","key":"12_CR63","doi-asserted-by":"publisher","first-page":"403","DOI":"10.1109\/32.90444","volume":"17","author":"E.W. Krauser","year":"1991","unstructured":"Krauser, E.W., Mathur, A.P., Rego, V.J.: High Performance Software Testing on SIMD Machines. IEEE Trans. Software Eng.\u00a017(5), 403\u2013423 (1991)","journal-title":"IEEE Trans. Software Eng."},{"key":"12_CR64","unstructured":"Offutt, A.J., Pargas, R.P., Fichter, S.V., Khambekar, P.K.: Mutation Testing of Software Using a MIMD Computer. In: Proc. Int\u2019l Conf. Parallel Processing, pp. 255\u2013266 (1992)"},{"key":"12_CR65","unstructured":"Zapf, C.N.: A Distributed Interpreter for the Mothra Mutation Testing System. Master\u2019s thesis, Clemson Univ. (1993)"},{"issue":"3","key":"12_CR66","doi-asserted-by":"publisher","first-page":"149","DOI":"10.1145\/174146.154266","volume":"18","author":"S.N. Weiss","year":"1993","unstructured":"Weiss, S.N., Fleyshgakker, V.N.: Improved Serial Algorithms for Mutation Analysis. ACM SIGSOFT Software Eng. Notes\u00a018(3), 149\u2013158 (1993)","journal-title":"ACM SIGSOFT Software Eng. Notes"},{"key":"12_CR67","doi-asserted-by":"crossref","unstructured":"Fleyshgakker, V.N., Weiss, S.N.: Efficient Mutation Analysis: A New Approach. In: Proc. Int\u2019l Symp. Software Testing and Analysis, pp. 185\u2013195 (1994)","DOI":"10.1145\/186258.187179"},{"key":"12_CR68","doi-asserted-by":"crossref","unstructured":"Madeyski, L., Orzeszyna, W., Torkar, R., J\u00f3zala, M.: Overcoming the Equivalent Mutant Problem: A Systematic Literature Review and a Comparative Experiment of Second Order Mutation. IEEE Transactions on Software Engineering (2013), http:\/\/dx.doi.org\/10.1109\/TSE.2013.44 (accepted)","DOI":"10.1109\/TSE.2013.44"},{"key":"12_CR69","doi-asserted-by":"crossref","unstructured":"Baldwin, D., Sayward, F.G.: Heuristics for determin-ing equivalence of program mutations. Yale University, New Haven, Connecticut, Tech. Report 276 (1979)","DOI":"10.21236\/ADA071795"},{"issue":"3","key":"12_CR70","doi-asserted-by":"publisher","first-page":"131","DOI":"10.1002\/stvr.4370040303","volume":"4","author":"A.J. Offutt","year":"1994","unstructured":"Offutt, A.J., Craft, W.M.: Using compiler optimization techniques to detect equivalent mutants. Software Testing, Verification and Reliability\u00a04(3), 131\u2013154 (1994)","journal-title":"Software Testing, Verification and Reliability"},{"key":"12_CR71","doi-asserted-by":"crossref","unstructured":"Offutt, A.J., Pan, J.: Detecting equivalent mutants and the feasible path problem. In: Proc. Eleventh Annual Conf. \u2018Systems Integrity Computer Assurance COMPASS 1996 Software Safety. Process Security\u2019, pp. 224\u2013236 (1996)","DOI":"10.1109\/CMPASS.1996.507890"},{"key":"12_CR72","doi-asserted-by":"crossref","unstructured":"Hierons, R., Harman, M., Danicic, S.: Using program slicing to assist in the detection of equivalent mutants. Software Testing, Verification and Reliability (1999)","DOI":"10.1002\/(SICI)1099-1689(199912)9:4<233::AID-STVR191>3.0.CO;2-3"},{"key":"12_CR73","first-page":"185","volume-title":"Proceedings of the Testing: Academic and Industrial Conference Practice and Research Techniques- MUTATION","author":"M. Ellims","year":"2007","unstructured":"Ellims, M., Ince, D., Petre, M.: The Csaw C mutation tool: Initial results. In: Proceedings of the Testing: Academic and Industrial Conference Practice and Research Techniques- MUTATION, pp. 185\u2013192. IEEE Computer Society Press, Washington, DC (2007)"},{"key":"12_CR74","series-title":"WWW 2007","doi-asserted-by":"publisher","first-page":"667","DOI":"10.1145\/1242572.1242663","volume-title":"Proceedings of the 16th International Conference on World Wide Web","author":"E. Martin","year":"2007","unstructured":"Martin, E., Xie, T.: A fault model and mutation testing of access control policies. In: Proceedings of the 16th International Conference on World Wide Web. WWW 2007, pp. 667\u2013676. ACM Press, New York (2007)"},{"issue":"4","key":"12_CR75","doi-asserted-by":"publisher","first-page":"35","DOI":"10.1016\/j.entcs.2008.05.009","volume":"203","author":"L. DuBousquet","year":"2008","unstructured":"DuBousquet, L., Delaunay, M.: Towards mutation analysis for Lustre programs. Electronic Notes in Theoretical Computer Science\u00a0203(4), 35\u201348 (2008)","journal-title":"Electronic Notes in Theoretical Computer Science"},{"key":"12_CR76","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1145\/125489.125473","volume":"1","author":"A.J. Offutt","year":"1992","unstructured":"Offutt, A.J.: Investigations of the software testing coupling effect. ACM Transactions on Software Engineering Methodology\u00a01, 5\u201320 (1992)","journal-title":"ACM Transactions on Software Engineering Methodology"},{"key":"12_CR77","doi-asserted-by":"crossref","unstructured":"Mresa, E.S., Bottaci, L.: Efficiency of mutation operators and selective mutation strategies: An empirical study. Software Testing, Verification and Reliability (1999)","DOI":"10.1002\/(SICI)1099-1689(199912)9:4<205::AID-STVR186>3.0.CO;2-X"},{"key":"12_CR78","doi-asserted-by":"publisher","first-page":"5","DOI":"10.1007\/978-1-4757-5939-6_4","volume-title":"Mutation Testing for the New Century","author":"M. Harman","year":"2001","unstructured":"Harman, M., Hierons, R., Danicic, S.: The relationship between program dependence and mutation analysis. In: Wong, W.E. (ed.) Mutation Testing for the New Century, pp. 5\u201313. Kluwer Academic Publishers, Norwell (2001)"},{"key":"12_CR79","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"1338","DOI":"10.1007\/978-3-540-24855-2_155","volume-title":"Genetic and Evolutionary Computation \u2013 GECCO 2004","author":"K. Adamopoulos","year":"2004","unstructured":"Adamopoulos, K., Harman, M., Hierons, R.M.: How to overcome the equivalent mutant problem and achieve tailored selective mutation using co-evolution. In: Deb, K., Tari, Z. (eds.) GECCO 2004. LNCS, vol.\u00a03103, pp. 1338\u20131349. Springer, Heidelberg (2004)"},{"key":"12_CR80","series-title":"AST 2006","doi-asserted-by":"publisher","first-page":"78","DOI":"10.1145\/1138929.1138945","volume-title":"Proceedings of the 2006 International Workshop on Automation of Software Test - AST 2006","author":"A.J. Offutt","year":"2006","unstructured":"Offutt, A.J., Ma, Y.S., Kwon, Y.R.: The class-level mutants of MuJava. In: Proceedings of the 2006 International Workshop on Automation of Software Test - AST 2006. AST 2006, pp. 78\u201384. ACM Press, New York (2006)"},{"key":"12_CR81","doi-asserted-by":"crossref","unstructured":"Kaminski, G., Ammann, P.: Using a fault hierarchy to improve the efficiency of DNF logic mutation testing. In: Proc. Int. Conf. Software Testing Verification and Validation, ICST 2009, pp. 386\u2013395 (2009)","DOI":"10.1109\/ICST.2009.13"},{"key":"12_CR82","doi-asserted-by":"crossref","unstructured":"Ji, C., Chen, Z., Xu, B., Wang, Z.: A new mutation analysis method for testing Java exception handling. In: Proc. 33rd Annual IEEE Int. Computer Software and Applications Conf., COMPSAC 2009, vol.\u00a02, pp. 556\u2013561 (2009)","DOI":"10.1109\/COMPSAC.2009.192"},{"key":"12_CR83","doi-asserted-by":"crossref","unstructured":"Kintis, M., Papadakis, M., Malevris, N.: Evaluating mutation testing alternatives: A collateral experiment. In: Proc. 17th Asia Pacific Soft. Eng. Conf. (APSEC) (2010)","DOI":"10.1109\/APSEC.2010.42"},{"key":"12_CR84","doi-asserted-by":"crossref","unstructured":"Papadakis, M., Malevris, N.: An empirical evaluation of the first and second order mutation testing strategies. In: Proceedings of the 2010 Third International Conference on Software Testing, Verification, and Validation Workshops. ICSTW 2010, pp. 90\u201399. IEEE Computer Society (2010)","DOI":"10.1109\/ICSTW.2010.50"},{"issue":"6","key":"12_CR85","doi-asserted-by":"publisher","first-page":"675","DOI":"10.1142\/S021819400200113X","volume":"12","author":"A.M.R. Vincenzi","year":"2002","unstructured":"Vincenzi, A.M.R., Nakagawa, E.Y., Maldonado, J.C., Delamaro, M.E., Romero, R.A.F.: Bayesian-learning based guide-lines to determine equivalent mutants. International Journal of Soft. Eng. and Knowledge Engineering\u00a012(6), 675\u2013690 (2002)","journal-title":"International Journal of Soft. Eng. and Knowledge Engineering"},{"key":"12_CR86","first-page":"192","volume-title":"Proceedings of the IEEE International Conference on Software Testing, Verification, and Validation Workshops","author":"B.J.M. Gr\u00fcn","year":"2009","unstructured":"Gr\u00fcn, B.J.M., Schuler, D., Zeller, A.: The impact of equivalent mutants. In: Proceedings of the IEEE International Conference on Software Testing, Verification, and Validation Workshops, pp. 192\u2013199. IEEE Computer Society, Denver (2009)"},{"key":"12_CR87","doi-asserted-by":"crossref","unstructured":"Schuler, D., Dallmeier, V., Zeller, A.: Efficient mutation testing by checking invariant violations. In: Proceedings of the Eighteenth International Symposium on Software Testing and Analysis. ISSTA 2009. ACM Press, New York (2009)","DOI":"10.1145\/1572272.1572282"},{"key":"12_CR88","doi-asserted-by":"crossref","unstructured":"Schuler, D., Zeller, A.: (Un-)covering equivalent mutants. In: Proceedings of the 3rd International Conference on Software Testing Verification and Validation (ICST 2010), Paris, France, pp. 45\u201354 (2010)","DOI":"10.1109\/ICST.2010.30"},{"issue":"5","key":"12_CR89","doi-asserted-by":"publisher","first-page":"353","DOI":"10.1002\/stvr.1473","volume":"23","author":"D. Schuler","year":"2012","unstructured":"Schuler, D., Zeller, A.: Covering and uncovering equivalent mutants. Software Testing, Verification and Reliability\u00a023(5), 353\u2013374 (2012)","journal-title":"Software Testing, Verification and Reliability"},{"issue":"3","key":"12_CR90","doi-asserted-by":"publisher","first-page":"165","DOI":"10.1002\/(SICI)1099-1689(199709)7:3<165::AID-STVR143>3.0.CO;2-U","volume":"7","author":"A.J. Offutt","year":"1997","unstructured":"Offutt, A.J., Pan, J.: Automatically Detecting Equivalent Mutants and Infeasible Paths. Software Testing, Verification and Reliability\u00a07(3), 165\u2013192 (1997)","journal-title":"Software Testing, Verification and Reliability"},{"key":"12_CR91","doi-asserted-by":"crossref","unstructured":"Clark, J.A., Dan, H., Hierons, R.M.: Semantic Mutation Testing. In: Third International Conf. on Software Testing, Verification and Validation Workshops (2010)","DOI":"10.1109\/ICSTW.2010.8"},{"key":"12_CR92","doi-asserted-by":"crossref","unstructured":"Dan, H., Hierons, R.M.: Semantic Mutation Analysis of Floating-point Comparison. In: IEEE Fifth International Conference on Software Testing, Verification and Validation (2012)","DOI":"10.1109\/ICST.2012.109"},{"key":"12_CR93","doi-asserted-by":"crossref","unstructured":"Boonyakulsrirung, P., Suwannasare, T.: A Weak Mutation Testing Framework for WS-BPEL. In: Eighth International Joint Conf. on Computer Science and Soft. Engineering (2011)","DOI":"10.1109\/JCSSE.2011.5930140"},{"key":"12_CR94","doi-asserted-by":"crossref","unstructured":"Durelli, V.H.S., Offutt, A.J., Delamaro, M.E.: Toward Harnessing High-level Language Virtual Machines for Further Speeding up Weak Mutation Testing. In: IEEE Fifth International Conference on Software Testing, Verification and Validation (2012)","DOI":"10.1109\/ICST.2012.158"},{"key":"12_CR95","doi-asserted-by":"crossref","unstructured":"Mateo, P.R., Usaola, M.P.: Mutant Execution Cost Reduction Through MUSIC (MUtant Schema Improved with extra Code). In: IEEE Fifth International Conference on Software Testing, Verification and Validation (2012)","DOI":"10.1109\/ICST.2012.156"},{"key":"12_CR96","doi-asserted-by":"crossref","unstructured":"Lisherness, P., Lesperance, N., Cheng, K.T.: Mutation Analysis with Coverage Discounting. In: Design, Automation and Test in Europe Conference and Exhibition (2013)","DOI":"10.7873\/DATE.2013.021"},{"issue":"2","key":"12_CR97","doi-asserted-by":"publisher","first-page":"111","DOI":"10.1002\/stvr.392","volume":"19","author":"M. Polo","year":"2008","unstructured":"Polo, M., Piattini, M., Garcia-Rodriguez, I.: Decreasing the Cost of Mutation Testing with Second-Order Mutants. Software Testing, Verification, and Reliability\u00a019(2), 111\u2013131 (2008)","journal-title":"Software Testing, Verification, and Reliability"},{"issue":"1","key":"12_CR98","doi-asserted-by":"publisher","first-page":"32","DOI":"10.1049\/iet-sen.2008.0038","volume":"4","author":"L. Madeyski","year":"2010","unstructured":"Madeyski, L., Radyk, N.: Judy - a mutation testing tool for Java. IET Software\u00a04(1), 32\u201342 (2010), http:\/\/madeyski.e-informatyka.pl\/download\/Madeyski10b.pdf","journal-title":"IET Software"},{"key":"12_CR99","series-title":"Lecture Notes in Computer Science","doi-asserted-by":"publisher","first-page":"207","DOI":"10.1007\/978-3-540-73460-4_20","volume-title":"Product-Focused Software Process Improvement","author":"L. Madeyski","year":"2007","unstructured":"Madeyski, L.: On the effects of pair programming on thoroughness and fault-finding effectiveness of unit tests. In: M\u00fcnch, J., Abrahamsson, P. (eds.) PROFES 2007. LNCS, vol.\u00a04589, pp. 207\u2013221. Springer, Heidelberg (2007), http:\/\/madeyski.e-informatyka.pl\/download\/Madeyski07.pdf"},{"issue":"3","key":"12_CR100","doi-asserted-by":"publisher","first-page":"281","DOI":"10.1002\/spip.382","volume":"13","author":"L. Madeyski","year":"2008","unstructured":"Madeyski, L.: Impact of pair programming on thoroughness and fault detection effectiveness of unit test suites. Software Process: Improvement and Practice\u00a013(3), 281\u2013295 (2008), http:\/\/madeyski.e-informatyka.pl\/download\/Madeyski08.pdf","journal-title":"Software Process: Improvement and Practice"},{"key":"12_CR101","doi-asserted-by":"publisher","first-page":"169","DOI":"10.1016\/j.infsof.2009.08.007","volume":"52","author":"L. Madeyski","year":"2010","unstructured":"Madeyski, L.: The impact of test-first programming on branch coverage and mutation score indicator of unit tests: An experiment. Information and Software Technology\u00a052, 169\u2013184 (2010), http:\/\/madeyski.e-informatyka.pl\/download\/Madeyski10c.pdf","journal-title":"Information and Software Technology"}],"container-title":["Advances in Intelligent Systems and Computing","Advanced Computational Methods for Knowledge Engineering"],"original-title":[],"language":"en","link":[{"URL":"https:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-06569-4_12","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2025,5,2]],"date-time":"2025-05-02T10:21:37Z","timestamp":1746181297000},"score":1,"resource":{"primary":{"URL":"https:\/\/link.springer.com\/10.1007\/978-3-319-06569-4_12"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2014]]},"ISBN":["9783319065687","9783319065694"],"references-count":101,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-06569-4_12","relation":{},"ISSN":["2194-5357","2194-5365"],"issn-type":[{"value":"2194-5357","type":"print"},{"value":"2194-5365","type":"electronic"}],"subject":[],"published":{"date-parts":[[2014]]}}}