{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,11,3]],"date-time":"2025-11-03T09:14:31Z","timestamp":1762161271596,"version":"3.40.3"},"publisher-location":"Cham","reference-count":94,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319471686"},{"type":"electronic","value":"9783319471693"}],"license":[{"start":{"date-parts":[[2016,1,1]],"date-time":"2016-01-01T00:00:00Z","timestamp":1451606400000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":[],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2016]]},"DOI":"10.1007\/978-3-319-47169-3_54","type":"book-chapter","created":{"date-parts":[[2016,10,4]],"date-time":"2016-10-04T21:56:23Z","timestamp":1475618183000},"page":"707-726","source":"Crossref","is-referenced-by-count":7,"title":["Data Science Challenges to Improve Quality Assurance of Internet of Things Applications"],"prefix":"10.1007","author":[{"given":"Harald","family":"Foidl","sequence":"first","affiliation":[]},{"given":"Michael","family":"Felderer","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2016,10,5]]},"reference":[{"key":"54_CR1","unstructured":"Santucci, G.: The Internet of Things: between the revolution of the internet and the metamorphosis of objects. In: Sundmaeker, H., Guillemin, P., Friess, P., Woelffl\u00e9, S. (eds.) Vision and Challenges for Realising the\u00a0Internet of Things, pp. 11\u201324. CERP-IoT \u2013 Cluster of European Research Projects on the Internet of Things, Luxembourg (2010)"},{"key":"54_CR2","doi-asserted-by":"crossref","first-page":"431","DOI":"10.1016\/j.bushor.2015.03.008","volume":"58","author":"I Lee","year":"2015","unstructured":"Lee, I., Lee, K.: The Internet of Things (IoT): applications, investments, and challenges for enterprises. Bus. Horiz. 58, 431\u2013440 (2015)","journal-title":"Bus. Horiz."},{"key":"54_CR3","first-page":"16","volume":"109","author":"QM Marwah","year":"2015","unstructured":"Marwah, Q.M., Sirshar, M.: Software quality assurance in Internet of Things. Int. J. Comput. Appl. 109, 16\u201324 (2015)","journal-title":"Int. J. Comput. Appl."},{"key":"54_CR4","doi-asserted-by":"crossref","first-page":"1645","DOI":"10.1016\/j.future.2013.01.010","volume":"29","author":"J Gubbi","year":"2013","unstructured":"Gubbi, J., Buyya, R., Marusic, S., Palaniswami, M.: Internet of Things (IoT): a vision, architectural elements, and future directions. Future Gener. Comput. Syst. 29, 1645\u20131660 (2013)","journal-title":"Future Gener. Comput. Syst."},{"key":"54_CR5","doi-asserted-by":"crossref","first-page":"1101","DOI":"10.1002\/dac.2417","volume":"25","author":"F Xia","year":"2012","unstructured":"Xia, F., Yang, L.T., Wang, L., Vinel, A.: Internet of Things. Int. J. Commun Syst 25, 1101\u20131102 (2012)","journal-title":"Int. J. Commun Syst"},{"key":"54_CR6","unstructured":"Prasad, N.R., Eisenhauer, M., Ahls\u00e9n, M., Badii, A., Brinkmann, A., Hansen, K.M., Rosengren, P.: Open source middleware for networked embedded systems towards future Internet of Things. In: Sundmaeker, H., Guillemin, P., Friess, P., Woelffl\u00e9, S. (eds.) Vision and Challenges for Realising the Internet of Things, pp. 153\u2013163. CERP-IoT \u2013 Cluster of European Research Projects on the Internet of Things, Luxembourg (2010)"},{"key":"54_CR7","first-page":"1","volume":"14","author":"L Cai","year":"2015","unstructured":"Cai, L., Zhu, Y.: The challenges of data quality and data quality assessment in the Big Data Era. Data Sci. J. 14, 1\u201310 (2015)","journal-title":"Data Sci. J."},{"key":"54_CR8","doi-asserted-by":"crossref","first-page":"1","DOI":"10.1007\/978-3-319-24474-7_1","volume":"14","author":"Y Zhu","year":"2015","unstructured":"Zhu, Y., Xiong, Y.: Towards data science. Data Sci. J. 14, 1\u20137 (2015)","journal-title":"Data Sci. J."},{"key":"54_CR9","doi-asserted-by":"crossref","unstructured":"Katal, A., Wazid, M., Goudar, R.H.: Big Data: issues, challenges, tools and good practices. In: Sixth International Conference on Contemporary Computing (IC3 2013), pp. 404\u2013409. IEEE (2013)","DOI":"10.1109\/IC3.2013.6612229"},{"key":"54_CR10","unstructured":"IEEE: IEEE Standard for Software Quality Assurance Processes, vol. 730\u2122-2014 (Revision of IEEE Std. 730-2002). IEEE Computer Society, New York (2014)"},{"key":"54_CR11","volume-title":"The New Know: Innovation Powered by Analytics","author":"T May","year":"2009","unstructured":"May, T.: The New Know: Innovation Powered by Analytics. Wiley, New Jersey (2009)"},{"key":"54_CR12","doi-asserted-by":"crossref","first-page":"51","DOI":"10.1089\/big.2013.1508","volume":"1","author":"F Provost","year":"2013","unstructured":"Provost, F., Fawcett, T.: Data science and its relationship to Big Data and data-driven decision making. Big Data 1, 51\u201359 (2013)","journal-title":"Big Data"},{"key":"54_CR13","doi-asserted-by":"crossref","first-page":"243","DOI":"10.1504\/IJDATS.2010.034058","volume":"2","author":"Q Taylor","year":"2010","unstructured":"Taylor, Q., Giraud-Carrier, C.: Applications of data mining in software engineering. Int. J. Data Anal. Tech. Strat. 2, 243\u2013257 (2010)","journal-title":"Int. J. Data Anal. Tech. Strat."},{"key":"54_CR14","doi-asserted-by":"crossref","unstructured":"Xie, T., Pei, J., Hassan, A.E.: Mining software engineering data. In: 29th International Conference on Software Engineering (ICSE 2007 Companion), pp. 172\u2013173. IEEE, Minneapolis (2007)","DOI":"10.1109\/ICSECOMPANION.2007.50"},{"key":"54_CR15","doi-asserted-by":"crossref","unstructured":"Hassan, A.E., Xie, T.: Software intelligence: the future of mining software engineering data. In: Proceedings of the FSE\/SDP Workshop on Future of Software Engineering Research, pp. 161\u2013165. ACM, Santa Fe (2010)","DOI":"10.1145\/1882362.1882397"},{"key":"54_CR16","volume-title":"The Art and Science of Analyzing Software Data","author":"C Bird","year":"2015","unstructured":"Bird, C., Menzies, T., Zimmermann, T.: The Art and Science of Analyzing Software Data. Morgan Kaufmann, Waltham (2015)"},{"key":"54_CR17","unstructured":"Santucci, G., Lange, S.: Internet of Things in 2020 - a roadmap for the future. INFSO D.4 Networked Enterprise & RFID INFSO G.2 Micro & Nanosystems (2008)"},{"key":"54_CR18","doi-asserted-by":"crossref","first-page":"78","DOI":"10.5752\/P.2316-9451.2013v1n2p78","volume":"1","author":"S Agrawal","year":"2013","unstructured":"Agrawal, S., Vieira, D.: A survey on Internet of Things. Abak\u00f3s 1, 78\u201395 (2013)","journal-title":"Abak\u00f3s"},{"key":"54_CR19","doi-asserted-by":"crossref","first-page":"2787","DOI":"10.1016\/j.comnet.2010.05.010","volume":"54","author":"L Atzori","year":"2010","unstructured":"Atzori, L., Iera, A., Morabito, G.: The Internet of Things: a survey. Comput. Netw. 54, 2787\u20132805 (2010)","journal-title":"Comput. Netw."},{"key":"54_CR20","series-title":"Lecture Notes in Business Information Processing","doi-asserted-by":"publisher","first-page":"121","DOI":"10.1007\/978-3-319-32799-0_10","volume-title":"Innovations in Enterprise Information Systems Management and Engineering","author":"H Foidl","year":"2016","unstructured":"Foidl, H., Felderer, M.: Research challenges of industry 4.0 for quality management. In: Felderer, M., Piazolo, F., Ortner, W., Brehm, L., Hof, H.-J. (eds.) ERP Future 2015 - Research. LNBIP, vol. 245, pp. 121\u2013137. Springer, Heidelberg (2016). doi: 10.1007\/978-3-319-32799-0_10"},{"key":"54_CR21","unstructured":"Vermesan, O., Harrison, M., Vogt, H., Kalaboukas, K., Tomasella, M., Wouters, K., Gusmeroli, S., Haller, S.: Strategic research agenda. In: Sundmaeker, H., Guillemin, P., Friess, P., Woelffl\u00e9, S. (eds.) Vision and Challenges\u00a0for Realising the Internet of Things, pp. 39\u201382. CERP-IoT \u2013 Cluster of European Research Projects on the Internet of Things, Luxembourg (2010)"},{"key":"54_CR22","doi-asserted-by":"crossref","first-page":"1497","DOI":"10.1016\/j.adhoc.2012.02.016","volume":"10","author":"D Miorandi","year":"2012","unstructured":"Miorandi, D., Sicari, S., De Pellegrini, F., Chlamtac, I.: Internet of Things: vision, applications and research challenges. Ad Hoc Netw. 10, 1497\u20131516 (2012)","journal-title":"Ad Hoc Netw."},{"key":"54_CR23","doi-asserted-by":"crossref","unstructured":"Zhang, D., Yang, L.T., Huang, H.: Searching in Internet of Things: vision and challenges. In: Ninth IEEE International Symposium on Parallel and Distributed Processing with Applications (ISPA 2011), pp. 201\u2013206. IEEE (2011)","DOI":"10.1109\/ISPA.2011.53"},{"key":"54_CR24","doi-asserted-by":"crossref","unstructured":"Liu, Y., Zhou, G.: Key technologies and applications of Internet of Things. In: Fifth International Conference on Intelligent Computation Technology and Automation (ICICTA 2012), pp. 197\u2013200. IEEE, Zhangjiajie (2012)","DOI":"10.1109\/ICICTA.2012.56"},{"key":"54_CR25","series-title":"Management for Professionals","doi-asserted-by":"crossref","first-page":"105","DOI":"10.1007\/978-3-319-14430-6_8","volume-title":"BPM - Driving Innovation in a Digital World","author":"WMP van der Aalst","year":"2015","unstructured":"van der Aalst, W.M.P.: Extracting event data from databases to unleash process mining. In: Vom Brocke, J., Schmiedel, T. (eds.) BPM - Driving Innovation in a Digital World. Management for Professionals, pp. 105\u2013128. Springer, Switzerland (2015)"},{"key":"54_CR26","doi-asserted-by":"crossref","first-page":"485","DOI":"10.1145\/365719.366510","volume":"9","author":"P Naur","year":"1966","unstructured":"Naur, P.: The Science of datalogy. Commun. ACM 9, 485 (1966)","journal-title":"Commun. ACM"},{"key":"54_CR27","doi-asserted-by":"crossref","first-page":"163","DOI":"10.2481\/dsj.5.163","volume":"5","author":"JF Smith","year":"2006","unstructured":"Smith, J.F.: Data Science as an academic discipline. Data Sci. J. 5, 163\u2013164 (2006)","journal-title":"Data Sci. J."},{"key":"54_CR28","unstructured":"Data Science Journal. http:\/\/datascience.codata.org\/"},{"key":"54_CR29","unstructured":"Journal of Data Science. http:\/\/www.jds-online.com\/about"},{"key":"54_CR30","series-title":"Studies in Classification, Data Analysis, and Knowledge Organization","first-page":"40","volume-title":"Data Science, Classification, and Related Methods","author":"EC Hayashi","year":"1996","unstructured":"Hayashi, E.C.: What is data science? Fundamental concepts and a heuristic example. In: Hayashi, C., et al. (eds.) Data Science, Classification, and Related Methods. Studies in Classification, Data Analysis, and Knowledge Organization, pp. 40\u201351. Springer, Japan (1996)"},{"key":"54_CR31","doi-asserted-by":"crossref","first-page":"201","DOI":"10.2481\/dsj.008-004","volume":"8","author":"L Liu","year":"2009","unstructured":"Liu, L., Zhang, H., Li, J., Wang, R., Yu, L., Yu, J., Li, P.: Building a community of data scientists: an explorative analysis. Data Sci. J. 8, 201\u2013208 (2009)","journal-title":"Data Sci. J."},{"key":"54_CR32","doi-asserted-by":"crossref","unstructured":"Dhar, V.: Data science and prediction (2012)","DOI":"10.2139\/ssrn.2086734"},{"key":"54_CR33","doi-asserted-by":"crossref","first-page":"77","DOI":"10.1111\/jbl.12010","volume":"34","author":"MA Waller","year":"2013","unstructured":"Waller, M.A., Fawcett, S.E.: Data science, predictive analytics, and big data: a revolution\u00a0that will transform supply chain design and management. J. Bus. Logistics 34, 77\u201384 (2013)","journal-title":"J. Bus. Logistics"},{"key":"54_CR34","series-title":"Proceedings of the I-ESA Conferences","doi-asserted-by":"crossref","first-page":"13","DOI":"10.1007\/978-3-319-04948-9_2","volume-title":"Enterprise Interoperability VI -\u00a0Interoperability for Agility, Resilience and Plasticity of Collaborations","author":"WMP van der Aalst","year":"2014","unstructured":"van der Aalst, W.M.P.: Data scientist: the engineer of the future. In: Mertins, K., B\u00e9naben, F., Poler, R., Bourri\u00e8res, J.-P. (eds.) Enterprise Interoperability VI -\u00a0Interoperability for Agility, Resilience and Plasticity of Collaborations. Proceedings of the I-ESA Conferences, vol. 7, pp. 13\u201326. Springer, Switzerland (2014)"},{"key":"54_CR35","doi-asserted-by":"crossref","first-page":"31","DOI":"10.1109\/MS.2013.86","volume":"30","author":"T Menzies","year":"2013","unstructured":"Menzies, T., Zimmermann, T.: Software analytics: so what? IEEE Softw. 30, 31\u201337 (2013)","journal-title":"IEEE Softw."},{"key":"54_CR36","doi-asserted-by":"crossref","unstructured":"Kim, M., Zimmermann, T., DeLine, R., Begel, A.: The emerging role of data scientists on software development teams -\u00a0Technical report. MSR-TR-2015-30. Microsoft Research (2015)","DOI":"10.1145\/2884781.2884783"},{"key":"54_CR37","doi-asserted-by":"crossref","unstructured":"Begel, A., Zimmermann, T.: Analyze this! 145 questions for data scientists in software engineering. In: Proceedings of the 36th International Conference on Software Engineering (ICSE 2014), pp. 12\u201323. ACM (2014)","DOI":"10.1145\/2568225.2568233"},{"key":"54_CR38","doi-asserted-by":"crossref","unstructured":"Mockus, A., Weiss, D.M., Zhang, P.: Understanding and predicting effort in software projects. In: Proceedings of the 25th International Conference on Software Engineering (ICSE 2003), pp. 274\u2013284. IEEE Computer Society (2003)","DOI":"10.1109\/ICSE.2003.1201207"},{"key":"54_CR39","doi-asserted-by":"crossref","unstructured":"Zimmermann, T., Wei\u00dfgerber, P., Diehl, S., Zeller, A.: Mining version histories to guide software changes. In: Proceedings of the 26th International Conference on Software Engineering (ICSE 2004), pp. 563\u2013572. IEEE (2004)","DOI":"10.1109\/ICSE.2004.1317478"},{"key":"54_CR40","doi-asserted-by":"crossref","unstructured":"Cheatham, T.J.: Software testing: a machine learning experiment. In: 23rd Annual Conference on Computer Science (CSC 1995), pp. 135\u2013141. ACM (1995)","DOI":"10.1145\/259526.259548"},{"key":"54_CR41","doi-asserted-by":"crossref","unstructured":"Gorla, A., Tavecchia, I., Gross, F., Zeller, A.: Checking app behavior against app descriptions. In: 36th International Conference on Software Engineering (ICSE 2014), pp. 1025\u20131035. ACM (2014)","DOI":"10.1145\/2568225.2568276"},{"key":"54_CR42","doi-asserted-by":"crossref","unstructured":"Chaturvedi, K.K., Singh, V.B., Singh, P.: Tools in mining software repositories. In: 13th International Conference on Computational Science and Its Applications (ICCSA 2013), pp. 89\u201398. IEEE (2013)","DOI":"10.1109\/ICCSA.2013.22"},{"key":"54_CR43","doi-asserted-by":"crossref","unstructured":"Fuggetta, A., Di Nitto, E.: Software process. In: Proceedings of the Future of Software Engineering, FOSE 2014, pp. 1\u201312. ACM (2014)","DOI":"10.1145\/2593882.2593883"},{"key":"54_CR44","doi-asserted-by":"crossref","unstructured":"Trendowicz, A., Kopczynska, S.: Adapting multi-criteria decision analysis for assessing the quality of software products. Current approaches and future perspectives. In: Hurson, A., Memon, A. (eds.) Advances in Computers, vol. 93, pp. 153\u2013226. Academic Press, Waltham (2014)","DOI":"10.1016\/B978-0-12-800162-2.00004-X"},{"key":"54_CR45","unstructured":"ISO\/IEC\/IEEE: ISO\/IEC\/IEEE 24765:2010 -\u00a0Systems and software engineering \u2014 Vocabulary. ISO (2010)"},{"key":"54_CR46","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-38571-1","volume-title":"Software Product Quality Control","author":"S Wagner","year":"2013","unstructured":"Wagner, S.: Software Product Quality Control. Springer, Heidelberg (2013)"},{"key":"54_CR47","doi-asserted-by":"crossref","unstructured":"Garousi, V., Felderer, M., M\u00e4ntyl\u00e4, M.V.: The need for multivocal literature reviews in software engineering: complementing systematic literature reviews with grey literature. In: 20th International Conference on Evaluation and Assessment in Software Engineering (EASE 2016). ACM, Limerick (2016)","DOI":"10.1145\/2915970.2916008"},{"key":"54_CR48","unstructured":"Cognizant. http:\/\/www.cognizant.com\/InsightsWhitepapers\/the-internet-of-things-qa-unleashed-codex1233.pdf"},{"key":"54_CR49","unstructured":"TechArcis Solutions. http:\/\/techarcis.com\/whitepaper\/testing-for-internet-of-things\/"},{"key":"54_CR50","unstructured":"Polarion Software. https:\/\/www.polarion.com\/resources\/download\/testing-the-internet-of-things?utm_campaign=Blog-2016-Embedded-Q1&utm_medium=Blog&utm_source=Blog"},{"key":"54_CR51","unstructured":"Ayla Networks. http:\/\/theinternetofthings.report\/Resources\/Whitepapers\/7f4b81fe-25c3-4fa1-a1fb-a12fa6d42f44_Ayla_Whitepaper_Art-of-IoT-QA.pdf"},{"key":"54_CR52","unstructured":"Testbirds. https:\/\/www.testbirds.com\/fileadmin\/Whitepaper-Studies\/Whitepaper-Internet-of-Things-EN.pdf"},{"key":"54_CR53","unstructured":"Gerrard Consulting. http:\/\/gerrardconsulting.com\/sites\/default\/files\/IoETestStrategy.pdf"},{"key":"54_CR54","unstructured":"Henning, B.: http:\/\/de.slideshare.net\/HenningBoeger\/german-testing-nightiothenningboeger20130228enexport"},{"key":"54_CR55","unstructured":"Test and Verification Solutions. http:\/\/www.testandverification.com\/wp-content\/uploads\/Testing%20the%20Internet%20of%20Things.pdf"},{"key":"54_CR56","unstructured":"Lau, M.: Testing the Internet of Things. Printed Circuit Design and Fab, 43, April 2014"},{"key":"54_CR57","unstructured":"DevOps. http:\/\/devops.com\/2015\/02\/24\/functional-testing-iot\/"},{"key":"54_CR58","unstructured":"LeanTesting. https:\/\/leantesting.com\/resources\/how-do-we-test-the-internet-of-things\/"},{"key":"54_CR59","unstructured":"Neotys. http:\/\/www.neotys.com\/blog\/performance-testing-101-how-to-approach-the-internet-of-things\/"},{"key":"54_CR60","unstructured":"Semiconductor Engineering. http:\/\/semiengineering.com\/how-to-cut-verification-costs-for-iot\/"},{"key":"54_CR61","unstructured":"SmartBear. http:\/\/blog.smartbear.com\/user-experience\/testing-the-internet-of-things\/"},{"key":"54_CR62","unstructured":"IoT-Now. http:\/\/www.iot-now.com\/2015\/05\/25\/33241-testing-the-internet-of-things-its-time-to-plan-your-test-strategy\/"},{"key":"54_CR63","unstructured":"Beyond Security. http:\/\/www.beyondsecurity.com\/security_testing_iot_internet_of_things.html"},{"key":"54_CR64","unstructured":"CenturyLink Cloud. https:\/\/www.ctl.io\/blog\/post\/qa-with-the-iot\/"},{"key":"54_CR65","unstructured":"Embedded. http:\/\/www.embedded.com\/electronics-news\/4437315\/The-testing-challenges-ahead-for-the-Internet-of-things"},{"key":"54_CR66","unstructured":"LogiGear. http:\/\/www.logigear.com\/magazine\/issue\/past-articles\/testing-strategy-for-the-iot\/"},{"key":"54_CR67","unstructured":"TestPlant. http:\/\/www.testplant.com\/explore\/testing-use-cases\/testing-the-internet-of-things-set-top-boxes\/"},{"key":"54_CR68","doi-asserted-by":"crossref","unstructured":"Nilsson, D.K., Larson, U.E.: Secure firmware updates over the air in intelligent vehicles. In: ICC Workshops - 2008 IEEE International Conference on Communications Workshops, pp. 380\u2013384. IEEE (2008)","DOI":"10.1109\/ICCW.2008.78"},{"key":"54_CR69","volume-title":"Practical Data Science with R","author":"N Zumel","year":"2014","unstructured":"Zumel, N., Mount, J.: Practical Data Science with R. Manning Publications, New York (2014)"},{"key":"54_CR70","volume-title":"Doing Data Science","author":"R Schutt","year":"2014","unstructured":"Schutt, R., O\u2019Neil, C.: Doing Data Science. O\u2019Reilly, Sebastopol (2014)"},{"key":"54_CR71","doi-asserted-by":"crossref","unstructured":"Buse, R.P.L., Zimmermann, T.: Information needs for software development analytics. In: Proceedings of the 34th International Conference on Software Engineering (ICSE 2012), pp. 987\u2013996. IEEE (2012)","DOI":"10.1109\/ICSE.2012.6227122"},{"key":"54_CR72","first-page":"258","volume":"42","author":"V Suma","year":"2008","unstructured":"Suma, V., Nair Gopalakrishnan, T.R.: Effective defect prevention approach in software process for achieving better quality levels. Proc. World Acad. Sci. Eng. Technol. 42, 258\u2013262 (2008)","journal-title":"Proc. World Acad. Sci. Eng. Technol."},{"key":"54_CR73","first-page":"42","volume":"8","author":"S Kumaresh","year":"2010","unstructured":"Kumaresh, S., Baskaran, R.: Defect analysis and prevention for software process quality improvement. Int. J. Comput. Appl. 8, 42\u201347 (2010)","journal-title":"Int. J. Comput. Appl."},{"key":"54_CR74","doi-asserted-by":"crossref","unstructured":"Han, S., Dang, Y., Ge, S., Zhang, D., Xie, T.: Performance debugging in the large via mining millions of stack traces. In: Proceedings of the 34th International Conference on Software Engineering (ICSE 2012), pp. 145\u2013155. IEEE (2012)","DOI":"10.1109\/ICSE.2012.6227198"},{"key":"54_CR75","doi-asserted-by":"crossref","unstructured":"Jiang, Z.M., Hassan, A.E., Hamann, G., Flora, P.: Automated performance analysis of load tests. In: International Conference on Software Maintenance (ICSM 2009), pp. 125\u2013134. IEEE (2009)","DOI":"10.1109\/ICSM.2009.5306331"},{"key":"54_CR76","doi-asserted-by":"crossref","unstructured":"Hindle, A.: Green mining: a methodology of relating software change to power consumption. In: 9th IEEE Working Conference on Mining Software Repositories (MSR), pp. 78\u201387. IEEE (2012)","DOI":"10.1109\/MSR.2012.6224303"},{"key":"54_CR77","doi-asserted-by":"crossref","unstructured":"Rubin, V., Lomazova, I., van der Aalst, W.M.P.: Agile development with software process mining. In: Proceedings of the 2014 International Conference on Software and System Process (ICSSP 2014), pp. 70\u201374. ACM (2014)","DOI":"10.1145\/2600821.2600842"},{"key":"54_CR78","doi-asserted-by":"crossref","DOI":"10.1007\/978-3-642-19345-3","volume-title":"Process Mining \u2013 Discovery, Conformance and Enhancement of Business Processes","author":"WMP van der Aalst","year":"2011","unstructured":"van der Aalst, W.M.P.: Process Mining \u2013 Discovery, Conformance and Enhancement of Business Processes. Springer, Heidelberg (2011)"},{"key":"54_CR79","doi-asserted-by":"crossref","unstructured":"Rubin, V.A., Mitsyuk, A.A., Lomazova, I.A., van der Aalst, W.M.P.: Process mining can be applied to software too! In: Proceedings of the 8th ACM\/IEEE International Symposium on Empirical Software Engineering and Measurement (ESEM 2014). ACM, Torino (2014)","DOI":"10.1145\/2652524.2652583"},{"key":"54_CR80","first-page":"813","volume":"22","author":"SA Shershakov","year":"2015","unstructured":"Shershakov, S.A., Rubin, V.A.: System runs analysis with process mining. Model. Anal. Inf. Syst. 22, 813\u2013833 (2015)","journal-title":"Model. Anal. Inf. Syst."},{"key":"54_CR81","doi-asserted-by":"crossref","first-page":"2","DOI":"10.1109\/TSE.2007.256941","volume":"32","author":"T Menzies","year":"2007","unstructured":"Menzies, T., Greenwald, J., Frank, A.: Data mining static code attributes to learn defect predictors. IEEE Trans. Softw. Eng. 32, 2\u201313 (2007)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"54_CR82","doi-asserted-by":"crossref","unstructured":"Ostrand, T.J., Weyuker, E.J., Bell, R.M.: Where the bugs are. In: International Symposium on Software Testing and Analysis (ISSTA 2004), pp. 86\u201396. ACM (2004)","DOI":"10.1145\/1007512.1007524"},{"key":"54_CR83","doi-asserted-by":"crossref","first-page":"257","DOI":"10.1002\/stvr.299","volume":"14","author":"L Lazic","year":"2004","unstructured":"Lazic, L., Velasevic, D.: Applying simulation and design of experiments to the embedded software testing process. Softw. Test. Verification Reliab. 14, 257\u2013282 (2004)","journal-title":"Softw. Test. Verification Reliab."},{"key":"54_CR84","doi-asserted-by":"crossref","unstructured":"Wagner, S.: Defect classification and defect types revisited. In: International Symposium on Software Testing and Analysis (ISSTA 2008) \u2013 Workshop on Defects in Large Software Systems (DEFECTS 2008), pp. 39\u201340. ACM (2008)","DOI":"10.1145\/1390817.1390829"},{"key":"54_CR85","doi-asserted-by":"crossref","first-page":"573","DOI":"10.1142\/S021819400900426X","volume":"19","author":"EW Wong","year":"2009","unstructured":"Wong, E.W., Qi, Y.: BP neural network-based effective fault localization. Int. J. Softw. Eng. Knowl. Eng. 19, 573\u2013597 (2009)","journal-title":"Int. J. Softw. Eng. Knowl. Eng."},{"key":"54_CR86","first-page":"7400","volume":"10","author":"N Kannadhasan","year":"2015","unstructured":"Kannadhasan, N., Maheswari, U.B.: Machine learning based methodology for testing object oriented applications. J. Eng. Appl. Sci. 10, 7400\u20137405 (2015)","journal-title":"J. Eng. Appl. Sci."},{"key":"54_CR87","unstructured":"ISO\/IEC: ISO\/IEC 25010:2011 - Systems and software engineering \u2013 Systems and software Quality Requirements and Evaluation (SQuaRE) \u2013 System and software quality models. ISO\/IEC (2011)"},{"key":"54_CR88","doi-asserted-by":"crossref","unstructured":"Cao, H., Bao, T., Yang, Q., Chen, E., Tian, J.: An effective approach for mining mobile user habits. In: 19th ACM International Conference on Information and Knowledge Management (CIKM 2010), pp. 1677\u20131680. ACM (2010)","DOI":"10.1145\/1871437.1871702"},{"key":"54_CR89","doi-asserted-by":"crossref","unstructured":"Gruska, N., Wasylkowski, A., Zeller, A.: Learning from 6,000 projects: lightweight cross-project anomaly detection. In: Proceedings of the 19th International Symposium on Software Testing and Analysis (ISSTA 2010), pp. 119\u2013130. ACM (2010)","DOI":"10.1145\/1831708.1831723"},{"key":"54_CR90","doi-asserted-by":"crossref","unstructured":"Santos, R.M.S., Oliveira, T.C., Brito e Abreu, F.: Mining software development process variations. In: 30th Annual ACM Symposium on Applied Computing (SAC 2015), pp. 1657\u20131660. ACM (2015)","DOI":"10.1145\/2695664.2696046"},{"key":"54_CR91","doi-asserted-by":"crossref","unstructured":"Bacchelli, A., Dal Sasso, T., D\u02bcAmbros, M., Lanza, M.: Content classification of development emails. In: 34th International Conference on Software Engineering (ICSE 2012), pp. 375\u2013385. IEEE (2012)","DOI":"10.1109\/ICSE.2012.6227177"},{"key":"54_CR92","doi-asserted-by":"crossref","unstructured":"Bird, C., Gourley, A., Devanbu, P., Gertz, M., Swaminathan, A.: Mining email social networks. In: International Workshop on Mining Software Repositories (MSR 2006), pp. 137\u2013143. ACM (2006)","DOI":"10.1145\/1137983.1138016"},{"key":"54_CR93","unstructured":"Noorian, M., Bagheri, E., Du, W.: Machine learning-based software testing: towards\u00a0a classification framework. In: 23rd International Conference on Software Engineering & Knowledge Engineering (SEKE 2011), pp. 225\u2013229 (2011)"},{"key":"54_CR94","doi-asserted-by":"crossref","first-page":"1631","DOI":"10.1016\/j.engappai.2013.01.008","volume":"26","author":"AR Lenz","year":"2013","unstructured":"Lenz, A.R., Pozo, A., Vergilio, S.R.: Linking software testing results with a machine learning approach. Eng. Appl. Artif. Intell. 26, 1631\u20131640 (2013)","journal-title":"Eng. Appl. Artif. Intell."}],"container-title":["Lecture Notes in Computer Science","Leveraging Applications of Formal Methods, Verification and Validation: Discussion, Dissemination, Applications"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-47169-3_54","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2022,7,9]],"date-time":"2022-07-09T19:20:52Z","timestamp":1657394452000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-47169-3_54"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2016]]},"ISBN":["9783319471686","9783319471693"],"references-count":94,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-47169-3_54","relation":{},"ISSN":["0302-9743","1611-3349"],"issn-type":[{"type":"print","value":"0302-9743"},{"type":"electronic","value":"1611-3349"}],"subject":[],"published":{"date-parts":[[2016]]}}}