{"status":"ok","message-type":"work","message-version":"1.0.0","message":{"indexed":{"date-parts":[[2025,3,27]],"date-time":"2025-03-27T16:21:37Z","timestamp":1743092497103,"version":"3.40.3"},"publisher-location":"Cham","reference-count":33,"publisher":"Springer International Publishing","isbn-type":[{"type":"print","value":"9783319999715"},{"type":"electronic","value":"9783319999722"}],"license":[{"start":{"date-parts":[[2018,1,1]],"date-time":"2018-01-01T00:00:00Z","timestamp":1514764800000},"content-version":"unspecified","delay-in-days":0,"URL":"http:\/\/www.springer.com\/tdm"}],"content-domain":{"domain":["link.springer.com"],"crossmark-restriction":false},"short-container-title":[],"published-print":{"date-parts":[[2018]]},"DOI":"10.1007\/978-3-319-99972-2_22","type":"book-chapter","created":{"date-parts":[[2018,8,28]],"date-time":"2018-08-28T06:14:23Z","timestamp":1535436863000},"page":"279-292","update-policy":"https:\/\/doi.org\/10.1007\/springer_crossmark_policy","source":"Crossref","is-referenced-by-count":3,"title":["Text Semantics and Layout Defects Detection in Android Apps Using Dynamic Execution and Screenshot Analysis"],"prefix":"10.1007","author":[{"given":"\u0160ar\u016bnas","family":"Packevi\u010dius","sequence":"first","affiliation":[]},{"given":"Dominykas","family":"Barisas","sequence":"additional","affiliation":[]},{"given":"Andrej","family":"U\u0161aniov","sequence":"additional","affiliation":[]},{"given":"Evaldas","family":"Guogis","sequence":"additional","affiliation":[]},{"given":"Eduardas","family":"Barei\u0161a","sequence":"additional","affiliation":[]}],"member":"297","published-online":{"date-parts":[[2018,8,29]]},"reference":[{"key":"22_CR1","series-title":"Communications in Computer and Information Science","doi-asserted-by":"publisher","first-page":"560","DOI":"10.1007\/978-3-319-24770-0_48","volume-title":"Information and Software Technologies","author":"\u0160 Packevi\u010dius","year":"2015","unstructured":"Packevi\u010dius, \u0160., U\u0161aniov, A., Stanskis, \u0160., Barei\u0161a, E.: The testing method based on image analysis for automated detection of UI defects intended for mobile applications. In: Dregvaite, G., Damasevicius, R. (eds.) ICIST 2015. CCIS, vol. 538, pp. 560\u2013576. Springer, Cham (2015). https:\/\/doi.org\/10.1007\/978-3-319-24770-0_48"},{"issue":"11","key":"22_CR2","doi-asserted-by":"publisher","first-page":"867","DOI":"10.1002\/smr.1737","volume":"27","author":"G Rasool","year":"2015","unstructured":"Rasool, G., Arshad, Z.: A review of code smell mining techniques. J. Softw. Evol. Process 27(11), 867\u2013895 (2015)","journal-title":"J. Softw. Evol. Process"},{"key":"22_CR3","doi-asserted-by":"crossref","unstructured":"Lelli, V., Blouin, A., Baudry, B.: Classifying and qualifying GUI defects. In: 2015 IEEE 8th International Conference on Software Testing, Verification and Validation (ICST) (2015)","DOI":"10.1109\/ICST.2015.7102582"},{"key":"22_CR4","doi-asserted-by":"crossref","unstructured":"Moran, K., et al.: Automated reporting of GUI design violations for mobile apps. In: 40th International Conference on Software Engineering (ICSE 2018) (2018)","DOI":"10.1145\/3180155.3180246"},{"key":"22_CR5","doi-asserted-by":"crossref","unstructured":"Chang, T.-H., Yeh, T., Miller, R.C.: GUI testing using computer vision. In: Proceedings of the SIGCHI Conference on Human Factors in Computing Systems, pp. 1535\u20131544. ACM, Atlanta (2010)","DOI":"10.1145\/1753326.1753555"},{"key":"22_CR6","doi-asserted-by":"crossref","unstructured":"Yeh, T., Chang, T.-H., Miller, R.C.: Sikuli: using GUI screenshots for search and automation. In: Proceedings of the 22nd Annual ACM Symposium on User Interface Software and Technology, pp. 183\u2013192. ACM, Victoria (2009)","DOI":"10.1145\/1622176.1622213"},{"key":"22_CR7","doi-asserted-by":"crossref","unstructured":"Baek, Y.-M., Bae, D.-H.: Automated model-based Android GUI testing using multi-level GUI comparison criteria. In: Proceedings of the 31st IEEE\/ACM International Conference on Automated Software Engineering, pp. 238\u2013249. ACM, Singapore (2016)","DOI":"10.1145\/2970276.2970313"},{"issue":"11","key":"22_CR8","doi-asserted-by":"publisher","first-page":"943","DOI":"10.1109\/32.177364","volume":"18","author":"R Chillarege","year":"1992","unstructured":"Chillarege, R., et al.: Orthogonal defect classification-a concept for in-process measurements. IEEE Trans. Softw. Eng. 18(11), 943\u2013956 (1992)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"22_CR9","unstructured":"IEEE Standard Classification for Software Anomalies: IEEE Std 1044-2009 (Revision of IEEE Std 1044-1993), pp. 1\u201323 (2010)"},{"key":"22_CR10","unstructured":"Beizer, B.: Software Testing Techniques, 2nd edn. Van Nostrand Reinhold Electrical\/Computer Science and Engineering Series. Van Nostrand Reinhold. New York (1990). xviii, 290\u00a0p."},{"key":"22_CR11","unstructured":"Johnson, J.: GUI Bloopers 2.0: Common User Interface Design Don\u2019ts and Dos. Morgan Kaufmann Publishers Inc., San Francisco (2007). 424\u00a0p."},{"key":"22_CR12","unstructured":"Li, Y., et al.: DroidBot: a lightweight UI-guided test input generator for Android. In: Proceedings of the 39th International Conference on Software Engineering Companion, pp. 23\u201326. IEEE Press, Buenos Aires (2017)"},{"issue":"159","key":"22_CR13","first-page":"2","volume":"2007","author":"A Kay","year":"2007","unstructured":"Kay, A.: Tesseract: an open-source optical character recognition engine. Linux J. 2007(159), 2 (2007)","journal-title":"Linux J."},{"issue":"2","key":"22_CR14","doi-asserted-by":"publisher","first-page":"3","DOI":"10.1177\/002194366900600202","volume":"6","author":"R Gunning","year":"1969","unstructured":"Gunning, R.: The fog index after twenty years. J. Bus. Commun. 6(2), 3\u201313 (1969)","journal-title":"J. Bus. Commun."},{"issue":"5","key":"22_CR15","first-page":"221","volume":"13","author":"SL Mailloux","year":"1995","unstructured":"Mailloux, S.L., et al.: How reliable is computerized assessment of readability? Comput. Nurs. 13(5), 221\u2013225 (1995)","journal-title":"Comput. Nurs."},{"key":"22_CR16","doi-asserted-by":"crossref","unstructured":"Roman-Rangel, E., Marchand-Maillet, S.: Automatic removal of visual stop-words. In: Proceedings of the 22nd ACM International Conference on Multimedia, pp. 1145\u20131148. ACM, Orlando (2014)","DOI":"10.1145\/2647868.2655005"},{"key":"22_CR17","doi-asserted-by":"crossref","unstructured":"Chen, Y., et al.: Detecting offensive language in social media to protect adolescent online safety. In: 2012 International Conference on Privacy, Security, Risk and Trust and 2012 International Conference on Social Computing (2012)","DOI":"10.1109\/SocialCom-PASSAT.2012.55"},{"key":"22_CR18","doi-asserted-by":"crossref","unstructured":"Anderka, M., Stein, B., Lipka, N.: Detection of text quality flaws as a one-class classification problem. In: Proceedings of the 20th ACM International Conference on Information and Knowledge Management, pp. 2313\u20132316. ACM, Glasgow (2011)","DOI":"10.1145\/2063576.2063954"},{"issue":"9","key":"22_CR19","doi-asserted-by":"publisher","first-page":"610","DOI":"10.1145\/358628.358639","volume":"25","author":"B Shneiderman","year":"1982","unstructured":"Shneiderman, B.: Designing computer system messages. Commun. ACM 25(9), 610\u2013611 (1982)","journal-title":"Commun. ACM"},{"issue":"10","key":"22_CR20","doi-asserted-by":"publisher","first-page":"623","DOI":"10.1145\/2544173.2509552","volume":"48","author":"W Choi","year":"2013","unstructured":"Choi, W., Necula, G., Sen, K.: Guided GUI testing of android apps with minimal restart and approximate learning. SIGPLAN Not. 48(10), 623\u2013640 (2013)","journal-title":"SIGPLAN Not."},{"key":"22_CR21","doi-asserted-by":"crossref","unstructured":"Ganov, S.R., et al.: Test generation for graphical user interfaces based on symbolic execution. In Proceedings of the 3rd International Workshop on Automation of Software Test, pp. 33\u201340. ACM, Leipzig (2008)","DOI":"10.1145\/1370042.1370050"},{"key":"22_CR22","doi-asserted-by":"crossref","unstructured":"Machiry, A., Tahiliani, R., Naik, M.: Dynodroid: an input generation system for Android apps. In: Proceedings of the 2013 9th Joint Meeting on Foundations of Software Engineering, pp. 224\u2013234. ACM, Saint Petersburg (2013)","DOI":"10.1145\/2491411.2491450"},{"key":"22_CR23","doi-asserted-by":"crossref","unstructured":"Amalfitano, D., et al.: Using GUI ripping for automated testing of Android applications. In: Proceedings of the 27th IEEE\/ACM International Conference on Automated Software Engineering. ACM (2012)","DOI":"10.1145\/2351676.2351717"},{"issue":"1","key":"22_CR24","doi-asserted-by":"publisher","first-page":"27","DOI":"10.1002\/smr.305","volume":"17","author":"A Memon","year":"2005","unstructured":"Memon, A., Nagarajan, A., Xie, Q.: Automating regression testing for evolving GUI software. J. Softw. Maintenance Evol. Res. Pract. 17(1), 27\u201364 (2005)","journal-title":"J. Softw. Maintenance Evol. Res. Pract."},{"key":"22_CR25","unstructured":"Memon, A., Banerjee, I., Nagarajan, A.: GUI ripping: reverse engineering of graphical user interfaces for testing. In: 2013 20th Working Conference on Reverse Engineering (WCRE). IEEE Computer Society (2003)"},{"issue":"1","key":"22_CR26","doi-asserted-by":"publisher","first-page":"81","DOI":"10.1109\/TSE.2009.68","volume":"36","author":"Y Xun","year":"2010","unstructured":"Xun, Y., Memon, A.M.: Generating event sequence-based test cases using GUI runtime state feedback. IEEE Trans. Softw. Eng. 36(1), 81\u201395 (2010)","journal-title":"IEEE Trans. Softw. Eng."},{"key":"22_CR27","doi-asserted-by":"crossref","unstructured":"Su, T., et al.: Guided, stochastic model-based GUI testing of Android apps. In: Proceedings of the 2017 11th Joint Meeting on Foundations of Software Engineering, pp. 245\u2013256. ACM, Paderborn (2017)","DOI":"10.1145\/3106237.3106298"},{"key":"22_CR28","doi-asserted-by":"crossref","unstructured":"Miguel, J.L.S., Takada, S.: Generating test cases for Android applications through GUI modeling, usage modeling, and change analysis. In: Proceedings of the Eighth International C* Conference on Computer Science and Software Engineering, pp. 146\u2013147. ACM, Yokohama (2008)","DOI":"10.1145\/2790798.2790823"},{"key":"22_CR29","doi-asserted-by":"crossref","unstructured":"Su, T.: FSMdroid: guided GUI testing of android apps. In: Proceedings of the 38th International Conference on Software Engineering Companion, pp. 689\u2013691. ACM, Austin (2016)","DOI":"10.1145\/2889160.2891043"},{"key":"22_CR30","doi-asserted-by":"crossref","unstructured":"Zeng, X., et al.: Automated test input generation for Android: are we really there yet in an industrial case? In: Proceedings of the 2016 24th ACM SIGSOFT International Symposium on Foundations of Software Engineering, pp. 987\u2013992. ACM, Seattle (2016)","DOI":"10.1145\/2950290.2983958"},{"issue":"3","key":"22_CR31","doi-asserted-by":"publisher","first-page":"1","DOI":"10.1145\/1968587.1968601","volume":"36","author":"S Baride","year":"2011","unstructured":"Baride, S., Dutta, K.: A cloud based software testing paradigm for mobile applications. SIGSOFT Softw. Eng. Notes 36(3), 1\u20134 (2011)","journal-title":"SIGSOFT Softw. Eng. Notes"},{"key":"22_CR32","unstructured":"Starov, O., Vilkomir, S., Kharchenko, V.: Cloud testing for mobile software systems-concept and prototyping. In: ICSOFT (2013)"},{"key":"22_CR33","doi-asserted-by":"crossref","unstructured":"Chiatti, A., et al.: Text extraction from smartphone screenshots to archive in situ media behavior. In: Proceedings of the Knowledge Capture Conference, pp. 1\u20134. ACM, Austin (2017)","DOI":"10.1145\/3148011.3154468"}],"container-title":["Communications in Computer and Information Science","Information and Software Technologies"],"original-title":[],"link":[{"URL":"http:\/\/link.springer.com\/content\/pdf\/10.1007\/978-3-319-99972-2_22","content-type":"unspecified","content-version":"vor","intended-application":"similarity-checking"}],"deposited":{"date-parts":[[2019,10,22]],"date-time":"2019-10-22T23:14:58Z","timestamp":1571786098000},"score":1,"resource":{"primary":{"URL":"http:\/\/link.springer.com\/10.1007\/978-3-319-99972-2_22"}},"subtitle":[],"short-title":[],"issued":{"date-parts":[[2018]]},"ISBN":["9783319999715","9783319999722"],"references-count":33,"URL":"https:\/\/doi.org\/10.1007\/978-3-319-99972-2_22","relation":{},"ISSN":["1865-0929","1865-0937"],"issn-type":[{"type":"print","value":"1865-0929"},{"type":"electronic","value":"1865-0937"}],"subject":[],"published":{"date-parts":[[2018]]},"assertion":[{"value":"ICIST","order":1,"name":"conference_acronym","label":"Conference Acronym","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"International Conference on Information and Software Technologies","order":2,"name":"conference_name","label":"Conference Name","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Vilnius","order":3,"name":"conference_city","label":"Conference City","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Lithuania","order":4,"name":"conference_country","label":"Conference Country","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"2018","order":5,"name":"conference_year","label":"Conference Year","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"4 October 2018","order":7,"name":"conference_start_date","label":"Conference Start Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"6 October 2018","order":8,"name":"conference_end_date","label":"Conference End Date","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"24","order":9,"name":"conference_number","label":"Conference Number","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"icist2018","order":10,"name":"conference_id","label":"Conference ID","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"http:\/\/icist.if.ktu.lt\/index.php\/ICIST","order":11,"name":"conference_url","label":"Conference URL","group":{"name":"ConferenceInfo","label":"Conference Information"}},{"value":"Double-blind","order":1,"name":"type","label":"Type","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Open Journal System","order":2,"name":"conference_management_system","label":"Conference Management System","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"124","order":3,"name":"number_of_submissions_sent_for_review","label":"Number of Submissions Sent for Review","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"48","order":4,"name":"number_of_full_papers_accepted","label":"Number of Full Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":5,"name":"number_of_short_papers_accepted","label":"Number of Short Papers Accepted","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"39% - The value is computed by the equation \"Number of Full Papers Accepted \/ Number of Submissions Sent for Review * 100\" and then rounded to a whole number.","order":6,"name":"acceptance_rate_of_full_papers","label":"Acceptance Rate of Full Papers","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"3","order":7,"name":"average_number_of_reviews_per_paper","label":"Average Number of Reviews per Paper","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"0","order":8,"name":"average_number_of_papers_per_reviewer","label":"Average Number of Papers per Reviewer","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}},{"value":"Yes","order":9,"name":"external_reviewers_involved","label":"External Reviewers Involved","group":{"name":"ConfEventPeerReviewInformation","label":"Peer Review Information"}}]}}